| /* |
| * Copyright 2018 The Android Open Source Project |
| * |
| * Licensed under the Apache License, Version 2.0 (the "License"); |
| * you may not use this file except in compliance with the License. |
| * You may obtain a copy of the License at |
| * |
| * http://www.apache.org/licenses/LICENSE-2.0 |
| * |
| * Unless required by applicable law or agreed to in writing, software |
| * distributed under the License is distributed on an "AS IS" BASIS, |
| * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| * See the License for the specific language governing permissions and |
| * limitations under the License. |
| * |
| * main.c - main function |
| */ |
| |
| #include <arpa/inet.h> |
| #include <errno.h> |
| #include <netinet/in.h> |
| #include <stdbool.h> |
| #include <stdint.h> |
| #include <stdlib.h> |
| #include <string.h> |
| #include <sys/personality.h> |
| #include <sys/utsname.h> |
| #include <unistd.h> |
| |
| #include "clatd.h" |
| #include "common.h" |
| #include "config.h" |
| #include "logging.h" |
| |
| #define DEVICEPREFIX "v4-" |
| |
| /* function: stop_loop |
| * signal handler: stop the event loop |
| */ |
| static void stop_loop() { running = 0; }; |
| |
| /* function: print_help |
| * in case the user is running this on the command line |
| */ |
| void print_help() { |
| printf("android-clat arguments:\n"); |
| printf("-i [uplink interface]\n"); |
| printf("-p [plat prefix]\n"); |
| printf("-4 [IPv4 address]\n"); |
| printf("-6 [IPv6 address]\n"); |
| printf("-t [tun file descriptor number]\n"); |
| printf("-r [read socket descriptor number]\n"); |
| printf("-w [write socket descriptor number]\n"); |
| } |
| |
| /* function: main |
| * allocate and setup the tun device, then run the event loop |
| */ |
| int main(int argc, char **argv) { |
| struct tun_data tunnel; |
| int opt; |
| char *uplink_interface = NULL, *plat_prefix = NULL; |
| char *v4_addr = NULL, *v6_addr = NULL, *tunfd_str = NULL, *read_sock_str = NULL, |
| *write_sock_str = NULL; |
| unsigned len; |
| |
| while ((opt = getopt(argc, argv, "i:p:4:6:t:r:w:h")) != -1) { |
| switch (opt) { |
| case 'i': |
| uplink_interface = optarg; |
| break; |
| case 'p': |
| plat_prefix = optarg; |
| break; |
| case '4': |
| v4_addr = optarg; |
| break; |
| case '6': |
| v6_addr = optarg; |
| break; |
| case 't': |
| tunfd_str = optarg; |
| break; |
| case 'r': |
| read_sock_str = optarg; |
| break; |
| case 'w': |
| write_sock_str = optarg; |
| break; |
| case 'h': |
| print_help(); |
| exit(0); |
| default: |
| logmsg(ANDROID_LOG_FATAL, "Unknown option -%c. Exiting.", (char)optopt); |
| exit(1); |
| } |
| } |
| |
| if (uplink_interface == NULL) { |
| logmsg(ANDROID_LOG_FATAL, "clatd called without an interface"); |
| exit(1); |
| } |
| |
| if (tunfd_str != NULL && !parse_int(tunfd_str, &tunnel.fd4)) { |
| logmsg(ANDROID_LOG_FATAL, "invalid tunfd %s", tunfd_str); |
| exit(1); |
| } |
| if (!tunnel.fd4) { |
| logmsg(ANDROID_LOG_FATAL, "no tunfd specified on commandline."); |
| exit(1); |
| } |
| |
| if (read_sock_str != NULL && !parse_int(read_sock_str, &tunnel.read_fd6)) { |
| logmsg(ANDROID_LOG_FATAL, "invalid read socket %s", read_sock_str); |
| exit(1); |
| } |
| if (!tunnel.read_fd6) { |
| logmsg(ANDROID_LOG_FATAL, "no read_fd6 specified on commandline."); |
| exit(1); |
| } |
| |
| if (write_sock_str != NULL && !parse_int(write_sock_str, &tunnel.write_fd6)) { |
| logmsg(ANDROID_LOG_FATAL, "invalid write socket %s", write_sock_str); |
| exit(1); |
| } |
| if (!tunnel.write_fd6) { |
| logmsg(ANDROID_LOG_FATAL, "no write_fd6 specified on commandline."); |
| exit(1); |
| } |
| |
| len = snprintf(tunnel.device4, sizeof(tunnel.device4), "%s%s", DEVICEPREFIX, uplink_interface); |
| if (len >= sizeof(tunnel.device4)) { |
| logmsg(ANDROID_LOG_FATAL, "interface name too long '%s'", tunnel.device4); |
| exit(1); |
| } |
| |
| Global_Clatd_Config.native_ipv6_interface = uplink_interface; |
| if (!plat_prefix || inet_pton(AF_INET6, plat_prefix, &Global_Clatd_Config.plat_subnet) <= 0) { |
| logmsg(ANDROID_LOG_FATAL, "invalid IPv6 address specified for plat prefix: %s", plat_prefix); |
| exit(1); |
| } |
| |
| if (!v4_addr || !inet_pton(AF_INET, v4_addr, &Global_Clatd_Config.ipv4_local_subnet.s_addr)) { |
| logmsg(ANDROID_LOG_FATAL, "Invalid IPv4 address %s", v4_addr); |
| exit(1); |
| } |
| |
| if (!v6_addr || !inet_pton(AF_INET6, v6_addr, &Global_Clatd_Config.ipv6_local_subnet)) { |
| logmsg(ANDROID_LOG_FATAL, "Invalid source address %s", v6_addr); |
| exit(1); |
| } |
| |
| logmsg(ANDROID_LOG_INFO, "Starting clat version %s on %s plat=%s v4=%s v6=%s", CLATD_VERSION, |
| uplink_interface, plat_prefix ? plat_prefix : "(none)", v4_addr ? v4_addr : "(none)", |
| v6_addr ? v6_addr : "(none)"); |
| |
| { |
| // Compile time detection of 32 vs 64-bit build. (note: C does not have 'constexpr') |
| // Avoid use of preprocessor macros to get compile time syntax checking even on 64-bit. |
| const int user_bits = sizeof(void*) * 8; |
| const bool user32 = (user_bits == 32); |
| |
| // Note that on 64-bit all this personality related code simply compile optimizes out. |
| // 32-bit: fetch current personality (see 'man personality': 0xFFFFFFFF means retrieve only) |
| // On Linux fetching personality cannot fail. |
| const int prev_personality = user32 ? personality(0xFFFFFFFFuL) : PER_LINUX; |
| // 32-bit: attempt to get rid of kernel spoofing of 'uts.machine' architecture, |
| // In theory this cannot fail, as PER_LINUX should always be supported. |
| if (user32) (void)personality((prev_personality & ~PER_MASK) | PER_LINUX); |
| // 64-bit: this will compile time evaluate to false. |
| const bool was_linux32 = (prev_personality & PER_MASK) == PER_LINUX32; |
| |
| struct utsname uts = {}; |
| if (uname(&uts)) exit(1); // only possible error is EFAULT, but 'uts' is on stack |
| |
| // sysname is likely 'Linux', release is 'kver', machine is kernel's *true* architecture |
| logmsg(ANDROID_LOG_INFO, "%d-bit userspace on %s kernel %s for %s%s.", user_bits, |
| uts.sysname, uts.release, uts.machine, was_linux32 ? " (was spoofed)" : ""); |
| |
| // 32-bit: try to return to the 'default' personality |
| // In theory this cannot fail, because it was already previously in use. |
| if (user32) (void)personality(prev_personality); |
| } |
| |
| // Loop until someone sends us a signal or brings down the tun interface. |
| if (signal(SIGTERM, stop_loop) == SIG_ERR) { |
| logmsg(ANDROID_LOG_FATAL, "sigterm handler failed: %s", strerror(errno)); |
| exit(1); |
| } |
| |
| event_loop(&tunnel); |
| |
| logmsg(ANDROID_LOG_INFO, "Shutting down clat on %s", uplink_interface); |
| |
| if (running) { |
| logmsg(ANDROID_LOG_INFO, "Clatd on %s waiting for SIGTERM", uplink_interface); |
| // let's give higher level java code 15 seconds to kill us, |
| // but eventually terminate anyway, in case system server forgets about us... |
| // sleep() should be interrupted by SIGTERM, the handler should clear running |
| sleep(15); |
| logmsg(ANDROID_LOG_INFO, "Clatd on %s %s SIGTERM", uplink_interface, |
| running ? "timed out waiting for" : "received"); |
| } else { |
| logmsg(ANDROID_LOG_INFO, "Clatd on %s already received SIGTERM", uplink_interface); |
| } |
| return 0; |
| } |