| /* | 
 |  * Copyright (C) 2008 The Android Open Source Project | 
 |  * | 
 |  * Licensed under the Apache License, Version 2.0 (the "License"); | 
 |  * you may not use this file except in compliance with the License. | 
 |  * You may obtain a copy of the License at | 
 |  * | 
 |  *      http://www.apache.org/licenses/LICENSE-2.0 | 
 |  * | 
 |  * Unless required by applicable law or agreed to in writing, software | 
 |  * distributed under the License is distributed on an "AS IS" BASIS, | 
 |  * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. | 
 |  * See the License for the specific language governing permissions and | 
 |  * limitations under the License. | 
 |  */ | 
 |  | 
 | #define LOG_TAG "NetlinkEvent" | 
 |  | 
 | #include <arpa/inet.h> | 
 | #include <limits.h> | 
 | #include <linux/genetlink.h> | 
 | #include <linux/if.h> | 
 | #include <linux/if_addr.h> | 
 | #include <linux/if_link.h> | 
 | #include <linux/netfilter/nfnetlink.h> | 
 | #include <linux/netfilter/nfnetlink_log.h> | 
 | #include <linux/netlink.h> | 
 | #include <linux/rtnetlink.h> | 
 | #include <net/if.h> | 
 | #include <netinet/icmp6.h> | 
 | #include <netinet/in.h> | 
 | #include <stdlib.h> | 
 | #include <string.h> | 
 | #include <sys/personality.h> | 
 | #include <sys/socket.h> | 
 | #include <sys/types.h> | 
 | #include <sys/utsname.h> | 
 |  | 
 | #include <android-base/parseint.h> | 
 | #include <log/log.h> | 
 | #include <sysutils/NetlinkEvent.h> | 
 |  | 
 | using android::base::ParseInt; | 
 |  | 
 | /* From kernel's net/netfilter/xt_quota2.c */ | 
 | const int LOCAL_QLOG_NL_EVENT = 112; | 
 | const int LOCAL_NFLOG_PACKET = NFNL_SUBSYS_ULOG << 8 | NFULNL_MSG_PACKET; | 
 |  | 
 | /****************************************************************************** | 
 |  * WARNING: HERE BE DRAGONS!                                                  * | 
 |  *                                                                            * | 
 |  * This is here to provide for compatibility with both 32 and 64-bit kernels  * | 
 |  * from 32-bit userspace.                                                     * | 
 |  *                                                                            * | 
 |  * The kernel definition of this struct uses types (like long) that are not   * | 
 |  * the same across 32-bit and 64-bit builds, and there is no compatibility    * | 
 |  * layer to fix it up before it reaches userspace.                            * | 
 |  * As such we need to detect the bit-ness of the kernel and deal with it.     * | 
 |  *                                                                            * | 
 |  ******************************************************************************/ | 
 |  | 
 | /* | 
 |  * This is the verbatim kernel declaration from net/netfilter/xt_quota2.c, | 
 |  * it is *NOT* of a well defined layout and is included here for compile | 
 |  * time assertions only. | 
 |  * | 
 |  * It got there from deprecated ipt_ULOG.h to parse QLOG_NL_EVENT. | 
 |  */ | 
 | #define ULOG_MAC_LEN 80 | 
 | #define ULOG_PREFIX_LEN 32 | 
 | typedef struct ulog_packet_msg { | 
 |     unsigned long mark; | 
 |     long timestamp_sec; | 
 |     long timestamp_usec; | 
 |     unsigned int hook; | 
 |     char indev_name[IFNAMSIZ]; | 
 |     char outdev_name[IFNAMSIZ]; | 
 |     size_t data_len; | 
 |     char prefix[ULOG_PREFIX_LEN]; | 
 |     unsigned char mac_len; | 
 |     unsigned char mac[ULOG_MAC_LEN]; | 
 |     unsigned char payload[0]; | 
 | } ulog_packet_msg_t; | 
 |  | 
 | // On Linux int is always 32 bits, while sizeof(long) == sizeof(void*), | 
 | // thus long on a 32-bit Linux kernel is 32-bits, like int always is | 
 | typedef int long32; | 
 | typedef unsigned int ulong32; | 
 | static_assert(sizeof(long32) == 4); | 
 | static_assert(sizeof(ulong32) == 4); | 
 |  | 
 | // Here's the same structure definition with the assumption the kernel | 
 | // is compiled for 32-bits. | 
 | typedef struct { | 
 |     ulong32 mark; | 
 |     long32 timestamp_sec; | 
 |     long32 timestamp_usec; | 
 |     unsigned int hook; | 
 |     char indev_name[IFNAMSIZ]; | 
 |     char outdev_name[IFNAMSIZ]; | 
 |     ulong32 data_len; | 
 |     char prefix[ULOG_PREFIX_LEN]; | 
 |     unsigned char mac_len; | 
 |     unsigned char mac[ULOG_MAC_LEN]; | 
 |     unsigned char payload[0]; | 
 | } ulog_packet_msg32_t; | 
 |  | 
 | // long on a 64-bit kernel is 64-bits with 64-bit alignment, | 
 | // while long long is 64-bit but may have 32-bit aligment. | 
 | typedef long long __attribute__((__aligned__(8))) long64; | 
 | typedef unsigned long long __attribute__((__aligned__(8))) ulong64; | 
 | static_assert(sizeof(long64) == 8); | 
 | static_assert(sizeof(ulong64) == 8); | 
 |  | 
 | // Here's the same structure definition with the assumption the kernel | 
 | // is compiled for 64-bits. | 
 | typedef struct { | 
 |     ulong64 mark; | 
 |     long64 timestamp_sec; | 
 |     long64 timestamp_usec; | 
 |     unsigned int hook; | 
 |     char indev_name[IFNAMSIZ]; | 
 |     char outdev_name[IFNAMSIZ]; | 
 |     ulong64 data_len; | 
 |     char prefix[ULOG_PREFIX_LEN]; | 
 |     unsigned char mac_len; | 
 |     unsigned char mac[ULOG_MAC_LEN]; | 
 |     unsigned char payload[0]; | 
 | } ulog_packet_msg64_t; | 
 |  | 
 | // One expects the 32-bit version to be smaller than the 64-bit version. | 
 | static_assert(sizeof(ulog_packet_msg32_t) < sizeof(ulog_packet_msg64_t)); | 
 | // And either way the 'native' version should match either the 32 or 64 bit one. | 
 | static_assert(sizeof(ulog_packet_msg_t) == sizeof(ulog_packet_msg32_t) || | 
 |               sizeof(ulog_packet_msg_t) == sizeof(ulog_packet_msg64_t)); | 
 |  | 
 | // In practice these sizes are always simply (for both x86 and arm): | 
 | static_assert(sizeof(ulog_packet_msg32_t) == 168); | 
 | static_assert(sizeof(ulog_packet_msg64_t) == 192); | 
 |  | 
 | // Figure out the bitness of userspace. | 
 | // Trivial and known at compile time. | 
 | static bool isUserspace64bit(void) { | 
 |     return sizeof(long) == 8; | 
 | } | 
 |  | 
 | // Figure out the bitness of the kernel. | 
 | static bool isKernel64Bit(void) { | 
 |     // a 64-bit userspace requires a 64-bit kernel | 
 |     if (isUserspace64bit()) return true; | 
 |  | 
 |     static bool init = false; | 
 |     static bool cache = false; | 
 |     if (init) return cache; | 
 |  | 
 |     // Retrieve current personality - on Linux this system call *cannot* fail. | 
 |     int p = personality(0xffffffff); | 
 |     // But if it does just assume kernel and userspace (which is 32-bit) match... | 
 |     if (p == -1) return false; | 
 |  | 
 |     // This will effectively mask out the bottom 8 bits, and switch to 'native' | 
 |     // personality, and then return the previous personality of this thread | 
 |     // (likely PER_LINUX or PER_LINUX32) with any extra options unmodified. | 
 |     int q = personality((p & ~PER_MASK) | PER_LINUX); | 
 |     // Per man page this theoretically could error out with EINVAL, | 
 |     // but kernel code analysis suggests setting PER_LINUX cannot fail. | 
 |     // Either way, assume kernel and userspace (which is 32-bit) match... | 
 |     if (q != p) return false; | 
 |  | 
 |     struct utsname u; | 
 |     (void)uname(&u);  // only possible failure is EFAULT, but u is on stack. | 
 |  | 
 |     // Switch back to previous personality. | 
 |     // Theoretically could fail with EINVAL on arm64 with no 32-bit support, | 
 |     // but then we wouldn't have fetched 'p' from the kernel in the first place. | 
 |     // Either way there's nothing meaningul we can do in case of error. | 
 |     // Since PER_LINUX32 vs PER_LINUX only affects uname.machine it doesn't | 
 |     // really hurt us either.  We're really just switching back to be 'clean'. | 
 |     (void)personality(p); | 
 |  | 
 |     // Possible values of utsname.machine observed on x86_64 desktop (arm via qemu): | 
 |     //   x86_64 i686 aarch64 armv7l | 
 |     // additionally observed on arm device: | 
 |     //   armv8l | 
 |     // presumably also might just be possible: | 
 |     //   i386 i486 i586 | 
 |     // and there might be other weird arm32 cases. | 
 |     // We note that the 64 is present in both 64-bit archs, | 
 |     // and in general is likely to be present in only 64-bit archs. | 
 |     cache = !!strstr(u.machine, "64"); | 
 |     init = true; | 
 |     return cache; | 
 | } | 
 |  | 
 | /******************************************************************************/ | 
 |  | 
 | NetlinkEvent::NetlinkEvent() { | 
 |     mAction = Action::kUnknown; | 
 |     memset(mParams, 0, sizeof(mParams)); | 
 |     mPath = nullptr; | 
 |     mSubsystem = nullptr; | 
 | } | 
 |  | 
 | NetlinkEvent::~NetlinkEvent() { | 
 |     int i; | 
 |     if (mPath) | 
 |         free(mPath); | 
 |     if (mSubsystem) | 
 |         free(mSubsystem); | 
 |     for (i = 0; i < NL_PARAMS_MAX; i++) { | 
 |         if (!mParams[i]) | 
 |             break; | 
 |         free(mParams[i]); | 
 |     } | 
 | } | 
 |  | 
 | void NetlinkEvent::dump() { | 
 |     int i; | 
 |  | 
 |     for (i = 0; i < NL_PARAMS_MAX; i++) { | 
 |         if (!mParams[i]) | 
 |             break; | 
 |         SLOGD("NL param '%s'\n", mParams[i]); | 
 |     } | 
 | } | 
 |  | 
 | /* | 
 |  * Returns the message name for a message in the NETLINK_ROUTE family, or NULL | 
 |  * if parsing that message is not supported. | 
 |  */ | 
 | static const char *rtMessageName(int type) { | 
 | #define NL_EVENT_RTM_NAME(rtm) case rtm: return #rtm; | 
 |     switch (type) { | 
 |         NL_EVENT_RTM_NAME(RTM_NEWLINK); | 
 |         NL_EVENT_RTM_NAME(RTM_DELLINK); | 
 |         NL_EVENT_RTM_NAME(RTM_NEWADDR); | 
 |         NL_EVENT_RTM_NAME(RTM_DELADDR); | 
 |         NL_EVENT_RTM_NAME(RTM_NEWROUTE); | 
 |         NL_EVENT_RTM_NAME(RTM_DELROUTE); | 
 |         NL_EVENT_RTM_NAME(RTM_NEWNDUSEROPT); | 
 |         NL_EVENT_RTM_NAME(LOCAL_QLOG_NL_EVENT); | 
 |         NL_EVENT_RTM_NAME(LOCAL_NFLOG_PACKET); | 
 |         default: | 
 |             return nullptr; | 
 |     } | 
 | #undef NL_EVENT_RTM_NAME | 
 | } | 
 |  | 
 | /* | 
 |  * Checks that a binary NETLINK_ROUTE message is long enough for a payload of | 
 |  * size bytes. | 
 |  */ | 
 | static bool checkRtNetlinkLength(const struct nlmsghdr *nh, size_t size) { | 
 |     if (nh->nlmsg_len < NLMSG_LENGTH(size)) { | 
 |         SLOGE("Got a short %s message\n", rtMessageName(nh->nlmsg_type)); | 
 |         return false; | 
 |     } | 
 |     return true; | 
 | } | 
 |  | 
 | /* | 
 |  * Utility function to log errors. | 
 |  */ | 
 | static bool maybeLogDuplicateAttribute(bool isDup, | 
 |                                        const char *attributeName, | 
 |                                        const char *messageName) { | 
 |     if (isDup) { | 
 |         SLOGE("Multiple %s attributes in %s, ignoring\n", attributeName, messageName); | 
 |         return true; | 
 |     } | 
 |     return false; | 
 | } | 
 |  | 
 | /* | 
 |  * Parse a RTM_NEWLINK message. | 
 |  */ | 
 | bool NetlinkEvent::parseIfInfoMessage(const struct nlmsghdr *nh) { | 
 |     struct ifinfomsg *ifi = (struct ifinfomsg *) NLMSG_DATA(nh); | 
 |     if (!checkRtNetlinkLength(nh, sizeof(*ifi))) | 
 |         return false; | 
 |  | 
 |     if ((ifi->ifi_flags & IFF_LOOPBACK) != 0) { | 
 |         return false; | 
 |     } | 
 |  | 
 |     int len = IFLA_PAYLOAD(nh); | 
 |     struct rtattr *rta; | 
 |     for (rta = IFLA_RTA(ifi); RTA_OK(rta, len); rta = RTA_NEXT(rta, len)) { | 
 |         switch(rta->rta_type) { | 
 |             case IFLA_IFNAME: | 
 |                 asprintf(&mParams[0], "INTERFACE=%s", (char *) RTA_DATA(rta)); | 
 |                 // We can get the interface change information from sysfs update | 
 |                 // already. But in case we missed those message when devices start. | 
 |                 // We do a update again when received a kLinkUp event. To make | 
 |                 // the message consistent, use IFINDEX here as well since sysfs | 
 |                 // uses IFINDEX. | 
 |                 asprintf(&mParams[1], "IFINDEX=%d", ifi->ifi_index); | 
 |                 mAction = (ifi->ifi_flags & IFF_LOWER_UP) ? Action::kLinkUp : | 
 |                                                             Action::kLinkDown; | 
 |                 mSubsystem = strdup("net"); | 
 |                 return true; | 
 |         } | 
 |     } | 
 |  | 
 |     return false; | 
 | } | 
 |  | 
 | /* | 
 |  * Parse a RTM_NEWADDR or RTM_DELADDR message. | 
 |  */ | 
 | bool NetlinkEvent::parseIfAddrMessage(const struct nlmsghdr *nh) { | 
 |     struct ifaddrmsg *ifaddr = (struct ifaddrmsg *) NLMSG_DATA(nh); | 
 |     struct ifa_cacheinfo *cacheinfo = nullptr; | 
 |     char addrstr[INET6_ADDRSTRLEN] = ""; | 
 |     char ifname[IFNAMSIZ] = ""; | 
 |     uint32_t flags; | 
 |  | 
 |     if (!checkRtNetlinkLength(nh, sizeof(*ifaddr))) | 
 |         return false; | 
 |  | 
 |     int type = nh->nlmsg_type; | 
 |     if (type != RTM_NEWADDR && type != RTM_DELADDR) { | 
 |         SLOGE("parseIfAddrMessage on incorrect message type 0x%x\n", type); | 
 |         return false; | 
 |     } | 
 |  | 
 |     // For log messages. | 
 |     const char *msgtype = rtMessageName(type); | 
 |  | 
 |     // First 8 bits of flags. In practice will always be overridden when parsing IFA_FLAGS below. | 
 |     flags = ifaddr->ifa_flags; | 
 |  | 
 |     struct rtattr *rta; | 
 |     int len = IFA_PAYLOAD(nh); | 
 |     for (rta = IFA_RTA(ifaddr); RTA_OK(rta, len); rta = RTA_NEXT(rta, len)) { | 
 |         if (rta->rta_type == IFA_ADDRESS) { | 
 |             // Only look at the first address, because we only support notifying | 
 |             // one change at a time. | 
 |             if (maybeLogDuplicateAttribute(*addrstr != '\0', "IFA_ADDRESS", msgtype)) | 
 |                 continue; | 
 |  | 
 |             // Convert the IP address to a string. | 
 |             if (ifaddr->ifa_family == AF_INET) { | 
 |                 struct in_addr *addr4 = (struct in_addr *) RTA_DATA(rta); | 
 |                 if (RTA_PAYLOAD(rta) < sizeof(*addr4)) { | 
 |                     SLOGE("Short IPv4 address (%zu bytes) in %s", | 
 |                           RTA_PAYLOAD(rta), msgtype); | 
 |                     continue; | 
 |                 } | 
 |                 inet_ntop(AF_INET, addr4, addrstr, sizeof(addrstr)); | 
 |             } else if (ifaddr->ifa_family == AF_INET6) { | 
 |                 struct in6_addr *addr6 = (struct in6_addr *) RTA_DATA(rta); | 
 |                 if (RTA_PAYLOAD(rta) < sizeof(*addr6)) { | 
 |                     SLOGE("Short IPv6 address (%zu bytes) in %s", | 
 |                           RTA_PAYLOAD(rta), msgtype); | 
 |                     continue; | 
 |                 } | 
 |                 inet_ntop(AF_INET6, addr6, addrstr, sizeof(addrstr)); | 
 |             } else { | 
 |                 SLOGE("Unknown address family %d\n", ifaddr->ifa_family); | 
 |                 continue; | 
 |             } | 
 |  | 
 |             // Find the interface name. | 
 |             if (!if_indextoname(ifaddr->ifa_index, ifname)) { | 
 |                 SLOGD("Unknown ifindex %d in %s", ifaddr->ifa_index, msgtype); | 
 |             } | 
 |  | 
 |         } else if (rta->rta_type == IFA_CACHEINFO) { | 
 |             // Address lifetime information. | 
 |             if (maybeLogDuplicateAttribute(cacheinfo, "IFA_CACHEINFO", msgtype)) | 
 |                 continue; | 
 |  | 
 |             if (RTA_PAYLOAD(rta) < sizeof(*cacheinfo)) { | 
 |                 SLOGE("Short IFA_CACHEINFO (%zu vs. %zu bytes) in %s", | 
 |                       RTA_PAYLOAD(rta), sizeof(cacheinfo), msgtype); | 
 |                 continue; | 
 |             } | 
 |  | 
 |             cacheinfo = (struct ifa_cacheinfo *) RTA_DATA(rta); | 
 |  | 
 |         } else if (rta->rta_type == IFA_FLAGS) { | 
 |             flags = *(uint32_t*)RTA_DATA(rta); | 
 |         } | 
 |     } | 
 |  | 
 |     if (addrstr[0] == '\0') { | 
 |         SLOGE("No IFA_ADDRESS in %s\n", msgtype); | 
 |         return false; | 
 |     } | 
 |  | 
 |     // Fill in netlink event information. | 
 |     mAction = (type == RTM_NEWADDR) ? Action::kAddressUpdated : | 
 |                                       Action::kAddressRemoved; | 
 |     mSubsystem = strdup("net"); | 
 |     asprintf(&mParams[0], "ADDRESS=%s/%d", addrstr, ifaddr->ifa_prefixlen); | 
 |     asprintf(&mParams[1], "INTERFACE=%s", ifname); | 
 |     asprintf(&mParams[2], "FLAGS=%u", flags); | 
 |     asprintf(&mParams[3], "SCOPE=%u", ifaddr->ifa_scope); | 
 |     asprintf(&mParams[4], "IFINDEX=%u", ifaddr->ifa_index); | 
 |  | 
 |     if (cacheinfo) { | 
 |         asprintf(&mParams[5], "PREFERRED=%u", cacheinfo->ifa_prefered); | 
 |         asprintf(&mParams[6], "VALID=%u", cacheinfo->ifa_valid); | 
 |         asprintf(&mParams[7], "CSTAMP=%u", cacheinfo->cstamp); | 
 |         asprintf(&mParams[8], "TSTAMP=%u", cacheinfo->tstamp); | 
 |     } | 
 |  | 
 |     return true; | 
 | } | 
 |  | 
 | /* | 
 |  * Parse a QLOG_NL_EVENT message. | 
 |  */ | 
 | bool NetlinkEvent::parseUlogPacketMessage(const struct nlmsghdr *nh) { | 
 |     const char* alert; | 
 |     const char* devname; | 
 |  | 
 |     if (isKernel64Bit()) { | 
 |         ulog_packet_msg64_t* pm64 = (ulog_packet_msg64_t*)NLMSG_DATA(nh); | 
 |         if (!checkRtNetlinkLength(nh, sizeof(*pm64))) return false; | 
 |         alert = pm64->prefix; | 
 |         devname = pm64->indev_name[0] ? pm64->indev_name : pm64->outdev_name; | 
 |     } else { | 
 |         ulog_packet_msg32_t* pm32 = (ulog_packet_msg32_t*)NLMSG_DATA(nh); | 
 |         if (!checkRtNetlinkLength(nh, sizeof(*pm32))) return false; | 
 |         alert = pm32->prefix; | 
 |         devname = pm32->indev_name[0] ? pm32->indev_name : pm32->outdev_name; | 
 |     } | 
 |  | 
 |     asprintf(&mParams[0], "ALERT_NAME=%s", alert); | 
 |     asprintf(&mParams[1], "INTERFACE=%s", devname); | 
 |     mSubsystem = strdup("qlog"); | 
 |     mAction = Action::kChange; | 
 |     return true; | 
 | } | 
 |  | 
 | static size_t nlAttrLen(const nlattr* nla) { | 
 |     return nla->nla_len - NLA_HDRLEN; | 
 | } | 
 |  | 
 | static const uint8_t* nlAttrData(const nlattr* nla) { | 
 |     return reinterpret_cast<const uint8_t*>(nla) + NLA_HDRLEN; | 
 | } | 
 |  | 
 | static uint32_t nlAttrU32(const nlattr* nla) { | 
 |     return *reinterpret_cast<const uint32_t*>(nlAttrData(nla)); | 
 | } | 
 |  | 
 | /* | 
 |  * Parse a LOCAL_NFLOG_PACKET message. | 
 |  */ | 
 | bool NetlinkEvent::parseNfPacketMessage(struct nlmsghdr *nh) { | 
 |     int uid = -1; | 
 |     int len = 0; | 
 |     char* raw = nullptr; | 
 |  | 
 |     struct nlattr* uid_attr = findNlAttr(nh, sizeof(struct genlmsghdr), NFULA_UID); | 
 |     if (uid_attr) { | 
 |         uid = ntohl(nlAttrU32(uid_attr)); | 
 |     } | 
 |  | 
 |     struct nlattr* payload = findNlAttr(nh, sizeof(struct genlmsghdr), NFULA_PAYLOAD); | 
 |     if (payload) { | 
 |         /* First 256 bytes is plenty */ | 
 |         len = nlAttrLen(payload); | 
 |         if (len > 256) len = 256; | 
 |         raw = (char*)nlAttrData(payload); | 
 |     } | 
 |  | 
 |     size_t hexSize = 5 + (len * 2); | 
 |     char* hex = (char*)calloc(1, hexSize); | 
 |     strlcpy(hex, "HEX=", hexSize); | 
 |     for (int i = 0; i < len; i++) { | 
 |         hex[4 + (i * 2)] = "0123456789abcdef"[(raw[i] >> 4) & 0xf]; | 
 |         hex[5 + (i * 2)] = "0123456789abcdef"[raw[i] & 0xf]; | 
 |     } | 
 |  | 
 |     asprintf(&mParams[0], "UID=%d", uid); | 
 |     mParams[1] = hex; | 
 |     mSubsystem = strdup("strict"); | 
 |     mAction = Action::kChange; | 
 |     return true; | 
 | } | 
 |  | 
 | /* | 
 |  * Parse a RTM_NEWROUTE or RTM_DELROUTE message. | 
 |  */ | 
 | bool NetlinkEvent::parseRtMessage(const struct nlmsghdr *nh) { | 
 |     uint8_t type = nh->nlmsg_type; | 
 |     const char *msgname = rtMessageName(type); | 
 |  | 
 |     if (type != RTM_NEWROUTE && type != RTM_DELROUTE) { | 
 |         SLOGE("%s: incorrect message type %d (%s)\n", __func__, type, msgname); | 
 |         return false; | 
 |     } | 
 |  | 
 |     struct rtmsg *rtm = (struct rtmsg *) NLMSG_DATA(nh); | 
 |     if (!checkRtNetlinkLength(nh, sizeof(*rtm))) | 
 |         return false; | 
 |  | 
 |     if (// Ignore static routes we've set up ourselves. | 
 |         (rtm->rtm_protocol != RTPROT_KERNEL && | 
 |          rtm->rtm_protocol != RTPROT_RA) || | 
 |         // We're only interested in global unicast routes. | 
 |         (rtm->rtm_scope != RT_SCOPE_UNIVERSE) || | 
 |         (rtm->rtm_type != RTN_UNICAST) || | 
 |         // We don't support source routing. | 
 |         (rtm->rtm_src_len != 0) || | 
 |         // Cloned routes aren't real routes. | 
 |         (rtm->rtm_flags & RTM_F_CLONED)) { | 
 |         return false; | 
 |     } | 
 |  | 
 |     int family = rtm->rtm_family; | 
 |     int prefixLength = rtm->rtm_dst_len; | 
 |  | 
 |     // Currently we only support: destination, (one) next hop, ifindex. | 
 |     char dst[INET6_ADDRSTRLEN] = ""; | 
 |     char gw[INET6_ADDRSTRLEN] = ""; | 
 |     char dev[IFNAMSIZ] = ""; | 
 |  | 
 |     size_t len = RTM_PAYLOAD(nh); | 
 |     struct rtattr *rta; | 
 |     for (rta = RTM_RTA(rtm); RTA_OK(rta, len); rta = RTA_NEXT(rta, len)) { | 
 |         switch (rta->rta_type) { | 
 |             case RTA_DST: | 
 |                 if (maybeLogDuplicateAttribute(*dst, "RTA_DST", msgname)) | 
 |                     continue; | 
 |                 if (!inet_ntop(family, RTA_DATA(rta), dst, sizeof(dst))) | 
 |                     return false; | 
 |                 continue; | 
 |             case RTA_GATEWAY: | 
 |                 if (maybeLogDuplicateAttribute(*gw, "RTA_GATEWAY", msgname)) | 
 |                     continue; | 
 |                 if (!inet_ntop(family, RTA_DATA(rta), gw, sizeof(gw))) | 
 |                     return false; | 
 |                 continue; | 
 |             case RTA_OIF: | 
 |                 if (maybeLogDuplicateAttribute(*dev, "RTA_OIF", msgname)) | 
 |                     continue; | 
 |                 if (!if_indextoname(* (int *) RTA_DATA(rta), dev)) | 
 |                     return false; | 
 |                 continue; | 
 |             default: | 
 |                 continue; | 
 |         } | 
 |     } | 
 |  | 
 |    // If there's no RTA_DST attribute, then: | 
 |    // - If the prefix length is zero, it's the default route. | 
 |    // - If the prefix length is nonzero, there's something we don't understand. | 
 |    //   Ignore the event. | 
 |    if (!*dst && !prefixLength) { | 
 |         if (family == AF_INET) { | 
 |             strncpy(dst, "0.0.0.0", sizeof(dst)); | 
 |         } else if (family == AF_INET6) { | 
 |             strncpy(dst, "::", sizeof(dst)); | 
 |         } | 
 |     } | 
 |  | 
 |     // A useful route must have a destination and at least either a gateway or | 
 |     // an interface. | 
 |     if (!*dst || (!*gw && !*dev)) | 
 |         return false; | 
 |  | 
 |     // Fill in netlink event information. | 
 |     mAction = (type == RTM_NEWROUTE) ? Action::kRouteUpdated : | 
 |                                        Action::kRouteRemoved; | 
 |     mSubsystem = strdup("net"); | 
 |     asprintf(&mParams[0], "ROUTE=%s/%d", dst, prefixLength); | 
 |     asprintf(&mParams[1], "GATEWAY=%s", (*gw) ? gw : ""); | 
 |     asprintf(&mParams[2], "INTERFACE=%s", (*dev) ? dev : ""); | 
 |  | 
 |     return true; | 
 | } | 
 |  | 
 | /* | 
 |  * Parse a RTM_NEWNDUSEROPT message. | 
 |  */ | 
 | bool NetlinkEvent::parseNdUserOptMessage(const struct nlmsghdr *nh) { | 
 |     struct nduseroptmsg *msg = (struct nduseroptmsg *) NLMSG_DATA(nh); | 
 |     if (!checkRtNetlinkLength(nh, sizeof(*msg))) | 
 |         return false; | 
 |  | 
 |     // Check the length is valid. | 
 |     int len = NLMSG_PAYLOAD(nh, sizeof(*msg)); | 
 |     if (msg->nduseropt_opts_len > len) { | 
 |         SLOGE("RTM_NEWNDUSEROPT invalid length %d > %d\n", | 
 |               msg->nduseropt_opts_len, len); | 
 |         return false; | 
 |     } | 
 |     len = msg->nduseropt_opts_len; | 
 |  | 
 |     // Check address family and packet type. | 
 |     if (msg->nduseropt_family != AF_INET6) { | 
 |         SLOGE("RTM_NEWNDUSEROPT message for unknown family %d\n", | 
 |               msg->nduseropt_family); | 
 |         return false; | 
 |     } | 
 |  | 
 |     if (msg->nduseropt_icmp_type != ND_ROUTER_ADVERT || | 
 |         msg->nduseropt_icmp_code != 0) { | 
 |         SLOGE("RTM_NEWNDUSEROPT message for unknown ICMPv6 type/code %d/%d\n", | 
 |               msg->nduseropt_icmp_type, msg->nduseropt_icmp_code); | 
 |         return false; | 
 |     } | 
 |  | 
 |     // Find the interface name. | 
 |     char ifname[IFNAMSIZ]; | 
 |     if (!if_indextoname(msg->nduseropt_ifindex, ifname)) { | 
 |         SLOGE("RTM_NEWNDUSEROPT on unknown ifindex %d\n", | 
 |               msg->nduseropt_ifindex); | 
 |         return false; | 
 |     } | 
 |  | 
 |     // The kernel sends a separate netlink message for each ND option in the RA. | 
 |     // So only parse the first ND option in the message. | 
 |     struct nd_opt_hdr *opthdr = (struct nd_opt_hdr *) (msg + 1); | 
 |  | 
 |     // The length is in multiples of 8 octets. | 
 |     uint16_t optlen = opthdr->nd_opt_len; | 
 |     if (optlen * 8 > len) { | 
 |         SLOGE("Invalid option length %d > %d for ND option %d\n", | 
 |               optlen * 8, len, opthdr->nd_opt_type); | 
 |         return false; | 
 |     } | 
 |  | 
 |     if (opthdr->nd_opt_type == ND_OPT_RDNSS) { | 
 |         // DNS Servers (RFC 6106). | 
 |         // Each address takes up 2*8 octets, and the header takes up 8 octets. | 
 |         // So for a valid option with one or more addresses, optlen must be | 
 |         // odd and greater than 1. | 
 |         if ((optlen < 3) || !(optlen & 0x1)) { | 
 |             SLOGE("Invalid optlen %d for RDNSS option\n", optlen); | 
 |             return false; | 
 |         } | 
 |         const int numaddrs = (optlen - 1) / 2; | 
 |  | 
 |         // Find the lifetime. | 
 |         struct nd_opt_rdnss *rndss_opt = (struct nd_opt_rdnss *) opthdr; | 
 |         const uint32_t lifetime = ntohl(rndss_opt->nd_opt_rdnss_lifetime); | 
 |  | 
 |         // Construct a comma-separated string of DNS addresses. | 
 |         // Reserve sufficient space for an IPv6 link-local address: all but the | 
 |         // last address are followed by ','; the last is followed by '\0'. | 
 |         static const size_t kMaxSingleAddressLength = | 
 |                 INET6_ADDRSTRLEN + strlen("%") + IFNAMSIZ + strlen(","); | 
 |         const size_t bufsize = numaddrs * kMaxSingleAddressLength; | 
 |         char *buf = (char *) malloc(bufsize); | 
 |         if (!buf) { | 
 |             SLOGE("RDNSS option: out of memory\n"); | 
 |             return false; | 
 |         } | 
 |  | 
 |         struct in6_addr *addrs = (struct in6_addr *) (rndss_opt + 1); | 
 |         size_t pos = 0; | 
 |         for (int i = 0; i < numaddrs; i++) { | 
 |             if (i > 0) { | 
 |                 buf[pos++] = ','; | 
 |             } | 
 |             inet_ntop(AF_INET6, addrs + i, buf + pos, bufsize - pos); | 
 |             pos += strlen(buf + pos); | 
 |             if (IN6_IS_ADDR_LINKLOCAL(addrs + i)) { | 
 |                 buf[pos++] = '%'; | 
 |                 pos += strlcpy(buf + pos, ifname, bufsize - pos); | 
 |             } | 
 |         } | 
 |         buf[pos] = '\0'; | 
 |  | 
 |         mAction = Action::kRdnss; | 
 |         mSubsystem = strdup("net"); | 
 |         asprintf(&mParams[0], "INTERFACE=%s", ifname); | 
 |         asprintf(&mParams[1], "LIFETIME=%u", lifetime); | 
 |         asprintf(&mParams[2], "SERVERS=%s", buf); | 
 |         free(buf); | 
 |     } else if (opthdr->nd_opt_type == ND_OPT_DNSSL) { | 
 |         // TODO: support DNSSL. | 
 |     } else if (opthdr->nd_opt_type == ND_OPT_CAPTIVE_PORTAL) { | 
 |         // TODO: support CAPTIVE PORTAL. | 
 |     } else if (opthdr->nd_opt_type == ND_OPT_PREF64) { | 
 |         // TODO: support PREF64. | 
 |     } else { | 
 |         SLOGD("Unknown ND option type %d\n", opthdr->nd_opt_type); | 
 |         return false; | 
 |     } | 
 |  | 
 |     return true; | 
 | } | 
 |  | 
 | /* | 
 |  * Parse a binary message from a NETLINK_ROUTE netlink socket. | 
 |  * | 
 |  * Note that this function can only parse one message, because the message's | 
 |  * content has to be stored in the class's member variables (mAction, | 
 |  * mSubsystem, etc.). Invalid or unrecognized messages are skipped, but if | 
 |  * there are multiple valid messages in the buffer, only the first one will be | 
 |  * returned. | 
 |  * | 
 |  * TODO: consider only ever looking at the first message. | 
 |  */ | 
 | bool NetlinkEvent::parseBinaryNetlinkMessage(char *buffer, int size) { | 
 |     struct nlmsghdr *nh; | 
 |  | 
 |     for (nh = (struct nlmsghdr *) buffer; | 
 |          NLMSG_OK(nh, (unsigned) size) && (nh->nlmsg_type != NLMSG_DONE); | 
 |          nh = NLMSG_NEXT(nh, size)) { | 
 |  | 
 |         if (!rtMessageName(nh->nlmsg_type)) { | 
 |             SLOGD("Unexpected netlink message type %d\n", nh->nlmsg_type); | 
 |             continue; | 
 |         } | 
 |  | 
 |         if (nh->nlmsg_type == RTM_NEWLINK) { | 
 |             if (parseIfInfoMessage(nh)) | 
 |                 return true; | 
 |  | 
 |         } else if (nh->nlmsg_type == LOCAL_QLOG_NL_EVENT) { | 
 |             if (parseUlogPacketMessage(nh)) | 
 |                 return true; | 
 |  | 
 |         } else if (nh->nlmsg_type == RTM_NEWADDR || | 
 |                    nh->nlmsg_type == RTM_DELADDR) { | 
 |             if (parseIfAddrMessage(nh)) | 
 |                 return true; | 
 |  | 
 |         } else if (nh->nlmsg_type == RTM_NEWROUTE || | 
 |                    nh->nlmsg_type == RTM_DELROUTE) { | 
 |             if (parseRtMessage(nh)) | 
 |                 return true; | 
 |  | 
 |         } else if (nh->nlmsg_type == RTM_NEWNDUSEROPT) { | 
 |             if (parseNdUserOptMessage(nh)) | 
 |                 return true; | 
 |  | 
 |         } else if (nh->nlmsg_type == LOCAL_NFLOG_PACKET) { | 
 |             if (parseNfPacketMessage(nh)) | 
 |                 return true; | 
 |  | 
 |         } | 
 |     } | 
 |  | 
 |     return false; | 
 | } | 
 |  | 
 | /* If the string between 'str' and 'end' begins with 'prefixlen' characters | 
 |  * from the 'prefix' array, then return 'str + prefixlen', otherwise return | 
 |  * NULL. | 
 |  */ | 
 | static const char* | 
 | has_prefix(const char* str, const char* end, const char* prefix, size_t prefixlen) | 
 | { | 
 |     if ((end - str) >= (ptrdiff_t)prefixlen && | 
 |         (prefixlen == 0 || !memcmp(str, prefix, prefixlen))) { | 
 |         return str + prefixlen; | 
 |     } else { | 
 |         return nullptr; | 
 |     } | 
 | } | 
 |  | 
 | /* Same as strlen(x) for constant string literals ONLY */ | 
 | #define CONST_STRLEN(x)  (sizeof(x)-1) | 
 |  | 
 | /* Convenience macro to call has_prefix with a constant string literal  */ | 
 | #define HAS_CONST_PREFIX(str,end,prefix)  has_prefix((str),(end),prefix,CONST_STRLEN(prefix)) | 
 |  | 
 |  | 
 | /* | 
 |  * Parse an ASCII-formatted message from a NETLINK_KOBJECT_UEVENT | 
 |  * netlink socket. | 
 |  */ | 
 | bool NetlinkEvent::parseAsciiNetlinkMessage(char *buffer, int size) { | 
 |     const char *s = buffer; | 
 |     const char *end; | 
 |     int param_idx = 0; | 
 |     int first = 1; | 
 |  | 
 |     if (size == 0) | 
 |         return false; | 
 |  | 
 |     /* Ensure the buffer is zero-terminated, the code below depends on this */ | 
 |     buffer[size-1] = '\0'; | 
 |  | 
 |     end = s + size; | 
 |     while (s < end) { | 
 |         if (first) { | 
 |             const char *p; | 
 |             /* buffer is 0-terminated, no need to check p < end */ | 
 |             for (p = s; *p != '@'; p++) { | 
 |                 if (!*p) { /* no '@', should not happen */ | 
 |                     return false; | 
 |                 } | 
 |             } | 
 |             mPath = strdup(p+1); | 
 |             first = 0; | 
 |         } else { | 
 |             const char* a; | 
 |             if ((a = HAS_CONST_PREFIX(s, end, "ACTION=")) != nullptr) { | 
 |                 if (!strcmp(a, "add")) | 
 |                     mAction = Action::kAdd; | 
 |                 else if (!strcmp(a, "remove")) | 
 |                     mAction = Action::kRemove; | 
 |                 else if (!strcmp(a, "change")) | 
 |                     mAction = Action::kChange; | 
 |             } else if ((a = HAS_CONST_PREFIX(s, end, "SEQNUM=")) != nullptr) { | 
 |                 if (!ParseInt(a, &mSeq)) { | 
 |                     SLOGE("NetlinkEvent::parseAsciiNetlinkMessage: failed to parse SEQNUM=%s", a); | 
 |                 } | 
 |             } else if ((a = HAS_CONST_PREFIX(s, end, "SUBSYSTEM=")) != nullptr) { | 
 |                 mSubsystem = strdup(a); | 
 |             } else if (param_idx < NL_PARAMS_MAX) { | 
 |                 mParams[param_idx++] = strdup(s); | 
 |             } | 
 |         } | 
 |         s += strlen(s) + 1; | 
 |     } | 
 |     return true; | 
 | } | 
 |  | 
 | bool NetlinkEvent::decode(char *buffer, int size, int format) { | 
 |     if (format == NetlinkListener::NETLINK_FORMAT_BINARY | 
 |             || format == NetlinkListener::NETLINK_FORMAT_BINARY_UNICAST) { | 
 |         return parseBinaryNetlinkMessage(buffer, size); | 
 |     } else { | 
 |         return parseAsciiNetlinkMessage(buffer, size); | 
 |     } | 
 | } | 
 |  | 
 | const char *NetlinkEvent::findParam(const char *paramName) { | 
 |     size_t len = strlen(paramName); | 
 |     for (int i = 0; i < NL_PARAMS_MAX && mParams[i] != nullptr; ++i) { | 
 |         const char *ptr = mParams[i] + len; | 
 |         if (!strncmp(mParams[i], paramName, len) && *ptr == '=') | 
 |             return ++ptr; | 
 |     } | 
 |  | 
 |     SLOGE("NetlinkEvent::FindParam(): Parameter '%s' not found", paramName); | 
 |     return nullptr; | 
 | } | 
 |  | 
 | nlattr* NetlinkEvent::findNlAttr(const nlmsghdr* nh, size_t hdrlen, uint16_t attr) { | 
 |     if (nh == nullptr || NLMSG_HDRLEN + NLMSG_ALIGN(hdrlen) > SSIZE_MAX) { | 
 |         return nullptr; | 
 |     } | 
 |  | 
 |     // Skip header, padding, and family header. | 
 |     const ssize_t NLA_START = NLMSG_HDRLEN + NLMSG_ALIGN(hdrlen); | 
 |     ssize_t left = nh->nlmsg_len - NLA_START; | 
 |     uint8_t* hdr = ((uint8_t*)nh) + NLA_START; | 
 |  | 
 |     while (left >= NLA_HDRLEN) { | 
 |         nlattr* nla = (nlattr*)hdr; | 
 |         if (nla->nla_type == attr) { | 
 |             return nla; | 
 |         } | 
 |  | 
 |         hdr += NLA_ALIGN(nla->nla_len); | 
 |         left -= NLA_ALIGN(nla->nla_len); | 
 |     } | 
 |  | 
 |     return nullptr; | 
 | } |