blob: ef30017430ef9e1281f1952409c201bdcd18b325 [file] [log] [blame]
San Mehat168415b2009-05-06 11:14:21 -07001/*
2 * Copyright (C) 2008 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16#include <stdlib.h>
San Mehat3d407292009-05-07 08:49:30 -070017#include <string.h>
San Mehat168415b2009-05-06 11:14:21 -070018
19#define LOG_TAG "NetlinkEvent"
20#include <cutils/log.h>
21
22#include <sysutils/NetlinkEvent.h>
23
Mike J. Chenec16b9d2011-06-23 14:55:28 -070024#include <sys/types.h>
25#include <sys/socket.h>
Lorenzo Colitti381f70f2013-08-02 05:58:37 +090026#include <netinet/in.h>
Lorenzo Colittic7eec832013-08-12 17:03:32 +090027#include <netinet/icmp6.h>
Lorenzo Colitti381f70f2013-08-02 05:58:37 +090028#include <arpa/inet.h>
29#include <net/if.h>
30
Mike J. Chenec16b9d2011-06-23 14:55:28 -070031#include <linux/if.h>
Lorenzo Colitti9b342932014-06-19 13:16:04 +090032#include <linux/if_addr.h>
33#include <linux/if_link.h>
JP Abgralle6f80142011-07-14 16:46:32 -070034#include <linux/netfilter/nfnetlink.h>
Jeff Sharkey9a20e672014-10-30 14:51:59 -070035#include <linux/netfilter/nfnetlink_log.h>
JP Abgralle6f80142011-07-14 16:46:32 -070036#include <linux/netfilter_ipv4/ipt_ULOG.h>
Jeff Sharkey9a20e672014-10-30 14:51:59 -070037
JP Abgralle6f80142011-07-14 16:46:32 -070038/* From kernel's net/netfilter/xt_quota2.c */
Jeff Sharkey9a20e672014-10-30 14:51:59 -070039const int LOCAL_QLOG_NL_EVENT = 112;
40const int LOCAL_NFLOG_PACKET = NFNL_SUBSYS_ULOG << 8 | NFULNL_MSG_PACKET;
JP Abgralle6f80142011-07-14 16:46:32 -070041
42#include <linux/netlink.h>
43#include <linux/rtnetlink.h>
Mike J. Chenec16b9d2011-06-23 14:55:28 -070044
Jeff Sharkey9a20e672014-10-30 14:51:59 -070045#include <netlink/attr.h>
46#include <netlink/genl/genl.h>
47#include <netlink/handlers.h>
48#include <netlink/msg.h>
49
San Mehat168415b2009-05-06 11:14:21 -070050NetlinkEvent::NetlinkEvent() {
Jeff Sharkeye4f39402015-03-13 13:27:33 -070051 mAction = Action::kUnknown;
San Mehatebfe3db2009-10-10 17:35:13 -070052 memset(mParams, 0, sizeof(mParams));
53 mPath = NULL;
54 mSubsystem = NULL;
San Mehat168415b2009-05-06 11:14:21 -070055}
56
57NetlinkEvent::~NetlinkEvent() {
58 int i;
59 if (mPath)
60 free(mPath);
61 if (mSubsystem)
62 free(mSubsystem);
63 for (i = 0; i < NL_PARAMS_MAX; i++) {
64 if (!mParams[i])
65 break;
66 free(mParams[i]);
67 }
68}
69
San Mehatd6744132009-12-24 07:17:09 -080070void NetlinkEvent::dump() {
71 int i;
72
73 for (i = 0; i < NL_PARAMS_MAX; i++) {
74 if (!mParams[i])
75 break;
San Mehat7e8529a2010-03-25 09:31:42 -070076 SLOGD("NL param '%s'\n", mParams[i]);
San Mehatd6744132009-12-24 07:17:09 -080077 }
78}
79
Mike J. Chenec16b9d2011-06-23 14:55:28 -070080/*
Lorenzo Colitti9b342932014-06-19 13:16:04 +090081 * Returns the message name for a message in the NETLINK_ROUTE family, or NULL
82 * if parsing that message is not supported.
83 */
84static const char *rtMessageName(int type) {
85#define NL_EVENT_RTM_NAME(rtm) case rtm: return #rtm;
86 switch (type) {
87 NL_EVENT_RTM_NAME(RTM_NEWLINK);
88 NL_EVENT_RTM_NAME(RTM_DELLINK);
89 NL_EVENT_RTM_NAME(RTM_NEWADDR);
90 NL_EVENT_RTM_NAME(RTM_DELADDR);
91 NL_EVENT_RTM_NAME(RTM_NEWROUTE);
92 NL_EVENT_RTM_NAME(RTM_DELROUTE);
93 NL_EVENT_RTM_NAME(RTM_NEWNDUSEROPT);
Jeff Sharkey9a20e672014-10-30 14:51:59 -070094 NL_EVENT_RTM_NAME(LOCAL_QLOG_NL_EVENT);
95 NL_EVENT_RTM_NAME(LOCAL_NFLOG_PACKET);
Lorenzo Colitti9b342932014-06-19 13:16:04 +090096 default:
97 return NULL;
98 }
99#undef NL_EVENT_RTM_NAME
100}
101
102/*
103 * Checks that a binary NETLINK_ROUTE message is long enough for a payload of
104 * size bytes.
105 */
106static bool checkRtNetlinkLength(const struct nlmsghdr *nh, size_t size) {
107 if (nh->nlmsg_len < NLMSG_LENGTH(size)) {
108 SLOGE("Got a short %s message\n", rtMessageName(nh->nlmsg_type));
109 return false;
110 }
111 return true;
112}
113
114/*
115 * Utility function to log errors.
116 */
117static bool maybeLogDuplicateAttribute(bool isDup,
118 const char *attributeName,
119 const char *messageName) {
120 if (isDup) {
121 SLOGE("Multiple %s attributes in %s, ignoring\n", attributeName, messageName);
122 return true;
123 }
124 return false;
125}
126
127/*
128 * Parse a RTM_NEWLINK message.
129 */
130bool NetlinkEvent::parseIfInfoMessage(const struct nlmsghdr *nh) {
131 struct ifinfomsg *ifi = (struct ifinfomsg *) NLMSG_DATA(nh);
132 if (!checkRtNetlinkLength(nh, sizeof(*ifi)))
133 return false;
134
135 if ((ifi->ifi_flags & IFF_LOOPBACK) != 0) {
136 return false;
137 }
138
139 int len = IFLA_PAYLOAD(nh);
140 struct rtattr *rta;
141 for (rta = IFLA_RTA(ifi); RTA_OK(rta, len); rta = RTA_NEXT(rta, len)) {
142 switch(rta->rta_type) {
143 case IFLA_IFNAME:
144 asprintf(&mParams[0], "INTERFACE=%s", (char *) RTA_DATA(rta));
Jeff Sharkeye4f39402015-03-13 13:27:33 -0700145 mAction = (ifi->ifi_flags & IFF_LOWER_UP) ? Action::kLinkUp :
146 Action::kLinkDown;
Lorenzo Colitti9b342932014-06-19 13:16:04 +0900147 mSubsystem = strdup("net");
148 return true;
149 }
150 }
151
152 return false;
153}
154
155/*
Lorenzo Colittic7eec832013-08-12 17:03:32 +0900156 * Parse a RTM_NEWADDR or RTM_DELADDR message.
Lorenzo Colitti381f70f2013-08-02 05:58:37 +0900157 */
Lorenzo Colitti9b342932014-06-19 13:16:04 +0900158bool NetlinkEvent::parseIfAddrMessage(const struct nlmsghdr *nh) {
159 struct ifaddrmsg *ifaddr = (struct ifaddrmsg *) NLMSG_DATA(nh);
Lorenzo Colitti381f70f2013-08-02 05:58:37 +0900160 struct ifa_cacheinfo *cacheinfo = NULL;
161 char addrstr[INET6_ADDRSTRLEN] = "";
Lorenzo Colitti9b342932014-06-19 13:16:04 +0900162 char ifname[IFNAMSIZ];
163
164 if (!checkRtNetlinkLength(nh, sizeof(*ifaddr)))
165 return false;
Lorenzo Colitti381f70f2013-08-02 05:58:37 +0900166
167 // Sanity check.
Lorenzo Colitti9b342932014-06-19 13:16:04 +0900168 int type = nh->nlmsg_type;
Lorenzo Colitti381f70f2013-08-02 05:58:37 +0900169 if (type != RTM_NEWADDR && type != RTM_DELADDR) {
170 SLOGE("parseIfAddrMessage on incorrect message type 0x%x\n", type);
171 return false;
172 }
173
174 // For log messages.
Lorenzo Colitti9b342932014-06-19 13:16:04 +0900175 const char *msgtype = rtMessageName(type);
Lorenzo Colitti381f70f2013-08-02 05:58:37 +0900176
Lorenzo Colitti9b342932014-06-19 13:16:04 +0900177 struct rtattr *rta;
178 int len = IFA_PAYLOAD(nh);
179 for (rta = IFA_RTA(ifaddr); RTA_OK(rta, len); rta = RTA_NEXT(rta, len)) {
Lorenzo Colitti381f70f2013-08-02 05:58:37 +0900180 if (rta->rta_type == IFA_ADDRESS) {
181 // Only look at the first address, because we only support notifying
182 // one change at a time.
Lorenzo Colitti9b342932014-06-19 13:16:04 +0900183 if (maybeLogDuplicateAttribute(*addrstr != '\0', "IFA_ADDRESS", msgtype))
Lorenzo Colitti381f70f2013-08-02 05:58:37 +0900184 continue;
Lorenzo Colitti381f70f2013-08-02 05:58:37 +0900185
186 // Convert the IP address to a string.
187 if (ifaddr->ifa_family == AF_INET) {
188 struct in_addr *addr4 = (struct in_addr *) RTA_DATA(rta);
189 if (RTA_PAYLOAD(rta) < sizeof(*addr4)) {
Mark Salyzyn80f63d42014-05-01 07:47:04 -0700190 SLOGE("Short IPv4 address (%zu bytes) in %s",
Lorenzo Colitti381f70f2013-08-02 05:58:37 +0900191 RTA_PAYLOAD(rta), msgtype);
192 continue;
193 }
194 inet_ntop(AF_INET, addr4, addrstr, sizeof(addrstr));
195 } else if (ifaddr->ifa_family == AF_INET6) {
196 struct in6_addr *addr6 = (struct in6_addr *) RTA_DATA(rta);
197 if (RTA_PAYLOAD(rta) < sizeof(*addr6)) {
Mark Salyzyn80f63d42014-05-01 07:47:04 -0700198 SLOGE("Short IPv6 address (%zu bytes) in %s",
Lorenzo Colitti381f70f2013-08-02 05:58:37 +0900199 RTA_PAYLOAD(rta), msgtype);
200 continue;
201 }
202 inet_ntop(AF_INET6, addr6, addrstr, sizeof(addrstr));
203 } else {
204 SLOGE("Unknown address family %d\n", ifaddr->ifa_family);
205 continue;
206 }
207
208 // Find the interface name.
Lorenzo Colitti381f70f2013-08-02 05:58:37 +0900209 if (!if_indextoname(ifaddr->ifa_index, ifname)) {
210 SLOGE("Unknown ifindex %d in %s", ifaddr->ifa_index, msgtype);
211 return false;
212 }
213
Lorenzo Colitti381f70f2013-08-02 05:58:37 +0900214 } else if (rta->rta_type == IFA_CACHEINFO) {
215 // Address lifetime information.
Lorenzo Colitti9b342932014-06-19 13:16:04 +0900216 if (maybeLogDuplicateAttribute(cacheinfo, "IFA_CACHEINFO", msgtype))
Lorenzo Colitti381f70f2013-08-02 05:58:37 +0900217 continue;
Lorenzo Colitti381f70f2013-08-02 05:58:37 +0900218
219 if (RTA_PAYLOAD(rta) < sizeof(*cacheinfo)) {
Mark Salyzyn80f63d42014-05-01 07:47:04 -0700220 SLOGE("Short IFA_CACHEINFO (%zu vs. %zu bytes) in %s",
Lorenzo Colitti381f70f2013-08-02 05:58:37 +0900221 RTA_PAYLOAD(rta), sizeof(cacheinfo), msgtype);
222 continue;
223 }
224
225 cacheinfo = (struct ifa_cacheinfo *) RTA_DATA(rta);
Lorenzo Colitti381f70f2013-08-02 05:58:37 +0900226 }
Lorenzo Colitti381f70f2013-08-02 05:58:37 +0900227 }
228
229 if (addrstr[0] == '\0') {
230 SLOGE("No IFA_ADDRESS in %s\n", msgtype);
231 return false;
232 }
233
Lorenzo Colitti9b342932014-06-19 13:16:04 +0900234 // Fill in netlink event information.
Jeff Sharkeye4f39402015-03-13 13:27:33 -0700235 mAction = (type == RTM_NEWADDR) ? Action::kAddressUpdated :
236 Action::kAddressRemoved;
Lorenzo Colitti9b342932014-06-19 13:16:04 +0900237 mSubsystem = strdup("net");
238 asprintf(&mParams[0], "ADDRESS=%s/%d", addrstr,
239 ifaddr->ifa_prefixlen);
240 asprintf(&mParams[1], "INTERFACE=%s", ifname);
241 asprintf(&mParams[2], "FLAGS=%u", ifaddr->ifa_flags);
242 asprintf(&mParams[3], "SCOPE=%u", ifaddr->ifa_scope);
243
244 if (cacheinfo) {
245 asprintf(&mParams[4], "PREFERRED=%u", cacheinfo->ifa_prefered);
246 asprintf(&mParams[5], "VALID=%u", cacheinfo->ifa_valid);
247 asprintf(&mParams[6], "CSTAMP=%u", cacheinfo->cstamp);
248 asprintf(&mParams[7], "TSTAMP=%u", cacheinfo->tstamp);
249 }
250
251 return true;
252}
253
254/*
255 * Parse a QLOG_NL_EVENT message.
256 */
257bool NetlinkEvent::parseUlogPacketMessage(const struct nlmsghdr *nh) {
258 const char *devname;
259 ulog_packet_msg_t *pm = (ulog_packet_msg_t *) NLMSG_DATA(nh);
260 if (!checkRtNetlinkLength(nh, sizeof(*pm)))
261 return false;
262
263 devname = pm->indev_name[0] ? pm->indev_name : pm->outdev_name;
264 asprintf(&mParams[0], "ALERT_NAME=%s", pm->prefix);
265 asprintf(&mParams[1], "INTERFACE=%s", devname);
266 mSubsystem = strdup("qlog");
Jeff Sharkeye4f39402015-03-13 13:27:33 -0700267 mAction = Action::kChange;
Lorenzo Colitti381f70f2013-08-02 05:58:37 +0900268 return true;
269}
270
271/*
Jeff Sharkey9a20e672014-10-30 14:51:59 -0700272 * Parse a LOCAL_NFLOG_PACKET message.
273 */
274bool NetlinkEvent::parseNfPacketMessage(struct nlmsghdr *nh) {
275 int uid = -1;
276 int len = 0;
277 char* raw = NULL;
278
279 struct nlattr *uid_attr = nlmsg_find_attr(nh, sizeof(struct genlmsghdr), NFULA_UID);
280 if (uid_attr) {
281 uid = ntohl(nla_get_u32(uid_attr));
282 }
283
284 struct nlattr *payload = nlmsg_find_attr(nh, sizeof(struct genlmsghdr), NFULA_PAYLOAD);
285 if (payload) {
286 /* First 256 bytes is plenty */
287 len = nla_len(payload);
288 if (len > 256) len = 256;
289 raw = (char*) nla_data(payload);
290 }
291
292 char* hex = (char*) calloc(1, 5 + (len * 2));
293 strcpy(hex, "HEX=");
294 for (int i = 0; i < len; i++) {
295 hex[4 + (i * 2)] = "0123456789abcdef"[(raw[i] >> 4) & 0xf];
296 hex[5 + (i * 2)] = "0123456789abcdef"[raw[i] & 0xf];
297 }
298
299 asprintf(&mParams[0], "UID=%d", uid);
300 mParams[1] = hex;
301 mSubsystem = strdup("strict");
Jeff Sharkeye4f39402015-03-13 13:27:33 -0700302 mAction = Action::kChange;
Jeff Sharkey9a20e672014-10-30 14:51:59 -0700303 return true;
304}
305
306/*
Lorenzo Colittid7ff7ea2014-06-11 17:37:12 +0900307 * Parse a RTM_NEWROUTE or RTM_DELROUTE message.
308 */
309bool NetlinkEvent::parseRtMessage(const struct nlmsghdr *nh) {
310 uint8_t type = nh->nlmsg_type;
311 const char *msgname = rtMessageName(type);
312
313 // Sanity check.
314 if (type != RTM_NEWROUTE && type != RTM_DELROUTE) {
315 SLOGE("%s: incorrect message type %d (%s)\n", __func__, type, msgname);
316 return false;
317 }
318
319 struct rtmsg *rtm = (struct rtmsg *) NLMSG_DATA(nh);
320 if (!checkRtNetlinkLength(nh, sizeof(*rtm)))
321 return false;
322
323 if (// Ignore static routes we've set up ourselves.
324 (rtm->rtm_protocol != RTPROT_KERNEL &&
325 rtm->rtm_protocol != RTPROT_RA) ||
326 // We're only interested in global unicast routes.
327 (rtm->rtm_scope != RT_SCOPE_UNIVERSE) ||
328 (rtm->rtm_type != RTN_UNICAST) ||
329 // We don't support source routing.
330 (rtm->rtm_src_len != 0) ||
331 // Cloned routes aren't real routes.
332 (rtm->rtm_flags & RTM_F_CLONED)) {
333 return false;
334 }
335
336 int family = rtm->rtm_family;
337 int prefixLength = rtm->rtm_dst_len;
338
339 // Currently we only support: destination, (one) next hop, ifindex.
340 char dst[INET6_ADDRSTRLEN] = "";
341 char gw[INET6_ADDRSTRLEN] = "";
342 char dev[IFNAMSIZ] = "";
343
344 size_t len = RTM_PAYLOAD(nh);
345 struct rtattr *rta;
346 for (rta = RTM_RTA(rtm); RTA_OK(rta, len); rta = RTA_NEXT(rta, len)) {
347 switch (rta->rta_type) {
348 case RTA_DST:
349 if (maybeLogDuplicateAttribute(*dst, "RTA_DST", msgname))
350 continue;
351 if (!inet_ntop(family, RTA_DATA(rta), dst, sizeof(dst)))
352 return false;
353 continue;
354 case RTA_GATEWAY:
355 if (maybeLogDuplicateAttribute(*gw, "RTA_GATEWAY", msgname))
356 continue;
357 if (!inet_ntop(family, RTA_DATA(rta), gw, sizeof(gw)))
358 return false;
359 continue;
360 case RTA_OIF:
361 if (maybeLogDuplicateAttribute(*dev, "RTA_OIF", msgname))
362 continue;
363 if (!if_indextoname(* (int *) RTA_DATA(rta), dev))
364 return false;
365 default:
366 continue;
367 }
368 }
369
370 // If there's no RTA_DST attribute, then:
371 // - If the prefix length is zero, it's the default route.
372 // - If the prefix length is nonzero, there's something we don't understand.
373 // Ignore the event.
374 if (!*dst && !prefixLength) {
375 if (family == AF_INET) {
376 strncpy(dst, "0.0.0.0", sizeof(dst));
377 } else if (family == AF_INET6) {
378 strncpy(dst, "::", sizeof(dst));
379 }
380 }
381
382 // A useful route must have a destination and at least either a gateway or
383 // an interface.
384 if (!*dst || (!*gw && !*dev))
385 return false;
386
387 // Fill in netlink event information.
Jeff Sharkeye4f39402015-03-13 13:27:33 -0700388 mAction = (type == RTM_NEWROUTE) ? Action::kRouteUpdated :
389 Action::kRouteRemoved;
Lorenzo Colittid7ff7ea2014-06-11 17:37:12 +0900390 mSubsystem = strdup("net");
391 asprintf(&mParams[0], "ROUTE=%s/%d", dst, prefixLength);
392 asprintf(&mParams[1], "GATEWAY=%s", (*gw) ? gw : "");
393 asprintf(&mParams[2], "INTERFACE=%s", (*dev) ? dev : "");
394
395 return true;
396}
397
398/*
Lorenzo Colittic7eec832013-08-12 17:03:32 +0900399 * Parse a RTM_NEWNDUSEROPT message.
400 */
Lorenzo Colitti9b342932014-06-19 13:16:04 +0900401bool NetlinkEvent::parseNdUserOptMessage(const struct nlmsghdr *nh) {
402 struct nduseroptmsg *msg = (struct nduseroptmsg *) NLMSG_DATA(nh);
403 if (!checkRtNetlinkLength(nh, sizeof(*msg)))
404 return false;
405
Lorenzo Colittic7eec832013-08-12 17:03:32 +0900406 // Check the length is valid.
Lorenzo Colitti9b342932014-06-19 13:16:04 +0900407 int len = NLMSG_PAYLOAD(nh, sizeof(*msg));
Lorenzo Colittic7eec832013-08-12 17:03:32 +0900408 if (msg->nduseropt_opts_len > len) {
409 SLOGE("RTM_NEWNDUSEROPT invalid length %d > %d\n",
410 msg->nduseropt_opts_len, len);
411 return false;
412 }
413 len = msg->nduseropt_opts_len;
414
415 // Check address family and packet type.
416 if (msg->nduseropt_family != AF_INET6) {
417 SLOGE("RTM_NEWNDUSEROPT message for unknown family %d\n",
418 msg->nduseropt_family);
419 return false;
420 }
421
422 if (msg->nduseropt_icmp_type != ND_ROUTER_ADVERT ||
423 msg->nduseropt_icmp_code != 0) {
424 SLOGE("RTM_NEWNDUSEROPT message for unknown ICMPv6 type/code %d/%d\n",
425 msg->nduseropt_icmp_type, msg->nduseropt_icmp_code);
426 return false;
427 }
428
429 // Find the interface name.
Lorenzo Colitti9b342932014-06-19 13:16:04 +0900430 char ifname[IFNAMSIZ];
Lorenzo Colittic7eec832013-08-12 17:03:32 +0900431 if (!if_indextoname(msg->nduseropt_ifindex, ifname)) {
432 SLOGE("RTM_NEWNDUSEROPT on unknown ifindex %d\n",
433 msg->nduseropt_ifindex);
434 return false;
435 }
436
437 // The kernel sends a separate netlink message for each ND option in the RA.
438 // So only parse the first ND option in the message.
439 struct nd_opt_hdr *opthdr = (struct nd_opt_hdr *) (msg + 1);
440
441 // The length is in multiples of 8 octets.
442 uint16_t optlen = opthdr->nd_opt_len;
443 if (optlen * 8 > len) {
444 SLOGE("Invalid option length %d > %d for ND option %d\n",
445 optlen * 8, len, opthdr->nd_opt_type);
446 return false;
447 }
448
449 if (opthdr->nd_opt_type == ND_OPT_RDNSS) {
450 // DNS Servers (RFC 6106).
451 // Each address takes up 2*8 octets, and the header takes up 8 octets.
452 // So for a valid option with one or more addresses, optlen must be
453 // odd and greater than 1.
454 if ((optlen < 3) || !(optlen & 0x1)) {
455 SLOGE("Invalid optlen %d for RDNSS option\n", optlen);
456 return false;
457 }
458 int numaddrs = (optlen - 1) / 2;
459
460 // Find the lifetime.
461 struct nd_opt_rdnss *rndss_opt = (struct nd_opt_rdnss *) opthdr;
462 uint32_t lifetime = ntohl(rndss_opt->nd_opt_rdnss_lifetime);
463
464 // Construct "SERVERS=<comma-separated string of DNS addresses>".
465 // Reserve (INET6_ADDRSTRLEN + 1) chars for each address: all but the
466 // the last address are followed by ','; the last is followed by '\0'.
467 static const char kServerTag[] = "SERVERS=";
468 static const int kTagLength = sizeof(kServerTag) - 1;
469 int bufsize = kTagLength + numaddrs * (INET6_ADDRSTRLEN + 1);
470 char *buf = (char *) malloc(bufsize);
471 if (!buf) {
472 SLOGE("RDNSS option: out of memory\n");
473 return false;
474 }
475 strcpy(buf, kServerTag);
476 int pos = kTagLength;
477
478 struct in6_addr *addrs = (struct in6_addr *) (rndss_opt + 1);
479 for (int i = 0; i < numaddrs; i++) {
480 if (i > 0) {
481 buf[pos++] = ',';
482 }
483 inet_ntop(AF_INET6, addrs + i, buf + pos, bufsize - pos);
484 pos += strlen(buf + pos);
485 }
486 buf[pos] = '\0';
487
Jeff Sharkeye4f39402015-03-13 13:27:33 -0700488 mAction = Action::kRdnss;
Lorenzo Colittic7eec832013-08-12 17:03:32 +0900489 mSubsystem = strdup("net");
490 asprintf(&mParams[0], "INTERFACE=%s", ifname);
491 asprintf(&mParams[1], "LIFETIME=%u", lifetime);
492 mParams[2] = buf;
493 } else {
494 SLOGD("Unknown ND option type %d\n", opthdr->nd_opt_type);
495 return false;
496 }
497
498 return true;
499}
500
501/*
502 * Parse a binary message from a NETLINK_ROUTE netlink socket.
Lorenzo Colitti9b342932014-06-19 13:16:04 +0900503 *
504 * Note that this function can only parse one message, because the message's
505 * content has to be stored in the class's member variables (mAction,
506 * mSubsystem, etc.). Invalid or unrecognized messages are skipped, but if
507 * there are multiple valid messages in the buffer, only the first one will be
508 * returned.
509 *
510 * TODO: consider only ever looking at the first message.
Mike J. Chenec16b9d2011-06-23 14:55:28 -0700511 */
512bool NetlinkEvent::parseBinaryNetlinkMessage(char *buffer, int size) {
Jeff Sharkey9a20e672014-10-30 14:51:59 -0700513 struct nlmsghdr *nh;
Mike J. Chenec16b9d2011-06-23 14:55:28 -0700514
Lorenzo Colitti96834562013-08-17 03:40:31 +0900515 for (nh = (struct nlmsghdr *) buffer;
Lorenzo Colittic7eec832013-08-12 17:03:32 +0900516 NLMSG_OK(nh, (unsigned) size) && (nh->nlmsg_type != NLMSG_DONE);
Lorenzo Colitti96834562013-08-17 03:40:31 +0900517 nh = NLMSG_NEXT(nh, size)) {
JP Abgralle6f80142011-07-14 16:46:32 -0700518
Lorenzo Colitti9b342932014-06-19 13:16:04 +0900519 if (!rtMessageName(nh->nlmsg_type)) {
520 SLOGD("Unexpected netlink message type %d\n", nh->nlmsg_type);
521 continue;
522 }
523
Mike J. Chenec16b9d2011-06-23 14:55:28 -0700524 if (nh->nlmsg_type == RTM_NEWLINK) {
Lorenzo Colitti9b342932014-06-19 13:16:04 +0900525 if (parseIfInfoMessage(nh))
526 return true;
JP Abgralle6f80142011-07-14 16:46:32 -0700527
Jeff Sharkey9a20e672014-10-30 14:51:59 -0700528 } else if (nh->nlmsg_type == LOCAL_QLOG_NL_EVENT) {
Lorenzo Colitti9b342932014-06-19 13:16:04 +0900529 if (parseUlogPacketMessage(nh))
530 return true;
JP Abgralle6f80142011-07-14 16:46:32 -0700531
Lorenzo Colitti381f70f2013-08-02 05:58:37 +0900532 } else if (nh->nlmsg_type == RTM_NEWADDR ||
533 nh->nlmsg_type == RTM_DELADDR) {
Lorenzo Colitti9b342932014-06-19 13:16:04 +0900534 if (parseIfAddrMessage(nh))
535 return true;
Lorenzo Colittic7eec832013-08-12 17:03:32 +0900536
Lorenzo Colittid7ff7ea2014-06-11 17:37:12 +0900537 } else if (nh->nlmsg_type == RTM_NEWROUTE ||
538 nh->nlmsg_type == RTM_DELROUTE) {
539 if (parseRtMessage(nh))
540 return true;
541
Lorenzo Colittic7eec832013-08-12 17:03:32 +0900542 } else if (nh->nlmsg_type == RTM_NEWNDUSEROPT) {
Lorenzo Colitti9b342932014-06-19 13:16:04 +0900543 if (parseNdUserOptMessage(nh))
544 return true;
Lorenzo Colittic7eec832013-08-12 17:03:32 +0900545
Jeff Sharkey9a20e672014-10-30 14:51:59 -0700546 } else if (nh->nlmsg_type == LOCAL_NFLOG_PACKET) {
547 if (parseNfPacketMessage(nh))
548 return true;
549
JP Abgralle6f80142011-07-14 16:46:32 -0700550 }
Mike J. Chenec16b9d2011-06-23 14:55:28 -0700551 }
552
Lorenzo Colitti9b342932014-06-19 13:16:04 +0900553 return false;
Mike J. Chenec16b9d2011-06-23 14:55:28 -0700554}
555
David 'Digit' Turner3311eea2011-01-17 01:59:22 +0100556/* If the string between 'str' and 'end' begins with 'prefixlen' characters
557 * from the 'prefix' array, then return 'str + prefixlen', otherwise return
558 * NULL.
559 */
560static const char*
561has_prefix(const char* str, const char* end, const char* prefix, size_t prefixlen)
562{
563 if ((end-str) >= (ptrdiff_t)prefixlen && !memcmp(str, prefix, prefixlen))
564 return str + prefixlen;
565 else
566 return NULL;
567}
568
569/* Same as strlen(x) for constant string literals ONLY */
570#define CONST_STRLEN(x) (sizeof(x)-1)
571
572/* Convenience macro to call has_prefix with a constant string literal */
573#define HAS_CONST_PREFIX(str,end,prefix) has_prefix((str),(end),prefix,CONST_STRLEN(prefix))
574
575
Mike J. Chenec16b9d2011-06-23 14:55:28 -0700576/*
577 * Parse an ASCII-formatted message from a NETLINK_KOBJECT_UEVENT
578 * netlink socket.
579 */
580bool NetlinkEvent::parseAsciiNetlinkMessage(char *buffer, int size) {
Mike J. Chen17260b12011-06-23 15:00:30 -0700581 const char *s = buffer;
582 const char *end;
San Mehat168415b2009-05-06 11:14:21 -0700583 int param_idx = 0;
San Mehat168415b2009-05-06 11:14:21 -0700584 int first = 1;
585
David 'Digit' Turner3311eea2011-01-17 01:59:22 +0100586 if (size == 0)
587 return false;
588
589 /* Ensure the buffer is zero-terminated, the code below depends on this */
590 buffer[size-1] = '\0';
591
San Mehat168415b2009-05-06 11:14:21 -0700592 end = s + size;
593 while (s < end) {
594 if (first) {
David 'Digit' Turner3311eea2011-01-17 01:59:22 +0100595 const char *p;
596 /* buffer is 0-terminated, no need to check p < end */
597 for (p = s; *p != '@'; p++) {
598 if (!*p) { /* no '@', should not happen */
599 return false;
600 }
601 }
602 mPath = strdup(p+1);
San Mehat168415b2009-05-06 11:14:21 -0700603 first = 0;
604 } else {
David 'Digit' Turner3311eea2011-01-17 01:59:22 +0100605 const char* a;
606 if ((a = HAS_CONST_PREFIX(s, end, "ACTION=")) != NULL) {
San Mehat168415b2009-05-06 11:14:21 -0700607 if (!strcmp(a, "add"))
Jeff Sharkeye4f39402015-03-13 13:27:33 -0700608 mAction = Action::kAdd;
San Mehat168415b2009-05-06 11:14:21 -0700609 else if (!strcmp(a, "remove"))
Jeff Sharkeye4f39402015-03-13 13:27:33 -0700610 mAction = Action::kRemove;
San Mehat168415b2009-05-06 11:14:21 -0700611 else if (!strcmp(a, "change"))
Jeff Sharkeye4f39402015-03-13 13:27:33 -0700612 mAction = Action::kChange;
David 'Digit' Turner3311eea2011-01-17 01:59:22 +0100613 } else if ((a = HAS_CONST_PREFIX(s, end, "SEQNUM=")) != NULL) {
614 mSeq = atoi(a);
615 } else if ((a = HAS_CONST_PREFIX(s, end, "SUBSYSTEM=")) != NULL) {
616 mSubsystem = strdup(a);
617 } else if (param_idx < NL_PARAMS_MAX) {
San Mehat168415b2009-05-06 11:14:21 -0700618 mParams[param_idx++] = strdup(s);
David 'Digit' Turner3311eea2011-01-17 01:59:22 +0100619 }
San Mehat168415b2009-05-06 11:14:21 -0700620 }
David 'Digit' Turner3311eea2011-01-17 01:59:22 +0100621 s += strlen(s) + 1;
San Mehat168415b2009-05-06 11:14:21 -0700622 }
623 return true;
624}
625
Mike J. Chenec16b9d2011-06-23 14:55:28 -0700626bool NetlinkEvent::decode(char *buffer, int size, int format) {
Jeff Sharkey9a20e672014-10-30 14:51:59 -0700627 if (format == NetlinkListener::NETLINK_FORMAT_BINARY
628 || format == NetlinkListener::NETLINK_FORMAT_BINARY_UNICAST) {
Mike J. Chen17260b12011-06-23 15:00:30 -0700629 return parseBinaryNetlinkMessage(buffer, size);
630 } else {
631 return parseAsciiNetlinkMessage(buffer, size);
632 }
Mike J. Chenec16b9d2011-06-23 14:55:28 -0700633}
634
San Mehat168415b2009-05-06 11:14:21 -0700635const char *NetlinkEvent::findParam(const char *paramName) {
Chih-Wei Huang80ec37a2010-07-14 14:00:41 +0800636 size_t len = strlen(paramName);
David 'Digit' Turner3311eea2011-01-17 01:59:22 +0100637 for (int i = 0; i < NL_PARAMS_MAX && mParams[i] != NULL; ++i) {
Chih-Wei Huang80ec37a2010-07-14 14:00:41 +0800638 const char *ptr = mParams[i] + len;
639 if (!strncmp(mParams[i], paramName, len) && *ptr == '=')
640 return ++ptr;
San Mehat168415b2009-05-06 11:14:21 -0700641 }
642
San Mehat7e8529a2010-03-25 09:31:42 -0700643 SLOGE("NetlinkEvent::FindParam(): Parameter '%s' not found", paramName);
San Mehat168415b2009-05-06 11:14:21 -0700644 return NULL;
645}