| // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| // Use of this source code is governed by a BSD-style license that can be |
| // found in the LICENSE file. |
| |
| #include "net/base/address_tracker_linux.h" |
| |
| #include <errno.h> |
| #include <linux/if.h> |
| #include <sys/ioctl.h> |
| |
| #include "base/bind_helpers.h" |
| #include "base/files/scoped_file.h" |
| #include "base/logging.h" |
| #include "base/message_loop/message_loop_current.h" |
| #include "base/optional.h" |
| #include "base/posix/eintr_wrapper.h" |
| #include "base/threading/scoped_blocking_call.h" |
| #include "base/threading/thread_restrictions.h" |
| #include "net/base/network_interfaces_linux.h" |
| #include "starboard/common/string.h" |
| #include "starboard/memory.h" |
| #include "starboard/types.h" |
| |
| namespace net { |
| namespace internal { |
| |
| namespace { |
| |
| // Some kernel functions such as wireless_send_event and rtnetlink_ifinfo_prep |
| // may send spurious messages over rtnetlink. RTM_NEWLINK messages where |
| // ifi_change == 0 and rta_type == IFLA_WIRELESS should be ignored. |
| bool IgnoreWirelessChange(const struct nlmsghdr* header, |
| const struct ifinfomsg* msg) { |
| size_t length = IFLA_PAYLOAD(header); |
| for (const struct rtattr* attr = IFLA_RTA(msg); RTA_OK(attr, length); |
| attr = RTA_NEXT(attr, length)) { |
| if (attr->rta_type == IFLA_WIRELESS && msg->ifi_change == 0) |
| return true; |
| } |
| return false; |
| } |
| |
| // Retrieves address from NETLINK address message. |
| // Sets |really_deprecated| for IPv6 addresses with preferred lifetimes of 0. |
| bool GetAddress(const struct nlmsghdr* header, |
| IPAddress* out, |
| bool* really_deprecated) { |
| if (really_deprecated) |
| *really_deprecated = false; |
| const struct ifaddrmsg* msg = |
| reinterpret_cast<struct ifaddrmsg*>(NLMSG_DATA(header)); |
| size_t address_length = 0; |
| switch (msg->ifa_family) { |
| case AF_INET: |
| address_length = IPAddress::kIPv4AddressSize; |
| break; |
| case AF_INET6: |
| address_length = IPAddress::kIPv6AddressSize; |
| break; |
| default: |
| // Unknown family. |
| return false; |
| } |
| // Use IFA_ADDRESS unless IFA_LOCAL is present. This behavior here is based on |
| // getaddrinfo in glibc (check_pf.c). Judging from kernel implementation of |
| // NETLINK, IPv4 addresses have only the IFA_ADDRESS attribute, while IPv6 |
| // have the IFA_LOCAL attribute. |
| uint8_t* address = NULL; |
| uint8_t* local = NULL; |
| size_t length = IFA_PAYLOAD(header); |
| for (const struct rtattr* attr = |
| reinterpret_cast<const struct rtattr*>(IFA_RTA(msg)); |
| RTA_OK(attr, length); |
| attr = RTA_NEXT(attr, length)) { |
| switch (attr->rta_type) { |
| case IFA_ADDRESS: |
| DCHECK_GE(RTA_PAYLOAD(attr), address_length); |
| address = reinterpret_cast<uint8_t*>(RTA_DATA(attr)); |
| break; |
| case IFA_LOCAL: |
| DCHECK_GE(RTA_PAYLOAD(attr), address_length); |
| local = reinterpret_cast<uint8_t*>(RTA_DATA(attr)); |
| break; |
| case IFA_CACHEINFO: { |
| const struct ifa_cacheinfo *cache_info = |
| reinterpret_cast<const struct ifa_cacheinfo*>(RTA_DATA(attr)); |
| if (really_deprecated) |
| *really_deprecated = (cache_info->ifa_prefered == 0); |
| } break; |
| default: |
| break; |
| } |
| } |
| if (local) |
| address = local; |
| if (!address) |
| return false; |
| *out = IPAddress(address, address_length); |
| return true; |
| } |
| |
| } // namespace |
| |
| // static |
| char* AddressTrackerLinux::GetInterfaceName(int interface_index, char* buf) { |
| SbMemorySet(buf, 0, IFNAMSIZ); |
| base::ScopedFD ioctl_socket = GetSocketForIoctl(); |
| if (!ioctl_socket.is_valid()) |
| return buf; |
| |
| struct ifreq ifr = {}; |
| ifr.ifr_ifindex = interface_index; |
| |
| if (ioctl(ioctl_socket.get(), SIOCGIFNAME, &ifr) == 0) |
| SbStringCopy(buf, ifr.ifr_name, IFNAMSIZ - 1); |
| return buf; |
| } |
| |
| AddressTrackerLinux::AddressTrackerLinux() |
| : get_interface_name_(GetInterfaceName), |
| address_callback_(base::DoNothing()), |
| link_callback_(base::DoNothing()), |
| tunnel_callback_(base::DoNothing()), |
| netlink_fd_(-1), |
| watcher_(FROM_HERE), |
| ignored_interfaces_(), |
| connection_type_initialized_(false), |
| connection_type_initialized_cv_(&connection_type_lock_), |
| current_connection_type_(NetworkChangeNotifier::CONNECTION_NONE), |
| tracking_(false), |
| threads_waiting_for_connection_type_initialization_(0) {} |
| |
| AddressTrackerLinux::AddressTrackerLinux( |
| const base::Closure& address_callback, |
| const base::Closure& link_callback, |
| const base::Closure& tunnel_callback, |
| const std::unordered_set<std::string>& ignored_interfaces) |
| : get_interface_name_(GetInterfaceName), |
| address_callback_(address_callback), |
| link_callback_(link_callback), |
| tunnel_callback_(tunnel_callback), |
| netlink_fd_(-1), |
| watcher_(FROM_HERE), |
| ignored_interfaces_(ignored_interfaces), |
| connection_type_initialized_(false), |
| connection_type_initialized_cv_(&connection_type_lock_), |
| current_connection_type_(NetworkChangeNotifier::CONNECTION_NONE), |
| tracking_(true), |
| threads_waiting_for_connection_type_initialization_(0) { |
| DCHECK(!address_callback.is_null()); |
| DCHECK(!link_callback.is_null()); |
| } |
| |
| AddressTrackerLinux::~AddressTrackerLinux() { |
| CloseSocket(); |
| } |
| |
| void AddressTrackerLinux::Init() { |
| netlink_fd_ = socket(AF_NETLINK, SOCK_RAW, NETLINK_ROUTE); |
| if (netlink_fd_ < 0) { |
| PLOG(ERROR) << "Could not create NETLINK socket"; |
| AbortAndForceOnline(); |
| return; |
| } |
| |
| int rv; |
| |
| if (tracking_) { |
| // Request notifications. |
| struct sockaddr_nl addr = {}; |
| addr.nl_family = AF_NETLINK; |
| addr.nl_pid = getpid(); |
| // TODO(szym): Track RTMGRP_LINK as well for ifi_type, |
| // http://crbug.com/113993 |
| addr.nl_groups = |
| RTMGRP_IPV4_IFADDR | RTMGRP_IPV6_IFADDR | RTMGRP_NOTIFY | RTMGRP_LINK; |
| rv = bind( |
| netlink_fd_, reinterpret_cast<struct sockaddr*>(&addr), sizeof(addr)); |
| if (rv < 0) { |
| PLOG(ERROR) << "Could not bind NETLINK socket"; |
| AbortAndForceOnline(); |
| return; |
| } |
| } |
| |
| // Request dump of addresses. |
| struct sockaddr_nl peer = {}; |
| peer.nl_family = AF_NETLINK; |
| |
| struct { |
| struct nlmsghdr header; |
| struct rtgenmsg msg; |
| } request = {}; |
| |
| request.header.nlmsg_len = NLMSG_LENGTH(sizeof(request.msg)); |
| request.header.nlmsg_type = RTM_GETADDR; |
| request.header.nlmsg_flags = NLM_F_REQUEST | NLM_F_DUMP; |
| request.header.nlmsg_pid = getpid(); |
| request.msg.rtgen_family = AF_UNSPEC; |
| |
| rv = HANDLE_EINTR(sendto(netlink_fd_, &request, request.header.nlmsg_len, |
| 0, reinterpret_cast<struct sockaddr*>(&peer), |
| sizeof(peer))); |
| if (rv < 0) { |
| PLOG(ERROR) << "Could not send NETLINK request"; |
| AbortAndForceOnline(); |
| return; |
| } |
| |
| // Consume pending message to populate the AddressMap, but don't notify. |
| // Sending another request without first reading responses results in EBUSY. |
| bool address_changed; |
| bool link_changed; |
| bool tunnel_changed; |
| ReadMessages(&address_changed, &link_changed, &tunnel_changed); |
| |
| // Request dump of link state |
| request.header.nlmsg_type = RTM_GETLINK; |
| |
| rv = HANDLE_EINTR(sendto(netlink_fd_, &request, request.header.nlmsg_len, 0, |
| reinterpret_cast<struct sockaddr*>(&peer), |
| sizeof(peer))); |
| if (rv < 0) { |
| PLOG(ERROR) << "Could not send NETLINK request"; |
| AbortAndForceOnline(); |
| return; |
| } |
| |
| // Consume pending message to populate links_online_, but don't notify. |
| ReadMessages(&address_changed, &link_changed, &tunnel_changed); |
| { |
| AddressTrackerAutoLock lock(*this, connection_type_lock_); |
| connection_type_initialized_ = true; |
| connection_type_initialized_cv_.Broadcast(); |
| } |
| |
| if (tracking_) { |
| rv = base::MessageLoopCurrentForIO::Get()->WatchFileDescriptor( |
| netlink_fd_, true, base::MessagePumpForIO::WATCH_READ, &watcher_, this); |
| if (rv < 0) { |
| PLOG(ERROR) << "Could not watch NETLINK socket"; |
| AbortAndForceOnline(); |
| return; |
| } |
| } |
| } |
| |
| void AddressTrackerLinux::AbortAndForceOnline() { |
| CloseSocket(); |
| AddressTrackerAutoLock lock(*this, connection_type_lock_); |
| current_connection_type_ = NetworkChangeNotifier::CONNECTION_UNKNOWN; |
| connection_type_initialized_ = true; |
| connection_type_initialized_cv_.Broadcast(); |
| } |
| |
| AddressTrackerLinux::AddressMap AddressTrackerLinux::GetAddressMap() const { |
| AddressTrackerAutoLock lock(*this, address_map_lock_); |
| return address_map_; |
| } |
| |
| std::unordered_set<int> AddressTrackerLinux::GetOnlineLinks() const { |
| AddressTrackerAutoLock lock(*this, online_links_lock_); |
| return online_links_; |
| } |
| |
| bool AddressTrackerLinux::IsInterfaceIgnored(int interface_index) const { |
| if (ignored_interfaces_.empty()) |
| return false; |
| |
| char buf[IFNAMSIZ] = {0}; |
| const char* interface_name = get_interface_name_(interface_index, buf); |
| return ignored_interfaces_.find(interface_name) != ignored_interfaces_.end(); |
| } |
| |
| NetworkChangeNotifier::ConnectionType |
| AddressTrackerLinux::GetCurrentConnectionType() { |
| // http://crbug.com/125097 |
| base::ThreadRestrictions::ScopedAllowWait allow_wait; |
| AddressTrackerAutoLock lock(*this, connection_type_lock_); |
| // Make sure the initial connection type is set before returning. |
| threads_waiting_for_connection_type_initialization_++; |
| while (!connection_type_initialized_) { |
| connection_type_initialized_cv_.Wait(); |
| } |
| threads_waiting_for_connection_type_initialization_--; |
| return current_connection_type_; |
| } |
| |
| void AddressTrackerLinux::ReadMessages(bool* address_changed, |
| bool* link_changed, |
| bool* tunnel_changed) { |
| *address_changed = false; |
| *link_changed = false; |
| *tunnel_changed = false; |
| char buffer[4096]; |
| bool first_loop = true; |
| { |
| base::Optional<base::ScopedBlockingCall> blocking_call; |
| if (tracking_) { |
| // If the loop below takes a long time to run, a new thread should added |
| // to the current thread pool to ensure forward progress of all tasks. |
| base::AssertBlockingAllowed(); |
| blocking_call.emplace(base::BlockingType::MAY_BLOCK); |
| } |
| |
| for (;;) { |
| int rv = HANDLE_EINTR(recv(netlink_fd_, buffer, sizeof(buffer), |
| // Block the first time through loop. |
| first_loop ? 0 : MSG_DONTWAIT)); |
| first_loop = false; |
| if (rv == 0) { |
| LOG(ERROR) << "Unexpected shutdown of NETLINK socket."; |
| return; |
| } |
| if (rv < 0) { |
| if ((errno == EAGAIN) || (errno == EWOULDBLOCK)) |
| break; |
| PLOG(ERROR) << "Failed to recv from netlink socket"; |
| return; |
| } |
| HandleMessage(buffer, rv, address_changed, link_changed, tunnel_changed); |
| } |
| } |
| if (*link_changed || *address_changed) |
| UpdateCurrentConnectionType(); |
| } |
| |
| void AddressTrackerLinux::HandleMessage(char* buffer, |
| size_t length, |
| bool* address_changed, |
| bool* link_changed, |
| bool* tunnel_changed) { |
| DCHECK(buffer); |
| for (struct nlmsghdr* header = reinterpret_cast<struct nlmsghdr*>(buffer); |
| NLMSG_OK(header, length); |
| header = NLMSG_NEXT(header, length)) { |
| switch (header->nlmsg_type) { |
| case NLMSG_DONE: |
| return; |
| case NLMSG_ERROR: { |
| const struct nlmsgerr* msg = |
| reinterpret_cast<struct nlmsgerr*>(NLMSG_DATA(header)); |
| LOG(ERROR) << "Unexpected netlink error " << msg->error << "."; |
| } return; |
| case RTM_NEWADDR: { |
| IPAddress address; |
| bool really_deprecated; |
| struct ifaddrmsg* msg = |
| reinterpret_cast<struct ifaddrmsg*>(NLMSG_DATA(header)); |
| if (IsInterfaceIgnored(msg->ifa_index)) |
| break; |
| if (GetAddress(header, &address, &really_deprecated)) { |
| AddressTrackerAutoLock lock(*this, address_map_lock_); |
| // Routers may frequently (every few seconds) output the IPv6 ULA |
| // prefix which can cause the linux kernel to frequently output two |
| // back-to-back messages, one without the deprecated flag and one with |
| // the deprecated flag but both with preferred lifetimes of 0. Avoid |
| // interpretting this as an actual change by canonicalizing the two |
| // messages by setting the deprecated flag based on the preferred |
| // lifetime also. http://crbug.com/268042 |
| if (really_deprecated) |
| msg->ifa_flags |= IFA_F_DEPRECATED; |
| // Only indicate change if the address is new or ifaddrmsg info has |
| // changed. |
| auto it = address_map_.find(address); |
| if (it == address_map_.end()) { |
| address_map_.insert(it, std::make_pair(address, *msg)); |
| *address_changed = true; |
| } else if (SbMemoryCompare(&it->second, msg, sizeof(*msg))) { |
| it->second = *msg; |
| *address_changed = true; |
| } |
| } |
| } break; |
| case RTM_DELADDR: { |
| IPAddress address; |
| const struct ifaddrmsg* msg = |
| reinterpret_cast<struct ifaddrmsg*>(NLMSG_DATA(header)); |
| if (IsInterfaceIgnored(msg->ifa_index)) |
| break; |
| if (GetAddress(header, &address, NULL)) { |
| AddressTrackerAutoLock lock(*this, address_map_lock_); |
| if (address_map_.erase(address)) |
| *address_changed = true; |
| } |
| } break; |
| case RTM_NEWLINK: { |
| const struct ifinfomsg* msg = |
| reinterpret_cast<struct ifinfomsg*>(NLMSG_DATA(header)); |
| if (IsInterfaceIgnored(msg->ifi_index)) |
| break; |
| if (IgnoreWirelessChange(header, msg)) { |
| VLOG(2) << "Ignoring RTM_NEWLINK message"; |
| break; |
| } |
| if (!(msg->ifi_flags & IFF_LOOPBACK) && (msg->ifi_flags & IFF_UP) && |
| (msg->ifi_flags & IFF_LOWER_UP) && (msg->ifi_flags & IFF_RUNNING)) { |
| AddressTrackerAutoLock lock(*this, online_links_lock_); |
| if (online_links_.insert(msg->ifi_index).second) { |
| *link_changed = true; |
| if (IsTunnelInterface(msg->ifi_index)) |
| *tunnel_changed = true; |
| } |
| } else { |
| AddressTrackerAutoLock lock(*this, online_links_lock_); |
| if (online_links_.erase(msg->ifi_index)) { |
| *link_changed = true; |
| if (IsTunnelInterface(msg->ifi_index)) |
| *tunnel_changed = true; |
| } |
| } |
| } break; |
| case RTM_DELLINK: { |
| const struct ifinfomsg* msg = |
| reinterpret_cast<struct ifinfomsg*>(NLMSG_DATA(header)); |
| if (IsInterfaceIgnored(msg->ifi_index)) |
| break; |
| AddressTrackerAutoLock lock(*this, online_links_lock_); |
| if (online_links_.erase(msg->ifi_index)) { |
| *link_changed = true; |
| if (IsTunnelInterface(msg->ifi_index)) |
| *tunnel_changed = true; |
| } |
| } break; |
| default: |
| break; |
| } |
| } |
| } |
| |
| void AddressTrackerLinux::OnFileCanReadWithoutBlocking(int fd) { |
| DCHECK_EQ(netlink_fd_, fd); |
| bool address_changed; |
| bool link_changed; |
| bool tunnel_changed; |
| ReadMessages(&address_changed, &link_changed, &tunnel_changed); |
| if (address_changed) |
| address_callback_.Run(); |
| if (link_changed) |
| link_callback_.Run(); |
| if (tunnel_changed) |
| tunnel_callback_.Run(); |
| } |
| |
| void AddressTrackerLinux::OnFileCanWriteWithoutBlocking(int /* fd */) {} |
| |
| void AddressTrackerLinux::CloseSocket() { |
| if (netlink_fd_ >= 0 && IGNORE_EINTR(close(netlink_fd_)) < 0) |
| PLOG(ERROR) << "Could not close NETLINK socket."; |
| netlink_fd_ = -1; |
| } |
| |
| bool AddressTrackerLinux::IsTunnelInterface(int interface_index) const { |
| char buf[IFNAMSIZ] = {0}; |
| return IsTunnelInterfaceName(get_interface_name_(interface_index, buf)); |
| } |
| |
| // static |
| bool AddressTrackerLinux::IsTunnelInterfaceName(const char* name) { |
| // Linux kernel drivers/net/tun.c uses "tun" name prefix. |
| return strncmp(name, "tun", 3) == 0; |
| } |
| |
| void AddressTrackerLinux::UpdateCurrentConnectionType() { |
| AddressTrackerLinux::AddressMap address_map = GetAddressMap(); |
| std::unordered_set<int> online_links = GetOnlineLinks(); |
| |
| // Strip out tunnel interfaces from online_links |
| for (auto it = online_links.cbegin(); it != online_links.cend();) { |
| if (IsTunnelInterface(*it)) { |
| it = online_links.erase(it); |
| } else { |
| ++it; |
| } |
| } |
| |
| NetworkInterfaceList networks; |
| NetworkChangeNotifier::ConnectionType type = |
| NetworkChangeNotifier::CONNECTION_NONE; |
| if (GetNetworkListImpl(&networks, 0, online_links, address_map, |
| get_interface_name_)) { |
| type = NetworkChangeNotifier::ConnectionTypeFromInterfaceList(networks); |
| } else { |
| type = online_links.empty() ? NetworkChangeNotifier::CONNECTION_NONE |
| : NetworkChangeNotifier::CONNECTION_UNKNOWN; |
| } |
| |
| AddressTrackerAutoLock lock(*this, connection_type_lock_); |
| current_connection_type_ = type; |
| } |
| |
| int AddressTrackerLinux::GetThreadsWaitingForConnectionTypeInitForTesting() |
| { |
| AddressTrackerAutoLock lock(*this, connection_type_lock_); |
| return threads_waiting_for_connection_type_initialization_; |
| } |
| |
| AddressTrackerLinux::AddressTrackerAutoLock::AddressTrackerAutoLock( |
| const AddressTrackerLinux& tracker, |
| base::Lock& lock) |
| : tracker_(tracker), lock_(lock) { |
| if (tracker_.tracking_) { |
| lock_.Acquire(); |
| } else { |
| DCHECK(tracker_.thread_checker_.CalledOnValidThread()); |
| } |
| } |
| |
| AddressTrackerLinux::AddressTrackerAutoLock::~AddressTrackerAutoLock() { |
| if (tracker_.tracking_) { |
| lock_.AssertAcquired(); |
| lock_.Release(); |
| } |
| } |
| |
| } // namespace internal |
| } // namespace net |