Skip to content

Commit

Permalink
Poll netlink socket for interface changes on linux systems
Browse files Browse the repository at this point in the history
  • Loading branch information
lakeman committed Oct 12, 2015
1 parent e770998 commit 3049252
Show file tree
Hide file tree
Showing 5 changed files with 401 additions and 211 deletions.
3 changes: 2 additions & 1 deletion Android.mk
Original file line number Diff line number Diff line change
Expand Up @@ -16,6 +16,7 @@ SQLITE3_INC := $(LOCAL_PATH)/sqlite-amalgamation-3070900

SERVALD_LOCAL_CFLAGS = \
-g \
-Wall -Wno-unused-value -Werror \
-DSERVALD_VERSION="\"Android\"" -DSERVALD_COPYRIGHT="\"Android\"" \
-DINSTANCE_PATH="\"/data/data/org.servalproject/var/serval-node\"" \
-DSHELL -DPACKAGE_NAME=\"\" -DPACKAGE_TARNAME=\"\" -DPACKAGE_VERSION=\"\" \
Expand All @@ -29,7 +30,7 @@ SERVALD_LOCAL_CFLAGS = \
-DHAVE_JNI_H=1 -DHAVE_STRUCT_UCRED=1 -DHAVE_CRYPTO_SIGN_NACL_GE25519_H=1 \
-DBYTE_ORDER=_BYTE_ORDER -DHAVE_LINUX_STRUCT_UCRED -DUSE_ABSTRACT_NAMESPACE \
-DHAVE_BCOPY -DHAVE_BZERO -DHAVE_NETINET_IN_H -DHAVE_LSEEK64 -DSIZEOF_OFF_T=4 \
-DHAVE_LINUX_IF_H -DHAVE_SYS_STAT_H -DHAVE_SYS_VFS_H \
-DHAVE_LINUX_IF_H -DHAVE_SYS_STAT_H -DHAVE_SYS_VFS_H -DHAVE_LINUX_NETLINK_H -DHAVE_LINUX_RTNETLINK_H \
-DSQLITE_OMIT_DATETIME_FUNCS -DSQLITE_OMIT_COMPILEOPTION_DIAGS -DSQLITE_OMIT_DEPRECATED \
-DSQLITE_OMIT_LOAD_EXTENSION -DSQLITE_OMIT_VIRTUALTABLE -DSQLITE_OMIT_AUTHORIZATION \
-I$(NACL_INC) \
Expand Down
62 changes: 24 additions & 38 deletions lsif.c
Original file line number Diff line number Diff line change
Expand Up @@ -74,9 +74,8 @@
#ifdef linux
/* for when all other options fail, as can happen on Android,
if the permissions for the socket-based method are broken.
Down side is that it while it gets the interface name and
broadcast, it doesn't get the local address for that
interface.
While it gets the interface name and broadcast, it doesn't
get the local address for that interface.
*/
int scrapeProcNetRoute()
{
Expand All @@ -97,27 +96,26 @@ int scrapeProcNetRoute()
if (fgets(line,1024,f) == NULL)
return WHYF_perror("fgets(%p,1024,\"/proc/net/route\")", line);

struct socket_address addr, broadcast;
struct socket_address addr, broadcast, netmask;
bzero(&addr, sizeof(addr));
bzero(&broadcast, sizeof(broadcast));
bzero(&netmask, sizeof(netmask));

addr.addrlen = sizeof(addr.inet);
addr.inet.sin_family = AF_INET;
broadcast.addrlen = sizeof(addr.inet);
broadcast.inet.sin_family = AF_INET;
netmask.addrlen = sizeof(netmask.inet);
netmask.inet.sin_family=AF_INET;

while(line[0]) {
int r;
if ((r=sscanf(line,"%s %s %*s %*s %*s %*s %*s %s",name,dest,mask))==3) {
addr.inet.sin_addr.s_addr=strtol(dest,NULL,16);
struct in_addr netmask = {.s_addr=strtol(mask,NULL,16)};
broadcast.inet.sin_addr.s_addr=addr.inet.sin_addr.s_addr | ~netmask.s_addr;

struct socket_address netmask_addr;
netmask_addr.addrlen = sizeof(netmask_addr.inet);
netmask_addr.inet.sin_family=AF_INET;
netmask_addr.inet.sin_addr.s_addr=netmask.s_addr;
netmask.inet.sin_addr.s_addr=strtol(mask,NULL,16);
broadcast.inet.sin_addr.s_addr=addr.inet.sin_addr.s_addr | ~netmask.inet.sin_addr.s_addr;

overlay_interface_register(name,&addr,&netmask_addr,&broadcast);
overlay_interface_register(name,&addr,&netmask,&broadcast);
}
line[0] = '\0';
if (fgets(line,1024,f) == NULL)
Expand All @@ -141,10 +139,10 @@ lsif(void) {
struct ifconf ifc;
int sck;
struct ifreq *ifr;
struct in_addr netmask;
struct socket_address addr, broadcast;
struct socket_address addr, broadcast, netmask;
bzero(&addr, sizeof(addr));
bzero(&broadcast, sizeof(broadcast));
bzero(&netmask, sizeof(netmask));

DEBUG(overlayinterfaces, "called");

Expand Down Expand Up @@ -198,16 +196,13 @@ lsif(void) {
WHY_perror("ioctl(SIOCGIFNETMASK)");
continue;
}
netmask = ((struct sockaddr_in *)&ifr->ifr_ifru.ifru_addr)->sin_addr;

broadcast.inet.sin_addr.s_addr=addr.inet.sin_addr.s_addr | ~netmask.s_addr;
netmask.addrlen = sizeof(netmask.inet);
bcopy(&ifr->ifr_ifru.ifru_addr, &netmask.inet, sizeof(netmask.inet));

struct socket_address netmask_addr;
netmask_addr.addrlen = sizeof(netmask_addr.inet);
netmask_addr.inet.sin_family=AF_INET;
netmask_addr.inet.sin_addr.s_addr=netmask.s_addr;
broadcast.inet.sin_addr.s_addr=addr.inet.sin_addr.s_addr | ~netmask.inet.sin_addr.s_addr;

overlay_interface_register(ifr->ifr_name, &addr, &netmask_addr, &broadcast);
overlay_interface_register(ifr->ifr_name, &addr, &netmask, &broadcast);
nInterfaces++;
}

Expand All @@ -224,21 +219,18 @@ int
doifaddrs(void) {
struct ifaddrs *ifaddr, *ifa;
char *name;
struct socket_address addr, broadcast;
struct in_addr netmask;
struct socket_address addr, broadcast, netmask;
bzero(&addr, sizeof(addr));
bzero(&broadcast, sizeof(broadcast));
bzero(&netmask, sizeof(netmask));

DEBUGF(overlayinterfaces, "called");

if (getifaddrs(&ifaddr) == -1)
return WHY_perror("getifaddr()");

broadcast.addrlen = sizeof(addr.inet);
broadcast.inet.sin_family = AF_INET;

for (ifa = ifaddr; ifa != NULL ; ifa = ifa->ifa_next) {
if (!ifa->ifa_addr || !ifa->ifa_netmask)
if (!ifa->ifa_addr || !ifa->ifa_netmask || !ifa->ifa_broadaddr)
continue;

/* We're only interested in IPv4 addresses */
Expand All @@ -254,22 +246,16 @@ doifaddrs(void) {
}

name = ifa->ifa_name;
addr.addrlen = sizeof(addr.inet);
bcopy(ifa->ifa_addr, &addr.addr, addr.addrlen);
broadcast.addrlen = netmask.addrlen = addr.addrlen = sizeof(addr.inet);

netmask = ((struct sockaddr_in *)ifa->ifa_netmask)->sin_addr;

struct socket_address netmask_addr;
netmask_addr.inet.sin_family=AF_INET;
netmask_addr.inet.sin_addr.s_addr=netmask.s_addr;
bcopy(ifa->ifa_addr, &addr.inet, addr.addrlen);
bcopy(ifa->ifa_netmask, &netmask.inet, netmask.addrlen);
bcopy(ifa->ifa_broadaddr, &broadcast.inet, broadcast.addrlen);

broadcast.inet.sin_addr.s_addr=addr.inet.sin_addr.s_addr | ~netmask.s_addr;

overlay_interface_register(name, &addr, &netmask_addr, &broadcast);
overlay_interface_register(name, &addr, &netmask, &broadcast);
}
freeifaddrs(ifaddr);

return 0;
}
#endif

Loading

0 comments on commit 3049252

Please sign in to comment.