blob: 736b5fecc424899c69068d420919c7d5266dc3f1 [file] [log] [blame]
/*
* Copyright (C) 2008 The Android Open Source Project
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
#include <stdlib.h>
#include <errno.h>
#include <fcntl.h>
#include <string.h>
#include <sys/socket.h>
#include <sys/stat.h>
#include <sys/types.h>
#include <sys/wait.h>
#include <netinet/in.h>
#include <arpa/inet.h>
#define LOG_TAG "SecondaryTablController"
#include <cutils/log.h>
#include <cutils/properties.h>
#include <logwrap/logwrap.h>
#include "ResponseCode.h"
#include "NetdConstants.h"
#include "SecondaryTableController.h"
const char* SecondaryTableController::LOCAL_MANGLE_OUTPUT = "st_mangle_OUTPUT";
const char* SecondaryTableController::LOCAL_MANGLE_POSTROUTING = "st_mangle_POSTROUTING";
const char* SecondaryTableController::LOCAL_MANGLE_EXEMPT = "st_mangle_EXEMPT";
const char* SecondaryTableController::LOCAL_MANGLE_IFACE_FORMAT = "st_mangle_%s_OUTPUT";
const char* SecondaryTableController::LOCAL_NAT_POSTROUTING = "st_nat_POSTROUTING";
const char* SecondaryTableController::LOCAL_FILTER_OUTPUT = "st_filter_OUTPUT";
SecondaryTableController::SecondaryTableController(UidMarkMap *map) : mUidMarkMap(map) {
int i;
for (i=0; i < INTERFACES_TRACKED; i++) {
mInterfaceTable[i][0] = 0;
// TODO - use a hashtable or other prebuilt container class
mInterfaceRuleCount[i] = 0;
}
}
SecondaryTableController::~SecondaryTableController() {
}
int SecondaryTableController::setupIptablesHooks() {
int res = execIptables(V4V6,
"-t",
"mangle",
"-F",
LOCAL_MANGLE_OUTPUT,
NULL);
res |= execIptables(V4V6,
"-t",
"mangle",
"-F",
LOCAL_MANGLE_EXEMPT,
NULL);
// rule for skipping anything marked with the PROTECT_MARK
char protect_mark_str[11];
snprintf(protect_mark_str, sizeof(protect_mark_str), "%d", PROTECT_MARK);
res |= execIptables(V4V6,
"-t",
"mangle",
"-A",
LOCAL_MANGLE_OUTPUT,
"-m",
"mark",
"--mark",
protect_mark_str,
"-j",
"RETURN",
NULL);
// protect the legacy VPN daemons from routes.
// TODO: Remove this when legacy VPN's are removed.
res |= execIptables(V4V6,
"-t",
"mangle",
"-A",
LOCAL_MANGLE_OUTPUT,
"-m",
"owner",
"--uid-owner",
"vpn",
"-j",
"RETURN",
NULL);
return res;
}
int SecondaryTableController::findTableNumber(const char *iface) {
int i;
for (i = 0; i < INTERFACES_TRACKED; i++) {
// compare through the final null, hence +1
if (strncmp(iface, mInterfaceTable[i], IFNAMSIZ + 1) == 0) {
return i;
}
}
return -1;
}
int SecondaryTableController::addRoute(SocketClient *cli, char *iface, char *dest, int prefix,
char *gateway) {
int tableIndex = findTableNumber(iface);
if (tableIndex == -1) {
tableIndex = findTableNumber(""); // look for an empty slot
if (tableIndex == -1) {
ALOGE("Max number of NATed interfaces reached");
errno = ENODEV;
cli->sendMsg(ResponseCode::OperationFailed, "Max number NATed", true);
return -1;
}
strncpy(mInterfaceTable[tableIndex], iface, IFNAMSIZ);
// Ensure null termination even if truncation happened
mInterfaceTable[tableIndex][IFNAMSIZ] = 0;
}
return modifyRoute(cli, ADD, iface, dest, prefix, gateway, tableIndex);
}
int SecondaryTableController::modifyRoute(SocketClient *cli, const char *action, char *iface,
char *dest, int prefix, char *gateway, int tableIndex) {
char dest_str[44]; // enough to store an IPv6 address + 3 character bitmask
char tableIndex_str[11];
int ret;
// IP tool doesn't like "::" - the equiv of 0.0.0.0 that it accepts for ipv4
snprintf(dest_str, sizeof(dest_str), "%s/%d", dest, prefix);
snprintf(tableIndex_str, sizeof(tableIndex_str), "%d", tableIndex + BASE_TABLE_NUMBER);
if (strcmp("::", gateway) == 0) {
const char *cmd[] = {
IP_PATH,
"route",
action,
dest_str,
"dev",
iface,
"table",
tableIndex_str
};
ret = runCmd(ARRAY_SIZE(cmd), cmd);
} else {
const char *cmd[] = {
IP_PATH,
"route",
action,
dest_str,
"via",
gateway,
"dev",
iface,
"table",
tableIndex_str
};
ret = runCmd(ARRAY_SIZE(cmd), cmd);
}
if (ret) {
ALOGE("ip route %s failed: %s route %s %s/%d via %s dev %s table %d", action,
IP_PATH, action, dest, prefix, gateway, iface, tableIndex+BASE_TABLE_NUMBER);
errno = ENODEV;
cli->sendMsg(ResponseCode::OperationFailed, "ip route modification failed", true);
return -1;
}
if (strcmp(action, ADD) == 0) {
mInterfaceRuleCount[tableIndex]++;
} else {
if (--mInterfaceRuleCount[tableIndex] < 1) {
mInterfaceRuleCount[tableIndex] = 0;
mInterfaceTable[tableIndex][0] = 0;
}
}
modifyRuleCount(tableIndex, action);
cli->sendMsg(ResponseCode::CommandOkay, "Route modified", false);
return 0;
}
void SecondaryTableController::modifyRuleCount(int tableIndex, const char *action) {
if (strcmp(action, ADD) == 0) {
mInterfaceRuleCount[tableIndex]++;
} else {
if (--mInterfaceRuleCount[tableIndex] < 1) {
mInterfaceRuleCount[tableIndex] = 0;
mInterfaceTable[tableIndex][0] = 0;
}
}
}
int SecondaryTableController::verifyTableIndex(int tableIndex) {
if ((tableIndex < 0) ||
(tableIndex >= INTERFACES_TRACKED) ||
(mInterfaceTable[tableIndex][0] == 0)) {
return -1;
} else {
return 0;
}
}
const char *SecondaryTableController::getVersion(const char *addr) {
if (strchr(addr, ':') != NULL) {
return "-6";
} else {
return "-4";
}
}
IptablesTarget SecondaryTableController::getIptablesTarget(const char *addr) {
if (strchr(addr, ':') != NULL) {
return V6;
} else {
return V4;
}
}
int SecondaryTableController::removeRoute(SocketClient *cli, char *iface, char *dest, int prefix,
char *gateway) {
int tableIndex = findTableNumber(iface);
if (tableIndex == -1) {
ALOGE("Interface not found");
errno = ENODEV;
cli->sendMsg(ResponseCode::OperationFailed, "Interface not found", true);
return -1;
}
return modifyRoute(cli, DEL, iface, dest, prefix, gateway, tableIndex);
}
int SecondaryTableController::modifyFromRule(int tableIndex, const char *action,
const char *addr) {
char tableIndex_str[11];
if (verifyTableIndex(tableIndex)) {
return -1;
}
snprintf(tableIndex_str, sizeof(tableIndex_str), "%d", tableIndex +
BASE_TABLE_NUMBER);
const char *cmd[] = {
IP_PATH,
getVersion(addr),
"rule",
action,
"from",
addr,
"table",
tableIndex_str
};
if (runCmd(ARRAY_SIZE(cmd), cmd)) {
return -1;
}
modifyRuleCount(tableIndex, action);
return 0;
}
int SecondaryTableController::modifyLocalRoute(int tableIndex, const char *action,
const char *iface, const char *addr) {
char tableIndex_str[11];
if (verifyTableIndex(tableIndex)) {
return -1;
}
modifyRuleCount(tableIndex, action); // some del's will fail as the iface is already gone.
snprintf(tableIndex_str, sizeof(tableIndex_str), "%d", tableIndex +
BASE_TABLE_NUMBER);
const char *cmd[] = {
IP_PATH,
"route",
action,
addr,
"dev",
iface,
"table",
tableIndex_str
};
return runCmd(ARRAY_SIZE(cmd), cmd);
}
int SecondaryTableController::addFwmarkRule(const char *iface) {
return setFwmarkRule(iface, true);
}
int SecondaryTableController::removeFwmarkRule(const char *iface) {
return setFwmarkRule(iface, false);
}
int SecondaryTableController::setFwmarkRule(const char *iface, bool add) {
int tableIndex = findTableNumber(iface);
if (tableIndex == -1) {
tableIndex = findTableNumber(""); // look for an empty slot
if (tableIndex == -1) {
ALOGE("Max number of NATed interfaces reached");
errno = ENODEV;
return -1;
}
strncpy(mInterfaceTable[tableIndex], iface, IFNAMSIZ);
// Ensure null termination even if truncation happened
mInterfaceTable[tableIndex][IFNAMSIZ] = 0;
}
int mark = tableIndex + BASE_TABLE_NUMBER;
char mark_str[11];
int ret;
//fail fast if any rules already exist for this interface
if (mUidMarkMap->anyRulesForMark(mark)) {
errno = EBUSY;
return -1;
}
snprintf(mark_str, sizeof(mark_str), "%d", mark);
//add the catch all route to the tun. Route rules will make sure the right packets hit the table
const char *route_cmd[] = {
IP_PATH,
"route",
add ? "add" : "del",
"default",
"dev",
iface,
"table",
mark_str
};
ret = runCmd(ARRAY_SIZE(route_cmd), route_cmd);
const char *fwmark_cmd[] = {
IP_PATH,
"rule",
add ? "add" : "del",
"prio",
RULE_PRIO,
"fwmark",
mark_str,
"table",
mark_str
};
ret = runCmd(ARRAY_SIZE(fwmark_cmd), fwmark_cmd);
if (ret) return ret;
//add rules for v6
const char *route6_cmd[] = {
IP_PATH,
"-6",
"route",
add ? "add" : "del",
"default",
"dev",
iface,
"table",
mark_str
};
ret = runCmd(ARRAY_SIZE(route6_cmd), route6_cmd);
const char *fwmark6_cmd[] = {
IP_PATH,
"-6",
"rule",
add ? "add" : "del",
"prio",
RULE_PRIO,
"fwmark",
mark_str,
"table",
mark_str
};
ret = runCmd(ARRAY_SIZE(fwmark6_cmd), fwmark6_cmd);
if (ret) return ret;
//create the route rule chain
char chain_str[IFNAMSIZ + 18];
snprintf(chain_str, sizeof(chain_str), LOCAL_MANGLE_IFACE_FORMAT, iface);
//code split due to ordering requirements
if (add) {
ret = execIptables(V4V6,
"-t",
"mangle",
"-N",
chain_str,
NULL);
//set up the rule for sending premarked packets to the VPN chain
//Insert these at the top of the chain so they trigger before any UID rules
ret |= execIptables(V4V6,
"-t",
"mangle",
"-I",
LOCAL_MANGLE_OUTPUT,
"3",
"-m",
"mark",
"--mark",
mark_str,
"-g",
chain_str,
NULL);
//add a rule to clear the mark in the VPN chain
//packets marked with SO_MARK already have the iface's mark set but unless they match a
//route they should hit the network instead of the VPN
ret |= execIptables(V4V6,
"-t",
"mangle",
"-A",
chain_str,
"-j",
"MARK",
"--set-mark",
"0",
NULL);
/* Best effort, because some kernels might not have the needed TCPMSS */
execIptables(V4V6,
"-t",
"mangle",
"-A",
LOCAL_MANGLE_POSTROUTING,
"-p", "tcp", "-o", iface, "--tcp-flags", "SYN,RST", "SYN",
"-j",
"TCPMSS",
"--clamp-mss-to-pmtu",
NULL);
} else {
ret = execIptables(V4V6,
"-t",
"mangle",
"-D",
LOCAL_MANGLE_OUTPUT,
"-m",
"mark",
"--mark",
mark_str,
"-g",
chain_str,
NULL);
//clear and delete the chain
ret |= execIptables(V4V6,
"-t",
"mangle",
"-F",
chain_str,
NULL);
ret |= execIptables(V4V6,
"-t",
"mangle",
"-X",
chain_str,
NULL);
/* Best effort, because some kernels might not have the needed TCPMSS */
execIptables(V4V6,
"-t",
"mangle",
"-D",
LOCAL_MANGLE_POSTROUTING,
"-p", "tcp", "-o", iface, "--tcp-flags", "SYN,RST", "SYN",
"-j",
"TCPMSS",
"--clamp-mss-to-pmtu",
NULL);
}
//set up the needed source IP rewriting
//NOTE: Without ipv6 NAT in the kernel <3.7 only support V4 NAT
ret = execIptables(V4,
"-t",
"nat",
add ? "-A" : "-D",
LOCAL_NAT_POSTROUTING,
"-o",
iface,
"-m",
"mark",
"--mark",
mark_str,
"-j",
"MASQUERADE",
NULL);
if (ret) return ret;
//try and set up for ipv6. ipv6 nat came in the kernel only in 3.7, so this can fail
ret = execIptables(V6,
"-t",
"nat",
add ? "-A" : "-D",
LOCAL_NAT_POSTROUTING,
"-o",
iface,
"-m",
"mark",
"--mark",
mark_str,
"-j",
"MASQUERADE",
NULL);
if (ret) {
//Without V6 NAT we can't do V6 over VPNs.
ret = execIptables(V6,
"-t",
"filter",
add ? "-A" : "-D",
LOCAL_FILTER_OUTPUT,
"-m",
"mark",
"--mark",
mark_str,
"-j",
"REJECT",
NULL);
}
return ret;
}
int SecondaryTableController::addFwmarkRoute(const char* iface, const char *dest, int prefix) {
return setFwmarkRoute(iface, dest, prefix, true);
}
int SecondaryTableController::removeFwmarkRoute(const char* iface, const char *dest, int prefix) {
return setFwmarkRoute(iface, dest, prefix, true);
}
int SecondaryTableController::setFwmarkRoute(const char* iface, const char *dest, int prefix,
bool add) {
int tableIndex = findTableNumber(iface);
if (tableIndex == -1) {
errno = EINVAL;
return -1;
}
int mark = tableIndex + BASE_TABLE_NUMBER;
char mark_str[11] = {0};
char chain_str[IFNAMSIZ + 18];
char dest_str[44]; // enough to store an IPv6 address + 3 character bitmask
snprintf(mark_str, sizeof(mark_str), "%d", mark);
snprintf(chain_str, sizeof(chain_str), LOCAL_MANGLE_IFACE_FORMAT, iface);
snprintf(dest_str, sizeof(dest_str), "%s/%d", dest, prefix);
return execIptables(getIptablesTarget(dest),
"-t",
"mangle",
add ? "-A" : "-D",
chain_str,
"-d",
dest_str,
"-j",
"MARK",
"--set-mark",
mark_str,
NULL);
}
int SecondaryTableController::addUidRule(const char *iface, int uid_start, int uid_end) {
return setUidRule(iface, uid_start, uid_end, true);
}
int SecondaryTableController::removeUidRule(const char *iface, int uid_start, int uid_end) {
return setUidRule(iface, uid_start, uid_end, false);
}
int SecondaryTableController::setUidRule(const char *iface, int uid_start, int uid_end, bool add) {
int tableIndex = findTableNumber(iface);
if (tableIndex == -1) {
errno = EINVAL;
return -1;
}
int mark = tableIndex + BASE_TABLE_NUMBER;
if (add) {
if (!mUidMarkMap->add(uid_start, uid_end, mark)) {
errno = EINVAL;
return -1;
}
} else {
if (!mUidMarkMap->remove(uid_start, uid_end, mark)) {
errno = EINVAL;
return -1;
}
}
char uid_str[24] = {0};
char chain_str[IFNAMSIZ + 18];
snprintf(uid_str, sizeof(uid_str), "%d-%d", uid_start, uid_end);
snprintf(chain_str, sizeof(chain_str), LOCAL_MANGLE_IFACE_FORMAT, iface);
return execIptables(V4V6,
"-t",
"mangle",
add ? "-A" : "-D",
LOCAL_MANGLE_OUTPUT,
"-m",
"owner",
"--uid-owner",
uid_str,
"-g",
chain_str,
NULL);
}
int SecondaryTableController::addHostExemption(const char *host) {
return setHostExemption(host, true);
}
int SecondaryTableController::removeHostExemption(const char *host) {
return setHostExemption(host, false);
}
int SecondaryTableController::setHostExemption(const char *host, bool add) {
IptablesTarget target = !strcmp(getVersion(host), "-4") ? V4 : V6;
char protect_mark_str[11];
snprintf(protect_mark_str, sizeof(protect_mark_str), "%d", PROTECT_MARK);
int ret = execIptables(target,
"-t",
"mangle",
add ? "-A" : "-D",
LOCAL_MANGLE_EXEMPT,
"-d",
host,
"-j",
"MARK",
"--set-mark",
protect_mark_str,
NULL);
const char *cmd[] = {
IP_PATH,
getVersion(host),
"rule",
add ? "add" : "del",
"prio",
EXEMPT_PRIO,
"to",
host,
"table",
"main"
};
ret |= runCmd(ARRAY_SIZE(cmd), cmd);
return ret;
}
void SecondaryTableController::getUidMark(SocketClient *cli, int uid) {
int mark = mUidMarkMap->getMark(uid);
char mark_str[11];
snprintf(mark_str, sizeof(mark_str), "%d", mark);
cli->sendMsg(ResponseCode::GetMarkResult, mark_str, false);
}
void SecondaryTableController::getProtectMark(SocketClient *cli) {
char protect_mark_str[11];
snprintf(protect_mark_str, sizeof(protect_mark_str), "%d", PROTECT_MARK);
cli->sendMsg(ResponseCode::GetMarkResult, protect_mark_str, false);
}
int SecondaryTableController::runCmd(int argc, const char **argv) {
int ret = 0;
ret = android_fork_execvp(argc, (char **)argv, NULL, false, false);
return ret;
}