blob: 80282b35b60b1fc92c16e329f25984c0e058ad44 [file] [log] [blame]
Robert Greenwaltc4621772012-01-31 12:46:45 -08001/*
2 * Copyright (C) 2012 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
Dan Albertaa1be2b2015-01-06 09:36:17 -080017#include <ctype.h>
18#include <errno.h>
Lorenzo Colitti70afde62013-03-04 17:58:40 +090019#include <fcntl.h>
Lorenzo Colittiba25df92014-06-18 00:22:17 +090020#include <netdb.h>
Dan Albertaa1be2b2015-01-06 09:36:17 -080021#include <net/if.h>
Lorenzo Colittiba25df92014-06-18 00:22:17 +090022#include <netinet/in.h>
23#include <stdlib.h>
Jeff Sharkey8e188ed2012-07-12 18:32:03 -070024#include <string.h>
Rom Lemarchand838ef642013-01-24 15:14:41 -080025#include <sys/wait.h>
Jeff Sharkey8e188ed2012-07-12 18:32:03 -070026
Jeff Sharkeybec6d042012-09-06 15:45:56 -070027#define LOG_TAG "Netd"
28
Lorenzo Colittic1306ea2017-03-27 05:52:31 +090029#include <android-base/stringprintf.h>
Lorenzo Colitti548bbd42017-08-28 23:05:12 +090030#include <cutils/sockets.h>
Logan Chien3f461482018-04-23 14:31:32 +080031#include <log/log.h>
Jeff Sharkey8e188ed2012-07-12 18:32:03 -070032
Narayan Kamatha5ace892017-01-06 15:10:02 +000033#include "Controllers.h"
Robert Greenwaltc4621772012-01-31 12:46:45 -080034#include "NetdConstants.h"
Narayan Kamatha5ace892017-01-06 15:10:02 +000035#include "IptablesRestoreController.h"
Robert Greenwaltc4621772012-01-31 12:46:45 -080036
Lorenzo Colitticd283772017-01-31 19:00:49 +090037int execIptablesRestoreWithOutput(IptablesTarget target, const std::string& commands,
38 std::string *output) {
39 return android::net::gCtls->iptablesRestoreCtrl.execute(target, commands, output);
40}
41
Lorenzo Colitti89faa342016-02-26 11:38:47 +090042int execIptablesRestore(IptablesTarget target, const std::string& commands) {
Lorenzo Colitticd283772017-01-31 19:00:49 +090043 return execIptablesRestoreWithOutput(target, commands, nullptr);
Lorenzo Colitti89faa342016-02-26 11:38:47 +090044}
45
Lorenzo Colittic1306ea2017-03-27 05:52:31 +090046int execIptablesRestoreCommand(IptablesTarget target, const std::string& table,
47 const std::string& command, std::string *output) {
48 std::string fullCmd = android::base::StringPrintf("*%s\n%s\nCOMMIT\n", table.c_str(),
49 command.c_str());
50 return execIptablesRestoreWithOutput(target, fullCmd, output);
51}
52
JP Abgrall69261cb2014-06-19 18:35:24 -070053/*
54 * Check an interface name for plausibility. This should e.g. help against
55 * directory traversal.
56 */
Joel Scherpelzbcad6612017-05-30 10:55:11 +090057bool isIfaceName(const std::string& name) {
JP Abgrall69261cb2014-06-19 18:35:24 -070058 size_t i;
Joel Scherpelzbcad6612017-05-30 10:55:11 +090059 if ((name.empty()) || (name.size() > IFNAMSIZ)) {
JP Abgrall69261cb2014-06-19 18:35:24 -070060 return false;
61 }
62
63 /* First character must be alphanumeric */
64 if (!isalnum(name[0])) {
65 return false;
66 }
67
Joel Scherpelzbcad6612017-05-30 10:55:11 +090068 for (i = 1; i < name.size(); i++) {
JP Abgrall69261cb2014-06-19 18:35:24 -070069 if (!isalnum(name[i]) && (name[i] != '_') && (name[i] != '-') && (name[i] != ':')) {
70 return false;
71 }
72 }
73
74 return true;
75}
Lorenzo Colittiba25df92014-06-18 00:22:17 +090076
77int parsePrefix(const char *prefix, uint8_t *family, void *address, int size, uint8_t *prefixlen) {
78 if (!prefix || !family || !address || !prefixlen) {
79 return -EFAULT;
80 }
81
82 // Find the '/' separating address from prefix length.
83 const char *slash = strchr(prefix, '/');
84 const char *prefixlenString = slash + 1;
85 if (!slash || !*prefixlenString)
86 return -EINVAL;
87
88 // Convert the prefix length to a uint8_t.
89 char *endptr;
90 unsigned templen;
91 templen = strtoul(prefixlenString, &endptr, 10);
92 if (*endptr || templen > 255) {
93 return -EINVAL;
94 }
95 *prefixlen = templen;
96
97 // Copy the address part of the prefix to a local buffer. We have to copy
98 // because inet_pton and getaddrinfo operate on null-terminated address
99 // strings, but prefix is const and has '/' after the address.
100 std::string addressString(prefix, slash - prefix);
101
102 // Parse the address.
103 addrinfo *res;
104 addrinfo hints = {
105 .ai_flags = AI_NUMERICHOST,
106 };
Yi Kongbdfd57e2018-07-25 13:26:10 -0700107 int ret = getaddrinfo(addressString.c_str(), nullptr, &hints, &res);
Lorenzo Colittiba25df92014-06-18 00:22:17 +0900108 if (ret || !res) {
109 return -EINVAL; // getaddrinfo return values are not errno values.
110 }
111
112 // Convert the address string to raw address bytes.
113 void *rawAddress;
114 int rawLength;
115 switch (res[0].ai_family) {
116 case AF_INET: {
117 if (*prefixlen > 32) {
118 return -EINVAL;
119 }
120 sockaddr_in *sin = (sockaddr_in *) res[0].ai_addr;
121 rawAddress = &sin->sin_addr;
122 rawLength = 4;
123 break;
124 }
125 case AF_INET6: {
126 if (*prefixlen > 128) {
127 return -EINVAL;
128 }
129 sockaddr_in6 *sin6 = (sockaddr_in6 *) res[0].ai_addr;
130 rawAddress = &sin6->sin6_addr;
131 rawLength = 16;
132 break;
133 }
134 default: {
135 freeaddrinfo(res);
136 return -EAFNOSUPPORT;
137 }
138 }
139
140 if (rawLength > size) {
141 freeaddrinfo(res);
142 return -ENOSPC;
143 }
144
145 *family = res[0].ai_family;
146 memcpy(address, rawAddress, rawLength);
147 freeaddrinfo(res);
148
149 return rawLength;
150}
Lorenzo Colitti839d7d62017-04-03 15:37:19 +0900151
152void blockSigpipe() {
153 sigset_t mask;
154
155 sigemptyset(&mask);
156 sigaddset(&mask, SIGPIPE);
Yi Kongbdfd57e2018-07-25 13:26:10 -0700157 if (sigprocmask(SIG_BLOCK, &mask, nullptr) != 0)
Lorenzo Colitti839d7d62017-04-03 15:37:19 +0900158 ALOGW("WARNING: SIGPIPE not blocked\n");
159}
Lorenzo Colitti548bbd42017-08-28 23:05:12 +0900160
161void setCloseOnExec(const char *sock) {
162 int fd = android_get_control_socket(sock);
163 int flags = fcntl(fd, F_GETFD, 0);
164 if (flags == -1) {
165 ALOGE("Can't get fd flags for control socket %s", sock);
166 flags = 0;
167 }
168 flags |= FD_CLOEXEC;
169 if (fcntl(fd, F_SETFD, flags) == -1) {
170 ALOGE("Can't set control socket %s to FD_CLOEXEC", sock);
171 }
172}