blob: e346b827f8ed82ac2e708fb26411a48a84a0d256 [file] [log] [blame]
Narayan Kamatha5ace892017-01-06 15:10:02 +00001/*
2 * Copyright (C) 2017 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17#include "IptablesRestoreController.h"
18
19#include <poll.h>
20#include <signal.h>
21#include <sys/wait.h>
22#include <unistd.h>
23
Lorenzo Colitti173da322017-02-05 01:56:40 +090024#define LOG_TAG "IptablesRestoreController"
Narayan Kamatha5ace892017-01-06 15:10:02 +000025#include <android-base/logging.h>
26#include <android-base/file.h>
27
28#include "Controllers.h"
29
30constexpr char IPTABLES_RESTORE_PATH[] = "/system/bin/iptables-restore";
31constexpr char IP6TABLES_RESTORE_PATH[] = "/system/bin/ip6tables-restore";
32
33constexpr char PING[] = "#PING\n";
34
35constexpr size_t PING_SIZE = sizeof(PING) - 1;
36
Lorenzo Colittia701afb2017-02-28 01:47:11 +090037// Not compile-time constants because they are changed by the unit tests.
38int IptablesRestoreController::MAX_RETRIES = 50;
39int IptablesRestoreController::POLL_TIMEOUT_MS = 100;
Narayan Kamatha5ace892017-01-06 15:10:02 +000040
41class IptablesProcess {
42public:
43 IptablesProcess(pid_t pid, int stdIn, int stdOut, int stdErr) :
44 pid(pid),
45 stdIn(stdIn),
46 processTerminated(false) {
47
48 pollFds[STDOUT_IDX] = { .fd = stdOut, .events = POLLIN };
49 pollFds[STDERR_IDX] = { .fd = stdErr, .events = POLLIN };
50 }
51
52 ~IptablesProcess() {
53 close(stdIn);
54 close(pollFds[STDOUT_IDX].fd);
55 close(pollFds[STDERR_IDX].fd);
56 }
57
Lorenzo Colitti173da322017-02-05 01:56:40 +090058 bool outputReady() {
59 struct pollfd pollfd = { .fd = stdIn, .events = POLLOUT };
60 int ret = poll(&pollfd, 1, 0);
61 if (ret == -1) {
62 ALOGE("outputReady poll failed: %s", strerror(errno));
63 return false;
64 }
65 return (ret == 1) && !(pollfd.revents & POLLERR);
66 }
67
68 void stop() {
69 if (processTerminated) return;
70
71 // This can be called by drainAndWaitForAck (after a POLLHUP) or by sendCommand (if the
72 // process was killed by something else on the system). In both cases, it's safe to send the
73 // PID a SIGTERM, because the PID continues to exist until its parent (i.e., us) calls
74 // waitpid on it, so there's no risk that the PID is reused.
75 int err = kill(pid, SIGTERM);
76 if (err) {
77 err = errno;
78 }
79
80 if (err == ESRCH) {
81 // This means that someone else inside netd but outside this class called waitpid(),
82 // which is a programming error. There's no point in calling waitpid() here since we
83 // know that the process is gone.
84 ALOGE("iptables child process %d unexpectedly disappeared", pid);
85 processTerminated = true;
86 return;
87 }
88
89 if (err) {
90 ALOGE("Error killing iptables child process %d: %s", pid, strerror(err));
91 }
92
Lorenzo Colitti25091422017-02-03 16:05:28 +090093 int status;
94 if (waitpid(pid, &status, 0) == -1) {
Lorenzo Colitti173da322017-02-05 01:56:40 +090095 ALOGE("Error waiting for iptables child process %d: %s", pid, strerror(errno));
Lorenzo Colitti25091422017-02-03 16:05:28 +090096 } else {
97 ALOGW("iptables-restore process %d terminated status=%d", pid, status);
Lorenzo Colitti173da322017-02-05 01:56:40 +090098 }
99
100 processTerminated = true;
101 }
102
Narayan Kamatha5ace892017-01-06 15:10:02 +0000103 const pid_t pid;
104 const int stdIn;
105
106 struct pollfd pollFds[2];
107 std::string errBuf;
108
Lorenzo Colitti173da322017-02-05 01:56:40 +0900109 std::atomic_bool processTerminated;
Narayan Kamatha5ace892017-01-06 15:10:02 +0000110
111 static constexpr size_t STDOUT_IDX = 0;
112 static constexpr size_t STDERR_IDX = 1;
113};
114
Lorenzo Colitti4e9ffd62017-08-09 16:45:19 +0900115IptablesRestoreController::IptablesRestoreController() {
116 // Start the IPv4 and IPv6 processes in parallel, since each one takes 20-30ms.
117 std::thread v4([this] () { mIpRestore.reset(forkAndExec(IPTABLES_PROCESS)); });
118 std::thread v6([this] () { mIp6Restore.reset(forkAndExec(IP6TABLES_PROCESS)); });
119 v4.join();
120 v6.join();
Narayan Kamatha5ace892017-01-06 15:10:02 +0000121}
122
123IptablesRestoreController::~IptablesRestoreController() {
124}
125
126/* static */
127IptablesProcess* IptablesRestoreController::forkAndExec(const IptablesProcessType type) {
128 const char* const cmd = (type == IPTABLES_PROCESS) ?
129 IPTABLES_RESTORE_PATH : IP6TABLES_RESTORE_PATH;
130
131 // Create the pipes we'll use for communication with the child
132 // process. One each for the child's in, out and err files.
133 int stdin_pipe[2];
134 int stdout_pipe[2];
135 int stderr_pipe[2];
136
137 if (pipe2(stdin_pipe, 0) == -1 ||
Lorenzo Colitticd283772017-01-31 19:00:49 +0900138 pipe2(stdout_pipe, O_NONBLOCK) == -1 ||
139 pipe2(stderr_pipe, O_NONBLOCK) == -1) {
Narayan Kamatha5ace892017-01-06 15:10:02 +0000140
Lorenzo Colitti25091422017-02-03 16:05:28 +0900141 ALOGE("pipe2() failed: %s", strerror(errno));
Narayan Kamatha5ace892017-01-06 15:10:02 +0000142 return nullptr;
143 }
144
145 pid_t child_pid = fork();
146 if (child_pid == 0) {
147 // The child process. Reads from stdin, writes to stderr and stdout.
148
149 // stdin_pipe[1] : The write end of the stdin pipe.
150 // stdout_pipe[0] : The read end of the stdout pipe.
151 // stderr_pipe[0] : The read end of the stderr pipe.
152 if (close(stdin_pipe[1]) == -1 ||
153 close(stdout_pipe[0]) == -1 ||
154 close(stderr_pipe[0]) == -1) {
155
Lorenzo Colitti25091422017-02-03 16:05:28 +0900156 ALOGW("close() failed: %s", strerror(errno));
Narayan Kamatha5ace892017-01-06 15:10:02 +0000157 }
158
159 // stdin_pipe[0] : The read end of the stdin pipe.
160 // stdout_pipe[1] : The write end of the stdout pipe.
161 // stderr_pipe[1] : The write end of the stderr pipe.
162 if (dup2(stdin_pipe[0], 0) == -1 ||
163 dup2(stdout_pipe[1], 1) == -1 ||
164 dup2(stderr_pipe[1], 2) == -1) {
Lorenzo Colitti25091422017-02-03 16:05:28 +0900165 ALOGE("dup2() failed: %s", strerror(errno));
Narayan Kamatha5ace892017-01-06 15:10:02 +0000166 abort();
167 }
168
169 if (execl(cmd,
170 cmd,
171 "--noflush", // Don't flush the whole table.
172 "-w", // Wait instead of failing if the lock is held.
173 "-v", // Verbose mode, to make sure our ping is echoed
174 // back to us.
175 nullptr) == -1) {
Lorenzo Colitti25091422017-02-03 16:05:28 +0900176 ALOGE("execl(%s, ...) failed: %s", cmd, strerror(errno));
Narayan Kamatha5ace892017-01-06 15:10:02 +0000177 abort();
178 }
179
180 // This statement is unreachable. We abort() upon error, and execl
181 // if everything goes well.
182 return nullptr;
183 }
184
185 // The parent process. Writes to stdout and stderr and reads from stdin.
186 if (child_pid == -1) {
Lorenzo Colitti25091422017-02-03 16:05:28 +0900187 ALOGE("fork() failed: %s", strerror(errno));
Narayan Kamatha5ace892017-01-06 15:10:02 +0000188 return nullptr;
189 }
190
191 // stdin_pipe[0] : The read end of the stdin pipe.
192 // stdout_pipe[1] : The write end of the stdout pipe.
193 // stderr_pipe[1] : The write end of the stderr pipe.
194 if (close(stdin_pipe[0]) == -1 ||
195 close(stdout_pipe[1]) == -1 ||
196 close(stderr_pipe[1]) == -1) {
Lorenzo Colitti25091422017-02-03 16:05:28 +0900197 ALOGW("close() failed: %s", strerror(errno));
Narayan Kamatha5ace892017-01-06 15:10:02 +0000198 }
199
200 return new IptablesProcess(child_pid, stdin_pipe[1], stdout_pipe[0], stderr_pipe[0]);
201}
202
Narayan Kamatha5ace892017-01-06 15:10:02 +0000203// TODO: Return -errno on failure instead of -1.
204// TODO: Maybe we should keep a rotating buffer of the last N commands
205// so that they can be dumped on dumpsys.
206int IptablesRestoreController::sendCommand(const IptablesProcessType type,
Lorenzo Colitticd283772017-01-31 19:00:49 +0900207 const std::string& command,
208 std::string *output) {
Narayan Kamatha5ace892017-01-06 15:10:02 +0000209 std::unique_ptr<IptablesProcess> *process =
210 (type == IPTABLES_PROCESS) ? &mIpRestore : &mIp6Restore;
211
Lorenzo Colitti173da322017-02-05 01:56:40 +0900212
Narayan Kamatha5ace892017-01-06 15:10:02 +0000213 // We might need to fork a new process if we haven't forked one yet, or
214 // if the forked process terminated.
215 //
216 // NOTE: For a given command, this is the last point at which we try to
217 // recover from a child death. If the child dies at some later point during
218 // the execution of this method, we will receive an EPIPE and return an
219 // error. The command will then need to be retried at a higher level.
Lorenzo Colitti173da322017-02-05 01:56:40 +0900220 IptablesProcess *existingProcess = process->get();
221 if (existingProcess != nullptr && !existingProcess->outputReady()) {
222 existingProcess->stop();
223 existingProcess = nullptr;
224 }
225
226 if (existingProcess == nullptr) {
Narayan Kamatha5ace892017-01-06 15:10:02 +0000227 // Fork a new iptables[6]-restore process.
228 IptablesProcess *newProcess = IptablesRestoreController::forkAndExec(type);
229 if (newProcess == nullptr) {
230 LOG(ERROR) << "Unable to fork ip[6]tables-restore, type: " << type;
231 return -1;
232 }
233
234 process->reset(newProcess);
235 }
236
Lorenzo Colitti20b128b2017-02-10 11:01:08 +0900237 if (!android::base::WriteFully((*process)->stdIn, command.data(), command.length())) {
Lorenzo Colitti25091422017-02-03 16:05:28 +0900238 ALOGE("Unable to send command: %s", strerror(errno));
Lorenzo Colitti173da322017-02-05 01:56:40 +0900239 return -1;
Narayan Kamatha5ace892017-01-06 15:10:02 +0000240 }
241
242 if (!android::base::WriteFully((*process)->stdIn, PING, PING_SIZE)) {
Lorenzo Colitti25091422017-02-03 16:05:28 +0900243 ALOGE("Unable to send ping command: %s", strerror(errno));
Narayan Kamatha5ace892017-01-06 15:10:02 +0000244 return -1;
245 }
246
Lorenzo Colitti20b128b2017-02-10 11:01:08 +0900247 if (!drainAndWaitForAck(*process, command, output)) {
Lorenzo Colitti173da322017-02-05 01:56:40 +0900248 // drainAndWaitForAck has already logged an error.
Narayan Kamatha5ace892017-01-06 15:10:02 +0000249 return -1;
250 }
251
252 return 0;
253}
254
Narayan Kamatha5ace892017-01-06 15:10:02 +0000255void IptablesRestoreController::maybeLogStderr(const std::unique_ptr<IptablesProcess> &process,
Lorenzo Colitti25091422017-02-03 16:05:28 +0900256 const std::string& command) {
257 if (process->errBuf.empty()) {
258 return;
Narayan Kamatha5ace892017-01-06 15:10:02 +0000259 }
260
Lorenzo Colitti25091422017-02-03 16:05:28 +0900261 ALOGE("iptables error:\n"
262 "------- COMMAND -------\n"
263 "%s\n"
264 "------- ERROR -------\n"
265 "%s"
266 "----------------------\n",
267 command.c_str(), process->errBuf.c_str());
268 process->errBuf.clear();
Narayan Kamatha5ace892017-01-06 15:10:02 +0000269}
270
Narayan Kamatha5ace892017-01-06 15:10:02 +0000271/* static */
Lorenzo Colitticd283772017-01-31 19:00:49 +0900272bool IptablesRestoreController::drainAndWaitForAck(const std::unique_ptr<IptablesProcess> &process,
Lorenzo Colitti25091422017-02-03 16:05:28 +0900273 const std::string& command,
Lorenzo Colitticd283772017-01-31 19:00:49 +0900274 std::string *output) {
Narayan Kamatha5ace892017-01-06 15:10:02 +0000275 bool receivedAck = false;
276 int timeout = 0;
Narayan Kamatha5ace892017-01-06 15:10:02 +0000277 while (!receivedAck && (timeout++ < MAX_RETRIES)) {
278 int numEvents = TEMP_FAILURE_RETRY(
279 poll(process->pollFds, ARRAY_SIZE(process->pollFds), POLL_TIMEOUT_MS));
280 if (numEvents == -1) {
Lorenzo Colitti25091422017-02-03 16:05:28 +0900281 ALOGE("Poll failed: %s", strerror(errno));
Narayan Kamatha5ace892017-01-06 15:10:02 +0000282 return false;
283 }
284
285 // We've timed out, which means something has gone wrong - we know that stdout should have
Lorenzo Colitti173da322017-02-05 01:56:40 +0900286 // become available to read with the ACK message, or that stderr should have been available
287 // to read with an error message.
Narayan Kamatha5ace892017-01-06 15:10:02 +0000288 if (numEvents == 0) {
289 continue;
290 }
291
Lorenzo Colitticd283772017-01-31 19:00:49 +0900292 char buffer[PIPE_BUF];
Narayan Kamatha5ace892017-01-06 15:10:02 +0000293 for (size_t i = 0; i < ARRAY_SIZE(process->pollFds); ++i) {
294 const struct pollfd &pollfd = process->pollFds[i];
295 if (pollfd.revents & POLLIN) {
Lorenzo Colitticd283772017-01-31 19:00:49 +0900296 ssize_t size;
297 do {
298 size = TEMP_FAILURE_RETRY(read(pollfd.fd, buffer, sizeof(buffer)));
Narayan Kamatha5ace892017-01-06 15:10:02 +0000299
Lorenzo Colitticd283772017-01-31 19:00:49 +0900300 if (size == -1) {
301 if (errno != EAGAIN) {
Lorenzo Colitti25091422017-02-03 16:05:28 +0900302 ALOGE("Unable to read from descriptor: %s", strerror(errno));
Lorenzo Colitticd283772017-01-31 19:00:49 +0900303 }
304 break;
Narayan Kamatha5ace892017-01-06 15:10:02 +0000305 }
Lorenzo Colitticd283772017-01-31 19:00:49 +0900306
307 if (i == IptablesProcess::STDOUT_IDX) {
308 // i == STDOUT_IDX: accumulate stdout into *output, and look
309 // for the ping response.
310 output->append(buffer, size);
311 size_t pos = output->find(PING);
312 if (pos != std::string::npos) {
313 if (output->size() > pos + PING_SIZE) {
314 size_t extra = output->size() - (pos + PING_SIZE);
315 ALOGW("%zd extra characters after iptables response: '%s...'",
316 extra, output->substr(pos + PING_SIZE, 128).c_str());
317 }
318 output->resize(pos);
319 receivedAck = true;
320 }
321 } else {
Lorenzo Colitti25091422017-02-03 16:05:28 +0900322 // i == STDERR_IDX: accumulate stderr into errBuf.
323 process->errBuf.append(buffer, size);
Lorenzo Colitticd283772017-01-31 19:00:49 +0900324 }
325 } while (size > 0);
Narayan Kamatha5ace892017-01-06 15:10:02 +0000326 }
Lorenzo Colitti173da322017-02-05 01:56:40 +0900327 if (pollfd.revents & POLLHUP) {
328 // The pipe was closed. This likely means the subprocess is exiting, since
329 // iptables-restore only closes stdin on error.
330 process->stop();
331 break;
332 }
Narayan Kamatha5ace892017-01-06 15:10:02 +0000333 }
334 }
335
Lorenzo Colitti25091422017-02-03 16:05:28 +0900336 if (!receivedAck && !process->processTerminated) {
337 ALOGE("Timed out waiting for response from iptables process %d", process->pid);
Lorenzo Colittia701afb2017-02-28 01:47:11 +0900338 // Kill the process so that if it eventually recovers, we don't misinterpret the ping
339 // response (or any output) of the command we just sent as coming from future commands.
340 process->stop();
Lorenzo Colitti173da322017-02-05 01:56:40 +0900341 }
342
Lorenzo Colitti25091422017-02-03 16:05:28 +0900343 maybeLogStderr(process, command);
344
Narayan Kamatha5ace892017-01-06 15:10:02 +0000345 return receivedAck;
346}
347
Lorenzo Colitticd283772017-01-31 19:00:49 +0900348int IptablesRestoreController::execute(const IptablesTarget target, const std::string& command,
349 std::string *output) {
Narayan Kamatha5ace892017-01-06 15:10:02 +0000350 std::lock_guard<std::mutex> lock(mLock);
351
Lorenzo Colitticd283772017-01-31 19:00:49 +0900352 std::string buffer;
353 if (output == nullptr) {
354 output = &buffer;
Lorenzo Colittia701afb2017-02-28 01:47:11 +0900355 } else {
356 output->clear();
Lorenzo Colitticd283772017-01-31 19:00:49 +0900357 }
358
Narayan Kamatha5ace892017-01-06 15:10:02 +0000359 int res = 0;
360 if (target == V4 || target == V4V6) {
Lorenzo Colitticd283772017-01-31 19:00:49 +0900361 res |= sendCommand(IPTABLES_PROCESS, command, output);
Narayan Kamatha5ace892017-01-06 15:10:02 +0000362 }
363 if (target == V6 || target == V4V6) {
Lorenzo Colitticd283772017-01-31 19:00:49 +0900364 res |= sendCommand(IP6TABLES_PROCESS, command, output);
Narayan Kamatha5ace892017-01-06 15:10:02 +0000365 }
366 return res;
367}
Lorenzo Colitti173da322017-02-05 01:56:40 +0900368
369int IptablesRestoreController::getIpRestorePid(const IptablesProcessType type) {
370 return type == IPTABLES_PROCESS ? mIpRestore->pid : mIp6Restore->pid;
371}