blob: f6fa88646ac95204c62b712a310f25c7cda5147a [file] [log] [blame]
Sreeram Ramachandranf4cfad32014-05-21 08:54:07 -07001/*
2 * Copyright (C) 2014 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
Sreeram Ramachandranefbe05d2014-05-21 11:41:39 -070017#include "NetdClient.h"
18
Michal Karpinski4b9b78a2016-10-06 19:33:55 +010019#include <arpa/inet.h>
Dan Albertaa1be2b2015-01-06 09:36:17 -080020#include <errno.h>
Michal Karpinski4b9b78a2016-10-06 19:33:55 +010021#include <math.h>
Luke Huangc68f1b92018-11-21 20:13:38 +080022#include <resolv.h>
Luke Huangc5efae92018-11-19 17:45:13 +080023#include <stdlib.h>
Dan Albertaa1be2b2015-01-06 09:36:17 -080024#include <sys/socket.h>
Luke Huangc5efae92018-11-19 17:45:13 +080025#include <sys/un.h>
Dan Albertaa1be2b2015-01-06 09:36:17 -080026#include <unistd.h>
27
28#include <atomic>
Luke Huangc68f1b92018-11-21 20:13:38 +080029#include <string>
30#include <vector>
Dan Albertaa1be2b2015-01-06 09:36:17 -080031
Luke Huang63df9482019-05-25 18:24:03 +080032#include <android-base/parseint.h>
33#include <android-base/unique_fd.h>
34
Sreeram Ramachandran4d4c8b72014-06-20 11:59:40 -070035#include "Fwmark.h"
Sreeram Ramachandranf4cfad32014-05-21 08:54:07 -070036#include "FwmarkClient.h"
37#include "FwmarkCommand.h"
Luke Huang63df9482019-05-25 18:24:03 +080038#include "netdclient_priv.h"
Luke Huang185098d2019-05-20 16:17:12 +080039#include "netdutils/ResponseCode.h"
Mike Yue7e332f2019-03-13 17:15:48 +080040#include "netdutils/Stopwatch.h"
Bernie Innocenti189eb502018-10-01 23:10:18 +090041#include "netid_client.h"
Sreeram Ramachandranf4cfad32014-05-21 08:54:07 -070042
Luke Huang185098d2019-05-20 16:17:12 +080043using android::base::ParseInt;
Luke Huangc68f1b92018-11-21 20:13:38 +080044using android::base::unique_fd;
Luke Huang185098d2019-05-20 16:17:12 +080045using android::netdutils::ResponseCode;
Mike Yue7e332f2019-03-13 17:15:48 +080046using android::netdutils::Stopwatch;
Luke Huangc68f1b92018-11-21 20:13:38 +080047
Sreeram Ramachandranf4cfad32014-05-21 08:54:07 -070048namespace {
49
Luke Huangc68f1b92018-11-21 20:13:38 +080050// Keep this in sync with CMD_BUF_SIZE in FrameworkListener.cpp.
Luke Huange92b75e2019-03-26 17:56:49 +080051constexpr size_t MAX_CMD_SIZE = 4096;
Luke Huangc68f1b92018-11-21 20:13:38 +080052
Sreeram Ramachandran9fa2b132014-06-03 12:51:08 -070053std::atomic_uint netIdForProcess(NETID_UNSET);
54std::atomic_uint netIdForResolv(NETID_UNSET);
Sreeram Ramachandran5fc27572014-05-21 13:08:34 -070055
56typedef int (*Accept4FunctionType)(int, sockaddr*, socklen_t*, int);
57typedef int (*ConnectFunctionType)(int, const sockaddr*, socklen_t);
58typedef int (*SocketFunctionType)(int, int, int);
59typedef unsigned (*NetIdForResolvFunctionType)(unsigned);
Luke Huangc5efae92018-11-19 17:45:13 +080060typedef int (*DnsOpenProxyType)();
Sreeram Ramachandran5fc27572014-05-21 13:08:34 -070061
62// These variables are only modified at startup (when libc.so is loaded) and never afterwards, so
63// it's okay that they are read later at runtime without a lock.
Yi Kongbdfd57e2018-07-25 13:26:10 -070064Accept4FunctionType libcAccept4 = nullptr;
65ConnectFunctionType libcConnect = nullptr;
66SocketFunctionType libcSocket = nullptr;
Sreeram Ramachandran5fc27572014-05-21 13:08:34 -070067
Lorenzo Colitti24601da2019-02-14 00:48:36 +090068int checkSocket(int socketFd) {
69 if (socketFd < 0) {
70 return -EBADF;
71 }
72 int family;
73 socklen_t familyLen = sizeof(family);
74 if (getsockopt(socketFd, SOL_SOCKET, SO_DOMAIN, &family, &familyLen) == -1) {
75 return -errno;
76 }
77 if (!FwmarkClient::shouldSetFwmark(family)) {
78 return -EAFNOSUPPORT;
79 }
80 return 0;
81}
82
83bool shouldMarkSocket(int socketFd, const sockaddr* dst) {
84 // Only mark inet sockets that are connecting to inet destinations. This excludes, for example,
85 // inet sockets connecting to AF_UNSPEC (i.e., being disconnected), and non-inet sockets that
86 // for some reason the caller wants to attempt to connect to an inet destination.
87 return dst && FwmarkClient::shouldSetFwmark(dst->sa_family) && (checkSocket(socketFd) == 0);
88}
89
Sreeram Ramachandran31f42102014-06-20 11:51:48 -070090int closeFdAndSetErrno(int fd, int error) {
Sreeram Ramachandranf4cfad32014-05-21 08:54:07 -070091 close(fd);
Sreeram Ramachandran3a069e62014-06-22 11:02:57 -070092 errno = -error;
Sreeram Ramachandranf4cfad32014-05-21 08:54:07 -070093 return -1;
94}
95
Sreeram Ramachandran5fc27572014-05-21 13:08:34 -070096int netdClientAccept4(int sockfd, sockaddr* addr, socklen_t* addrlen, int flags) {
97 int acceptedSocket = libcAccept4(sockfd, addr, addrlen, flags);
Sreeram Ramachandranf4cfad32014-05-21 08:54:07 -070098 if (acceptedSocket == -1) {
99 return -1;
100 }
Sreeram Ramachandran5fc27572014-05-21 13:08:34 -0700101 int family;
102 if (addr) {
103 family = addr->sa_family;
104 } else {
105 socklen_t familyLen = sizeof(family);
106 if (getsockopt(acceptedSocket, SOL_SOCKET, SO_DOMAIN, &family, &familyLen) == -1) {
Sreeram Ramachandran3a069e62014-06-22 11:02:57 -0700107 return closeFdAndSetErrno(acceptedSocket, -errno);
Sreeram Ramachandranf4cfad32014-05-21 08:54:07 -0700108 }
Sreeram Ramachandranf4cfad32014-05-21 08:54:07 -0700109 }
Sreeram Ramachandran5fc27572014-05-21 13:08:34 -0700110 if (FwmarkClient::shouldSetFwmark(family)) {
Chenbo Feng9944ba82017-10-10 17:33:20 -0700111 FwmarkCommand command = {FwmarkCommand::ON_ACCEPT, 0, 0, 0};
Michal Karpinski4b9b78a2016-10-06 19:33:55 +0100112 if (int error = FwmarkClient().send(&command, acceptedSocket, nullptr)) {
Sreeram Ramachandran31f42102014-06-20 11:51:48 -0700113 return closeFdAndSetErrno(acceptedSocket, error);
Sreeram Ramachandranf4cfad32014-05-21 08:54:07 -0700114 }
115 }
116 return acceptedSocket;
117}
118
Sreeram Ramachandran5fc27572014-05-21 13:08:34 -0700119int netdClientConnect(int sockfd, const sockaddr* addr, socklen_t addrlen) {
Lorenzo Colitti24601da2019-02-14 00:48:36 +0900120 const bool shouldSetFwmark = shouldMarkSocket(sockfd, addr);
Michal Karpinski4b9b78a2016-10-06 19:33:55 +0100121 if (shouldSetFwmark) {
Chenbo Feng9944ba82017-10-10 17:33:20 -0700122 FwmarkCommand command = {FwmarkCommand::ON_CONNECT, 0, 0, 0};
Michal Karpinski4b9b78a2016-10-06 19:33:55 +0100123 if (int error = FwmarkClient().send(&command, sockfd, nullptr)) {
Sreeram Ramachandran3a069e62014-06-22 11:02:57 -0700124 errno = -error;
Sreeram Ramachandran5fc27572014-05-21 13:08:34 -0700125 return -1;
126 }
127 }
Michal Karpinski4b9b78a2016-10-06 19:33:55 +0100128 // Latency measurement does not include time of sending commands to Fwmark
129 Stopwatch s;
Hugo Benichi794c5c72016-10-31 15:07:23 +0900130 const int ret = libcConnect(sockfd, addr, addrlen);
Michal Karpinski4b9b78a2016-10-06 19:33:55 +0100131 // Save errno so it isn't clobbered by sending ON_CONNECT_COMPLETE
132 const int connectErrno = errno;
Bernie Innocenti196f1b82019-05-20 16:34:16 +0900133 const auto latencyMs = static_cast<unsigned>(s.timeTakenUs() / 1000);
Michal Karpinski4b9b78a2016-10-06 19:33:55 +0100134 // Send an ON_CONNECT_COMPLETE command that includes sockaddr and connect latency for reporting
135 if (shouldSetFwmark && FwmarkClient::shouldReportConnectComplete(addr->sa_family)) {
Hugo Benichi794c5c72016-10-31 15:07:23 +0900136 FwmarkConnectInfo connectInfo(ret == 0 ? 0 : connectErrno, latencyMs, addr);
Michal Karpinski4b9b78a2016-10-06 19:33:55 +0100137 // TODO: get the netId from the socket mark once we have continuous benchmark runs
138 FwmarkCommand command = {FwmarkCommand::ON_CONNECT_COMPLETE, /* netId (ignored) */ 0,
Chenbo Feng9944ba82017-10-10 17:33:20 -0700139 /* uid (filled in by the server) */ 0, 0};
Michal Karpinski4b9b78a2016-10-06 19:33:55 +0100140 // Ignore return value since it's only used for logging
141 FwmarkClient().send(&command, sockfd, &connectInfo);
142 }
143 errno = connectErrno;
144 return ret;
Sreeram Ramachandran5fc27572014-05-21 13:08:34 -0700145}
146
147int netdClientSocket(int domain, int type, int protocol) {
148 int socketFd = libcSocket(domain, type, protocol);
149 if (socketFd == -1) {
150 return -1;
151 }
Lorenzo Colitti6b001262019-01-30 22:43:36 +0900152 unsigned netId = netIdForProcess & ~NETID_USE_LOCAL_NAMESERVERS;
Sreeram Ramachandran5fc27572014-05-21 13:08:34 -0700153 if (netId != NETID_UNSET && FwmarkClient::shouldSetFwmark(domain)) {
Sreeram Ramachandrand36c49c2014-07-02 14:49:33 -0700154 if (int error = setNetworkForSocket(netId, socketFd)) {
Sreeram Ramachandran31f42102014-06-20 11:51:48 -0700155 return closeFdAndSetErrno(socketFd, error);
Sreeram Ramachandran5fc27572014-05-21 13:08:34 -0700156 }
157 }
158 return socketFd;
159}
Sreeram Ramachandranefbe05d2014-05-21 11:41:39 -0700160
161unsigned getNetworkForResolv(unsigned netId) {
162 if (netId != NETID_UNSET) {
163 return netId;
164 }
Erik Kline1564d482018-03-07 17:09:35 +0900165 // Special case for DNS-over-TLS bypass; b/72345192 .
166 if ((netIdForResolv & ~NETID_USE_LOCAL_NAMESERVERS) != NETID_UNSET) {
167 return netIdForResolv;
168 }
Sreeram Ramachandranefbe05d2014-05-21 11:41:39 -0700169 netId = netIdForProcess;
170 if (netId != NETID_UNSET) {
171 return netId;
172 }
173 return netIdForResolv;
174}
175
Sreeram Ramachandran31f42102014-06-20 11:51:48 -0700176int setNetworkForTarget(unsigned netId, std::atomic_uint* target) {
Erik Kline1564d482018-03-07 17:09:35 +0900177 const unsigned requestedNetId = netId;
178 netId &= ~NETID_USE_LOCAL_NAMESERVERS;
179
Sreeram Ramachandranefbe05d2014-05-21 11:41:39 -0700180 if (netId == NETID_UNSET) {
181 *target = netId;
Sreeram Ramachandran31f42102014-06-20 11:51:48 -0700182 return 0;
Sreeram Ramachandranefbe05d2014-05-21 11:41:39 -0700183 }
184 // Verify that we are allowed to use |netId|, by creating a socket and trying to have it marked
Sreeram Ramachandran27560452014-05-30 19:59:51 -0700185 // with the netId. Call libcSocket() directly; else the socket creation (via netdClientSocket())
186 // might itself cause another check with the fwmark server, which would be wasteful.
Luke Huangc5efae92018-11-19 17:45:13 +0800187
188 const auto socketFunc = libcSocket ? libcSocket : socket;
189 int socketFd = socketFunc(AF_INET6, SOCK_DGRAM | SOCK_CLOEXEC, 0);
Sreeram Ramachandranefbe05d2014-05-21 11:41:39 -0700190 if (socketFd < 0) {
Sreeram Ramachandran3a069e62014-06-22 11:02:57 -0700191 return -errno;
Sreeram Ramachandranefbe05d2014-05-21 11:41:39 -0700192 }
Sreeram Ramachandran31f42102014-06-20 11:51:48 -0700193 int error = setNetworkForSocket(netId, socketFd);
194 if (!error) {
Lorenzo Colitti6b001262019-01-30 22:43:36 +0900195 *target = requestedNetId;
Sreeram Ramachandranefbe05d2014-05-21 11:41:39 -0700196 }
Sreeram Ramachandran31f42102014-06-20 11:51:48 -0700197 close(socketFd);
198 return error;
Sreeram Ramachandranefbe05d2014-05-21 11:41:39 -0700199}
200
Luke Huangc5efae92018-11-19 17:45:13 +0800201int dns_open_proxy() {
202 const char* cache_mode = getenv("ANDROID_DNS_MODE");
203 const bool use_proxy = (cache_mode == NULL || strcmp(cache_mode, "local") != 0);
204 if (!use_proxy) {
Luke Huang63df9482019-05-25 18:24:03 +0800205 errno = ENOSYS;
Luke Huangc5efae92018-11-19 17:45:13 +0800206 return -1;
207 }
208
209 const auto socketFunc = libcSocket ? libcSocket : socket;
210 int s = socketFunc(AF_UNIX, SOCK_STREAM | SOCK_CLOEXEC, 0);
211 if (s == -1) {
212 return -1;
213 }
214 const int one = 1;
215 setsockopt(s, SOL_SOCKET, SO_REUSEADDR, &one, sizeof(one));
216
217 static const struct sockaddr_un proxy_addr = {
218 .sun_family = AF_UNIX,
219 .sun_path = "/dev/socket/dnsproxyd",
220 };
221
222 const auto connectFunc = libcConnect ? libcConnect : connect;
223 if (TEMP_FAILURE_RETRY(
224 connectFunc(s, (const struct sockaddr*) &proxy_addr, sizeof(proxy_addr))) != 0) {
Luke Huang63df9482019-05-25 18:24:03 +0800225 // Store the errno for connect because we only care about why we can't connect to dnsproxyd
226 int storedErrno = errno;
Luke Huangc5efae92018-11-19 17:45:13 +0800227 close(s);
Luke Huang63df9482019-05-25 18:24:03 +0800228 errno = storedErrno;
Luke Huangc5efae92018-11-19 17:45:13 +0800229 return -1;
230 }
231
232 return s;
233}
234
Luke Huangc68f1b92018-11-21 20:13:38 +0800235auto divCeil(size_t dividend, size_t divisor) {
236 return ((dividend + divisor - 1) / divisor);
237}
238
239// FrameworkListener only does only read() call, and fails if the read doesn't contain \0
240// Do single write here
241int sendData(int fd, const void* buf, size_t size) {
242 if (fd < 0) {
243 return -EBADF;
244 }
245
246 ssize_t rc = TEMP_FAILURE_RETRY(write(fd, (char*) buf, size));
247 if (rc > 0) {
248 return rc;
249 } else if (rc == 0) {
250 return -EIO;
251 } else {
252 return -errno;
253 }
254}
255
256int readData(int fd, void* buf, size_t size) {
257 if (fd < 0) {
258 return -EBADF;
259 }
260
261 size_t current = 0;
262 for (;;) {
263 ssize_t rc = TEMP_FAILURE_RETRY(read(fd, (char*) buf + current, size - current));
264 if (rc > 0) {
265 current += rc;
266 if (current == size) {
267 break;
268 }
269 } else if (rc == 0) {
270 return -EIO;
271 } else {
272 return -errno;
273 }
274 }
275 return 0;
276}
277
278bool readBE32(int fd, int32_t* result) {
279 int32_t tmp;
Luke Huang63df9482019-05-25 18:24:03 +0800280 ssize_t n = TEMP_FAILURE_RETRY(read(fd, &tmp, sizeof(tmp)));
281 if (n < static_cast<ssize_t>(sizeof(tmp))) {
Luke Huangc68f1b92018-11-21 20:13:38 +0800282 return false;
283 }
284 *result = ntohl(tmp);
285 return true;
286}
287
Luke Huang63df9482019-05-25 18:24:03 +0800288bool readResponseCode(int fd, int* result) {
Luke Huang185098d2019-05-20 16:17:12 +0800289 char buf[4];
Luke Huang63df9482019-05-25 18:24:03 +0800290 ssize_t n = TEMP_FAILURE_RETRY(read(fd, &buf, sizeof(buf)));
291 if (n < static_cast<ssize_t>(sizeof(buf))) {
Luke Huang185098d2019-05-20 16:17:12 +0800292 return false;
293 }
294
295 // The format of response code is 3 bytes followed by a space.
296 buf[3] = '\0';
297 if (!ParseInt(buf, result)) {
298 errno = EINVAL;
299 return false;
300 }
301
302 return true;
303}
304
Sreeram Ramachandranf4cfad32014-05-21 08:54:07 -0700305} // namespace
306
Remi NGUYEN VANeabc5da2018-04-24 18:54:58 +0900307#define CHECK_SOCKET_IS_MARKABLE(sock) \
308 do { \
309 int err; \
310 if ((err = checkSocket(sock)) != 0) { \
311 return err; \
312 } \
313 } while (false);
314
Sreeram Ramachandran5fc27572014-05-21 13:08:34 -0700315// accept() just calls accept4(..., 0), so there's no need to handle accept() separately.
316extern "C" void netdClientInitAccept4(Accept4FunctionType* function) {
317 if (function && *function) {
318 libcAccept4 = *function;
319 *function = netdClientAccept4;
320 }
321}
322
Sreeram Ramachandranf4cfad32014-05-21 08:54:07 -0700323extern "C" void netdClientInitConnect(ConnectFunctionType* function) {
324 if (function && *function) {
325 libcConnect = *function;
326 *function = netdClientConnect;
327 }
328}
329
Sreeram Ramachandran5fc27572014-05-21 13:08:34 -0700330extern "C" void netdClientInitSocket(SocketFunctionType* function) {
Sreeram Ramachandranf4cfad32014-05-21 08:54:07 -0700331 if (function && *function) {
Sreeram Ramachandran5fc27572014-05-21 13:08:34 -0700332 libcSocket = *function;
333 *function = netdClientSocket;
Sreeram Ramachandranf4cfad32014-05-21 08:54:07 -0700334 }
335}
Sreeram Ramachandranefbe05d2014-05-21 11:41:39 -0700336
337extern "C" void netdClientInitNetIdForResolv(NetIdForResolvFunctionType* function) {
338 if (function) {
339 *function = getNetworkForResolv;
340 }
341}
342
Luke Huangc5efae92018-11-19 17:45:13 +0800343extern "C" void netdClientInitDnsOpenProxy(DnsOpenProxyType* function) {
344 if (function) {
345 *function = dns_open_proxy;
346 }
347}
348
Sreeram Ramachandran4d4c8b72014-06-20 11:59:40 -0700349extern "C" int getNetworkForSocket(unsigned* netId, int socketFd) {
350 if (!netId || socketFd < 0) {
Sreeram Ramachandran3a069e62014-06-22 11:02:57 -0700351 return -EBADF;
Sreeram Ramachandran4d4c8b72014-06-20 11:59:40 -0700352 }
353 Fwmark fwmark;
354 socklen_t fwmarkLen = sizeof(fwmark.intValue);
355 if (getsockopt(socketFd, SOL_SOCKET, SO_MARK, &fwmark.intValue, &fwmarkLen) == -1) {
Sreeram Ramachandran3a069e62014-06-22 11:02:57 -0700356 return -errno;
Sreeram Ramachandran4d4c8b72014-06-20 11:59:40 -0700357 }
358 *netId = fwmark.netId;
359 return 0;
360}
361
Sreeram Ramachandranefbe05d2014-05-21 11:41:39 -0700362extern "C" unsigned getNetworkForProcess() {
Lorenzo Colitti6b001262019-01-30 22:43:36 +0900363 return netIdForProcess & ~NETID_USE_LOCAL_NAMESERVERS;
Sreeram Ramachandranefbe05d2014-05-21 11:41:39 -0700364}
365
Sreeram Ramachandran31f42102014-06-20 11:51:48 -0700366extern "C" int setNetworkForSocket(unsigned netId, int socketFd) {
Remi NGUYEN VANeabc5da2018-04-24 18:54:58 +0900367 CHECK_SOCKET_IS_MARKABLE(socketFd);
Chenbo Feng9944ba82017-10-10 17:33:20 -0700368 FwmarkCommand command = {FwmarkCommand::SELECT_NETWORK, netId, 0, 0};
Michal Karpinski4b9b78a2016-10-06 19:33:55 +0100369 return FwmarkClient().send(&command, socketFd, nullptr);
Sreeram Ramachandranefbe05d2014-05-21 11:41:39 -0700370}
371
Sreeram Ramachandran31f42102014-06-20 11:51:48 -0700372extern "C" int setNetworkForProcess(unsigned netId) {
Sreeram Ramachandranefbe05d2014-05-21 11:41:39 -0700373 return setNetworkForTarget(netId, &netIdForProcess);
374}
375
Sreeram Ramachandran31f42102014-06-20 11:51:48 -0700376extern "C" int setNetworkForResolv(unsigned netId) {
Sreeram Ramachandranefbe05d2014-05-21 11:41:39 -0700377 return setNetworkForTarget(netId, &netIdForResolv);
378}
Sreeram Ramachandrand794e582014-06-19 10:03:07 -0700379
Sreeram Ramachandran31f42102014-06-20 11:51:48 -0700380extern "C" int protectFromVpn(int socketFd) {
Sreeram Ramachandrand794e582014-06-19 10:03:07 -0700381 if (socketFd < 0) {
Sreeram Ramachandran3a069e62014-06-22 11:02:57 -0700382 return -EBADF;
Sreeram Ramachandrand794e582014-06-19 10:03:07 -0700383 }
Chenbo Feng9944ba82017-10-10 17:33:20 -0700384 FwmarkCommand command = {FwmarkCommand::PROTECT_FROM_VPN, 0, 0, 0};
Michal Karpinski4b9b78a2016-10-06 19:33:55 +0100385 return FwmarkClient().send(&command, socketFd, nullptr);
Sreeram Ramachandrana69d9472014-07-11 16:27:02 -0700386}
387
388extern "C" int setNetworkForUser(uid_t uid, int socketFd) {
Remi NGUYEN VANeabc5da2018-04-24 18:54:58 +0900389 CHECK_SOCKET_IS_MARKABLE(socketFd);
Chenbo Feng9944ba82017-10-10 17:33:20 -0700390 FwmarkCommand command = {FwmarkCommand::SELECT_FOR_USER, 0, uid, 0};
Michal Karpinski4b9b78a2016-10-06 19:33:55 +0100391 return FwmarkClient().send(&command, socketFd, nullptr);
Paul Jensend1df5972015-05-06 07:29:56 -0400392}
393
394extern "C" int queryUserAccess(uid_t uid, unsigned netId) {
Chenbo Feng9944ba82017-10-10 17:33:20 -0700395 FwmarkCommand command = {FwmarkCommand::QUERY_USER_ACCESS, netId, uid, 0};
396 return FwmarkClient().send(&command, -1, nullptr);
397}
398
399extern "C" int tagSocket(int socketFd, uint32_t tag, uid_t uid) {
Remi NGUYEN VANeabc5da2018-04-24 18:54:58 +0900400 CHECK_SOCKET_IS_MARKABLE(socketFd);
Chenbo Feng9944ba82017-10-10 17:33:20 -0700401 FwmarkCommand command = {FwmarkCommand::TAG_SOCKET, 0, uid, tag};
402 return FwmarkClient().send(&command, socketFd, nullptr);
403}
404
405extern "C" int untagSocket(int socketFd) {
Remi NGUYEN VANeabc5da2018-04-24 18:54:58 +0900406 CHECK_SOCKET_IS_MARKABLE(socketFd);
Chenbo Feng9944ba82017-10-10 17:33:20 -0700407 FwmarkCommand command = {FwmarkCommand::UNTAG_SOCKET, 0, 0, 0};
408 return FwmarkClient().send(&command, socketFd, nullptr);
409}
410
411extern "C" int setCounterSet(uint32_t counterSet, uid_t uid) {
412 FwmarkCommand command = {FwmarkCommand::SET_COUNTERSET, 0, uid, counterSet};
413 return FwmarkClient().send(&command, -1, nullptr);
414}
415
416extern "C" int deleteTagData(uint32_t tag, uid_t uid) {
417 FwmarkCommand command = {FwmarkCommand::DELETE_TAGDATA, 0, uid, tag};
Michal Karpinski4b9b78a2016-10-06 19:33:55 +0100418 return FwmarkClient().send(&command, -1, nullptr);
Sreeram Ramachandrand794e582014-06-19 10:03:07 -0700419}
Luke Huangc68f1b92018-11-21 20:13:38 +0800420
Luke Huang110c54e2018-12-20 14:39:58 +0800421extern "C" int resNetworkQuery(unsigned netId, const char* dname, int ns_class, int ns_type,
422 uint32_t flags) {
Luke Huange48fbcb2018-12-17 16:37:33 +0800423 std::vector<uint8_t> buf(MAX_CMD_SIZE, 0);
424 int len = res_mkquery(ns_o_query, dname, ns_class, ns_type, nullptr, 0, nullptr, buf.data(),
425 MAX_CMD_SIZE);
Luke Huangc68f1b92018-11-21 20:13:38 +0800426
Luke Huang110c54e2018-12-20 14:39:58 +0800427 return resNetworkSend(netId, buf.data(), len, flags);
Luke Huangc68f1b92018-11-21 20:13:38 +0800428}
429
Luke Huang952d0942018-12-26 16:53:03 +0800430extern "C" int resNetworkSend(unsigned netId, const uint8_t* msg, size_t msglen, uint32_t flags) {
Luke Huangc68f1b92018-11-21 20:13:38 +0800431 // Encode
432 // Base 64 encodes every 3 bytes into 4 characters, but then adds padding to the next
433 // multiple of 4 and a \0
434 const size_t encodedLen = divCeil(msglen, 3) * 4 + 1;
Luke Huange48fbcb2018-12-17 16:37:33 +0800435 std::string encodedQuery(encodedLen - 1, 0);
Luke Huangc68f1b92018-11-21 20:13:38 +0800436 int enLen = b64_ntop(msg, msglen, encodedQuery.data(), encodedLen);
437
438 if (enLen < 0) {
439 // Unexpected behavior, encode failed
440 // b64_ntop only fails when size is too long.
441 return -EMSGSIZE;
442 }
443 // Send
444 netId = getNetworkForResolv(netId);
Luke Huang952d0942018-12-26 16:53:03 +0800445 const std::string cmd = "resnsend " + std::to_string(netId) + " " + std::to_string(flags) +
446 " " + encodedQuery + '\0';
Luke Huangc68f1b92018-11-21 20:13:38 +0800447 if (cmd.size() > MAX_CMD_SIZE) {
448 // Cmd size must less than buffer size of FrameworkListener
449 return -EMSGSIZE;
450 }
451 int fd = dns_open_proxy();
452 if (fd == -1) {
453 return -errno;
454 }
455 ssize_t rc = sendData(fd, cmd.c_str(), cmd.size());
456 if (rc < 0) {
457 close(fd);
458 return rc;
459 }
460 shutdown(fd, SHUT_WR);
461 return fd;
462}
463
Luke Huange48fbcb2018-12-17 16:37:33 +0800464extern "C" int resNetworkResult(int fd, int* rcode, uint8_t* answer, size_t anslen) {
Luke Huangc68f1b92018-11-21 20:13:38 +0800465 int32_t result = 0;
466 unique_fd ufd(fd);
467 // Read -errno/rcode
468 if (!readBE32(fd, &result)) {
469 // Unexpected behavior, read -errno/rcode fail
470 return -errno;
471 }
472 if (result < 0) {
473 // result < 0, it's -errno
474 return result;
475 }
476 // result >= 0, it's rcode
477 *rcode = result;
478
479 // Read answer
480 int32_t size = 0;
481 if (!readBE32(fd, &size)) {
482 // Unexpected behavior, read ans len fail
483 return -EREMOTEIO;
484 }
Luke Huange48fbcb2018-12-17 16:37:33 +0800485 if (anslen < static_cast<size_t>(size)) {
Luke Huangc68f1b92018-11-21 20:13:38 +0800486 // Answer buffer is too small
487 return -EMSGSIZE;
488 }
489 int rc = readData(fd, answer, size);
490 if (rc < 0) {
491 // Reading the answer failed.
492 return rc;
493 }
494 return size;
495}
496
497extern "C" void resNetworkCancel(int fd) {
498 close(fd);
Lorenzo Colitti6b001262019-01-30 22:43:36 +0900499}
Luke Huang185098d2019-05-20 16:17:12 +0800500
Luke Huang63df9482019-05-25 18:24:03 +0800501extern "C" int getNetworkForDns(unsigned* dnsNetId) {
502 if (dnsNetId == nullptr) return -EFAULT;
Luke Huang185098d2019-05-20 16:17:12 +0800503 int fd = dns_open_proxy();
504 if (fd == -1) {
505 return -errno;
506 }
507 unique_fd ufd(fd);
Luke Huang63df9482019-05-25 18:24:03 +0800508 return getNetworkForDnsInternal(fd, dnsNetId);
509}
510
511int getNetworkForDnsInternal(int fd, unsigned* dnsNetId) {
512 if (fd == -1) {
513 return -EBADF;
514 }
515
516 unsigned resolvNetId = getNetworkForResolv(NETID_UNSET);
517
518 const std::string cmd = "getdnsnetid " + std::to_string(resolvNetId);
Luke Huang185098d2019-05-20 16:17:12 +0800519 ssize_t rc = sendData(fd, cmd.c_str(), cmd.size() + 1);
520 if (rc < 0) {
521 return rc;
522 }
523
524 int responseCode = 0;
525 // Read responseCode
Luke Huang63df9482019-05-25 18:24:03 +0800526 if (!readResponseCode(fd, &responseCode)) {
Luke Huang185098d2019-05-20 16:17:12 +0800527 // Unexpected behavior, read responseCode fail
528 return -errno;
529 }
530
531 if (responseCode != ResponseCode::DnsProxyQueryResult) {
532 return -EOPNOTSUPP;
533 }
534
535 int32_t result = 0;
536 // Read -errno/dnsnetid
537 if (!readBE32(fd, &result)) {
538 // Unexpected behavior, read -errno/dnsnetid fail
539 return -errno;
540 }
541
Luke Huang63df9482019-05-25 18:24:03 +0800542 *dnsNetId = result;
543
544 return 0;
Luke Huang185098d2019-05-20 16:17:12 +0800545}