blob: 19d19c7e8f4a007156c180b1569b7d52e59fdc06 [file] [log] [blame]
San Mehat9ff78fb2010-01-19 12:59:15 -08001/*
2 * Copyright (C) 2008 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
JP Abgrallbaeccc42013-06-25 09:44:10 -070017#define LOG_NDEBUG 0
JP Abgrall0031cea2012-04-17 16:38:23 -070018
San Mehat9ff78fb2010-01-19 12:59:15 -080019#include <stdlib.h>
20#include <errno.h>
21#include <sys/socket.h>
22#include <sys/stat.h>
Rom Lemarchand001f0a42013-01-31 12:41:03 -080023#include <sys/wait.h>
San Mehat9ff78fb2010-01-19 12:59:15 -080024#include <fcntl.h>
25#include <netinet/in.h>
26#include <arpa/inet.h>
Olivier Baillyff2c0d82010-11-17 11:45:07 -080027#include <string.h>
John Michelauac208602011-05-27 22:07:20 -050028#include <cutils/properties.h>
San Mehat9ff78fb2010-01-19 12:59:15 -080029
30#define LOG_TAG "NatController"
31#include <cutils/log.h>
Rom Lemarchand001f0a42013-01-31 12:41:03 -080032#include <logwrap/logwrap.h>
San Mehat9ff78fb2010-01-19 12:59:15 -080033
34#include "NatController.h"
Robert Greenwaltc4621772012-01-31 12:46:45 -080035#include "NetdConstants.h"
Sreeram Ramachandran87475a12014-07-15 16:20:28 -070036#include "RouteController.h"
San Mehat9ff78fb2010-01-19 12:59:15 -080037
Jeff Sharkey8e188ed2012-07-12 18:32:03 -070038const char* NatController::LOCAL_FORWARD = "natctrl_FORWARD";
Lorenzo Colittie8164dd2014-10-02 20:46:23 +090039const char* NatController::LOCAL_MANGLE_FORWARD = "natctrl_mangle_FORWARD";
Jeff Sharkey8e188ed2012-07-12 18:32:03 -070040const char* NatController::LOCAL_NAT_POSTROUTING = "natctrl_nat_POSTROUTING";
JP Abgrallbaeccc42013-06-25 09:44:10 -070041const char* NatController::LOCAL_TETHER_COUNTERS_CHAIN = "natctrl_tether_counters";
Jeff Sharkey8e188ed2012-07-12 18:32:03 -070042
Sreeram Ramachandran87475a12014-07-15 16:20:28 -070043NatController::NatController() {
San Mehat9ff78fb2010-01-19 12:59:15 -080044}
45
46NatController::~NatController() {
47}
48
JP Abgrall4ae80de2013-03-14 20:06:20 -070049struct CommandsAndArgs {
50 /* The array size doesn't really matter as the compiler will barf if too many initializers are specified. */
51 const char *cmd[32];
52 bool checkRes;
53};
54
Rom Lemarchand001f0a42013-01-31 12:41:03 -080055int NatController::runCmd(int argc, const char **argv) {
JP Abgrall11b4e9b2011-08-11 15:34:49 -070056 int res;
San Mehat9ff78fb2010-01-19 12:59:15 -080057
Rom Lemarchand001f0a42013-01-31 12:41:03 -080058 res = android_fork_execvp(argc, (char **)argv, NULL, false, false);
JP Abgrallbaeccc42013-06-25 09:44:10 -070059
60#if !LOG_NDEBUG
61 std::string full_cmd = argv[0];
62 argc--; argv++;
63 /*
64 * HACK: Sometimes runCmd() is called with a ridcously large value (32)
65 * and it works because the argv[] contains a NULL after the last
66 * true argv. So here we use the NULL argv[] to terminate when the argc
67 * is horribly wrong, and argc for the normal cases.
68 */
69 for (; argc && argv[0]; argc--, argv++) {
70 full_cmd += " ";
71 full_cmd += argv[0];
72 }
73 ALOGV("runCmd(%s) res=%d", full_cmd.c_str(), res);
74#endif
JP Abgrall11b4e9b2011-08-11 15:34:49 -070075 return res;
San Mehat9ff78fb2010-01-19 12:59:15 -080076}
77
JP Abgrall0031cea2012-04-17 16:38:23 -070078int NatController::setupIptablesHooks() {
JP Abgrallbaeccc42013-06-25 09:44:10 -070079 int res;
80 res = setDefaults();
81 if (res < 0) {
82 return res;
83 }
84
85 struct CommandsAndArgs defaultCommands[] = {
86 /*
Gordon Gao6b6f22f2014-09-18 11:50:09 -070087 * First chain is for tethering counters.
JP Abgrallbaeccc42013-06-25 09:44:10 -070088 * This chain is reached via --goto, and then RETURNS.
Gordon Gao6b6f22f2014-09-18 11:50:09 -070089 *
90 * Second chain is used to limit downstream mss to the upstream pmtu
91 * so we don't end up fragmenting every large packet tethered devices
92 * send. Note this feature requires kernel support with flag
93 * CONFIG_NETFILTER_XT_TARGET_TCPMSS=y, which not all builds will have,
94 * so the final rule is allowed to fail.
95 * Bug 17629786 asks to make the failure more obvious, or even fatal
96 * so that all builds eventually gain the performance improvement.
JP Abgrallbaeccc42013-06-25 09:44:10 -070097 */
Paul Jensen94b2ab92015-08-04 10:35:05 -040098 {{IPTABLES_PATH, "-w", "-F", LOCAL_TETHER_COUNTERS_CHAIN,}, 0},
99 {{IPTABLES_PATH, "-w", "-X", LOCAL_TETHER_COUNTERS_CHAIN,}, 0},
100 {{IPTABLES_PATH, "-w", "-N", LOCAL_TETHER_COUNTERS_CHAIN,}, 1},
101 {{IPTABLES_PATH, "-w", "-t", "mangle", "-A", LOCAL_MANGLE_FORWARD, "-p", "tcp", "--tcp-flags",
Gordon Gao6b6f22f2014-09-18 11:50:09 -0700102 "SYN", "SYN", "-j", "TCPMSS", "--clamp-mss-to-pmtu"}, 0},
JP Abgrallbaeccc42013-06-25 09:44:10 -0700103 };
104 for (unsigned int cmdNum = 0; cmdNum < ARRAY_SIZE(defaultCommands); cmdNum++) {
105 if (runCmd(ARRAY_SIZE(defaultCommands[cmdNum].cmd), defaultCommands[cmdNum].cmd) &&
106 defaultCommands[cmdNum].checkRes) {
107 return -1;
108 }
109 }
JP Abgrallf3cc83f2013-09-11 20:01:59 -0700110 ifacePairList.clear();
JP Abgrallbaeccc42013-06-25 09:44:10 -0700111
JP Abgrall0031cea2012-04-17 16:38:23 -0700112 return 0;
113}
114
115int NatController::setDefaults() {
JP Abgrallbaeccc42013-06-25 09:44:10 -0700116 /*
117 * The following only works because:
118 * - the defaultsCommands[].cmd array is padded with NULL, and
119 * - the 1st argc of runCmd() will just be the max for the CommandsAndArgs[].cmd, and
120 * - internally it will be memcopied to an array and terminated with a NULL.
121 */
JP Abgrall4ae80de2013-03-14 20:06:20 -0700122 struct CommandsAndArgs defaultCommands[] = {
Paul Jensen94b2ab92015-08-04 10:35:05 -0400123 {{IPTABLES_PATH, "-w", "-F", LOCAL_FORWARD,}, 1},
124 {{IPTABLES_PATH, "-w", "-A", LOCAL_FORWARD, "-j", "DROP"}, 1},
125 {{IPTABLES_PATH, "-w", "-t", "nat", "-F", LOCAL_NAT_POSTROUTING}, 1},
Rom Lemarchand001f0a42013-01-31 12:41:03 -0800126 };
JP Abgrall4ae80de2013-03-14 20:06:20 -0700127 for (unsigned int cmdNum = 0; cmdNum < ARRAY_SIZE(defaultCommands); cmdNum++) {
128 if (runCmd(ARRAY_SIZE(defaultCommands[cmdNum].cmd), defaultCommands[cmdNum].cmd) &&
129 defaultCommands[cmdNum].checkRes) {
130 return -1;
131 }
132 }
Robert Greenwaltfc97b822011-11-02 16:48:36 -0700133
134 natCount = 0;
Kazuhiro Ondo4ab46852012-01-12 16:15:06 -0600135
San Mehat9ff78fb2010-01-19 12:59:15 -0800136 return 0;
137}
138
Sreeram Ramachandran87475a12014-07-15 16:20:28 -0700139int NatController::enableNat(const char* intIface, const char* extIface) {
JP Abgrallbaeccc42013-06-25 09:44:10 -0700140 ALOGV("enableNat(intIface=<%s>, extIface=<%s>)",intIface, extIface);
141
JP Abgrall69261cb2014-06-19 18:35:24 -0700142 if (!isIfaceName(intIface) || !isIfaceName(extIface)) {
San Mehat9ff78fb2010-01-19 12:59:15 -0800143 errno = ENODEV;
144 return -1;
145 }
146
JP Abgrallbaeccc42013-06-25 09:44:10 -0700147 /* Bug: b/9565268. "enableNat wlan0 wlan0". For now we fail until java-land is fixed */
148 if (!strcmp(intIface, extIface)) {
149 ALOGE("Duplicate interface specified: %s %s", intIface, extIface);
150 errno = EINVAL;
151 return -1;
152 }
153
JP Abgrall659692a2013-03-14 20:07:17 -0700154 // add this if we are the first added nat
155 if (natCount == 0) {
156 const char *cmd[] = {
157 IPTABLES_PATH,
Paul Jensen94b2ab92015-08-04 10:35:05 -0400158 "-w",
JP Abgrall659692a2013-03-14 20:07:17 -0700159 "-t",
160 "nat",
161 "-A",
JP Abgrallbaeccc42013-06-25 09:44:10 -0700162 LOCAL_NAT_POSTROUTING,
JP Abgrall659692a2013-03-14 20:07:17 -0700163 "-o",
164 extIface,
165 "-j",
166 "MASQUERADE"
167 };
168 if (runCmd(ARRAY_SIZE(cmd), cmd)) {
Sreeram Ramachandran87475a12014-07-15 16:20:28 -0700169 ALOGE("Error setting postroute rule: iface=%s", extIface);
JP Abgrall659692a2013-03-14 20:07:17 -0700170 // unwind what's been done, but don't care about success - what more could we do?
JP Abgrall659692a2013-03-14 20:07:17 -0700171 setDefaults();
172 return -1;
173 }
174 }
175
JP Abgrall659692a2013-03-14 20:07:17 -0700176 if (setForwardRules(true, intIface, extIface) != 0) {
Steve Block5ea0c052012-01-06 19:18:11 +0000177 ALOGE("Error setting forward rules");
JP Abgrall659692a2013-03-14 20:07:17 -0700178 if (natCount == 0) {
179 setDefaults();
180 }
Robert Greenwaltfc97b822011-11-02 16:48:36 -0700181 errno = ENODEV;
182 return -1;
183 }
184
JP Abgrall0031cea2012-04-17 16:38:23 -0700185 /* Always make sure the drop rule is at the end */
Rom Lemarchand001f0a42013-01-31 12:41:03 -0800186 const char *cmd1[] = {
187 IPTABLES_PATH,
Paul Jensen94b2ab92015-08-04 10:35:05 -0400188 "-w",
Rom Lemarchand001f0a42013-01-31 12:41:03 -0800189 "-D",
JP Abgrallbaeccc42013-06-25 09:44:10 -0700190 LOCAL_FORWARD,
Rom Lemarchand001f0a42013-01-31 12:41:03 -0800191 "-j",
192 "DROP"
193 };
194 runCmd(ARRAY_SIZE(cmd1), cmd1);
195 const char *cmd2[] = {
196 IPTABLES_PATH,
Paul Jensen94b2ab92015-08-04 10:35:05 -0400197 "-w",
Rom Lemarchand001f0a42013-01-31 12:41:03 -0800198 "-A",
JP Abgrallbaeccc42013-06-25 09:44:10 -0700199 LOCAL_FORWARD,
Rom Lemarchand001f0a42013-01-31 12:41:03 -0800200 "-j",
201 "DROP"
202 };
203 runCmd(ARRAY_SIZE(cmd2), cmd2);
JP Abgrall0031cea2012-04-17 16:38:23 -0700204
Robert Greenwaltfc97b822011-11-02 16:48:36 -0700205 natCount++;
Robert Greenwaltfc97b822011-11-02 16:48:36 -0700206 return 0;
207}
208
JP Abgrallf3cc83f2013-09-11 20:01:59 -0700209bool NatController::checkTetherCountingRuleExist(const char *pair_name) {
210 std::list<std::string>::iterator it;
211
212 for (it = ifacePairList.begin(); it != ifacePairList.end(); it++) {
213 if (*it == pair_name) {
214 /* We already have this counter */
215 return true;
216 }
217 }
218 return false;
219}
220
JP Abgrallbaeccc42013-06-25 09:44:10 -0700221int NatController::setTetherCountingRules(bool add, const char *intIface, const char *extIface) {
222
223 /* We only ever add tethering quota rules so that they stick. */
224 if (!add) {
225 return 0;
226 }
Sreeram Ramachandran56afacf2014-05-28 15:07:00 -0700227 char *pair_name;
JP Abgrallf3cc83f2013-09-11 20:01:59 -0700228 asprintf(&pair_name, "%s_%s", intIface, extIface);
JP Abgrallbaeccc42013-06-25 09:44:10 -0700229
JP Abgrallf3cc83f2013-09-11 20:01:59 -0700230 if (checkTetherCountingRuleExist(pair_name)) {
231 free(pair_name);
JP Abgrallbaeccc42013-06-25 09:44:10 -0700232 return 0;
233 }
JP Abgrallbaeccc42013-06-25 09:44:10 -0700234 const char *cmd2b[] = {
235 IPTABLES_PATH,
Paul Jensen94b2ab92015-08-04 10:35:05 -0400236 "-w",
JP Abgrallbaeccc42013-06-25 09:44:10 -0700237 "-A",
238 LOCAL_TETHER_COUNTERS_CHAIN,
239 "-i",
240 intIface,
241 "-o",
242 extIface,
JP Abgrallbaeccc42013-06-25 09:44:10 -0700243 "-j",
244 "RETURN"
245 };
246
247 if (runCmd(ARRAY_SIZE(cmd2b), cmd2b) && add) {
JP Abgrallf3cc83f2013-09-11 20:01:59 -0700248 free(pair_name);
JP Abgrallbaeccc42013-06-25 09:44:10 -0700249 return -1;
250 }
JP Abgrallf3cc83f2013-09-11 20:01:59 -0700251 ifacePairList.push_front(pair_name);
252 free(pair_name);
JP Abgrallbaeccc42013-06-25 09:44:10 -0700253
JP Abgrallf3cc83f2013-09-11 20:01:59 -0700254 asprintf(&pair_name, "%s_%s", extIface, intIface);
255 if (checkTetherCountingRuleExist(pair_name)) {
256 free(pair_name);
JP Abgrallbaeccc42013-06-25 09:44:10 -0700257 return 0;
258 }
JP Abgrallbaeccc42013-06-25 09:44:10 -0700259
260 const char *cmd3b[] = {
261 IPTABLES_PATH,
Paul Jensen94b2ab92015-08-04 10:35:05 -0400262 "-w",
JP Abgrallbaeccc42013-06-25 09:44:10 -0700263 "-A",
264 LOCAL_TETHER_COUNTERS_CHAIN,
265 "-i",
266 extIface,
267 "-o",
268 intIface,
JP Abgrallbaeccc42013-06-25 09:44:10 -0700269 "-j",
270 "RETURN"
271 };
272
273 if (runCmd(ARRAY_SIZE(cmd3b), cmd3b) && add) {
274 // unwind what's been done, but don't care about success - what more could we do?
JP Abgrallf3cc83f2013-09-11 20:01:59 -0700275 free(pair_name);
JP Abgrallbaeccc42013-06-25 09:44:10 -0700276 return -1;
277 }
JP Abgrallf3cc83f2013-09-11 20:01:59 -0700278 ifacePairList.push_front(pair_name);
279 free(pair_name);
JP Abgrallbaeccc42013-06-25 09:44:10 -0700280 return 0;
281}
282
283int NatController::setForwardRules(bool add, const char *intIface, const char *extIface) {
Rom Lemarchand001f0a42013-01-31 12:41:03 -0800284 const char *cmd1[] = {
285 IPTABLES_PATH,
Paul Jensen94b2ab92015-08-04 10:35:05 -0400286 "-w",
Rom Lemarchand001f0a42013-01-31 12:41:03 -0800287 add ? "-A" : "-D",
JP Abgrallbaeccc42013-06-25 09:44:10 -0700288 LOCAL_FORWARD,
Rom Lemarchand001f0a42013-01-31 12:41:03 -0800289 "-i",
290 extIface,
291 "-o",
292 intIface,
293 "-m",
294 "state",
295 "--state",
296 "ESTABLISHED,RELATED",
JP Abgrallbaeccc42013-06-25 09:44:10 -0700297 "-g",
298 LOCAL_TETHER_COUNTERS_CHAIN
Rom Lemarchand001f0a42013-01-31 12:41:03 -0800299 };
300 int rc = 0;
Robert Greenwaltfc97b822011-11-02 16:48:36 -0700301
Rom Lemarchand001f0a42013-01-31 12:41:03 -0800302 if (runCmd(ARRAY_SIZE(cmd1), cmd1) && add) {
San Mehat9ff78fb2010-01-19 12:59:15 -0800303 return -1;
304 }
305
Rom Lemarchand001f0a42013-01-31 12:41:03 -0800306 const char *cmd2[] = {
307 IPTABLES_PATH,
Paul Jensen94b2ab92015-08-04 10:35:05 -0400308 "-w",
Rom Lemarchand001f0a42013-01-31 12:41:03 -0800309 add ? "-A" : "-D",
JP Abgrallbaeccc42013-06-25 09:44:10 -0700310 LOCAL_FORWARD,
Rom Lemarchand001f0a42013-01-31 12:41:03 -0800311 "-i",
312 intIface,
313 "-o",
314 extIface,
315 "-m",
316 "state",
317 "--state",
318 "INVALID",
319 "-j",
320 "DROP"
321 };
322
323 const char *cmd3[] = {
324 IPTABLES_PATH,
Paul Jensen94b2ab92015-08-04 10:35:05 -0400325 "-w",
Rom Lemarchand001f0a42013-01-31 12:41:03 -0800326 add ? "-A" : "-D",
JP Abgrallbaeccc42013-06-25 09:44:10 -0700327 LOCAL_FORWARD,
Rom Lemarchand001f0a42013-01-31 12:41:03 -0800328 "-i",
329 intIface,
330 "-o",
331 extIface,
JP Abgrallbaeccc42013-06-25 09:44:10 -0700332 "-g",
333 LOCAL_TETHER_COUNTERS_CHAIN
Rom Lemarchand001f0a42013-01-31 12:41:03 -0800334 };
335
336 if (runCmd(ARRAY_SIZE(cmd2), cmd2) && add) {
Robert Greenwaltf7bf29c2011-11-01 22:07:28 -0700337 // bail on error, but only if adding
Rom Lemarchand001f0a42013-01-31 12:41:03 -0800338 rc = -1;
339 goto err_invalid_drop;
Robert Greenwaltddb9f6e2011-08-02 13:00:11 -0700340 }
341
Rom Lemarchand001f0a42013-01-31 12:41:03 -0800342 if (runCmd(ARRAY_SIZE(cmd3), cmd3) && add) {
Robert Greenwalt210b9772010-03-25 14:54:45 -0700343 // unwind what's been done, but don't care about success - what more could we do?
Rom Lemarchand001f0a42013-01-31 12:41:03 -0800344 rc = -1;
345 goto err_return;
San Mehat9ff78fb2010-01-19 12:59:15 -0800346 }
JP Abgrall0031cea2012-04-17 16:38:23 -0700347
JP Abgrallbaeccc42013-06-25 09:44:10 -0700348 if (setTetherCountingRules(add, intIface, extIface) && add) {
349 rc = -1;
350 goto err_return;
351 }
352
San Mehat9ff78fb2010-01-19 12:59:15 -0800353 return 0;
Rom Lemarchand001f0a42013-01-31 12:41:03 -0800354
355err_return:
Paul Jensen94b2ab92015-08-04 10:35:05 -0400356 cmd2[2] = "-D";
Rom Lemarchand001f0a42013-01-31 12:41:03 -0800357 runCmd(ARRAY_SIZE(cmd2), cmd2);
358err_invalid_drop:
Paul Jensen94b2ab92015-08-04 10:35:05 -0400359 cmd1[2] = "-D";
Rom Lemarchand001f0a42013-01-31 12:41:03 -0800360 runCmd(ARRAY_SIZE(cmd1), cmd1);
361 return rc;
San Mehat9ff78fb2010-01-19 12:59:15 -0800362}
363
Sreeram Ramachandran87475a12014-07-15 16:20:28 -0700364int NatController::disableNat(const char* intIface, const char* extIface) {
JP Abgrall69261cb2014-06-19 18:35:24 -0700365 if (!isIfaceName(intIface) || !isIfaceName(extIface)) {
Robert Greenwaltfc97b822011-11-02 16:48:36 -0700366 errno = ENODEV;
367 return -1;
368 }
369
Robert Greenwaltfc97b822011-11-02 16:48:36 -0700370 setForwardRules(false, intIface, extIface);
Robert Greenwaltfc97b822011-11-02 16:48:36 -0700371 if (--natCount <= 0) {
Kazuhiro Ondo4ab46852012-01-12 16:15:06 -0600372 // handle decrement to 0 case (do reset to defaults) and erroneous dec below 0
373 setDefaults();
Robert Greenwaltfc97b822011-11-02 16:48:36 -0700374 }
375 return 0;
San Mehat9ff78fb2010-01-19 12:59:15 -0800376}