blob: e66d9715a7a693aef6772cb73561a811bf3b52b6 [file] [log] [blame]
San Mehat9ff78fb2010-01-19 12:59:15 -08001/*
2 * Copyright (C) 2008 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
JP Abgrallbaeccc42013-06-25 09:44:10 -070017#define LOG_NDEBUG 0
JP Abgrall0031cea2012-04-17 16:38:23 -070018
San Mehat9ff78fb2010-01-19 12:59:15 -080019#include <stdlib.h>
20#include <errno.h>
21#include <sys/socket.h>
22#include <sys/stat.h>
Rom Lemarchand001f0a42013-01-31 12:41:03 -080023#include <sys/wait.h>
San Mehat9ff78fb2010-01-19 12:59:15 -080024#include <fcntl.h>
25#include <netinet/in.h>
26#include <arpa/inet.h>
Olivier Baillyff2c0d82010-11-17 11:45:07 -080027#include <string.h>
John Michelauac208602011-05-27 22:07:20 -050028#include <cutils/properties.h>
San Mehat9ff78fb2010-01-19 12:59:15 -080029
30#define LOG_TAG "NatController"
31#include <cutils/log.h>
Rom Lemarchand001f0a42013-01-31 12:41:03 -080032#include <logwrap/logwrap.h>
San Mehat9ff78fb2010-01-19 12:59:15 -080033
34#include "NatController.h"
Robert Greenwaltc4621772012-01-31 12:46:45 -080035#include "NetdConstants.h"
Sreeram Ramachandran87475a12014-07-15 16:20:28 -070036#include "RouteController.h"
San Mehat9ff78fb2010-01-19 12:59:15 -080037
Jeff Sharkey8e188ed2012-07-12 18:32:03 -070038const char* NatController::LOCAL_FORWARD = "natctrl_FORWARD";
Lorenzo Colittie8164dd2014-10-02 20:46:23 +090039const char* NatController::LOCAL_MANGLE_FORWARD = "natctrl_mangle_FORWARD";
Jeff Sharkey8e188ed2012-07-12 18:32:03 -070040const char* NatController::LOCAL_NAT_POSTROUTING = "natctrl_nat_POSTROUTING";
JP Abgrallbaeccc42013-06-25 09:44:10 -070041const char* NatController::LOCAL_TETHER_COUNTERS_CHAIN = "natctrl_tether_counters";
Jeff Sharkey8e188ed2012-07-12 18:32:03 -070042
Sreeram Ramachandran87475a12014-07-15 16:20:28 -070043NatController::NatController() {
San Mehat9ff78fb2010-01-19 12:59:15 -080044}
45
46NatController::~NatController() {
47}
48
JP Abgrall4ae80de2013-03-14 20:06:20 -070049struct CommandsAndArgs {
50 /* The array size doesn't really matter as the compiler will barf if too many initializers are specified. */
51 const char *cmd[32];
52 bool checkRes;
53};
54
Rom Lemarchand001f0a42013-01-31 12:41:03 -080055int NatController::runCmd(int argc, const char **argv) {
JP Abgrall11b4e9b2011-08-11 15:34:49 -070056 int res;
San Mehat9ff78fb2010-01-19 12:59:15 -080057
Rom Lemarchand001f0a42013-01-31 12:41:03 -080058 res = android_fork_execvp(argc, (char **)argv, NULL, false, false);
JP Abgrallbaeccc42013-06-25 09:44:10 -070059
60#if !LOG_NDEBUG
61 std::string full_cmd = argv[0];
62 argc--; argv++;
63 /*
64 * HACK: Sometimes runCmd() is called with a ridcously large value (32)
65 * and it works because the argv[] contains a NULL after the last
66 * true argv. So here we use the NULL argv[] to terminate when the argc
67 * is horribly wrong, and argc for the normal cases.
68 */
69 for (; argc && argv[0]; argc--, argv++) {
70 full_cmd += " ";
71 full_cmd += argv[0];
72 }
73 ALOGV("runCmd(%s) res=%d", full_cmd.c_str(), res);
74#endif
JP Abgrall11b4e9b2011-08-11 15:34:49 -070075 return res;
San Mehat9ff78fb2010-01-19 12:59:15 -080076}
77
JP Abgrall0031cea2012-04-17 16:38:23 -070078int NatController::setupIptablesHooks() {
JP Abgrallbaeccc42013-06-25 09:44:10 -070079 int res;
80 res = setDefaults();
81 if (res < 0) {
82 return res;
83 }
84
85 struct CommandsAndArgs defaultCommands[] = {
86 /*
Gordon Gao6b6f22f2014-09-18 11:50:09 -070087 * First chain is for tethering counters.
JP Abgrallbaeccc42013-06-25 09:44:10 -070088 * This chain is reached via --goto, and then RETURNS.
Gordon Gao6b6f22f2014-09-18 11:50:09 -070089 *
90 * Second chain is used to limit downstream mss to the upstream pmtu
91 * so we don't end up fragmenting every large packet tethered devices
92 * send. Note this feature requires kernel support with flag
93 * CONFIG_NETFILTER_XT_TARGET_TCPMSS=y, which not all builds will have,
94 * so the final rule is allowed to fail.
95 * Bug 17629786 asks to make the failure more obvious, or even fatal
96 * so that all builds eventually gain the performance improvement.
JP Abgrallbaeccc42013-06-25 09:44:10 -070097 */
98 {{IPTABLES_PATH, "-F", LOCAL_TETHER_COUNTERS_CHAIN,}, 0},
99 {{IPTABLES_PATH, "-X", LOCAL_TETHER_COUNTERS_CHAIN,}, 0},
100 {{IPTABLES_PATH, "-N", LOCAL_TETHER_COUNTERS_CHAIN,}, 1},
Lorenzo Colittie8164dd2014-10-02 20:46:23 +0900101 {{IPTABLES_PATH, "-t", "mangle", "-A", LOCAL_MANGLE_FORWARD, "-p", "tcp", "--tcp-flags",
Gordon Gao6b6f22f2014-09-18 11:50:09 -0700102 "SYN", "SYN", "-j", "TCPMSS", "--clamp-mss-to-pmtu"}, 0},
JP Abgrallbaeccc42013-06-25 09:44:10 -0700103 };
104 for (unsigned int cmdNum = 0; cmdNum < ARRAY_SIZE(defaultCommands); cmdNum++) {
105 if (runCmd(ARRAY_SIZE(defaultCommands[cmdNum].cmd), defaultCommands[cmdNum].cmd) &&
106 defaultCommands[cmdNum].checkRes) {
107 return -1;
108 }
109 }
JP Abgrallf3cc83f2013-09-11 20:01:59 -0700110 ifacePairList.clear();
JP Abgrallbaeccc42013-06-25 09:44:10 -0700111
JP Abgrall0031cea2012-04-17 16:38:23 -0700112 return 0;
113}
114
115int NatController::setDefaults() {
JP Abgrallbaeccc42013-06-25 09:44:10 -0700116 /*
117 * The following only works because:
118 * - the defaultsCommands[].cmd array is padded with NULL, and
119 * - the 1st argc of runCmd() will just be the max for the CommandsAndArgs[].cmd, and
120 * - internally it will be memcopied to an array and terminated with a NULL.
121 */
JP Abgrall4ae80de2013-03-14 20:06:20 -0700122 struct CommandsAndArgs defaultCommands[] = {
JP Abgrallbaeccc42013-06-25 09:44:10 -0700123 {{IPTABLES_PATH, "-F", LOCAL_FORWARD,}, 1},
124 {{IPTABLES_PATH, "-A", LOCAL_FORWARD, "-j", "DROP"}, 1},
125 {{IPTABLES_PATH, "-t", "nat", "-F", LOCAL_NAT_POSTROUTING}, 1},
Rom Lemarchand001f0a42013-01-31 12:41:03 -0800126 };
JP Abgrall4ae80de2013-03-14 20:06:20 -0700127 for (unsigned int cmdNum = 0; cmdNum < ARRAY_SIZE(defaultCommands); cmdNum++) {
128 if (runCmd(ARRAY_SIZE(defaultCommands[cmdNum].cmd), defaultCommands[cmdNum].cmd) &&
129 defaultCommands[cmdNum].checkRes) {
130 return -1;
131 }
132 }
Robert Greenwaltfc97b822011-11-02 16:48:36 -0700133
134 natCount = 0;
Kazuhiro Ondo4ab46852012-01-12 16:15:06 -0600135
San Mehat9ff78fb2010-01-19 12:59:15 -0800136 return 0;
137}
138
Sreeram Ramachandran87475a12014-07-15 16:20:28 -0700139int NatController::enableNat(const char* intIface, const char* extIface) {
JP Abgrallbaeccc42013-06-25 09:44:10 -0700140 ALOGV("enableNat(intIface=<%s>, extIface=<%s>)",intIface, extIface);
141
JP Abgrall69261cb2014-06-19 18:35:24 -0700142 if (!isIfaceName(intIface) || !isIfaceName(extIface)) {
San Mehat9ff78fb2010-01-19 12:59:15 -0800143 errno = ENODEV;
144 return -1;
145 }
146
JP Abgrallbaeccc42013-06-25 09:44:10 -0700147 /* Bug: b/9565268. "enableNat wlan0 wlan0". For now we fail until java-land is fixed */
148 if (!strcmp(intIface, extIface)) {
149 ALOGE("Duplicate interface specified: %s %s", intIface, extIface);
150 errno = EINVAL;
151 return -1;
152 }
153
JP Abgrall659692a2013-03-14 20:07:17 -0700154 // add this if we are the first added nat
155 if (natCount == 0) {
156 const char *cmd[] = {
157 IPTABLES_PATH,
158 "-t",
159 "nat",
160 "-A",
JP Abgrallbaeccc42013-06-25 09:44:10 -0700161 LOCAL_NAT_POSTROUTING,
JP Abgrall659692a2013-03-14 20:07:17 -0700162 "-o",
163 extIface,
164 "-j",
165 "MASQUERADE"
166 };
167 if (runCmd(ARRAY_SIZE(cmd), cmd)) {
Sreeram Ramachandran87475a12014-07-15 16:20:28 -0700168 ALOGE("Error setting postroute rule: iface=%s", extIface);
JP Abgrall659692a2013-03-14 20:07:17 -0700169 // unwind what's been done, but don't care about success - what more could we do?
JP Abgrall659692a2013-03-14 20:07:17 -0700170 setDefaults();
171 return -1;
172 }
173 }
174
JP Abgrall659692a2013-03-14 20:07:17 -0700175 if (setForwardRules(true, intIface, extIface) != 0) {
Steve Block5ea0c052012-01-06 19:18:11 +0000176 ALOGE("Error setting forward rules");
JP Abgrall659692a2013-03-14 20:07:17 -0700177 if (natCount == 0) {
178 setDefaults();
179 }
Robert Greenwaltfc97b822011-11-02 16:48:36 -0700180 errno = ENODEV;
181 return -1;
182 }
183
JP Abgrall0031cea2012-04-17 16:38:23 -0700184 /* Always make sure the drop rule is at the end */
Rom Lemarchand001f0a42013-01-31 12:41:03 -0800185 const char *cmd1[] = {
186 IPTABLES_PATH,
187 "-D",
JP Abgrallbaeccc42013-06-25 09:44:10 -0700188 LOCAL_FORWARD,
Rom Lemarchand001f0a42013-01-31 12:41:03 -0800189 "-j",
190 "DROP"
191 };
192 runCmd(ARRAY_SIZE(cmd1), cmd1);
193 const char *cmd2[] = {
194 IPTABLES_PATH,
195 "-A",
JP Abgrallbaeccc42013-06-25 09:44:10 -0700196 LOCAL_FORWARD,
Rom Lemarchand001f0a42013-01-31 12:41:03 -0800197 "-j",
198 "DROP"
199 };
200 runCmd(ARRAY_SIZE(cmd2), cmd2);
JP Abgrall0031cea2012-04-17 16:38:23 -0700201
Sreeram Ramachandran87475a12014-07-15 16:20:28 -0700202 if (int ret = RouteController::enableTethering(intIface, extIface)) {
203 ALOGE("failed to add tethering rule for iif=%s oif=%s", intIface, extIface);
Sreeram Ramachandran8b3b91c2014-07-22 12:40:36 -0700204 if (natCount == 0) {
205 setDefaults();
206 }
Sreeram Ramachandran87475a12014-07-15 16:20:28 -0700207 errno = -ret;
208 return -1;
209 }
210
Robert Greenwaltfc97b822011-11-02 16:48:36 -0700211 natCount++;
Robert Greenwaltfc97b822011-11-02 16:48:36 -0700212 return 0;
213}
214
JP Abgrallf3cc83f2013-09-11 20:01:59 -0700215bool NatController::checkTetherCountingRuleExist(const char *pair_name) {
216 std::list<std::string>::iterator it;
217
218 for (it = ifacePairList.begin(); it != ifacePairList.end(); it++) {
219 if (*it == pair_name) {
220 /* We already have this counter */
221 return true;
222 }
223 }
224 return false;
225}
226
JP Abgrallbaeccc42013-06-25 09:44:10 -0700227int NatController::setTetherCountingRules(bool add, const char *intIface, const char *extIface) {
228
229 /* We only ever add tethering quota rules so that they stick. */
230 if (!add) {
231 return 0;
232 }
Sreeram Ramachandran56afacf2014-05-28 15:07:00 -0700233 char *pair_name;
JP Abgrallf3cc83f2013-09-11 20:01:59 -0700234 asprintf(&pair_name, "%s_%s", intIface, extIface);
JP Abgrallbaeccc42013-06-25 09:44:10 -0700235
JP Abgrallf3cc83f2013-09-11 20:01:59 -0700236 if (checkTetherCountingRuleExist(pair_name)) {
237 free(pair_name);
JP Abgrallbaeccc42013-06-25 09:44:10 -0700238 return 0;
239 }
JP Abgrallbaeccc42013-06-25 09:44:10 -0700240 const char *cmd2b[] = {
241 IPTABLES_PATH,
242 "-A",
243 LOCAL_TETHER_COUNTERS_CHAIN,
244 "-i",
245 intIface,
246 "-o",
247 extIface,
JP Abgrallbaeccc42013-06-25 09:44:10 -0700248 "-j",
249 "RETURN"
250 };
251
252 if (runCmd(ARRAY_SIZE(cmd2b), cmd2b) && add) {
JP Abgrallf3cc83f2013-09-11 20:01:59 -0700253 free(pair_name);
JP Abgrallbaeccc42013-06-25 09:44:10 -0700254 return -1;
255 }
JP Abgrallf3cc83f2013-09-11 20:01:59 -0700256 ifacePairList.push_front(pair_name);
257 free(pair_name);
JP Abgrallbaeccc42013-06-25 09:44:10 -0700258
JP Abgrallf3cc83f2013-09-11 20:01:59 -0700259 asprintf(&pair_name, "%s_%s", extIface, intIface);
260 if (checkTetherCountingRuleExist(pair_name)) {
261 free(pair_name);
JP Abgrallbaeccc42013-06-25 09:44:10 -0700262 return 0;
263 }
JP Abgrallbaeccc42013-06-25 09:44:10 -0700264
265 const char *cmd3b[] = {
266 IPTABLES_PATH,
267 "-A",
268 LOCAL_TETHER_COUNTERS_CHAIN,
269 "-i",
270 extIface,
271 "-o",
272 intIface,
JP Abgrallbaeccc42013-06-25 09:44:10 -0700273 "-j",
274 "RETURN"
275 };
276
277 if (runCmd(ARRAY_SIZE(cmd3b), cmd3b) && add) {
278 // unwind what's been done, but don't care about success - what more could we do?
JP Abgrallf3cc83f2013-09-11 20:01:59 -0700279 free(pair_name);
JP Abgrallbaeccc42013-06-25 09:44:10 -0700280 return -1;
281 }
JP Abgrallf3cc83f2013-09-11 20:01:59 -0700282 ifacePairList.push_front(pair_name);
283 free(pair_name);
JP Abgrallbaeccc42013-06-25 09:44:10 -0700284 return 0;
285}
286
287int NatController::setForwardRules(bool add, const char *intIface, const char *extIface) {
Rom Lemarchand001f0a42013-01-31 12:41:03 -0800288 const char *cmd1[] = {
289 IPTABLES_PATH,
290 add ? "-A" : "-D",
JP Abgrallbaeccc42013-06-25 09:44:10 -0700291 LOCAL_FORWARD,
Rom Lemarchand001f0a42013-01-31 12:41:03 -0800292 "-i",
293 extIface,
294 "-o",
295 intIface,
296 "-m",
297 "state",
298 "--state",
299 "ESTABLISHED,RELATED",
JP Abgrallbaeccc42013-06-25 09:44:10 -0700300 "-g",
301 LOCAL_TETHER_COUNTERS_CHAIN
Rom Lemarchand001f0a42013-01-31 12:41:03 -0800302 };
303 int rc = 0;
Robert Greenwaltfc97b822011-11-02 16:48:36 -0700304
Rom Lemarchand001f0a42013-01-31 12:41:03 -0800305 if (runCmd(ARRAY_SIZE(cmd1), cmd1) && add) {
San Mehat9ff78fb2010-01-19 12:59:15 -0800306 return -1;
307 }
308
Rom Lemarchand001f0a42013-01-31 12:41:03 -0800309 const char *cmd2[] = {
310 IPTABLES_PATH,
311 add ? "-A" : "-D",
JP Abgrallbaeccc42013-06-25 09:44:10 -0700312 LOCAL_FORWARD,
Rom Lemarchand001f0a42013-01-31 12:41:03 -0800313 "-i",
314 intIface,
315 "-o",
316 extIface,
317 "-m",
318 "state",
319 "--state",
320 "INVALID",
321 "-j",
322 "DROP"
323 };
324
325 const char *cmd3[] = {
326 IPTABLES_PATH,
327 add ? "-A" : "-D",
JP Abgrallbaeccc42013-06-25 09:44:10 -0700328 LOCAL_FORWARD,
Rom Lemarchand001f0a42013-01-31 12:41:03 -0800329 "-i",
330 intIface,
331 "-o",
332 extIface,
JP Abgrallbaeccc42013-06-25 09:44:10 -0700333 "-g",
334 LOCAL_TETHER_COUNTERS_CHAIN
Rom Lemarchand001f0a42013-01-31 12:41:03 -0800335 };
336
337 if (runCmd(ARRAY_SIZE(cmd2), cmd2) && add) {
Robert Greenwaltf7bf29c2011-11-01 22:07:28 -0700338 // bail on error, but only if adding
Rom Lemarchand001f0a42013-01-31 12:41:03 -0800339 rc = -1;
340 goto err_invalid_drop;
Robert Greenwaltddb9f6e2011-08-02 13:00:11 -0700341 }
342
Rom Lemarchand001f0a42013-01-31 12:41:03 -0800343 if (runCmd(ARRAY_SIZE(cmd3), cmd3) && add) {
Robert Greenwalt210b9772010-03-25 14:54:45 -0700344 // unwind what's been done, but don't care about success - what more could we do?
Rom Lemarchand001f0a42013-01-31 12:41:03 -0800345 rc = -1;
346 goto err_return;
San Mehat9ff78fb2010-01-19 12:59:15 -0800347 }
JP Abgrall0031cea2012-04-17 16:38:23 -0700348
JP Abgrallbaeccc42013-06-25 09:44:10 -0700349 if (setTetherCountingRules(add, intIface, extIface) && add) {
350 rc = -1;
351 goto err_return;
352 }
353
San Mehat9ff78fb2010-01-19 12:59:15 -0800354 return 0;
Rom Lemarchand001f0a42013-01-31 12:41:03 -0800355
356err_return:
357 cmd2[1] = "-D";
358 runCmd(ARRAY_SIZE(cmd2), cmd2);
359err_invalid_drop:
360 cmd1[1] = "-D";
361 runCmd(ARRAY_SIZE(cmd1), cmd1);
362 return rc;
San Mehat9ff78fb2010-01-19 12:59:15 -0800363}
364
Sreeram Ramachandran87475a12014-07-15 16:20:28 -0700365int NatController::disableNat(const char* intIface, const char* extIface) {
JP Abgrall69261cb2014-06-19 18:35:24 -0700366 if (!isIfaceName(intIface) || !isIfaceName(extIface)) {
Robert Greenwaltfc97b822011-11-02 16:48:36 -0700367 errno = ENODEV;
368 return -1;
369 }
370
Sreeram Ramachandran87475a12014-07-15 16:20:28 -0700371 if (int ret = RouteController::disableTethering(intIface, extIface)) {
372 ALOGE("failed to remove tethering rule for iif=%s oif=%s", intIface, extIface);
373 errno = -ret;
Robert Greenwaltfc97b822011-11-02 16:48:36 -0700374 return -1;
375 }
376
377 setForwardRules(false, intIface, extIface);
Robert Greenwaltfc97b822011-11-02 16:48:36 -0700378 if (--natCount <= 0) {
Kazuhiro Ondo4ab46852012-01-12 16:15:06 -0600379 // handle decrement to 0 case (do reset to defaults) and erroneous dec below 0
380 setDefaults();
Robert Greenwaltfc97b822011-11-02 16:48:36 -0700381 }
382 return 0;
San Mehat9ff78fb2010-01-19 12:59:15 -0800383}