blob: 40f78f68a895658295472e0c9c8f3b44703bf811 [file] [log] [blame]
Robert Greenwaltc4621772012-01-31 12:46:45 -08001/*
2 * Copyright (C) 2012 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
Dan Albertaa1be2b2015-01-06 09:36:17 -080017#include <ctype.h>
18#include <errno.h>
Lorenzo Colitti70afde62013-03-04 17:58:40 +090019#include <fcntl.h>
Lorenzo Colittiba25df92014-06-18 00:22:17 +090020#include <netdb.h>
Dan Albertaa1be2b2015-01-06 09:36:17 -080021#include <net/if.h>
Lorenzo Colittiba25df92014-06-18 00:22:17 +090022#include <netinet/in.h>
23#include <stdlib.h>
Jeff Sharkey8e188ed2012-07-12 18:32:03 -070024#include <string.h>
Rom Lemarchand838ef642013-01-24 15:14:41 -080025#include <sys/wait.h>
Jeff Sharkey8e188ed2012-07-12 18:32:03 -070026
Jeff Sharkeybec6d042012-09-06 15:45:56 -070027#define LOG_TAG "Netd"
28
Lorenzo Colittic1306ea2017-03-27 05:52:31 +090029#include <android-base/stringprintf.h>
Lorenzo Colitti548bbd42017-08-28 23:05:12 +090030#include <cutils/sockets.h>
Logan Chien3f461482018-04-23 14:31:32 +080031#include <log/log.h>
Rom Lemarchand838ef642013-01-24 15:14:41 -080032#include <logwrap/logwrap.h>
Jeff Sharkey8e188ed2012-07-12 18:32:03 -070033
Narayan Kamatha5ace892017-01-06 15:10:02 +000034#include "Controllers.h"
Robert Greenwaltc4621772012-01-31 12:46:45 -080035#include "NetdConstants.h"
Narayan Kamatha5ace892017-01-06 15:10:02 +000036#include "IptablesRestoreController.h"
Robert Greenwaltc4621772012-01-31 12:46:45 -080037
Lorenzo Colitticd283772017-01-31 19:00:49 +090038int execIptablesRestoreWithOutput(IptablesTarget target, const std::string& commands,
39 std::string *output) {
40 return android::net::gCtls->iptablesRestoreCtrl.execute(target, commands, output);
41}
42
Lorenzo Colitti89faa342016-02-26 11:38:47 +090043int execIptablesRestore(IptablesTarget target, const std::string& commands) {
Lorenzo Colitticd283772017-01-31 19:00:49 +090044 return execIptablesRestoreWithOutput(target, commands, nullptr);
Lorenzo Colitti89faa342016-02-26 11:38:47 +090045}
46
Lorenzo Colittic1306ea2017-03-27 05:52:31 +090047int execIptablesRestoreCommand(IptablesTarget target, const std::string& table,
48 const std::string& command, std::string *output) {
49 std::string fullCmd = android::base::StringPrintf("*%s\n%s\nCOMMIT\n", table.c_str(),
50 command.c_str());
51 return execIptablesRestoreWithOutput(target, fullCmd, output);
52}
53
JP Abgrall69261cb2014-06-19 18:35:24 -070054/*
55 * Check an interface name for plausibility. This should e.g. help against
56 * directory traversal.
57 */
Joel Scherpelzbcad6612017-05-30 10:55:11 +090058bool isIfaceName(const std::string& name) {
JP Abgrall69261cb2014-06-19 18:35:24 -070059 size_t i;
Joel Scherpelzbcad6612017-05-30 10:55:11 +090060 if ((name.empty()) || (name.size() > IFNAMSIZ)) {
JP Abgrall69261cb2014-06-19 18:35:24 -070061 return false;
62 }
63
64 /* First character must be alphanumeric */
65 if (!isalnum(name[0])) {
66 return false;
67 }
68
Joel Scherpelzbcad6612017-05-30 10:55:11 +090069 for (i = 1; i < name.size(); i++) {
JP Abgrall69261cb2014-06-19 18:35:24 -070070 if (!isalnum(name[i]) && (name[i] != '_') && (name[i] != '-') && (name[i] != ':')) {
71 return false;
72 }
73 }
74
75 return true;
76}
Lorenzo Colittiba25df92014-06-18 00:22:17 +090077
78int parsePrefix(const char *prefix, uint8_t *family, void *address, int size, uint8_t *prefixlen) {
79 if (!prefix || !family || !address || !prefixlen) {
80 return -EFAULT;
81 }
82
83 // Find the '/' separating address from prefix length.
84 const char *slash = strchr(prefix, '/');
85 const char *prefixlenString = slash + 1;
86 if (!slash || !*prefixlenString)
87 return -EINVAL;
88
89 // Convert the prefix length to a uint8_t.
90 char *endptr;
91 unsigned templen;
92 templen = strtoul(prefixlenString, &endptr, 10);
93 if (*endptr || templen > 255) {
94 return -EINVAL;
95 }
96 *prefixlen = templen;
97
98 // Copy the address part of the prefix to a local buffer. We have to copy
99 // because inet_pton and getaddrinfo operate on null-terminated address
100 // strings, but prefix is const and has '/' after the address.
101 std::string addressString(prefix, slash - prefix);
102
103 // Parse the address.
104 addrinfo *res;
105 addrinfo hints = {
106 .ai_flags = AI_NUMERICHOST,
107 };
Yi Kongbdfd57e2018-07-25 13:26:10 -0700108 int ret = getaddrinfo(addressString.c_str(), nullptr, &hints, &res);
Lorenzo Colittiba25df92014-06-18 00:22:17 +0900109 if (ret || !res) {
110 return -EINVAL; // getaddrinfo return values are not errno values.
111 }
112
113 // Convert the address string to raw address bytes.
114 void *rawAddress;
115 int rawLength;
116 switch (res[0].ai_family) {
117 case AF_INET: {
118 if (*prefixlen > 32) {
119 return -EINVAL;
120 }
121 sockaddr_in *sin = (sockaddr_in *) res[0].ai_addr;
122 rawAddress = &sin->sin_addr;
123 rawLength = 4;
124 break;
125 }
126 case AF_INET6: {
127 if (*prefixlen > 128) {
128 return -EINVAL;
129 }
130 sockaddr_in6 *sin6 = (sockaddr_in6 *) res[0].ai_addr;
131 rawAddress = &sin6->sin6_addr;
132 rawLength = 16;
133 break;
134 }
135 default: {
136 freeaddrinfo(res);
137 return -EAFNOSUPPORT;
138 }
139 }
140
141 if (rawLength > size) {
142 freeaddrinfo(res);
143 return -ENOSPC;
144 }
145
146 *family = res[0].ai_family;
147 memcpy(address, rawAddress, rawLength);
148 freeaddrinfo(res);
149
150 return rawLength;
151}
Lorenzo Colitti839d7d62017-04-03 15:37:19 +0900152
153void blockSigpipe() {
154 sigset_t mask;
155
156 sigemptyset(&mask);
157 sigaddset(&mask, SIGPIPE);
Yi Kongbdfd57e2018-07-25 13:26:10 -0700158 if (sigprocmask(SIG_BLOCK, &mask, nullptr) != 0)
Lorenzo Colitti839d7d62017-04-03 15:37:19 +0900159 ALOGW("WARNING: SIGPIPE not blocked\n");
160}
Lorenzo Colitti548bbd42017-08-28 23:05:12 +0900161
162void setCloseOnExec(const char *sock) {
163 int fd = android_get_control_socket(sock);
164 int flags = fcntl(fd, F_GETFD, 0);
165 if (flags == -1) {
166 ALOGE("Can't get fd flags for control socket %s", sock);
167 flags = 0;
168 }
169 flags |= FD_CLOEXEC;
170 if (fcntl(fd, F_SETFD, flags) == -1) {
171 ALOGE("Can't set control socket %s to FD_CLOEXEC", sock);
172 }
173}