Pierre Imai | 1cfa543 | 2016-02-24 18:00:03 +0900 | [diff] [blame] | 1 | /* |
| 2 | * Copyright (C) 2016 The Android Open Source Project |
| 3 | * |
| 4 | * Licensed under the Apache License, Version 2.0 (the "License"); |
| 5 | * you may not use this file except in compliance with the License. |
| 6 | * You may obtain a copy of the License at |
| 7 | * |
| 8 | * http://www.apache.org/licenses/LICENSE-2.0 |
| 9 | * |
| 10 | * Unless required by applicable law or agreed to in writing, software |
| 11 | * distributed under the License is distributed on an "AS IS" BASIS, |
| 12 | * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| 13 | * See the License for the specific language governing permissions and |
| 14 | * limitations under the License. |
| 15 | */ |
| 16 | |
Bernie Innocenti | 196f1b8 | 2019-05-20 16:34:16 +0900 | [diff] [blame] | 17 | #include <cinttypes> |
Lorenzo Colitti | adc3a5f | 2017-08-08 17:23:12 +0900 | [diff] [blame] | 18 | #include <regex> |
| 19 | #include <set> |
| 20 | #include <string> |
| 21 | |
Lorenzo Colitti | 05306fb | 2017-02-09 04:56:00 +0900 | [diff] [blame] | 22 | #include <android-base/stringprintf.h> |
Mike Yu | e7e332f | 2019-03-13 17:15:48 +0800 | [diff] [blame] | 23 | #include <android-base/strings.h> |
| 24 | #include <netdutils/Stopwatch.h> |
Lorenzo Colitti | 05306fb | 2017-02-09 04:56:00 +0900 | [diff] [blame] | 25 | |
Lorenzo Colitti | 19ee8a8 | 2017-02-02 12:59:05 +0900 | [diff] [blame] | 26 | #define LOG_TAG "Netd" |
Logan Chien | 3f46148 | 2018-04-23 14:31:32 +0800 | [diff] [blame] | 27 | #include <log/log.h> |
Lorenzo Colitti | 19ee8a8 | 2017-02-02 12:59:05 +0900 | [diff] [blame] | 28 | |
Patrick Rohr | 2dbbb4b | 2023-05-08 14:47:45 -0700 | [diff] [blame] | 29 | #include "ConnmarkFlags.h" |
Pierre Imai | 1cfa543 | 2016-02-24 18:00:03 +0900 | [diff] [blame] | 30 | #include "Controllers.h" |
Lorenzo Colitti | 1ed96e2 | 2017-02-02 12:21:56 +0900 | [diff] [blame] | 31 | #include "IdletimerController.h" |
| 32 | #include "NetworkController.h" |
| 33 | #include "RouteController.h" |
Nathan Harold | 21299f7 | 2018-03-16 20:13:03 -0700 | [diff] [blame] | 34 | #include "XfrmController.h" |
Mike Yu | e7e332f | 2019-03-13 17:15:48 +0800 | [diff] [blame] | 35 | #include "oem_iptables_hook.h" |
Pierre Imai | 1cfa543 | 2016-02-24 18:00:03 +0900 | [diff] [blame] | 36 | |
| 37 | namespace android { |
| 38 | namespace net { |
| 39 | |
Patrick Rohr | 2dbbb4b | 2023-05-08 14:47:45 -0700 | [diff] [blame] | 40 | using android::base::Join; |
Lorenzo Colitti | adc3a5f | 2017-08-08 17:23:12 +0900 | [diff] [blame] | 41 | using android::base::StringAppendF; |
Mike Yu | e7e332f | 2019-03-13 17:15:48 +0800 | [diff] [blame] | 42 | using android::base::StringPrintf; |
| 43 | using android::netdutils::Stopwatch; |
Lorenzo Colitti | adc3a5f | 2017-08-08 17:23:12 +0900 | [diff] [blame] | 44 | |
Lorenzo Colitti | 341d3a0 | 2017-08-08 17:31:35 +0900 | [diff] [blame] | 45 | auto Controllers::execIptablesRestore = ::execIptablesRestore; |
Lorenzo Colitti | adc3a5f | 2017-08-08 17:23:12 +0900 | [diff] [blame] | 46 | auto Controllers::execIptablesRestoreWithOutput = ::execIptablesRestoreWithOutput; |
Lorenzo Colitti | 341d3a0 | 2017-08-08 17:31:35 +0900 | [diff] [blame] | 47 | |
Erik Kline | b31fd69 | 2018-06-06 20:50:11 +0900 | [diff] [blame] | 48 | netdutils::Log gLog("netd"); |
Luke Huang | 528af60 | 2018-08-29 19:06:05 +0800 | [diff] [blame] | 49 | netdutils::Log gUnsolicitedLog("netdUnsolicited"); |
Erik Kline | b31fd69 | 2018-06-06 20:50:11 +0900 | [diff] [blame] | 50 | |
Lorenzo Colitti | 1ed96e2 | 2017-02-02 12:21:56 +0900 | [diff] [blame] | 51 | namespace { |
Lorenzo Colitti | adc3a5f | 2017-08-08 17:23:12 +0900 | [diff] [blame] | 52 | |
Patrick Rohr | 282d8ac | 2023-05-08 12:00:46 -0700 | [diff] [blame] | 53 | static constexpr char CONNMARK_MANGLE_INPUT[] = "connmark_mangle_INPUT"; |
| 54 | static constexpr char CONNMARK_MANGLE_OUTPUT[] = "connmark_mangle_OUTPUT"; |
| 55 | |
Lorenzo Colitti | 1ed96e2 | 2017-02-02 12:21:56 +0900 | [diff] [blame] | 56 | /** |
| 57 | * List of module chains to be created, along with explicit ordering. ORDERING |
| 58 | * IS CRITICAL, AND SHOULD BE TRIPLE-CHECKED WITH EACH CHANGE. |
| 59 | */ |
Lorenzo Colitti | adc3a5f | 2017-08-08 17:23:12 +0900 | [diff] [blame] | 60 | static const std::vector<const char*> FILTER_INPUT = { |
Lorenzo Colitti | 1ed96e2 | 2017-02-02 12:21:56 +0900 | [diff] [blame] | 61 | // Bandwidth should always be early in input chain, to make sure we |
| 62 | // correctly count incoming traffic against data plan. |
| 63 | BandwidthController::LOCAL_INPUT, |
| 64 | FirewallController::LOCAL_INPUT, |
Lorenzo Colitti | 1ed96e2 | 2017-02-02 12:21:56 +0900 | [diff] [blame] | 65 | }; |
| 66 | |
Lorenzo Colitti | adc3a5f | 2017-08-08 17:23:12 +0900 | [diff] [blame] | 67 | static const std::vector<const char*> FILTER_FORWARD = { |
Lorenzo Colitti | 1ed96e2 | 2017-02-02 12:21:56 +0900 | [diff] [blame] | 68 | OEM_IPTABLES_FILTER_FORWARD, |
| 69 | FirewallController::LOCAL_FORWARD, |
| 70 | BandwidthController::LOCAL_FORWARD, |
Lorenzo Colitti | a93126d | 2017-08-24 13:28:19 +0900 | [diff] [blame] | 71 | TetherController::LOCAL_FORWARD, |
Lorenzo Colitti | 1ed96e2 | 2017-02-02 12:21:56 +0900 | [diff] [blame] | 72 | }; |
| 73 | |
Lorenzo Colitti | adc3a5f | 2017-08-08 17:23:12 +0900 | [diff] [blame] | 74 | static const std::vector<const char*> FILTER_OUTPUT = { |
Lorenzo Colitti | 1ed96e2 | 2017-02-02 12:21:56 +0900 | [diff] [blame] | 75 | OEM_IPTABLES_FILTER_OUTPUT, |
| 76 | FirewallController::LOCAL_OUTPUT, |
| 77 | StrictController::LOCAL_OUTPUT, |
| 78 | BandwidthController::LOCAL_OUTPUT, |
Lorenzo Colitti | 1ed96e2 | 2017-02-02 12:21:56 +0900 | [diff] [blame] | 79 | }; |
| 80 | |
Lorenzo Colitti | adc3a5f | 2017-08-08 17:23:12 +0900 | [diff] [blame] | 81 | static const std::vector<const char*> RAW_PREROUTING = { |
Maciej Żenczykowski | e2d12d6 | 2021-06-10 17:23:22 -0700 | [diff] [blame] | 82 | IdletimerController::LOCAL_RAW_PREROUTING, |
Lorenzo Colitti | 1ed96e2 | 2017-02-02 12:21:56 +0900 | [diff] [blame] | 83 | BandwidthController::LOCAL_RAW_PREROUTING, |
Lorenzo Colitti | a93126d | 2017-08-24 13:28:19 +0900 | [diff] [blame] | 84 | TetherController::LOCAL_RAW_PREROUTING, |
Lorenzo Colitti | 1ed96e2 | 2017-02-02 12:21:56 +0900 | [diff] [blame] | 85 | }; |
| 86 | |
Lorenzo Colitti | adc3a5f | 2017-08-08 17:23:12 +0900 | [diff] [blame] | 87 | static const std::vector<const char*> MANGLE_POSTROUTING = { |
Lorenzo Colitti | 05306fb | 2017-02-09 04:56:00 +0900 | [diff] [blame] | 88 | OEM_IPTABLES_MANGLE_POSTROUTING, |
Lorenzo Colitti | 1ed96e2 | 2017-02-02 12:21:56 +0900 | [diff] [blame] | 89 | BandwidthController::LOCAL_MANGLE_POSTROUTING, |
| 90 | IdletimerController::LOCAL_MANGLE_POSTROUTING, |
Lorenzo Colitti | 1ed96e2 | 2017-02-02 12:21:56 +0900 | [diff] [blame] | 91 | }; |
| 92 | |
Lorenzo Colitti | adc3a5f | 2017-08-08 17:23:12 +0900 | [diff] [blame] | 93 | static const std::vector<const char*> MANGLE_INPUT = { |
Patrick Rohr | 282d8ac | 2023-05-08 12:00:46 -0700 | [diff] [blame] | 94 | CONNMARK_MANGLE_INPUT, |
Joel Scherpelz | 08b84cd | 2017-05-22 13:11:54 +0900 | [diff] [blame] | 95 | WakeupController::LOCAL_MANGLE_INPUT, |
Lorenzo Colitti | d78843e | 2017-03-27 05:52:31 +0900 | [diff] [blame] | 96 | RouteController::LOCAL_MANGLE_INPUT, |
Lorenzo Colitti | d78843e | 2017-03-27 05:52:31 +0900 | [diff] [blame] | 97 | }; |
| 98 | |
Lorenzo Colitti | adc3a5f | 2017-08-08 17:23:12 +0900 | [diff] [blame] | 99 | static const std::vector<const char*> MANGLE_FORWARD = { |
Lorenzo Colitti | a93126d | 2017-08-24 13:28:19 +0900 | [diff] [blame] | 100 | TetherController::LOCAL_MANGLE_FORWARD, |
Lorenzo Colitti | 1ed96e2 | 2017-02-02 12:21:56 +0900 | [diff] [blame] | 101 | }; |
| 102 | |
Patrick Rohr | 282d8ac | 2023-05-08 12:00:46 -0700 | [diff] [blame] | 103 | static const std::vector<const char*> MANGLE_OUTPUT = { |
| 104 | CONNMARK_MANGLE_OUTPUT, |
| 105 | }; |
| 106 | |
Lorenzo Colitti | adc3a5f | 2017-08-08 17:23:12 +0900 | [diff] [blame] | 107 | static const std::vector<const char*> NAT_PREROUTING = { |
Lorenzo Colitti | 1ed96e2 | 2017-02-02 12:21:56 +0900 | [diff] [blame] | 108 | OEM_IPTABLES_NAT_PREROUTING, |
Lorenzo Colitti | 1ed96e2 | 2017-02-02 12:21:56 +0900 | [diff] [blame] | 109 | }; |
| 110 | |
Lorenzo Colitti | adc3a5f | 2017-08-08 17:23:12 +0900 | [diff] [blame] | 111 | static const std::vector<const char*> NAT_POSTROUTING = { |
Lorenzo Colitti | a93126d | 2017-08-24 13:28:19 +0900 | [diff] [blame] | 112 | TetherController::LOCAL_NAT_POSTROUTING, |
Lorenzo Colitti | 1ed96e2 | 2017-02-02 12:21:56 +0900 | [diff] [blame] | 113 | }; |
| 114 | |
Lorenzo Colitti | adc3a5f | 2017-08-08 17:23:12 +0900 | [diff] [blame] | 115 | // Commands to create child chains and to match created chains in iptables -S output. Keep in sync. |
| 116 | static const char* CHILD_CHAIN_TEMPLATE = "-A %s -j %s\n"; |
| 117 | static const std::regex CHILD_CHAIN_REGEX("^-A ([^ ]+) -j ([^ ]+)$", |
| 118 | std::regex_constants::extended); |
| 119 | |
Lorenzo Colitti | 341d3a0 | 2017-08-08 17:31:35 +0900 | [diff] [blame] | 120 | } // namespace |
| 121 | |
| 122 | /* static */ |
Lorenzo Colitti | adc3a5f | 2017-08-08 17:23:12 +0900 | [diff] [blame] | 123 | std::set<std::string> Controllers::findExistingChildChains(const IptablesTarget target, |
| 124 | const char* table, |
| 125 | const char* parentChain) { |
| 126 | if (target == V4V6) { |
| 127 | ALOGE("findExistingChildChains only supports one protocol at a time"); |
| 128 | abort(); |
| 129 | } |
| 130 | |
| 131 | std::set<std::string> existing; |
| 132 | |
| 133 | // List the current contents of parentChain. |
| 134 | // |
| 135 | // TODO: there is no guarantee that nothing else modifies the chain in the few milliseconds |
| 136 | // between when we list the existing rules and when we delete them. However: |
| 137 | // - Since this code is only run on startup, nothing else in netd will be running. |
| 138 | // - While vendor code is known to add its own rules to chains created by netd, it should never |
| 139 | // be modifying the rules in childChains or the rules that hook said chains into their parent |
| 140 | // chains. |
| 141 | std::string command = StringPrintf("*%s\n-S %s\nCOMMIT\n", table, parentChain); |
| 142 | std::string output; |
| 143 | if (Controllers::execIptablesRestoreWithOutput(target, command, &output) == -1) { |
Maciej Żenczykowski | 5a58ba3 | 2022-06-17 02:41:23 -0700 | [diff] [blame] | 144 | ALOGE("Error listing chain %s in table %s", parentChain, table); |
Lorenzo Colitti | adc3a5f | 2017-08-08 17:23:12 +0900 | [diff] [blame] | 145 | return existing; |
| 146 | } |
| 147 | |
| 148 | // The only rules added by createChildChains are of the simple form "-A <parent> -j <child>". |
| 149 | // Find those rules and add each one's child chain to existing. |
| 150 | std::smatch matches; |
| 151 | std::stringstream stream(output); |
| 152 | std::string rule; |
| 153 | while (std::getline(stream, rule, '\n')) { |
| 154 | if (std::regex_search(rule, matches, CHILD_CHAIN_REGEX) && matches[1] == parentChain) { |
| 155 | existing.insert(matches[2]); |
| 156 | } |
| 157 | } |
| 158 | |
| 159 | return existing; |
| 160 | } |
| 161 | |
| 162 | /* static */ |
Lorenzo Colitti | 341d3a0 | 2017-08-08 17:31:35 +0900 | [diff] [blame] | 163 | void Controllers::createChildChains(IptablesTarget target, const char* table, |
| 164 | const char* parentChain, |
Lorenzo Colitti | adc3a5f | 2017-08-08 17:23:12 +0900 | [diff] [blame] | 165 | const std::vector<const char*>& childChains, |
Lorenzo Colitti | 341d3a0 | 2017-08-08 17:31:35 +0900 | [diff] [blame] | 166 | bool exclusive) { |
Lorenzo Colitti | adc3a5f | 2017-08-08 17:23:12 +0900 | [diff] [blame] | 167 | std::string command = StringPrintf("*%s\n", table); |
Lorenzo Colitti | cda022e | 2017-02-03 12:35:46 +0900 | [diff] [blame] | 168 | |
Lorenzo Colitti | adc3a5f | 2017-08-08 17:23:12 +0900 | [diff] [blame] | 169 | // We cannot just clear all the chains we create because vendor code modifies filter OUTPUT and |
| 170 | // mangle POSTROUTING directly. So: |
| 171 | // |
| 172 | // - If we're the exclusive owner of this chain, simply clear it entirely. |
| 173 | // - If not, then list the chain's current contents to ensure that if we restart after a crash, |
| 174 | // we leave the existing rules alone in the positions they currently occupy. This is faster |
| 175 | // than blindly deleting our rules and recreating them, because deleting a rule that doesn't |
| 176 | // exists causes iptables-restore to quit, which takes ~30ms per delete. It's also more |
| 177 | // correct, because if we delete rules and re-add them, they'll be in the wrong position with |
| 178 | // regards to the vendor rules. |
| 179 | // |
Lorenzo Colitti | cda022e | 2017-02-03 12:35:46 +0900 | [diff] [blame] | 180 | // TODO: Make all chains exclusive once vendor code uses the oem_* rules. |
Lorenzo Colitti | adc3a5f | 2017-08-08 17:23:12 +0900 | [diff] [blame] | 181 | std::set<std::string> existingChildChains; |
Lorenzo Colitti | cda022e | 2017-02-03 12:35:46 +0900 | [diff] [blame] | 182 | if (exclusive) { |
| 183 | // Just running ":chain -" flushes user-defined chains, but not built-in chains like INPUT. |
| 184 | // Since at this point we don't know if parentChain is a built-in chain, do both. |
Lorenzo Colitti | adc3a5f | 2017-08-08 17:23:12 +0900 | [diff] [blame] | 185 | StringAppendF(&command, ":%s -\n", parentChain); |
| 186 | StringAppendF(&command, "-F %s\n", parentChain); |
| 187 | } else { |
| 188 | existingChildChains = findExistingChildChains(target, table, parentChain); |
Lorenzo Colitti | cda022e | 2017-02-03 12:35:46 +0900 | [diff] [blame] | 189 | } |
| 190 | |
Lorenzo Colitti | adc3a5f | 2017-08-08 17:23:12 +0900 | [diff] [blame] | 191 | for (const auto& childChain : childChains) { |
| 192 | // Always clear the child chain. |
| 193 | StringAppendF(&command, ":%s -\n", childChain); |
| 194 | // But only add it to the parent chain if it's not already there. |
| 195 | if (existingChildChains.find(childChain) == existingChildChains.end()) { |
| 196 | StringAppendF(&command, CHILD_CHAIN_TEMPLATE, parentChain, childChain); |
Lorenzo Colitti | cda022e | 2017-02-03 12:35:46 +0900 | [diff] [blame] | 197 | } |
Lorenzo Colitti | adc3a5f | 2017-08-08 17:23:12 +0900 | [diff] [blame] | 198 | } |
Lorenzo Colitti | 341d3a0 | 2017-08-08 17:31:35 +0900 | [diff] [blame] | 199 | command += "COMMIT\n"; |
Lorenzo Colitti | 05306fb | 2017-02-09 04:56:00 +0900 | [diff] [blame] | 200 | execIptablesRestore(target, command); |
| 201 | } |
| 202 | |
Joel Scherpelz | 08b84cd | 2017-05-22 13:11:54 +0900 | [diff] [blame] | 203 | Controllers::Controllers() |
Hungming Chen | f0ac3df | 2022-04-22 15:25:23 +0800 | [diff] [blame] | 204 | : wakeupCtrl( |
Erik Kline | b31fd69 | 2018-06-06 20:50:11 +0900 | [diff] [blame] | 205 | [this](const WakeupController::ReportArgs& args) { |
| 206 | const auto listener = eventReporter.getNetdEventListener(); |
| 207 | if (listener == nullptr) { |
| 208 | gLog.error("getNetdEventListener() returned nullptr. dropping wakeup event"); |
| 209 | return; |
| 210 | } |
| 211 | String16 prefix = String16(args.prefix.c_str()); |
| 212 | String16 srcIp = String16(args.srcIp.c_str()); |
| 213 | String16 dstIp = String16(args.dstIp.c_str()); |
| 214 | listener->onWakeupEvent(prefix, args.uid, args.ethertype, args.ipNextHeader, |
| 215 | args.dstHw, srcIp, dstIp, args.srcPort, args.dstPort, |
| 216 | args.timestampNs); |
| 217 | }, |
| 218 | &iptablesRestoreCtrl) { |
Erik Kline | 2c5aaa1 | 2016-06-08 13:24:45 +0900 | [diff] [blame] | 219 | InterfaceController::initializeAll(); |
| 220 | } |
Pierre Imai | 1cfa543 | 2016-02-24 18:00:03 +0900 | [diff] [blame] | 221 | |
Lorenzo Colitti | 341d3a0 | 2017-08-08 17:31:35 +0900 | [diff] [blame] | 222 | void Controllers::initChildChains() { |
Lorenzo Colitti | 1ed96e2 | 2017-02-02 12:21:56 +0900 | [diff] [blame] | 223 | /* |
| 224 | * This is the only time we touch top-level chains in iptables; controllers |
| 225 | * should only mutate rules inside of their children chains, as created by |
| 226 | * the constants above. |
| 227 | * |
| 228 | * Modules should never ACCEPT packets (except in well-justified cases); |
| 229 | * they should instead defer to any remaining modules using RETURN, or |
| 230 | * otherwise DROP/REJECT. |
| 231 | */ |
| 232 | |
Lorenzo Colitti | 05306fb | 2017-02-09 04:56:00 +0900 | [diff] [blame] | 233 | // Create chains for child modules. |
Lorenzo Colitti | cda022e | 2017-02-03 12:35:46 +0900 | [diff] [blame] | 234 | createChildChains(V4V6, "filter", "INPUT", FILTER_INPUT, true); |
| 235 | createChildChains(V4V6, "filter", "FORWARD", FILTER_FORWARD, true); |
Lorenzo Colitti | cda022e | 2017-02-03 12:35:46 +0900 | [diff] [blame] | 236 | createChildChains(V4V6, "raw", "PREROUTING", RAW_PREROUTING, true); |
Lorenzo Colitti | cda022e | 2017-02-03 12:35:46 +0900 | [diff] [blame] | 237 | createChildChains(V4V6, "mangle", "FORWARD", MANGLE_FORWARD, true); |
Lorenzo Colitti | d78843e | 2017-03-27 05:52:31 +0900 | [diff] [blame] | 238 | createChildChains(V4V6, "mangle", "INPUT", MANGLE_INPUT, true); |
Patrick Rohr | 282d8ac | 2023-05-08 12:00:46 -0700 | [diff] [blame] | 239 | createChildChains(V4V6, "mangle", "OUTPUT", MANGLE_OUTPUT, true); |
Lorenzo Colitti | cda022e | 2017-02-03 12:35:46 +0900 | [diff] [blame] | 240 | createChildChains(V4, "nat", "PREROUTING", NAT_PREROUTING, true); |
| 241 | createChildChains(V4, "nat", "POSTROUTING", NAT_POSTROUTING, true); |
Lorenzo Colitti | 341d3a0 | 2017-08-08 17:31:35 +0900 | [diff] [blame] | 242 | |
Lorenzo Colitti | adc3a5f | 2017-08-08 17:23:12 +0900 | [diff] [blame] | 243 | createChildChains(V4, "filter", "OUTPUT", FILTER_OUTPUT, false); |
| 244 | createChildChains(V6, "filter", "OUTPUT", FILTER_OUTPUT, false); |
| 245 | createChildChains(V4, "mangle", "POSTROUTING", MANGLE_POSTROUTING, false); |
| 246 | createChildChains(V6, "mangle", "POSTROUTING", MANGLE_POSTROUTING, false); |
Lorenzo Colitti | 341d3a0 | 2017-08-08 17:31:35 +0900 | [diff] [blame] | 247 | } |
| 248 | |
Patrick Rohr | 2dbbb4b | 2023-05-08 14:47:45 -0700 | [diff] [blame] | 249 | static void setupConnmarkIptablesHooks() { |
Patrick Rohr | 2dbbb4b | 2023-05-08 14:47:45 -0700 | [diff] [blame] | 250 | // Rules to store parts of the fwmark (namely: netId, explicitlySelected, protectedFromVpn, |
| 251 | // permission) in connmark. |
| 252 | // Only saves the mark if no mark has been set before. |
Patrick Rohr | c31e277 | 2024-05-15 21:31:09 +0000 | [diff] [blame] | 253 | static_assert(std::string_view(CONNMARK_MANGLE_INPUT) == "connmark_mangle_INPUT"); |
| 254 | static_assert(std::string_view(CONNMARK_MANGLE_OUTPUT) == "connmark_mangle_OUTPUT"); |
| 255 | static_assert(CONNMARK_FWMARK_MASK == 0x000FFFFF); |
| 256 | const std::string cmd( |
| 257 | // CONNMARK: |
| 258 | // --save-mark [--nfmask nfmask] [--ctmask ctmask] |
| 259 | // Copy the packet mark (nfmark) to the connection mark (ctmark) using the given |
| 260 | // masks. The new nfmark value is determined as follows: |
| 261 | // ctmark = (ctmark & ~ctmask) ^ (nfmark & nfmask) |
| 262 | // i.e. ctmask defines what bits to clear and nfmask what bits of the nfmark to |
| 263 | // XOR into the ctmark. ctmask and nfmask default to 0xFFFFFFFF. |
| 264 | "*mangle\n" |
| 265 | "-A connmark_mangle_INPUT -m connmark --mark 0/0x000FFFFF " |
| 266 | "-j CONNMARK --save-mark --ctmask 0x000FFFFF --nfmask 0x000FFFFF\n" |
| 267 | "-A connmark_mangle_OUTPUT -m connmark --mark 0/0x000FFFFF " |
| 268 | "-j CONNMARK --save-mark --ctmask 0x000FFFFF --nfmask 0x000FFFFF\n" |
| 269 | "COMMIT\n"); |
| 270 | execIptablesRestore(V4V6, cmd); |
Patrick Rohr | 2dbbb4b | 2023-05-08 14:47:45 -0700 | [diff] [blame] | 271 | } |
| 272 | |
Lorenzo Colitti | 341d3a0 | 2017-08-08 17:31:35 +0900 | [diff] [blame] | 273 | void Controllers::initIptablesRules() { |
| 274 | Stopwatch s; |
| 275 | initChildChains(); |
Bernie Innocenti | 196f1b8 | 2019-05-20 16:34:16 +0900 | [diff] [blame] | 276 | gLog.info("Creating child chains: %" PRId64 "us", s.getTimeAndResetUs()); |
Lorenzo Colitti | 1ed96e2 | 2017-02-02 12:21:56 +0900 | [diff] [blame] | 277 | |
| 278 | // Let each module setup their child chains |
| 279 | setupOemIptablesHook(); |
Bernie Innocenti | 196f1b8 | 2019-05-20 16:34:16 +0900 | [diff] [blame] | 280 | gLog.info("Setting up OEM hooks: %" PRId64 "us", s.getTimeAndResetUs()); |
Lorenzo Colitti | 1ed96e2 | 2017-02-02 12:21:56 +0900 | [diff] [blame] | 281 | |
| 282 | /* When enabled, DROPs all packets except those matching rules. */ |
| 283 | firewallCtrl.setupIptablesHooks(); |
Bernie Innocenti | 196f1b8 | 2019-05-20 16:34:16 +0900 | [diff] [blame] | 284 | gLog.info("Setting up FirewallController hooks: %" PRId64 "us", s.getTimeAndResetUs()); |
Lorenzo Colitti | 1ed96e2 | 2017-02-02 12:21:56 +0900 | [diff] [blame] | 285 | |
| 286 | /* Does DROPs in FORWARD by default */ |
Lorenzo Colitti | a93126d | 2017-08-24 13:28:19 +0900 | [diff] [blame] | 287 | tetherCtrl.setupIptablesHooks(); |
Bernie Innocenti | 196f1b8 | 2019-05-20 16:34:16 +0900 | [diff] [blame] | 288 | gLog.info("Setting up TetherController hooks: %" PRId64 "us", s.getTimeAndResetUs()); |
Lorenzo Colitti | 19ee8a8 | 2017-02-02 12:59:05 +0900 | [diff] [blame] | 289 | |
Lorenzo Colitti | 1ed96e2 | 2017-02-02 12:21:56 +0900 | [diff] [blame] | 290 | /* |
| 291 | * Does REJECT in INPUT, OUTPUT. Does counting also. |
| 292 | * No DROP/REJECT allowed later in netfilter-flow hook order. |
| 293 | */ |
| 294 | bandwidthCtrl.setupIptablesHooks(); |
Bernie Innocenti | 196f1b8 | 2019-05-20 16:34:16 +0900 | [diff] [blame] | 295 | gLog.info("Setting up BandwidthController hooks: %" PRId64 "us", s.getTimeAndResetUs()); |
Lorenzo Colitti | 19ee8a8 | 2017-02-02 12:59:05 +0900 | [diff] [blame] | 296 | |
Lorenzo Colitti | 1ed96e2 | 2017-02-02 12:21:56 +0900 | [diff] [blame] | 297 | /* |
| 298 | * Counts in nat: PREROUTING, POSTROUTING. |
| 299 | * No DROP/REJECT allowed later in netfilter-flow hook order. |
| 300 | */ |
| 301 | idletimerCtrl.setupIptablesHooks(); |
Bernie Innocenti | 196f1b8 | 2019-05-20 16:34:16 +0900 | [diff] [blame] | 302 | gLog.info("Setting up IdletimerController hooks: %" PRId64 "us", s.getTimeAndResetUs()); |
Luke Huang | a67dd56 | 2018-07-17 19:58:25 +0800 | [diff] [blame] | 303 | |
| 304 | /* |
| 305 | * Add rules for detecting IPv6/IPv4 TCP/UDP connections with TLS/DTLS header |
| 306 | */ |
| 307 | strictCtrl.setupIptablesHooks(); |
Bernie Innocenti | 196f1b8 | 2019-05-20 16:34:16 +0900 | [diff] [blame] | 308 | gLog.info("Setting up StrictController hooks: %" PRId64 "us", s.getTimeAndResetUs()); |
Patrick Rohr | 2dbbb4b | 2023-05-08 14:47:45 -0700 | [diff] [blame] | 309 | |
| 310 | /* |
| 311 | * Add rules for storing netid in connmark. |
| 312 | */ |
| 313 | setupConnmarkIptablesHooks(); |
| 314 | gLog.info("Setting up connmark hooks: %" PRId64 "us", s.getTimeAndResetUs()); |
Lorenzo Colitti | 1ed96e2 | 2017-02-02 12:21:56 +0900 | [diff] [blame] | 315 | } |
| 316 | |
| 317 | void Controllers::init() { |
| 318 | initIptablesRules(); |
Lorenzo Colitti | 19ee8a8 | 2017-02-02 12:59:05 +0900 | [diff] [blame] | 319 | Stopwatch s; |
Maciej Żenczykowski | 1c086e5 | 2019-03-29 23:13:49 -0700 | [diff] [blame] | 320 | |
Maciej Żenczykowski | 38e049f | 2022-06-14 16:49:58 -0700 | [diff] [blame] | 321 | if (int ret = bandwidthCtrl.enableBandwidthControl()) { |
| 322 | gLog.error("Failed to initialize BandwidthController (%s)", strerror(-ret)); |
| 323 | // A failure to init almost definitely means that iptables failed to load |
| 324 | // our static ruleset, which then basically means network accounting will not work. |
| 325 | // As such simply exit netd. This may crash loop the system, but by failing |
| 326 | // to bootup we will trigger rollback and thus this offers us protection against |
| 327 | // a mainline update breaking things. |
| 328 | exit(1); |
| 329 | } |
Bernie Innocenti | 196f1b8 | 2019-05-20 16:34:16 +0900 | [diff] [blame] | 330 | gLog.info("Enabling bandwidth control: %" PRId64 "us", s.getTimeAndResetUs()); |
Lorenzo Colitti | 1ed96e2 | 2017-02-02 12:21:56 +0900 | [diff] [blame] | 331 | |
Chenbo Feng | c10a8a4 | 2017-12-15 13:56:33 -0800 | [diff] [blame] | 332 | if (int ret = RouteController::Init(NetworkController::LOCAL_NET_ID)) { |
Erik Kline | b31fd69 | 2018-06-06 20:50:11 +0900 | [diff] [blame] | 333 | gLog.error("Failed to initialize RouteController (%s)", strerror(-ret)); |
Lorenzo Colitti | 1ed96e2 | 2017-02-02 12:21:56 +0900 | [diff] [blame] | 334 | } |
Bernie Innocenti | 196f1b8 | 2019-05-20 16:34:16 +0900 | [diff] [blame] | 335 | gLog.info("Initializing RouteController: %" PRId64 "us", s.getTimeAndResetUs()); |
Nathan Harold | 21299f7 | 2018-03-16 20:13:03 -0700 | [diff] [blame] | 336 | |
| 337 | netdutils::Status xStatus = XfrmController::Init(); |
| 338 | if (!isOk(xStatus)) { |
Erik Kline | b31fd69 | 2018-06-06 20:50:11 +0900 | [diff] [blame] | 339 | gLog.error("Failed to initialize XfrmController (%s)", netdutils::toString(xStatus).c_str()); |
Nathan Harold | 21299f7 | 2018-03-16 20:13:03 -0700 | [diff] [blame] | 340 | }; |
Bernie Innocenti | 196f1b8 | 2019-05-20 16:34:16 +0900 | [diff] [blame] | 341 | gLog.info("Initializing XfrmController: %" PRId64 "us", s.getTimeAndResetUs()); |
Lorenzo Colitti | 1ed96e2 | 2017-02-02 12:21:56 +0900 | [diff] [blame] | 342 | } |
| 343 | |
Pierre Imai | 1cfa543 | 2016-02-24 18:00:03 +0900 | [diff] [blame] | 344 | Controllers* gCtls = nullptr; |
| 345 | |
| 346 | } // namespace net |
| 347 | } // namespace android |