You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
229 lines
8.3 KiB
229 lines
8.3 KiB
/*
|
|
* Copyright (C) 2017 The Android Open Source Project
|
|
*
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
* you may not use this file except in compliance with the License.
|
|
* You may obtain a copy of the License at
|
|
*
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
*
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
* See the License for the specific language governing permissions and
|
|
* limitations under the License.
|
|
*/
|
|
|
|
#define LOG_TAG "WakeupController"
|
|
|
|
#include <arpa/inet.h>
|
|
#include <iostream>
|
|
#include <linux/netfilter/nfnetlink.h>
|
|
#include <linux/netfilter/nfnetlink_log.h>
|
|
#include <sys/socket.h>
|
|
#include <netinet/if_ether.h>
|
|
#include <netinet/in.h>
|
|
#include <netinet/ip.h>
|
|
#include <netinet/ip6.h>
|
|
#include <netinet/tcp.h>
|
|
#include <netinet/udp.h>
|
|
|
|
#include <android-base/strings.h>
|
|
#include <android-base/stringprintf.h>
|
|
#include <log/log.h>
|
|
#include <netdutils/Netfilter.h>
|
|
#include <netdutils/Netlink.h>
|
|
|
|
#include "IptablesRestoreController.h"
|
|
#include "NetlinkManager.h"
|
|
#include "WakeupController.h"
|
|
|
|
namespace android {
|
|
namespace net {
|
|
|
|
using base::StringPrintf;
|
|
using netdutils::Slice;
|
|
using netdutils::Status;
|
|
|
|
const char WakeupController::LOCAL_MANGLE_INPUT[] = "wakeupctrl_mangle_INPUT";
|
|
|
|
const uint32_t WakeupController::kDefaultPacketCopyRange =
|
|
sizeof(struct tcphdr) + sizeof(struct ip6_hdr);
|
|
|
|
static void extractIpPorts(WakeupController::ReportArgs& args, Slice payload) {
|
|
switch (args.ipNextHeader) {
|
|
case IPPROTO_TCP: {
|
|
struct tcphdr header;
|
|
if (extract(payload, header) < sizeof(struct tcphdr)) {
|
|
return;
|
|
}
|
|
args.srcPort = ntohs(header.th_sport);
|
|
args.dstPort = ntohs(header.th_dport);
|
|
break;
|
|
}
|
|
case IPPROTO_UDP: {
|
|
struct udphdr header;
|
|
if (extract(payload, header) < sizeof(struct udphdr)) {
|
|
return;
|
|
}
|
|
args.srcPort = ntohs(header.uh_sport);
|
|
args.dstPort = ntohs(header.uh_dport);
|
|
break;
|
|
}
|
|
default:
|
|
break;
|
|
}
|
|
}
|
|
|
|
static void extractIpHeader(WakeupController::ReportArgs& args, Slice payload) {
|
|
switch (args.ethertype) {
|
|
case ETH_P_IP: {
|
|
struct iphdr header;
|
|
if (extract(payload, header) < sizeof(struct iphdr)) {
|
|
return;
|
|
}
|
|
args.ipNextHeader = header.protocol;
|
|
char addr[INET_ADDRSTRLEN] = {};
|
|
inet_ntop(AF_INET, &header.saddr, addr, sizeof(addr));
|
|
args.srcIp = addr;
|
|
inet_ntop(AF_INET, &header.daddr, addr, sizeof(addr));
|
|
args.dstIp = addr;
|
|
extractIpPorts(args, drop(payload, header.ihl * 4)); // ipv4 IHL counts 32 bit words.
|
|
break;
|
|
}
|
|
case ETH_P_IPV6: {
|
|
struct ip6_hdr header;
|
|
if (extract(payload, header) < sizeof(struct ip6_hdr)) {
|
|
return;
|
|
}
|
|
args.ipNextHeader = header.ip6_nxt;
|
|
char addr[INET6_ADDRSTRLEN] = {};
|
|
inet_ntop(AF_INET6, &header.ip6_src, addr, sizeof(addr));
|
|
args.srcIp = addr;
|
|
inet_ntop(AF_INET6, &header.ip6_dst, addr, sizeof(addr));
|
|
args.dstIp = addr;
|
|
// TODO: also deal with extension headers
|
|
if (args.ipNextHeader == IPPROTO_TCP || args.ipNextHeader == IPPROTO_UDP) {
|
|
extractIpPorts(args, drop(payload, sizeof(header)));
|
|
}
|
|
break;
|
|
}
|
|
default:
|
|
break;
|
|
}
|
|
}
|
|
|
|
WakeupController::~WakeupController() {
|
|
expectOk(mListener->unsubscribe(NetlinkManager::NFLOG_WAKEUP_GROUP));
|
|
}
|
|
|
|
netdutils::Status WakeupController::init(NFLogListenerInterface* listener) {
|
|
mListener = listener;
|
|
const auto msgHandler = [this](const nlmsghdr&, const nfgenmsg&, const Slice msg) {
|
|
|
|
struct WakeupController::ReportArgs args = {
|
|
.uid = -1,
|
|
.gid = -1,
|
|
.ethertype = -1,
|
|
.ipNextHeader = -1,
|
|
.srcPort = -1,
|
|
.dstPort = -1,
|
|
// and all other fields set to 0 as the default
|
|
};
|
|
bool parseAgain = false;
|
|
|
|
const auto attrHandler = [&args, &parseAgain](const nlattr attr, const Slice payload) {
|
|
switch (attr.nla_type) {
|
|
case NFULA_TIMESTAMP: {
|
|
timespec ts = {};
|
|
extract(payload, ts);
|
|
constexpr uint64_t kNsPerS = 1000000000ULL;
|
|
args.timestampNs = ntohl(ts.tv_nsec) + (ntohl(ts.tv_sec) * kNsPerS);
|
|
break;
|
|
}
|
|
case NFULA_PREFIX:
|
|
// Strip trailing '\0'
|
|
args.prefix = toString(take(payload, payload.size() - 1));
|
|
break;
|
|
case NFULA_UID:
|
|
extract(payload, args.uid);
|
|
args.uid = ntohl(args.uid);
|
|
break;
|
|
case NFULA_GID:
|
|
extract(payload, args.gid);
|
|
args.gid = ntohl(args.gid);
|
|
break;
|
|
case NFULA_HWADDR: {
|
|
struct nfulnl_msg_packet_hw hwaddr = {};
|
|
extract(payload, hwaddr);
|
|
size_t hwAddrLen = ntohs(hwaddr.hw_addrlen);
|
|
hwAddrLen = std::min(hwAddrLen, sizeof(hwaddr.hw_addr));
|
|
args.dstHw.assign(hwaddr.hw_addr, hwaddr.hw_addr + hwAddrLen);
|
|
break;
|
|
}
|
|
case NFULA_PACKET_HDR: {
|
|
struct nfulnl_msg_packet_hdr packetHdr = {};
|
|
extract(payload, packetHdr);
|
|
args.ethertype = ntohs(packetHdr.hw_protocol);
|
|
break;
|
|
}
|
|
case NFULA_PAYLOAD:
|
|
// The packet payload is expected to come last in the Netlink message.
|
|
// At that point NFULA_PACKET_HDR has already been parsed and processed.
|
|
// If this is not the case, set parseAgain to true.
|
|
parseAgain = (args.ethertype == -1);
|
|
extractIpHeader(args, payload);
|
|
break;
|
|
default:
|
|
break;
|
|
}
|
|
};
|
|
|
|
forEachNetlinkAttribute(msg, attrHandler);
|
|
if (parseAgain) {
|
|
// NFULA_PAYLOAD was parsed before NFULA_PACKET_HDR.
|
|
// Now that the ethertype is known, reparse msg for correctly extracting the payload.
|
|
forEachNetlinkAttribute(msg, attrHandler);
|
|
}
|
|
mReport(args);
|
|
};
|
|
return mListener->subscribe(NetlinkManager::NFLOG_WAKEUP_GROUP,
|
|
WakeupController::kDefaultPacketCopyRange, msgHandler);
|
|
}
|
|
|
|
Status WakeupController::addInterface(const std::string& ifName, const std::string& prefix,
|
|
uint32_t mark, uint32_t mask) {
|
|
return execIptables("-A", ifName, prefix, mark, mask);
|
|
}
|
|
|
|
Status WakeupController::delInterface(const std::string& ifName, const std::string& prefix,
|
|
uint32_t mark, uint32_t mask) {
|
|
return execIptables("-D", ifName, prefix, mark, mask);
|
|
}
|
|
|
|
Status WakeupController::execIptables(const std::string& action, const std::string& ifName,
|
|
const std::string& prefix, uint32_t mark, uint32_t mask) {
|
|
// NFLOG messages to batch before releasing to userspace
|
|
constexpr int kBatch = 8;
|
|
// Max log message rate in packets/second
|
|
constexpr int kRateLimit = 10;
|
|
const char kFormat[] =
|
|
"*mangle\n%s %s -i %s -j NFLOG --nflog-prefix %s --nflog-group %d --nflog-threshold %d"
|
|
" -m mark --mark 0x%08x/0x%08x -m limit --limit %d/s\nCOMMIT\n";
|
|
const auto cmd = StringPrintf(
|
|
kFormat, action.c_str(), WakeupController::LOCAL_MANGLE_INPUT, ifName.c_str(),
|
|
prefix.c_str(), NetlinkManager::NFLOG_WAKEUP_GROUP, kBatch, mark, mask, kRateLimit);
|
|
|
|
std::string out;
|
|
auto rv = mIptables->execute(V4V6, cmd, &out);
|
|
if (rv != 0) {
|
|
auto s = Status(rv, "Failed to execute iptables cmd: " + cmd + ", out: " + out);
|
|
ALOGE("%s", toString(s).c_str());
|
|
return s;
|
|
}
|
|
return netdutils::status::ok;
|
|
}
|
|
|
|
} // namespace net
|
|
} // namespace android
|