RouteController.cpp revision 9c0d313de6a3157fadd3b52a9927c77216ca435e
15c181bf8ca0c89bd9e3e6d8e40bac53d0ee7082fSreeram Ramachandran/*
25c181bf8ca0c89bd9e3e6d8e40bac53d0ee7082fSreeram Ramachandran * Copyright (C) 2014 The Android Open Source Project
35c181bf8ca0c89bd9e3e6d8e40bac53d0ee7082fSreeram Ramachandran *
45c181bf8ca0c89bd9e3e6d8e40bac53d0ee7082fSreeram Ramachandran * Licensed under the Apache License, Version 2.0 (the "License");
55c181bf8ca0c89bd9e3e6d8e40bac53d0ee7082fSreeram Ramachandran * you may not use this file except in compliance with the License.
65c181bf8ca0c89bd9e3e6d8e40bac53d0ee7082fSreeram Ramachandran * You may obtain a copy of the License at
75c181bf8ca0c89bd9e3e6d8e40bac53d0ee7082fSreeram Ramachandran *
85c181bf8ca0c89bd9e3e6d8e40bac53d0ee7082fSreeram Ramachandran *      http://www.apache.org/licenses/LICENSE-2.0
95c181bf8ca0c89bd9e3e6d8e40bac53d0ee7082fSreeram Ramachandran *
105c181bf8ca0c89bd9e3e6d8e40bac53d0ee7082fSreeram Ramachandran * Unless required by applicable law or agreed to in writing, software
115c181bf8ca0c89bd9e3e6d8e40bac53d0ee7082fSreeram Ramachandran * distributed under the License is distributed on an "AS IS" BASIS,
125c181bf8ca0c89bd9e3e6d8e40bac53d0ee7082fSreeram Ramachandran * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
135c181bf8ca0c89bd9e3e6d8e40bac53d0ee7082fSreeram Ramachandran * See the License for the specific language governing permissions and
145c181bf8ca0c89bd9e3e6d8e40bac53d0ee7082fSreeram Ramachandran * limitations under the License.
155c181bf8ca0c89bd9e3e6d8e40bac53d0ee7082fSreeram Ramachandran */
165c181bf8ca0c89bd9e3e6d8e40bac53d0ee7082fSreeram Ramachandran
175c181bf8ca0c89bd9e3e6d8e40bac53d0ee7082fSreeram Ramachandran#include "RouteController.h"
185c181bf8ca0c89bd9e3e6d8e40bac53d0ee7082fSreeram Ramachandran
195c181bf8ca0c89bd9e3e6d8e40bac53d0ee7082fSreeram Ramachandran#include "Fwmark.h"
205c181bf8ca0c89bd9e3e6d8e40bac53d0ee7082fSreeram Ramachandran#include "NetdConstants.h"
215c181bf8ca0c89bd9e3e6d8e40bac53d0ee7082fSreeram Ramachandran
225c181bf8ca0c89bd9e3e6d8e40bac53d0ee7082fSreeram Ramachandran#include <logwrap/logwrap.h>
235c181bf8ca0c89bd9e3e6d8e40bac53d0ee7082fSreeram Ramachandran#include <net/if.h>
245c181bf8ca0c89bd9e3e6d8e40bac53d0ee7082fSreeram Ramachandran
255c181bf8ca0c89bd9e3e6d8e40bac53d0ee7082fSreeram Ramachandrannamespace {
265c181bf8ca0c89bd9e3e6d8e40bac53d0ee7082fSreeram Ramachandran
279c0d313de6a3157fadd3b52a9927c77216ca435eSreeram Ramachandranconst uint32_t RULE_PRIORITY_PER_NETWORK_EXPLICIT  =  300;
289c0d313de6a3157fadd3b52a9927c77216ca435eSreeram Ramachandranconst uint32_t RULE_PRIORITY_PER_NETWORK_INTERFACE =  400;
299c0d313de6a3157fadd3b52a9927c77216ca435eSreeram Ramachandranconst uint32_t RULE_PRIORITY_PER_NETWORK_NORMAL    =  700;
309c0d313de6a3157fadd3b52a9927c77216ca435eSreeram Ramachandranconst uint32_t RULE_PRIORITY_DEFAULT_NETWORK       =  900;
315c181bf8ca0c89bd9e3e6d8e40bac53d0ee7082fSreeram Ramachandran
329c0d313de6a3157fadd3b52a9927c77216ca435eSreeram Ramachandranconst bool FWMARK_USE_NET_ID   = true;
335c181bf8ca0c89bd9e3e6d8e40bac53d0ee7082fSreeram Ramachandranconst bool FWMARK_USE_EXPLICIT = true;
349c0d313de6a3157fadd3b52a9927c77216ca435eSreeram Ramachandranconst bool FWMARK_USE_PROTECT  = true;
355c181bf8ca0c89bd9e3e6d8e40bac53d0ee7082fSreeram Ramachandran
365c181bf8ca0c89bd9e3e6d8e40bac53d0ee7082fSreeram Ramachandranuint32_t getRouteTableForInterface(const char* interface) {
37a48118062412f16ae712bfc8c8a539d3b6a85e47Sreeram Ramachandran    uint32_t index = if_nametoindex(interface);
38a48118062412f16ae712bfc8c8a539d3b6a85e47Sreeram Ramachandran    return index ? index + RouteController::ROUTE_TABLE_OFFSET_FROM_INDEX : 0;
395c181bf8ca0c89bd9e3e6d8e40bac53d0ee7082fSreeram Ramachandran}
405c181bf8ca0c89bd9e3e6d8e40bac53d0ee7082fSreeram Ramachandran
41a10ac3214f6a582b7fdb66acc43c702731e53d81Lorenzo Colittibool runIpRuleCommand(const char* action, uint32_t priority, uint32_t table,
429c0d313de6a3157fadd3b52a9927c77216ca435eSreeram Ramachandran                      uint32_t fwmark, uint32_t mask, const char* interface) {
43a10ac3214f6a582b7fdb66acc43c702731e53d81Lorenzo Colitti
44a10ac3214f6a582b7fdb66acc43c702731e53d81Lorenzo Colitti    char priorityString[UINT32_STRLEN];
45a10ac3214f6a582b7fdb66acc43c702731e53d81Lorenzo Colitti    char tableString[UINT32_STRLEN];
46a10ac3214f6a582b7fdb66acc43c702731e53d81Lorenzo Colitti    snprintf(priorityString, sizeof(priorityString), "%u", priority);
47a10ac3214f6a582b7fdb66acc43c702731e53d81Lorenzo Colitti    snprintf(tableString, sizeof(tableString), "%u", table);
48a10ac3214f6a582b7fdb66acc43c702731e53d81Lorenzo Colitti
49a10ac3214f6a582b7fdb66acc43c702731e53d81Lorenzo Colitti    char fwmarkString[sizeof("0x12345678/0x12345678")];
50a10ac3214f6a582b7fdb66acc43c702731e53d81Lorenzo Colitti    snprintf(fwmarkString, sizeof(fwmarkString), "0x%x/0x%x", fwmark, mask);
51a10ac3214f6a582b7fdb66acc43c702731e53d81Lorenzo Colitti
525c181bf8ca0c89bd9e3e6d8e40bac53d0ee7082fSreeram Ramachandran    const char* version[] = {"-4", "-6"};
535c181bf8ca0c89bd9e3e6d8e40bac53d0ee7082fSreeram Ramachandran    for (size_t i = 0; i < ARRAY_SIZE(version); ++i) {
545c181bf8ca0c89bd9e3e6d8e40bac53d0ee7082fSreeram Ramachandran        int argc = 0;
555c181bf8ca0c89bd9e3e6d8e40bac53d0ee7082fSreeram Ramachandran        const char* argv[16];
565c181bf8ca0c89bd9e3e6d8e40bac53d0ee7082fSreeram Ramachandran
575c181bf8ca0c89bd9e3e6d8e40bac53d0ee7082fSreeram Ramachandran        argv[argc++] = IP_PATH;
585c181bf8ca0c89bd9e3e6d8e40bac53d0ee7082fSreeram Ramachandran        argv[argc++] = version[i];
595c181bf8ca0c89bd9e3e6d8e40bac53d0ee7082fSreeram Ramachandran        argv[argc++] = "rule";
605c181bf8ca0c89bd9e3e6d8e40bac53d0ee7082fSreeram Ramachandran        argv[argc++] = action;
615c181bf8ca0c89bd9e3e6d8e40bac53d0ee7082fSreeram Ramachandran        argv[argc++] = "priority";
62a10ac3214f6a582b7fdb66acc43c702731e53d81Lorenzo Colitti        argv[argc++] = priorityString;
635c181bf8ca0c89bd9e3e6d8e40bac53d0ee7082fSreeram Ramachandran        argv[argc++] = "table";
64a10ac3214f6a582b7fdb66acc43c702731e53d81Lorenzo Colitti        argv[argc++] = tableString;
65a10ac3214f6a582b7fdb66acc43c702731e53d81Lorenzo Colitti        if (mask) {
665c181bf8ca0c89bd9e3e6d8e40bac53d0ee7082fSreeram Ramachandran            argv[argc++] = "fwmark";
67a10ac3214f6a582b7fdb66acc43c702731e53d81Lorenzo Colitti            argv[argc++] = fwmarkString;
685c181bf8ca0c89bd9e3e6d8e40bac53d0ee7082fSreeram Ramachandran        }
699c0d313de6a3157fadd3b52a9927c77216ca435eSreeram Ramachandran        if (interface) {
705c181bf8ca0c89bd9e3e6d8e40bac53d0ee7082fSreeram Ramachandran            argv[argc++] = "oif";
719c0d313de6a3157fadd3b52a9927c77216ca435eSreeram Ramachandran            argv[argc++] = interface;
725c181bf8ca0c89bd9e3e6d8e40bac53d0ee7082fSreeram Ramachandran        }
735c181bf8ca0c89bd9e3e6d8e40bac53d0ee7082fSreeram Ramachandran        if (android_fork_execvp(argc, const_cast<char**>(argv), NULL, false, false)) {
745c181bf8ca0c89bd9e3e6d8e40bac53d0ee7082fSreeram Ramachandran            return false;
755c181bf8ca0c89bd9e3e6d8e40bac53d0ee7082fSreeram Ramachandran        }
765c181bf8ca0c89bd9e3e6d8e40bac53d0ee7082fSreeram Ramachandran    }
775c181bf8ca0c89bd9e3e6d8e40bac53d0ee7082fSreeram Ramachandran
785c181bf8ca0c89bd9e3e6d8e40bac53d0ee7082fSreeram Ramachandran    return true;
795c181bf8ca0c89bd9e3e6d8e40bac53d0ee7082fSreeram Ramachandran}
805c181bf8ca0c89bd9e3e6d8e40bac53d0ee7082fSreeram Ramachandran
819c0d313de6a3157fadd3b52a9927c77216ca435eSreeram Ramachandranbool modifyPerNetworkRules(unsigned netId, const char* interface, Permission permission, bool add,
829c0d313de6a3157fadd3b52a9927c77216ca435eSreeram Ramachandran                           bool modifyIptables) {
835c181bf8ca0c89bd9e3e6d8e40bac53d0ee7082fSreeram Ramachandran    uint32_t table = getRouteTableForInterface(interface);
845c181bf8ca0c89bd9e3e6d8e40bac53d0ee7082fSreeram Ramachandran    if (!table) {
855c181bf8ca0c89bd9e3e6d8e40bac53d0ee7082fSreeram Ramachandran        return false;
865c181bf8ca0c89bd9e3e6d8e40bac53d0ee7082fSreeram Ramachandran    }
875c181bf8ca0c89bd9e3e6d8e40bac53d0ee7082fSreeram Ramachandran
885c181bf8ca0c89bd9e3e6d8e40bac53d0ee7082fSreeram Ramachandran    const char* action = add ? ADD : DEL;
895c181bf8ca0c89bd9e3e6d8e40bac53d0ee7082fSreeram Ramachandran
905c181bf8ca0c89bd9e3e6d8e40bac53d0ee7082fSreeram Ramachandran    // A rule to route traffic based on an explicitly chosen network.
915c181bf8ca0c89bd9e3e6d8e40bac53d0ee7082fSreeram Ramachandran    //
925c181bf8ca0c89bd9e3e6d8e40bac53d0ee7082fSreeram Ramachandran    // Supports apps that use the multinetwork APIs to restrict their traffic to a network.
935c181bf8ca0c89bd9e3e6d8e40bac53d0ee7082fSreeram Ramachandran    //
945c181bf8ca0c89bd9e3e6d8e40bac53d0ee7082fSreeram Ramachandran    // We don't really need to check the permission bits of the fwmark here, as they would've been
955c181bf8ca0c89bd9e3e6d8e40bac53d0ee7082fSreeram Ramachandran    // checked at the time the netId was set into the fwmark, but we do so to be consistent.
965c181bf8ca0c89bd9e3e6d8e40bac53d0ee7082fSreeram Ramachandran    uint32_t fwmark = getFwmark(netId, FWMARK_USE_EXPLICIT, !FWMARK_USE_PROTECT, permission);
975c181bf8ca0c89bd9e3e6d8e40bac53d0ee7082fSreeram Ramachandran    uint32_t mask = getFwmarkMask(FWMARK_USE_NET_ID, FWMARK_USE_EXPLICIT, !FWMARK_USE_PROTECT,
985c181bf8ca0c89bd9e3e6d8e40bac53d0ee7082fSreeram Ramachandran                                  permission);
99a10ac3214f6a582b7fdb66acc43c702731e53d81Lorenzo Colitti    if (!runIpRuleCommand(action, RULE_PRIORITY_PER_NETWORK_EXPLICIT, table, fwmark, mask, NULL)) {
1005c181bf8ca0c89bd9e3e6d8e40bac53d0ee7082fSreeram Ramachandran        return false;
1015c181bf8ca0c89bd9e3e6d8e40bac53d0ee7082fSreeram Ramachandran    }
1025c181bf8ca0c89bd9e3e6d8e40bac53d0ee7082fSreeram Ramachandran
1035c181bf8ca0c89bd9e3e6d8e40bac53d0ee7082fSreeram Ramachandran    // A rule to route traffic based on a chosen outgoing interface.
1045c181bf8ca0c89bd9e3e6d8e40bac53d0ee7082fSreeram Ramachandran    //
1055c181bf8ca0c89bd9e3e6d8e40bac53d0ee7082fSreeram Ramachandran    // Supports apps that use SO_BINDTODEVICE or IP_PKTINFO options and the kernel that already
1065c181bf8ca0c89bd9e3e6d8e40bac53d0ee7082fSreeram Ramachandran    // knows the outgoing interface (typically for link-local communications).
1075c181bf8ca0c89bd9e3e6d8e40bac53d0ee7082fSreeram Ramachandran    fwmark = getFwmark(0, !FWMARK_USE_EXPLICIT, !FWMARK_USE_PROTECT, permission);
1085c181bf8ca0c89bd9e3e6d8e40bac53d0ee7082fSreeram Ramachandran    mask = getFwmark(!FWMARK_USE_NET_ID, !FWMARK_USE_EXPLICIT, !FWMARK_USE_PROTECT, permission);
1099c0d313de6a3157fadd3b52a9927c77216ca435eSreeram Ramachandran    if (!runIpRuleCommand(action, RULE_PRIORITY_PER_NETWORK_INTERFACE, table, fwmark, mask,
1109c0d313de6a3157fadd3b52a9927c77216ca435eSreeram Ramachandran                          interface)) {
1115c181bf8ca0c89bd9e3e6d8e40bac53d0ee7082fSreeram Ramachandran        return false;
1125c181bf8ca0c89bd9e3e6d8e40bac53d0ee7082fSreeram Ramachandran    }
1135c181bf8ca0c89bd9e3e6d8e40bac53d0ee7082fSreeram Ramachandran
1145c181bf8ca0c89bd9e3e6d8e40bac53d0ee7082fSreeram Ramachandran    // A rule to route traffic based on the chosen network.
1155c181bf8ca0c89bd9e3e6d8e40bac53d0ee7082fSreeram Ramachandran    //
1165c181bf8ca0c89bd9e3e6d8e40bac53d0ee7082fSreeram Ramachandran    // This is for sockets that have not explicitly requested a particular network, but have been
1175c181bf8ca0c89bd9e3e6d8e40bac53d0ee7082fSreeram Ramachandran    // bound to one when they called connect(). This ensures that sockets connected on a particular
1185c181bf8ca0c89bd9e3e6d8e40bac53d0ee7082fSreeram Ramachandran    // network stay on that network even if the default network changes.
1195c181bf8ca0c89bd9e3e6d8e40bac53d0ee7082fSreeram Ramachandran    fwmark = getFwmark(netId, !FWMARK_USE_EXPLICIT, !FWMARK_USE_PROTECT, permission);
1205c181bf8ca0c89bd9e3e6d8e40bac53d0ee7082fSreeram Ramachandran    mask = getFwmarkMask(FWMARK_USE_NET_ID, !FWMARK_USE_EXPLICIT, !FWMARK_USE_PROTECT, permission);
121a10ac3214f6a582b7fdb66acc43c702731e53d81Lorenzo Colitti    if (!runIpRuleCommand(action, RULE_PRIORITY_PER_NETWORK_NORMAL, table, fwmark, mask, NULL)) {
1225c181bf8ca0c89bd9e3e6d8e40bac53d0ee7082fSreeram Ramachandran        return false;
1235c181bf8ca0c89bd9e3e6d8e40bac53d0ee7082fSreeram Ramachandran    }
1245c181bf8ca0c89bd9e3e6d8e40bac53d0ee7082fSreeram Ramachandran
1255c181bf8ca0c89bd9e3e6d8e40bac53d0ee7082fSreeram Ramachandran    // An iptables rule to mark incoming packets on a network with the netId of the network.
1265c181bf8ca0c89bd9e3e6d8e40bac53d0ee7082fSreeram Ramachandran    //
1275c181bf8ca0c89bd9e3e6d8e40bac53d0ee7082fSreeram Ramachandran    // This is so that the kernel can:
1285c181bf8ca0c89bd9e3e6d8e40bac53d0ee7082fSreeram Ramachandran    // + Use the right fwmark for (and thus correctly route) replies (e.g.: TCP RST, ICMP errors,
129a48118062412f16ae712bfc8c8a539d3b6a85e47Sreeram Ramachandran    //   ping replies).
1305c181bf8ca0c89bd9e3e6d8e40bac53d0ee7082fSreeram Ramachandran    // + Mark sockets that accept connections from this interface so that the connection stays on
1315c181bf8ca0c89bd9e3e6d8e40bac53d0ee7082fSreeram Ramachandran    //   the same interface.
132379bd33f7640e2c4bef902be0ed6cb96378c8c2eSreeram Ramachandran    if (modifyIptables) {
133379bd33f7640e2c4bef902be0ed6cb96378c8c2eSreeram Ramachandran        action = add ? "-A" : "-D";
134379bd33f7640e2c4bef902be0ed6cb96378c8c2eSreeram Ramachandran        char markString[UINT32_HEX_STRLEN];
135379bd33f7640e2c4bef902be0ed6cb96378c8c2eSreeram Ramachandran        snprintf(markString, sizeof(markString), "0x%x", netId);
136379bd33f7640e2c4bef902be0ed6cb96378c8c2eSreeram Ramachandran        if (execIptables(V4V6, "-t", "mangle", action, "INPUT", "-i", interface, "-j", "MARK",
137379bd33f7640e2c4bef902be0ed6cb96378c8c2eSreeram Ramachandran                         "--set-mark", markString, NULL)) {
138379bd33f7640e2c4bef902be0ed6cb96378c8c2eSreeram Ramachandran            return false;
139379bd33f7640e2c4bef902be0ed6cb96378c8c2eSreeram Ramachandran        }
1405c181bf8ca0c89bd9e3e6d8e40bac53d0ee7082fSreeram Ramachandran    }
1415c181bf8ca0c89bd9e3e6d8e40bac53d0ee7082fSreeram Ramachandran
1425c181bf8ca0c89bd9e3e6d8e40bac53d0ee7082fSreeram Ramachandran    return true;
1435c181bf8ca0c89bd9e3e6d8e40bac53d0ee7082fSreeram Ramachandran}
1445c181bf8ca0c89bd9e3e6d8e40bac53d0ee7082fSreeram Ramachandran
1459c0d313de6a3157fadd3b52a9927c77216ca435eSreeram Ramachandranbool modifyDefaultNetworkRules(const char* interface, Permission permission, const char* action) {
1469c0d313de6a3157fadd3b52a9927c77216ca435eSreeram Ramachandran    uint32_t table = getRouteTableForInterface(interface);
1479c0d313de6a3157fadd3b52a9927c77216ca435eSreeram Ramachandran    if (!table) {
1489c0d313de6a3157fadd3b52a9927c77216ca435eSreeram Ramachandran        return false;
1499c0d313de6a3157fadd3b52a9927c77216ca435eSreeram Ramachandran    }
1509c0d313de6a3157fadd3b52a9927c77216ca435eSreeram Ramachandran
1519c0d313de6a3157fadd3b52a9927c77216ca435eSreeram Ramachandran    uint32_t fwmark = getFwmark(0, !FWMARK_USE_EXPLICIT, !FWMARK_USE_PROTECT, permission);
1529c0d313de6a3157fadd3b52a9927c77216ca435eSreeram Ramachandran    uint32_t mask = getFwmarkMask(FWMARK_USE_NET_ID, !FWMARK_USE_EXPLICIT, !FWMARK_USE_PROTECT,
1539c0d313de6a3157fadd3b52a9927c77216ca435eSreeram Ramachandran                                  permission);
1549c0d313de6a3157fadd3b52a9927c77216ca435eSreeram Ramachandran
1559c0d313de6a3157fadd3b52a9927c77216ca435eSreeram Ramachandran    if (!runIpRuleCommand(action, RULE_PRIORITY_DEFAULT_NETWORK, table, fwmark, mask, NULL)) {
1569c0d313de6a3157fadd3b52a9927c77216ca435eSreeram Ramachandran        return false;
1579c0d313de6a3157fadd3b52a9927c77216ca435eSreeram Ramachandran    }
1589c0d313de6a3157fadd3b52a9927c77216ca435eSreeram Ramachandran
1599c0d313de6a3157fadd3b52a9927c77216ca435eSreeram Ramachandran    return true;
1609c0d313de6a3157fadd3b52a9927c77216ca435eSreeram Ramachandran}
1619c0d313de6a3157fadd3b52a9927c77216ca435eSreeram Ramachandran
1625c181bf8ca0c89bd9e3e6d8e40bac53d0ee7082fSreeram Ramachandran}  // namespace
1635c181bf8ca0c89bd9e3e6d8e40bac53d0ee7082fSreeram Ramachandran
1645c181bf8ca0c89bd9e3e6d8e40bac53d0ee7082fSreeram Ramachandranbool RouteController::createNetwork(unsigned netId, const char* interface, Permission permission) {
1659c0d313de6a3157fadd3b52a9927c77216ca435eSreeram Ramachandran    return modifyPerNetworkRules(netId, interface, permission, true, true);
1665c181bf8ca0c89bd9e3e6d8e40bac53d0ee7082fSreeram Ramachandran}
1675c181bf8ca0c89bd9e3e6d8e40bac53d0ee7082fSreeram Ramachandran
1685c181bf8ca0c89bd9e3e6d8e40bac53d0ee7082fSreeram Ramachandranbool RouteController::destroyNetwork(unsigned netId, const char* interface, Permission permission) {
1699c0d313de6a3157fadd3b52a9927c77216ca435eSreeram Ramachandran    return modifyPerNetworkRules(netId, interface, permission, false, true);
170379bd33f7640e2c4bef902be0ed6cb96378c8c2eSreeram Ramachandran    // TODO: Flush the routing table.
171379bd33f7640e2c4bef902be0ed6cb96378c8c2eSreeram Ramachandran}
172379bd33f7640e2c4bef902be0ed6cb96378c8c2eSreeram Ramachandran
173379bd33f7640e2c4bef902be0ed6cb96378c8c2eSreeram Ramachandranbool RouteController::modifyNetworkPermission(unsigned netId, const char* interface,
174379bd33f7640e2c4bef902be0ed6cb96378c8c2eSreeram Ramachandran                                              Permission oldPermission, Permission newPermission) {
175379bd33f7640e2c4bef902be0ed6cb96378c8c2eSreeram Ramachandran    // Add the new rules before deleting the old ones, to avoid race conditions.
1769c0d313de6a3157fadd3b52a9927c77216ca435eSreeram Ramachandran    return modifyPerNetworkRules(netId, interface, newPermission, true, false) &&
1779c0d313de6a3157fadd3b52a9927c77216ca435eSreeram Ramachandran           modifyPerNetworkRules(netId, interface, oldPermission, false, false);
1789c0d313de6a3157fadd3b52a9927c77216ca435eSreeram Ramachandran}
1799c0d313de6a3157fadd3b52a9927c77216ca435eSreeram Ramachandran
1809c0d313de6a3157fadd3b52a9927c77216ca435eSreeram Ramachandranbool RouteController::addDefaultNetwork(const char* interface, Permission permission) {
1819c0d313de6a3157fadd3b52a9927c77216ca435eSreeram Ramachandran    return modifyDefaultNetworkRules(interface, permission, ADD);
1829c0d313de6a3157fadd3b52a9927c77216ca435eSreeram Ramachandran}
1839c0d313de6a3157fadd3b52a9927c77216ca435eSreeram Ramachandran
1849c0d313de6a3157fadd3b52a9927c77216ca435eSreeram Ramachandranbool RouteController::removeDefaultNetwork(const char* interface, Permission permission) {
1859c0d313de6a3157fadd3b52a9927c77216ca435eSreeram Ramachandran    return modifyDefaultNetworkRules(interface, permission, DEL);
1865c181bf8ca0c89bd9e3e6d8e40bac53d0ee7082fSreeram Ramachandran}
187