blob: 43da32211d16f15a4c9b67d5ede9f309d54a47b5 [file] [log] [blame]
Jeff Sharkeyd8c64022012-07-13 18:04:07 -07001/*
2 * Copyright (C) 2012 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17#ifndef _FIREWALL_CONTROLLER_H
18#define _FIREWALL_CONTROLLER_H
19
Hugo Benichi528d3d02018-06-20 13:35:58 +090020#include <sys/types.h>
Luke Huangd1ee4622018-06-29 13:49:58 +080021#include <mutex>
Lorenzo Colitti1411d452017-07-17 22:12:15 +090022#include <set>
Jeff Sharkeyd8c64022012-07-13 18:04:07 -070023#include <string>
Lorenzo Colitti89faa342016-02-26 11:38:47 +090024#include <vector>
Jeff Sharkeyd8c64022012-07-13 18:04:07 -070025
Luke Huange64fa382018-07-24 16:38:22 +080026#include "android/net/INetd.h"
27
Lorenzo Colitti932c44c2016-04-24 16:58:02 +090028#include "NetdConstants.h"
Chenbo Feng47dd0732018-12-11 12:23:24 -080029#include "bpf/BpfUtils.h"
Lorenzo Colitti932c44c2016-04-24 16:58:02 +090030
Luke Huange64fa382018-07-24 16:38:22 +080031namespace android {
32namespace net {
33
34enum FirewallRule { ALLOW = INetd::FIREWALL_RULE_ALLOW, DENY = INetd::FIREWALL_RULE_DENY };
Amith Yamasani390e4ea2015-04-25 19:08:57 -070035
36// WHITELIST means the firewall denies all by default, uids must be explicitly ALLOWed
37// BLACKLIST means the firewall allows all by default, uids must be explicitly DENYed
38
Luke Huange64fa382018-07-24 16:38:22 +080039enum FirewallType { WHITELIST = INetd::FIREWALL_WHITELIST, BLACKLIST = INetd::FIREWALL_BLACKLIST };
Jeff Sharkeyd8c64022012-07-13 18:04:07 -070040
Luke Huange64fa382018-07-24 16:38:22 +080041enum ChildChain {
42 NONE = INetd::FIREWALL_CHAIN_NONE,
43 DOZABLE = INetd::FIREWALL_CHAIN_DOZABLE,
44 STANDBY = INetd::FIREWALL_CHAIN_STANDBY,
45 POWERSAVE = INetd::FIREWALL_CHAIN_POWERSAVE,
46 INVALID_CHAIN
47};
Xiaohui Chen1cdfa9a2015-06-08 16:28:12 -070048
Jeff Sharkeyd8c64022012-07-13 18:04:07 -070049/*
50 * Simple firewall that drops all packets except those matching explicitly
51 * defined ALLOW rules.
Lorenzo Colittiddf2d5b2016-02-26 11:30:59 +090052 *
53 * Methods in this class must be called when holding a write lock on |lock|, and may not call
54 * any other controller without explicitly managing that controller's lock. There are currently
55 * no such methods.
Jeff Sharkeyd8c64022012-07-13 18:04:07 -070056 */
57class FirewallController {
58public:
59 FirewallController();
60
61 int setupIptablesHooks(void);
62
Luke Huange64fa382018-07-24 16:38:22 +080063 int setFirewallType(FirewallType);
64 int resetFirewall(void);
Jeff Sharkeyd8c64022012-07-13 18:04:07 -070065 int isFirewallEnabled(void);
66
67 /* Match traffic going in/out over the given iface. */
68 int setInterfaceRule(const char*, FirewallRule);
Xiaohui Chen1cdfa9a2015-06-08 16:28:12 -070069 /* Match traffic owned by given UID. This is specific to a particular chain. */
70 int setUidRule(ChildChain, int, FirewallRule);
71
72 int enableChildChains(ChildChain, bool);
73
Erik Klinef52d4522018-03-14 15:01:46 +090074 int replaceUidChain(const std::string&, bool, const std::vector<int32_t>&);
Lorenzo Colitti89faa342016-02-26 11:38:47 +090075
Lorenzo Colittiaff28792017-09-26 17:46:18 +090076 static std::string makeCriticalCommands(IptablesTarget target, const char* chainName);
Hugo Benichi528d3d02018-06-20 13:35:58 +090077 static uid_t discoverMaximumValidUid(const std::string& fileName);
Lorenzo Colittiaff28792017-09-26 17:46:18 +090078
Xiaohui Chen1cdfa9a2015-06-08 16:28:12 -070079 static const char* TABLE;
Jeff Sharkeyd8c64022012-07-13 18:04:07 -070080
81 static const char* LOCAL_INPUT;
82 static const char* LOCAL_OUTPUT;
83 static const char* LOCAL_FORWARD;
84
Xiaohui Chen1cdfa9a2015-06-08 16:28:12 -070085 static const char* LOCAL_DOZABLE;
86 static const char* LOCAL_STANDBY;
Felipe Leme3f624342016-02-10 18:12:39 -080087 static const char* LOCAL_POWERSAVE;
Lorenzo Colittic8683d72015-09-01 16:53:35 +090088
89 static const char* ICMPV6_TYPES[];
90
Luke Huangd1ee4622018-06-29 13:49:58 +080091 std::mutex lock;
Lorenzo Colittiddf2d5b2016-02-26 11:30:59 +090092
Lorenzo Colitti89faa342016-02-26 11:38:47 +090093protected:
94 friend class FirewallControllerTest;
Lorenzo Colittif157caf2016-05-13 11:25:54 +090095 std::string makeUidRules(IptablesTarget target, const char *name, bool isWhitelist,
96 const std::vector<int32_t>& uids);
Lorenzo Colitti932c44c2016-04-24 16:58:02 +090097 static int (*execIptablesRestore)(IptablesTarget target, const std::string& commands);
Lorenzo Colitti89faa342016-02-26 11:38:47 +090098
Amith Yamasani390e4ea2015-04-25 19:08:57 -070099private:
Hugo Benichi528d3d02018-06-20 13:35:58 +0900100 // Netd supports two cases, in both of which mMaxUid that derives from the uid mapping is const:
101 // - netd runs in a root namespace which contains all UIDs.
102 // - netd runs in a user namespace where the uid mapping is written once before netd starts.
103 // In that case, an attempt to write more than once to a uid_map file in a user namespace
104 // fails with EPERM. Netd can therefore assumes the max valid uid to be const.
105 const uid_t mMaxUid;
106 FirewallType mFirewallType;
Chenbo Feng47dd0732018-12-11 12:23:24 -0800107 android::bpf::BpfLevel mUseBpfOwnerMatch;
Hugo Benichi528d3d02018-06-20 13:35:58 +0900108 std::set<std::string> mIfaceRules;
109 int attachChain(const char*, const char*);
110 int detachChain(const char*, const char*);
111 int createChain(const char*, FirewallType);
112 FirewallType getFirewallType(ChildChain);
Jeff Sharkeyd8c64022012-07-13 18:04:07 -0700113};
114
Luke Huange64fa382018-07-24 16:38:22 +0800115} // namespace net
116} // namespace android
117
Jeff Sharkeyd8c64022012-07-13 18:04:07 -0700118#endif