blob: c43e94e070291021239ef10142d5edb816e2ab20 [file] [log] [blame]
Jeff Sharkeyd8c64022012-07-13 18:04:07 -07001/*
2 * Copyright (C) 2012 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17#ifndef _FIREWALL_CONTROLLER_H
18#define _FIREWALL_CONTROLLER_H
19
Hugo Benichi528d3d02018-06-20 13:35:58 +090020#include <sys/types.h>
Luke Huangd1ee4622018-06-29 13:49:58 +080021#include <mutex>
Lorenzo Colitti1411d452017-07-17 22:12:15 +090022#include <set>
Jeff Sharkeyd8c64022012-07-13 18:04:07 -070023#include <string>
Lorenzo Colitti89faa342016-02-26 11:38:47 +090024#include <vector>
Jeff Sharkeyd8c64022012-07-13 18:04:07 -070025
Lorenzo Colitti932c44c2016-04-24 16:58:02 +090026#include "NetdConstants.h"
27
Amith Yamasani390e4ea2015-04-25 19:08:57 -070028enum FirewallRule { DENY, ALLOW };
29
30// WHITELIST means the firewall denies all by default, uids must be explicitly ALLOWed
31// BLACKLIST means the firewall allows all by default, uids must be explicitly DENYed
32
33enum FirewallType { WHITELIST, BLACKLIST };
Jeff Sharkeyd8c64022012-07-13 18:04:07 -070034
Felipe Leme3f624342016-02-10 18:12:39 -080035enum ChildChain { NONE, DOZABLE, STANDBY, POWERSAVE, INVALID_CHAIN };
Xiaohui Chen1cdfa9a2015-06-08 16:28:12 -070036
Jeff Sharkeyd8c64022012-07-13 18:04:07 -070037/*
38 * Simple firewall that drops all packets except those matching explicitly
39 * defined ALLOW rules.
Lorenzo Colittiddf2d5b2016-02-26 11:30:59 +090040 *
41 * Methods in this class must be called when holding a write lock on |lock|, and may not call
42 * any other controller without explicitly managing that controller's lock. There are currently
43 * no such methods.
Jeff Sharkeyd8c64022012-07-13 18:04:07 -070044 */
45class FirewallController {
46public:
47 FirewallController();
48
49 int setupIptablesHooks(void);
50
Amith Yamasani390e4ea2015-04-25 19:08:57 -070051 int enableFirewall(FirewallType);
Jeff Sharkeyd8c64022012-07-13 18:04:07 -070052 int disableFirewall(void);
53 int isFirewallEnabled(void);
54
55 /* Match traffic going in/out over the given iface. */
56 int setInterfaceRule(const char*, FirewallRule);
Xiaohui Chen1cdfa9a2015-06-08 16:28:12 -070057 /* Match traffic owned by given UID. This is specific to a particular chain. */
58 int setUidRule(ChildChain, int, FirewallRule);
59
60 int enableChildChains(ChildChain, bool);
61
Erik Klinef52d4522018-03-14 15:01:46 +090062 int replaceUidChain(const std::string&, bool, const std::vector<int32_t>&);
Lorenzo Colitti89faa342016-02-26 11:38:47 +090063
Lorenzo Colittiaff28792017-09-26 17:46:18 +090064 static std::string makeCriticalCommands(IptablesTarget target, const char* chainName);
Hugo Benichi528d3d02018-06-20 13:35:58 +090065 static uid_t discoverMaximumValidUid(const std::string& fileName);
Lorenzo Colittiaff28792017-09-26 17:46:18 +090066
Xiaohui Chen1cdfa9a2015-06-08 16:28:12 -070067 static const char* TABLE;
Jeff Sharkeyd8c64022012-07-13 18:04:07 -070068
69 static const char* LOCAL_INPUT;
70 static const char* LOCAL_OUTPUT;
71 static const char* LOCAL_FORWARD;
72
Xiaohui Chen1cdfa9a2015-06-08 16:28:12 -070073 static const char* LOCAL_DOZABLE;
74 static const char* LOCAL_STANDBY;
Felipe Leme3f624342016-02-10 18:12:39 -080075 static const char* LOCAL_POWERSAVE;
Lorenzo Colittic8683d72015-09-01 16:53:35 +090076
77 static const char* ICMPV6_TYPES[];
78
Luke Huangd1ee4622018-06-29 13:49:58 +080079 std::mutex lock;
Lorenzo Colittiddf2d5b2016-02-26 11:30:59 +090080
Lorenzo Colitti89faa342016-02-26 11:38:47 +090081protected:
82 friend class FirewallControllerTest;
Lorenzo Colittif157caf2016-05-13 11:25:54 +090083 std::string makeUidRules(IptablesTarget target, const char *name, bool isWhitelist,
84 const std::vector<int32_t>& uids);
Lorenzo Colitti932c44c2016-04-24 16:58:02 +090085 static int (*execIptablesRestore)(IptablesTarget target, const std::string& commands);
Lorenzo Colitti89faa342016-02-26 11:38:47 +090086
Amith Yamasani390e4ea2015-04-25 19:08:57 -070087private:
Hugo Benichi528d3d02018-06-20 13:35:58 +090088 // Netd supports two cases, in both of which mMaxUid that derives from the uid mapping is const:
89 // - netd runs in a root namespace which contains all UIDs.
90 // - netd runs in a user namespace where the uid mapping is written once before netd starts.
91 // In that case, an attempt to write more than once to a uid_map file in a user namespace
92 // fails with EPERM. Netd can therefore assumes the max valid uid to be const.
93 const uid_t mMaxUid;
94 FirewallType mFirewallType;
95 bool mUseBpfOwnerMatch;
96 std::set<std::string> mIfaceRules;
97 int attachChain(const char*, const char*);
98 int detachChain(const char*, const char*);
99 int createChain(const char*, FirewallType);
100 FirewallType getFirewallType(ChildChain);
Jeff Sharkeyd8c64022012-07-13 18:04:07 -0700101};
102
103#endif