blob: 3b29e99915ddb9405c53f3b9fe6f39a415427539 [file] [log] [blame]
Jeff Sharkeyd8c64022012-07-13 18:04:07 -07001/*
2 * Copyright (C) 2012 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17#ifndef _FIREWALL_CONTROLLER_H
18#define _FIREWALL_CONTROLLER_H
19
Hugo Benichi528d3d02018-06-20 13:35:58 +090020#include <sys/types.h>
Luke Huangd1ee4622018-06-29 13:49:58 +080021#include <mutex>
Lorenzo Colitti1411d452017-07-17 22:12:15 +090022#include <set>
Jeff Sharkeyd8c64022012-07-13 18:04:07 -070023#include <string>
Lorenzo Colitti89faa342016-02-26 11:38:47 +090024#include <vector>
Jeff Sharkeyd8c64022012-07-13 18:04:07 -070025
Luke Huange64fa382018-07-24 16:38:22 +080026#include "android/net/INetd.h"
27
Lorenzo Colitti932c44c2016-04-24 16:58:02 +090028#include "NetdConstants.h"
Chenbo Feng47dd0732018-12-11 12:23:24 -080029#include "bpf/BpfUtils.h"
Lorenzo Colitti932c44c2016-04-24 16:58:02 +090030
Luke Huange64fa382018-07-24 16:38:22 +080031namespace android {
32namespace net {
33
34enum FirewallRule { ALLOW = INetd::FIREWALL_RULE_ALLOW, DENY = INetd::FIREWALL_RULE_DENY };
Amith Yamasani390e4ea2015-04-25 19:08:57 -070035
36// WHITELIST means the firewall denies all by default, uids must be explicitly ALLOWed
37// BLACKLIST means the firewall allows all by default, uids must be explicitly DENYed
38
Luke Huange64fa382018-07-24 16:38:22 +080039enum FirewallType { WHITELIST = INetd::FIREWALL_WHITELIST, BLACKLIST = INetd::FIREWALL_BLACKLIST };
Jeff Sharkeyd8c64022012-07-13 18:04:07 -070040
Luke Huange64fa382018-07-24 16:38:22 +080041enum ChildChain {
42 NONE = INetd::FIREWALL_CHAIN_NONE,
43 DOZABLE = INetd::FIREWALL_CHAIN_DOZABLE,
44 STANDBY = INetd::FIREWALL_CHAIN_STANDBY,
45 POWERSAVE = INetd::FIREWALL_CHAIN_POWERSAVE,
Sam Mortimer1c999632020-05-27 13:31:48 -070046 ISOLATED = INetd::FIREWALL_CHAIN_ISOLATED,
Luke Huange64fa382018-07-24 16:38:22 +080047 INVALID_CHAIN
48};
Xiaohui Chen1cdfa9a2015-06-08 16:28:12 -070049
Jeff Sharkeyd8c64022012-07-13 18:04:07 -070050/*
51 * Simple firewall that drops all packets except those matching explicitly
52 * defined ALLOW rules.
Lorenzo Colittiddf2d5b2016-02-26 11:30:59 +090053 *
54 * Methods in this class must be called when holding a write lock on |lock|, and may not call
55 * any other controller without explicitly managing that controller's lock. There are currently
56 * no such methods.
Jeff Sharkeyd8c64022012-07-13 18:04:07 -070057 */
58class FirewallController {
59public:
60 FirewallController();
61
62 int setupIptablesHooks(void);
63
Luke Huange64fa382018-07-24 16:38:22 +080064 int setFirewallType(FirewallType);
65 int resetFirewall(void);
Jeff Sharkeyd8c64022012-07-13 18:04:07 -070066 int isFirewallEnabled(void);
67
68 /* Match traffic going in/out over the given iface. */
69 int setInterfaceRule(const char*, FirewallRule);
Xiaohui Chen1cdfa9a2015-06-08 16:28:12 -070070 /* Match traffic owned by given UID. This is specific to a particular chain. */
71 int setUidRule(ChildChain, int, FirewallRule);
cjybyjk7fd85352021-01-22 17:12:21 +080072 /* Match traffic from the given MAC address */
73 int setMACAddressRule(const char*, FirewallRule);
Xiaohui Chen1cdfa9a2015-06-08 16:28:12 -070074
75 int enableChildChains(ChildChain, bool);
76
Erik Klinef52d4522018-03-14 15:01:46 +090077 int replaceUidChain(const std::string&, bool, const std::vector<int32_t>&);
Lorenzo Colitti89faa342016-02-26 11:38:47 +090078
Lorenzo Colittiaff28792017-09-26 17:46:18 +090079 static std::string makeCriticalCommands(IptablesTarget target, const char* chainName);
Hugo Benichi528d3d02018-06-20 13:35:58 +090080 static uid_t discoverMaximumValidUid(const std::string& fileName);
Lorenzo Colittiaff28792017-09-26 17:46:18 +090081
Xiaohui Chen1cdfa9a2015-06-08 16:28:12 -070082 static const char* TABLE;
Jeff Sharkeyd8c64022012-07-13 18:04:07 -070083
84 static const char* LOCAL_INPUT;
85 static const char* LOCAL_OUTPUT;
86 static const char* LOCAL_FORWARD;
87
Xiaohui Chen1cdfa9a2015-06-08 16:28:12 -070088 static const char* LOCAL_DOZABLE;
89 static const char* LOCAL_STANDBY;
Felipe Leme3f624342016-02-10 18:12:39 -080090 static const char* LOCAL_POWERSAVE;
Sam Mortimer1c999632020-05-27 13:31:48 -070091 static const char* LOCAL_ISOLATED;
Lorenzo Colittic8683d72015-09-01 16:53:35 +090092
93 static const char* ICMPV6_TYPES[];
94
Luke Huangd1ee4622018-06-29 13:49:58 +080095 std::mutex lock;
Lorenzo Colittiddf2d5b2016-02-26 11:30:59 +090096
Lorenzo Colitti89faa342016-02-26 11:38:47 +090097protected:
98 friend class FirewallControllerTest;
Lorenzo Colittif157caf2016-05-13 11:25:54 +090099 std::string makeUidRules(IptablesTarget target, const char *name, bool isWhitelist,
100 const std::vector<int32_t>& uids);
Lorenzo Colitti932c44c2016-04-24 16:58:02 +0900101 static int (*execIptablesRestore)(IptablesTarget target, const std::string& commands);
Lorenzo Colitti89faa342016-02-26 11:38:47 +0900102
Amith Yamasani390e4ea2015-04-25 19:08:57 -0700103private:
Hugo Benichi528d3d02018-06-20 13:35:58 +0900104 // Netd supports two cases, in both of which mMaxUid that derives from the uid mapping is const:
105 // - netd runs in a root namespace which contains all UIDs.
106 // - netd runs in a user namespace where the uid mapping is written once before netd starts.
107 // In that case, an attempt to write more than once to a uid_map file in a user namespace
108 // fails with EPERM. Netd can therefore assumes the max valid uid to be const.
109 const uid_t mMaxUid;
110 FirewallType mFirewallType;
Maciej Żenczykowski10a58922020-02-11 15:40:19 -0800111 bool mUseBpfOwnerMatch;
Hugo Benichi528d3d02018-06-20 13:35:58 +0900112 std::set<std::string> mIfaceRules;
cjybyjk7fd85352021-01-22 17:12:21 +0800113 std::set<std::string> mMACAddrRules;
Hugo Benichi528d3d02018-06-20 13:35:58 +0900114 int attachChain(const char*, const char*);
115 int detachChain(const char*, const char*);
116 int createChain(const char*, FirewallType);
117 FirewallType getFirewallType(ChildChain);
Jeff Sharkeyd8c64022012-07-13 18:04:07 -0700118};
119
Luke Huange64fa382018-07-24 16:38:22 +0800120} // namespace net
121} // namespace android
122
Jeff Sharkeyd8c64022012-07-13 18:04:07 -0700123#endif