/* * Copyright (C) 2022 The Android Open Source Project * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. * */ #include "firewall.h" #include #include Firewall::Firewall() { std::lock_guard guard(mMutex); auto result = mConfigurationMap.init(CONFIGURATION_MAP_PATH); EXPECT_RESULT_OK(result) << "init mConfigurationMap failed"; result = mUidOwnerMap.init(UID_OWNER_MAP_PATH); EXPECT_RESULT_OK(result) << "init mUidOwnerMap failed"; // Do not check whether DATA_SAVER_ENABLED_MAP_PATH init succeeded or failed since the map is // defined in tethering module, but the user of this class may be in other modules. For example, // DNS resolver tests statically link to this class. But when running MTS, the test infra // installs only DNS resolver module without installing tethering module together. mDataSaverEnabledMap.init(DATA_SAVER_ENABLED_MAP_PATH); } Firewall* Firewall::getInstance() { static Firewall instance; return &instance; } Result Firewall::toggleStandbyMatch(bool enable) { std::lock_guard guard(mMutex); uint32_t key = UID_RULES_CONFIGURATION_KEY; auto oldConfiguration = mConfigurationMap.readValue(key); if (!oldConfiguration.ok()) { return Errorf("Cannot read the old configuration: {}", oldConfiguration.error().message()); } BpfConfig newConfiguration = enable ? (oldConfiguration.value() | STANDBY_MATCH) : (oldConfiguration.value() & (~STANDBY_MATCH)); auto res = mConfigurationMap.writeValue(key, newConfiguration, BPF_EXIST); if (!res.ok()) return Errorf("Failed to toggle STANDBY_MATCH: {}", res.error().message()); return {}; } Result Firewall::addRule(uint32_t uid, UidOwnerMatchType match, uint32_t iif) { // iif should be non-zero if and only if match == MATCH_IIF if (match == IIF_MATCH && iif == 0) { return Errorf("Interface match {} must have nonzero interface index", static_cast(match)); } else if (match != IIF_MATCH && iif != 0) { return Errorf("Non-interface match {} must have zero interface index", static_cast(match)); } std::lock_guard guard(mMutex); auto oldMatch = mUidOwnerMap.readValue(uid); if (oldMatch.ok()) { UidOwnerValue newMatch = { .iif = iif ? iif : oldMatch.value().iif, .rule = oldMatch.value().rule | match, }; auto res = mUidOwnerMap.writeValue(uid, newMatch, BPF_ANY); if (!res.ok()) return Errorf("Failed to update rule: {}", res.error().message()); } else { UidOwnerValue newMatch = { .iif = iif, .rule = match, }; auto res = mUidOwnerMap.writeValue(uid, newMatch, BPF_ANY); if (!res.ok()) return Errorf("Failed to add rule: {}", res.error().message()); } return {}; } Result Firewall::removeRule(uint32_t uid, UidOwnerMatchType match) { std::lock_guard guard(mMutex); auto oldMatch = mUidOwnerMap.readValue(uid); if (!oldMatch.ok()) return Errorf("uid: %u does not exist in map", uid); UidOwnerValue newMatch = { .iif = (match == IIF_MATCH) ? 0 : oldMatch.value().iif, .rule = oldMatch.value().rule & ~match, }; if (newMatch.rule == 0) { auto res = mUidOwnerMap.deleteValue(uid); if (!res.ok()) return Errorf("Failed to remove rule: {}", res.error().message()); } else { auto res = mUidOwnerMap.writeValue(uid, newMatch, BPF_ANY); if (!res.ok()) return Errorf("Failed to update rule: {}", res.error().message()); } return {}; } Result Firewall::addUidInterfaceRules(const std::string& ifName, const std::vector& uids) { unsigned int iif = if_nametoindex(ifName.c_str()); if (!iif) return Errorf("Failed to get interface index: {}", ifName); for (auto uid : uids) { auto res = addRule(uid, IIF_MATCH, iif); if (!res.ok()) return res; } return {}; } Result Firewall::removeUidInterfaceRules(const std::vector& uids) { for (auto uid : uids) { auto res = removeRule(uid, IIF_MATCH); if (!res.ok()) return res; } return {}; } Result Firewall::getDataSaverSetting() { std::lock_guard guard(mMutex); if (!mDataSaverEnabledMap.isValid()) { return Errorf("init mDataSaverEnabledMap failed"); } auto dataSaverSetting = mDataSaverEnabledMap.readValue(DATA_SAVER_ENABLED_KEY); if (!dataSaverSetting.ok()) { return Errorf("Cannot read the data saver setting: {}", dataSaverSetting.error().message()); } return dataSaverSetting; } Result Firewall::setDataSaver(bool enabled) { std::lock_guard guard(mMutex); if (!mDataSaverEnabledMap.isValid()) { return Errorf("init mDataSaverEnabledMap failed"); } auto res = mDataSaverEnabledMap.writeValue(DATA_SAVER_ENABLED_KEY, enabled, BPF_EXIST); if (!res.ok()) return Errorf("Failed to set data saver: {}", res.error().message()); return {}; }