/*
* Copyright (C) 2014 The Android Open Source Project
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
#include <set>
#include "VirtualNetwork.h"
#include "SockDiag.h"
#include "RouteController.h"
#define LOG_TAG "Netd"
#include "log/log.h"
VirtualNetwork::VirtualNetwork(unsigned netId, bool hasDns, bool secure) :
Network(netId), mHasDns(hasDns), mSecure(secure) {
}
VirtualNetwork::~VirtualNetwork() {
}
bool VirtualNetwork::getHasDns() const {
return mHasDns;
}
bool VirtualNetwork::isSecure() const {
return mSecure;
}
bool VirtualNetwork::appliesToUser(uid_t uid) const {
return mUidRanges.hasUid(uid);
}
int VirtualNetwork::maybeCloseSockets(bool add, const UidRanges& uidRanges,
const std::set<uid_t>& protectableUsers) {
if (!mSecure) {
return 0;
}
SockDiag sd;
if (!sd.open()) {
return -EBADFD;
}
if (int ret = sd.destroySockets(uidRanges, protectableUsers, true /* excludeLoopback */)) {
ALOGE("Failed to close sockets while %s %s to network %d: %s",
add ? "adding" : "removing", uidRanges.toString().c_str(), mNetId, strerror(-ret));
return ret;
}
return 0;
}
int VirtualNetwork::addUsers(const UidRanges& uidRanges, const std::set<uid_t>& protectableUsers) {
maybeCloseSockets(true, uidRanges, protectableUsers);
for (const std::string& interface : mInterfaces) {
if (int ret = RouteController::addUsersToVirtualNetwork(mNetId, interface.c_str(), mSecure,
uidRanges)) {
ALOGE("failed to add users on interface %s of netId %u", interface.c_str(), mNetId);
return ret;
}
}
mUidRanges.add(uidRanges);
return 0;
}
int VirtualNetwork::removeUsers(const UidRanges& uidRanges,
const std::set<uid_t>& protectableUsers) {
maybeCloseSockets(false, uidRanges, protectableUsers);
for (const std::string& interface : mInterfaces) {
if (int ret = RouteController::removeUsersFromVirtualNetwork(mNetId, interface.c_str(),
mSecure, uidRanges)) {
ALOGE("failed to remove users on interface %s of netId %u", interface.c_str(), mNetId);
return ret;
}
}
mUidRanges.remove(uidRanges);
return 0;
}
Network::Type VirtualNetwork::getType() const {
return VIRTUAL;
}
int VirtualNetwork::addInterface(const std::string& interface) {
if (hasInterface(interface)) {
return 0;
}
if (int ret = RouteController::addInterfaceToVirtualNetwork(mNetId, interface.c_str(), mSecure,
mUidRanges)) {
ALOGE("failed to add interface %s to VPN netId %u", interface.c_str(), mNetId);
return ret;
}
mInterfaces.insert(interface);
return 0;
}
int VirtualNetwork::removeInterface(const std::string& interface) {
if (!hasInterface(interface)) {
return 0;
}
if (int ret = RouteController::removeInterfaceFromVirtualNetwork(mNetId, interface.c_str(),
mSecure, mUidRanges)) {
ALOGE("failed to remove interface %s from VPN netId %u", interface.c_str(), mNetId);
return ret;
}
mInterfaces.erase(interface);
return 0;
}