| /* |
| * Copyright (C) 2014 The Android Open Source Project |
| * |
| * Licensed under the Apache License, Version 2.0 (the "License"); |
| * you may not use this file except in compliance with the License. |
| * You may obtain a copy of the License at |
| * |
| * http://www.apache.org/licenses/LICENSE-2.0 |
| * |
| * Unless required by applicable law or agreed to in writing, software |
| * distributed under the License is distributed on an "AS IS" BASIS, |
| * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| * See the License for the specific language governing permissions and |
| * limitations under the License. |
| */ |
| |
| #include <set> |
| |
| #define LOG_TAG "Netd" |
| |
| #include "VirtualNetwork.h" |
| |
| #include "SockDiag.h" |
| #include "RouteController.h" |
| |
| #include "log/log.h" |
| |
| namespace android { |
| namespace net { |
| |
| VirtualNetwork::VirtualNetwork(unsigned netId, bool hasDns, bool secure) : |
| Network(netId), mHasDns(hasDns), mSecure(secure) { |
| } |
| |
| VirtualNetwork::~VirtualNetwork() { |
| } |
| |
| bool VirtualNetwork::getHasDns() const { |
| return mHasDns; |
| } |
| |
| bool VirtualNetwork::isSecure() const { |
| return mSecure; |
| } |
| |
| bool VirtualNetwork::appliesToUser(uid_t uid) const { |
| return mUidRanges.hasUid(uid); |
| } |
| |
| |
| int VirtualNetwork::maybeCloseSockets(bool add, const UidRanges& uidRanges, |
| const std::set<uid_t>& protectableUsers) { |
| if (!mSecure) { |
| return 0; |
| } |
| |
| SockDiag sd; |
| if (!sd.open()) { |
| return -EBADFD; |
| } |
| |
| if (int ret = sd.destroySockets(uidRanges, protectableUsers, true /* excludeLoopback */)) { |
| ALOGE("Failed to close sockets while %s %s to network %d: %s", |
| add ? "adding" : "removing", uidRanges.toString().c_str(), mNetId, strerror(-ret)); |
| return ret; |
| } |
| |
| return 0; |
| } |
| |
| int VirtualNetwork::addUsers(const UidRanges& uidRanges, const std::set<uid_t>& protectableUsers) { |
| maybeCloseSockets(true, uidRanges, protectableUsers); |
| |
| for (const std::string& interface : mInterfaces) { |
| if (int ret = RouteController::addUsersToVirtualNetwork(mNetId, interface.c_str(), mSecure, |
| uidRanges)) { |
| ALOGE("failed to add users on interface %s of netId %u", interface.c_str(), mNetId); |
| return ret; |
| } |
| } |
| mUidRanges.add(uidRanges); |
| return 0; |
| } |
| |
| int VirtualNetwork::removeUsers(const UidRanges& uidRanges, |
| const std::set<uid_t>& protectableUsers) { |
| maybeCloseSockets(false, uidRanges, protectableUsers); |
| |
| for (const std::string& interface : mInterfaces) { |
| if (int ret = RouteController::removeUsersFromVirtualNetwork(mNetId, interface.c_str(), |
| mSecure, uidRanges)) { |
| ALOGE("failed to remove users on interface %s of netId %u", interface.c_str(), mNetId); |
| return ret; |
| } |
| } |
| mUidRanges.remove(uidRanges); |
| return 0; |
| } |
| |
| Network::Type VirtualNetwork::getType() const { |
| return VIRTUAL; |
| } |
| |
| int VirtualNetwork::addInterface(const std::string& interface) { |
| if (hasInterface(interface)) { |
| return 0; |
| } |
| if (int ret = RouteController::addInterfaceToVirtualNetwork(mNetId, interface.c_str(), mSecure, |
| mUidRanges)) { |
| ALOGE("failed to add interface %s to VPN netId %u", interface.c_str(), mNetId); |
| return ret; |
| } |
| mInterfaces.insert(interface); |
| return 0; |
| } |
| |
| int VirtualNetwork::removeInterface(const std::string& interface) { |
| if (!hasInterface(interface)) { |
| return 0; |
| } |
| if (int ret = RouteController::removeInterfaceFromVirtualNetwork(mNetId, interface.c_str(), |
| mSecure, mUidRanges)) { |
| ALOGE("failed to remove interface %s from VPN netId %u", interface.c_str(), mNetId); |
| return ret; |
| } |
| mInterfaces.erase(interface); |
| return 0; |
| } |
| |
| } // namespace net |
| } // namespace android |