blob: 29c4073be94401710cc544492753efb0cebae669 [file] [log] [blame]
Kevin Cernekee95d4ae92016-06-19 10:26:29 -07001// Copyright 2016 The Chromium OS Authors. All rights reserved.
2// Use of this source code is governed by a BSD-style license that can be
3// found in the LICENSE file.
4
Garrick Evans3388a032020-03-24 11:25:55 +09005#ifndef PATCHPANEL_MANAGER_H_
6#define PATCHPANEL_MANAGER_H_
Kevin Cernekee95d4ae92016-06-19 10:26:29 -07007
Hugo Benichiadf1ec52020-01-17 16:23:58 +09008#include <iostream>
Garrick Evans49879532018-12-03 13:15:36 +09009#include <map>
Kevin Cernekee95d4ae92016-06-19 10:26:29 -070010#include <memory>
Garrick Evans49879532018-12-03 13:15:36 +090011#include <set>
Kevin Cernekee95d4ae92016-06-19 10:26:29 -070012#include <string>
Jason Jeremy Imanf4156cb2019-11-14 15:36:22 +090013#include <vector>
Kevin Cernekee95d4ae92016-06-19 10:26:29 -070014
15#include <base/memory/weak_ptr.h>
16#include <brillo/daemons/dbus_daemon.h>
Simon Glass2b1da092020-05-21 12:24:16 -060017#include <brillo/process/process_reaper.h>
Garrick Evans08843932019-09-17 14:41:08 +090018#include <chromeos/dbus/service_constants.h>
Hugo Benichi8135e562019-12-12 15:56:36 +090019#include <patchpanel/proto_bindings/patchpanel_service.pb.h>
Kevin Cernekee95d4ae92016-06-19 10:26:29 -070020
Garrick Evans3388a032020-03-24 11:25:55 +090021#include "patchpanel/address_manager.h"
22#include "patchpanel/arc_service.h"
23#include "patchpanel/crostini_service.h"
24#include "patchpanel/helper_process.h"
25#include "patchpanel/routing_service.h"
26#include "patchpanel/shill_client.h"
27#include "patchpanel/socket.h"
28#include "patchpanel/subnet.h"
29#include "patchpanel/traffic_forwarder.h"
Kevin Cernekee95d4ae92016-06-19 10:26:29 -070030
Garrick Evans3388a032020-03-24 11:25:55 +090031namespace patchpanel {
Kevin Cernekee95d4ae92016-06-19 10:26:29 -070032
33// Main class that runs the mainloop and responds to LAN interface changes.
Garrick Evans4ac09852020-01-16 14:09:22 +090034class Manager final : public brillo::DBusDaemon, private TrafficForwarder {
Kevin Cernekee95d4ae92016-06-19 10:26:29 -070035 public:
Hugo Benichiadf1ec52020-01-17 16:23:58 +090036 // Metadata for tracking state associated with a connected namespace.
37 struct ConnectNamespaceInfo {
38 // The pid of the client network namespace.
39 pid_t pid;
40 // Name of the shill device for routing outbound traffic from the client
41 // namespace. Empty if outbound traffic should be forwarded to the highest
42 // priority network (physical or virtual).
43 std::string outbound_ifname;
44 // Name of the "local" veth device visible on the host namespace.
45 std::string host_ifname;
46 // Name of the "remote" veth device moved into the client namespace.
47 std::string client_ifname;
48 // IPv4 subnet assigned to the client namespace.
49 std::unique_ptr<Subnet> client_subnet;
50 };
51
Taoyu Lice7caa62019-10-01 15:43:33 +090052 Manager(std::unique_ptr<HelperProcess> adb_proxy,
Jason Jeremy Imand89b5f52019-10-24 10:39:17 +090053 std::unique_ptr<HelperProcess> mcast_proxy,
Garrick Evans1f5a3612019-11-08 12:59:03 +090054 std::unique_ptr<HelperProcess> nd_proxy);
Garrick Evans207e7482019-12-16 11:54:36 +090055 ~Manager();
Kevin Cernekee95d4ae92016-06-19 10:26:29 -070056
Garrick Evans4ac09852020-01-16 14:09:22 +090057 // TrafficForwarder methods.
58
59 void StartForwarding(const std::string& ifname_physical,
60 const std::string& ifname_virtual,
Garrick Evans4ac09852020-01-16 14:09:22 +090061 bool ipv6,
62 bool multicast) override;
63
64 void StopForwarding(const std::string& ifname_physical,
65 const std::string& ifname_virtual,
66 bool ipv6,
67 bool multicast) override;
68
Jason Jeremy Imanf4156cb2019-11-14 15:36:22 +090069 // This function is used to enable specific features only on selected
70 // combination of Android version, Chrome version, and boards.
71 // Empty |supportedBoards| means that the feature should be enabled on all
72 // board.
73 static bool ShouldEnableFeature(
74 int min_android_sdk_version,
75 int min_chrome_milestone,
76 const std::vector<std::string>& supported_boards,
77 const std::string& feature_name);
78
Kevin Cernekee95d4ae92016-06-19 10:26:29 -070079 protected:
80 int OnInit() override;
81
82 private:
Garrick Evans49879532018-12-03 13:15:36 +090083 void InitialSetup();
Kevin Cernekee95d4ae92016-06-19 10:26:29 -070084
Garrick Evanse94a14e2019-11-11 10:32:13 +090085 bool StartArc(pid_t pid);
Garrick Evans21173b12019-11-20 15:23:16 +090086 void StopArc(pid_t pid);
Garrick Evans015b0d62020-02-07 09:06:38 +090087 bool StartArcVm(uint32_t cid);
88 void StopArcVm(uint32_t cid);
Garrick Evans51d5b552020-01-30 10:42:06 +090089 bool StartCrosVm(uint64_t vm_id,
90 GuestMessage::GuestType vm_type,
Garrick Evans53a2a982020-02-05 10:53:35 +090091 uint32_t subnet_index = kAnySubnetIndex);
Garrick Evans51d5b552020-01-30 10:42:06 +090092 void StopCrosVm(uint64_t vm_id, GuestMessage::GuestType vm_type);
Garrick Evanse94a14e2019-11-11 10:32:13 +090093
Kevin Cernekee27bcaa62016-12-03 11:16:26 -080094 // Callback from ProcessReaper to notify Manager that one of the
95 // subprocesses died.
96 void OnSubprocessExited(pid_t pid, const siginfo_t& info);
Garrick Evans4c042572019-12-17 13:42:25 +090097 void RestartSubprocess(HelperProcess* subproc);
Kevin Cernekee27bcaa62016-12-03 11:16:26 -080098
Garrick Evans664a82f2019-12-17 12:18:05 +090099 // Callback from Daemon to notify that SIGTERM or SIGINT was received and
Kevin Cernekee27bcaa62016-12-03 11:16:26 -0800100 // the daemon should clean up in preparation to exit.
101 void OnShutdown(int* exit_code) override;
102
Garrick Evans4ac09852020-01-16 14:09:22 +0900103 // Callback from NDProxy telling us to add a new IPv6 route.
104 void OnDeviceMessageFromNDProxy(const DeviceMessage& msg);
105
Garrick Evans08843932019-09-17 14:41:08 +0900106 // Handles DBus notification indicating ARC++ is booting up.
107 std::unique_ptr<dbus::Response> OnArcStartup(dbus::MethodCall* method_call);
108
109 // Handles DBus notification indicating ARC++ is spinning down.
110 std::unique_ptr<dbus::Response> OnArcShutdown(dbus::MethodCall* method_call);
111
112 // Handles DBus notification indicating ARCVM is booting up.
113 std::unique_ptr<dbus::Response> OnArcVmStartup(dbus::MethodCall* method_call);
114
115 // Handles DBus notification indicating ARCVM is spinning down.
116 std::unique_ptr<dbus::Response> OnArcVmShutdown(
117 dbus::MethodCall* method_call);
118
Garrick Evans47c19272019-11-21 10:58:21 +0900119 // Handles DBus notification indicating a Termina VM is booting up.
120 std::unique_ptr<dbus::Response> OnTerminaVmStartup(
121 dbus::MethodCall* method_call);
122
123 // Handles DBus notification indicating a Termina VM is spinning down.
124 std::unique_ptr<dbus::Response> OnTerminaVmShutdown(
125 dbus::MethodCall* method_call);
126
Garrick Evans51d5b552020-01-30 10:42:06 +0900127 // Handles DBus notification indicating a Plugin VM is booting up.
128 std::unique_ptr<dbus::Response> OnPluginVmStartup(
129 dbus::MethodCall* method_call);
130
131 // Handles DBus notification indicating a Plugin VM is spinning down.
132 std::unique_ptr<dbus::Response> OnPluginVmShutdown(
133 dbus::MethodCall* method_call);
134
Hugo Benichi7d9d8db2020-03-30 15:56:56 +0900135 // Handles DBus requests for setting a VPN intent fwmark on a socket.
136 std::unique_ptr<dbus::Response> OnSetVpnIntent(dbus::MethodCall* method_call);
137
Hugo Benichib56b77c2020-01-15 16:00:56 +0900138 // Handles DBus requests for connect and routing an existing network
139 // namespace created via minijail or through the rtnl
140 std::unique_ptr<dbus::Response> OnConnectNamespace(
141 dbus::MethodCall* method_call);
142
Hugo Benichiadf1ec52020-01-17 16:23:58 +0900143 void ConnectNamespace(base::ScopedFD client_fd,
144 const patchpanel::ConnectNamespaceRequest& request,
145 patchpanel::ConnectNamespaceResponse& response);
146 void DisconnectNamespace(int client_fd);
Hugo Benichi7352ad92020-04-07 16:11:59 +0900147 // Detects if any file descriptor committed in ConnectNamespace DBus API has
148 // been invalidated by the caller. Calls DisconnectNamespace for any invalid
149 // fd found.
150 void CheckConnectedNamespaces();
Hugo Benichiadf1ec52020-01-17 16:23:58 +0900151
Garrick Evanse94a14e2019-11-11 10:32:13 +0900152 // Dispatch |msg| to child processes.
153 void SendGuestMessage(const GuestMessage& msg);
Garrick Evans96e03042019-05-28 14:30:52 +0900154
Hugo Benichi935eca92018-07-03 13:47:24 +0900155 friend std::ostream& operator<<(std::ostream& stream, const Manager& manager);
156
Garrick Evans69b85872020-02-04 11:40:26 +0900157 std::unique_ptr<ShillClient> shill_client_;
Hugo Benichi7d9d8db2020-03-30 15:56:56 +0900158 std::unique_ptr<RoutingService> routing_svc_;
Garrick Evans69b85872020-02-04 11:40:26 +0900159
Garrick Evans5d55f5e2019-07-17 15:28:10 +0900160 // Guest services.
161 std::unique_ptr<ArcService> arc_svc_;
Garrick Evans47c19272019-11-21 10:58:21 +0900162 std::unique_ptr<CrostiniService> cros_svc_;
Garrick Evans5d55f5e2019-07-17 15:28:10 +0900163
Garrick Evans08843932019-09-17 14:41:08 +0900164 // DBus service.
165 dbus::ExportedObject* dbus_svc_path_; // Owned by |bus_|.
166
Garrick Evans5d55f5e2019-07-17 15:28:10 +0900167 // Other services.
Garrick Evans3915af32019-07-25 15:44:34 +0900168 brillo::ProcessReaper process_reaper_;
Garrick Evans96e03042019-05-28 14:30:52 +0900169 std::unique_ptr<HelperProcess> adb_proxy_;
Jason Jeremy Imand89b5f52019-10-24 10:39:17 +0900170 std::unique_ptr<HelperProcess> mcast_proxy_;
Taoyu Lice7caa62019-10-01 15:43:33 +0900171 std::unique_ptr<HelperProcess> nd_proxy_;
Garrick Evans96e03042019-05-28 14:30:52 +0900172
Garrick Evansf4a93292019-03-13 14:19:43 +0900173 AddressManager addr_mgr_;
Garrick Evansf4a93292019-03-13 14:19:43 +0900174
Jason Jeremy Imanf4156cb2019-11-14 15:36:22 +0900175 // |cached_feature_enabled| stores the cached result of if a feature should be
176 // enabled.
177 static std::map<const std::string, bool> cached_feature_enabled_;
178
Taoyu Li179dcc62019-10-17 11:21:08 +0900179 std::unique_ptr<MinijailedProcessRunner> runner_;
180 std::unique_ptr<Datapath> datapath_;
181
Hugo Benichiadf1ec52020-01-17 16:23:58 +0900182 // All namespaces currently connected through patchpanel ConnectNamespace
183 // API, keyed by file descriptors committed by clients when calling
184 // ConnectNamespace.
185 std::map<int, ConnectNamespaceInfo> connected_namespaces_;
186 int connected_namespaces_next_id_{0};
Hugo Benichi7352ad92020-04-07 16:11:59 +0900187 // epoll file descriptor for watching client fds committed with the
188 // ConnectNamespace DBus API.
189 int connected_namespaces_epollfd_;
Hugo Benichiadf1ec52020-01-17 16:23:58 +0900190
Kevin Cernekee95d4ae92016-06-19 10:26:29 -0700191 base::WeakPtrFactory<Manager> weak_factory_{this};
Garrick Evansf4a93292019-03-13 14:19:43 +0900192 DISALLOW_COPY_AND_ASSIGN(Manager);
Kevin Cernekee95d4ae92016-06-19 10:26:29 -0700193};
194
Hugo Benichiadf1ec52020-01-17 16:23:58 +0900195std::ostream& operator<<(std::ostream& stream,
196 const Manager::ConnectNamespaceInfo& ns_info);
197
Garrick Evans3388a032020-03-24 11:25:55 +0900198} // namespace patchpanel
Kevin Cernekee95d4ae92016-06-19 10:26:29 -0700199
Garrick Evans3388a032020-03-24 11:25:55 +0900200#endif // PATCHPANEL_MANAGER_H_