blob: 5b835431e0ca1544dfeff17688535927ea45dfc1 [file] [log] [blame]
Kevin Cernekee95d4ae92016-06-19 10:26:29 -07001// Copyright 2016 The Chromium OS Authors. All rights reserved.
2// Use of this source code is governed by a BSD-style license that can be
3// found in the LICENSE file.
4
Garrick Evans3388a032020-03-24 11:25:55 +09005#ifndef PATCHPANEL_MANAGER_H_
6#define PATCHPANEL_MANAGER_H_
Kevin Cernekee95d4ae92016-06-19 10:26:29 -07007
Hugo Benichiadf1ec52020-01-17 16:23:58 +09008#include <iostream>
Garrick Evans49879532018-12-03 13:15:36 +09009#include <map>
Kevin Cernekee95d4ae92016-06-19 10:26:29 -070010#include <memory>
Garrick Evans49879532018-12-03 13:15:36 +090011#include <set>
Kevin Cernekee95d4ae92016-06-19 10:26:29 -070012#include <string>
Jason Jeremy Imanf4156cb2019-11-14 15:36:22 +090013#include <vector>
Kevin Cernekee95d4ae92016-06-19 10:26:29 -070014
15#include <base/memory/weak_ptr.h>
16#include <brillo/daemons/dbus_daemon.h>
Simon Glass2b1da092020-05-21 12:24:16 -060017#include <brillo/process/process_reaper.h>
Garrick Evans08843932019-09-17 14:41:08 +090018#include <chromeos/dbus/service_constants.h>
Hugo Benichi8135e562019-12-12 15:56:36 +090019#include <patchpanel/proto_bindings/patchpanel_service.pb.h>
Kevin Cernekee95d4ae92016-06-19 10:26:29 -070020
Garrick Evans3388a032020-03-24 11:25:55 +090021#include "patchpanel/address_manager.h"
22#include "patchpanel/arc_service.h"
23#include "patchpanel/crostini_service.h"
24#include "patchpanel/helper_process.h"
Jie Jiang01c1a2e2020-04-08 20:58:30 +090025#include "patchpanel/network_monitor_service.h"
Garrick Evans3388a032020-03-24 11:25:55 +090026#include "patchpanel/routing_service.h"
27#include "patchpanel/shill_client.h"
28#include "patchpanel/socket.h"
29#include "patchpanel/subnet.h"
30#include "patchpanel/traffic_forwarder.h"
Kevin Cernekee95d4ae92016-06-19 10:26:29 -070031
Garrick Evans3388a032020-03-24 11:25:55 +090032namespace patchpanel {
Kevin Cernekee95d4ae92016-06-19 10:26:29 -070033
34// Main class that runs the mainloop and responds to LAN interface changes.
Garrick Evans4ac09852020-01-16 14:09:22 +090035class Manager final : public brillo::DBusDaemon, private TrafficForwarder {
Kevin Cernekee95d4ae92016-06-19 10:26:29 -070036 public:
Hugo Benichiadf1ec52020-01-17 16:23:58 +090037 // Metadata for tracking state associated with a connected namespace.
38 struct ConnectNamespaceInfo {
39 // The pid of the client network namespace.
40 pid_t pid;
Hugo Benichi33860d72020-07-09 16:34:01 +090041 // The name attached to the client network namespace.
42 std::string netns_name;
Hugo Benichiadf1ec52020-01-17 16:23:58 +090043 // Name of the shill device for routing outbound traffic from the client
44 // namespace. Empty if outbound traffic should be forwarded to the highest
45 // priority network (physical or virtual).
46 std::string outbound_ifname;
47 // Name of the "local" veth device visible on the host namespace.
48 std::string host_ifname;
49 // Name of the "remote" veth device moved into the client namespace.
50 std::string client_ifname;
51 // IPv4 subnet assigned to the client namespace.
52 std::unique_ptr<Subnet> client_subnet;
53 };
54
Taoyu Lice7caa62019-10-01 15:43:33 +090055 Manager(std::unique_ptr<HelperProcess> adb_proxy,
Jason Jeremy Imand89b5f52019-10-24 10:39:17 +090056 std::unique_ptr<HelperProcess> mcast_proxy,
Garrick Evans1f5a3612019-11-08 12:59:03 +090057 std::unique_ptr<HelperProcess> nd_proxy);
Garrick Evans207e7482019-12-16 11:54:36 +090058 ~Manager();
Kevin Cernekee95d4ae92016-06-19 10:26:29 -070059
Garrick Evans4ac09852020-01-16 14:09:22 +090060 // TrafficForwarder methods.
61
62 void StartForwarding(const std::string& ifname_physical,
63 const std::string& ifname_virtual,
Garrick Evans4ac09852020-01-16 14:09:22 +090064 bool ipv6,
65 bool multicast) override;
66
67 void StopForwarding(const std::string& ifname_physical,
68 const std::string& ifname_virtual,
69 bool ipv6,
70 bool multicast) override;
71
Jason Jeremy Imanf4156cb2019-11-14 15:36:22 +090072 // This function is used to enable specific features only on selected
73 // combination of Android version, Chrome version, and boards.
74 // Empty |supportedBoards| means that the feature should be enabled on all
75 // board.
76 static bool ShouldEnableFeature(
77 int min_android_sdk_version,
78 int min_chrome_milestone,
79 const std::vector<std::string>& supported_boards,
80 const std::string& feature_name);
81
Kevin Cernekee95d4ae92016-06-19 10:26:29 -070082 protected:
83 int OnInit() override;
84
85 private:
Garrick Evans49879532018-12-03 13:15:36 +090086 void InitialSetup();
Kevin Cernekee95d4ae92016-06-19 10:26:29 -070087
Garrick Evanse94a14e2019-11-11 10:32:13 +090088 bool StartArc(pid_t pid);
Hugo Benichi4d4bb8f2020-07-07 12:16:07 +090089 void StopArc();
Garrick Evans015b0d62020-02-07 09:06:38 +090090 bool StartArcVm(uint32_t cid);
91 void StopArcVm(uint32_t cid);
Garrick Evans51d5b552020-01-30 10:42:06 +090092 bool StartCrosVm(uint64_t vm_id,
93 GuestMessage::GuestType vm_type,
Garrick Evans53a2a982020-02-05 10:53:35 +090094 uint32_t subnet_index = kAnySubnetIndex);
Garrick Evans51d5b552020-01-30 10:42:06 +090095 void StopCrosVm(uint64_t vm_id, GuestMessage::GuestType vm_type);
Garrick Evanse94a14e2019-11-11 10:32:13 +090096
Kevin Cernekee27bcaa62016-12-03 11:16:26 -080097 // Callback from ProcessReaper to notify Manager that one of the
98 // subprocesses died.
99 void OnSubprocessExited(pid_t pid, const siginfo_t& info);
Garrick Evans4c042572019-12-17 13:42:25 +0900100 void RestartSubprocess(HelperProcess* subproc);
Kevin Cernekee27bcaa62016-12-03 11:16:26 -0800101
Garrick Evans664a82f2019-12-17 12:18:05 +0900102 // Callback from Daemon to notify that SIGTERM or SIGINT was received and
Kevin Cernekee27bcaa62016-12-03 11:16:26 -0800103 // the daemon should clean up in preparation to exit.
104 void OnShutdown(int* exit_code) override;
105
Garrick Evans4ac09852020-01-16 14:09:22 +0900106 // Callback from NDProxy telling us to add a new IPv6 route.
107 void OnDeviceMessageFromNDProxy(const DeviceMessage& msg);
108
Garrick Evans08843932019-09-17 14:41:08 +0900109 // Handles DBus notification indicating ARC++ is booting up.
110 std::unique_ptr<dbus::Response> OnArcStartup(dbus::MethodCall* method_call);
111
112 // Handles DBus notification indicating ARC++ is spinning down.
113 std::unique_ptr<dbus::Response> OnArcShutdown(dbus::MethodCall* method_call);
114
115 // Handles DBus notification indicating ARCVM is booting up.
116 std::unique_ptr<dbus::Response> OnArcVmStartup(dbus::MethodCall* method_call);
117
118 // Handles DBus notification indicating ARCVM is spinning down.
119 std::unique_ptr<dbus::Response> OnArcVmShutdown(
120 dbus::MethodCall* method_call);
121
Garrick Evans47c19272019-11-21 10:58:21 +0900122 // Handles DBus notification indicating a Termina VM is booting up.
123 std::unique_ptr<dbus::Response> OnTerminaVmStartup(
124 dbus::MethodCall* method_call);
125
126 // Handles DBus notification indicating a Termina VM is spinning down.
127 std::unique_ptr<dbus::Response> OnTerminaVmShutdown(
128 dbus::MethodCall* method_call);
129
Garrick Evans51d5b552020-01-30 10:42:06 +0900130 // Handles DBus notification indicating a Plugin VM is booting up.
131 std::unique_ptr<dbus::Response> OnPluginVmStartup(
132 dbus::MethodCall* method_call);
133
134 // Handles DBus notification indicating a Plugin VM is spinning down.
135 std::unique_ptr<dbus::Response> OnPluginVmShutdown(
136 dbus::MethodCall* method_call);
137
Hugo Benichi7d9d8db2020-03-30 15:56:56 +0900138 // Handles DBus requests for setting a VPN intent fwmark on a socket.
139 std::unique_ptr<dbus::Response> OnSetVpnIntent(dbus::MethodCall* method_call);
140
Hugo Benichib56b77c2020-01-15 16:00:56 +0900141 // Handles DBus requests for connect and routing an existing network
142 // namespace created via minijail or through the rtnl
143 std::unique_ptr<dbus::Response> OnConnectNamespace(
144 dbus::MethodCall* method_call);
145
Jason Jeremy Imanb2a421e2020-07-04 20:48:32 +0900146 // Handles DBus requests for creating iptables rules by permission_broker.
147 std::unique_ptr<dbus::Response> OnModifyPortRule(
148 dbus::MethodCall* method_call);
149
Hugo Benichiadf1ec52020-01-17 16:23:58 +0900150 void ConnectNamespace(base::ScopedFD client_fd,
151 const patchpanel::ConnectNamespaceRequest& request,
152 patchpanel::ConnectNamespaceResponse& response);
153 void DisconnectNamespace(int client_fd);
Hugo Benichi7352ad92020-04-07 16:11:59 +0900154 // Detects if any file descriptor committed in ConnectNamespace DBus API has
155 // been invalidated by the caller. Calls DisconnectNamespace for any invalid
156 // fd found.
157 void CheckConnectedNamespaces();
Hugo Benichiadf1ec52020-01-17 16:23:58 +0900158
Garrick Evanse94a14e2019-11-11 10:32:13 +0900159 // Dispatch |msg| to child processes.
160 void SendGuestMessage(const GuestMessage& msg);
Garrick Evans96e03042019-05-28 14:30:52 +0900161
Hugo Benichi935eca92018-07-03 13:47:24 +0900162 friend std::ostream& operator<<(std::ostream& stream, const Manager& manager);
163
Garrick Evans69b85872020-02-04 11:40:26 +0900164 std::unique_ptr<ShillClient> shill_client_;
Hugo Benichi7d9d8db2020-03-30 15:56:56 +0900165 std::unique_ptr<RoutingService> routing_svc_;
Garrick Evans69b85872020-02-04 11:40:26 +0900166
Garrick Evans5d55f5e2019-07-17 15:28:10 +0900167 // Guest services.
168 std::unique_ptr<ArcService> arc_svc_;
Garrick Evans47c19272019-11-21 10:58:21 +0900169 std::unique_ptr<CrostiniService> cros_svc_;
Garrick Evans5d55f5e2019-07-17 15:28:10 +0900170
Garrick Evans08843932019-09-17 14:41:08 +0900171 // DBus service.
172 dbus::ExportedObject* dbus_svc_path_; // Owned by |bus_|.
173
Garrick Evans5d55f5e2019-07-17 15:28:10 +0900174 // Other services.
Garrick Evans3915af32019-07-25 15:44:34 +0900175 brillo::ProcessReaper process_reaper_;
Garrick Evans96e03042019-05-28 14:30:52 +0900176 std::unique_ptr<HelperProcess> adb_proxy_;
Jason Jeremy Imand89b5f52019-10-24 10:39:17 +0900177 std::unique_ptr<HelperProcess> mcast_proxy_;
Taoyu Lice7caa62019-10-01 15:43:33 +0900178 std::unique_ptr<HelperProcess> nd_proxy_;
Jie Jiang01c1a2e2020-04-08 20:58:30 +0900179 std::unique_ptr<NetworkMonitorService> network_monitor_svc_;
Garrick Evans96e03042019-05-28 14:30:52 +0900180
Garrick Evansf4a93292019-03-13 14:19:43 +0900181 AddressManager addr_mgr_;
Garrick Evansf4a93292019-03-13 14:19:43 +0900182
Jason Jeremy Imanf4156cb2019-11-14 15:36:22 +0900183 // |cached_feature_enabled| stores the cached result of if a feature should be
184 // enabled.
185 static std::map<const std::string, bool> cached_feature_enabled_;
186
Taoyu Li179dcc62019-10-17 11:21:08 +0900187 std::unique_ptr<MinijailedProcessRunner> runner_;
188 std::unique_ptr<Datapath> datapath_;
189
Hugo Benichiadf1ec52020-01-17 16:23:58 +0900190 // All namespaces currently connected through patchpanel ConnectNamespace
191 // API, keyed by file descriptors committed by clients when calling
192 // ConnectNamespace.
193 std::map<int, ConnectNamespaceInfo> connected_namespaces_;
194 int connected_namespaces_next_id_{0};
Hugo Benichi7352ad92020-04-07 16:11:59 +0900195 // epoll file descriptor for watching client fds committed with the
196 // ConnectNamespace DBus API.
197 int connected_namespaces_epollfd_;
Hugo Benichiadf1ec52020-01-17 16:23:58 +0900198
Kevin Cernekee95d4ae92016-06-19 10:26:29 -0700199 base::WeakPtrFactory<Manager> weak_factory_{this};
Garrick Evansf4a93292019-03-13 14:19:43 +0900200 DISALLOW_COPY_AND_ASSIGN(Manager);
Kevin Cernekee95d4ae92016-06-19 10:26:29 -0700201};
202
Hugo Benichiadf1ec52020-01-17 16:23:58 +0900203std::ostream& operator<<(std::ostream& stream,
204 const Manager::ConnectNamespaceInfo& ns_info);
205
Garrick Evans3388a032020-03-24 11:25:55 +0900206} // namespace patchpanel
Kevin Cernekee95d4ae92016-06-19 10:26:29 -0700207
Garrick Evans3388a032020-03-24 11:25:55 +0900208#endif // PATCHPANEL_MANAGER_H_