1 /*
2 * Copyright (C) 2011 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17 // #define LOG_NDEBUG 0
18
19 /*
20 * The CommandListener, FrameworkListener don't allow for
21 * multiple calls in parallel to reach the BandwidthController.
22 * If they ever were to allow it, then netd/ would need some tweaking.
23 */
24
25 #include <string>
26 #include <vector>
27
28 #include <errno.h>
29 #include <fcntl.h>
30 #include <stdio.h>
31 #include <stdlib.h>
32 #include <string.h>
33 #include <ctype.h>
34
35 #define __STDC_FORMAT_MACROS 1
36 #include <inttypes.h>
37
38 #include <sys/socket.h>
39 #include <sys/stat.h>
40 #include <sys/types.h>
41 #include <sys/wait.h>
42
43 #include <linux/netlink.h>
44 #include <linux/rtnetlink.h>
45 #include <linux/pkt_sched.h>
46
47 #include "android-base/stringprintf.h"
48 #include "android-base/strings.h"
49 #define LOG_TAG "BandwidthController"
50 #include <cutils/log.h>
51 #include <cutils/properties.h>
52 #include <logwrap/logwrap.h>
53
54 #include "NetdConstants.h"
55 #include "BandwidthController.h"
56 #include "NatController.h" /* For LOCAL_TETHER_COUNTERS_CHAIN */
57 #include "ResponseCode.h"
58
59 /* Alphabetical */
60 #define ALERT_IPT_TEMPLATE "%s %s -m quota2 ! --quota %" PRId64" --name %s\n"
61 const char* BandwidthController::LOCAL_INPUT = "bw_INPUT";
62 const char* BandwidthController::LOCAL_FORWARD = "bw_FORWARD";
63 const char* BandwidthController::LOCAL_OUTPUT = "bw_OUTPUT";
64 const char* BandwidthController::LOCAL_RAW_PREROUTING = "bw_raw_PREROUTING";
65 const char* BandwidthController::LOCAL_MANGLE_POSTROUTING = "bw_mangle_POSTROUTING";
66
67 auto BandwidthController::execFunction = android_fork_execvp;
68 auto BandwidthController::popenFunction = popen;
69 auto BandwidthController::iptablesRestoreFunction = execIptablesRestoreWithOutput;
70
71 using android::base::StringAppendF;
72 using android::base::StringPrintf;
73
74 namespace {
75
76 const char ALERT_GLOBAL_NAME[] = "globalAlert";
77 const int MAX_CMD_ARGS = 32;
78 const int MAX_CMD_LEN = 1024;
79 const int MAX_IFACENAME_LEN = 64;
80 const int MAX_IPT_OUTPUT_LINE_LEN = 256;
81 const std::string NEW_CHAIN_COMMAND = "-N ";
82 const std::string GET_TETHER_STATS_COMMAND = StringPrintf(
83 "*filter\n"
84 "-nvx -L %s\n"
85 "COMMIT\n", NatController::LOCAL_TETHER_COUNTERS_CHAIN);
86
87
88 /**
89 * Some comments about the rules:
90 * * Ordering
91 * - when an interface is marked as costly it should be INSERTED into the INPUT/OUTPUT chains.
92 * E.g. "-I bw_INPUT -i rmnet0 --jump costly"
93 * - quota'd rules in the costly chain should be before bw_penalty_box lookups.
94 * - the qtaguid counting is done at the end of the bw_INPUT/bw_OUTPUT user chains.
95 *
96 * * global quota vs per interface quota
97 * - global quota for all costly interfaces uses a single costly chain:
98 * . initial rules
99 * iptables -N bw_costly_shared
100 * iptables -I bw_INPUT -i iface0 --jump bw_costly_shared
101 * iptables -I bw_OUTPUT -o iface0 --jump bw_costly_shared
102 * iptables -I bw_costly_shared -m quota \! --quota 500000 \
103 * --jump REJECT --reject-with icmp-net-prohibited
104 * iptables -A bw_costly_shared --jump bw_penalty_box
105 * iptables -A bw_penalty_box --jump bw_happy_box
106 * iptables -A bw_happy_box --jump bw_data_saver
107 *
108 * . adding a new iface to this, E.g.:
109 * iptables -I bw_INPUT -i iface1 --jump bw_costly_shared
110 * iptables -I bw_OUTPUT -o iface1 --jump bw_costly_shared
111 *
112 * - quota per interface. This is achieve by having "costly" chains per quota.
113 * E.g. adding a new costly interface iface0 with its own quota:
114 * iptables -N bw_costly_iface0
115 * iptables -I bw_INPUT -i iface0 --jump bw_costly_iface0
116 * iptables -I bw_OUTPUT -o iface0 --jump bw_costly_iface0
117 * iptables -A bw_costly_iface0 -m quota \! --quota 500000 \
118 * --jump REJECT --reject-with icmp-port-unreachable
119 * iptables -A bw_costly_iface0 --jump bw_penalty_box
120 *
121 * * Penalty box, happy box and data saver.
122 * - bw_penalty box is a blacklist of apps that are rejected.
123 * - bw_happy_box is a whitelist of apps. It always includes all system apps
124 * - bw_data_saver implements data usage restrictions.
125 * - Via the UI the user can add and remove apps from the whitelist and
126 * blacklist, and turn on/off data saver.
127 * - The blacklist takes precedence over the whitelist and the whitelist
128 * takes precedence over data saver.
129 *
130 * * bw_penalty_box handling:
131 * - only one bw_penalty_box for all interfaces
132 * E.g Adding an app:
133 * iptables -I bw_penalty_box -m owner --uid-owner app_3 \
134 * --jump REJECT --reject-with icmp-port-unreachable
135 *
136 * * bw_happy_box handling:
137 * - The bw_happy_box comes after the penalty box.
138 * E.g Adding a happy app,
139 * iptables -I bw_happy_box -m owner --uid-owner app_3 \
140 * --jump RETURN
141 *
142 * * bw_data_saver handling:
143 * - The bw_data_saver comes after the happy box.
144 * Enable data saver:
145 * iptables -R 1 bw_data_saver --jump REJECT --reject-with icmp-port-unreachable
146 * Disable data saver:
147 * iptables -R 1 bw_data_saver --jump RETURN
148 */
149
150 const std::string COMMIT_AND_CLOSE = "COMMIT\n";
151 const std::string HAPPY_BOX_WHITELIST_COMMAND = StringPrintf(
152 "-I bw_happy_box -m owner --uid-owner %d-%d --jump RETURN", 0, MAX_SYSTEM_UID);
153
154 static const std::vector<std::string> IPT_FLUSH_COMMANDS = {
155 /*
156 * Cleanup rules.
157 * Should normally include bw_costly_<iface>, but we rely on the way they are setup
158 * to allow coexistance.
159 */
160 "*filter",
161 ":bw_INPUT -",
162 ":bw_OUTPUT -",
163 ":bw_FORWARD -",
164 ":bw_happy_box -",
165 ":bw_penalty_box -",
166 ":bw_data_saver -",
167 ":bw_costly_shared -",
168 "COMMIT",
169 "*raw",
170 ":bw_raw_PREROUTING -",
171 "COMMIT",
172 "*mangle",
173 ":bw_mangle_POSTROUTING -",
174 COMMIT_AND_CLOSE
175 };
176
177 static const std::vector<std::string> IPT_BASIC_ACCOUNTING_COMMANDS = {
178 "*filter",
179 "-A bw_INPUT -m owner --socket-exists", /* This is a tracking rule. */
180 "-A bw_OUTPUT -m owner --socket-exists", /* This is a tracking rule. */
181 "-A bw_costly_shared --jump bw_penalty_box",
182 "-A bw_penalty_box --jump bw_happy_box",
183 "-A bw_happy_box --jump bw_data_saver",
184 "-A bw_data_saver -j RETURN",
185 HAPPY_BOX_WHITELIST_COMMAND,
186 "COMMIT",
187
188 "*raw",
189 "-A bw_raw_PREROUTING -m owner --socket-exists", /* This is a tracking rule. */
190 "COMMIT",
191
192 "*mangle",
193 "-A bw_mangle_POSTROUTING -m owner --socket-exists", /* This is a tracking rule. */
194 COMMIT_AND_CLOSE
195 };
196
197
198 } // namespace
199
BandwidthController(void)200 BandwidthController::BandwidthController(void) {
201 }
202
runIpxtablesCmd(const char * cmd,IptJumpOp jumpHandling,IptFailureLog failureHandling)203 int BandwidthController::runIpxtablesCmd(const char *cmd, IptJumpOp jumpHandling,
204 IptFailureLog failureHandling) {
205 int res = 0;
206
207 ALOGV("runIpxtablesCmd(cmd=%s)", cmd);
208 res |= runIptablesCmd(cmd, jumpHandling, IptIpV4, failureHandling);
209 res |= runIptablesCmd(cmd, jumpHandling, IptIpV6, failureHandling);
210 return res;
211 }
212
StrncpyAndCheck(char * buffer,const char * src,size_t buffSize)213 int BandwidthController::StrncpyAndCheck(char *buffer, const char *src, size_t buffSize) {
214
215 memset(buffer, '\0', buffSize); // strncpy() is not filling leftover with '\0'
216 strncpy(buffer, src, buffSize);
217 return buffer[buffSize - 1];
218 }
219
runIptablesCmd(const char * cmd,IptJumpOp jumpHandling,IptIpVer iptVer,IptFailureLog failureHandling)220 int BandwidthController::runIptablesCmd(const char *cmd, IptJumpOp jumpHandling,
221 IptIpVer iptVer, IptFailureLog failureHandling) {
222 char buffer[MAX_CMD_LEN];
223 const char *argv[MAX_CMD_ARGS];
224 int argc = 0;
225 char *next = buffer;
226 char *tmp;
227 int res;
228 int status = 0;
229
230 std::string fullCmd = cmd;
231 fullCmd += jumpToString(jumpHandling);
232
233 fullCmd.insert(0, " -w ");
234 fullCmd.insert(0, iptVer == IptIpV4 ? IPTABLES_PATH : IP6TABLES_PATH);
235
236 if (StrncpyAndCheck(buffer, fullCmd.c_str(), sizeof(buffer))) {
237 ALOGE("iptables command too long");
238 return -1;
239 }
240
241 argc = 0;
242 while ((tmp = strsep(&next, " "))) {
243 argv[argc++] = tmp;
244 if (argc >= MAX_CMD_ARGS) {
245 ALOGE("iptables argument overflow");
246 return -1;
247 }
248 }
249
250 argv[argc] = NULL;
251 res = execFunction(argc, (char **)argv, &status, false,
252 failureHandling == IptFailShow);
253 res = res || !WIFEXITED(status) || WEXITSTATUS(status);
254 if (res && failureHandling == IptFailShow) {
255 ALOGE("runIptablesCmd(): res=%d status=%d failed %s", res, status,
256 fullCmd.c_str());
257 }
258 return res;
259 }
260
flushCleanTables(bool doClean)261 void BandwidthController::flushCleanTables(bool doClean) {
262 /* Flush and remove the bw_costly_<iface> tables */
263 flushExistingCostlyTables(doClean);
264
265 std::string commands = android::base::Join(IPT_FLUSH_COMMANDS, '\n');
266 iptablesRestoreFunction(V4V6, commands, nullptr);
267 }
268
setupIptablesHooks(void)269 int BandwidthController::setupIptablesHooks(void) {
270 /* flush+clean is allowed to fail */
271 flushCleanTables(true);
272 return 0;
273 }
274
enableBandwidthControl(bool force)275 int BandwidthController::enableBandwidthControl(bool force) {
276 char value[PROPERTY_VALUE_MAX];
277
278 if (!force) {
279 property_get("persist.bandwidth.enable", value, "1");
280 if (!strcmp(value, "0"))
281 return 0;
282 }
283
284 /* Let's pretend we started from scratch ... */
285 sharedQuotaIfaces.clear();
286 quotaIfaces.clear();
287 globalAlertBytes = 0;
288 globalAlertTetherCount = 0;
289 sharedQuotaBytes = sharedAlertBytes = 0;
290
291 flushCleanTables(false);
292 std::string commands = android::base::Join(IPT_BASIC_ACCOUNTING_COMMANDS, '\n');
293 return iptablesRestoreFunction(V4V6, commands, nullptr);
294 }
295
disableBandwidthControl(void)296 int BandwidthController::disableBandwidthControl(void) {
297
298 flushCleanTables(false);
299 return 0;
300 }
301
enableDataSaver(bool enable)302 int BandwidthController::enableDataSaver(bool enable) {
303 std::string cmd = StringPrintf(
304 "*filter\n"
305 "-R bw_data_saver 1%s\n"
306 "COMMIT\n", jumpToString(enable ? IptJumpReject : IptJumpReturn));
307 return iptablesRestoreFunction(V4V6, cmd, nullptr);
308 }
309
runCommands(int numCommands,const char * commands[],RunCmdErrHandling cmdErrHandling)310 int BandwidthController::runCommands(int numCommands, const char *commands[],
311 RunCmdErrHandling cmdErrHandling) {
312 int res = 0;
313 IptFailureLog failureLogging = IptFailShow;
314 if (cmdErrHandling == RunCmdFailureOk) {
315 failureLogging = IptFailHide;
316 }
317 ALOGV("runCommands(): %d commands", numCommands);
318 for (int cmdNum = 0; cmdNum < numCommands; cmdNum++) {
319 res = runIpxtablesCmd(commands[cmdNum], IptJumpNoAdd, failureLogging);
320 if (res && cmdErrHandling != RunCmdFailureOk)
321 return res;
322 }
323 return 0;
324 }
325
addNaughtyApps(int numUids,char * appUids[])326 int BandwidthController::addNaughtyApps(int numUids, char *appUids[]) {
327 return manipulateNaughtyApps(numUids, appUids, IptOpInsert);
328 }
329
removeNaughtyApps(int numUids,char * appUids[])330 int BandwidthController::removeNaughtyApps(int numUids, char *appUids[]) {
331 return manipulateNaughtyApps(numUids, appUids, IptOpDelete);
332 }
333
addNiceApps(int numUids,char * appUids[])334 int BandwidthController::addNiceApps(int numUids, char *appUids[]) {
335 return manipulateNiceApps(numUids, appUids, IptOpInsert);
336 }
337
removeNiceApps(int numUids,char * appUids[])338 int BandwidthController::removeNiceApps(int numUids, char *appUids[]) {
339 return manipulateNiceApps(numUids, appUids, IptOpDelete);
340 }
341
manipulateNaughtyApps(int numUids,char * appStrUids[],IptOp op)342 int BandwidthController::manipulateNaughtyApps(int numUids, char *appStrUids[], IptOp op) {
343 return manipulateSpecialApps(numUids, appStrUids, "bw_penalty_box", IptJumpReject, op);
344 }
345
manipulateNiceApps(int numUids,char * appStrUids[],IptOp op)346 int BandwidthController::manipulateNiceApps(int numUids, char *appStrUids[], IptOp op) {
347 return manipulateSpecialApps(numUids, appStrUids, "bw_happy_box", IptJumpReturn, op);
348 }
349
manipulateSpecialApps(int numUids,char * appStrUids[],const char * chain,IptJumpOp jumpHandling,IptOp op)350 int BandwidthController::manipulateSpecialApps(int numUids, char *appStrUids[],
351 const char *chain,
352 IptJumpOp jumpHandling, IptOp op) {
353 std::string cmd = "*filter\n";
354 for (int uidNum = 0; uidNum < numUids; uidNum++) {
355 StringAppendF(&cmd, "%s %s -m owner --uid-owner %s%s\n", opToString(op), chain,
356 appStrUids[uidNum], jumpToString(jumpHandling));
357 }
358 StringAppendF(&cmd, "COMMIT\n");
359 return iptablesRestoreFunction(V4V6, cmd, nullptr);
360 }
361
makeIptablesQuotaCmd(IptFullOp op,const char * costName,int64_t quota)362 std::string BandwidthController::makeIptablesQuotaCmd(IptFullOp op, const char *costName, int64_t quota) {
363 std::string res;
364 char *buff;
365 const char *opFlag;
366
367 ALOGV("makeIptablesQuotaCmd(%d, %" PRId64")", op, quota);
368
369 switch (op) {
370 case IptFullOpInsert:
371 opFlag = "-I";
372 break;
373 case IptFullOpAppend:
374 opFlag = "-A";
375 break;
376 case IptFullOpDelete:
377 opFlag = "-D";
378 break;
379 }
380
381 // The requried IP version specific --jump REJECT ... will be added later.
382 asprintf(&buff, "%s bw_costly_%s -m quota2 ! --quota %" PRId64" --name %s", opFlag, costName, quota,
383 costName);
384 res = buff;
385 free(buff);
386 return res;
387 }
388
prepCostlyIface(const char * ifn,QuotaType quotaType)389 int BandwidthController::prepCostlyIface(const char *ifn, QuotaType quotaType) {
390 char cmd[MAX_CMD_LEN];
391 int res = 0, res1, res2;
392 int ruleInsertPos = 1;
393 std::string costString;
394 const char *costCString;
395
396 /* The "-N costly" is created upfront, no need to handle it here. */
397 switch (quotaType) {
398 case QuotaUnique:
399 costString = "bw_costly_";
400 costString += ifn;
401 costCString = costString.c_str();
402 /*
403 * Flush the bw_costly_<iface> is allowed to fail in case it didn't exist.
404 * Creating a new one is allowed to fail in case it existed.
405 * This helps with netd restarts.
406 */
407 snprintf(cmd, sizeof(cmd), "-F %s", costCString);
408 res1 = runIpxtablesCmd(cmd, IptJumpNoAdd, IptFailHide);
409 snprintf(cmd, sizeof(cmd), "-N %s", costCString);
410 res2 = runIpxtablesCmd(cmd, IptJumpNoAdd, IptFailHide);
411 res = (res1 && res2) || (!res1 && !res2);
412
413 snprintf(cmd, sizeof(cmd), "-A %s -j bw_penalty_box", costCString);
414 res |= runIpxtablesCmd(cmd, IptJumpNoAdd);
415 break;
416 case QuotaShared:
417 costCString = "bw_costly_shared";
418 break;
419 }
420
421 if (globalAlertBytes) {
422 /* The alert rule comes 1st */
423 ruleInsertPos = 2;
424 }
425
426 snprintf(cmd, sizeof(cmd), "-D bw_INPUT -i %s --jump %s", ifn, costCString);
427 runIpxtablesCmd(cmd, IptJumpNoAdd, IptFailHide);
428
429 snprintf(cmd, sizeof(cmd), "-I bw_INPUT %d -i %s --jump %s", ruleInsertPos, ifn, costCString);
430 res |= runIpxtablesCmd(cmd, IptJumpNoAdd);
431
432 snprintf(cmd, sizeof(cmd), "-D bw_OUTPUT -o %s --jump %s", ifn, costCString);
433 runIpxtablesCmd(cmd, IptJumpNoAdd, IptFailHide);
434
435 snprintf(cmd, sizeof(cmd), "-I bw_OUTPUT %d -o %s --jump %s", ruleInsertPos, ifn, costCString);
436 res |= runIpxtablesCmd(cmd, IptJumpNoAdd);
437
438 snprintf(cmd, sizeof(cmd), "-D bw_FORWARD -o %s --jump %s", ifn, costCString);
439 runIpxtablesCmd(cmd, IptJumpNoAdd, IptFailHide);
440 snprintf(cmd, sizeof(cmd), "-A bw_FORWARD -o %s --jump %s", ifn, costCString);
441 res |= runIpxtablesCmd(cmd, IptJumpNoAdd);
442
443 return res;
444 }
445
cleanupCostlyIface(const char * ifn,QuotaType quotaType)446 int BandwidthController::cleanupCostlyIface(const char *ifn, QuotaType quotaType) {
447 char cmd[MAX_CMD_LEN];
448 int res = 0;
449 std::string costString;
450 const char *costCString;
451
452 switch (quotaType) {
453 case QuotaUnique:
454 costString = "bw_costly_";
455 costString += ifn;
456 costCString = costString.c_str();
457 break;
458 case QuotaShared:
459 costCString = "bw_costly_shared";
460 break;
461 }
462
463 snprintf(cmd, sizeof(cmd), "-D bw_INPUT -i %s --jump %s", ifn, costCString);
464 res |= runIpxtablesCmd(cmd, IptJumpNoAdd);
465 for (const auto tableName : {LOCAL_OUTPUT, LOCAL_FORWARD}) {
466 snprintf(cmd, sizeof(cmd), "-D %s -o %s --jump %s", tableName, ifn, costCString);
467 res |= runIpxtablesCmd(cmd, IptJumpNoAdd);
468 }
469
470 /* The "-N bw_costly_shared" is created upfront, no need to handle it here. */
471 if (quotaType == QuotaUnique) {
472 snprintf(cmd, sizeof(cmd), "-F %s", costCString);
473 res |= runIpxtablesCmd(cmd, IptJumpNoAdd);
474 snprintf(cmd, sizeof(cmd), "-X %s", costCString);
475 res |= runIpxtablesCmd(cmd, IptJumpNoAdd);
476 }
477 return res;
478 }
479
setInterfaceSharedQuota(const char * iface,int64_t maxBytes)480 int BandwidthController::setInterfaceSharedQuota(const char *iface, int64_t maxBytes) {
481 char ifn[MAX_IFACENAME_LEN];
482 int res = 0;
483 std::string quotaCmd;
484 std::string ifaceName;
485 ;
486 const char *costName = "shared";
487 std::list<std::string>::iterator it;
488
489 if (!maxBytes) {
490 /* Don't talk about -1, deprecate it. */
491 ALOGE("Invalid bytes value. 1..max_int64.");
492 return -1;
493 }
494 if (!isIfaceName(iface))
495 return -1;
496 if (StrncpyAndCheck(ifn, iface, sizeof(ifn))) {
497 ALOGE("Interface name longer than %d", MAX_IFACENAME_LEN);
498 return -1;
499 }
500 ifaceName = ifn;
501
502 if (maxBytes == -1) {
503 return removeInterfaceSharedQuota(ifn);
504 }
505
506 /* Insert ingress quota. */
507 for (it = sharedQuotaIfaces.begin(); it != sharedQuotaIfaces.end(); it++) {
508 if (*it == ifaceName)
509 break;
510 }
511
512 if (it == sharedQuotaIfaces.end()) {
513 res |= prepCostlyIface(ifn, QuotaShared);
514 if (sharedQuotaIfaces.empty()) {
515 quotaCmd = makeIptablesQuotaCmd(IptFullOpInsert, costName, maxBytes);
516 res |= runIpxtablesCmd(quotaCmd.c_str(), IptJumpReject);
517 if (res) {
518 ALOGE("Failed set quota rule");
519 goto fail;
520 }
521 sharedQuotaBytes = maxBytes;
522 }
523 sharedQuotaIfaces.push_front(ifaceName);
524
525 }
526
527 if (maxBytes != sharedQuotaBytes) {
528 res |= updateQuota(costName, maxBytes);
529 if (res) {
530 ALOGE("Failed update quota for %s", costName);
531 goto fail;
532 }
533 sharedQuotaBytes = maxBytes;
534 }
535 return 0;
536
537 fail:
538 /*
539 * TODO(jpa): once we get rid of iptables in favor of rtnetlink, reparse
540 * rules in the kernel to see which ones need cleaning up.
541 * For now callers needs to choose if they want to "ndc bandwidth enable"
542 * which resets everything.
543 */
544 removeInterfaceSharedQuota(ifn);
545 return -1;
546 }
547
548 /* It will also cleanup any shared alerts */
removeInterfaceSharedQuota(const char * iface)549 int BandwidthController::removeInterfaceSharedQuota(const char *iface) {
550 char ifn[MAX_IFACENAME_LEN];
551 int res = 0;
552 std::string ifaceName;
553 std::list<std::string>::iterator it;
554 const char *costName = "shared";
555
556 if (!isIfaceName(iface))
557 return -1;
558 if (StrncpyAndCheck(ifn, iface, sizeof(ifn))) {
559 ALOGE("Interface name longer than %d", MAX_IFACENAME_LEN);
560 return -1;
561 }
562 ifaceName = ifn;
563
564 for (it = sharedQuotaIfaces.begin(); it != sharedQuotaIfaces.end(); it++) {
565 if (*it == ifaceName)
566 break;
567 }
568 if (it == sharedQuotaIfaces.end()) {
569 ALOGE("No such iface %s to delete", ifn);
570 return -1;
571 }
572
573 res |= cleanupCostlyIface(ifn, QuotaShared);
574 sharedQuotaIfaces.erase(it);
575
576 if (sharedQuotaIfaces.empty()) {
577 std::string quotaCmd;
578 quotaCmd = makeIptablesQuotaCmd(IptFullOpDelete, costName, sharedQuotaBytes);
579 res |= runIpxtablesCmd(quotaCmd.c_str(), IptJumpReject);
580 sharedQuotaBytes = 0;
581 if (sharedAlertBytes) {
582 removeSharedAlert();
583 sharedAlertBytes = 0;
584 }
585 }
586 return res;
587 }
588
setInterfaceQuota(const char * iface,int64_t maxBytes)589 int BandwidthController::setInterfaceQuota(const char *iface, int64_t maxBytes) {
590 char ifn[MAX_IFACENAME_LEN];
591 int res = 0;
592 std::string ifaceName;
593 const char *costName;
594 std::list<QuotaInfo>::iterator it;
595 std::string quotaCmd;
596
597 if (!isIfaceName(iface))
598 return -1;
599
600 if (!maxBytes) {
601 /* Don't talk about -1, deprecate it. */
602 ALOGE("Invalid bytes value. 1..max_int64.");
603 return -1;
604 }
605 if (maxBytes == -1) {
606 return removeInterfaceQuota(iface);
607 }
608
609 if (StrncpyAndCheck(ifn, iface, sizeof(ifn))) {
610 ALOGE("Interface name longer than %d", MAX_IFACENAME_LEN);
611 return -1;
612 }
613 ifaceName = ifn;
614 costName = iface;
615
616 /* Insert ingress quota. */
617 for (it = quotaIfaces.begin(); it != quotaIfaces.end(); it++) {
618 if (it->ifaceName == ifaceName)
619 break;
620 }
621
622 if (it == quotaIfaces.end()) {
623 /* Preparing the iface adds a penalty/happy box check */
624 res |= prepCostlyIface(ifn, QuotaUnique);
625 /*
626 * The rejecting quota limit should go after the penalty/happy box checks
627 * or else a naughty app could just eat up the quota.
628 * So we append here.
629 */
630 quotaCmd = makeIptablesQuotaCmd(IptFullOpAppend, costName, maxBytes);
631 res |= runIpxtablesCmd(quotaCmd.c_str(), IptJumpReject);
632 if (res) {
633 ALOGE("Failed set quota rule");
634 goto fail;
635 }
636
637 quotaIfaces.push_front(QuotaInfo(ifaceName, maxBytes, 0));
638
639 } else {
640 res |= updateQuota(costName, maxBytes);
641 if (res) {
642 ALOGE("Failed update quota for %s", iface);
643 goto fail;
644 }
645 it->quota = maxBytes;
646 }
647 return 0;
648
649 fail:
650 /*
651 * TODO(jpa): once we get rid of iptables in favor of rtnetlink, reparse
652 * rules in the kernel to see which ones need cleaning up.
653 * For now callers needs to choose if they want to "ndc bandwidth enable"
654 * which resets everything.
655 */
656 removeInterfaceSharedQuota(ifn);
657 return -1;
658 }
659
getInterfaceSharedQuota(int64_t * bytes)660 int BandwidthController::getInterfaceSharedQuota(int64_t *bytes) {
661 return getInterfaceQuota("shared", bytes);
662 }
663
getInterfaceQuota(const char * costName,int64_t * bytes)664 int BandwidthController::getInterfaceQuota(const char *costName, int64_t *bytes) {
665 FILE *fp;
666 char *fname;
667 int scanRes;
668
669 if (!isIfaceName(costName))
670 return -1;
671
672 asprintf(&fname, "/proc/net/xt_quota/%s", costName);
673 fp = fopen(fname, "re");
674 free(fname);
675 if (!fp) {
676 ALOGE("Reading quota %s failed (%s)", costName, strerror(errno));
677 return -1;
678 }
679 scanRes = fscanf(fp, "%" SCNd64, bytes);
680 ALOGV("Read quota res=%d bytes=%" PRId64, scanRes, *bytes);
681 fclose(fp);
682 return scanRes == 1 ? 0 : -1;
683 }
684
removeInterfaceQuota(const char * iface)685 int BandwidthController::removeInterfaceQuota(const char *iface) {
686
687 char ifn[MAX_IFACENAME_LEN];
688 int res = 0;
689 std::string ifaceName;
690 std::list<QuotaInfo>::iterator it;
691
692 if (!isIfaceName(iface))
693 return -1;
694 if (StrncpyAndCheck(ifn, iface, sizeof(ifn))) {
695 ALOGE("Interface name longer than %d", MAX_IFACENAME_LEN);
696 return -1;
697 }
698 ifaceName = ifn;
699
700 for (it = quotaIfaces.begin(); it != quotaIfaces.end(); it++) {
701 if (it->ifaceName == ifaceName)
702 break;
703 }
704
705 if (it == quotaIfaces.end()) {
706 ALOGE("No such iface %s to delete", ifn);
707 return -1;
708 }
709
710 /* This also removes the quota command of CostlyIface chain. */
711 res |= cleanupCostlyIface(ifn, QuotaUnique);
712
713 quotaIfaces.erase(it);
714
715 return res;
716 }
717
updateQuota(const char * quotaName,int64_t bytes)718 int BandwidthController::updateQuota(const char *quotaName, int64_t bytes) {
719 FILE *fp;
720 char *fname;
721
722 if (!isIfaceName(quotaName)) {
723 ALOGE("updateQuota: Invalid quotaName \"%s\"", quotaName);
724 return -1;
725 }
726
727 asprintf(&fname, "/proc/net/xt_quota/%s", quotaName);
728 fp = fopen(fname, "we");
729 free(fname);
730 if (!fp) {
731 ALOGE("Updating quota %s failed (%s)", quotaName, strerror(errno));
732 return -1;
733 }
734 fprintf(fp, "%" PRId64"\n", bytes);
735 fclose(fp);
736 return 0;
737 }
738
runIptablesAlertCmd(IptOp op,const char * alertName,int64_t bytes)739 int BandwidthController::runIptablesAlertCmd(IptOp op, const char *alertName, int64_t bytes) {
740 const char *opFlag = opToString(op);
741 std::string alertQuotaCmd = "*filter\n";
742
743 // TODO: consider using an alternate template for the delete that does not include the --quota
744 // value. This code works because the --quota value is ignored by deletes
745 StringAppendF(&alertQuotaCmd, ALERT_IPT_TEMPLATE, opFlag, "bw_INPUT", bytes, alertName);
746 StringAppendF(&alertQuotaCmd, ALERT_IPT_TEMPLATE, opFlag, "bw_OUTPUT", bytes, alertName);
747 StringAppendF(&alertQuotaCmd, "COMMIT\n");
748
749 return iptablesRestoreFunction(V4V6, alertQuotaCmd, nullptr);
750 }
751
runIptablesAlertFwdCmd(IptOp op,const char * alertName,int64_t bytes)752 int BandwidthController::runIptablesAlertFwdCmd(IptOp op, const char *alertName, int64_t bytes) {
753 const char *opFlag = opToString(op);
754 std::string alertQuotaCmd = "*filter\n";
755 StringAppendF(&alertQuotaCmd, ALERT_IPT_TEMPLATE, opFlag, "bw_FORWARD", bytes, alertName);
756 StringAppendF(&alertQuotaCmd, "COMMIT\n");
757
758 return iptablesRestoreFunction(V4V6, alertQuotaCmd, nullptr);
759 }
760
setGlobalAlert(int64_t bytes)761 int BandwidthController::setGlobalAlert(int64_t bytes) {
762 const char *alertName = ALERT_GLOBAL_NAME;
763 int res = 0;
764
765 if (!bytes) {
766 ALOGE("Invalid bytes value. 1..max_int64.");
767 return -1;
768 }
769 if (globalAlertBytes) {
770 res = updateQuota(alertName, bytes);
771 } else {
772 res = runIptablesAlertCmd(IptOpInsert, alertName, bytes);
773 if (globalAlertTetherCount) {
774 ALOGV("setGlobalAlert for %d tether", globalAlertTetherCount);
775 res |= runIptablesAlertFwdCmd(IptOpInsert, alertName, bytes);
776 }
777 }
778 globalAlertBytes = bytes;
779 return res;
780 }
781
setGlobalAlertInForwardChain(void)782 int BandwidthController::setGlobalAlertInForwardChain(void) {
783 const char *alertName = ALERT_GLOBAL_NAME;
784 int res = 0;
785
786 globalAlertTetherCount++;
787 ALOGV("setGlobalAlertInForwardChain(): %d tether", globalAlertTetherCount);
788
789 /*
790 * If there is no globalAlert active we are done.
791 * If there is an active globalAlert but this is not the 1st
792 * tether, we are also done.
793 */
794 if (!globalAlertBytes || globalAlertTetherCount != 1) {
795 return 0;
796 }
797
798 /* We only add the rule if this was the 1st tether added. */
799 res = runIptablesAlertFwdCmd(IptOpInsert, alertName, globalAlertBytes);
800 return res;
801 }
802
removeGlobalAlert(void)803 int BandwidthController::removeGlobalAlert(void) {
804
805 const char *alertName = ALERT_GLOBAL_NAME;
806 int res = 0;
807
808 if (!globalAlertBytes) {
809 ALOGE("No prior alert set");
810 return -1;
811 }
812 res = runIptablesAlertCmd(IptOpDelete, alertName, globalAlertBytes);
813 if (globalAlertTetherCount) {
814 res |= runIptablesAlertFwdCmd(IptOpDelete, alertName, globalAlertBytes);
815 }
816 globalAlertBytes = 0;
817 return res;
818 }
819
removeGlobalAlertInForwardChain(void)820 int BandwidthController::removeGlobalAlertInForwardChain(void) {
821 int res = 0;
822 const char *alertName = ALERT_GLOBAL_NAME;
823
824 if (!globalAlertTetherCount) {
825 ALOGE("No prior alert set");
826 return -1;
827 }
828
829 globalAlertTetherCount--;
830 /*
831 * If there is no globalAlert active we are done.
832 * If there is an active globalAlert but there are more
833 * tethers, we are also done.
834 */
835 if (!globalAlertBytes || globalAlertTetherCount >= 1) {
836 return 0;
837 }
838
839 /* We only detete the rule if this was the last tether removed. */
840 res = runIptablesAlertFwdCmd(IptOpDelete, alertName, globalAlertBytes);
841 return res;
842 }
843
setSharedAlert(int64_t bytes)844 int BandwidthController::setSharedAlert(int64_t bytes) {
845 if (!sharedQuotaBytes) {
846 ALOGE("Need to have a prior shared quota set to set an alert");
847 return -1;
848 }
849 if (!bytes) {
850 ALOGE("Invalid bytes value. 1..max_int64.");
851 return -1;
852 }
853 return setCostlyAlert("shared", bytes, &sharedAlertBytes);
854 }
855
removeSharedAlert(void)856 int BandwidthController::removeSharedAlert(void) {
857 return removeCostlyAlert("shared", &sharedAlertBytes);
858 }
859
setInterfaceAlert(const char * iface,int64_t bytes)860 int BandwidthController::setInterfaceAlert(const char *iface, int64_t bytes) {
861 std::list<QuotaInfo>::iterator it;
862
863 if (!isIfaceName(iface)) {
864 ALOGE("setInterfaceAlert: Invalid iface \"%s\"", iface);
865 return -1;
866 }
867
868 if (!bytes) {
869 ALOGE("Invalid bytes value. 1..max_int64.");
870 return -1;
871 }
872 for (it = quotaIfaces.begin(); it != quotaIfaces.end(); it++) {
873 if (it->ifaceName == iface)
874 break;
875 }
876
877 if (it == quotaIfaces.end()) {
878 ALOGE("Need to have a prior interface quota set to set an alert");
879 return -1;
880 }
881
882 return setCostlyAlert(iface, bytes, &it->alert);
883 }
884
removeInterfaceAlert(const char * iface)885 int BandwidthController::removeInterfaceAlert(const char *iface) {
886 std::list<QuotaInfo>::iterator it;
887
888 if (!isIfaceName(iface)) {
889 ALOGE("removeInterfaceAlert: Invalid iface \"%s\"", iface);
890 return -1;
891 }
892
893 for (it = quotaIfaces.begin(); it != quotaIfaces.end(); it++) {
894 if (it->ifaceName == iface)
895 break;
896 }
897
898 if (it == quotaIfaces.end()) {
899 ALOGE("No prior alert set for interface %s", iface);
900 return -1;
901 }
902
903 return removeCostlyAlert(iface, &it->alert);
904 }
905
setCostlyAlert(const char * costName,int64_t bytes,int64_t * alertBytes)906 int BandwidthController::setCostlyAlert(const char *costName, int64_t bytes, int64_t *alertBytes) {
907 char *alertQuotaCmd;
908 char *chainName;
909 int res = 0;
910 char *alertName;
911
912 if (!isIfaceName(costName)) {
913 ALOGE("setCostlyAlert: Invalid costName \"%s\"", costName);
914 return -1;
915 }
916
917 if (!bytes) {
918 ALOGE("Invalid bytes value. 1..max_int64.");
919 return -1;
920 }
921 asprintf(&alertName, "%sAlert", costName);
922 if (*alertBytes) {
923 res = updateQuota(alertName, *alertBytes);
924 } else {
925 asprintf(&chainName, "bw_costly_%s", costName);
926 asprintf(&alertQuotaCmd, ALERT_IPT_TEMPLATE, "-A", chainName, bytes, alertName);
927 res |= runIpxtablesCmd(alertQuotaCmd, IptJumpNoAdd);
928 free(alertQuotaCmd);
929 free(chainName);
930 }
931 *alertBytes = bytes;
932 free(alertName);
933 return res;
934 }
935
removeCostlyAlert(const char * costName,int64_t * alertBytes)936 int BandwidthController::removeCostlyAlert(const char *costName, int64_t *alertBytes) {
937 char *alertQuotaCmd;
938 char *chainName;
939 char *alertName;
940 int res = 0;
941
942 if (!isIfaceName(costName)) {
943 ALOGE("removeCostlyAlert: Invalid costName \"%s\"", costName);
944 return -1;
945 }
946
947 if (!*alertBytes) {
948 ALOGE("No prior alert set for %s alert", costName);
949 return -1;
950 }
951
952 asprintf(&alertName, "%sAlert", costName);
953 asprintf(&chainName, "bw_costly_%s", costName);
954 asprintf(&alertQuotaCmd, ALERT_IPT_TEMPLATE, "-D", chainName, *alertBytes, alertName);
955 res |= runIpxtablesCmd(alertQuotaCmd, IptJumpNoAdd);
956 free(alertQuotaCmd);
957 free(chainName);
958
959 *alertBytes = 0;
960 free(alertName);
961 return res;
962 }
963
addStats(TetherStatsList & statsList,const TetherStats & stats)964 void BandwidthController::addStats(TetherStatsList& statsList, const TetherStats& stats) {
965 for (TetherStats& existing : statsList) {
966 if (existing.addStatsIfMatch(stats)) {
967 return;
968 }
969 }
970 // No match. Insert a new interface pair.
971 statsList.push_back(stats);
972 }
973
974 /*
975 * Parse the ptks and bytes out of:
976 * Chain natctrl_tether_counters (4 references)
977 * pkts bytes target prot opt in out source destination
978 * 26 2373 RETURN all -- wlan0 rmnet0 0.0.0.0/0 0.0.0.0/0
979 * 27 2002 RETURN all -- rmnet0 wlan0 0.0.0.0/0 0.0.0.0/0
980 * 1040 107471 RETURN all -- bt-pan rmnet0 0.0.0.0/0 0.0.0.0/0
981 * 1450 1708806 RETURN all -- rmnet0 bt-pan 0.0.0.0/0 0.0.0.0/0
982 * or:
983 * Chain natctrl_tether_counters (0 references)
984 * pkts bytes target prot opt in out source destination
985 * 0 0 RETURN all wlan0 rmnet_data0 ::/0 ::/0
986 * 0 0 RETURN all rmnet_data0 wlan0 ::/0 ::/0
987 *
988 * It results in an error if invoked and no tethering counter rules exist. The constraint
989 * helps detect complete parsing failure.
990 */
addForwardChainStats(const TetherStats & filter,TetherStatsList & statsList,const std::string & statsOutput,std::string & extraProcessingInfo)991 int BandwidthController::addForwardChainStats(const TetherStats& filter,
992 TetherStatsList& statsList,
993 const std::string& statsOutput,
994 std::string &extraProcessingInfo) {
995 int res;
996 std::string statsLine;
997 char iface0[MAX_IPT_OUTPUT_LINE_LEN];
998 char iface1[MAX_IPT_OUTPUT_LINE_LEN];
999 char rest[MAX_IPT_OUTPUT_LINE_LEN];
1000
1001 TetherStats stats;
1002 const char *buffPtr;
1003 int64_t packets, bytes;
1004 int statsFound = 0;
1005
1006 bool filterPair = filter.intIface[0] && filter.extIface[0];
1007
1008 char *filterMsg = filter.getStatsLine();
1009 ALOGV("filter: %s", filterMsg);
1010 free(filterMsg);
1011
1012 stats = filter;
1013
1014 std::stringstream stream(statsOutput);
1015 while (std::getline(stream, statsLine, '\n')) {
1016 buffPtr = statsLine.c_str();
1017
1018 /* Clean up, so a failed parse can still print info */
1019 iface0[0] = iface1[0] = rest[0] = packets = bytes = 0;
1020 if (strstr(buffPtr, "0.0.0.0")) {
1021 // IPv4 has -- indicating what to do with fragments...
1022 // 26 2373 RETURN all -- wlan0 rmnet0 0.0.0.0/0 0.0.0.0/0
1023 res = sscanf(buffPtr, "%" SCNd64" %" SCNd64" RETURN all -- %s %s 0.%s",
1024 &packets, &bytes, iface0, iface1, rest);
1025 } else {
1026 // ... but IPv6 does not.
1027 // 26 2373 RETURN all wlan0 rmnet0 ::/0 ::/0
1028 res = sscanf(buffPtr, "%" SCNd64" %" SCNd64" RETURN all %s %s ::/%s",
1029 &packets, &bytes, iface0, iface1, rest);
1030 }
1031 ALOGV("parse res=%d iface0=<%s> iface1=<%s> pkts=%" PRId64" bytes=%" PRId64" rest=<%s> orig line=<%s>", res,
1032 iface0, iface1, packets, bytes, rest, buffPtr);
1033 extraProcessingInfo += buffPtr;
1034 extraProcessingInfo += "\n";
1035
1036 if (res != 5) {
1037 continue;
1038 }
1039 /*
1040 * The following assumes that the 1st rule has in:extIface out:intIface,
1041 * which is what NatController sets up.
1042 * If not filtering, the 1st match rx, and sets up the pair for the tx side.
1043 */
1044 if (filter.intIface[0] && filter.extIface[0]) {
1045 if (filter.intIface == iface0 && filter.extIface == iface1) {
1046 ALOGV("2Filter RX iface_in=%s iface_out=%s rx_bytes=%" PRId64" rx_packets=%" PRId64" ", iface0, iface1, bytes, packets);
1047 stats.rxPackets = packets;
1048 stats.rxBytes = bytes;
1049 } else if (filter.intIface == iface1 && filter.extIface == iface0) {
1050 ALOGV("2Filter TX iface_in=%s iface_out=%s rx_bytes=%" PRId64" rx_packets=%" PRId64" ", iface0, iface1, bytes, packets);
1051 stats.txPackets = packets;
1052 stats.txBytes = bytes;
1053 }
1054 } else if (filter.intIface[0] || filter.extIface[0]) {
1055 if (filter.intIface == iface0 || filter.extIface == iface1) {
1056 ALOGV("1Filter RX iface_in=%s iface_out=%s rx_bytes=%" PRId64" rx_packets=%" PRId64" ", iface0, iface1, bytes, packets);
1057 stats.intIface = iface0;
1058 stats.extIface = iface1;
1059 stats.rxPackets = packets;
1060 stats.rxBytes = bytes;
1061 } else if (filter.intIface == iface1 || filter.extIface == iface0) {
1062 ALOGV("1Filter TX iface_in=%s iface_out=%s rx_bytes=%" PRId64" rx_packets=%" PRId64" ", iface0, iface1, bytes, packets);
1063 stats.intIface = iface1;
1064 stats.extIface = iface0;
1065 stats.txPackets = packets;
1066 stats.txBytes = bytes;
1067 }
1068 } else /* if (!filter.intFace[0] && !filter.extIface[0]) */ {
1069 if (!stats.intIface[0]) {
1070 ALOGV("0Filter RX iface_in=%s iface_out=%s rx_bytes=%" PRId64" rx_packets=%" PRId64" ", iface0, iface1, bytes, packets);
1071 stats.intIface = iface0;
1072 stats.extIface = iface1;
1073 stats.rxPackets = packets;
1074 stats.rxBytes = bytes;
1075 } else if (stats.intIface == iface1 && stats.extIface == iface0) {
1076 ALOGV("0Filter TX iface_in=%s iface_out=%s rx_bytes=%" PRId64" rx_packets=%" PRId64" ", iface0, iface1, bytes, packets);
1077 stats.txPackets = packets;
1078 stats.txBytes = bytes;
1079 }
1080 }
1081 if (stats.rxBytes != -1 && stats.txBytes != -1) {
1082 ALOGV("rx_bytes=%" PRId64" tx_bytes=%" PRId64" filterPair=%d", stats.rxBytes, stats.txBytes, filterPair);
1083 addStats(statsList, stats);
1084 if (filterPair) {
1085 return 0;
1086 } else {
1087 statsFound++;
1088 stats = filter;
1089 }
1090 }
1091 }
1092
1093 /* It is always an error to find only one side of the stats. */
1094 /* It is an error to find nothing when not filtering. */
1095 if (((stats.rxBytes == -1) != (stats.txBytes == -1)) ||
1096 (!statsFound && !filterPair)) {
1097 return -1;
1098 }
1099 return 0;
1100 }
1101
getStatsLine(void) const1102 char *BandwidthController::TetherStats::getStatsLine(void) const {
1103 char *msg;
1104 asprintf(&msg, "%s %s %" PRId64" %" PRId64" %" PRId64" %" PRId64, intIface.c_str(), extIface.c_str(),
1105 rxBytes, rxPackets, txBytes, txPackets);
1106 return msg;
1107 }
1108
getTetherStats(SocketClient * cli,TetherStats & filter,std::string & extraProcessingInfo)1109 int BandwidthController::getTetherStats(SocketClient *cli, TetherStats& filter,
1110 std::string &extraProcessingInfo) {
1111 int res = 0;
1112
1113 TetherStatsList statsList;
1114
1115 for (const IptablesTarget target : {V4, V6}) {
1116 std::string statsString;
1117 res = iptablesRestoreFunction(target, GET_TETHER_STATS_COMMAND, &statsString);
1118 if (res != 0) {
1119 ALOGE("Failed to run %s err=%d", GET_TETHER_STATS_COMMAND.c_str(), res);
1120 return -1;
1121 }
1122
1123 res = addForwardChainStats(filter, statsList, statsString, extraProcessingInfo);
1124 if (res != 0) {
1125 return res;
1126 }
1127 }
1128
1129 if (filter.intIface[0] && filter.extIface[0] && statsList.size() == 1) {
1130 cli->sendMsg(ResponseCode::TetheringStatsResult, statsList[0].getStatsLine(), false);
1131 } else {
1132 for (const auto& stats: statsList) {
1133 cli->sendMsg(ResponseCode::TetheringStatsListResult, stats.getStatsLine(), false);
1134 }
1135 if (res == 0) {
1136 cli->sendMsg(ResponseCode::CommandOkay, "Tethering stats list completed", false);
1137 }
1138 }
1139
1140 return res;
1141 }
1142
flushExistingCostlyTables(bool doClean)1143 void BandwidthController::flushExistingCostlyTables(bool doClean) {
1144 std::string fullCmd = "*filter\n-S\nCOMMIT\n";
1145 std::string ruleList;
1146
1147 /* Only lookup ip4 table names as ip6 will have the same tables ... */
1148 if (int ret = iptablesRestoreFunction(V4, fullCmd, &ruleList)) {
1149 ALOGE("Failed to list existing costly tables ret=%d", ret);
1150 return;
1151 }
1152 /* ... then flush/clean both ip4 and ip6 iptables. */
1153 parseAndFlushCostlyTables(ruleList, doClean);
1154 }
1155
parseAndFlushCostlyTables(const std::string & ruleList,bool doRemove)1156 void BandwidthController::parseAndFlushCostlyTables(const std::string& ruleList, bool doRemove) {
1157 std::stringstream stream(ruleList);
1158 std::string rule;
1159 std::vector<std::string> clearCommands = { "*filter" };
1160 std::string chainName;
1161
1162 // Find and flush all rules starting with "-N bw_costly_<iface>" except "-N bw_costly_shared".
1163 while (std::getline(stream, rule, '\n')) {
1164 if (rule.find(NEW_CHAIN_COMMAND) != 0) continue;
1165 chainName = rule.substr(NEW_CHAIN_COMMAND.size());
1166 ALOGV("parse chainName=<%s> orig line=<%s>", chainName.c_str(), rule.c_str());
1167
1168 if (chainName.find("bw_costly_") != 0 || chainName == std::string("bw_costly_shared")) {
1169 continue;
1170 }
1171
1172 clearCommands.push_back(StringPrintf(":%s -", chainName.c_str()));
1173 if (doRemove) {
1174 clearCommands.push_back(StringPrintf("-X %s", chainName.c_str()));
1175 }
1176 }
1177
1178 if (clearCommands.size() == 1) {
1179 // No rules found.
1180 return;
1181 }
1182
1183 clearCommands.push_back("COMMIT\n");
1184 iptablesRestoreFunction(V4V6, android::base::Join(clearCommands, '\n'), nullptr);
1185 }
1186
opToString(IptOp op)1187 inline const char *BandwidthController::opToString(IptOp op) {
1188 switch (op) {
1189 case IptOpInsert:
1190 return "-I";
1191 case IptOpDelete:
1192 return "-D";
1193 }
1194 }
1195
jumpToString(IptJumpOp jumpHandling)1196 inline const char *BandwidthController::jumpToString(IptJumpOp jumpHandling) {
1197 /*
1198 * Must be careful what one rejects with, as upper layer protocols will just
1199 * keep on hammering the device until the number of retries are done.
1200 * For port-unreachable (default), TCP should consider as an abort (RFC1122).
1201 */
1202 switch (jumpHandling) {
1203 case IptJumpNoAdd:
1204 return "";
1205 case IptJumpReject:
1206 return " --jump REJECT";
1207 case IptJumpReturn:
1208 return " --jump RETURN";
1209 }
1210 }
1211