1 /*
2 * Copyright (C) 2011 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17 // #define LOG_NDEBUG 0
18
19 /*
20 * The CommandListener, FrameworkListener don't allow for
21 * multiple calls in parallel to reach the BandwidthController.
22 * If they ever were to allow it, then netd/ would need some tweaking.
23 */
24
25 #include <ctype.h>
26 #include <errno.h>
27 #include <fcntl.h>
28 #include <stdio.h>
29 #include <stdlib.h>
30 #include <string.h>
31 #include <string>
32 #include <vector>
33
34 #define __STDC_FORMAT_MACROS 1
35 #include <inttypes.h>
36
37 #include <sys/socket.h>
38 #include <sys/stat.h>
39 #include <sys/types.h>
40 #include <sys/wait.h>
41
42 #include <linux/netlink.h>
43 #include <linux/rtnetlink.h>
44 #include <linux/pkt_sched.h>
45
46 #include "android-base/stringprintf.h"
47 #include "android-base/strings.h"
48 #define LOG_TAG "BandwidthController"
49 #include <cutils/log.h>
50 #include <cutils/properties.h>
51 #include <logwrap/logwrap.h>
52
53 #include <netdutils/Syscalls.h>
54 #include "BandwidthController.h"
55 #include "Controllers.h"
56 #include "FirewallController.h" /* For makeCriticalCommands */
57 #include "Fwmark.h"
58 #include "NetdConstants.h"
59 #include "bpf/BpfUtils.h"
60
61 /* Alphabetical */
62 #define ALERT_IPT_TEMPLATE "%s %s -m quota2 ! --quota %" PRId64" --name %s\n"
63 const char BandwidthController::LOCAL_INPUT[] = "bw_INPUT";
64 const char BandwidthController::LOCAL_FORWARD[] = "bw_FORWARD";
65 const char BandwidthController::LOCAL_OUTPUT[] = "bw_OUTPUT";
66 const char BandwidthController::LOCAL_RAW_PREROUTING[] = "bw_raw_PREROUTING";
67 const char BandwidthController::LOCAL_MANGLE_POSTROUTING[] = "bw_mangle_POSTROUTING";
68
69 auto BandwidthController::iptablesRestoreFunction = execIptablesRestoreWithOutput;
70
71 using android::base::Join;
72 using android::base::StringAppendF;
73 using android::base::StringPrintf;
74 using android::bpf::XT_BPF_EGRESS_PROG_PATH;
75 using android::bpf::XT_BPF_INGRESS_PROG_PATH;
76 using android::netdutils::StatusOr;
77 using android::netdutils::UniqueFile;
78
79 namespace {
80
81 const char ALERT_GLOBAL_NAME[] = "globalAlert";
82 const std::string NEW_CHAIN_COMMAND = "-N ";
83
84 const char NAUGHTY_CHAIN[] = "bw_penalty_box";
85 const char NICE_CHAIN[] = "bw_happy_box";
86
87 /**
88 * Some comments about the rules:
89 * * Ordering
90 * - when an interface is marked as costly it should be INSERTED into the INPUT/OUTPUT chains.
91 * E.g. "-I bw_INPUT -i rmnet0 --jump costly"
92 * - quota'd rules in the costly chain should be before bw_penalty_box lookups.
93 * - the qtaguid counting is done at the end of the bw_INPUT/bw_OUTPUT user chains.
94 *
95 * * global quota vs per interface quota
96 * - global quota for all costly interfaces uses a single costly chain:
97 * . initial rules
98 * iptables -N bw_costly_shared
99 * iptables -I bw_INPUT -i iface0 --jump bw_costly_shared
100 * iptables -I bw_OUTPUT -o iface0 --jump bw_costly_shared
101 * iptables -I bw_costly_shared -m quota \! --quota 500000 \
102 * --jump REJECT --reject-with icmp-net-prohibited
103 * iptables -A bw_costly_shared --jump bw_penalty_box
104 * iptables -A bw_penalty_box --jump bw_happy_box
105 * iptables -A bw_happy_box --jump bw_data_saver
106 *
107 * . adding a new iface to this, E.g.:
108 * iptables -I bw_INPUT -i iface1 --jump bw_costly_shared
109 * iptables -I bw_OUTPUT -o iface1 --jump bw_costly_shared
110 *
111 * - quota per interface. This is achieve by having "costly" chains per quota.
112 * E.g. adding a new costly interface iface0 with its own quota:
113 * iptables -N bw_costly_iface0
114 * iptables -I bw_INPUT -i iface0 --jump bw_costly_iface0
115 * iptables -I bw_OUTPUT -o iface0 --jump bw_costly_iface0
116 * iptables -A bw_costly_iface0 -m quota \! --quota 500000 \
117 * --jump REJECT --reject-with icmp-port-unreachable
118 * iptables -A bw_costly_iface0 --jump bw_penalty_box
119 *
120 * * Penalty box, happy box and data saver.
121 * - bw_penalty box is a blacklist of apps that are rejected.
122 * - bw_happy_box is a whitelist of apps. It always includes all system apps
123 * - bw_data_saver implements data usage restrictions.
124 * - Via the UI the user can add and remove apps from the whitelist and
125 * blacklist, and turn on/off data saver.
126 * - The blacklist takes precedence over the whitelist and the whitelist
127 * takes precedence over data saver.
128 *
129 * * bw_penalty_box handling:
130 * - only one bw_penalty_box for all interfaces
131 * E.g Adding an app:
132 * iptables -I bw_penalty_box -m owner --uid-owner app_3 \
133 * --jump REJECT --reject-with icmp-port-unreachable
134 *
135 * * bw_happy_box handling:
136 * - The bw_happy_box comes after the penalty box.
137 * E.g Adding a happy app,
138 * iptables -I bw_happy_box -m owner --uid-owner app_3 \
139 * --jump RETURN
140 *
141 * * bw_data_saver handling:
142 * - The bw_data_saver comes after the happy box.
143 * Enable data saver:
144 * iptables -R 1 bw_data_saver --jump REJECT --reject-with icmp-port-unreachable
145 * Disable data saver:
146 * iptables -R 1 bw_data_saver --jump RETURN
147 */
148
149 const std::string COMMIT_AND_CLOSE = "COMMIT\n";
150 const std::string HAPPY_BOX_WHITELIST_COMMAND = StringPrintf(
151 "-I bw_happy_box -m owner --uid-owner %d-%d --jump RETURN", 0, MAX_SYSTEM_UID);
152
153 static const std::vector<std::string> IPT_FLUSH_COMMANDS = {
154 /*
155 * Cleanup rules.
156 * Should normally include bw_costly_<iface>, but we rely on the way they are setup
157 * to allow coexistance.
158 */
159 "*filter",
160 ":bw_INPUT -",
161 ":bw_OUTPUT -",
162 ":bw_FORWARD -",
163 ":bw_happy_box -",
164 ":bw_penalty_box -",
165 ":bw_data_saver -",
166 ":bw_costly_shared -",
167 "COMMIT",
168 "*raw",
169 ":bw_raw_PREROUTING -",
170 "COMMIT",
171 "*mangle",
172 ":bw_mangle_POSTROUTING -",
173 COMMIT_AND_CLOSE
174 };
175
176 static const uint32_t uidBillingMask = Fwmark::getUidBillingMask();
177
178 /**
179 * Basic commands for creation of hooks into data accounting and data boxes.
180 *
181 * Included in these commands are rules to prevent the double-counting of IPsec
182 * packets. The general overview is as follows:
183 * > All interface counters (counted in PREROUTING, POSTROUTING) must be
184 * completely accurate, and count only the outer packet. As such, the inner
185 * packet must be ignored, which is done through the use of two rules: use
186 * of the policy module (for tunnel mode), and VTI interface checks (for
187 * tunnel or transport-in-tunnel mode). The VTI interfaces should be named
188 * ipsec*
189 * > Outbound UID billing can always be done with the outer packets, due to the
190 * ability to always find the correct UID (based on the skb->sk). As such,
191 * the inner packets should be ignored based on the policy module, or the
192 * output interface if a VTI (ipsec+)
193 * > Inbound UDP-encap-ESP packets can be correctly mapped to the UID that
194 * opened the encap socket, and as such, should be billed as early as
195 * possible (for transport mode; tunnel mode usage should be billed to
196 * sending/receiving application). Due to the inner packet being
197 * indistinguishable from the inner packet of ESP, a uidBillingDone mark
198 * has to be applied to prevent counting a second time.
199 * > Inbound ESP has no socket, and as such must be accounted later. ESP
200 * protocol packets are skipped via a blanket rule.
201 * > Note that this solution is asymmetrical. Adding the VTI or policy matcher
202 * ignore rule in the input chain would actually break the INPUT chain;
203 * Those rules are designed to ignore inner packets, and in the tunnel
204 * mode UDP, or any ESP case, we would not have billed the outer packet.
205 *
206 * See go/ipsec-data-accounting for more information.
207 */
208
getBasicAccountingCommands()209 const std::vector<std::string> getBasicAccountingCommands() {
210 bool useBpf = BandwidthController::getBpfStatsStatus();
211 const std::vector<std::string> ipt_basic_accounting_commands = {
212 "*filter",
213 // Prevents IPSec double counting (ESP and UDP-encap-ESP respectively)
214 "-A bw_INPUT -p esp -j RETURN",
215 StringPrintf("-A bw_INPUT -m mark --mark 0x%x/0x%x -j RETURN",
216 uidBillingMask, uidBillingMask),
217 "-A bw_INPUT -m owner --socket-exists", /* This is a tracking rule. */
218 StringPrintf("-A bw_INPUT -j MARK --or-mark 0x%x", uidBillingMask),
219
220 // Prevents IPSec double counting (Tunnel mode and Transport mode,
221 // respectively)
222 "-A bw_OUTPUT -o " IPSEC_IFACE_PREFIX "+ -j RETURN",
223 "-A bw_OUTPUT -m policy --pol ipsec --dir out -j RETURN",
224 "-A bw_OUTPUT -m owner --socket-exists", /* This is a tracking rule. */
225
226 "-A bw_costly_shared --jump bw_penalty_box",
227 "-A bw_penalty_box --jump bw_happy_box",
228 "-A bw_happy_box --jump bw_data_saver",
229 "-A bw_data_saver -j RETURN",
230 HAPPY_BOX_WHITELIST_COMMAND,
231 "COMMIT",
232
233 "*raw",
234 // Prevents IPSec double counting (Tunnel mode and Transport mode,
235 // respectively)
236 "-A bw_raw_PREROUTING -i " IPSEC_IFACE_PREFIX "+ -j RETURN",
237 "-A bw_raw_PREROUTING -m policy --pol ipsec --dir in -j RETURN",
238 "-A bw_raw_PREROUTING -m owner --socket-exists", /* This is a tracking rule. */
239 useBpf ? StringPrintf("-A bw_raw_PREROUTING -m bpf --object-pinned %s",
240 XT_BPF_INGRESS_PROG_PATH):"",
241 "COMMIT",
242
243 "*mangle",
244 // Prevents IPSec double counting (Tunnel mode and Transport mode,
245 // respectively)
246 "-A bw_mangle_POSTROUTING -o " IPSEC_IFACE_PREFIX "+ -j RETURN",
247 "-A bw_mangle_POSTROUTING -m policy --pol ipsec --dir out -j RETURN",
248 "-A bw_mangle_POSTROUTING -m owner --socket-exists", /* This is a tracking rule. */
249 StringPrintf("-A bw_mangle_POSTROUTING -j MARK --set-mark 0x0/0x%x",
250 uidBillingMask), // Clear the mark before sending this packet
251 useBpf ? StringPrintf("-A bw_mangle_POSTROUTING -m bpf --object-pinned %s",
252 XT_BPF_EGRESS_PROG_PATH):"",
253 COMMIT_AND_CLOSE
254 };
255 return ipt_basic_accounting_commands;
256 }
257
258
toStrVec(int num,char * strs[])259 std::vector<std::string> toStrVec(int num, char* strs[]) {
260 std::vector<std::string> tmp;
261 for (int i = 0; i < num; ++i) {
262 tmp.emplace_back(strs[i]);
263 }
264 return tmp;
265 }
266
267 } // namespace
268
getBpfStatsStatus()269 bool BandwidthController::getBpfStatsStatus() {
270 return (access(XT_BPF_INGRESS_PROG_PATH, F_OK) != -1) &&
271 (access(XT_BPF_EGRESS_PROG_PATH, F_OK) != -1);
272 }
273
BandwidthController()274 BandwidthController::BandwidthController() {
275 }
276
flushCleanTables(bool doClean)277 void BandwidthController::flushCleanTables(bool doClean) {
278 /* Flush and remove the bw_costly_<iface> tables */
279 flushExistingCostlyTables(doClean);
280
281 std::string commands = Join(IPT_FLUSH_COMMANDS, '\n');
282 iptablesRestoreFunction(V4V6, commands, nullptr);
283 }
284
setupIptablesHooks()285 int BandwidthController::setupIptablesHooks() {
286 /* flush+clean is allowed to fail */
287 flushCleanTables(true);
288 return 0;
289 }
290
enableBandwidthControl(bool force)291 int BandwidthController::enableBandwidthControl(bool force) {
292 char value[PROPERTY_VALUE_MAX];
293
294 if (!force) {
295 property_get("persist.bandwidth.enable", value, "1");
296 if (!strcmp(value, "0"))
297 return 0;
298 }
299
300 /* Let's pretend we started from scratch ... */
301 mSharedQuotaIfaces.clear();
302 mQuotaIfaces.clear();
303 mGlobalAlertBytes = 0;
304 mGlobalAlertTetherCount = 0;
305 mSharedQuotaBytes = mSharedAlertBytes = 0;
306
307 flushCleanTables(false);
308
309 std::string commands = Join(getBasicAccountingCommands(), '\n');
310 return iptablesRestoreFunction(V4V6, commands, nullptr);
311 }
312
disableBandwidthControl()313 int BandwidthController::disableBandwidthControl() {
314
315 flushCleanTables(false);
316 return 0;
317 }
318
makeDataSaverCommand(IptablesTarget target,bool enable)319 std::string BandwidthController::makeDataSaverCommand(IptablesTarget target, bool enable) {
320 std::string cmd;
321 const char *chainName = "bw_data_saver";
322 const char *op = jumpToString(enable ? IptJumpReject : IptJumpReturn);
323 std::string criticalCommands = enable ?
324 FirewallController::makeCriticalCommands(target, chainName) : "";
325 StringAppendF(&cmd,
326 "*filter\n"
327 ":%s -\n"
328 "%s"
329 "-A %s%s\n"
330 "COMMIT\n", chainName, criticalCommands.c_str(), chainName, op);
331 return cmd;
332 }
333
enableDataSaver(bool enable)334 int BandwidthController::enableDataSaver(bool enable) {
335 int ret = iptablesRestoreFunction(V4, makeDataSaverCommand(V4, enable), nullptr);
336 ret |= iptablesRestoreFunction(V6, makeDataSaverCommand(V6, enable), nullptr);
337 return ret;
338 }
339
addNaughtyApps(int numUids,char * appUids[])340 int BandwidthController::addNaughtyApps(int numUids, char *appUids[]) {
341 return manipulateSpecialApps(toStrVec(numUids, appUids), NAUGHTY_CHAIN,
342 IptJumpReject, IptOpInsert);
343 }
344
removeNaughtyApps(int numUids,char * appUids[])345 int BandwidthController::removeNaughtyApps(int numUids, char *appUids[]) {
346 return manipulateSpecialApps(toStrVec(numUids, appUids), NAUGHTY_CHAIN,
347 IptJumpReject, IptOpDelete);
348 }
349
addNiceApps(int numUids,char * appUids[])350 int BandwidthController::addNiceApps(int numUids, char *appUids[]) {
351 return manipulateSpecialApps(toStrVec(numUids, appUids), NICE_CHAIN,
352 IptJumpReturn, IptOpInsert);
353 }
354
removeNiceApps(int numUids,char * appUids[])355 int BandwidthController::removeNiceApps(int numUids, char *appUids[]) {
356 return manipulateSpecialApps(toStrVec(numUids, appUids), NICE_CHAIN,
357 IptJumpReturn, IptOpDelete);
358 }
359
manipulateSpecialApps(const std::vector<std::string> & appStrUids,const std::string & chain,IptJumpOp jumpHandling,IptOp op)360 int BandwidthController::manipulateSpecialApps(const std::vector<std::string>& appStrUids,
361 const std::string& chain, IptJumpOp jumpHandling,
362 IptOp op) {
363 std::string cmd = "*filter\n";
364 for (const auto& appStrUid : appStrUids) {
365 StringAppendF(&cmd, "%s %s -m owner --uid-owner %s%s\n", opToString(op), chain.c_str(),
366 appStrUid.c_str(), jumpToString(jumpHandling));
367 }
368 StringAppendF(&cmd, "COMMIT\n");
369 return iptablesRestoreFunction(V4V6, cmd, nullptr);
370 }
371
setInterfaceSharedQuota(const std::string & iface,int64_t maxBytes)372 int BandwidthController::setInterfaceSharedQuota(const std::string& iface, int64_t maxBytes) {
373 int res = 0;
374 std::string quotaCmd;
375 constexpr char cost[] = "shared";
376 constexpr char chain[] = "bw_costly_shared";
377
378 if (!maxBytes) {
379 /* Don't talk about -1, deprecate it. */
380 ALOGE("Invalid bytes value. 1..max_int64.");
381 return -1;
382 }
383 if (!isIfaceName(iface))
384 return -1;
385
386 if (maxBytes == -1) {
387 return removeInterfaceSharedQuota(iface);
388 }
389
390 auto it = mSharedQuotaIfaces.find(iface);
391
392 if (it == mSharedQuotaIfaces.end()) {
393 const int ruleInsertPos = (mGlobalAlertBytes) ? 2 : 1;
394 std::vector<std::string> cmds = {
395 "*filter",
396 StringPrintf("-I bw_INPUT %d -i %s --jump %s", ruleInsertPos, iface.c_str(), chain),
397 StringPrintf("-I bw_OUTPUT %d -o %s --jump %s", ruleInsertPos, iface.c_str(), chain),
398 StringPrintf("-A bw_FORWARD -i %s --jump %s", iface.c_str(), chain),
399 StringPrintf("-A bw_FORWARD -o %s --jump %s", iface.c_str(), chain),
400 };
401 if (mSharedQuotaIfaces.empty()) {
402 cmds.push_back(StringPrintf("-I %s -m quota2 ! --quota %" PRId64
403 " --name %s --jump REJECT",
404 chain, maxBytes, cost));
405 }
406 cmds.push_back("COMMIT\n");
407
408 res |= iptablesRestoreFunction(V4V6, Join(cmds, "\n"), nullptr);
409 if (res) {
410 ALOGE("Failed set quota rule");
411 removeInterfaceSharedQuota(iface);
412 return -1;
413 }
414 mSharedQuotaBytes = maxBytes;
415 mSharedQuotaIfaces.insert(iface);
416 }
417
418 if (maxBytes != mSharedQuotaBytes) {
419 res |= updateQuota(cost, maxBytes);
420 if (res) {
421 ALOGE("Failed update quota for %s", cost);
422 removeInterfaceSharedQuota(iface);
423 return -1;
424 }
425 mSharedQuotaBytes = maxBytes;
426 }
427 return 0;
428 }
429
430 /* It will also cleanup any shared alerts */
removeInterfaceSharedQuota(const std::string & iface)431 int BandwidthController::removeInterfaceSharedQuota(const std::string& iface) {
432 constexpr char cost[] = "shared";
433 constexpr char chain[] = "bw_costly_shared";
434
435 if (!isIfaceName(iface))
436 return -1;
437
438 auto it = mSharedQuotaIfaces.find(iface);
439
440 if (it == mSharedQuotaIfaces.end()) {
441 ALOGE("No such iface %s to delete", iface.c_str());
442 return -1;
443 }
444
445 std::vector<std::string> cmds = {
446 "*filter",
447 StringPrintf("-D bw_INPUT -i %s --jump %s", iface.c_str(), chain),
448 StringPrintf("-D bw_OUTPUT -o %s --jump %s", iface.c_str(), chain),
449 StringPrintf("-D bw_FORWARD -i %s --jump %s", iface.c_str(), chain),
450 StringPrintf("-D bw_FORWARD -o %s --jump %s", iface.c_str(), chain),
451 };
452 if (mSharedQuotaIfaces.size() == 1) {
453 cmds.push_back(StringPrintf("-D %s -m quota2 ! --quota %" PRIu64
454 " --name %s --jump REJECT",
455 chain, mSharedQuotaBytes, cost));
456 }
457 cmds.push_back("COMMIT\n");
458
459 if (iptablesRestoreFunction(V4V6, Join(cmds, "\n"), nullptr) != 0) {
460 ALOGE("Failed to remove shared quota on %s", iface.c_str());
461 return -1;
462 }
463
464 int res = 0;
465 mSharedQuotaIfaces.erase(it);
466 if (mSharedQuotaIfaces.empty()) {
467 mSharedQuotaBytes = 0;
468 if (mSharedAlertBytes) {
469 res = removeSharedAlert();
470 if (res == 0) {
471 mSharedAlertBytes = 0;
472 }
473 }
474 }
475
476 return res;
477
478 }
479
setInterfaceQuota(const std::string & iface,int64_t maxBytes)480 int BandwidthController::setInterfaceQuota(const std::string& iface, int64_t maxBytes) {
481 const std::string& cost = iface;
482
483 if (!isIfaceName(iface))
484 return -1;
485
486 if (!maxBytes) {
487 /* Don't talk about -1, deprecate it. */
488 ALOGE("Invalid bytes value. 1..max_int64.");
489 return -1;
490 }
491 if (maxBytes == -1) {
492 return removeInterfaceQuota(iface);
493 }
494
495 /* Insert ingress quota. */
496 auto it = mQuotaIfaces.find(iface);
497
498 if (it != mQuotaIfaces.end()) {
499 if (updateQuota(cost, maxBytes) != 0) {
500 ALOGE("Failed update quota for %s", iface.c_str());
501 removeInterfaceQuota(iface);
502 return -1;
503 }
504 it->second.quota = maxBytes;
505 return 0;
506 }
507
508 const std::string chain = "bw_costly_" + iface;
509 const int ruleInsertPos = (mGlobalAlertBytes) ? 2 : 1;
510 std::vector<std::string> cmds = {
511 "*filter",
512 StringPrintf(":%s -", chain.c_str()),
513 StringPrintf("-A %s -j bw_penalty_box", chain.c_str()),
514 StringPrintf("-I bw_INPUT %d -i %s --jump %s", ruleInsertPos, iface.c_str(),
515 chain.c_str()),
516 StringPrintf("-I bw_OUTPUT %d -o %s --jump %s", ruleInsertPos, iface.c_str(),
517 chain.c_str()),
518 StringPrintf("-A bw_FORWARD -i %s --jump %s", iface.c_str(), chain.c_str()),
519 StringPrintf("-A bw_FORWARD -o %s --jump %s", iface.c_str(), chain.c_str()),
520 StringPrintf("-A %s -m quota2 ! --quota %" PRId64 " --name %s --jump REJECT",
521 chain.c_str(), maxBytes, cost.c_str()),
522 "COMMIT\n",
523 };
524
525 if (iptablesRestoreFunction(V4V6, Join(cmds, "\n"), nullptr) != 0) {
526 ALOGE("Failed set quota rule");
527 removeInterfaceQuota(iface);
528 return -1;
529 }
530
531 mQuotaIfaces[iface] = QuotaInfo{maxBytes, 0};
532 return 0;
533 }
534
getInterfaceSharedQuota(int64_t * bytes)535 int BandwidthController::getInterfaceSharedQuota(int64_t *bytes) {
536 return getInterfaceQuota("shared", bytes);
537 }
538
getInterfaceQuota(const std::string & iface,int64_t * bytes)539 int BandwidthController::getInterfaceQuota(const std::string& iface, int64_t* bytes) {
540 const auto& sys = android::netdutils::sSyscalls.get();
541 const std::string fname = "/proc/net/xt_quota/" + iface;
542
543 if (!isIfaceName(iface)) return -1;
544
545 StatusOr<UniqueFile> file = sys.fopen(fname, "re");
546 if (!isOk(file)) {
547 ALOGE("Reading quota %s failed (%s)", iface.c_str(), toString(file).c_str());
548 return -1;
549 }
550 auto rv = sys.fscanf(file.value().get(), "%" SCNd64, bytes);
551 if (!isOk(rv)) {
552 ALOGE("Reading quota %s failed (%s)", iface.c_str(), toString(rv).c_str());
553 return -1;
554 }
555 ALOGV("Read quota res=%d bytes=%" PRId64, rv.value(), *bytes);
556 return rv.value() == 1 ? 0 : -1;
557 }
558
removeInterfaceQuota(const std::string & iface)559 int BandwidthController::removeInterfaceQuota(const std::string& iface) {
560 if (!isIfaceName(iface))
561 return -1;
562
563 auto it = mQuotaIfaces.find(iface);
564
565 if (it == mQuotaIfaces.end()) {
566 ALOGE("No such iface %s to delete", iface.c_str());
567 return -1;
568 }
569
570 const std::string chain = "bw_costly_" + iface;
571 std::vector<std::string> cmds = {
572 "*filter",
573 StringPrintf("-D bw_INPUT -i %s --jump %s", iface.c_str(), chain.c_str()),
574 StringPrintf("-D bw_OUTPUT -o %s --jump %s", iface.c_str(), chain.c_str()),
575 StringPrintf("-D bw_FORWARD -i %s --jump %s", iface.c_str(), chain.c_str()),
576 StringPrintf("-D bw_FORWARD -o %s --jump %s", iface.c_str(), chain.c_str()),
577 StringPrintf("-F %s", chain.c_str()),
578 StringPrintf("-X %s", chain.c_str()),
579 "COMMIT\n",
580 };
581
582 const int res = iptablesRestoreFunction(V4V6, Join(cmds, "\n"), nullptr);
583
584 if (res == 0) {
585 mQuotaIfaces.erase(it);
586 }
587
588 return res;
589 }
590
updateQuota(const std::string & quotaName,int64_t bytes)591 int BandwidthController::updateQuota(const std::string& quotaName, int64_t bytes) {
592 const auto& sys = android::netdutils::sSyscalls.get();
593 const std::string fname = "/proc/net/xt_quota/" + quotaName;
594
595 if (!isIfaceName(quotaName)) {
596 ALOGE("updateQuota: Invalid quotaName \"%s\"", quotaName.c_str());
597 return -1;
598 }
599
600 StatusOr<UniqueFile> file = sys.fopen(fname, "we");
601 if (!isOk(file)) {
602 ALOGE("Updating quota %s failed (%s)", quotaName.c_str(), toString(file).c_str());
603 return -1;
604 }
605 sys.fprintf(file.value().get(), "%" PRId64 "\n", bytes);
606 return 0;
607 }
608
runIptablesAlertCmd(IptOp op,const std::string & alertName,int64_t bytes)609 int BandwidthController::runIptablesAlertCmd(IptOp op, const std::string& alertName,
610 int64_t bytes) {
611 const char *opFlag = opToString(op);
612 std::string alertQuotaCmd = "*filter\n";
613
614 // TODO: consider using an alternate template for the delete that does not include the --quota
615 // value. This code works because the --quota value is ignored by deletes
616 StringAppendF(&alertQuotaCmd, ALERT_IPT_TEMPLATE, opFlag, "bw_INPUT", bytes,
617 alertName.c_str());
618 StringAppendF(&alertQuotaCmd, ALERT_IPT_TEMPLATE, opFlag, "bw_OUTPUT", bytes,
619 alertName.c_str());
620 StringAppendF(&alertQuotaCmd, "COMMIT\n");
621
622 return iptablesRestoreFunction(V4V6, alertQuotaCmd, nullptr);
623 }
624
runIptablesAlertFwdCmd(IptOp op,const std::string & alertName,int64_t bytes)625 int BandwidthController::runIptablesAlertFwdCmd(IptOp op, const std::string& alertName,
626 int64_t bytes) {
627 const char *opFlag = opToString(op);
628 std::string alertQuotaCmd = "*filter\n";
629 StringAppendF(&alertQuotaCmd, ALERT_IPT_TEMPLATE, opFlag, "bw_FORWARD", bytes,
630 alertName.c_str());
631 StringAppendF(&alertQuotaCmd, "COMMIT\n");
632
633 return iptablesRestoreFunction(V4V6, alertQuotaCmd, nullptr);
634 }
635
setGlobalAlert(int64_t bytes)636 int BandwidthController::setGlobalAlert(int64_t bytes) {
637 const char *alertName = ALERT_GLOBAL_NAME;
638 int res = 0;
639
640 if (!bytes) {
641 ALOGE("Invalid bytes value. 1..max_int64.");
642 return -1;
643 }
644 if (mGlobalAlertBytes) {
645 res = updateQuota(alertName, bytes);
646 } else {
647 res = runIptablesAlertCmd(IptOpInsert, alertName, bytes);
648 if (mGlobalAlertTetherCount) {
649 ALOGV("setGlobalAlert for %d tether", mGlobalAlertTetherCount);
650 res |= runIptablesAlertFwdCmd(IptOpInsert, alertName, bytes);
651 }
652 }
653 mGlobalAlertBytes = bytes;
654 return res;
655 }
656
setGlobalAlertInForwardChain()657 int BandwidthController::setGlobalAlertInForwardChain() {
658 const char *alertName = ALERT_GLOBAL_NAME;
659 int res = 0;
660
661 mGlobalAlertTetherCount++;
662 ALOGV("setGlobalAlertInForwardChain(): %d tether", mGlobalAlertTetherCount);
663
664 /*
665 * If there is no globalAlert active we are done.
666 * If there is an active globalAlert but this is not the 1st
667 * tether, we are also done.
668 */
669 if (!mGlobalAlertBytes || mGlobalAlertTetherCount != 1) {
670 return 0;
671 }
672
673 /* We only add the rule if this was the 1st tether added. */
674 res = runIptablesAlertFwdCmd(IptOpInsert, alertName, mGlobalAlertBytes);
675 return res;
676 }
677
removeGlobalAlert()678 int BandwidthController::removeGlobalAlert() {
679
680 const char *alertName = ALERT_GLOBAL_NAME;
681 int res = 0;
682
683 if (!mGlobalAlertBytes) {
684 ALOGE("No prior alert set");
685 return -1;
686 }
687 res = runIptablesAlertCmd(IptOpDelete, alertName, mGlobalAlertBytes);
688 if (mGlobalAlertTetherCount) {
689 res |= runIptablesAlertFwdCmd(IptOpDelete, alertName, mGlobalAlertBytes);
690 }
691 mGlobalAlertBytes = 0;
692 return res;
693 }
694
removeGlobalAlertInForwardChain()695 int BandwidthController::removeGlobalAlertInForwardChain() {
696 int res = 0;
697 const char *alertName = ALERT_GLOBAL_NAME;
698
699 if (!mGlobalAlertTetherCount) {
700 ALOGE("No prior alert set");
701 return -1;
702 }
703
704 mGlobalAlertTetherCount--;
705 /*
706 * If there is no globalAlert active we are done.
707 * If there is an active globalAlert but there are more
708 * tethers, we are also done.
709 */
710 if (!mGlobalAlertBytes || mGlobalAlertTetherCount >= 1) {
711 return 0;
712 }
713
714 /* We only detete the rule if this was the last tether removed. */
715 res = runIptablesAlertFwdCmd(IptOpDelete, alertName, mGlobalAlertBytes);
716 return res;
717 }
718
setSharedAlert(int64_t bytes)719 int BandwidthController::setSharedAlert(int64_t bytes) {
720 if (!mSharedQuotaBytes) {
721 ALOGE("Need to have a prior shared quota set to set an alert");
722 return -1;
723 }
724 if (!bytes) {
725 ALOGE("Invalid bytes value. 1..max_int64.");
726 return -1;
727 }
728 return setCostlyAlert("shared", bytes, &mSharedAlertBytes);
729 }
730
removeSharedAlert()731 int BandwidthController::removeSharedAlert() {
732 return removeCostlyAlert("shared", &mSharedAlertBytes);
733 }
734
setInterfaceAlert(const std::string & iface,int64_t bytes)735 int BandwidthController::setInterfaceAlert(const std::string& iface, int64_t bytes) {
736 if (!isIfaceName(iface)) {
737 ALOGE("setInterfaceAlert: Invalid iface \"%s\"", iface.c_str());
738 return -1;
739 }
740
741 if (!bytes) {
742 ALOGE("Invalid bytes value. 1..max_int64.");
743 return -1;
744 }
745 auto it = mQuotaIfaces.find(iface);
746
747 if (it == mQuotaIfaces.end()) {
748 ALOGE("Need to have a prior interface quota set to set an alert");
749 return -1;
750 }
751
752 return setCostlyAlert(iface, bytes, &it->second.alert);
753 }
754
removeInterfaceAlert(const std::string & iface)755 int BandwidthController::removeInterfaceAlert(const std::string& iface) {
756 if (!isIfaceName(iface)) {
757 ALOGE("removeInterfaceAlert: Invalid iface \"%s\"", iface.c_str());
758 return -1;
759 }
760
761 auto it = mQuotaIfaces.find(iface);
762
763 if (it == mQuotaIfaces.end()) {
764 ALOGE("No prior alert set for interface %s", iface.c_str());
765 return -1;
766 }
767
768 return removeCostlyAlert(iface, &it->second.alert);
769 }
770
setCostlyAlert(const std::string & costName,int64_t bytes,int64_t * alertBytes)771 int BandwidthController::setCostlyAlert(const std::string& costName, int64_t bytes,
772 int64_t* alertBytes) {
773 int res = 0;
774
775 if (!isIfaceName(costName)) {
776 ALOGE("setCostlyAlert: Invalid costName \"%s\"", costName.c_str());
777 return -1;
778 }
779
780 if (!bytes) {
781 ALOGE("Invalid bytes value. 1..max_int64.");
782 return -1;
783 }
784
785 std::string alertName = costName + "Alert";
786 std::string chainName = "bw_costly_" + costName;
787 if (*alertBytes) {
788 res = updateQuota(alertName, *alertBytes);
789 } else {
790 std::vector<std::string> commands = {
791 "*filter\n",
792 StringPrintf(ALERT_IPT_TEMPLATE, "-A", chainName.c_str(), bytes, alertName.c_str()),
793 "COMMIT\n"
794 };
795 res = iptablesRestoreFunction(V4V6, Join(commands, ""), nullptr);
796 if (res) {
797 ALOGE("Failed to set costly alert for %s", costName.c_str());
798 }
799 }
800 if (res == 0) {
801 *alertBytes = bytes;
802 }
803 return res;
804 }
805
removeCostlyAlert(const std::string & costName,int64_t * alertBytes)806 int BandwidthController::removeCostlyAlert(const std::string& costName, int64_t* alertBytes) {
807 if (!isIfaceName(costName)) {
808 ALOGE("removeCostlyAlert: Invalid costName \"%s\"", costName.c_str());
809 return -1;
810 }
811
812 if (!*alertBytes) {
813 ALOGE("No prior alert set for %s alert", costName.c_str());
814 return -1;
815 }
816
817 std::string alertName = costName + "Alert";
818 std::string chainName = "bw_costly_" + costName;
819 std::vector<std::string> commands = {
820 "*filter\n",
821 StringPrintf(ALERT_IPT_TEMPLATE, "-D", chainName.c_str(), *alertBytes, alertName.c_str()),
822 "COMMIT\n"
823 };
824 if (iptablesRestoreFunction(V4V6, Join(commands, ""), nullptr) != 0) {
825 ALOGE("Failed to remove costly alert %s", costName.c_str());
826 return -1;
827 }
828
829 *alertBytes = 0;
830 return 0;
831 }
832
flushExistingCostlyTables(bool doClean)833 void BandwidthController::flushExistingCostlyTables(bool doClean) {
834 std::string fullCmd = "*filter\n-S\nCOMMIT\n";
835 std::string ruleList;
836
837 /* Only lookup ip4 table names as ip6 will have the same tables ... */
838 if (int ret = iptablesRestoreFunction(V4, fullCmd, &ruleList)) {
839 ALOGE("Failed to list existing costly tables ret=%d", ret);
840 return;
841 }
842 /* ... then flush/clean both ip4 and ip6 iptables. */
843 parseAndFlushCostlyTables(ruleList, doClean);
844 }
845
parseAndFlushCostlyTables(const std::string & ruleList,bool doRemove)846 void BandwidthController::parseAndFlushCostlyTables(const std::string& ruleList, bool doRemove) {
847 std::stringstream stream(ruleList);
848 std::string rule;
849 std::vector<std::string> clearCommands = { "*filter" };
850 std::string chainName;
851
852 // Find and flush all rules starting with "-N bw_costly_<iface>" except "-N bw_costly_shared".
853 while (std::getline(stream, rule, '\n')) {
854 if (rule.find(NEW_CHAIN_COMMAND) != 0) continue;
855 chainName = rule.substr(NEW_CHAIN_COMMAND.size());
856 ALOGV("parse chainName=<%s> orig line=<%s>", chainName.c_str(), rule.c_str());
857
858 if (chainName.find("bw_costly_") != 0 || chainName == std::string("bw_costly_shared")) {
859 continue;
860 }
861
862 clearCommands.push_back(StringPrintf(":%s -", chainName.c_str()));
863 if (doRemove) {
864 clearCommands.push_back(StringPrintf("-X %s", chainName.c_str()));
865 }
866 }
867
868 if (clearCommands.size() == 1) {
869 // No rules found.
870 return;
871 }
872
873 clearCommands.push_back("COMMIT\n");
874 iptablesRestoreFunction(V4V6, Join(clearCommands, '\n'), nullptr);
875 }
876
opToString(IptOp op)877 inline const char *BandwidthController::opToString(IptOp op) {
878 switch (op) {
879 case IptOpInsert:
880 return "-I";
881 case IptOpDelete:
882 return "-D";
883 }
884 }
885
jumpToString(IptJumpOp jumpHandling)886 inline const char *BandwidthController::jumpToString(IptJumpOp jumpHandling) {
887 /*
888 * Must be careful what one rejects with, as upper layer protocols will just
889 * keep on hammering the device until the number of retries are done.
890 * For port-unreachable (default), TCP should consider as an abort (RFC1122).
891 */
892 switch (jumpHandling) {
893 case IptJumpNoAdd:
894 return "";
895 case IptJumpReject:
896 return " --jump REJECT";
897 case IptJumpReturn:
898 return " --jump RETURN";
899 }
900 }
901