| /* | 
 |  * Copyright (C) 2022 The Android Open Source Project | 
 |  * | 
 |  * Licensed under the Apache License, Version 2.0 (the "License"); | 
 |  * you may not use this file except in compliance with the License. | 
 |  * You may obtain a copy of the License at | 
 |  * | 
 |  *      http://www.apache.org/licenses/LICENSE-2.0 | 
 |  * | 
 |  * Unless required by applicable law or agreed to in writing, software | 
 |  * distributed under the License is distributed on an "AS IS" BASIS, | 
 |  * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. | 
 |  * See the License for the specific language governing permissions and | 
 |  * limitations under the License. | 
 |  */ | 
 |  | 
 | #define LOG_TAG "TcUtils" | 
 |  | 
 | #include "tcutils/tcutils.h" | 
 |  | 
 | #include "logging.h" | 
 | #include "bpf/KernelUtils.h" | 
 | #include "scopeguard.h" | 
 |  | 
 | #include <arpa/inet.h> | 
 | #include <cerrno> | 
 | #include <cstring> | 
 | #include <libgen.h> | 
 | #include <linux/if_arp.h> | 
 | #include <linux/if_ether.h> | 
 | #include <linux/netlink.h> | 
 | #include <linux/pkt_cls.h> | 
 | #include <linux/pkt_sched.h> | 
 | #include <linux/rtnetlink.h> | 
 | #include <linux/tc_act/tc_bpf.h> | 
 | #include <net/if.h> | 
 | #include <stdio.h> | 
 | #include <sys/socket.h> | 
 | #include <unistd.h> | 
 | #include <utility> | 
 |  | 
 | #define BPF_FD_JUST_USE_INT | 
 | #include <BpfSyscallWrappers.h> | 
 | #undef BPF_FD_JUST_USE_INT | 
 |  | 
 | // The maximum length of TCA_BPF_NAME. Sync from net/sched/cls_bpf.c. | 
 | #define CLS_BPF_NAME_LEN 256 | 
 |  | 
 | // Classifier name. See cls_bpf_ops in net/sched/cls_bpf.c. | 
 | #define CLS_BPF_KIND_NAME "bpf" | 
 |  | 
 | namespace android { | 
 | namespace { | 
 |  | 
 | /** | 
 |  * IngressPoliceFilterBuilder builds a nlmsg request equivalent to the following | 
 |  * tc command: | 
 |  * | 
 |  * tc filter add dev .. ingress prio .. protocol .. matchall \ | 
 |  *     action police rate .. burst .. conform-exceed pipe/continue \ | 
 |  *     action bpf object-pinned .. \ | 
 |  *     drop | 
 |  */ | 
 | class IngressPoliceFilterBuilder final { | 
 |   // default mtu is 2047, so the cell logarithm factor (cell_log) is 3. | 
 |   // 0x7FF >> 0x3FF x 2^1 >> 0x1FF x 2^2 >> 0xFF x 2^3 | 
 |   static constexpr int RTAB_CELL_LOGARITHM = 3; | 
 |   static constexpr size_t RTAB_SIZE = 256; | 
 |   static constexpr unsigned TIME_UNITS_PER_SEC = 1000000; | 
 |  | 
 |   struct Request { | 
 |     nlmsghdr n; | 
 |     tcmsg t; | 
 |     struct { | 
 |       nlattr attr; | 
 |       char str[NLMSG_ALIGN(sizeof("matchall"))]; | 
 |     } kind; | 
 |     struct { | 
 |       nlattr attr; | 
 |       struct { | 
 |         nlattr attr; | 
 |         struct { | 
 |           nlattr attr; | 
 |           struct { | 
 |             nlattr attr; | 
 |             char str[NLMSG_ALIGN(sizeof("police"))]; | 
 |           } kind; | 
 |           struct { | 
 |             nlattr attr; | 
 |             struct { | 
 |               nlattr attr; | 
 |               struct tc_police obj; | 
 |             } police; | 
 |             struct { | 
 |               nlattr attr; | 
 |               uint32_t u32[RTAB_SIZE]; | 
 |             } rtab; | 
 |             struct { | 
 |               nlattr attr; | 
 |               int32_t s32; | 
 |             } notexceedact; | 
 |           } opt; | 
 |         } act1; | 
 |         struct { | 
 |           nlattr attr; | 
 |           struct { | 
 |             nlattr attr; | 
 |             char str[NLMSG_ALIGN(sizeof("bpf"))]; | 
 |           } kind; | 
 |           struct { | 
 |             nlattr attr; | 
 |             struct { | 
 |               nlattr attr; | 
 |               uint32_t u32; | 
 |             } fd; | 
 |             struct { | 
 |               nlattr attr; | 
 |               char str[NLMSG_ALIGN(CLS_BPF_NAME_LEN)]; | 
 |             } name; | 
 |             struct { | 
 |               nlattr attr; | 
 |               struct tc_act_bpf obj; | 
 |             } parms; | 
 |           } opt; | 
 |         } act2; | 
 |       } acts; | 
 |     } opt; | 
 |   }; | 
 |  | 
 |   // class members | 
 |   const unsigned mBurstInBytes; | 
 |   const char *mBpfProgPath; | 
 |   int mBpfFd; | 
 |   Request mRequest; | 
 |  | 
 |   static double getTickInUsec() { | 
 |     FILE *fp = fopen("/proc/net/psched", "re"); | 
 |     if (!fp) { | 
 |       ALOGE("fopen(\"/proc/net/psched\"): %s", strerror(errno)); | 
 |       return 0.0; | 
 |     } | 
 |     auto scopeGuard = base::make_scope_guard([fp] { fclose(fp); }); | 
 |  | 
 |     uint32_t t2us; | 
 |     uint32_t us2t; | 
 |     uint32_t clockRes; | 
 |     const bool isError = | 
 |         fscanf(fp, "%08x%08x%08x", &t2us, &us2t, &clockRes) != 3; | 
 |  | 
 |     if (isError) { | 
 |       ALOGE("fscanf(/proc/net/psched, \"%%08x%%08x%%08x\"): %s", | 
 |                strerror(errno)); | 
 |       return 0.0; | 
 |     } | 
 |  | 
 |     const double clockFactor = | 
 |         static_cast<double>(clockRes) / TIME_UNITS_PER_SEC; | 
 |     return static_cast<double>(t2us) / static_cast<double>(us2t) * clockFactor; | 
 |   } | 
 |  | 
 |   static inline const double kTickInUsec = getTickInUsec(); | 
 |  | 
 | public: | 
 |   // clang-format off | 
 |   IngressPoliceFilterBuilder(int ifIndex, uint16_t prio, uint16_t proto, unsigned rateInBytesPerSec, | 
 |                       unsigned burstInBytes, const char* bpfProgPath) | 
 |       : mBurstInBytes(burstInBytes), | 
 |         mBpfProgPath(bpfProgPath), | 
 |         mBpfFd(-1), | 
 |         mRequest{ | 
 |             .n = { | 
 |                 .nlmsg_len = sizeof(mRequest), | 
 |                 .nlmsg_type = RTM_NEWTFILTER, | 
 |                 .nlmsg_flags = NLM_F_REQUEST | NLM_F_ACK | NLM_F_EXCL | NLM_F_CREATE, | 
 |             }, | 
 |             .t = { | 
 |                 .tcm_family = AF_UNSPEC, | 
 |                 .tcm_ifindex = ifIndex, | 
 |                 .tcm_handle = TC_H_UNSPEC, | 
 |                 .tcm_parent = TC_H_MAKE(TC_H_CLSACT, TC_H_MIN_INGRESS), | 
 |                 .tcm_info = (static_cast<uint32_t>(prio) << 16) | 
 |                             | static_cast<uint32_t>(htons(proto)), | 
 |             }, | 
 |             .kind = { | 
 |                 .attr = { | 
 |                     .nla_len = sizeof(mRequest.kind), | 
 |                     .nla_type = TCA_KIND, | 
 |                 }, | 
 |                 .str = "matchall", | 
 |             }, | 
 |             .opt = { | 
 |                 .attr = { | 
 |                     .nla_len = sizeof(mRequest.opt), | 
 |                     .nla_type = TCA_OPTIONS, | 
 |                 }, | 
 |                 .acts = { | 
 |                     .attr = { | 
 |                         .nla_len = sizeof(mRequest.opt.acts), | 
 |                         .nla_type = TCA_MATCHALL_ACT, | 
 |                     }, | 
 |                     .act1 = { | 
 |                         .attr = { | 
 |                             .nla_len = sizeof(mRequest.opt.acts.act1), | 
 |                             .nla_type = 1, // action priority | 
 |                         }, | 
 |                         .kind = { | 
 |                             .attr = { | 
 |                                 .nla_len = sizeof(mRequest.opt.acts.act1.kind), | 
 |                                 .nla_type = TCA_ACT_KIND, | 
 |                             }, | 
 |                             .str = "police", | 
 |                         }, | 
 |                         .opt = { | 
 |                             .attr = { | 
 |                                 .nla_len = sizeof(mRequest.opt.acts.act1.opt), | 
 |                                 .nla_type = TCA_ACT_OPTIONS | NLA_F_NESTED, | 
 |                             }, | 
 |                             .police = { | 
 |                                 .attr = { | 
 |                                     .nla_len = sizeof(mRequest.opt.acts.act1.opt.police), | 
 |                                     .nla_type = TCA_POLICE_TBF, | 
 |                                 }, | 
 |                                 .obj = { | 
 |                                     .action = TC_ACT_PIPE, | 
 |                                     .burst = 0, | 
 |                                     .rate = { | 
 |                                         .cell_log = RTAB_CELL_LOGARITHM, | 
 |                                         .linklayer = TC_LINKLAYER_ETHERNET, | 
 |                                         .cell_align = -1, | 
 |                                         .rate = rateInBytesPerSec, | 
 |                                     }, | 
 |                                 }, | 
 |                             }, | 
 |                             .rtab = { | 
 |                                 .attr = { | 
 |                                     .nla_len = sizeof(mRequest.opt.acts.act1.opt.rtab), | 
 |                                     .nla_type = TCA_POLICE_RATE, | 
 |                                 }, | 
 |                                 .u32 = {}, | 
 |                             }, | 
 |                             .notexceedact = { | 
 |                                 .attr = { | 
 |                                     .nla_len = sizeof(mRequest.opt.acts.act1.opt.notexceedact), | 
 |                                     .nla_type = TCA_POLICE_RESULT, | 
 |                                 }, | 
 |                                 .s32 = TC_ACT_UNSPEC, | 
 |                             }, | 
 |                         }, | 
 |                     }, | 
 |                     .act2 = { | 
 |                         .attr = { | 
 |                             .nla_len = sizeof(mRequest.opt.acts.act2), | 
 |                             .nla_type = 2, // action priority | 
 |                         }, | 
 |                         .kind = { | 
 |                             .attr = { | 
 |                                 .nla_len = sizeof(mRequest.opt.acts.act2.kind), | 
 |                                 .nla_type = TCA_ACT_KIND, | 
 |                             }, | 
 |                             .str = "bpf", | 
 |                         }, | 
 |                         .opt = { | 
 |                             .attr = { | 
 |                                 .nla_len = sizeof(mRequest.opt.acts.act2.opt), | 
 |                                 .nla_type = TCA_ACT_OPTIONS | NLA_F_NESTED, | 
 |                             }, | 
 |                             .fd = { | 
 |                                 .attr = { | 
 |                                     .nla_len = sizeof(mRequest.opt.acts.act2.opt.fd), | 
 |                                     .nla_type = TCA_ACT_BPF_FD, | 
 |                                 }, | 
 |                                 .u32 = 0, // set during build() | 
 |                             }, | 
 |                             .name = { | 
 |                                 .attr = { | 
 |                                     .nla_len = sizeof(mRequest.opt.acts.act2.opt.name), | 
 |                                     .nla_type = TCA_ACT_BPF_NAME, | 
 |                                 }, | 
 |                                 .str = "placeholder", | 
 |                             }, | 
 |                             .parms = { | 
 |                                 .attr = { | 
 |                                     .nla_len = sizeof(mRequest.opt.acts.act2.opt.parms), | 
 |                                     .nla_type = TCA_ACT_BPF_PARMS, | 
 |                                 }, | 
 |                                 .obj = { | 
 |                                     // default action to be executed when bpf prog | 
 |                                     // returns TC_ACT_UNSPEC. | 
 |                                     .action = TC_ACT_SHOT, | 
 |                                 }, | 
 |                             }, | 
 |                         }, | 
 |                     }, | 
 |                 }, | 
 |             }, | 
 |         } { | 
 |       // constructor body | 
 |   } | 
 |   // clang-format on | 
 |  | 
 |   ~IngressPoliceFilterBuilder() { | 
 |     // TODO: use unique_fd | 
 |     if (mBpfFd != -1) { | 
 |       close(mBpfFd); | 
 |     } | 
 |   } | 
 |  | 
 |   constexpr unsigned getRequestSize() const { return sizeof(Request); } | 
 |  | 
 | private: | 
 |   unsigned calculateXmitTime(unsigned size) { | 
 |     const uint32_t rate = mRequest.opt.acts.act1.opt.police.obj.rate.rate; | 
 |     return (static_cast<double>(size) / static_cast<double>(rate)) * | 
 |            TIME_UNITS_PER_SEC * kTickInUsec; | 
 |   } | 
 |  | 
 |   void initBurstRate() { | 
 |     mRequest.opt.acts.act1.opt.police.obj.burst = | 
 |         calculateXmitTime(mBurstInBytes); | 
 |   } | 
 |  | 
 |   // Calculates a table with 256 transmission times for different packet sizes | 
 |   // (all the way up to MTU). RTAB_CELL_LOGARITHM is used as a scaling factor. | 
 |   // In this case, MTU size is always 2048, so RTAB_CELL_LOGARITHM is always | 
 |   // 3. Therefore, this function generates the transmission times for packets | 
 |   // of size 1..256 x 2^3. | 
 |   void initRateTable() { | 
 |     for (unsigned i = 0; i < RTAB_SIZE; ++i) { | 
 |       unsigned adjustedSize = (i + 1) << RTAB_CELL_LOGARITHM; | 
 |       mRequest.opt.acts.act1.opt.rtab.u32[i] = calculateXmitTime(adjustedSize); | 
 |     } | 
 |   } | 
 |  | 
 |   int initBpfFd() { | 
 |     mBpfFd = bpf::retrieveProgram(mBpfProgPath); | 
 |     if (mBpfFd == -1) { | 
 |       int error = errno; | 
 |       ALOGE("retrieveProgram failed: %d", error); | 
 |       return -error; | 
 |     } | 
 |  | 
 |     mRequest.opt.acts.act2.opt.fd.u32 = static_cast<uint32_t>(mBpfFd); | 
 |     snprintf(mRequest.opt.acts.act2.opt.name.str, | 
 |              sizeof(mRequest.opt.acts.act2.opt.name.str), "%s:[*fsobj]", | 
 |              basename(mBpfProgPath)); | 
 |  | 
 |     return 0; | 
 |   } | 
 |  | 
 | public: | 
 |   int build() { | 
 |     if (kTickInUsec == 0.0) { | 
 |       return -EINVAL; | 
 |     } | 
 |  | 
 |     initBurstRate(); | 
 |     initRateTable(); | 
 |     return initBpfFd(); | 
 |   } | 
 |  | 
 |   const Request *getRequest() const { | 
 |     // Make sure to call build() before calling this function. Otherwise, the | 
 |     // request will be invalid. | 
 |     return &mRequest; | 
 |   } | 
 | }; | 
 |  | 
 | const sockaddr_nl KERNEL_NLADDR = {AF_NETLINK, 0, 0, 0}; | 
 | const uint16_t NETLINK_REQUEST_FLAGS = NLM_F_REQUEST | NLM_F_ACK; | 
 |  | 
 | int sendAndProcessNetlinkResponse(const void *req, int len) { | 
 |   // TODO: use unique_fd instead of ScopeGuard | 
 |   int fd = socket(AF_NETLINK, SOCK_RAW | SOCK_CLOEXEC, NETLINK_ROUTE); | 
 |   if (fd == -1) { | 
 |     int error = errno; | 
 |     ALOGE("socket(AF_NETLINK, SOCK_RAW | SOCK_CLOEXEC, NETLINK_ROUTE): %d", | 
 |              error); | 
 |     return -error; | 
 |   } | 
 |   auto scopeGuard = base::make_scope_guard([fd] { close(fd); }); | 
 |  | 
 |   static constexpr int on = 1; | 
 |   if (setsockopt(fd, SOL_NETLINK, NETLINK_CAP_ACK, &on, sizeof(on))) { | 
 |     int error = errno; | 
 |     ALOGE("setsockopt(fd, SOL_NETLINK, NETLINK_CAP_ACK, 1): %d", error); | 
 |     return -error; | 
 |   } | 
 |  | 
 |   if (setsockopt(fd, SOL_NETLINK, NETLINK_EXT_ACK, &on, sizeof(on))) { | 
 |     int error = errno; | 
 |     ALOGW("setsockopt(fd, SOL_NETLINK, NETLINK_EXT_ACK, 1): %d", error); | 
 |     // will fail on 4.9 kernels so don't: return -error; | 
 |   } | 
 |  | 
 |   // this is needed to get valid strace netlink parsing, it allocates the pid | 
 |   if (bind(fd, (const struct sockaddr *)&KERNEL_NLADDR, | 
 |            sizeof(KERNEL_NLADDR))) { | 
 |     int error = errno; | 
 |     ALOGE("bind(fd, {AF_NETLINK, 0, 0}: %d)", error); | 
 |     return -error; | 
 |   } | 
 |  | 
 |   // we do not want to receive messages from anyone besides the kernel | 
 |   if (connect(fd, (const struct sockaddr *)&KERNEL_NLADDR, | 
 |               sizeof(KERNEL_NLADDR))) { | 
 |     int error = errno; | 
 |     ALOGE("connect(fd, {AF_NETLINK, 0, 0}): %d", error); | 
 |     return -error; | 
 |   } | 
 |  | 
 |   int rv = send(fd, req, len, 0); | 
 |  | 
 |   if (rv == -1) { | 
 |     int error = errno; | 
 |     ALOGE("send(fd, req, len, 0) failed: %d", error); | 
 |     return -error; | 
 |   } | 
 |  | 
 |   if (rv != len) { | 
 |     ALOGE("send(fd, req, len = %d, 0) returned invalid message size %d", len, | 
 |              rv); | 
 |     return -EMSGSIZE; | 
 |   } | 
 |  | 
 |   struct { | 
 |     nlmsghdr h; | 
 |     nlmsgerr e; | 
 |     char buf[256]; | 
 |   } resp = {}; | 
 |  | 
 |   rv = recv(fd, &resp, sizeof(resp), MSG_TRUNC); | 
 |  | 
 |   if (rv == -1) { | 
 |     int error = errno; | 
 |     ALOGE("recv() failed: %d", error); | 
 |     return -error; | 
 |   } | 
 |  | 
 |   if (rv < (int)NLMSG_SPACE(sizeof(struct nlmsgerr))) { | 
 |     ALOGE("recv() returned short packet: %d", rv); | 
 |     return -EBADMSG; | 
 |   } | 
 |  | 
 |   if (resp.h.nlmsg_len != (unsigned)rv) { | 
 |     ALOGE("recv() returned invalid header length: %d != %d", | 
 |              resp.h.nlmsg_len, rv); | 
 |     return -EBADMSG; | 
 |   } | 
 |  | 
 |   if (resp.h.nlmsg_type != NLMSG_ERROR) { | 
 |     ALOGE("recv() did not return NLMSG_ERROR message: %d", | 
 |              resp.h.nlmsg_type); | 
 |     return -ENOMSG; | 
 |   } | 
 |  | 
 |   if (resp.e.error) { | 
 |     ALOGE("NLMSG_ERROR message return error: %d", resp.e.error); | 
 |   } | 
 |   return resp.e.error; // returns 0 on success | 
 | } | 
 |  | 
 | int hardwareAddressType(const char *interface) { | 
 |   int fd = socket(AF_INET6, SOCK_DGRAM | SOCK_CLOEXEC, 0); | 
 |   if (fd < 0) | 
 |     return -errno; | 
 |   auto scopeGuard = base::make_scope_guard([fd] { close(fd); }); | 
 |  | 
 |   struct ifreq ifr = {}; | 
 |   // We use strncpy() instead of strlcpy() since kernel has to be able | 
 |   // to handle non-zero terminated junk passed in by userspace anyway, | 
 |   // and this way too long interface names (more than IFNAMSIZ-1 = 15 | 
 |   // characters plus terminating NULL) will not get truncated to 15 | 
 |   // characters and zero-terminated and thus potentially erroneously | 
 |   // match a truncated interface if one were to exist. | 
 |   strncpy(ifr.ifr_name, interface, sizeof(ifr.ifr_name)); | 
 |  | 
 |   if (ioctl(fd, SIOCGIFHWADDR, &ifr, sizeof(ifr))) { | 
 |     return -errno; | 
 |   } | 
 |   return ifr.ifr_hwaddr.sa_family; | 
 | } | 
 |  | 
 | } // namespace | 
 |  | 
 | int isEthernet(const char *iface, bool &isEthernet) { | 
 |   int rv = hardwareAddressType(iface); | 
 |   if (rv < 0) { | 
 |     ALOGE("Get hardware address type of interface %s failed: %s", iface, | 
 |              strerror(-rv)); | 
 |     return rv; | 
 |   } | 
 |  | 
 |   // Backwards compatibility with pre-GKI kernels that use various custom | 
 |   // ARPHRD_* for their cellular interface | 
 |   switch (rv) { | 
 |   // ARPHRD_PUREIP on at least some Mediatek Android kernels | 
 |   // example: wembley with 4.19 kernel | 
 |   case 520: | 
 |   // in Linux 4.14+ rmnet support was upstreamed and ARHRD_RAWIP became 519, | 
 |   // but it is 530 on at least some Qualcomm Android 4.9 kernels with rmnet | 
 |   // example: Pixel 3 family | 
 |   case 530: | 
 |     // >5.4 kernels are GKI2.0 and thus upstream compatible, however 5.10 | 
 |     // shipped with Android S, so (for safety) let's limit ourselves to | 
 |     // >5.10, ie. 5.11+ as a guarantee we're on Android T+ and thus no | 
 |     // longer need this non-upstream compatibility logic | 
 |     static bool is_pre_5_11_kernel = !bpf::isAtLeastKernelVersion(5, 11, 0); | 
 |     if (is_pre_5_11_kernel) | 
 |       return false; | 
 |   } | 
 |  | 
 |   switch (rv) { | 
 |   case ARPHRD_ETHER: | 
 |     isEthernet = true; | 
 |     return 0; | 
 |   case ARPHRD_NONE: | 
 |   case ARPHRD_PPP: | 
 |   case ARPHRD_RAWIP: | 
 |     isEthernet = false; | 
 |     return 0; | 
 |   default: | 
 |     ALOGE("Unknown hardware address type %d on interface %s", rv, iface); | 
 |     return -EAFNOSUPPORT; | 
 |   } | 
 | } | 
 |  | 
 | // ADD:     nlMsgType=RTM_NEWQDISC nlMsgFlags=NLM_F_EXCL|NLM_F_CREATE | 
 | // REPLACE: nlMsgType=RTM_NEWQDISC nlMsgFlags=NLM_F_CREATE|NLM_F_REPLACE | 
 | // DEL:     nlMsgType=RTM_DELQDISC nlMsgFlags=0 | 
 | int doTcQdiscClsact(int ifIndex, uint16_t nlMsgType, uint16_t nlMsgFlags) { | 
 |   // This is the name of the qdisc we are attaching. | 
 |   // Some hoop jumping to make this compile time constant with known size, | 
 |   // so that the structure declaration is well defined at compile time. | 
 | #define CLSACT "clsact" | 
 |   // sizeof() includes the terminating NULL | 
 |   static constexpr size_t ASCIIZ_LEN_CLSACT = sizeof(CLSACT); | 
 |  | 
 |   const struct { | 
 |     nlmsghdr n; | 
 |     tcmsg t; | 
 |     struct { | 
 |       nlattr attr; | 
 |       char str[NLMSG_ALIGN(ASCIIZ_LEN_CLSACT)]; | 
 |     } kind; | 
 |   } req = { | 
 |       .n = | 
 |           { | 
 |               .nlmsg_len = sizeof(req), | 
 |               .nlmsg_type = nlMsgType, | 
 |               .nlmsg_flags = | 
 |                   static_cast<__u16>(NETLINK_REQUEST_FLAGS | nlMsgFlags), | 
 |           }, | 
 |       .t = | 
 |           { | 
 |               .tcm_family = AF_UNSPEC, | 
 |               .tcm_ifindex = ifIndex, | 
 |               .tcm_handle = TC_H_MAKE(TC_H_CLSACT, 0), | 
 |               .tcm_parent = TC_H_CLSACT, | 
 |           }, | 
 |       .kind = | 
 |           { | 
 |               .attr = | 
 |                   { | 
 |                       .nla_len = NLA_HDRLEN + ASCIIZ_LEN_CLSACT, | 
 |                       .nla_type = TCA_KIND, | 
 |                   }, | 
 |               .str = CLSACT, | 
 |           }, | 
 |   }; | 
 | #undef CLSACT | 
 |  | 
 |   return sendAndProcessNetlinkResponse(&req, sizeof(req)); | 
 | } | 
 |  | 
 | // tc filter add dev .. in/egress prio 1 protocol ipv6/ip bpf object-pinned | 
 | // /sys/fs/bpf/... direct-action | 
 | int tcAddBpfFilter(int ifIndex, bool ingress, uint16_t prio, uint16_t proto, | 
 |                    const char *bpfProgPath) { | 
 |   const int bpfFd = bpf::retrieveProgram(bpfProgPath); | 
 |   if (bpfFd == -1) { | 
 |     ALOGE("retrieveProgram failed: %d", errno); | 
 |     return -errno; | 
 |   } | 
 |   auto scopeGuard = base::make_scope_guard([bpfFd] { close(bpfFd); }); | 
 |  | 
 |   struct { | 
 |     nlmsghdr n; | 
 |     tcmsg t; | 
 |     struct { | 
 |       nlattr attr; | 
 |       // The maximum classifier name length is defined in | 
 |       // tcf_proto_ops in include/net/sch_generic.h. | 
 |       char str[NLMSG_ALIGN(sizeof(CLS_BPF_KIND_NAME))]; | 
 |     } kind; | 
 |     struct { | 
 |       nlattr attr; | 
 |       struct { | 
 |         nlattr attr; | 
 |         __u32 u32; | 
 |       } fd; | 
 |       struct { | 
 |         nlattr attr; | 
 |         char str[NLMSG_ALIGN(CLS_BPF_NAME_LEN)]; | 
 |       } name; | 
 |       struct { | 
 |         nlattr attr; | 
 |         __u32 u32; | 
 |       } flags; | 
 |     } options; | 
 |   } req = { | 
 |       .n = | 
 |           { | 
 |               .nlmsg_len = sizeof(req), | 
 |               .nlmsg_type = RTM_NEWTFILTER, | 
 |               .nlmsg_flags = NETLINK_REQUEST_FLAGS | NLM_F_EXCL | NLM_F_CREATE, | 
 |           }, | 
 |       .t = | 
 |           { | 
 |               .tcm_family = AF_UNSPEC, | 
 |               .tcm_ifindex = ifIndex, | 
 |               .tcm_handle = TC_H_UNSPEC, | 
 |               .tcm_parent = TC_H_MAKE(TC_H_CLSACT, ingress ? TC_H_MIN_INGRESS | 
 |                                                            : TC_H_MIN_EGRESS), | 
 |               .tcm_info = | 
 |                   static_cast<__u32>((static_cast<uint16_t>(prio) << 16) | | 
 |                                      htons(static_cast<uint16_t>(proto))), | 
 |           }, | 
 |       .kind = | 
 |           { | 
 |               .attr = | 
 |                   { | 
 |                       .nla_len = sizeof(req.kind), | 
 |                       .nla_type = TCA_KIND, | 
 |                   }, | 
 |               .str = CLS_BPF_KIND_NAME, | 
 |           }, | 
 |       .options = | 
 |           { | 
 |               .attr = | 
 |                   { | 
 |                       .nla_len = sizeof(req.options), | 
 |                       .nla_type = NLA_F_NESTED | TCA_OPTIONS, | 
 |                   }, | 
 |               .fd = | 
 |                   { | 
 |                       .attr = | 
 |                           { | 
 |                               .nla_len = sizeof(req.options.fd), | 
 |                               .nla_type = TCA_BPF_FD, | 
 |                           }, | 
 |                       .u32 = static_cast<__u32>(bpfFd), | 
 |                   }, | 
 |               .name = | 
 |                   { | 
 |                       .attr = | 
 |                           { | 
 |                               .nla_len = sizeof(req.options.name), | 
 |                               .nla_type = TCA_BPF_NAME, | 
 |                           }, | 
 |                       // Visible via 'tc filter show', but | 
 |                       // is overwritten by strncpy below | 
 |                       .str = "placeholder", | 
 |                   }, | 
 |               .flags = | 
 |                   { | 
 |                       .attr = | 
 |                           { | 
 |                               .nla_len = sizeof(req.options.flags), | 
 |                               .nla_type = TCA_BPF_FLAGS, | 
 |                           }, | 
 |                       .u32 = TCA_BPF_FLAG_ACT_DIRECT, | 
 |                   }, | 
 |           }, | 
 |   }; | 
 |  | 
 |   snprintf(req.options.name.str, sizeof(req.options.name.str), "%s:[*fsobj]", | 
 |            basename(bpfProgPath)); | 
 |  | 
 |   int error = sendAndProcessNetlinkResponse(&req, sizeof(req)); | 
 |   return error; | 
 | } | 
 |  | 
 | // tc filter add dev .. ingress prio .. protocol .. matchall \ | 
 | //     action police rate .. burst .. conform-exceed pipe/continue \ | 
 | //     action bpf object-pinned .. \ | 
 | //     drop | 
 | // | 
 | // TODO: tc-police does not do ECN marking, so in the future, we should consider | 
 | // adding a second tc-police filter at a lower priority that rate limits traffic | 
 | // at something like 0.8 times the global rate limit and ecn marks exceeding | 
 | // packets inside a bpf program (but does not drop them). | 
 | int tcAddIngressPoliceFilter(int ifIndex, uint16_t prio, uint16_t proto, | 
 |                              unsigned rateInBytesPerSec, | 
 |                              const char *bpfProgPath) { | 
 |   // TODO: this value needs to be validated. | 
 |   // TCP IW10 (initial congestion window) means servers will send 10 mtus worth | 
 |   // of data on initial connect. | 
 |   // If nic is LRO capable it could aggregate up to 64KiB, so again probably a | 
 |   // bad idea to set burst below that, because ingress packets could get | 
 |   // aggregated to 64KiB at the nic. | 
 |   // I don't know, but I wonder whether we shouldn't just do 128KiB and not do | 
 |   // any math. | 
 |   static constexpr unsigned BURST_SIZE_IN_BYTES = 128 * 1024; // 128KiB | 
 |   IngressPoliceFilterBuilder filter(ifIndex, prio, proto, rateInBytesPerSec, | 
 |                                     BURST_SIZE_IN_BYTES, bpfProgPath); | 
 |   const int error = filter.build(); | 
 |   if (error) { | 
 |     return error; | 
 |   } | 
 |   return sendAndProcessNetlinkResponse(filter.getRequest(), | 
 |                                        filter.getRequestSize()); | 
 | } | 
 |  | 
 | // tc filter del dev .. in/egress prio .. protocol .. | 
 | int tcDeleteFilter(int ifIndex, bool ingress, uint16_t prio, uint16_t proto) { | 
 |   const struct { | 
 |     nlmsghdr n; | 
 |     tcmsg t; | 
 |   } req = { | 
 |       .n = | 
 |           { | 
 |               .nlmsg_len = sizeof(req), | 
 |               .nlmsg_type = RTM_DELTFILTER, | 
 |               .nlmsg_flags = NETLINK_REQUEST_FLAGS, | 
 |           }, | 
 |       .t = | 
 |           { | 
 |               .tcm_family = AF_UNSPEC, | 
 |               .tcm_ifindex = ifIndex, | 
 |               .tcm_handle = TC_H_UNSPEC, | 
 |               .tcm_parent = TC_H_MAKE(TC_H_CLSACT, ingress ? TC_H_MIN_INGRESS | 
 |                                                            : TC_H_MIN_EGRESS), | 
 |               .tcm_info = | 
 |                   static_cast<__u32>((static_cast<uint16_t>(prio) << 16) | | 
 |                                      htons(static_cast<uint16_t>(proto))), | 
 |           }, | 
 |   }; | 
 |  | 
 |   return sendAndProcessNetlinkResponse(&req, sizeof(req)); | 
 | } | 
 |  | 
 | } // namespace android |