Modified to send message to net popup
[platform/core/connectivity/stc-manager.git] / src / monitor / stc-monitor.c
1 /*
2  * Copyright (c) 2016 Samsung Electronics Co., Ltd.
3  *
4  * Licensed under the Apache License, Version 2.0 (the "License");
5  * you may not use this file except in compliance with the License.
6  * You may obtain a copy of the License at
7  *
8  * http://www.apache.org/licenses/LICENSE-2.0
9  *
10  * Unless required by applicable law or agreed to in writing, software
11  * distributed under the License is distributed on an "AS IS" BASIS,
12  * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13  * See the License for the specific language governing permissions and
14  * limitations under the License.
15  */
16
17 #include <linux/netlink.h>
18 #include <vconf.h>
19 #include <vconf-keys.h>
20
21 #include "stc-default-connection.h"
22 #include "helper-nl.h"
23 #include "helper-nfacct-rule.h"
24 #include "helper-net-cls.h"
25 #include "helper-cgroup.h"
26 #include "helper-iptables.h"
27 #include "counter.h"
28 #include "table-statistics.h"
29 #include "table-counters.h"
30 #include "stc-monitor.h"
31 #include "stc-time.h"
32 #include "stc-manager-plugin-appstatus.h"
33 #include "stc-manager-plugin-exception.h"
34
35 #define GRANULARITY 10
36 #define MAX_INT_LENGTH 128
37 #define VCONFKEY_STC_BACKGROUND_STATE "db/stc/background_state"
38
39 typedef struct {
40         time_t now;
41         time_t month_start_ts;
42         time_t week_start_ts;
43         time_t day_start_ts;
44         int is_updated;
45 } reset_time_limits_context_s;
46
47 typedef struct {
48         stc_app_key_s *app_key;
49         stc_process_key_s *proc_key;
50         gboolean entry_removed;
51 } remove_pid_context_s;
52
53 typedef struct {
54         struct nfacct_rule *counter;
55         int64_t bytes;
56         gboolean data_limit_exceeded;
57 } classid_bytes_context_s;
58
59 static stc_system_s *g_system = NULL;
60
61 static nfacct_rule_jump __get_jump_by_intend(struct nfacct_rule *counter)
62 {
63         if (counter->intend == NFACCT_WARN)
64                 return NFACCT_JUMP_ACCEPT;
65         else if (counter->intend == NFACCT_BLOCK)
66                 return NFACCT_JUMP_REJECT;
67         else if (counter->intend == NFACCT_ALLOW)
68                 return NFACCT_JUMP_ACCEPT;
69
70         return NFACCT_JUMP_UNKNOWN;
71 }
72
73 static stc_error_e __add_iptables_in(struct nfacct_rule *counter)
74 {
75         if (counter == NULL)
76                 return STC_ERROR_INVALID_PARAMETER;
77
78         counter->action = NFACCT_ACTION_INSERT;
79         counter->iotype = NFACCT_COUNTER_IN;
80         counter->jump = __get_jump_by_intend(counter);
81         counter->iptype = NFACCT_TYPE_IPV4;
82         counter->send_limit = 0;
83         counter->rcv_limit = 0;
84
85         return produce_net_rule(counter);
86 }
87
88 static stc_error_e __add_iptables_out(struct nfacct_rule *counter)
89 {
90         if (counter == NULL)
91                 return STC_ERROR_INVALID_PARAMETER;
92
93         counter->action = NFACCT_ACTION_INSERT;
94         counter->iotype = NFACCT_COUNTER_OUT;
95         counter->jump = __get_jump_by_intend(counter);
96         counter->iptype = NFACCT_TYPE_IPV4;
97         counter->send_limit = 0;
98         counter->rcv_limit = 0;
99
100         return produce_net_rule(counter);
101 }
102
103 static stc_error_e __del_iptables_in(struct nfacct_rule *counter)
104 {
105         if (counter == NULL)
106                 return STC_ERROR_INVALID_PARAMETER;
107
108         counter->action = NFACCT_ACTION_DELETE;
109         counter->iotype = NFACCT_COUNTER_IN;
110         counter->jump = __get_jump_by_intend(counter);
111         counter->iptype = NFACCT_TYPE_IPV4;
112         counter->send_limit = 0;
113         counter->rcv_limit = 0;
114
115         return produce_net_rule(counter);
116 }
117
118 static stc_error_e __del_iptables_out(struct nfacct_rule *counter)
119 {
120         if (counter == NULL)
121                 return STC_ERROR_INVALID_PARAMETER;
122
123         counter->action = NFACCT_ACTION_DELETE;
124         counter->iotype = NFACCT_COUNTER_OUT;
125         counter->jump = __get_jump_by_intend(counter);
126         counter->iptype = NFACCT_TYPE_IPV4;
127         counter->send_limit = 0;
128         counter->rcv_limit = 0;
129
130         return produce_net_rule(counter);
131 }
132
133 static stc_error_e __add_ip6tables_in(struct nfacct_rule *counter)
134 {
135         if (counter == NULL)
136                 return STC_ERROR_INVALID_PARAMETER;
137
138         counter->action = NFACCT_ACTION_INSERT;
139         counter->iotype = NFACCT_COUNTER_IN;
140         counter->jump = __get_jump_by_intend(counter);
141         counter->iptype = NFACCT_TYPE_IPV6;
142         counter->send_limit = 0;
143         counter->rcv_limit = 0;
144
145         return produce_net_rule(counter);
146 }
147
148 static stc_error_e __add_ip6tables_out(struct nfacct_rule *counter)
149 {
150         if (counter == NULL)
151                 return STC_ERROR_INVALID_PARAMETER;
152
153         counter->action = NFACCT_ACTION_INSERT;
154         counter->iotype = NFACCT_COUNTER_OUT;
155         counter->jump = __get_jump_by_intend(counter);
156         counter->iptype = NFACCT_TYPE_IPV6;
157         counter->send_limit = 0;
158         counter->rcv_limit = 0;
159
160         return produce_net_rule(counter);
161 }
162
163 static stc_error_e __del_ip6tables_in(struct nfacct_rule *counter)
164 {
165         if (counter == NULL)
166                 return STC_ERROR_INVALID_PARAMETER;
167
168         counter->action = NFACCT_ACTION_DELETE;
169         counter->iotype = NFACCT_COUNTER_IN;
170         counter->jump = __get_jump_by_intend(counter);
171         counter->iptype = NFACCT_TYPE_IPV6;
172         counter->send_limit = 0;
173         counter->rcv_limit = 0;
174
175         return produce_net_rule(counter);
176 }
177
178 static stc_error_e __del_ip6tables_out(struct nfacct_rule *counter)
179 {
180         if (counter == NULL)
181                 return STC_ERROR_INVALID_PARAMETER;
182
183         counter->action = NFACCT_ACTION_DELETE;
184         counter->iotype = NFACCT_COUNTER_OUT;
185         counter->jump = __get_jump_by_intend(counter);
186         counter->iptype = NFACCT_TYPE_IPV6;
187         counter->send_limit = 0;
188         counter->rcv_limit = 0;
189
190         return produce_net_rule(counter);
191 }
192
193 static int __processes_tree_key_compare(gconstpointer a, gconstpointer b,
194                                         gpointer UNUSED user_data)
195 {
196         stc_process_key_s *key_a = (stc_process_key_s *)a;
197         stc_process_key_s *key_b = (stc_process_key_s *)b;
198
199         return key_a->pid - key_b->pid;
200 }
201
202 static void __processes_tree_value_free(gpointer data)
203 {
204         stc_process_value_s *value = (stc_process_value_s *)data;
205
206         FREE(value);
207 }
208
209 static void __processes_tree_key_free(gpointer data)
210 {
211         stc_process_key_s *key = (stc_process_key_s *)data;
212
213         FREE(key);
214 }
215
216 static int __apps_tree_key_compare(gconstpointer a, gconstpointer b,
217                                    gpointer UNUSED user_data)
218 {
219         stc_app_key_s *key_a = (stc_app_key_s *)a;
220         stc_app_key_s *key_b = (stc_app_key_s *)b;
221         gint ret;
222
223         ret = g_strcmp0(key_a->pkg_id, key_b->pkg_id);
224         if (ret)
225                 return ret;
226
227         return g_strcmp0(key_a->app_id, key_b->app_id);
228 }
229
230 static void __apps_tree_value_free(gpointer data)
231 {
232         stc_app_value_s *value = (stc_app_value_s *)data;
233
234         g_tree_destroy(value->processes);
235         value->processes = NULL;
236
237         FREE(value);
238 }
239
240 static void __apps_tree_key_free(gpointer data)
241 {
242         stc_app_key_s *key = (stc_app_key_s *)data;
243
244         g_free(key->pkg_id);
245         g_free(key->app_id);
246         FREE(key);
247 }
248
249 static int __rstns_tree_key_compare(gconstpointer a, gconstpointer b,
250                                     gpointer UNUSED user_data)
251 {
252         stc_rstn_key_s *key_a = (stc_rstn_key_s *)a;
253         stc_rstn_key_s *key_b = (stc_rstn_key_s *)b;
254         int ret;
255
256         ret = g_strcmp0(key_a->app_id, key_b->app_id);
257         if (ret != 0)
258                 return ret;
259
260         ret = g_strcmp0(key_a->ifname, key_b->ifname);
261         if (ret != 0)
262                 return ret;
263
264         ret = g_strcmp0(key_a->subscriber_id, key_b->subscriber_id);
265         if (ret != 0)
266                 return ret;
267
268         ret = key_a->iftype - key_b->iftype;
269         if (ret != 0)
270                 return ret;
271
272         ret = key_a->roaming - key_b->roaming;
273         if (ret != 0)
274                 return ret;
275
276         return 0;
277 }
278
279 static void __rstns_tree_value_free(gpointer data)
280 {
281         stc_rstn_value_s *value = (stc_rstn_value_s *)data;
282
283         FREE(value);
284 }
285
286 static void __rstns_tree_key_free(gpointer data)
287 {
288         stc_rstn_key_s *key = (stc_rstn_key_s *)data;
289
290         FREE(key->app_id);
291         FREE(key->ifname);
292         FREE(key->subscriber_id);
293         FREE(key);
294 }
295
296 /*
297 //LCOV_EXCL_START
298 static gboolean __processes_tree_foreach_print(gpointer key, gpointer value,
299                                                gpointer data)
300 {
301         stc_process_key_s *proc_key = (stc_process_key_s *)key;
302         stc_process_value_s *proc_value = (stc_process_value_s *)value;
303
304         STC_LOGD("Process entry => PID [\033[1;33m%d\033[0;m], Ground state [%d]",
305                  proc_key->pid, proc_value->ground);
306         return FALSE;
307 }
308
309 static void __processes_tree_printall(GTree *processes)
310 {
311         g_tree_foreach(processes, __processes_tree_foreach_print, NULL);
312 }
313
314 static gboolean __apps_tree_foreach_print(gpointer key, gpointer value,
315                                           gpointer data)
316 {
317         stc_app_key_s *app_key = (stc_app_key_s *)key;
318         stc_app_value_s *app_value = (stc_app_value_s *)value;
319
320         STC_LOGD("Application info => Pkg ID [\033[0;34m%s\033[0;m], "
321                  "App ID [\033[0;32m%s\033[0;m], Type [%d], classid [%d],"
322                  " counter [ in (%lld), out (%lld)]",
323                  app_key->pkg_id, app_key->app_id,
324                  app_value->type, app_value->classid,
325                  app_value->data_usage.in_bytes, app_value->data_usage.out_bytes);
326
327         __processes_tree_printall(app_value->processes);
328         return FALSE;
329 }
330
331 static void __apps_tree_printall(void)
332 {
333         g_tree_foreach(g_system->apps, __apps_tree_foreach_print, NULL);
334 }
335 //LCOV_EXCL_STOP
336 */
337
338 static gboolean __apps_tree_foreach_remove_pid(gpointer key, gpointer value,
339                                                gpointer data)
340 {
341         remove_pid_context_s *context = (remove_pid_context_s *)data;
342         stc_app_value_s *app_value = (stc_app_value_s *)value;
343
344         if (!g_tree_remove(app_value->processes, context->proc_key))
345                 return FALSE;
346
347         context->entry_removed = TRUE;
348         context->app_key = (stc_app_key_s *)key;
349
350         return TRUE;
351 }
352
353 static stc_app_value_s * __application_lookup(GTree *apps,
354                                               const stc_app_key_s *key)
355 {
356         stc_app_value_s *lookup;
357
358         ret_value_msg_if(apps == NULL, NULL, "apps is null!");
359
360         lookup = g_tree_lookup(apps, key);
361
362         return lookup;
363 }
364
365 static stc_process_value_s * __process_lookup(GTree *processes,
366                                               const stc_process_key_s *key)
367 {
368         stc_process_value_s *lookup;
369
370         ret_value_msg_if(processes == NULL, NULL, "processes is null!");
371
372         lookup = g_tree_lookup(processes, key);
373
374         return lookup;
375 }
376
377 //LCOV_EXCL_START
378 static gboolean __processes_tree_check_empty(gpointer key, gpointer value,
379                                              gpointer data)
380 {
381         guint *pid_count = (guint *)data;
382         (*pid_count)++;
383         return TRUE;
384 }
385 //LCOV_EXCL_STOP
386
387 static gboolean __add_application_monitor(gpointer key, gpointer value,
388                                           gpointer data)
389 {
390         stc_app_value_s *app_value = (stc_app_value_s *)value;
391         default_connection_s *connection = (default_connection_s *)data;
392         stc_s *stc = stc_get_manager();
393
394         if (app_value->classid == STC_TOTAL_DATACALL_CLASSID ||
395             app_value->classid == STC_TOTAL_WIFI_CLASSID ||
396             app_value->classid == STC_TOTAL_BLUETOOTH_CLASSID)
397                 return FALSE;
398
399         if (stc && connection && connection->ifname) {
400                 struct nfacct_rule counter;
401
402                 if (!stc->carg) {
403                         stc->carg = MALLOC0(counter_arg_s, 1); //LCOV_EXCL_LINE
404                         if (stc->carg == NULL) //LCOV_EXCL_LINE
405                                 return FALSE; //LCOV_EXCL_LINE
406
407                         stc->carg->sock = stc_monitor_get_counter_socket(); //LCOV_EXCL_LINE
408                 }
409
410                 memset(&counter, 0, sizeof(struct nfacct_rule));
411
412                 counter.carg = stc->carg;
413                 counter.classid = app_value->classid;
414                 counter.intend = NFACCT_COUNTER;
415
416                 if (connection->tether_state == TRUE &&
417                         connection->tether_iface.ifname != NULL &&
418                         app_value->classid == STC_TETHERING_APP_CLASSID) {
419                         counter.iftype = connection->tether_iface.type;
420                         g_strlcpy(counter.ifname, connection->tether_iface.ifname, MAX_IFACE_LENGTH);
421                 } else {
422                         counter.iftype = connection->type;
423                         g_strlcpy(counter.ifname, connection->ifname, MAX_IFACE_LENGTH);
424                 }
425
426                 if (app_value->classid == STC_TOTAL_IPV4_CLASSID) {
427                         __add_iptables_in(&counter);
428                         __add_iptables_out(&counter);
429                 } else if (app_value->classid == STC_TOTAL_IPV6_CLASSID) {
430                         __add_ip6tables_in(&counter);
431                         __add_ip6tables_out(&counter);
432                 } else {
433                         __add_iptables_in(&counter);
434                         __add_iptables_out(&counter);
435                         __add_ip6tables_in(&counter);
436                         __add_ip6tables_out(&counter);
437                 }
438         }
439
440         return FALSE;
441 }
442
443 static gboolean __remove_application_monitor(gpointer key, gpointer value,
444                                              gpointer data)
445 {
446         stc_app_value_s *app_value = (stc_app_value_s *)value;
447         default_connection_s *connection = (default_connection_s *)data;
448         stc_s *stc = stc_get_manager();
449
450         if (stc && connection && connection->ifname) {
451                 struct nfacct_rule counter;
452
453                 if (!stc->carg) {
454                         stc->carg = MALLOC0(counter_arg_s, 1); //LCOV_EXCL_LINE
455                         if (stc->carg == NULL) //LCOV_EXCL_LINE
456                                 return FALSE; //LCOV_EXCL_LINE
457
458                         stc->carg->sock = stc_monitor_get_counter_socket(); //LCOV_EXCL_LINE
459                 }
460
461                 memset(&counter, 0, sizeof(struct nfacct_rule));
462
463                 counter.carg = stc->carg;
464                 counter.classid = app_value->classid;
465                 counter.intend = NFACCT_COUNTER;
466
467                 if (connection->tether_state == FALSE &&
468                         connection->tether_iface.ifname != NULL &&
469                         app_value->classid == STC_TETHERING_APP_CLASSID) {
470                         counter.iftype = connection->tether_iface.type;
471                         g_strlcpy(counter.ifname, connection->tether_iface.ifname, MAX_IFACE_LENGTH);
472                 } else {
473                         counter.iftype = connection->type;
474                         g_strlcpy(counter.ifname, connection->ifname, MAX_IFACE_LENGTH);
475                 }
476
477                 __del_iptables_in(&counter);
478                 __del_iptables_out(&counter);
479                 __del_ip6tables_in(&counter);
480                 __del_ip6tables_out(&counter);
481         }
482
483         return FALSE;
484 }
485
486 static void __print_rstn(stc_rstn_key_s *rstn_key, stc_rstn_value_s *rstn_value)
487 {
488         STC_LOGI("rstn info => rstn_id [%llu], "
489                  "app_id [%s], classid [%u], ifname [%s], "
490                  "iftype [%d], rstn_state [%d], rstn_type [%d], "
491                  "month_start_date [%d], limit [ (%lld) bytes], "
492                  "warn_limit [ (%lld) bytes], "
493                  "monthly_limit [ (%lld) bytes], "
494                  "weekly_limit [ (%lld) bytes], "
495                  "daily_limit [ (%lld) bytes], "
496                  "data_counter [ (%lld) bytes], "
497                  "warn_counter [ (%lld) bytes], "
498                  "monthly_counter [ (%lld) bytes], "
499                  "weekly_counter [ (%lld) bytes], "
500                  "daily_counter [ (%lld) bytes], "
501                  "roaming [%d], subscriber_id [%s]",
502                  rstn_value->restriction_id,
503                  rstn_key->app_id, rstn_value->classid , rstn_key->ifname,
504                  rstn_key->iftype, rstn_value->rstn_state, rstn_value->rstn_type,
505                  rstn_value->month_start_date,
506                  rstn_value->limit[STC_RSTN_LIMIT_TYPE_DATA],
507                  rstn_value->limit[STC_RSTN_LIMIT_TYPE_DATA_WARN],
508                  rstn_value->limit[STC_RSTN_LIMIT_TYPE_MONTHLY],
509                  rstn_value->limit[STC_RSTN_LIMIT_TYPE_WEEKLY],
510                  rstn_value->limit[STC_RSTN_LIMIT_TYPE_DAILY],
511                  rstn_value->counter[STC_RSTN_LIMIT_TYPE_DATA],
512                  rstn_value->counter[STC_RSTN_LIMIT_TYPE_DATA_WARN],
513                  rstn_value->counter[STC_RSTN_LIMIT_TYPE_MONTHLY],
514                  rstn_value->counter[STC_RSTN_LIMIT_TYPE_WEEKLY],
515                  rstn_value->counter[STC_RSTN_LIMIT_TYPE_DAILY],
516                  rstn_key->roaming, rstn_key->subscriber_id);
517 }
518
519 static void __add_iptables_rule(int64_t classid, nfacct_rule_intend intend,
520                                 stc_iface_type_e iftype)
521 {
522         char *default_ifname = stc_default_connection_get_ifname();
523         default_connection_s *connection = stc_get_default_connection();
524         struct nfacct_rule counter;
525         stc_s *stc = stc_get_manager();
526         if (!stc) {
527                 g_free(default_ifname); //LCOV_EXCL_LINE
528                 return; //LCOV_EXCL_LINE
529         }
530
531         if (!stc->carg) {
532                 stc->carg = MALLOC0(counter_arg_s, 1); //LCOV_EXCL_LINE
533                 if (stc->carg == NULL) { //LCOV_EXCL_LINE
534                         g_free(default_ifname); //LCOV_EXCL_LINE
535                         return; //LCOV_EXCL_LINE
536                 }
537
538                 stc->carg->sock = stc_monitor_get_counter_socket(); //LCOV_EXCL_LINE
539         }
540
541         counter.carg = stc->carg;
542         counter.classid = classid;
543         counter.intend = intend;
544
545         if (connection && connection->tether_iface.ifname != NULL &&
546                 classid == STC_TETHERING_APP_CLASSID) {
547                 counter.iftype = connection->tether_iface.type;
548                 g_strlcpy(counter.ifname, connection->tether_iface.ifname, MAX_IFACE_LENGTH);
549         } else {
550                 counter.iftype = iftype;
551                 g_strlcpy(counter.ifname, default_ifname, MAX_IFACE_LENGTH);
552         }
553
554         g_free(default_ifname);
555
556         /* iptables rule */
557         __add_iptables_in(&counter);
558         __add_iptables_out(&counter);
559
560         /* ip6tables rule */
561         __add_ip6tables_in(&counter);
562         __add_ip6tables_out(&counter);
563 }
564
565 static void __del_iptables_rule(int64_t classid, nfacct_rule_intend intend,
566                                 stc_iface_type_e iftype)
567 {
568         char *default_ifname = stc_default_connection_get_ifname();
569         default_connection_s *connection = stc_get_default_connection();
570         struct nfacct_rule counter;
571         stc_s *stc = stc_get_manager();
572         if (!stc) {
573                 g_free(default_ifname); //LCOV_EXCL_LINE
574                 return; //LCOV_EXCL_LINE
575         }
576
577         if (!stc->carg) {
578                 stc->carg = MALLOC0(counter_arg_s, 1); //LCOV_EXCL_LINE
579                 if (stc->carg == NULL) { //LCOV_EXCL_LINE
580                         g_free(default_ifname); //LCOV_EXCL_LINE
581                         return; //LCOV_EXCL_LINE
582                 }
583
584                 stc->carg->sock = stc_monitor_get_counter_socket(); //LCOV_EXCL_LINE
585         }
586
587         counter.carg = stc->carg;
588         counter.classid = classid;
589         counter.intend = intend;
590
591         if (connection && connection->tether_iface.ifname != NULL &&
592                 classid == STC_TETHERING_APP_CLASSID) {
593                 counter.iftype = connection->tether_iface.type;
594                 g_strlcpy(counter.ifname, connection->tether_iface.ifname, MAX_IFACE_LENGTH);
595         } else {
596                 counter.iftype = iftype;
597                 g_strlcpy(counter.ifname, default_ifname, MAX_IFACE_LENGTH);
598         }
599
600         g_free(default_ifname);
601
602         /* iptables rule */
603         __del_iptables_in(&counter);
604         __del_iptables_out(&counter);
605
606         /* ip6tables rule */
607         __del_ip6tables_in(&counter);
608         __del_ip6tables_out(&counter);
609 }
610
611 typedef struct {
612         time_t month_start_ts;
613         time_t week_start_ts;
614         time_t day_start_ts;
615         int64_t monthly_stat;
616         int64_t weekly_stat;
617         int64_t daily_stat;
618 } cumulative_data_s;
619
620 static stc_cb_ret_e __statistics_info_cb(const table_statistics_info *info,
621                                         void *user_data)
622 {
623         cumulative_data_s *stat = (cumulative_data_s *)user_data;
624         int64_t counters = 0;
625
626         counters = info->cnt.in_bytes + info->cnt.out_bytes;
627
628         stat->monthly_stat += counters;
629         if (stat->week_start_ts <= info->interval->from)
630                 stat->weekly_stat += counters;
631         if (stat->day_start_ts <= info->interval->from)
632                 stat->daily_stat += counters;
633
634         return STC_CONTINUE;
635 }
636
637 static void __process_restriction(enum traffic_restriction_type rstn_type,
638                                   stc_rstn_key_s *rstn_key,
639                                   stc_rstn_value_s *rstn_value, void *data)
640 {
641         default_connection_s *old_connection = (default_connection_s *)data;
642         default_connection_s *connection = NULL;
643
644         if (old_connection != NULL)
645                 connection = old_connection;
646         else
647                 connection = stc_get_default_connection();
648
649         /* no default ifname */
650         if (connection->ifname == NULL)
651                 return;
652
653         /* rstn not applicable for this interface */
654         if (rstn_key->ifname != NULL && g_strcmp0("", rstn_key->ifname) != 0 &&
655             (g_strcmp0(connection->ifname, rstn_key->ifname) != 0) &&
656                 (g_strcmp0(connection->tether_iface.ifname, rstn_key->ifname) != 0))
657                 return;
658
659         /* classid is invalid */
660         if (rstn_value->classid <= STC_UNKNOWN_CLASSID)
661                 return;
662
663         switch (rstn_type) {
664         case RST_SET:
665         {
666                 int i;
667                 table_counters_info info;
668                 int64_t effective_limit[STC_RSTN_LIMIT_TYPE_MAX] = { 0, };
669
670                 memset(&info, 0, sizeof(table_counters_info));
671                 rstn_value->limit_exceeded = 0;
672
673                 if ((rstn_value->counter[STC_RSTN_LIMIT_TYPE_DATA] == 0 &&
674                         rstn_value->limit[STC_RSTN_LIMIT_TYPE_DATA] >= 0) ||
675                         (rstn_value->counter[STC_RSTN_LIMIT_TYPE_DATA_WARN] == 0 &&
676                         rstn_value->limit[STC_RSTN_LIMIT_TYPE_DATA_WARN] >= 0) ||
677                         (rstn_value->counter[STC_RSTN_LIMIT_TYPE_MONTHLY] == 0 &&
678                         rstn_value->limit[STC_RSTN_LIMIT_TYPE_MONTHLY] >= 0) ||
679                         (rstn_value->counter[STC_RSTN_LIMIT_TYPE_WEEKLY] == 0 &&
680                         rstn_value->limit[STC_RSTN_LIMIT_TYPE_WEEKLY] >= 0) ||
681                         (rstn_value->counter[STC_RSTN_LIMIT_TYPE_DAILY] == 0 &&
682                         rstn_value->limit[STC_RSTN_LIMIT_TYPE_DAILY] >= 0)) {
683                         table_counters_get(rstn_value->restriction_id, &info);
684
685                         time_t current_time = 0;
686                         cumulative_data_s stat;
687                         table_statistics_select_rule rule;
688
689                         memset(&stat, 0, sizeof(cumulative_data_s));
690                         stat.month_start_ts = rstn_value->month_start_ts;
691                         stat.week_start_ts = g_system->last_week_ts;
692                         stat.week_start_ts = g_system->last_day_ts;
693
694                         memset(&rule, 0, sizeof(table_statistics_select_rule));
695                         rule.from = rstn_value->month_start_ts;
696                         time(&current_time);
697                         rule.to = current_time;
698                         rule.iftype = rstn_key->iftype;
699                         rule.granularity = GRANULARITY;
700
701                         table_statistics_per_app(rstn_key->app_id, &rule, __statistics_info_cb, &stat);
702
703                         rstn_value->counter[STC_RSTN_LIMIT_TYPE_DATA] = info.data_counter;
704                         rstn_value->counter[STC_RSTN_LIMIT_TYPE_DATA_WARN] = info.warn_counter;
705                         rstn_value->counter[STC_RSTN_LIMIT_TYPE_MONTHLY] = info.monthly_counter + stat.monthly_stat;
706                         rstn_value->counter[STC_RSTN_LIMIT_TYPE_WEEKLY] = info.weekly_counter + stat.weekly_stat;
707                         rstn_value->counter[STC_RSTN_LIMIT_TYPE_DAILY] = info.daily_counter + stat.daily_stat;
708                 }
709
710                 for (i = 0; i < STC_RSTN_LIMIT_TYPE_MAX; i++) {
711                         if (rstn_value->limit[i] >= 0) {
712                                 effective_limit[i] = rstn_value->limit[i] - rstn_value->counter[i];
713
714                                 if (effective_limit[i] < 0)
715                                         rstn_value->limit_exceeded |= (1 << i);
716                         }
717                 }
718
719                 STC_LOGD("rstn_id [%llu], datausage [%llu] bytes",
720                         rstn_value->restriction_id, info.data_counter);
721
722                 if (rstn_value->limit_exceeded != 0 &&
723                         rstn_value->limit_exceeded != (1 << STC_RSTN_LIMIT_TYPE_DATA_WARN)) {
724                         __add_iptables_rule(rstn_value->classid, NFACCT_BLOCK, rstn_key->iftype);
725                 }
726
727                 rstn_value->rstn_state = STC_RSTN_STATE_ACTIVATED;
728         }
729         break;
730         case RST_EXCLUDE:
731                 __add_iptables_rule(rstn_value->classid, NFACCT_ALLOW,
732                                     rstn_key->iftype);
733
734                 rstn_value->rstn_state = STC_RSTN_STATE_ACTIVATED;
735                 rstn_value->limit_exceeded = 0;
736                 rstn_value->limit_notified = 0;
737                 break;
738         case RST_UNSET:
739         {
740                 int i;
741
742                 if (rstn_value->classid == STC_TETHERING_APP_CLASSID)
743                         __del_iptables_rule(rstn_value->classid, NFACCT_BLOCK,
744                                             rstn_key->iftype);
745                 else
746                         __del_iptables_rule(rstn_value->classid, rstn_value->rstn_type,
747                                             rstn_key->iftype);
748
749                 rstn_value->rstn_state = STC_RSTN_STATE_DEACTIVATED;
750                 rstn_value->limit_exceeded = 0;
751                 rstn_value->limit_notified = 0;
752
753                 for (i = 0; i < STC_RSTN_LIMIT_TYPE_MAX; i++)
754                         if (rstn_value->limit[i] >= 0)
755                                 rstn_value->counter[i] = 0;
756         }
757         break;
758         default:
759                 ;//Do Nothing
760         }
761 }
762
763 //LCOV_EXCL_START
764 static gboolean __remove_rstns_foreach_application(gpointer key,
765                                                    gpointer value,
766                                                    gpointer data)
767 {
768         stc_rstn_key_s *rstn_key = (stc_rstn_key_s *)key;
769         stc_rstn_value_s *rstn_value = (stc_rstn_value_s *)value;
770         gchar *app_id = (gchar *)data;
771
772         /* rstn rule is not for applications */
773         if (rstn_key->app_id == NULL)
774                 goto out;
775
776         /* rstn rule is not for this application */
777         if (g_strcmp0(rstn_key->app_id, app_id) != 0)
778                 goto out;
779
780         /* rstn rule is already removed */
781         if (rstn_value->rstn_state == STC_RSTN_STATE_DEACTIVATED)
782                 goto out;
783
784         /* remove restriction from system */
785         __process_restriction(RST_UNSET, rstn_key, rstn_value, NULL);
786
787         __print_rstn(rstn_key, rstn_value);
788 out:
789         return FALSE;
790 }
791 //LCOV_EXCL_STOP
792
793 static void __remove_rstns_for_application(gchar *app_id)
794 {
795         g_tree_foreach(g_system->rstns, __remove_rstns_foreach_application,
796                        app_id);
797 }
798
799 static stc_error_e __application_remove_if_empty(const stc_app_key_s *app_key)
800 {
801         stc_error_e ret = STC_ERROR_NONE;
802         guint pid_count = 0;
803         stc_app_value_s *lookup;
804
805         ret_value_msg_if(g_system == NULL, STC_ERROR_FAIL, "stc monitor not initialized!");
806
807         lookup = __application_lookup(g_system->apps, app_key);
808         if (!lookup) {
809                 STC_LOGE("app_key not found"); //LCOV_EXCL_LINE
810                 return STC_ERROR_NO_DATA; //LCOV_EXCL_LINE
811         }
812
813         g_tree_foreach(lookup->processes, __processes_tree_check_empty,
814                        &pid_count);
815
816         if (!pid_count) {
817                 /* remove nfacct rule for this classid */
818                 __remove_application_monitor((gpointer) app_key, lookup,
819                                              stc_get_default_connection());
820                 __remove_rstns_for_application(app_key->app_id);
821         }
822
823         if (!g_tree_remove(g_system->apps, app_key)) {
824                 ret = STC_ERROR_NO_DATA; //LCOV_EXCL_LINE
825                 STC_LOGE("key not found"); //LCOV_EXCL_LINE
826         }
827
828         return ret;
829 }
830
831 static stc_error_e __close_contr_sock(stc_system_s *system)
832 {
833         ret_value_msg_if(system == NULL, STC_ERROR_INVALID_PARAMETER, "invalid parameter");
834
835         /* close netlink socket for updating kernel counters */
836         if (system->contr_sock != -1) {
837                 close(system->contr_sock);
838                 system->contr_sock = -1;
839         }
840
841         if (system->contr_gsource_id != 0) {
842                 g_source_remove(system->contr_gsource_id);
843                 system->contr_gsource_id = 0;
844         }
845
846         return STC_ERROR_NONE;
847 }
848
849 static gboolean __process_contr_reply(GIOChannel *source,
850                                       GIOCondition condition,
851                                       gpointer user_data);
852
853 //LCOV_EXCL_START
854 static stc_error_e __close_and_reopen_contr_sock(stc_system_s *system)
855 {
856         GIOChannel *gio = NULL;
857         ret_value_msg_if(system == NULL, STC_ERROR_INVALID_PARAMETER, "invalid parameter");
858
859         /* close netlink socket for updating kernel counters */
860         if (system->contr_sock != -1) {
861                 close(system->contr_sock);
862                 system->contr_sock = -1;
863         }
864
865         if (system->contr_gsource_id != 0) {
866                 g_source_remove(system->contr_gsource_id);
867                 system->contr_gsource_id = 0;
868         }
869
870         /* create netlink socket for updating kernel counters */
871         system->contr_sock = create_netlink(NETLINK_NETFILTER, 0);
872         if (system->contr_sock < 0) {
873                 STC_LOGE("failed to open socket");
874                 FREE(system);
875                 return STC_ERROR_FAIL;
876         }
877
878         gio = g_io_channel_unix_new(system->contr_sock);
879         system->contr_gsource_id =
880                 g_io_add_watch(gio, G_IO_IN | G_IO_ERR | G_IO_HUP,
881                                (GIOFunc) __process_contr_reply,
882                                NULL);
883         g_io_channel_unref(gio);
884
885         return STC_ERROR_NONE;
886 }
887
888 static void __action_when_rstn_limit_exceeded(stc_rstn_limit_type_e limit_type,
889                                                 stc_rstn_key_s *rstn_key,
890                                                 stc_rstn_value_s *rstn_value,
891                                                 classid_bytes_context_s *context)
892 {
893         gboolean rv;
894         char iftype[MAX_INT_LENGTH];
895         char byte[MAX_INT_LENGTH];
896         const char *signal_name;
897         const char *net_popup_content;
898         const char *net_popup_type;
899         stc_s *stc = (stc_s *)stc_get_manager();
900
901         if (stc == NULL) {
902                 STC_LOGE("Failed to get stc data");
903                 return;
904         }
905
906         switch (limit_type) {
907         case STC_RSTN_LIMIT_TYPE_DATA_WARN:
908         {
909                 signal_name = "WarnThresholdCrossed";
910                 net_popup_content = "warn threshold crossed";
911                 net_popup_type = "warning_noti";
912         }
913         break;
914         case STC_RSTN_LIMIT_TYPE_DATA:
915         case STC_RSTN_LIMIT_TYPE_MONTHLY:
916         case STC_RSTN_LIMIT_TYPE_WEEKLY:
917         case STC_RSTN_LIMIT_TYPE_DAILY:
918         {
919                 signal_name = "RestrictionThresholdCrossed";
920                 net_popup_content = "restriction threshold crossed";
921                 net_popup_type = "restriction_noti";
922
923                 /* block immediately */
924                 context->counter->intend = NFACCT_BLOCK;
925                 __del_iptables_in(context->counter);
926                 __del_iptables_out(context->counter);
927                 __add_iptables_in(context->counter);
928                 __add_iptables_out(context->counter);
929
930                 __del_ip6tables_in(context->counter);
931                 __del_ip6tables_out(context->counter);
932                 __add_ip6tables_in(context->counter);
933                 __add_ip6tables_out(context->counter);
934                 context->counter->intend = NFACCT_COUNTER;
935
936                 rstn_value->limit_exceeded |= (1 << limit_type);
937         }
938         break;
939         default:
940                 break;
941         }
942
943         /* emit signal */
944         rv = stc_manager_dbus_emit_signal(stc->connection,
945                                                   STC_DBUS_SERVICE_RESTRICTION_PATH,
946                                                   STC_DBUS_INTERFACE_RESTRICTION,
947                                                   signal_name,
948                                                   g_variant_new("(si)",
949                                                   rstn_key->app_id,
950                                                   rstn_key->iftype));
951
952         if (rv == TRUE)
953                 rstn_value->limit_notified |= (1 << limit_type);
954
955         snprintf(iftype, MAX_INT_LENGTH, "%d", rstn_key->iftype);
956         snprintf(byte, MAX_INT_LENGTH, "%lld", rstn_value->limit[limit_type]);
957         stc_plugin_appstatus_send_message(net_popup_content,
958                         net_popup_type, rstn_key->app_id, iftype, byte);
959 }
960
961 static gboolean __rstn_counter_update(stc_rstn_key_s *rstn_key,
962                                       stc_rstn_value_s *rstn_value,
963                                       classid_bytes_context_s *context)
964 {
965         int i;
966         switch (context->counter->iotype) {
967         case NFACCT_COUNTER_IN:
968         case NFACCT_COUNTER_OUT:
969                 if ((rstn_value->counter[STC_RSTN_LIMIT_TYPE_DATA] == 0 &&
970                         rstn_value->limit[STC_RSTN_LIMIT_TYPE_DATA] >= 0) ||
971                         (rstn_value->counter[STC_RSTN_LIMIT_TYPE_DATA_WARN] == 0 &&
972                         rstn_value->limit[STC_RSTN_LIMIT_TYPE_DATA_WARN] >= 0) ||
973                         (rstn_value->counter[STC_RSTN_LIMIT_TYPE_MONTHLY] == 0 &&
974                         rstn_value->limit[STC_RSTN_LIMIT_TYPE_MONTHLY] >= 0) ||
975                         (rstn_value->counter[STC_RSTN_LIMIT_TYPE_WEEKLY] == 0 &&
976                         rstn_value->limit[STC_RSTN_LIMIT_TYPE_WEEKLY] >= 0) ||
977                         (rstn_value->counter[STC_RSTN_LIMIT_TYPE_DAILY] == 0 &&
978                         rstn_value->limit[STC_RSTN_LIMIT_TYPE_DAILY] >= 0)) {
979                         table_counters_info info;
980                         memset(&info, 0, sizeof(table_counters_info));
981                         table_counters_get(rstn_value->restriction_id, &info);
982
983                         rstn_value->counter[STC_RSTN_LIMIT_TYPE_DATA] = info.data_counter;
984                         rstn_value->counter[STC_RSTN_LIMIT_TYPE_DATA_WARN] = info.warn_counter;
985                         rstn_value->counter[STC_RSTN_LIMIT_TYPE_MONTHLY] = info.monthly_counter;
986                         rstn_value->counter[STC_RSTN_LIMIT_TYPE_WEEKLY] = info.weekly_counter;
987                         rstn_value->counter[STC_RSTN_LIMIT_TYPE_DAILY] = info.daily_counter;
988                 }
989
990                 for (i = 0; i < STC_RSTN_LIMIT_TYPE_MAX; i++) {
991                         if (rstn_value->limit[i] >= 0 &&
992                                 !(rstn_value->limit_notified & (1 << i))) {
993                                 rstn_value->counter[i] += context->bytes;
994                                 if (rstn_value->limit[i] <= rstn_value->counter[i])
995                                         __action_when_rstn_limit_exceeded(i,
996                                                                                 rstn_key,
997                                                                                 rstn_value,
998                                                                                 context);
999                         }
1000                 }
1001
1002                 g_system->rstns_tree_updated = TRUE;
1003                 __print_rstn(rstn_key, rstn_value);
1004                 break;
1005         default:
1006                 STC_LOGE("unknown iotype");
1007         }
1008
1009         return FALSE;
1010 }
1011
1012 static gboolean __interface_rstn_counter_update(stc_rstn_key_s *rstn_key,
1013                                                 stc_rstn_value_s *rstn_value,
1014                                                 classid_bytes_context_s *context)
1015 {
1016         if ((rstn_value->classid == STC_TOTAL_DATACALL_CLASSID &&
1017                 context->counter->iftype == STC_IFACE_DATACALL) ||
1018                 (rstn_value->classid == STC_TOTAL_WIFI_CLASSID &&
1019                 context->counter->iftype == STC_IFACE_WIFI) ||
1020                 (rstn_value->classid == STC_TOTAL_BLUETOOTH_CLASSID &&
1021                 context->counter->iftype == STC_IFACE_BLUETOOTH) ||
1022                 (rstn_value->classid == STC_TETHERING_APP_CLASSID &&
1023                  context->counter->iftype == STC_IFACE_WIFI) ||
1024                 (rstn_value->classid == STC_TETHERING_APP_CLASSID &&
1025                  context->counter->iftype == STC_IFACE_BLUETOOTH) ||
1026                 (rstn_value->classid == STC_TETHERING_APP_CLASSID &&
1027                  context->counter->iftype == STC_IFACE_USB) ||
1028                 (rstn_value->classid == STC_TETHERING_APP_CLASSID &&
1029                  context->counter->iftype == STC_IFACE_P2P)) {
1030                 context->counter->classid = rstn_value->classid;
1031                 return __rstn_counter_update(rstn_key, rstn_value, context);
1032         }
1033
1034         return FALSE;
1035 }
1036
1037 static gboolean __rstn_counter_update_foreach_classid(gpointer key,
1038                                                       gpointer value,
1039                                                       gpointer data)
1040 {
1041         gboolean rv = FALSE;
1042         stc_rstn_key_s *rstn_key = (stc_rstn_key_s *)key;
1043         stc_rstn_value_s *rstn_value = (stc_rstn_value_s *)value;
1044         classid_bytes_context_s *context = (classid_bytes_context_s *)data;
1045         uint32_t classid;
1046
1047         if (context->counter->intend != NFACCT_COUNTER)
1048                 goto try_next_callback;
1049
1050         if (rstn_value->limit_exceeded == TRUE) {
1051                 context->data_limit_exceeded = TRUE; //LCOV_EXCL_LINE
1052                 goto try_next_callback; //LCOV_EXCL_LINE
1053         }
1054
1055         classid = context->counter->classid;
1056         rv = __interface_rstn_counter_update(rstn_key, rstn_value, context);
1057
1058         context->counter->classid = classid;
1059         if (rstn_value->classid != context->counter->classid)
1060                 goto try_next_callback;
1061
1062         rv = __rstn_counter_update(rstn_key, rstn_value, context);
1063
1064 try_next_callback:
1065         return rv;
1066 }
1067 //LCOV_EXCL_STOP
1068
1069 static gboolean __update_app_statistics(gpointer key, gpointer value,
1070                                         gpointer data)
1071 {
1072         stc_app_key_s *app_key = (stc_app_key_s *)key;
1073         stc_app_value_s *app_value = (stc_app_value_s *)value;
1074         time_t *touch_time = (time_t *)data;
1075         stc_db_classid_iftype_key stat_key;
1076         stc_db_app_stats stat;
1077         default_connection_s *default_connection = stc_get_default_connection();
1078
1079         memset(&stat_key, 0, sizeof(stc_db_classid_iftype_key));
1080         memset(&stat, 0 , sizeof(stc_db_app_stats));
1081
1082         /* Do not update statistics for Tethering
1083          * if tethering is in-active found */
1084         if (default_connection &&
1085                 default_connection->tether_state == FALSE &&
1086                 !strcmp(app_key->app_id, STC_TOTAL_TETHERING))
1087                 return FALSE;
1088
1089         /* Do not update statistics for Wi-Fi
1090          * if tethering is active on wlan0 iface */
1091         if (default_connection && default_connection->tether_state &&
1092                 default_connection->tether_iface.type == STC_IFACE_WIFI &&
1093                 !strcmp(app_key->app_id, STC_TOTAL_WIFI))
1094                 return FALSE;
1095
1096         stat_key.classid = app_value->classid;
1097
1098         if (app_value->classid == STC_TETHERING_APP_CLASSID &&
1099                 default_connection->tether_state == TRUE)
1100                 stat_key.iftype = default_connection->tether_iface.type;
1101         else
1102                 stat_key.iftype = default_connection->type;
1103
1104         if (STC_IFACE_DATACALL == stat_key.iftype)
1105                 stat_key.subscriber_id = g_strdup(default_connection->subscriber_id);
1106         else
1107                 stat_key.subscriber_id = g_strdup("none_subid"); //LCOV_EXCL_LINE
1108
1109         if (app_value->classid == STC_TETHERING_APP_CLASSID &&
1110                 default_connection->tether_state == TRUE)
1111                 g_strlcpy(stat_key.ifname, default_connection->tether_iface.ifname,
1112                           MAX_IFACE_LENGTH);
1113         else
1114                 g_strlcpy(stat_key.ifname, default_connection->ifname,
1115                           MAX_IFACE_LENGTH);
1116
1117         stat.app_id = g_strdup(app_key->app_id);
1118         stat.snd_count = app_value->counter.out_bytes;
1119         stat.rcv_count = app_value->counter.in_bytes;
1120         stat.is_roaming = default_connection->roaming;
1121
1122         if (strstr(stat.app_id, "_BACKGROUND")) {
1123                 stat.ground = STC_APP_STATE_BACKGROUND;
1124         } else {
1125                 if (strstr(stat.app_id, "TOTAL_"))
1126                         stat.ground = STC_APP_STATE_UNKNOWN;
1127                 else
1128                         stat.ground = STC_APP_STATE_FOREGROUND;
1129         }
1130
1131         table_statistics_insert(&stat_key, &stat, *touch_time);
1132
1133         app_value->counter.out_bytes = 0;
1134         app_value->counter.in_bytes = 0;
1135
1136         FREE(stat.app_id);
1137         FREE(stat_key.subscriber_id);
1138
1139         return FALSE;
1140 }
1141
1142 static gboolean __flush_apps_stats_to_database(gpointer user_data)
1143 {
1144         time_t current_time = 0;
1145         stc_s *stc = stc_get_manager();
1146
1147         if (stc && stc->carg)
1148                 current_time = stc->carg->last_run_time;
1149
1150         if (g_system->apps_tree_updated == FALSE)
1151                 return G_SOURCE_REMOVE;
1152
1153         g_system->apps_tree_updated = FALSE;
1154
1155         if (g_system->apps)
1156                 g_tree_foreach(g_system->apps,
1157                                __update_app_statistics,
1158                                &current_time);
1159
1160         STC_LOGI("Flushed app stats to database");
1161         return G_SOURCE_REMOVE;
1162 }
1163
1164 //LCOV_EXCL_START
1165 static gboolean __update_counter_statistics(gpointer key, gpointer value,
1166                                             gpointer data)
1167 {
1168         stc_rstn_value_s *rstn_value = (stc_rstn_value_s *)value;
1169         table_counters_info info = {
1170                 .restriction_id = rstn_value->restriction_id,
1171                 .data_counter = rstn_value->counter[STC_RSTN_LIMIT_TYPE_DATA],
1172                 .warn_counter = rstn_value->counter[STC_RSTN_LIMIT_TYPE_DATA_WARN],
1173                 .monthly_counter = rstn_value->counter[STC_RSTN_LIMIT_TYPE_MONTHLY],
1174                 .weekly_counter = rstn_value->counter[STC_RSTN_LIMIT_TYPE_WEEKLY],
1175                 .daily_counter = rstn_value->counter[STC_RSTN_LIMIT_TYPE_DAILY]
1176         };
1177
1178         table_counters_update_counters(&info);
1179
1180         return FALSE;
1181 }
1182
1183 static gboolean __flush_rstns_counter_to_database(gpointer user_data)
1184 {
1185         time_t current_time = 0;
1186         stc_s *stc = stc_get_manager();
1187
1188         if (stc && stc->carg)
1189                 current_time = stc->carg->last_run_time;
1190
1191         if (g_system->rstns_tree_updated == FALSE)
1192                 return G_SOURCE_REMOVE;
1193
1194         g_system->rstns_tree_updated = FALSE;
1195
1196         if (g_system->rstns)
1197                 g_tree_foreach(g_system->rstns,
1198                                __update_counter_statistics,
1199                                &current_time);
1200
1201         STC_LOGI("Flushed rstns counters to database");
1202         return G_SOURCE_REMOVE;
1203 }
1204 //LCOV_EXCL_STOP
1205
1206 static void __app_counter_update(stc_app_key_s *app_key,
1207                                  stc_app_value_s *app_value,
1208                                  classid_bytes_context_s *context)
1209 {
1210         switch (context->counter->iotype) {
1211         case NFACCT_COUNTER_IN:
1212                 app_value->data_usage.in_bytes += context->bytes;
1213                 app_value->counter.in_bytes = context->bytes;
1214                 g_system->apps_tree_updated = TRUE;
1215
1216                 /*
1217                 __apps_tree_foreach_print(app_key, app_value, NULL); //LCOV_EXCL_LINE
1218                 */
1219                 break;
1220         case NFACCT_COUNTER_OUT:
1221                 app_value->data_usage.out_bytes += context->bytes;
1222                 app_value->counter.out_bytes = context->bytes;
1223                 g_system->apps_tree_updated = TRUE;
1224
1225                 /*
1226                 __apps_tree_foreach_print(app_key, app_value, NULL); //LCOV_EXCL_LINE
1227                 */
1228                 break;
1229         default:
1230                 STC_LOGE("unknown iotype"); //LCOV_EXCL_LINE
1231         }
1232 }
1233
1234 static void __interface_counter_update(stc_app_key_s *app_key,
1235                                        stc_app_value_s *app_value,
1236                                        classid_bytes_context_s *context)
1237 {
1238         if ((app_value->classid == STC_TOTAL_DATACALL_CLASSID &&
1239              context->counter->iftype == STC_IFACE_DATACALL) ||
1240             (app_value->classid == STC_TOTAL_WIFI_CLASSID &&
1241              context->counter->iftype == STC_IFACE_WIFI) ||
1242             (app_value->classid == STC_TOTAL_BLUETOOTH_CLASSID &&
1243              context->counter->iftype == STC_IFACE_BLUETOOTH) ||
1244                 (app_value->classid == STC_TETHERING_APP_CLASSID &&
1245                  context->counter->iftype == STC_IFACE_WIFI) ||
1246                 (app_value->classid == STC_TETHERING_APP_CLASSID &&
1247                  context->counter->iftype == STC_IFACE_BLUETOOTH) ||
1248                 (app_value->classid == STC_TETHERING_APP_CLASSID &&
1249                  context->counter->iftype == STC_IFACE_USB) ||
1250                 (app_value->classid == STC_TETHERING_APP_CLASSID &&
1251                  context->counter->iftype == STC_IFACE_P2P))
1252                  __app_counter_update(app_key, app_value, context);
1253 }
1254
1255
1256 static gboolean __apps_counter_update_foreach_classid(gpointer key,
1257                                                       gpointer value,
1258                                                       gpointer data)
1259 {
1260         stc_app_key_s *app_key = (stc_app_key_s *)key;
1261         stc_app_value_s *app_value = (stc_app_value_s *)value;
1262         classid_bytes_context_s *context = (classid_bytes_context_s *)data;
1263
1264         if (context->counter->intend != NFACCT_COUNTER)
1265                 goto try_next_callback;
1266
1267         __interface_counter_update(app_key, app_value, context);
1268
1269         if (app_value->classid != context->counter->classid)
1270                 goto try_next_callback;
1271
1272         __app_counter_update(app_key, app_value, context);
1273
1274 try_next_callback:
1275         return FALSE;
1276 }
1277
1278 static gboolean __reset_time_counter_foreach_rstn(gpointer key,
1279                                                   gpointer value,
1280                                                   gpointer data)
1281 {
1282         stc_rstn_key_s *rstn_key = (stc_rstn_key_s *)key;
1283         stc_rstn_value_s *rstn_value = (stc_rstn_value_s *)value;
1284         reset_time_limits_context_s *context = (reset_time_limits_context_s *)data;
1285         int i;
1286         time_t now_month_start_ts;
1287
1288         if (rstn_value->month_start_date == 0) {
1289                 table_counters_info info;
1290                 memset(&info, 0, sizeof(table_counters_info));
1291                 table_counters_get_timestamps(rstn_value->restriction_id, &info);
1292
1293                 if (info.month_start_date == 0)
1294                         rstn_value->month_start_date = 1;
1295                 else
1296                         rstn_value->month_start_date = info.month_start_date;
1297                 rstn_value->month_start_ts = info.month_start_ts;
1298         }
1299
1300         now_month_start_ts =
1301                 stc_time_get_month_start(context->now,
1302                                          rstn_value->month_start_date);
1303
1304         if (rstn_value->month_start_ts != now_month_start_ts) {
1305                 rstn_value->month_start_ts = now_month_start_ts;
1306                 context->month_start_ts = now_month_start_ts;
1307                 context->is_updated |= (1 << STC_RSTN_LIMIT_TYPE_MONTHLY);
1308         }
1309
1310         if (context->is_updated) {
1311                 table_counters_info info;
1312                 memset(&info, 0, sizeof(table_counters_info));
1313
1314                 info.restriction_id = rstn_value->restriction_id;
1315                 info.month_start_date = rstn_value->month_start_date;
1316                 info.month_start_ts = rstn_value->month_start_ts;
1317                 info.week_start_ts = context->week_start_ts;
1318                 info.day_start_ts = context->day_start_ts;
1319
1320                 table_counters_update_timestamps(&info);
1321         }
1322
1323         for (i = STC_RSTN_LIMIT_TYPE_MONTHLY; i < STC_RSTN_LIMIT_TYPE_MAX; i++) {
1324
1325                 if ((context->is_updated) & (1 << i)) {
1326                         /* reset limit */
1327                         rstn_value->counter[i] = 0;
1328
1329                         if (rstn_value->limit_exceeded & (1 << i)) {
1330                                 /* remove iptables rule */
1331                                 char *default_ifname = stc_default_connection_get_ifname();
1332                                 struct nfacct_rule counter;
1333                                 stc_s *stc = stc_get_manager();
1334                                 if (stc == NULL) {
1335                                         STC_LOGE("Can't get stc data");
1336                                         g_free(default_ifname);
1337                                         goto try_next_callback;
1338                                 }
1339
1340                                 if (!stc->carg) {
1341                                         stc->carg = MALLOC0(counter_arg_s, 1);
1342                                         if (stc->carg == NULL) {
1343                                                 g_free(default_ifname);
1344                                                 goto try_next_callback;
1345                                         }
1346
1347                                         stc->carg->sock =
1348                                                 stc_monitor_get_counter_socket();
1349                                 }
1350
1351                                 counter.carg = stc->carg;
1352                                 counter.classid = rstn_value->classid;
1353                                 counter.intend = NFACCT_BLOCK;
1354                                 counter.iftype = rstn_key->iftype;
1355                                 g_strlcpy(counter.ifname, default_ifname,
1356                                           MAX_IFACE_LENGTH);
1357
1358                                 g_free(default_ifname);
1359
1360                                 /* iptables rule */
1361                                 __del_iptables_in(&counter);
1362                                 __del_iptables_out(&counter);
1363
1364                                 /* ip6tables rule */
1365                                 __del_ip6tables_in(&counter);
1366                                 __del_ip6tables_out(&counter);
1367
1368                                 rstn_value->rstn_state = STC_RSTN_STATE_DEACTIVATED;
1369                                 rstn_value->limit_exceeded &= ~(1 << i);
1370                                 rstn_value->limit_notified &= ~(1 << i);
1371                         }
1372                 }
1373         }
1374
1375 try_next_callback:
1376         return FALSE;
1377 }
1378
1379 static void __reset_time_counters_if_required(void)
1380 {
1381         reset_time_limits_context_s context;
1382
1383         if (g_system == NULL) {
1384                 STC_LOGE("stc monitor not initialized!");
1385                 return;
1386         }
1387
1388         context.now = time(NULL);
1389         context.week_start_ts = stc_time_get_week_start(context.now);
1390         context.day_start_ts = stc_time_get_day_start(context.now);
1391         context.is_updated = 0;
1392
1393         if (g_system->last_week_ts != context.week_start_ts) {
1394                 g_system->last_week_ts = context.week_start_ts;
1395                 context.is_updated |= (1 << STC_RSTN_LIMIT_TYPE_WEEKLY);
1396         }
1397
1398         if (g_system->last_day_ts != context.day_start_ts) {
1399                 g_system->last_day_ts = context.day_start_ts;
1400                 context.is_updated |= (1 << STC_RSTN_LIMIT_TYPE_DAILY);
1401         }
1402
1403         if (g_system->rstns) {
1404                 g_tree_foreach(g_system->rstns,
1405                                __reset_time_counter_foreach_rstn,
1406                                &context);
1407                 if (context.is_updated)
1408                         STC_LOGD("Counter reset completed month_start [%ld], week_start [%ld], day_start [%ld]",
1409                                  context.month_start_ts, g_system->last_week_ts, g_system->last_day_ts);
1410         }
1411 }
1412
1413 static void __fill_nfacct_result(char *cnt_name, int64_t bytes,
1414                                  struct counter_arg *carg)
1415 {
1416         __reset_time_counters_if_required();
1417
1418         struct nfacct_rule counter = {
1419                 .carg = carg,
1420                 .name = {0},
1421                 .ifname = {0},
1422                 0
1423         };
1424
1425         classid_bytes_context_s context = {
1426                 .counter = &counter,
1427                 .bytes = bytes,
1428                 .data_limit_exceeded = FALSE,
1429         };
1430
1431         if (!recreate_counter_by_name(cnt_name, &counter)) {
1432                 STC_LOGE("Can't parse counter name %s", cnt_name); //LCOV_EXCL_LINE
1433                 return; //LCOV_EXCL_LINE
1434         }
1435
1436         if (STC_DEBUG_LOG)
1437                 STC_LOGI("classid %u, iftype %u, iotype %d, intend %d, ifname %s, bytes %lld",
1438                         context.counter->classid, context.counter->iftype,
1439                         context.counter->iotype, context.counter->intend,
1440                         context.counter->ifname, context.bytes);
1441
1442         if (g_system->rstns)
1443                 g_tree_foreach(g_system->rstns,
1444                                __rstn_counter_update_foreach_classid,
1445                                &context);
1446
1447         if (g_system->apps)
1448                 g_tree_foreach(g_system->apps,
1449                                __apps_counter_update_foreach_classid,
1450                                &context);
1451 }
1452
1453 static int __fill_counters(struct rtattr *attr_list[__NFACCT_MAX],
1454                            void *user_data)
1455 {
1456         struct counter_arg *carg = user_data;
1457         char *cnt_name = (char *)RTA_DATA(attr_list[NFACCT_NAME]);
1458         if (carg->initiate) {
1459                 /**
1460                  * TODO: this will be used when daemon starts to update existing
1461                  * counter data if present.
1462                  *
1463                  populate_counters(cnt_name, carg);
1464                  */
1465         } else {
1466                 int64_t *bytes_p =
1467                         (int64_t *)RTA_DATA(attr_list[NFACCT_BYTES]);
1468                 int bytes = be64toh(*bytes_p);
1469                 if (bytes) {
1470                         ++carg->serialized_counters;
1471                         __fill_nfacct_result(cnt_name, bytes, carg);
1472                 }
1473         }
1474
1475         return 0;
1476 }
1477
1478 static int __post_fill_counters(void *user_data)
1479 {
1480         struct counter_arg *carg = user_data;
1481
1482         if (carg->initiate)
1483                 carg->initiate = 0;
1484
1485         return 0;
1486 }
1487
1488 static void __process_network_counter(struct genl *ans,
1489                                       struct counter_arg *carg)
1490 {
1491         struct netlink_serialization_params ser_params = {
1492                 .carg = carg,
1493                 .ans = ans,
1494                 .eval_attr = __fill_counters,
1495                 .post_eval_attr = __post_fill_counters,
1496         };
1497
1498         netlink_serialization_command *netlink =
1499                 netlink_create_command(&ser_params);
1500         if (!netlink) {
1501                 STC_LOGE("Can not create command"); //LCOV_EXCL_LINE
1502                 return; //LCOV_EXCL_LINE
1503         }
1504
1505         netlink->deserialize_answer(&(netlink->params));
1506 }
1507
1508 static gboolean __process_contr_reply(GIOChannel *source,
1509                                       GIOCondition condition,
1510                                       gpointer user_data)
1511 {
1512         int sock = g_io_channel_unix_get_fd(source);
1513         struct genl *ans;
1514         int ret;
1515         stc_s *stc = stc_get_manager();
1516
1517 #ifdef TIZEN_GTESTS
1518         void __gcov_flush(void);
1519         __gcov_flush();
1520 #endif
1521
1522         if ((condition & G_IO_ERR) || (condition & G_IO_HUP) ||
1523             (condition & G_IO_NVAL)) {
1524                 /* G_IO_ERR/G_IO_HUP/G_IO_NVAL received */
1525
1526                 STC_LOGE("Counter socket received G_IO event, closing socket." //LCOV_EXCL_LINE
1527                          "G_IO_ERR [%u], G_IO_HUP [%u], G_IO_NVAL [%u]",
1528                          (condition & G_IO_ERR), (condition & G_IO_HUP),
1529                          (condition & G_IO_NVAL));
1530                 __close_and_reopen_contr_sock(g_system); //LCOV_EXCL_LINE
1531                 return FALSE; //LCOV_EXCL_LINE
1532         }
1533
1534         ans = MALLOC0(struct genl, 1);
1535         if (ans == NULL) {
1536                 STC_LOGE("Failed allocate memory to genl reply message"); //LCOV_EXCL_LINE
1537                 return TRUE; //LCOV_EXCL_LINE
1538         }
1539
1540         if (stc == NULL) {
1541                 STC_LOGE("Can't get stc data"); //LCOV_EXCL_LINE
1542                 goto out; //LCOV_EXCL_LINE
1543         }
1544
1545         ret = read_netlink(sock, ans, sizeof(struct genl));
1546         /* STC_LOGD("Counter data received ret [%d]", ret); */
1547         if (ret == 0)
1548                 goto out;
1549
1550         stc->carg->ans_len = ret;
1551         stc->carg->last_run_time = time(NULL);
1552
1553         __process_network_counter(ans, stc->carg);
1554
1555         g_idle_add(__flush_apps_stats_to_database, NULL);
1556         g_idle_add(__flush_rstns_counter_to_database, NULL);
1557 out:
1558
1559         FREE(ans);
1560         return TRUE;
1561 }
1562
1563 static gboolean __update_contr_cb(void *user_data)
1564 {
1565         /* Here we just sent command, answer we receive in another callback */
1566         stc_s *stc = stc_get_manager();
1567         ret_value_msg_if(stc == NULL, STC_ERROR_FAIL, "Can't get stc data");
1568         if (!stc->carg) {
1569                 stc->carg = MALLOC0(counter_arg_s, 1);
1570                 if (stc->carg == NULL)
1571                         return TRUE;  /* we need to continue the timer */
1572
1573                 stc->carg->sock = stc_monitor_get_counter_socket();
1574         }
1575
1576 #ifdef TIZEN_GTESTS
1577         void __gcov_flush(void);
1578         __gcov_flush();
1579 #endif
1580
1581         /* STC_LOGD("Get all counters"); */
1582         nfacct_send_get_all(stc->carg);
1583
1584         /* we need to continue the timer */
1585         return TRUE;
1586 }
1587
1588 /*
1589 //LCOV_EXCL_START
1590 static gboolean __rstn_tree_foreach_print(gpointer key, gpointer value,
1591                                           gpointer data)
1592 {
1593         stc_rstn_key_s *rstn_key = (stc_rstn_key_s *)key;
1594         stc_rstn_value_s *rstn_value = (stc_rstn_value_s *)value;
1595
1596         __print_rstn(rstn_key, rstn_value);
1597         return FALSE;
1598 }
1599
1600 static void __rstn_tree_printall(void)
1601 {
1602         g_tree_foreach(g_system->rstns, __rstn_tree_foreach_print, NULL);
1603 }
1604 //LCOV_EXCL_STOP
1605 */
1606
1607 static stc_rstn_value_s * __rstn_lookup(GTree *rstns_tree,
1608                                         const stc_rstn_key_s *key)
1609 {
1610         stc_rstn_value_s *lookup;
1611
1612         ret_value_msg_if(rstns_tree == NULL, NULL, "rstns_tree is null!");
1613
1614         lookup = g_tree_lookup(rstns_tree, key);
1615
1616         return lookup;
1617 }
1618
1619 static gboolean __remove_restriction(gpointer key, gpointer value,
1620                                      gpointer data)
1621 {
1622         stc_rstn_key_s *rstn_key = (stc_rstn_key_s *)key;
1623         stc_rstn_value_s *rstn_value = (stc_rstn_value_s *)value;
1624
1625         __process_restriction(RST_UNSET, rstn_key, rstn_value, data);
1626         __print_rstn(rstn_key, rstn_value);
1627         return FALSE;
1628 }
1629
1630 static gboolean __add_restriction_debug(gpointer key, gpointer value,
1631                                         gpointer data)
1632 {
1633         stc_rstn_key_s *rstn_key = (stc_rstn_key_s *)key;
1634         stc_rstn_value_s *rstn_value = (stc_rstn_value_s *)value;
1635
1636         /* rstn rule is activated */
1637         if (rstn_value->rstn_state == STC_RSTN_STATE_ACTIVATED)
1638                 return FALSE;
1639
1640         if (rstn_value->rstn_type == STC_RSTN_TYPE_ACCEPT)
1641                 __process_restriction(RST_EXCLUDE, rstn_key, rstn_value, data);
1642         else
1643                 __process_restriction(RST_SET, rstn_key, rstn_value, data);
1644
1645         __print_rstn(rstn_key, rstn_value);
1646
1647         return FALSE;
1648 }
1649
1650 //LCOV_EXCL_START
1651 static gboolean __add_restriction(gpointer key, gpointer value, gpointer data)
1652 {
1653         stc_rstn_key_s *rstn_key = (stc_rstn_key_s *)key;
1654         stc_rstn_value_s *rstn_value = (stc_rstn_value_s *)value;
1655
1656         /* rstn rule is activated */
1657         if (rstn_value->rstn_state == STC_RSTN_STATE_ACTIVATED)
1658                 return FALSE;
1659
1660         if (rstn_value->rstn_type == STC_RSTN_TYPE_ACCEPT)
1661                 __process_restriction(RST_EXCLUDE, rstn_key, rstn_value, data);
1662         else
1663                 __process_restriction(RST_SET, rstn_key, rstn_value, data);
1664
1665         return FALSE;
1666 }
1667 //LCOV_EXCL_STOP
1668
1669 static stc_error_e __rstn_tree_remove(stc_rstn_key_s *key)
1670 {
1671         stc_rstn_value_s *lookup_value;
1672
1673         ret_value_msg_if(g_system == NULL, STC_ERROR_FAIL, "stc monitor not initialized!");
1674
1675         lookup_value = __rstn_lookup(g_system->rstns, key);
1676         if (!lookup_value) {
1677                 STC_LOGE("key not found"); //LCOV_EXCL_LINE
1678                 return STC_ERROR_NO_DATA; //LCOV_EXCL_LINE
1679         }
1680
1681         /* remove counter also */
1682         table_counters_delete(lookup_value->restriction_id);
1683         __remove_restriction(key, lookup_value, NULL);
1684
1685         if (!g_tree_remove(g_system->rstns, key)) {
1686                 STC_LOGD("key not found"); //LCOV_EXCL_LINE
1687                 return STC_ERROR_NO_DATA; //LCOV_EXCL_LINE
1688         }
1689
1690         return STC_ERROR_NONE;
1691 }
1692
1693 static stc_error_e __rstn_tree_add(stc_rstn_key_s *key,
1694                                    stc_rstn_value_s *value, gboolean debug)
1695 {
1696         stc_rstn_key_s *rstn_key;
1697         stc_rstn_value_s *rstn_value;
1698
1699         ret_value_msg_if(g_system == NULL, STC_ERROR_FAIL, "stc monitor not initialized!");
1700
1701         rstn_value = __rstn_lookup(g_system->rstns, key);
1702         if (rstn_value)
1703                 __rstn_tree_remove(key);
1704
1705         rstn_key = MALLOC0(stc_rstn_key_s, 1);
1706         if (!rstn_key) {
1707                 STC_LOGE("rstn_key allocation failed"); //LCOV_EXCL_LINE
1708                 return STC_ERROR_OUT_OF_MEMORY; //LCOV_EXCL_LINE
1709         }
1710
1711         rstn_value = MALLOC0(stc_rstn_value_s, 1);
1712         if (!rstn_value) {
1713                 STC_LOGE("rstn_value allocation failed"); //LCOV_EXCL_LINE
1714                 FREE(rstn_key); //LCOV_EXCL_LINE
1715                 return STC_ERROR_OUT_OF_MEMORY; //LCOV_EXCL_LINE
1716         }
1717
1718         rstn_key->app_id = g_strdup(key->app_id);
1719         rstn_key->ifname = g_strdup(key->ifname);
1720         rstn_key->subscriber_id = g_strdup(key->subscriber_id);
1721         rstn_key->iftype = key->iftype;
1722         rstn_key->roaming = key->roaming;
1723
1724         g_tree_insert(g_system->rstns, rstn_key, rstn_value);
1725
1726         rstn_value->restriction_id = value->restriction_id;
1727         rstn_value->rstn_state = value->rstn_state;
1728         rstn_value->rstn_type = value->rstn_type;
1729         rstn_value->classid = value->classid;
1730
1731         int i;
1732         for (i = 0; i < STC_RSTN_LIMIT_TYPE_MAX; i++) {
1733                 rstn_value->limit[i] = value->limit[i];
1734                 rstn_value->counter[i] = 0;
1735         }
1736
1737         rstn_value->limit_exceeded = 0;
1738         rstn_value->limit_notified = 0;
1739         rstn_value->month_start_date = value->month_start_date;
1740         rstn_value->month_start_ts = value->month_start_ts;
1741
1742         if (debug == TRUE)
1743                 __add_restriction_debug(key, rstn_value, NULL);
1744         else
1745                 __add_restriction(key, rstn_value, NULL);
1746
1747         return STC_ERROR_NONE;
1748 }
1749
1750 //LCOV_EXCL_START
1751 static stc_cb_ret_e __insert_restriction_cb(const table_restrictions_info *info,
1752                                             void *user_data)
1753 {
1754         stc_cb_ret_e ret = STC_CONTINUE;
1755
1756         stc_rstn_key_s key;
1757         stc_rstn_value_s value;
1758
1759         memset(&key, 0, sizeof(stc_rstn_key_s));
1760         memset(&value, 0, sizeof(stc_rstn_value_s));
1761
1762         key.app_id = g_strdup(info->app_id);
1763         key.ifname = g_strdup(info->ifname);
1764         key.subscriber_id = g_strdup(info->subscriber_id);
1765         key.iftype = info->iftype;
1766         key.roaming = info->roaming;
1767
1768         value.rstn_type = info->rstn_type;
1769         value.rstn_state = STC_RSTN_STATE_UNKNOWN;
1770         value.restriction_id = info->restriction_id;
1771
1772         if (info->app_id)
1773                 value.classid = get_classid_by_app_id(info->app_id, TRUE);
1774         else
1775                 value.classid = STC_UNKNOWN_CLASSID;
1776
1777         value.limit[STC_RSTN_LIMIT_TYPE_DATA] = info->data_limit;
1778         value.limit[STC_RSTN_LIMIT_TYPE_DATA_WARN] = info->data_warn_limit;
1779         value.limit[STC_RSTN_LIMIT_TYPE_MONTHLY] = info->monthly_limit;
1780         value.limit[STC_RSTN_LIMIT_TYPE_WEEKLY] = info->weekly_limit;
1781         value.limit[STC_RSTN_LIMIT_TYPE_DAILY] = info->daily_limit;
1782
1783         if (__rstn_tree_add(&key, &value, FALSE) != STC_ERROR_NONE)
1784                 ret = STC_CANCEL;
1785
1786         FREE(key.app_id);
1787         FREE(key.ifname);
1788         FREE(key.subscriber_id);
1789         return ret;
1790 }
1791
1792 static void __fill_restritions_list(void)
1793 {
1794         table_restrictions_foreach(__insert_restriction_cb, NULL);
1795
1796         /* __rstn_tree_printall(); */
1797 }
1798
1799 static gboolean __add_rstn_foreach_application(gpointer key,
1800                                                gpointer value,
1801                                                gpointer data)
1802 {
1803         stc_rstn_key_s *rstn_key = (stc_rstn_key_s *)key;
1804         stc_rstn_value_s *rstn_value = (stc_rstn_value_s *)value;
1805         gchar *app_id = (gchar *)data;
1806
1807         /* rstn rule is not for applications */
1808         if (rstn_key->app_id == NULL)
1809                 goto out;
1810
1811         /* rstn rule is not for this application */
1812         if (g_strcmp0(rstn_key->app_id, app_id) != 0)
1813                 goto out;
1814
1815         /* rstn rule is already applied */
1816         if (rstn_value->rstn_state == STC_RSTN_STATE_ACTIVATED)
1817                 goto out;
1818
1819         /* add restriction to system */
1820         if (rstn_value->rstn_type == STC_RSTN_TYPE_ACCEPT)
1821                 __process_restriction(RST_EXCLUDE, rstn_key, rstn_value, NULL);
1822         else
1823                 __process_restriction(RST_SET, rstn_key, rstn_value, NULL);
1824
1825         __print_rstn(rstn_key, rstn_value);
1826 out:
1827         return FALSE;
1828 }
1829 //LCOV_EXCL_STOP
1830
1831 static void __add_rstns_for_application(gchar *app_id)
1832 {
1833         g_tree_foreach(g_system->rstns, __add_rstn_foreach_application,
1834                        app_id);
1835 }
1836
1837 static void __add_application_by_interface(const char *app_id)
1838 {
1839         stc_app_key_s app_key;
1840         stc_app_value_s app_value;
1841
1842         if (app_id == NULL)
1843                 return; //LCOV_EXCL_LINE
1844
1845         memset(&app_key, 0, sizeof(stc_app_key_s));
1846         memset(&app_value, 0, sizeof(stc_app_value_s));
1847
1848         app_key.pkg_id = g_strdup(app_id);
1849         app_key.app_id = g_strdup(app_id);
1850
1851         app_value.type = STC_APP_TYPE_NONE;
1852         app_value.processes = NULL;
1853         app_value.counter.in_bytes = 0;
1854         app_value.counter.out_bytes = 0;
1855
1856         stc_monitor_application_add(app_key, app_value);
1857
1858         FREE(app_key.pkg_id);
1859         FREE(app_key.app_id);
1860 }
1861
1862 static int __vconf_get_int(const char *key, int *value)
1863 {
1864         int ret = 0;
1865
1866         ret = vconf_get_int(key, value);
1867         if (ret != VCONF_OK) {
1868                 STC_LOGE("Failed to get vconfkey [%s] value", key); //LCOV_EXCL_LINE
1869                 return -1; //LCOV_EXCL_LINE
1870         }
1871
1872         return 0;
1873 }
1874
1875 //LCOV_EXCL_START
1876 static int __vconf_set_int(const char *key, int value)
1877 {
1878         int ret = 0;
1879
1880         ret = vconf_set_int(key, value);
1881         if (ret != VCONF_OK) {
1882                 STC_LOGE("Failed to set vconfkey [%s] value", key); //LCOV_EXCL_LINE
1883                 return -1; //LCOV_EXCL_LINE
1884         }
1885
1886         return 0;
1887 }
1888
1889 static guint __get_background_state(void)
1890 {
1891         return g_system->background_state;;
1892 }
1893
1894 static void __set_background_state(guint state)
1895 {
1896         g_system->background_state = state;
1897 }
1898
1899 static gboolean __processes_tree_foreach_background(gpointer key,
1900                                                     gpointer value,
1901                                                     gpointer data)
1902 {
1903         stc_process_key_s *proc_key = (stc_process_key_s *)key;
1904         stc_app_key_s *app_key = (stc_app_key_s *)data;
1905
1906         if (g_system->background_state)
1907                 place_pids_to_net_cgroup(proc_key->pid, STC_BACKGROUND_APP_ID);
1908         else
1909                 place_pids_to_net_cgroup(proc_key->pid, app_key->app_id);
1910
1911         return FALSE;
1912 }
1913
1914 static gboolean __apps_tree_foreach_background(gpointer key, gpointer value,
1915                                         gpointer data)
1916 {
1917         stc_app_key_s *app_key = (stc_app_key_s *)key;
1918         stc_app_value_s *app_value = (stc_app_value_s *)value;
1919
1920         if (strstr(app_key->app_id, STC_BACKGROUND_APP_SUFFIX))
1921                 g_tree_foreach(app_value->processes,
1922                                __processes_tree_foreach_background, app_key);
1923
1924         return FALSE;
1925 }
1926
1927 static stc_error_e __process_update_background(void)
1928 {
1929         ret_value_msg_if(g_system == NULL, STC_ERROR_FAIL, "stc monitor not initialized!");
1930
1931         g_tree_foreach(g_system->apps, __apps_tree_foreach_background, NULL);
1932
1933         return STC_ERROR_NONE;
1934 }
1935 //LCOV_EXCL_STOP
1936
1937 static void __fill_exceptions_list(void)
1938 {
1939         stc_plugin_fill_exception_list();
1940 }
1941
1942 stc_error_e stc_monitor_init(void)
1943 {
1944         stc_system_s *system = MALLOC0(stc_system_s, 1);
1945         GIOChannel *gio = NULL;
1946
1947         ret_value_msg_if(system == NULL, STC_ERROR_OUT_OF_MEMORY, "stc_system_s malloc fail!");
1948
1949         /* initializing current classid */
1950         init_current_classid();
1951
1952         /* initializing cgroups */
1953         cgroup_init();
1954
1955         /* creating monitored application tree */
1956         system->apps = g_tree_new_full(__apps_tree_key_compare, NULL,
1957                                        __apps_tree_key_free,
1958                                        __apps_tree_value_free);
1959
1960         system->rstns = g_tree_new_full(__rstns_tree_key_compare, NULL,
1961                                         __rstns_tree_key_free,
1962                                         __rstns_tree_value_free);
1963
1964         /* create netlink socket for updating kernel counters */
1965         system->contr_sock = create_netlink(NETLINK_NETFILTER, 0);
1966         if (system->contr_sock < 0) {
1967                 STC_LOGE("failed to open socket"); //LCOV_EXCL_LINE
1968                 FREE(system); //LCOV_EXCL_LINE
1969                 return STC_ERROR_FAIL; //LCOV_EXCL_LINE
1970         }
1971
1972         gio = g_io_channel_unix_new(system->contr_sock);
1973         system->contr_gsource_id =
1974                 g_io_add_watch(gio, G_IO_IN | G_IO_ERR | G_IO_HUP,
1975                                (GIOFunc) __process_contr_reply,
1976                                NULL);
1977         g_io_channel_unref(gio);
1978
1979         g_system = system;
1980
1981         __add_application_by_interface(STC_TOTAL_DATACALL);
1982         __add_application_by_interface(STC_TOTAL_WIFI);
1983         __add_application_by_interface(STC_TOTAL_BLUETOOTH);
1984         __add_application_by_interface(STC_TOTAL_IPV4);
1985         __add_application_by_interface(STC_TOTAL_IPV6);
1986         __add_application_by_interface(STC_TOTAL_TETHERING);
1987
1988         /* creating restriction rules tree */
1989         __update_contr_cb(NULL);
1990
1991         /* registering periodic kernel counters update callback */
1992         g_system->contr_timer_id = g_timeout_add_seconds(CONTR_TIMER_INTERVAL,
1993                                                          __update_contr_cb,
1994                                                          NULL);
1995         if (g_system->contr_timer_id == 0) {
1996                 STC_LOGE("Failed to register kernel counters update timer"); //LCOV_EXCL_LINE
1997                 __close_contr_sock(g_system); //LCOV_EXCL_LINE
1998                 return STC_ERROR_FAIL; //LCOV_EXCL_LINE
1999         }
2000
2001         __vconf_get_int(VCONFKEY_STC_BACKGROUND_STATE,
2002                         (int *)&g_system->background_state);
2003
2004         __fill_exceptions_list();
2005         __fill_restritions_list();
2006
2007         return STC_ERROR_NONE;
2008 }
2009
2010 stc_error_e stc_monitor_deinit(void)
2011 {
2012         ret_value_msg_if(g_system == NULL, STC_ERROR_FAIL, "stc monitor not initialized!");
2013
2014         /* close netlink socket for updating kernel counters */
2015         __close_contr_sock(g_system);
2016
2017         /* remove kernel counters update timer */
2018         if (g_system->contr_timer_id > 0) {
2019                 g_source_remove(g_system->contr_timer_id);
2020                 g_system->contr_timer_id = 0;
2021         }
2022
2023         /* destroy monitored application tree */
2024         g_tree_destroy(g_system->apps);
2025         g_system->apps = NULL;
2026
2027         /* destroy restriction rules tree */
2028         g_tree_destroy(g_system->rstns);
2029         g_system->rstns = NULL;
2030
2031         FREE(g_system);
2032
2033         return STC_ERROR_NONE;
2034 }
2035
2036 API stc_error_e stc_monitor_application_add(const stc_app_key_s app_key,
2037                                         const stc_app_value_s app_value)
2038 {
2039         stc_error_e ret = STC_ERROR_NONE;
2040         stc_app_key_s *key;
2041         stc_app_value_s *value;
2042         stc_app_value_s *lookup;
2043
2044         ret_value_msg_if(g_system == NULL, STC_ERROR_FAIL, "stc monitor not initialized!");
2045
2046         lookup = __application_lookup(g_system->apps, &app_key);
2047         if (lookup)
2048                 return STC_ERROR_NONE; //LCOV_EXCL_LINE
2049
2050         key = MALLOC0(stc_app_key_s, 1);
2051         if (!key) {
2052                 STC_LOGE("key allocation failed"); //LCOV_EXCL_LINE
2053                 return STC_ERROR_OUT_OF_MEMORY; //LCOV_EXCL_LINE
2054         }
2055
2056         value = MALLOC0(stc_app_value_s, 1);
2057         if (!value) {
2058                 STC_LOGE("value allocation failed"); //LCOV_EXCL_LINE
2059                 FREE(key); //LCOV_EXCL_LINE
2060                 return STC_ERROR_OUT_OF_MEMORY; //LCOV_EXCL_LINE
2061         }
2062
2063         key->app_id = g_strdup(app_key.app_id);
2064         key->pkg_id = g_strdup(app_key.pkg_id);
2065
2066         value->type = app_value.type;
2067         value->data_usage.in_bytes = app_value.data_usage.in_bytes;
2068         value->data_usage.out_bytes = app_value.data_usage.out_bytes;
2069
2070         value->processes = g_tree_new_full(__processes_tree_key_compare, NULL,
2071                                            __processes_tree_key_free,
2072                                            __processes_tree_value_free);
2073
2074         /* create cgroup and update classid */
2075         value->classid = get_classid_by_app_id(app_key.app_id, TRUE);
2076
2077         g_tree_insert(g_system->apps, key, value);
2078
2079         /* add nfacct rule for this classid */
2080         __add_application_monitor(key, value, stc_get_default_connection());
2081         __add_rstns_for_application(app_key.app_id);
2082
2083         return ret;
2084 }
2085
2086 API stc_error_e stc_monitor_process_add(const stc_app_key_s app_key,
2087                                     const stc_process_key_s proc_key,
2088                                     const stc_process_value_s proc_value)
2089 {
2090         stc_error_e ret = STC_ERROR_NONE;
2091         stc_app_value_s *app_lookup;
2092         stc_process_key_s *key;
2093         stc_process_value_s *value;
2094         stc_process_value_s *proc_lookup;
2095
2096         ret_value_msg_if(g_system == NULL, STC_ERROR_FAIL, "stc monitor not initialized!");
2097
2098         app_lookup = __application_lookup(g_system->apps, &app_key);
2099         if (!app_lookup) {
2100                 if (STC_DEBUG_LOG)
2101                         STC_LOGD("app_key not found"); //LCOV_EXCL_LINE
2102                 return STC_ERROR_FAIL; //LCOV_EXCL_LINE
2103         }
2104
2105         proc_lookup = __process_lookup(app_lookup->processes, &proc_key);
2106         if (proc_lookup)
2107                 return STC_ERROR_NONE; //LCOV_EXCL_LINE
2108
2109         key = MALLOC0(stc_process_key_s, 1);
2110         if (!key) {
2111                 STC_LOGE("key allocation failed"); //LCOV_EXCL_LINE
2112                 return STC_ERROR_OUT_OF_MEMORY; //LCOV_EXCL_LINE
2113         }
2114
2115         value = MALLOC0(stc_process_value_s, 1);
2116         if (!value) {
2117                 STC_LOGE("value allocation failed"); //LCOV_EXCL_LINE
2118                 FREE(key); //LCOV_EXCL_LINE
2119                 return STC_ERROR_OUT_OF_MEMORY; //LCOV_EXCL_LINE
2120         }
2121
2122         key->pid = proc_key.pid;
2123
2124         value->ground = proc_value.ground;
2125
2126         g_tree_insert(app_lookup->processes, key, value);
2127
2128         /* add pid to application cgroup */
2129         place_pids_to_net_cgroup(proc_key.pid, app_key.app_id);
2130
2131         /*
2132         __apps_tree_printall(); //LCOV_EXCL_LINE
2133         */
2134
2135         return ret;
2136 }
2137
2138 API stc_error_e stc_monitor_process_remove(pid_t pid)
2139 {
2140         stc_error_e ret = STC_ERROR_NONE;
2141         stc_process_key_s proc_key = {
2142                 .pid = pid
2143         };
2144
2145         remove_pid_context_s context = {
2146                 .app_key = NULL,
2147                 .proc_key = &proc_key,
2148                 .entry_removed = FALSE,
2149         };
2150
2151         ret_value_msg_if(g_system == NULL, STC_ERROR_FAIL, "stc monitor not initialized!");
2152
2153         g_tree_foreach(g_system->apps, __apps_tree_foreach_remove_pid,
2154                        &context);
2155
2156         if (context.entry_removed)
2157                 __application_remove_if_empty(context.app_key);
2158
2159         /*
2160         __apps_tree_printall(); //LCOV_EXCL_LINE
2161         */
2162
2163         return ret;
2164 }
2165
2166 //LCOV_EXCL_START
2167 API stc_error_e stc_monitor_process_update_ground(const stc_app_key_s app_key,
2168                                               const stc_process_key_s proc_key,
2169                                               stc_app_state_e ground)
2170 {
2171         stc_error_e ret = STC_ERROR_NONE;
2172         stc_app_value_s *app_lookup;
2173         stc_process_value_s *proc_lookup;
2174
2175         ret_value_msg_if(g_system == NULL, STC_ERROR_FAIL, "stc monitor not initialized!");
2176
2177         app_lookup = __application_lookup(g_system->apps, &app_key);
2178         if (!app_lookup) {
2179                 STC_LOGD("app_key not found");
2180                 return STC_ERROR_FAIL;
2181         }
2182
2183         proc_lookup = __process_lookup(app_lookup->processes, &proc_key);
2184         if (!proc_lookup) {
2185                 STC_LOGD("proc_key not found");
2186                 return STC_ERROR_FAIL;
2187         }
2188
2189         if (proc_lookup->ground != ground)
2190                 proc_lookup->ground = ground;
2191
2192         if (ground == STC_APP_STATE_BACKGROUND && __get_background_state())
2193                 place_pids_to_net_cgroup(proc_key.pid, STC_BACKGROUND_APP_ID);
2194         else
2195                 place_pids_to_net_cgroup(proc_key.pid, app_key.app_id);
2196
2197         return ret;
2198 }
2199 //LCOV_EXCL_STOP
2200
2201 void stc_monitor_update_rstn_by_default_connection(void *data)
2202 {
2203         static default_connection_s old_connection;
2204         default_connection_s *new_connection = (default_connection_s *)data;
2205
2206         if (old_connection.path != NULL) {
2207                 //LCOV_EXCL_START
2208                 if (g_system->apps)
2209                         g_tree_foreach(g_system->apps,
2210                                        __remove_application_monitor,
2211                                        (gpointer)&old_connection);
2212
2213                 if (g_system->rstns)
2214                         g_tree_foreach(g_system->rstns,
2215                                        __remove_restriction,
2216                                        (gpointer)&old_connection);
2217
2218                 iptables_flush_chains();
2219                 //LCOV_EXCL_STOP
2220         }
2221
2222         FREE(old_connection.path);
2223         FREE(old_connection.ifname);
2224         FREE(old_connection.tether_iface.ifname);
2225         old_connection.type = 0;
2226         old_connection.roaming = 0;
2227         old_connection.tether_state = FALSE;
2228         old_connection.tether_iface.type = 0;
2229
2230         if (new_connection != NULL && new_connection->path != NULL) {
2231                 if (g_system->apps)
2232                         g_tree_foreach(g_system->apps,
2233                                        __add_application_monitor,
2234                                        (gpointer)new_connection);
2235
2236                 if (g_system->rstns)
2237                         g_tree_foreach(g_system->rstns, __add_restriction,
2238                                        NULL);
2239
2240                 old_connection.path = g_strdup(new_connection->path);
2241                 old_connection.ifname = g_strdup(new_connection->ifname);
2242                 old_connection.tether_iface.ifname = g_strdup(new_connection->tether_iface.ifname);
2243                 old_connection.type = new_connection->type;
2244                 old_connection.roaming = new_connection->roaming;
2245                 old_connection.tether_state = new_connection->tether_state;
2246                 old_connection.tether_iface.type = new_connection->tether_iface.type;
2247         }
2248 }
2249
2250 stc_error_e stc_monitor_rstns_tree_add(const table_restrictions_info *info)
2251 {
2252         stc_error_e ret;
2253
2254         stc_rstn_key_s key;
2255         stc_rstn_value_s value;
2256
2257         memset(&key, 0, sizeof(stc_rstn_key_s));
2258         memset(&value, 0, sizeof(stc_rstn_value_s));
2259
2260         key.app_id = g_strdup(info->app_id);
2261         key.ifname = g_strdup(info->ifname);
2262         key.subscriber_id = g_strdup(info->subscriber_id);
2263         key.iftype = info->iftype;
2264         key.roaming = info->roaming;
2265
2266         value.rstn_type = info->rstn_type;
2267         value.rstn_state = STC_RSTN_STATE_UNKNOWN;
2268         value.restriction_id = info->restriction_id;
2269
2270         if (info->app_id)
2271                 value.classid = get_classid_by_app_id(info->app_id, TRUE);
2272         else
2273                 value.classid = STC_UNKNOWN_CLASSID;
2274
2275         if (value.classid == STC_BACKGROUND_APP_CLASSID) {
2276                 __set_background_state(TRUE); //LCOV_EXCL_LINE
2277                 __vconf_set_int(VCONFKEY_STC_BACKGROUND_STATE, g_system->background_state); //LCOV_EXCL_LINE
2278                 __process_update_background(); //LCOV_EXCL_LINE
2279         }
2280
2281         value.limit[STC_RSTN_LIMIT_TYPE_DATA] = info->data_limit;
2282         value.limit[STC_RSTN_LIMIT_TYPE_DATA_WARN] = info->data_warn_limit;
2283         value.limit[STC_RSTN_LIMIT_TYPE_MONTHLY] = info->monthly_limit;
2284         value.limit[STC_RSTN_LIMIT_TYPE_WEEKLY] = info->weekly_limit;
2285         value.limit[STC_RSTN_LIMIT_TYPE_DAILY] = info->daily_limit;
2286         value.month_start_date = info->month_start_date;
2287         value.month_start_ts = stc_time_get_month_start(time(NULL),
2288                                                                                 info->month_start_date);
2289
2290         ret = __rstn_tree_add(&key, &value, TRUE);
2291
2292         FREE(key.app_id);
2293         FREE(key.ifname);
2294         FREE(key.subscriber_id);
2295         return ret;
2296 }
2297
2298 stc_error_e stc_monitor_rstns_tree_remove(const table_restrictions_info *info)
2299 {
2300         stc_error_e ret;
2301
2302         stc_rstn_key_s key = {
2303                 .app_id = g_strdup(info->app_id),
2304                 .ifname = g_strdup(info->ifname),
2305                 .subscriber_id = g_strdup(info->subscriber_id),
2306                 .iftype = info->iftype,
2307                 .roaming = info->roaming,
2308         };
2309
2310         if (!strcmp(key.app_id, STC_BACKGROUND_APP_ID)) {
2311                 __set_background_state(FALSE); //LCOV_EXCL_LINE
2312                 __vconf_set_int(VCONFKEY_STC_BACKGROUND_STATE, g_system->background_state); //LCOV_EXCL_LINE
2313                 __process_update_background(); //LCOV_EXCL_LINE
2314         }
2315
2316         ret = __rstn_tree_remove(&key);
2317
2318         FREE(key.app_id);
2319         FREE(key.ifname);
2320         FREE(key.subscriber_id);
2321         return ret;
2322 }
2323
2324 API stc_error_e stc_monitor_check_excn_by_cmdline(char *cmdline)
2325 {
2326         return stc_plugin_check_exception_by_cmdline(cmdline);
2327 }
2328
2329 int stc_monitor_get_counter_socket(void)
2330 {
2331         return g_system->contr_sock;
2332 }