blob: 6791523f6c03d88067c8568f350979802819b9cd [file] [log] [blame]
Maciej Żenczykowski60c159f2023-10-02 14:54:48 -07001/*
2 * Copyright (C) 2018 The Android Open Source Project
3 * Android BPF library - public API
4 *
5 * Licensed under the Apache License, Version 2.0 (the "License");
6 * you may not use this file except in compliance with the License.
7 * You may obtain a copy of the License at
8 *
9 * http://www.apache.org/licenses/LICENSE-2.0
10 *
11 * Unless required by applicable law or agreed to in writing, software
12 * distributed under the License is distributed on an "AS IS" BASIS,
13 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14 * See the License for the specific language governing permissions and
15 * limitations under the License.
16 */
17
18#pragma once
19
20#include <linux/bpf.h>
21
22#include <fstream>
23
24namespace android {
25namespace bpf {
26
27// Bpf programs may specify per-program & per-map selinux_context and pin_subdir.
28//
29// The BpfLoader needs to convert these bpf.o specified strings into an enum
30// for internal use (to check that valid values were specified for the specific
31// location of the bpf.o file).
32//
33// It also needs to map selinux_context's into pin_subdir's.
34// This is because of how selinux_context is actually implemented via pin+rename.
35//
36// Thus 'domain' enumerates all selinux_context's/pin_subdir's that the BpfLoader
37// is aware of. Thus there currently needs to be a 1:1 mapping between the two.
38//
39enum class domain : int {
40 unrecognized = -1, // invalid for this version of the bpfloader
41 unspecified = 0, // means just use the default for that specific pin location
Maciej Żenczykowski60c159f2023-10-02 14:54:48 -070042 tethering, // (S+) fs_bpf_tethering /sys/fs/bpf/tethering
43 net_private, // (T+) fs_bpf_net_private /sys/fs/bpf/net_private
44 net_shared, // (T+) fs_bpf_net_shared /sys/fs/bpf/net_shared
45 netd_readonly, // (T+) fs_bpf_netd_readonly /sys/fs/bpf/netd_readonly
46 netd_shared, // (T+) fs_bpf_netd_shared /sys/fs/bpf/netd_shared
47 vendor, // (T+) fs_bpf_vendor /sys/fs/bpf/vendor
48 loader, // (U+) fs_bpf_loader /sys/fs/bpf/loader
49};
50
51// Note: this does not include domain::unrecognized, but does include domain::unspecified
52static constexpr domain AllDomains[] = {
53 domain::unspecified,
Maciej Żenczykowski60c159f2023-10-02 14:54:48 -070054 domain::tethering,
55 domain::net_private,
56 domain::net_shared,
57 domain::netd_readonly,
58 domain::netd_shared,
59 domain::vendor,
60 domain::loader,
61};
62
63static constexpr bool unrecognized(domain d) {
64 return d == domain::unrecognized;
65}
66
67// Note: this doesn't handle unrecognized, handle it first.
68static constexpr bool specified(domain d) {
69 return d != domain::unspecified;
70}
71
72static constexpr unsigned long long domainToBitmask(domain d) {
73 return specified(d) ? 1uLL << (static_cast<int>(d) - 1) : 0;
74}
75
76static constexpr bool inDomainBitmask(domain d, unsigned long long v) {
77 return domainToBitmask(d) & v;
78}
79
80struct Location {
81 const char* const dir = "";
82 const char* const prefix = "";
83 unsigned long long allowedDomainBitmask = 0;
84 const bpf_prog_type* allowedProgTypes = nullptr;
85 size_t allowedProgTypesLength = 0;
86};
87
88// BPF loader implementation. Loads an eBPF ELF object
89int loadProg(const char* elfPath, bool* isCritical, const Location &location = {});
90
91// Exposed for testing
92unsigned int readSectionUint(const char* name, std::ifstream& elfFile, unsigned int defVal);
93
94// Returns the build type string (from ro.build.type).
95const std::string& getBuildType();
96
97// The following functions classify the 3 Android build types.
98inline bool isEng() {
99 return getBuildType() == "eng";
100}
101inline bool isUser() {
102 return getBuildType() == "user";
103}
104inline bool isUserdebug() {
105 return getBuildType() == "userdebug";
106}
107
108} // namespace bpf
109} // namespace android