blob: 9e2b4dfbabf07c412a025a3b0e46ef522dd7a585 [file] [log] [blame]
Maciej Żenczykowski60c159f2023-10-02 14:54:48 -07001/*
2 * Copyright (C) 2018 The Android Open Source Project
3 * Android BPF library - public API
4 *
5 * Licensed under the Apache License, Version 2.0 (the "License");
6 * you may not use this file except in compliance with the License.
7 * You may obtain a copy of the License at
8 *
9 * http://www.apache.org/licenses/LICENSE-2.0
10 *
11 * Unless required by applicable law or agreed to in writing, software
12 * distributed under the License is distributed on an "AS IS" BASIS,
13 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14 * See the License for the specific language governing permissions and
15 * limitations under the License.
16 */
17
18#pragma once
19
20#include <linux/bpf.h>
21
22#include <fstream>
23
24namespace android {
25namespace bpf {
26
27// Bpf programs may specify per-program & per-map selinux_context and pin_subdir.
28//
29// The BpfLoader needs to convert these bpf.o specified strings into an enum
30// for internal use (to check that valid values were specified for the specific
31// location of the bpf.o file).
32//
33// It also needs to map selinux_context's into pin_subdir's.
34// This is because of how selinux_context is actually implemented via pin+rename.
35//
36// Thus 'domain' enumerates all selinux_context's/pin_subdir's that the BpfLoader
37// is aware of. Thus there currently needs to be a 1:1 mapping between the two.
38//
39enum class domain : int {
40 unrecognized = -1, // invalid for this version of the bpfloader
41 unspecified = 0, // means just use the default for that specific pin location
Maciej Żenczykowski60c159f2023-10-02 14:54:48 -070042 tethering, // (S+) fs_bpf_tethering /sys/fs/bpf/tethering
43 net_private, // (T+) fs_bpf_net_private /sys/fs/bpf/net_private
44 net_shared, // (T+) fs_bpf_net_shared /sys/fs/bpf/net_shared
45 netd_readonly, // (T+) fs_bpf_netd_readonly /sys/fs/bpf/netd_readonly
46 netd_shared, // (T+) fs_bpf_netd_shared /sys/fs/bpf/netd_shared
Maciej Żenczykowski60c159f2023-10-02 14:54:48 -070047 loader, // (U+) fs_bpf_loader /sys/fs/bpf/loader
48};
49
50// Note: this does not include domain::unrecognized, but does include domain::unspecified
51static constexpr domain AllDomains[] = {
52 domain::unspecified,
Maciej Żenczykowski60c159f2023-10-02 14:54:48 -070053 domain::tethering,
54 domain::net_private,
55 domain::net_shared,
56 domain::netd_readonly,
57 domain::netd_shared,
Maciej Żenczykowski60c159f2023-10-02 14:54:48 -070058 domain::loader,
59};
60
61static constexpr bool unrecognized(domain d) {
62 return d == domain::unrecognized;
63}
64
65// Note: this doesn't handle unrecognized, handle it first.
66static constexpr bool specified(domain d) {
67 return d != domain::unspecified;
68}
69
70static constexpr unsigned long long domainToBitmask(domain d) {
71 return specified(d) ? 1uLL << (static_cast<int>(d) - 1) : 0;
72}
73
74static constexpr bool inDomainBitmask(domain d, unsigned long long v) {
75 return domainToBitmask(d) & v;
76}
77
78struct Location {
79 const char* const dir = "";
80 const char* const prefix = "";
81 unsigned long long allowedDomainBitmask = 0;
82 const bpf_prog_type* allowedProgTypes = nullptr;
83 size_t allowedProgTypesLength = 0;
84};
85
86// BPF loader implementation. Loads an eBPF ELF object
87int loadProg(const char* elfPath, bool* isCritical, const Location &location = {});
88
89// Exposed for testing
90unsigned int readSectionUint(const char* name, std::ifstream& elfFile, unsigned int defVal);
91
92// Returns the build type string (from ro.build.type).
93const std::string& getBuildType();
94
95// The following functions classify the 3 Android build types.
96inline bool isEng() {
97 return getBuildType() == "eng";
98}
99inline bool isUser() {
100 return getBuildType() == "user";
101}
102inline bool isUserdebug() {
103 return getBuildType() == "userdebug";
104}
105
106} // namespace bpf
107} // namespace android