blob: cc8a94243cf5e86029ef35e83ad443f5c50c917a [file] [log] [blame]
Maciej Żenczykowski60c159f2023-10-02 14:54:48 -07001/*
2 * Copyright (C) 2018 The Android Open Source Project
3 * Android BPF library - public API
4 *
5 * Licensed under the Apache License, Version 2.0 (the "License");
6 * you may not use this file except in compliance with the License.
7 * You may obtain a copy of the License at
8 *
9 * http://www.apache.org/licenses/LICENSE-2.0
10 *
11 * Unless required by applicable law or agreed to in writing, software
12 * distributed under the License is distributed on an "AS IS" BASIS,
13 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14 * See the License for the specific language governing permissions and
15 * limitations under the License.
16 */
17
18#pragma once
19
20#include <linux/bpf.h>
21
22#include <fstream>
23
24namespace android {
25namespace bpf {
26
27// Bpf programs may specify per-program & per-map selinux_context and pin_subdir.
28//
29// The BpfLoader needs to convert these bpf.o specified strings into an enum
30// for internal use (to check that valid values were specified for the specific
31// location of the bpf.o file).
32//
33// It also needs to map selinux_context's into pin_subdir's.
34// This is because of how selinux_context is actually implemented via pin+rename.
35//
36// Thus 'domain' enumerates all selinux_context's/pin_subdir's that the BpfLoader
37// is aware of. Thus there currently needs to be a 1:1 mapping between the two.
38//
39enum class domain : int {
40 unrecognized = -1, // invalid for this version of the bpfloader
41 unspecified = 0, // means just use the default for that specific pin location
42 platform, // fs_bpf /sys/fs/bpf
43 tethering, // (S+) fs_bpf_tethering /sys/fs/bpf/tethering
44 net_private, // (T+) fs_bpf_net_private /sys/fs/bpf/net_private
45 net_shared, // (T+) fs_bpf_net_shared /sys/fs/bpf/net_shared
46 netd_readonly, // (T+) fs_bpf_netd_readonly /sys/fs/bpf/netd_readonly
47 netd_shared, // (T+) fs_bpf_netd_shared /sys/fs/bpf/netd_shared
48 vendor, // (T+) fs_bpf_vendor /sys/fs/bpf/vendor
49 loader, // (U+) fs_bpf_loader /sys/fs/bpf/loader
50};
51
52// Note: this does not include domain::unrecognized, but does include domain::unspecified
53static constexpr domain AllDomains[] = {
54 domain::unspecified,
55 domain::platform,
56 domain::tethering,
57 domain::net_private,
58 domain::net_shared,
59 domain::netd_readonly,
60 domain::netd_shared,
61 domain::vendor,
62 domain::loader,
63};
64
65static constexpr bool unrecognized(domain d) {
66 return d == domain::unrecognized;
67}
68
69// Note: this doesn't handle unrecognized, handle it first.
70static constexpr bool specified(domain d) {
71 return d != domain::unspecified;
72}
73
74static constexpr unsigned long long domainToBitmask(domain d) {
75 return specified(d) ? 1uLL << (static_cast<int>(d) - 1) : 0;
76}
77
78static constexpr bool inDomainBitmask(domain d, unsigned long long v) {
79 return domainToBitmask(d) & v;
80}
81
82struct Location {
83 const char* const dir = "";
84 const char* const prefix = "";
85 unsigned long long allowedDomainBitmask = 0;
86 const bpf_prog_type* allowedProgTypes = nullptr;
87 size_t allowedProgTypesLength = 0;
88};
89
90// BPF loader implementation. Loads an eBPF ELF object
91int loadProg(const char* elfPath, bool* isCritical, const Location &location = {});
92
93// Exposed for testing
94unsigned int readSectionUint(const char* name, std::ifstream& elfFile, unsigned int defVal);
95
96// Returns the build type string (from ro.build.type).
97const std::string& getBuildType();
98
99// The following functions classify the 3 Android build types.
100inline bool isEng() {
101 return getBuildType() == "eng";
102}
103inline bool isUser() {
104 return getBuildType() == "user";
105}
106inline bool isUserdebug() {
107 return getBuildType() == "userdebug";
108}
109
110} // namespace bpf
111} // namespace android