blob: 22182154d5c7ce7c5b828ad70747e476405cb2d0 [file] [log] [blame]
Joel Fernandesd76a2002018-10-16 13:19:58 -07001/*
2 * Copyright (C) 2018 The Android Open Source Project
3 * Android BPF library - public API
4 *
5 * Licensed under the Apache License, Version 2.0 (the "License");
6 * you may not use this file except in compliance with the License.
7 * You may obtain a copy of the License at
8 *
9 * http://www.apache.org/licenses/LICENSE-2.0
10 *
11 * Unless required by applicable law or agreed to in writing, software
12 * distributed under the License is distributed on an "AS IS" BASIS,
13 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14 * See the License for the specific language governing permissions and
15 * limitations under the License.
16 */
17
Maciej Żenczykowski23c436f2021-01-21 14:24:15 -080018#pragma once
Joel Fernandesd76a2002018-10-16 13:19:58 -070019
20#include <libbpf.h>
21#include <linux/bpf.h>
22
23namespace android {
24namespace bpf {
Steven Moreland4891e612020-01-10 15:35:52 -080025
Maciej Żenczykowski41817132022-06-03 08:41:04 -070026// Bpf programs may specify per-program & per-map selinux_context and pin_subdir.
27//
28// The BpfLoader needs to convert these bpf.o specified strings into an enum
29// for internal use (to check that valid values were specified for the specific
30// location of the bpf.o file).
31//
32// It also needs to map selinux_context's into pin_subdir's.
33// This is because of how selinux_context is actually implemented via pin+rename.
34//
35// Thus 'domain' enumerates all selinux_context's/pin_subdir's that the BpfLoader
36// is aware of. Thus there currently needs to be a 1:1 mapping between the two.
37//
38enum class domain : int {
39 unrecognized = -1, // invalid for this version of the bpfloader
40 unspecified = 0, // means just use the default for that specific pin location
41 platform, // fs_bpf /sys/fs/bpf
42 tethering, // (S+) fs_bpf_tethering /sys/fs/bpf/tethering
43 net_private, // (T+) fs_bpf_net_private /sys/fs/bpf/net_private
44 net_shared, // (T+) fs_bpf_net_shared /sys/fs/bpf/net_shared
45 netd_readonly, // (T+) fs_bpf_netd_readonly /sys/fs/bpf/netd_readonly
46 netd_shared, // (T+) fs_bpf_netd_shared /sys/fs/bpf/netd_shared
47 vendor, // (T+) fs_bpf_vendor /sys/fs/bpf/vendor
48};
49
50// Note: this does not include domain::unrecognized, but does include domain::unspecified
51static constexpr domain AllDomains[] = {
52 domain::unspecified,
53 domain::platform,
54 domain::tethering,
55 domain::net_private,
56 domain::net_shared,
57 domain::netd_readonly,
58 domain::netd_shared,
59 domain::vendor,
60};
61
62static constexpr bool unrecognized(domain d) {
63 return d == domain::unrecognized;
64}
65
66// Note: this doesn't handle unrecognized, handle it first.
67static constexpr bool specified(domain d) {
68 return d != domain::unspecified;
69}
70
71static constexpr unsigned long long domainToBitmask(domain d) {
72 return specified(d) ? 1uLL << (static_cast<int>(d) - 1) : 0;
73}
74
75static constexpr bool inDomainBitmask(domain d, unsigned long long v) {
76 return domainToBitmask(d) & v;
77}
78
Joel Fernandesd76a2002018-10-16 13:19:58 -070079// BPF loader implementation. Loads an eBPF ELF object
Steven Moreland0f10f3f2019-12-12 14:22:34 -080080int loadProg(const char* elfPath, bool* isCritical, const char* prefix = "",
Maciej Żenczykowski41817132022-06-03 08:41:04 -070081 const unsigned long long allowedDomainBitmask = 0,
Steven Moreland0f10f3f2019-12-12 14:22:34 -080082 const bpf_prog_type* allowed = nullptr, size_t numAllowed = 0);
Steven Moreland4891e612020-01-10 15:35:52 -080083
Maciej Żenczykowski7ed94ef2021-07-06 01:47:15 -070084// Exposed for testing
85unsigned int readSectionUint(const char* name, std::ifstream& elfFile, unsigned int defVal);
86
Joel Fernandesd76a2002018-10-16 13:19:58 -070087} // namespace bpf
88} // namespace android