Commit Graph

199 Commits

Author SHA1 Message Date
Patrick Rohr
66452f566b bpf_headers: rename KernelVersion.h to KernelUtils.h
Test: TH
Change-Id: Ifacc159c19a8fcb64b571295b945fb9fca82496a
2023-05-17 11:43:02 -07:00
Maciej Żenczykowski
6b8144a07c Revert "Allow BpfMap to be accessed from NetworkStack"
This reverts commit fbe95d914c707c34d2c9d150a467d51c73414fcd.

Reason for revert: I've reconsidered.  This is a bad idea.
(and there are not yet any users)

The NetworkStack is an apk, not an apex, and as such it cannot
ship any bpf .o files (since that requires apex disk image format
instead of apk/jar zip file format).

There's no support for this (NetworkStack shipping bpf) in the
current tip-of-tree bpfloader.
As such there's no chance of this happening before V.
And even in V+ it is *super* unlikely, because... apk...
(We'd have to add apk zip traversal into the bpfloader...)

As such NetworkStack cannot possibly own any bpf programs/maps,
and could only potentially access platform/system bpf maps or
bpf maps owned by another module (ie. the Tethering apex).

Using any bpf maps from the system is not viable, as these
are owned by the platform, and as such may be modified by
vendors/oems.  Ie. their number, names, key/value layout, etc...
cannot be guaranteed.  As such using them from mainline
code is simply not safe.

Furthermore none of the platform bpfs are network related
(and indeed bpfloader enforces this).

As such this the only potential use of this would be
for NetworkStack to use Tethering apex bpf maps/programs.
However, this is also unsafe.

On older devices (pre-S) we don't even have support for
tethering apex shipped programs/maps.

On pre-T only the offload program is shipped, while
roughly equivalent netd.o maps/programs for the other
stuff are still provided by the platform.
(but the format of these cannot be relied upon)

As such use would have to be limited to T+.
(because the offload bpf map isn't interesting
to the network stack)

But on T+ we run into a cross-module versioning problem:
the source (and thus bpf map name/format/struct definitions)
used to build the NetworkStack apk and Tethering apex may differ.
Even modules shipped in tandem are build from separate release branches.  Additionally there's potential for only one module
to update, while the other remains older.  Thus making this
work cross-module would require freezing the map name & format.
ie. they would need to become cross-module API.
This is not something I'm willing to do.

Basically, this can be summarized as:
there is no *safe* way for NetworkStack apk to use bpf maps.

Test: TreeHugger
Bug: 276230058
Signed-off-by: Maciej Żenczykowski <maze@google.com>
Change-Id: I65ecf6ffca6ae88a1b72f6f4c8a5739991d78fe3
2023-05-04 10:18:46 +00:00
Junyu Lai
783a3b82ae Allow BpfMap to be accessed from NetworkStack
When loading BpfMap class, JNI part is needed for native
methods. Allow the static lib can be compiled with NetworkStack
JNI library.

Test: atest FrameworksNetTests:android.net.connectivity.com.android.server.BpfNetMapsTest
Bug: 276230058
Change-Id: I72ebe801dacd02de6711558d2058c1b756cf3080
2023-05-02 11:03:48 +00:00
Maciej Żenczykowski
bc89547ed3 Merge "Remove mentions of bploader versions between S and T" 2023-04-27 19:37:36 +00:00
Treehugger Robot
82b6bd25f3 Merge "Bump the default bpfloader version for platform code." 2023-04-27 19:17:59 +00:00
Maciej Żenczykowski
9ee26f72eb Remove mentions of bploader versions between S and T
(they're only of historical interest at this point)

Test: TreeHugger
Signed-off-by: Maciej Żenczykowski <maze@google.com>
Change-Id: I0e52efda62626091c3023c5fd3622ffcdcd00ee1
2023-04-26 23:17:07 +00:00
Maciej Żenczykowski
59934d185a Bump the default bpfloader version for platform code.
This is the default for BPFLOADER_MIN_VER if not otherwise specified.

This does not affect mainline code, see:
  cs/p:aosp-master file:packages/modules/Connectivity/bpf_progs define.*BPFLOADER_MIN_VER

Test: TreeHugger
Signed-off-by: Maciej Żenczykowski <maze@google.com>
Change-Id: Ice5b14c3b580653f8889a5292abaa89cf8434da1
2023-04-26 23:13:24 +00:00
Maciej Żenczykowski
1e697e5514 Added a new #define for U BpfLoader version
See http://cs/h/googleplex-android/platform/superproject/+/udc-dev:system/bpf/libbpf_android/Loader.cpp?l=40

Test: TreeHugger
Signed-off-by: Maciej Żenczykowski <maze@google.com>
Change-Id: If0d75a30f8432f62a1c56aef12efba644fb458d6
2023-04-26 23:06:38 +00:00
Gopal Krishna Shukla
2632888a10 bpf_headers: add bpf_probe_read_user
Change-Id: I2b106cf8e34ec97f1efa2dd735b70aab8e4e1b4e
2023-04-15 00:58:34 +05:30
Maciej Żenczykowski
fb914d8226 update comment about synchronizeKernelRCU() still working
Since it just came up again, and I just verified this still works

Test: N/A
Signed-off-by: Maciej Żenczykowski <maze@google.com>
Change-Id: I292c94cf9af63488ed30a6ac367ac83c8912e97e
2023-04-04 22:24:31 +00:00
Steven Moreland
59e343367a bpf_headers: add bpf_probe_read_user_str
Bug: 269407130
Test: N/A
Change-Id: I735bffefd41ea3edcafd846041f8c237e860ee6c
2023-03-29 00:12:36 +00:00
Maciej Żenczykowski
6ba8685aba minor checksum changes
main change is checksum of zero buffer is now 0 instead of
the equivalent, but technically incorrect 0xFFFF.

Test: TreeHugger
Bug: 265591307
Signed-off-by: Maciej Żenczykowski <maze@google.com>
Change-Id: I1a8b0ace704009f82d3b7ad1c299bf8a6d8964d8
2023-03-15 02:58:28 +00:00
Maciej Żenczykowski
aab04f1455 introduce BpfClassic.h
with helper macros for writing classic bpf code

Bug: 265591307
Test: TreeHugger
Signed-off-by: Maciej Żenczykowski <maze@google.com>
Change-Id: Ibffad51668303ddc5d6850409f9058dfc2894ef6
2023-03-10 23:46:42 +00:00
Maciej Żenczykowski
aa9063c3d5 improve getSocketCookie()
(and a few minor cleanups while at it)

Test: TreeHugger
Signed-off-by: Maciej Żenczykowski <maze@google.com>
Change-Id: I657c3314fb0ad2519dc4d1b0743e1be6a81a887a
2023-03-03 01:56:47 +00:00
Ryan Zuklie
2669e24058 Add BpfRingbuf class to wrap ringbuf access
This implements the bare minimum to read from BPF ring buffers in
userspace. The implementation uses two shared memory regions with
atomic-like access. Currently, the class only guarantees that the
element type has the same size (later can add btf support).

The alternative would be to use libbpf or bcc, but since this is a small
header-only library that seemed like it could end up being more
difficulty than it was worth.

Bug: 246985031
Test: atest libbpf_android_test
Change-Id: I7f08e76db9cb9672ef66c629bccb3db63d3c2229
2023-01-23 08:28:50 -08:00
Ryan Zuklie
be2ff67dae Add macro support for ignore_on BPF maps.
This is similar to https://r.android.com/2374598 for maps.

Bug: 246985031
Test: build connectivity module
Change-Id: Id4c9f93b69e808d461b4554bf3fa591828635dd1
2023-01-19 17:24:10 -08:00
Ryan Zuklie
888bd2de67 Update bpf helpers to support new ignore_on fields
This updates the ringbuffer and program helpers to allow specifying
which platform builds they are ignored on. In order to use this, you
must specify a min loader version >= 0.32, so the helpers also add
options for setting this at the program/ringbuf level.

Bug: 246985031
Test: tethering build & install, full platform build & install
Change-Id: I6bf9f7945c3fbac8fd4e02b5805016ac275b7884
2023-01-05 18:00:55 -08:00
Treehugger Robot
d2819de4d7 Merge "bpf_helpers.h: add load_byte/half/word() llvm/clang asm magic" 2023-01-04 12:17:22 +00:00
Maciej Żenczykowski
d6aa6218e3 Merge "Use the .o-wide bpfloader min/max ver for maps & programs too" 2023-01-04 10:28:51 +00:00
Maciej Żenczykowski
3114700eba bpf_helpers.h: add load_byte/half/word() llvm/clang asm magic
see kernel's
  samples/bpf/bpf_helpers.h
or
  tools/testing/selftests/bpf/bpf_legacy.h

Test: TreeHugger
Signed-off-by: Maciej Żenczykowski <maze@google.com>
Change-Id: Id331fb9abcd87df8bf87c5a86749acf0144ffbde
2022-12-27 12:31:27 +00:00
Maciej Żenczykowski
ff998720b6 Use the .o-wide bpfloader min/max ver for maps & programs too
This is basically a no-op, but will make future compatibility checks easier.

The programs/maps already won't load on a bpfloader outside of
this range, as the entire .o will be skipped.

Test: TreeHugger
Signed-off-by: Maciej Żenczykowski <maze@google.com>
Change-Id: I0669c7ff9e04e24a8da68aa821c9ad705a8f5a93
2022-12-27 12:07:03 +00:00
Maciej Żenczykowski
d7d3b03e13 dedup kernelversion.h
Test: TreeHugger
Signed-off-by: Maciej Żenczykowski <maze@google.com>
Change-Id: Ie7a4dd46122e86bf808d0a3ac566075e1c3a2cd4
2022-12-24 17:17:14 +00:00
Maciej Żenczykowski
32be06f45f verify java map key/value struct size matches file descriptor
(this should avoid kernel reading/writing from out of bounds)

Test: TreeHugger
Signed-off-by: Maciej Żenczykowski <maze@google.com>
Change-Id: I71fe71eee4e4e6a917477eef5fd2266439e803f3
2022-12-21 00:03:37 +00:00
Maciej Żenczykowski
cc40e9c110 Merge "remove spurious #include and OVERFLOW_COUNTERSET" 2022-12-20 12:13:43 +00:00
Maciej Żenczykowski
e504cc8754 Merge "Add option to skip map/prog based on build type" 2022-12-20 08:38:45 +00:00
Ryan Zuklie
8531cfe5dd Add option to skip map/prog based on build type
This feature allows skipping a program or map based on the type of the
build. This allows things like userdebug-only programs.

Bug: 246985031
Test: added test program and watched it skipped on userdebug
Change-Id: I5cd9725ad8f133c98c86e6ba620a266313055157
2022-12-19 14:08:53 -08:00
Maciej Żenczykowski
6776e3b02b remove spurious #include and OVERFLOW_COUNTERSET
Test: TreeHugger
Signed-off-by: Maciej Żenczykowski <maze@google.com>
Change-Id: I8ad1b19905509862bdfa4e710da778ed0effb058
2022-12-19 09:59:25 -08:00
Maciej Żenczykowski
ec6505edd6 remove SKIP_IF_BPF_NOT_SUPPORTED
There is only user left, let us simply move the macro
definition into the resolv_integration_test.cpp file.

Test: TreeHugger
Signed-off-by: Maciej Żenczykowski <maze@google.com>
Change-Id: I6eb66abaa7f6392ab43300e5087e4277491e44c9
2022-12-18 19:48:54 +00:00
Maciej Żenczykowski
d6ba77ab89 remove no longer needed SKIP_IF_EXTENDED_BPF_NOT_SUPPORTED macro
We can merge this now that:
  https://googleplex-android-review.git.corp.google.com/c/platform/system/netd/+/20284735
  'bpf_base_test - unconditionally run TestSocketFilterSetUp'
has been pulled into tm-mainline-prod.

Test: TreeHugger
Signed-off-by: Maciej Żenczykowski <maze@google.com>
Change-Id: I1b65cd41ce7b4eaab7f1fead2742c72e48294244
2022-12-18 16:37:32 +00:00
Maciej Żenczykowski
8da25a73a5 remove unused SKIP_IF_XDP_NOT_SUPPORTED macro
Test: TreeHugger
Signed-off-by: Maciej Żenczykowski <maze@google.com>
Change-Id: I2480cbe958d2827440e5dd827b43a89f4b7a556c
2022-12-18 11:11:21 +00:00
Maciej Żenczykowski
d8c03fec3a BpfSyscallWrapper - use 'enum bpf_cmd' instead of int for bpf() arg
Test: TreeHugger
Signed-off-by: Maciej Żenczykowski <maze@google.com>
Change-Id: I73d8d33e1677088fbbed02c554c88269912d2f76
2022-12-16 20:59:31 +00:00
Treehugger Robot
22d2158452 Merge "Add skeleton BPF ring buffer integration test" 2022-12-14 21:04:18 +00:00
Ryan Zuklie
ccd5eb9359 Add skeleton BPF ring buffer integration test
This adds a BPF program with a ring buffer and an associated test that
ensures the program and ring buffer can be loaded by the bpf loader. In
the following changes, this foundation will be used to test the user
space ring buffer wrapper class.

Unlike BpfMap, userspace can't (easily) write to the ring buffer so the
most accurate way to test a userspace ring buffer implementation is to
write to it from a BPF program.

Note: the BPF program in this change is never actually attached to a
cgroup, it is only loaded. The program will be executed manually using
BPF_PROG_RUN which is "side-effect free" (it can have side effects on
BPF maps, but not on Kernel state, e.g. dropping packets).

Bug: 246985031
Test: atest libbpf_android_test
Change-Id: Ib9c591218188f5f358a755c8854bc6f87d26af12
2022-12-12 10:02:18 -08:00
Maciej Żenczykowski
39f2501c50 Merge "updated TODO's for bpf_shared.h -> netd.h rename" 2022-12-10 10:26:54 +00:00
Ryan Zuklie
5a8738e7de Rename DEFINE_BPF_RINGBUF to DEFINE_BPF_RINGBUF_EXT
_EXT suffix is used for the all-args versions of these, such as the one
here.

Bug: 246985031
Test: build and flash on 4.19 and 5.10
Change-Id: Ibd76cbdc38f4d1f9df4f440147e5f18d9a2ea026
2022-12-08 17:18:54 -08:00
Maciej Żenczykowski
41abe75ba7 updated TODO's for bpf_shared.h -> netd.h rename
Test: TreeHugger
Signed-off: Maciej Żenczykowski <maze@google.com>
Change-Id: I44bb430f176161cafd6dfbd5e26e61dbe2a0183a
2022-12-08 16:40:28 +00:00
Ryan Zuklie
79ce874e8f Add macro to create BPF ring buffers.
BPF ring buffers are defined like maps, but cannot specify a key or
value size (attempting to do so is a verifier error). This change also
adds the type-safe methods for interacting with the map (output, reserve
and submit).

Bug: 246985031
Test: local run of Network Tracing w/ ring buffers
Change-Id: Ie8a47d987be6cb219fe7d73f2c61a56e3a3ab21a
2022-11-28 11:06:30 -08:00
Maciej Żenczykowski
91e4845301 Merge "Revert "add bpf_for_each_map_elem() helper definition"" 2022-11-07 23:36:35 +00:00
Maciej Żenczykowski
61e21fff0b Revert "add bpf_for_each_map_elem() helper definition"
This reverts commit 8711ae5494a3011f48543987fa08872d775df652.

Bug: 256991746
Test: TreeHugger
Signed-off-by: Maciej Żenczykowski <maze@google.com>
Change-Id: I4835904f906422d5927feef82459ce1adcebc90c
2022-11-02 08:39:20 +00:00
Maciej Żenczykowski
203d5e0dcd trivialize SKIP_IF_EXTENDED_BPF_NOT_SUPPORTED
Bug: 255652639
Test: TreeHugger
Signed-off-by: Maciej Żenczykowski <maze@google.com>
Change-Id: I3732bbd7ad9e4e06c914206560268bd1ce8204f4
2022-10-26 03:05:32 +00:00
Chris Sabotta
87e48d453e Merge "Bug: b/255652639" 2022-10-25 23:40:44 +00:00
Chris Sabotta
33f1f3f74c Bug: b/255652639
Revert "remove SKIP_IF_EXTENDED_BPF_NOT_SUPPORTED"

This reverts commit 319d8468ad90d33307ce764e7f6130587ce81419.

Reason for revert: Build breakage, (First bad build: 9217822)

Change-Id: I0db2bdb68006f9379bb149f7de9fa81ace501c3d
2022-10-25 23:38:32 +00:00
Maciej Żenczykowski
713c112d23 Merge "remove SKIP_IF_EXTENDED_BPF_NOT_SUPPORTED" 2022-10-25 22:10:11 +00:00
Maciej Żenczykowski
5897a805ea remove SKIP_IF_BPF_SUPPORTED
as this does not appear to be used anywhere anymore

Test: TreeHugger
Signed-off-by: Maciej Żenczykowski <maze@google.com>
Change-Id: I6905c6fdb4daf48df07e758481368d441637ad13
2022-10-25 09:27:08 +00:00
Maciej Żenczykowski
52605df5fd remove SKIP_IF_EXTENDED_BPF_NOT_SUPPORTED
as this does not appear to be used anywhere anymore

Test: TreeHugger
Signed-off-by: Maciej Żenczykowski <maze@google.com>
Change-Id: I95939b0b6c66f41f776ca31ea7178bb30241b81f
2022-10-25 09:24:59 +00:00
Maciej Żenczykowski
6f9830c342 Disallow pre-T use of userspace writable bpf map arrays with more than 1 element.
Bug: 254543135
Signed-off-by: Maciej Żenczykowski <maze@google.com>
Change-Id: I11ea5edaebf08f3492ad79f059afa98b50f80df3
2022-10-21 00:04:03 +00:00
Maciej Żenczykowski
dd3fe1d750 add DEFINE_BPF_MAP_RO for output maps which userspace should never modify
Bug: 254543135
Signed-off-by: Maciej Żenczykowski <maze@google.com>
Change-Id: I94c5e68e8941a264ea3671f75e3ad9c37ded8894
2022-10-20 04:06:37 +00:00
Maciej Żenczykowski
c5dcf2c8ea add bpf_for_each_map_elem() helper definition
See 5.12+ kernel's include/uapi/linux/bpf.h

(note that since bpf is 64-bit, int and long are the same thing)

Test: TreeHugger
Signed-off-by: Maciej Żenczykowski <maze@google.com>
Change-Id: Ib340a619645ad5ab8e41ff76cb7b51671f496bc5
2022-09-27 23:14:51 +00:00
Maciej Żenczykowski
af0ae6785f fix wrong bpf path
(also note the program in p/m/C netd.C is not optional or kernel version dependent)

Bug: 237030932
Test: TreeHugger
Signed-off-by: Maciej Żenczykowski <maze@google.com>
Change-Id: Ia984f6a1ce0ab14a204fe47ec295db1363879b7b
2022-08-10 18:22:40 +00:00
Maciej Żenczykowski
30a1808c1b Bump up BPFLOADER_MIN_VER for platform bpf.o's
Non platform ones (ie. shipped via mainline) already have
the value manually specified.

The goal here is to be able to do some bpf.o validity checking
in the bpfloader based on the bpfloader_min_ver.

Such validity checking really only makes sense for mainline
shipped bpf.o's which might need to load on older bpfloaders.

Hence we no longer want platform bpf.o's to have minver == 0.

Test: TreeHugger
Signed-off-by: Maciej Żenczykowski <maze@google.com>
Change-Id: I9e2f670c48e30818689a42bc515eb49e86f3cbea
2022-07-25 18:04:34 +00:00