| /* |
| * Copyright (C) 2018 The Android Open Source Project |
| * |
| * Licensed under the Apache License, Version 2.0 (the "License"); |
| * you may not use this file except in compliance with the License. |
| * You may obtain a copy of the License at |
| * |
| * http://www.apache.org/licenses/LICENSE-2.0 |
| * |
| * Unless required by applicable law or agreed to in writing, software |
| * distributed under the License is distributed on an "AS IS" BASIS, |
| * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| * See the License for the specific language governing permissions and |
| * limitations under the License. |
| */ |
| |
| #ifndef NETDBPF_BPF_SHARED_H |
| #define NETDBPF_BPF_SHARED_H |
| |
| #include <linux/in.h> |
| #include <linux/in6.h> |
| #include <netdutils/UidConstants.h> |
| // const values shared by bpf kernel program bpfloader and netd |
| |
| |
| // Since we cannot garbage collect the stats map since device boot, we need to make these maps as |
| // large as possible. The maximum size of number of map entries we can have is depend on the rlimit |
| // of MEM_LOCK granted to netd. The memory space needed by each map can be calculated by the |
| // following fomula: |
| // elem_size = 40 + roundup(key_size, 8) + roundup(value_size, 8) |
| // cost = roundup_pow_of_two(max_entries) * 16 + elem_size * max_entries + |
| // elem_size * number_of_CPU |
| // And the cost of each map currently used is(assume the device have 8 CPUs): |
| // cookie_tag_map: key: 8 bytes, value: 8 bytes, cost: 822592 bytes = 823Kbytes |
| // uid_counter_set_map: key: 4 bytes, value: 1 bytes, cost: 145216 bytes = 145Kbytes |
| // app_uid_stats_map: key: 4 bytes, value: 32 bytes, cost: 1062784 bytes = 1063Kbytes |
| // uid_stats_map: key: 16 bytes, value: 32 bytes, cost: 1142848 bytes = 1143Kbytes |
| // tag_stats_map: key: 16 bytes, value: 32 bytes, cost: 1142848 bytes = 1143Kbytes |
| // iface_index_name_map:key: 4 bytes, value: 16 bytes, cost: 80896 bytes = 81Kbytes |
| // iface_stats_map: key: 4 bytes, value: 32 bytes, cost: 97024 bytes = 97Kbytes |
| // dozable_uid_map: key: 4 bytes, value: 1 bytes, cost: 145216 bytes = 145Kbytes |
| // standby_uid_map: key: 4 bytes, value: 1 bytes, cost: 145216 bytes = 145Kbytes |
| // powersave_uid_map: key: 4 bytes, value: 1 bytes, cost: 145216 bytes = 145Kbytes |
| // total: 4930Kbytes |
| // It takes maximum 4.9MB kernel memory space if all maps are full, which requires any devices |
| // running this module to have a memlock rlimit to be larger then 5MB. In the old qtaguid module, |
| // we don't have a total limit for data entries but only have limitation of tags each uid can have. |
| // (default is 1024 in kernel); |
| |
| const int COOKIE_UID_MAP_SIZE = 10000; |
| const int UID_COUNTERSET_MAP_SIZE = 2000; |
| const int APP_STATS_MAP_SIZE = 10000; |
| const int STATS_MAP_SIZE = 5000; |
| const int IFACE_INDEX_NAME_MAP_SIZE = 1000; |
| const int IFACE_STATS_MAP_SIZE = 1000; |
| const int CONFIGURATION_MAP_SIZE = 2; |
| const int UID_OWNER_MAP_SIZE = 2000; |
| |
| #define BPF_PATH "/sys/fs/bpf" |
| |
| #define BPF_EGRESS_PROG_PATH BPF_PATH "/prog_netd_cgroupskb_egress_stats" |
| #define BPF_INGRESS_PROG_PATH BPF_PATH "/prog_netd_cgroupskb_ingress_stats" |
| #define XT_BPF_INGRESS_PROG_PATH BPF_PATH "/prog_netd_skfilter_ingress_xtbpf" |
| #define XT_BPF_EGRESS_PROG_PATH BPF_PATH "/prog_netd_skfilter_egress_xtbpf" |
| #define XT_BPF_WHITELIST_PROG_PATH BPF_PATH "/prog_netd_skfilter_whitelist_xtbpf" |
| #define XT_BPF_BLACKLIST_PROG_PATH BPF_PATH "/prog_netd_skfilter_blacklist_xtbpf" |
| #define CGROUP_SOCKET_PROG_PATH BPF_PATH "/prog_netd_cgroupsock_inet_create" |
| |
| #define COOKIE_TAG_MAP_PATH BPF_PATH "/map_netd_cookie_tag_map" |
| #define UID_COUNTERSET_MAP_PATH BPF_PATH "/map_netd_uid_counterset_map" |
| #define APP_UID_STATS_MAP_PATH BPF_PATH "/map_netd_app_uid_stats_map" |
| #define STATS_MAP_A_PATH BPF_PATH "/map_netd_stats_map_A" |
| #define STATS_MAP_B_PATH BPF_PATH "/map_netd_stats_map_B" |
| #define IFACE_INDEX_NAME_MAP_PATH BPF_PATH "/map_netd_iface_index_name_map" |
| #define IFACE_STATS_MAP_PATH BPF_PATH "/map_netd_iface_stats_map" |
| #define CONFIGURATION_MAP_PATH BPF_PATH "/map_netd_configuration_map" |
| #define UID_OWNER_MAP_PATH BPF_PATH "/map_netd_uid_owner_map" |
| #define UID_PERMISSION_MAP_PATH BPF_PATH "/map_netd_uid_permission_map" |
| |
| enum UidOwnerMatchType { |
| NO_MATCH = 0, |
| HAPPY_BOX_MATCH = (1 << 0), |
| PENALTY_BOX_MATCH = (1 << 1), |
| DOZABLE_MATCH = (1 << 2), |
| STANDBY_MATCH = (1 << 3), |
| POWERSAVE_MATCH = (1 << 4), |
| IIF_MATCH = (1 << 5), |
| }; |
| |
| enum BpfPemissionMatch { |
| BPF_PERMISSION_INTERNET = 1 << 2, |
| BPF_PERMISSION_UPDATE_DEVICE_STATS = 1 << 3, |
| }; |
| // In production we use two identical stats maps to record per uid stats and |
| // do swap and clean based on the configuration specified here. The statsMapType |
| // value in configuration map specified which map is currently in use. |
| enum StatsMapType { |
| SELECT_MAP_A, |
| SELECT_MAP_B, |
| }; |
| |
| // TODO: change the configuration object from an 8-bit bitmask to an object with clearer |
| // semantics, like a struct. |
| typedef uint8_t BpfConfig; |
| const BpfConfig DEFAULT_CONFIG = 0; |
| |
| struct UidOwnerValue { |
| // Allowed interface index. Only applicable if IIF_MATCH is set in the rule bitmask above. |
| uint32_t iif; |
| // A bitmask of enum values in UidOwnerMatchType. |
| uint8_t rule; |
| }; |
| |
| #define UID_RULES_CONFIGURATION_KEY 1 |
| #define CURRENT_STATS_MAP_CONFIGURATION_KEY 2 |
| |
| #define CLAT_INGRESS_PROG_RAWIP_NAME "prog_clatd_schedcls_ingress_clat_rawip" |
| #define CLAT_INGRESS_PROG_ETHER_NAME "prog_clatd_schedcls_ingress_clat_ether" |
| |
| #define CLAT_INGRESS_PROG_RAWIP_PATH BPF_PATH "/" CLAT_INGRESS_PROG_RAWIP_NAME |
| #define CLAT_INGRESS_PROG_ETHER_PATH BPF_PATH "/" CLAT_INGRESS_PROG_ETHER_NAME |
| |
| #define CLAT_INGRESS_MAP_PATH BPF_PATH "/map_clatd_clat_ingress_map" |
| |
| struct ClatIngressKey { |
| uint32_t iif; // The input interface index |
| struct in6_addr pfx96; // The source /96 nat64 prefix, bottom 32 bits must be 0 |
| struct in6_addr local6; // The full 128-bits of the destination IPv6 address |
| }; |
| |
| struct ClatIngressValue { |
| uint32_t oif; // The output interface to redirect to (0 means don't redirect) |
| struct in_addr local4; // The destination IPv4 address |
| }; |
| |
| #endif // NETDBPF_BPF_SHARED_H |