2019-12-09 09:14:30 +00:00
|
|
|
#include <cstring>
|
|
|
|
#include <vector>
|
|
|
|
#include <string>
|
|
|
|
|
2020-03-09 08:50:30 +00:00
|
|
|
#include <utils.hpp>
|
2019-12-09 09:14:30 +00:00
|
|
|
|
2022-03-30 05:26:38 +00:00
|
|
|
#include "policy.hpp"
|
2020-05-21 13:48:02 +00:00
|
|
|
|
2019-12-09 09:14:30 +00:00
|
|
|
using namespace std;
|
|
|
|
|
|
|
|
static const char *type_msg_1 =
|
2020-05-25 09:09:43 +00:00
|
|
|
R"EOF("allow *source_type *target_type *class *perm_set"
|
|
|
|
"deny *source_type *target_type *class *perm_set"
|
|
|
|
"auditallow *source_type *target_type *class *perm_set"
|
|
|
|
"dontaudit *source_type *target_type *class *perm_set"
|
2019-12-09 09:14:30 +00:00
|
|
|
)EOF";
|
|
|
|
|
|
|
|
static const char *type_msg_2 =
|
2020-05-25 09:09:43 +00:00
|
|
|
R"EOF("allowxperm *source_type *target_type *class operation xperm_set"
|
|
|
|
"auditallowxperm *source_type *target_type *class operation xperm_set"
|
|
|
|
"dontauditxperm *source_type *target_type *class operation xperm_set"
|
|
|
|
- The only supported operation is 'ioctl'
|
|
|
|
- xperm_set format is either 'low-high', 'value', or '*'.
|
|
|
|
'*' will be treated as '0x0000-0xFFFF'.
|
|
|
|
All values should be written in hexadecimal.
|
2019-12-09 09:14:30 +00:00
|
|
|
)EOF";
|
|
|
|
|
|
|
|
static const char *type_msg_3 =
|
2020-05-25 09:09:43 +00:00
|
|
|
R"EOF("permissive ^type"
|
|
|
|
"enforce ^type"
|
2019-12-09 09:14:30 +00:00
|
|
|
)EOF";
|
|
|
|
|
|
|
|
static const char *type_msg_4 =
|
2020-05-25 09:09:43 +00:00
|
|
|
R"EOF("typeattribute ^type ^attribute"
|
2019-12-09 09:14:30 +00:00
|
|
|
)EOF";
|
|
|
|
|
|
|
|
static const char *type_msg_5 =
|
2020-05-25 09:09:43 +00:00
|
|
|
R"EOF("type type_name ^(attribute)"
|
|
|
|
- Argument 'attribute' is optional, default to 'domain'
|
2019-12-09 09:14:30 +00:00
|
|
|
)EOF";
|
|
|
|
|
|
|
|
static const char *type_msg_6 =
|
2020-05-25 09:09:43 +00:00
|
|
|
R"EOF("attribute attribute_name"
|
2019-12-09 09:14:30 +00:00
|
|
|
)EOF";
|
|
|
|
|
2020-02-01 17:16:42 +00:00
|
|
|
static const char *type_msg_7 =
|
2020-05-25 09:09:43 +00:00
|
|
|
R"EOF("type_transition source_type target_type class default_type (object_name)"
|
|
|
|
- Argument 'object_name' is optional
|
|
|
|
)EOF";
|
|
|
|
|
|
|
|
static const char *type_msg_8 =
|
|
|
|
R"EOF("type_change source_type target_type class default_type"
|
|
|
|
"type_member source_type target_type class default_type"
|
|
|
|
)EOF";
|
|
|
|
|
|
|
|
static const char *type_msg_9 =
|
|
|
|
R"EOF("genfscon fs_name partial_path fs_context"
|
2020-02-01 17:16:42 +00:00
|
|
|
)EOF";
|
|
|
|
|
2019-12-09 09:14:30 +00:00
|
|
|
void statement_help() {
|
2020-12-31 06:11:24 +00:00
|
|
|
fprintf(stderr,
|
2019-12-09 09:14:30 +00:00
|
|
|
R"EOF(One policy statement should be treated as one parameter;
|
2020-05-21 13:48:02 +00:00
|
|
|
this means each policy statement should be enclosed in quotes.
|
2019-12-09 09:14:30 +00:00
|
|
|
Multiple policy statements can be provided in a single command.
|
|
|
|
|
2020-05-21 13:48:02 +00:00
|
|
|
Statements has a format of "<rule_name> [args...]".
|
|
|
|
Arguments labeled with (^) can accept one or more entries. Multiple
|
|
|
|
entries consist of a space separated list enclosed in braces ({}).
|
2020-05-25 09:09:43 +00:00
|
|
|
Arguments labeled with (*) are the same as (^), but additionally
|
|
|
|
support the match-all operator (*).
|
2020-05-21 13:48:02 +00:00
|
|
|
|
|
|
|
Example: "allow { s1 s2 } { t1 t2 } class *"
|
|
|
|
Will be expanded to:
|
|
|
|
|
|
|
|
allow s1 t1 class { all-permissions-of-class }
|
|
|
|
allow s1 t2 class { all-permissions-of-class }
|
|
|
|
allow s2 t1 class { all-permissions-of-class }
|
|
|
|
allow s2 t2 class { all-permissions-of-class }
|
2019-12-09 09:14:30 +00:00
|
|
|
|
|
|
|
Supported policy statements:
|
|
|
|
|
|
|
|
%s
|
|
|
|
%s
|
|
|
|
%s
|
|
|
|
%s
|
|
|
|
%s
|
|
|
|
%s
|
2020-02-01 17:16:42 +00:00
|
|
|
%s
|
2020-05-25 09:09:43 +00:00
|
|
|
%s
|
|
|
|
%s
|
|
|
|
)EOF", type_msg_1, type_msg_2, type_msg_3, type_msg_4,
|
|
|
|
type_msg_5, type_msg_6, type_msg_7, type_msg_8, type_msg_9);
|
2020-12-31 06:11:24 +00:00
|
|
|
exit(0);
|
2019-12-09 09:14:30 +00:00
|
|
|
}
|
|
|
|
|
2020-05-25 09:09:43 +00:00
|
|
|
using parsed_tokens = vector<vector<const char *>>;
|
|
|
|
|
|
|
|
static bool tokenize_string(char *stmt, parsed_tokens &arr) {
|
2020-12-31 06:11:24 +00:00
|
|
|
// cur is the pointer to where the top level is parsing
|
|
|
|
char *cur = stmt;
|
|
|
|
for (char *tok; (tok = strtok_r(nullptr, " ", &cur)) != nullptr;) {
|
|
|
|
vector<const char *> token;
|
|
|
|
if (tok[0] == '{') {
|
|
|
|
// cur could point to somewhere in the braces, restore the string
|
|
|
|
if (cur)
|
|
|
|
cur[-1] = ' ';
|
|
|
|
++tok;
|
|
|
|
char *end = strchr(tok, '}');
|
|
|
|
if (end == nullptr) {
|
|
|
|
// Bracket not closed, syntax error
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
*end = '\0';
|
|
|
|
for (char *sub_tok; (sub_tok = strtok_r(nullptr, " ", &tok)) != nullptr;)
|
|
|
|
token.push_back(sub_tok);
|
|
|
|
cur = end + 1;
|
|
|
|
} else if (tok[0] == '*') {
|
|
|
|
token.push_back(nullptr);
|
|
|
|
} else {
|
|
|
|
token.push_back(tok);
|
|
|
|
}
|
|
|
|
arr.push_back(std::move(token));
|
|
|
|
}
|
|
|
|
return true;
|
2020-05-21 13:48:02 +00:00
|
|
|
}
|
2019-12-09 09:14:30 +00:00
|
|
|
|
2020-05-22 21:05:56 +00:00
|
|
|
// Check array size and all args listed in 'ones' have size = 1 (no multiple entries)
|
|
|
|
template <int size, int ...ones>
|
2020-05-25 09:09:43 +00:00
|
|
|
static bool check_tokens(parsed_tokens &arr) {
|
2020-12-31 06:11:24 +00:00
|
|
|
if (arr.size() != size)
|
|
|
|
return false;
|
|
|
|
initializer_list<int> list{ones...};
|
|
|
|
for (int i : list)
|
|
|
|
if (arr[i].size() != 1)
|
|
|
|
return false;
|
|
|
|
return true;
|
2020-05-22 21:05:56 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
template <int size, int ...ones>
|
2020-05-25 09:09:43 +00:00
|
|
|
static bool tokenize_and_check(char *stmt, parsed_tokens &arr) {
|
2020-12-31 06:11:24 +00:00
|
|
|
return tokenize_string(stmt, arr) && check_tokens<size, ones...>(arr);
|
2020-05-22 21:05:56 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
template <typename Func, typename ...Args>
|
|
|
|
static void run_and_check(const Func &fn, const char *action, Args ...args) {
|
2020-12-31 06:11:24 +00:00
|
|
|
if (!fn(args...)) {
|
|
|
|
string s = "Error in: %s";
|
|
|
|
for (int i = 0; i < sizeof...(args); ++i) s += " %s";
|
|
|
|
s += "\n";
|
|
|
|
LOGW(s.data(), action, (args ? args : "*")...);
|
|
|
|
}
|
2020-05-22 21:05:56 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
#define run_fn(...) run_and_check(fn, action, __VA_ARGS__)
|
|
|
|
|
2020-05-25 09:09:43 +00:00
|
|
|
// Pattern 1: allow { source } { target } { class } { permission }
|
2020-05-21 13:48:02 +00:00
|
|
|
template <typename Func>
|
2020-05-22 21:05:56 +00:00
|
|
|
static bool parse_pattern_1(const Func &fn, const char *action, char *stmt) {
|
2020-12-31 06:11:24 +00:00
|
|
|
parsed_tokens arr;
|
|
|
|
if (!tokenize_and_check<4>(stmt, arr))
|
|
|
|
return false;
|
|
|
|
for (auto src : arr[0])
|
|
|
|
for (auto tgt : arr[1])
|
|
|
|
for (auto cls : arr[2])
|
|
|
|
for (auto perm : arr[3])
|
|
|
|
run_fn(src, tgt, cls, perm);
|
|
|
|
return true;
|
2019-12-09 09:14:30 +00:00
|
|
|
}
|
|
|
|
|
2020-05-25 09:09:43 +00:00
|
|
|
// Pattern 2: allowxperm { source } { target } { class } ioctl range
|
2020-05-21 13:48:02 +00:00
|
|
|
template <typename Func>
|
2020-05-22 21:05:56 +00:00
|
|
|
static bool parse_pattern_2(const Func &fn, const char *action, char *stmt) {
|
2020-12-31 06:11:24 +00:00
|
|
|
parsed_tokens arr;
|
|
|
|
if (!tokenize_and_check<5, 3, 4>(stmt, arr) || arr[3][0] != "ioctl"sv)
|
|
|
|
return false;
|
|
|
|
auto range = arr[4][0];
|
|
|
|
for (auto src : arr[0])
|
|
|
|
for (auto tgt : arr[1])
|
|
|
|
for (auto cls : arr[2])
|
|
|
|
run_fn(src, tgt, cls, range);
|
|
|
|
return true;
|
2019-12-09 09:14:30 +00:00
|
|
|
}
|
|
|
|
|
2020-05-25 09:09:43 +00:00
|
|
|
// Pattern 3: permissive { type }
|
2020-05-21 13:48:02 +00:00
|
|
|
template <typename Func>
|
2020-05-22 21:05:56 +00:00
|
|
|
static bool parse_pattern_3(const Func &fn, const char *action, char *stmt) {
|
2020-12-31 06:11:24 +00:00
|
|
|
parsed_tokens arr;
|
|
|
|
if (!tokenize_and_check<1>(stmt, arr))
|
|
|
|
return false;
|
|
|
|
for (auto type : arr[0])
|
|
|
|
run_fn(type);
|
|
|
|
return true;
|
2019-12-09 09:14:30 +00:00
|
|
|
}
|
|
|
|
|
2020-05-25 09:09:43 +00:00
|
|
|
// Pattern 4: typeattribute { type } { attribute }
|
2020-05-21 13:48:02 +00:00
|
|
|
template <typename Func>
|
2020-05-22 21:05:56 +00:00
|
|
|
static bool parse_pattern_4(const Func &fn, const char *action, char *stmt) {
|
2020-12-31 06:11:24 +00:00
|
|
|
parsed_tokens arr;
|
|
|
|
if (!tokenize_and_check<2>(stmt, arr))
|
|
|
|
return false;
|
|
|
|
for (auto type : arr[0])
|
|
|
|
for (auto attr : arr[1])
|
|
|
|
run_fn(type, attr);
|
|
|
|
return true;
|
2019-12-09 09:14:30 +00:00
|
|
|
}
|
|
|
|
|
2020-05-25 09:09:43 +00:00
|
|
|
// Pattern 5: type name { attribute }
|
2020-05-21 13:48:02 +00:00
|
|
|
template <typename Func>
|
2020-05-22 21:05:56 +00:00
|
|
|
static bool parse_pattern_5(const Func &fn, const char *action, char *stmt) {
|
2020-12-31 06:11:24 +00:00
|
|
|
parsed_tokens arr;
|
|
|
|
string tmp_str;
|
|
|
|
if (!tokenize_string(stmt, arr))
|
|
|
|
return false;
|
|
|
|
if (arr.size() == 1) {
|
|
|
|
arr.emplace_back(initializer_list<const char*>{ "domain" });
|
|
|
|
}
|
|
|
|
if (!check_tokens<2, 0>(arr))
|
|
|
|
return false;
|
|
|
|
for (auto attr : arr[1])
|
|
|
|
run_fn(arr[0][0], attr);
|
|
|
|
return true;
|
2019-12-09 09:14:30 +00:00
|
|
|
}
|
|
|
|
|
2020-05-25 09:09:43 +00:00
|
|
|
// Pattern 6: attribute name
|
2020-05-21 13:48:02 +00:00
|
|
|
template <typename Func>
|
2020-05-22 21:05:56 +00:00
|
|
|
static bool parse_pattern_6(const Func &fn, const char *action, char *stmt) {
|
2020-12-31 06:11:24 +00:00
|
|
|
parsed_tokens arr;
|
|
|
|
if (!tokenize_and_check<1, 0>(stmt, arr))
|
|
|
|
return false;
|
|
|
|
run_fn(arr[0][1]);
|
|
|
|
return true;
|
2020-05-25 09:09:43 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Pattern 7: type_transition source target class default (filename)
|
|
|
|
template <typename Func>
|
|
|
|
static bool parse_pattern_7(const Func &fn, const char *action, char *stmt) {
|
2020-12-31 06:11:24 +00:00
|
|
|
parsed_tokens arr;
|
|
|
|
if (!tokenize_string(stmt, arr))
|
|
|
|
return false;
|
|
|
|
if (arr.size() == 4)
|
|
|
|
arr.emplace_back(initializer_list<const char*>{nullptr});
|
|
|
|
if (!check_tokens<5, 0, 1, 2, 3, 4>(arr))
|
|
|
|
return false;
|
|
|
|
run_fn(arr[0][0], arr[1][0], arr[2][0], arr[3][0], arr[4][0]);
|
|
|
|
return true;
|
2019-12-09 09:14:30 +00:00
|
|
|
}
|
|
|
|
|
2020-05-25 09:09:43 +00:00
|
|
|
// Pattern 8: type_change source target class default
|
2020-05-21 13:48:02 +00:00
|
|
|
template <typename Func>
|
2020-05-25 09:09:43 +00:00
|
|
|
static bool parse_pattern_8(const Func &fn, const char *action, char *stmt) {
|
2020-12-31 06:11:24 +00:00
|
|
|
parsed_tokens arr;
|
|
|
|
if (!tokenize_and_check<4, 0, 1, 2, 3>(stmt, arr))
|
|
|
|
return false;
|
|
|
|
run_fn(arr[0][0], arr[1][0], arr[2][0], arr[3][0]);
|
|
|
|
return true;
|
2020-05-25 09:09:43 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Pattern 9: genfscon name path context
|
|
|
|
template <typename Func>
|
|
|
|
static bool parse_pattern_9(const Func &fn, const char *action, char *stmt) {
|
2020-12-31 06:11:24 +00:00
|
|
|
parsed_tokens arr;
|
|
|
|
if (!tokenize_and_check<3, 0, 1, 2>(stmt, arr))
|
|
|
|
return false;
|
|
|
|
run_fn(arr[0][0], arr[1][0], arr[2][0]);
|
|
|
|
return true;
|
2020-02-01 17:16:42 +00:00
|
|
|
}
|
|
|
|
|
2020-05-21 13:48:02 +00:00
|
|
|
#define add_action_func(name, type, fn) \
|
2019-12-09 09:14:30 +00:00
|
|
|
else if (strcmp(name, action) == 0) { \
|
2020-12-31 06:11:24 +00:00
|
|
|
auto __fn = [=](auto && ...args){ return (fn)(args...); };\
|
|
|
|
if (!parse_pattern_##type(__fn, name, remain)) \
|
|
|
|
LOGW("Syntax error in '%s'\n\n%s\n", stmt, type_msg_##type); \
|
2019-12-09 09:14:30 +00:00
|
|
|
}
|
|
|
|
|
2020-05-21 13:48:02 +00:00
|
|
|
#define add_action(act, type) add_action_func(#act, type, act)
|
2019-12-09 09:14:30 +00:00
|
|
|
|
2020-05-21 13:48:02 +00:00
|
|
|
void sepolicy::parse_statement(const char *stmt) {
|
2020-12-31 06:11:24 +00:00
|
|
|
// strtok modify strings, create a copy
|
|
|
|
string cpy(stmt);
|
|
|
|
|
|
|
|
char *remain;
|
|
|
|
char *action = strtok_r(cpy.data(), " ", &remain);
|
|
|
|
if (remain == nullptr) {
|
|
|
|
LOGW("Syntax error in '%s'\n\n", stmt);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (0) {}
|
|
|
|
add_action(allow, 1)
|
|
|
|
add_action(deny, 1)
|
|
|
|
add_action(auditallow, 1)
|
|
|
|
add_action(dontaudit, 1)
|
|
|
|
add_action(allowxperm, 2)
|
|
|
|
add_action(auditallowxperm, 2)
|
|
|
|
add_action(dontauditxperm, 2)
|
|
|
|
add_action(permissive, 3)
|
|
|
|
add_action(enforce, 3)
|
|
|
|
add_action(typeattribute, 4)
|
|
|
|
add_action(type, 5)
|
|
|
|
add_action(attribute, 6)
|
|
|
|
add_action(type_transition, 7)
|
|
|
|
add_action(type_change, 8)
|
|
|
|
add_action(type_member, 8)
|
|
|
|
add_action(genfscon, 9)
|
|
|
|
|
|
|
|
// Backwards compatible syntax
|
|
|
|
add_action(create, 3)
|
|
|
|
add_action_func("attradd", 4, typeattribute)
|
|
|
|
add_action_func("name_transition", 7, type_transition)
|
|
|
|
|
|
|
|
else { LOGW("Unknown action: '%s'\n\n", action); }
|
2019-12-09 09:14:30 +00:00
|
|
|
}
|
|
|
|
|
2020-05-21 13:48:02 +00:00
|
|
|
void sepolicy::load_rule_file(const char *file) {
|
Introduce new sepolicy injection mechanism
In the current implementation, Magisk will either have to recreate
all early mount implementation (for legacy SAR and rootfs devices) or
delegate early mount to first stage init (for 2SI devices) to access
required partitions for loading sepolicy. It then has to recreate the
split sepolicy loading implementation in-house, apply patches, then
dump the compiled + patched policies into monolithic format somewhere.
Finally, it patches the original init to force it to load the sepolicy
file we just created.
With the increasing complexity involved in early mount and split
sepolicy (there is even APEX module involved in the future!),
it is about time to rethink Magisk's sepolicy strategy as rebuilding
init's functionality is not scalable and easy to maintain.
In this commit, instead of building sepolicy ourselves, we mock
selinuxfs with FIFO files connected to a pre-init daemon, waiting
for the actual init process to directly write the sepolicy file into
MagiskInit. We then patch the file and load it into the kernel. Some
FIFO tricks has to be used to hijack the original init process's
control flow and prevent race conditions, details are directly in the
comments in code.
At the moment, only system-as-root (read-only root) support is added.
Support for legacy rootfs devices will come with a follow up commit.
2022-03-16 07:31:53 +00:00
|
|
|
file_readline(true, file, [&](string_view line) -> bool {
|
|
|
|
if (line.empty() || line[0] == '#')
|
|
|
|
return true;
|
|
|
|
parse_statement(line.data());
|
|
|
|
return true;
|
|
|
|
});
|
|
|
|
}
|
|
|
|
|
|
|
|
void sepolicy::load_rules(const string &rules) {
|
|
|
|
struct cookie {
|
|
|
|
const string &s;
|
|
|
|
size_t pos;
|
|
|
|
};
|
|
|
|
cookie c{rules, 0};
|
|
|
|
FILE *fp = funopen(&c, /* read */ [](void *v, char *buf, int sz) -> int {
|
|
|
|
auto c = reinterpret_cast<cookie*>(v);
|
|
|
|
if (c->pos == c->s.length())
|
|
|
|
return 0;
|
|
|
|
size_t end = std::min(c->pos + sz, c->s.length());
|
|
|
|
int len = end - c->pos;
|
|
|
|
memcpy(buf, c->s.data() + c->pos, len);
|
|
|
|
c->pos = end;
|
|
|
|
return len;
|
|
|
|
}, /* write */ [](auto, auto, auto) -> int {
|
|
|
|
return 0;
|
|
|
|
}, /* seek */ [](auto, auto, auto) -> fpos_t {
|
|
|
|
return 0;
|
|
|
|
}, /* close */ [](auto) -> int {
|
|
|
|
return 0;
|
|
|
|
});
|
|
|
|
|
|
|
|
file_readline(true, fp, [&](string_view line) -> bool {
|
2020-12-31 06:11:24 +00:00
|
|
|
if (line.empty() || line[0] == '#')
|
|
|
|
return true;
|
|
|
|
parse_statement(line.data());
|
|
|
|
return true;
|
|
|
|
});
|
2019-12-09 09:14:30 +00:00
|
|
|
}
|