Magisk/native/jni/magiskpolicy/statement.cpp

324 lines
8.7 KiB
C++
Raw Normal View History

2019-12-09 04:14:30 -05:00
#include <cstring>
#include <vector>
#include <string>
2020-03-09 01:50:30 -07:00
#include <magiskpolicy.hpp>
#include <logging.hpp>
#include <utils.hpp>
2019-12-09 04:14:30 -05:00
2020-05-23 00:18:25 -07:00
#include "sepolicy.hpp"
2020-05-21 06:48:02 -07:00
2019-12-09 04:14:30 -05:00
using namespace std;
static const char *type_msg_1 =
R"EOF("allow *source_type *target_type *class *perm_set"
"deny *source_type *target_type *class *perm_set"
"auditallow *source_type *target_type *class *perm_set"
"dontaudit *source_type *target_type *class *perm_set"
2019-12-09 04:14:30 -05:00
)EOF";
static const char *type_msg_2 =
R"EOF("allowxperm *source_type *target_type *class operation xperm_set"
"auditallowxperm *source_type *target_type *class operation xperm_set"
"dontauditxperm *source_type *target_type *class operation xperm_set"
- The only supported operation is 'ioctl'
- xperm_set format is either 'low-high', 'value', or '*'.
'*' will be treated as '0x0000-0xFFFF'.
All values should be written in hexadecimal.
2019-12-09 04:14:30 -05:00
)EOF";
static const char *type_msg_3 =
R"EOF("permissive ^type"
"enforce ^type"
2019-12-09 04:14:30 -05:00
)EOF";
static const char *type_msg_4 =
R"EOF("typeattribute ^type ^attribute"
2019-12-09 04:14:30 -05:00
)EOF";
static const char *type_msg_5 =
R"EOF("type type_name ^(attribute)"
- Argument 'attribute' is optional, default to 'domain'
2019-12-09 04:14:30 -05:00
)EOF";
static const char *type_msg_6 =
R"EOF("attribute attribute_name"
2019-12-09 04:14:30 -05:00
)EOF";
static const char *type_msg_7 =
R"EOF("type_transition source_type target_type class default_type (object_name)"
- Argument 'object_name' is optional
)EOF";
static const char *type_msg_8 =
R"EOF("type_change source_type target_type class default_type"
"type_member source_type target_type class default_type"
)EOF";
static const char *type_msg_9 =
R"EOF("genfscon fs_name partial_path fs_context"
)EOF";
2019-12-09 04:14:30 -05:00
void statement_help() {
fprintf(stderr,
R"EOF(One policy statement should be treated as one parameter;
2020-05-21 06:48:02 -07:00
this means each policy statement should be enclosed in quotes.
2019-12-09 04:14:30 -05:00
Multiple policy statements can be provided in a single command.
2020-05-21 06:48:02 -07:00
Statements has a format of "<rule_name> [args...]".
Arguments labeled with (^) can accept one or more entries. Multiple
entries consist of a space separated list enclosed in braces ({}).
Arguments labeled with (*) are the same as (^), but additionally
support the match-all operator (*).
2020-05-21 06:48:02 -07:00
Example: "allow { s1 s2 } { t1 t2 } class *"
Will be expanded to:
allow s1 t1 class { all-permissions-of-class }
allow s1 t2 class { all-permissions-of-class }
allow s2 t1 class { all-permissions-of-class }
allow s2 t2 class { all-permissions-of-class }
2019-12-09 04:14:30 -05:00
Supported policy statements:
%s
%s
%s
%s
%s
%s
%s
%s
%s
)EOF", type_msg_1, type_msg_2, type_msg_3, type_msg_4,
type_msg_5, type_msg_6, type_msg_7, type_msg_8, type_msg_9);
2019-12-09 04:14:30 -05:00
exit(0);
}
using parsed_tokens = vector<vector<const char *>>;
static bool tokenize_string(char *stmt, parsed_tokens &arr) {
2020-05-21 06:48:02 -07:00
// cur is the pointer to where the top level is parsing
char *cur = stmt;
for (char *tok; (tok = strtok_r(nullptr, " ", &cur)) != nullptr;) {
vector<const char *> token;
2020-05-21 06:48:02 -07:00
if (tok[0] == '{') {
// cur could point to somewhere in the braces, restore the string
if (cur)
cur[-1] = ' ';
2020-05-21 06:48:02 -07:00
++tok;
char *end = strchr(tok, '}');
if (end == nullptr) {
// Bracket not closed, syntax error
return false;
}
*end = '\0';
for (char *sub_tok; (sub_tok = strtok_r(nullptr, " ", &tok)) != nullptr;)
token.push_back(sub_tok);
cur = end + 1;
} else if (tok[0] == '*') {
token.push_back(nullptr);
} else {
token.push_back(tok);
2019-12-09 04:14:30 -05:00
}
2020-05-21 06:48:02 -07:00
arr.push_back(std::move(token));
2019-12-09 04:14:30 -05:00
}
2020-05-21 06:48:02 -07:00
return true;
}
2019-12-09 04:14:30 -05:00
// Check array size and all args listed in 'ones' have size = 1 (no multiple entries)
template <int size, int ...ones>
static bool check_tokens(parsed_tokens &arr) {
if (arr.size() != size)
return false;
initializer_list<int> list{ones...};
for (int i : list)
if (arr[i].size() != 1)
return false;
return true;
}
template <int size, int ...ones>
static bool tokenize_and_check(char *stmt, parsed_tokens &arr) {
return tokenize_string(stmt, arr) && check_tokens<size, ones...>(arr);
}
template <typename Func, typename ...Args>
static void run_and_check(const Func &fn, const char *action, Args ...args) {
2020-05-24 04:16:40 -07:00
if (!fn(args...)) {
string s = "Error in: %s";
for (int i = 0; i < sizeof...(args); ++i) s += " %s";
s += "\n";
LOGW(s.data(), action, (args ? args : "*")...);
}
}
#define run_fn(...) run_and_check(fn, action, __VA_ARGS__)
// Pattern 1: allow { source } { target } { class } { permission }
2020-05-21 06:48:02 -07:00
template <typename Func>
static bool parse_pattern_1(const Func &fn, const char *action, char *stmt) {
parsed_tokens arr;
if (!tokenize_and_check<4>(stmt, arr))
2020-05-21 06:48:02 -07:00
return false;
for (auto src : arr[0])
for (auto tgt : arr[1])
for (auto cls : arr[2])
for (auto perm : arr[3])
run_fn(src, tgt, cls, perm);
2020-05-21 06:48:02 -07:00
return true;
2019-12-09 04:14:30 -05:00
}
// Pattern 2: allowxperm { source } { target } { class } ioctl range
2020-05-21 06:48:02 -07:00
template <typename Func>
static bool parse_pattern_2(const Func &fn, const char *action, char *stmt) {
parsed_tokens arr;
if (!tokenize_and_check<5, 3, 4>(stmt, arr) || arr[3][0] != "ioctl"sv)
2020-05-21 06:48:02 -07:00
return false;
auto range = arr[4][0];
for (auto src : arr[0])
for (auto tgt : arr[1])
for (auto cls : arr[2])
run_fn(src, tgt, cls, range);
2020-05-21 06:48:02 -07:00
return true;
2019-12-09 04:14:30 -05:00
}
// Pattern 3: permissive { type }
2020-05-21 06:48:02 -07:00
template <typename Func>
static bool parse_pattern_3(const Func &fn, const char *action, char *stmt) {
parsed_tokens arr;
if (!tokenize_and_check<1>(stmt, arr))
2020-05-21 06:48:02 -07:00
return false;
for (auto type : arr[0])
run_fn(type);
2020-05-21 06:48:02 -07:00
return true;
2019-12-09 04:14:30 -05:00
}
// Pattern 4: typeattribute { type } { attribute }
2020-05-21 06:48:02 -07:00
template <typename Func>
static bool parse_pattern_4(const Func &fn, const char *action, char *stmt) {
parsed_tokens arr;
if (!tokenize_and_check<2>(stmt, arr))
2020-05-21 06:48:02 -07:00
return false;
for (auto type : arr[0])
for (auto attr : arr[1])
run_fn(type, attr);
2020-05-21 06:48:02 -07:00
return true;
2019-12-09 04:14:30 -05:00
}
// Pattern 5: type name { attribute }
2020-05-21 06:48:02 -07:00
template <typename Func>
static bool parse_pattern_5(const Func &fn, const char *action, char *stmt) {
parsed_tokens arr;
string tmp_str;
if (!tokenize_string(stmt, arr))
2020-05-21 06:48:02 -07:00
return false;
if (arr.size() == 1) {
arr.emplace_back(initializer_list<const char*>{ "domain" });
}
if (!check_tokens<2, 0>(arr))
return false;
for (auto attr : arr[1])
run_fn(arr[0][0], attr);
2020-05-21 06:48:02 -07:00
return true;
2019-12-09 04:14:30 -05:00
}
// Pattern 6: attribute name
2020-05-21 06:48:02 -07:00
template <typename Func>
static bool parse_pattern_6(const Func &fn, const char *action, char *stmt) {
parsed_tokens arr;
if (!tokenize_and_check<1, 0>(stmt, arr))
return false;
run_fn(arr[0][1]);
return true;
}
// Pattern 7: type_transition source target class default (filename)
template <typename Func>
static bool parse_pattern_7(const Func &fn, const char *action, char *stmt) {
parsed_tokens arr;
2020-05-21 06:48:02 -07:00
if (!tokenize_string(stmt, arr))
return false;
if (arr.size() == 4)
arr.emplace_back(initializer_list<const char*>{nullptr});
if (!check_tokens<5, 0, 1, 2, 3, 4>(arr))
2020-05-21 06:48:02 -07:00
return false;
run_fn(arr[0][0], arr[1][0], arr[2][0], arr[3][0], arr[4][0]);
2020-05-21 06:48:02 -07:00
return true;
2019-12-09 04:14:30 -05:00
}
// Pattern 8: type_change source target class default
2020-05-21 06:48:02 -07:00
template <typename Func>
static bool parse_pattern_8(const Func &fn, const char *action, char *stmt) {
parsed_tokens arr;
if (!tokenize_and_check<4, 0, 1, 2, 3>(stmt, arr))
return false;
run_fn(arr[0][0], arr[1][0], arr[2][0], arr[3][0]);
return true;
}
// Pattern 9: genfscon name path context
template <typename Func>
static bool parse_pattern_9(const Func &fn, const char *action, char *stmt) {
parsed_tokens arr;
if (!tokenize_and_check<3, 0, 1, 2>(stmt, arr))
2020-05-21 06:48:02 -07:00
return false;
run_fn(arr[0][0], arr[1][0], arr[2][0]);
2020-05-21 06:48:02 -07:00
return true;
}
2020-05-21 06:48:02 -07:00
#define add_action_func(name, type, fn) \
2019-12-09 04:14:30 -05:00
else if (strcmp(name, action) == 0) { \
2020-05-21 06:48:02 -07:00
auto __fn = [=](auto && ...args){ return (fn)(args...); };\
if (!parse_pattern_##type(__fn, name, remain)) \
LOGW("Syntax error in '%s'\n\n%s\n", stmt, type_msg_##type); \
2019-12-09 04:14:30 -05:00
}
2020-05-21 06:48:02 -07:00
#define add_action(act, type) add_action_func(#act, type, act)
2019-12-09 04:14:30 -05:00
2020-05-21 06:48:02 -07:00
void sepolicy::parse_statement(const char *stmt) {
// strtok modify strings, create a copy
string cpy(stmt);
2019-12-09 04:14:30 -05:00
2020-05-21 06:48:02 -07:00
char *remain;
char *action = strtok_r(cpy.data(), " ", &remain);
2019-12-09 04:14:30 -05:00
if (remain == nullptr) {
2020-05-21 06:48:02 -07:00
LOGW("Syntax error in '%s'\n\n", stmt);
2019-12-09 04:14:30 -05:00
return;
}
if (0) {}
2020-05-21 06:48:02 -07:00
add_action(allow, 1)
add_action(deny, 1)
add_action(auditallow, 1)
add_action(dontaudit, 1)
add_action(allowxperm, 2)
add_action(auditallowxperm, 2)
add_action(dontauditxperm, 2)
add_action(permissive, 3)
add_action(enforce, 3)
add_action(typeattribute, 4)
add_action(type, 5)
add_action(attribute, 6)
add_action(type_transition, 7)
add_action(type_change, 8)
add_action(type_member, 8)
add_action(genfscon, 9)
2020-05-21 06:48:02 -07:00
// Backwards compatible syntax
add_action(create, 3)
2020-05-21 06:48:02 -07:00
add_action_func("attradd", 4, typeattribute)
add_action_func("name_transition", 7, type_transition)
2020-05-21 06:48:02 -07:00
else { LOGW("Unknown action: '%s'\n\n", action); }
2019-12-09 04:14:30 -05:00
}
2020-05-21 06:48:02 -07:00
void sepolicy::load_rule_file(const char *file) {
file_readline(true, file, [=](string_view line) -> bool {
2019-12-09 04:14:30 -05:00
if (line.empty() || line[0] == '#')
return true;
parse_statement(line.data());
return true;
2019-12-13 00:37:06 -05:00
});
2019-12-09 04:14:30 -05:00
}