Magisk/utils.c

71 lines
1.4 KiB
C
Raw Normal View History

2017-01-31 17:51:45 +01:00
#include "sepolicy-inject.h"
static void set_domain(char* s, int value) {
type_datum_t *type;
if (!exists(s))
create_domain(s);
type = hashtab_search(policy->p_types.table, s);
if (type == NULL) {
fprintf(stderr, "type %s does not exist\n", s);
return;
}
if (ebitmap_set_bit(&policy->permissive_map, type->s.value, value)) {
fprintf(stderr, "Could not set bit in permissive map\n");
return;
}
}
2017-02-03 18:58:15 +01:00
void vec_init(struct vector *v) {
v->size = 0;
v->cap = 1;
v->data = (char**) malloc(sizeof(char*));
}
void vec_push_back(struct vector *v, char* s) {
if (v == NULL) return;
if (v->size == v->cap) {
v->cap *= 2;
v->data = (char**) realloc(v->data, sizeof(char*) * v->cap);
}
v->data[v->size] = s;
++v->size;
}
void vec_destroy(struct vector *v) {
v->size = 0;
v->cap = 0;
free(v->data);
}
2017-01-31 17:51:45 +01:00
void allow(char *s, char *t, char *c, char *p) {
add_rule(s, t, c, p, AVTAB_ALLOWED, 0);
}
void deny(char *s, char *t, char *c, char *p) {
add_rule(s, t, c, p, AVTAB_ALLOWED, 1);
}
void auditallow(char *s, char *t, char *c, char *p) {
add_rule(s, t, c, p, AVTAB_AUDITALLOW, 0);
}
void auditdeny(char *s, char *t, char *c, char *p) {
add_rule(s, t, c, p, AVTAB_AUDITDENY, 0);
}
void permissive(char *s) {
set_domain(s, 1);
}
void enforce(char *s) {
set_domain(s, 0);
}
void attradd(char *s, char *a) {
2017-02-03 18:58:15 +01:00
add_typeattribute(s, a);
2017-01-31 17:51:45 +01:00
}
int exists(char* source) {
return !! hashtab_search(policy->p_types.table, source);
}