2019-03-15 11:17:37 +01:00
|
|
|
#include <sys/types.h>
|
|
|
|
#include <sys/stat.h>
|
|
|
|
#include <fcntl.h>
|
|
|
|
#include <unistd.h>
|
|
|
|
|
|
|
|
#include <cil/cil.h>
|
|
|
|
|
2020-03-09 09:50:30 +01:00
|
|
|
#include <utils.hpp>
|
|
|
|
#include <logging.hpp>
|
|
|
|
#include <stream.hpp>
|
|
|
|
#include <magiskpolicy.hpp>
|
2019-03-15 11:17:37 +01:00
|
|
|
|
2020-05-23 09:18:25 +02:00
|
|
|
#include "sepolicy.hpp"
|
2019-03-15 11:17:37 +01:00
|
|
|
|
|
|
|
#define SHALEN 64
|
|
|
|
static bool cmp_sha256(const char *a, const char *b) {
|
|
|
|
char id_a[SHALEN] = {0};
|
|
|
|
char id_b[SHALEN] = {0};
|
|
|
|
if (int fd = xopen(a, O_RDONLY | O_CLOEXEC); fd >= 0) {
|
|
|
|
xread(fd, id_a, SHALEN);
|
|
|
|
close(fd);
|
|
|
|
} else {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (int fd = xopen(b, O_RDONLY | O_CLOEXEC); fd >= 0) {
|
|
|
|
xread(fd, id_b, SHALEN);
|
|
|
|
close(fd);
|
|
|
|
} else {
|
|
|
|
return false;
|
|
|
|
}
|
2019-04-04 06:26:16 +02:00
|
|
|
LOGD("%s=[%.*s]\n", a, SHALEN, id_a);
|
|
|
|
LOGD("%s=[%.*s]\n", b, SHALEN, id_b);
|
2019-03-15 11:17:37 +01:00
|
|
|
return memcmp(id_a, id_b, SHALEN) == 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static bool check_precompiled(const char *precompiled) {
|
|
|
|
bool ok = false;
|
|
|
|
const char *actual_sha;
|
|
|
|
char compiled_sha[128];
|
|
|
|
|
|
|
|
actual_sha = PLAT_POLICY_DIR "plat_and_mapping_sepolicy.cil.sha256";
|
|
|
|
if (access(actual_sha, R_OK) == 0) {
|
|
|
|
ok = true;
|
|
|
|
sprintf(compiled_sha, "%s.plat_and_mapping.sha256", precompiled);
|
|
|
|
if (!cmp_sha256(actual_sha, compiled_sha))
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
actual_sha = PLAT_POLICY_DIR "plat_sepolicy_and_mapping.sha256";
|
|
|
|
if (access(actual_sha, R_OK) == 0) {
|
|
|
|
ok = true;
|
|
|
|
sprintf(compiled_sha, "%s.plat_sepolicy_and_mapping.sha256", precompiled);
|
|
|
|
if (!cmp_sha256(actual_sha, compiled_sha))
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
actual_sha = PROD_POLICY_DIR "product_sepolicy_and_mapping.sha256";
|
|
|
|
if (access(actual_sha, R_OK) == 0) {
|
|
|
|
ok = true;
|
|
|
|
sprintf(compiled_sha, "%s.product_sepolicy_and_mapping.sha256", precompiled);
|
|
|
|
if (!cmp_sha256(actual_sha, compiled_sha) != 0)
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2020-02-21 09:49:33 +01:00
|
|
|
actual_sha = SYSEXT_POLICY_DIR "system_ext_sepolicy_and_mapping.sha256";
|
|
|
|
if (access(actual_sha, R_OK) == 0) {
|
|
|
|
ok = true;
|
|
|
|
sprintf(compiled_sha, "%s.system_ext_sepolicy_and_mapping.sha256", precompiled);
|
|
|
|
if (!cmp_sha256(actual_sha, compiled_sha) != 0)
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2019-03-15 11:17:37 +01:00
|
|
|
return ok;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void load_cil(struct cil_db *db, const char *file) {
|
|
|
|
char *addr;
|
|
|
|
size_t size;
|
|
|
|
mmap_ro(file, addr, size);
|
|
|
|
cil_add_file(db, (char *) file, addr, size);
|
2019-12-13 12:05:12 +01:00
|
|
|
LOGD("cil_add [%s]\n", file);
|
2019-03-15 11:17:37 +01:00
|
|
|
munmap(addr, size);
|
|
|
|
}
|
|
|
|
|
2020-05-21 15:48:02 +02:00
|
|
|
sepolicy *sepolicy::from_file(const char *file) {
|
|
|
|
LOGD("Load policy from: %s\n", file);
|
|
|
|
|
|
|
|
policy_file_t pf;
|
|
|
|
policy_file_init(&pf);
|
|
|
|
auto fp = xopen_file(file, "re");
|
|
|
|
pf.fp = fp.get();
|
|
|
|
pf.type = PF_USE_STDIO;
|
|
|
|
|
|
|
|
auto db = static_cast<policydb_t *>(xmalloc(sizeof(policydb_t)));
|
|
|
|
if (policydb_init(db) || policydb_read(db, &pf, 0)) {
|
|
|
|
LOGE("Fail to load policy from %s\n", file);
|
|
|
|
free(db);
|
|
|
|
return nullptr;
|
|
|
|
}
|
|
|
|
|
|
|
|
auto sepol = new sepolicy();
|
|
|
|
sepol->db = db;
|
|
|
|
return sepol;
|
|
|
|
}
|
|
|
|
|
|
|
|
sepolicy *sepolicy::compile_split() {
|
2019-03-15 11:17:37 +01:00
|
|
|
char path[128], plat_ver[10];
|
2020-05-21 15:48:02 +02:00
|
|
|
cil_db_t *db = nullptr;
|
2019-03-15 11:17:37 +01:00
|
|
|
sepol_policydb_t *pdb = nullptr;
|
|
|
|
FILE *f;
|
|
|
|
int policy_ver;
|
|
|
|
const char *cil_file;
|
|
|
|
|
|
|
|
cil_db_init(&db);
|
2020-05-21 15:48:02 +02:00
|
|
|
run_finally fin([db_ptr = &db]{ cil_db_destroy(db_ptr); });
|
2019-03-15 11:17:37 +01:00
|
|
|
cil_set_mls(db, 1);
|
|
|
|
cil_set_multiple_decls(db, 1);
|
|
|
|
cil_set_disable_neverallow(db, 1);
|
|
|
|
cil_set_target_platform(db, SEPOL_TARGET_SELINUX);
|
|
|
|
cil_set_attrs_expand_generated(db, 0);
|
|
|
|
|
|
|
|
f = xfopen(SELINUX_VERSION, "re");
|
|
|
|
fscanf(f, "%d", &policy_ver);
|
|
|
|
fclose(f);
|
|
|
|
cil_set_policy_version(db, policy_ver);
|
|
|
|
|
|
|
|
// Get mapping version
|
|
|
|
f = xfopen(VEND_POLICY_DIR "plat_sepolicy_vers.txt", "re");
|
|
|
|
fscanf(f, "%s", plat_ver);
|
|
|
|
fclose(f);
|
|
|
|
|
|
|
|
// plat
|
|
|
|
load_cil(db, SPLIT_PLAT_CIL);
|
|
|
|
|
|
|
|
sprintf(path, PLAT_POLICY_DIR "mapping/%s.cil", plat_ver);
|
|
|
|
load_cil(db, path);
|
|
|
|
|
|
|
|
// product
|
|
|
|
sprintf(path, PROD_POLICY_DIR "mapping/%s.cil", plat_ver);
|
|
|
|
if (access(path, R_OK) == 0)
|
|
|
|
load_cil(db, path);
|
|
|
|
|
|
|
|
cil_file = PROD_POLICY_DIR "product_sepolicy.cil";
|
|
|
|
if (access(cil_file, R_OK) == 0)
|
|
|
|
load_cil(db, cil_file);
|
|
|
|
|
|
|
|
// vendor
|
|
|
|
cil_file = VEND_POLICY_DIR "nonplat_sepolicy.cil";
|
|
|
|
if (access(cil_file, R_OK) == 0)
|
|
|
|
load_cil(db, cil_file);
|
|
|
|
|
|
|
|
cil_file = VEND_POLICY_DIR "plat_pub_versioned.cil";
|
|
|
|
if (access(cil_file, R_OK) == 0)
|
|
|
|
load_cil(db, cil_file);
|
|
|
|
|
|
|
|
cil_file = VEND_POLICY_DIR "vendor_sepolicy.cil";
|
|
|
|
if (access(cil_file, R_OK) == 0)
|
|
|
|
load_cil(db, cil_file);
|
|
|
|
|
|
|
|
// odm
|
|
|
|
cil_file = ODM_POLICY_DIR "odm_sepolicy.cil";
|
|
|
|
if (access(cil_file, R_OK) == 0)
|
|
|
|
load_cil(db, cil_file);
|
|
|
|
|
|
|
|
if (cil_compile(db))
|
2020-05-21 15:48:02 +02:00
|
|
|
return nullptr;
|
2019-03-15 11:17:37 +01:00
|
|
|
if (cil_build_policydb(db, &pdb))
|
2020-05-21 15:48:02 +02:00
|
|
|
return nullptr;
|
2019-03-15 11:17:37 +01:00
|
|
|
|
2020-05-21 15:48:02 +02:00
|
|
|
auto sepol = new sepolicy();
|
|
|
|
sepol->db = &pdb->p;
|
|
|
|
return sepol;
|
|
|
|
}
|
|
|
|
|
|
|
|
sepolicy *sepolicy::from_split() {
|
|
|
|
const char *odm_pre = ODM_POLICY_DIR "precompiled_sepolicy";
|
|
|
|
const char *vend_pre = VEND_POLICY_DIR "precompiled_sepolicy";
|
|
|
|
if (access(odm_pre, R_OK) == 0 && check_precompiled(odm_pre))
|
|
|
|
return sepolicy::from_file(odm_pre);
|
|
|
|
else if (access(vend_pre, R_OK) == 0 && check_precompiled(vend_pre))
|
|
|
|
return sepolicy::from_file(vend_pre);
|
|
|
|
else
|
|
|
|
return sepolicy::compile_split();
|
|
|
|
}
|
|
|
|
|
|
|
|
sepolicy::~sepolicy() {
|
|
|
|
policydb_destroy(db);
|
|
|
|
free(db);
|
2019-03-15 11:17:37 +01:00
|
|
|
}
|
|
|
|
|
2020-05-24 13:16:40 +02:00
|
|
|
bool sepolicy::to_file(const char *file) {
|
2019-11-20 09:47:15 +01:00
|
|
|
uint8_t *data;
|
2019-03-15 11:17:37 +01:00
|
|
|
size_t len;
|
2019-11-20 09:47:15 +01:00
|
|
|
|
2020-05-21 15:48:02 +02:00
|
|
|
/* No partial writes are allowed to /sys/fs/selinux/load, thus the reason why we
|
|
|
|
* first dump everything into memory, then directly call write system call */
|
|
|
|
|
|
|
|
auto fp = make_stream_fp<byte_stream>(data, len);
|
|
|
|
run_finally fin([=]{ free(data); });
|
|
|
|
|
|
|
|
policy_file_t pf;
|
|
|
|
policy_file_init(&pf);
|
|
|
|
pf.type = PF_USE_STDIO;
|
|
|
|
pf.fp = fp.get();
|
|
|
|
if (policydb_write(db, &pf)) {
|
|
|
|
LOGE("Fail to create policy image\n");
|
2020-05-24 13:16:40 +02:00
|
|
|
return false;
|
2019-03-15 11:17:37 +01:00
|
|
|
}
|
|
|
|
|
2019-11-20 09:47:15 +01:00
|
|
|
int fd = xopen(file, O_WRONLY | O_CREAT | O_TRUNC | O_CLOEXEC, 0644);
|
2019-03-15 11:17:37 +01:00
|
|
|
if (fd < 0)
|
2020-05-24 13:16:40 +02:00
|
|
|
return false;
|
2019-11-20 09:47:15 +01:00
|
|
|
xwrite(fd, data, len);
|
|
|
|
|
2019-03-15 11:17:37 +01:00
|
|
|
close(fd);
|
2020-05-24 13:16:40 +02:00
|
|
|
return true;
|
2019-03-15 11:17:37 +01:00
|
|
|
}
|