Android11.0(R) MTK6771 user版本关闭 SELinux

开始我们先来跟一下 selinux 的初始化过程

system\core\init\main.cpp

java 复制代码
int main(int argc, char** argv) {
#if __has_feature(address_sanitizer)
    __asan_set_error_report_callback(AsanReportCallback);
#endif

    if (!strcmp(basename(argv[0]), "ueventd")) {
        return ueventd_main(argc, argv);
    }

    if (argc > 1) {
        if (!strcmp(argv[1], "subcontext")) {
            android::base::InitLogging(argv, &android::base::KernelLogger);
            const BuiltinFunctionMap& function_map = GetBuiltinFunctionMap();

            return SubcontextMain(argc, argv, &function_map);
        }

        if (!strcmp(argv[1], "selinux_setup")) {
            return SetupSelinux(argv);
        }

        if (!strcmp(argv[1], "second_stage")) {
            return SecondStageMain(argc, argv);
        }
    }

    return FirstStageMain(argc, argv);
}

调用 SetupSelinux(argv),进入 selinux.cpp 中

system\core\init\selinux.cpp

java 复制代码
int SetupSelinux(char** argv) {
    SetStdioToDevNull(argv);
	...

    // Set up SELinux, loading the SELinux policy.
#ifdef MTK_LOG
    if (GetMTKLOGDISABLERATELIMIT())
        SelinuxSetupKernelLogging_split();
    else
        SelinuxSetupKernelLogging();
#else
    SelinuxSetupKernelLogging();
#endif
    SelinuxInitialize();

	....

继续调用 SelinuxInitialize()

java 复制代码
void SelinuxInitialize() {
    LOG(INFO) << "Loading SELinux policy";
    if (!LoadPolicy()) {
        LOG(FATAL) << "Unable to load SELinux policy";
    }

    bool kernel_enforcing = (security_getenforce() == 1);
    bool is_enforcing = IsEnforcing();
    if (kernel_enforcing != is_enforcing) {
        if (security_setenforce(is_enforcing)) {
            PLOG(FATAL) << "security_setenforce(" << (is_enforcing ? "true" : "false")
                        << ") failed";
        }
    }

    if (auto result = WriteFile("/sys/fs/selinux/checkreqprot", "0"); !result.ok()) {
        LOG(FATAL) << "Unable to write to /sys/fs/selinux/checkreqprot: " << result.error();
    }

}

bool IsEnforcing() {
    if (ALLOW_PERMISSIVE_SELINUX) {
        return StatusFromCmdline() == SELINUX_ENFORCING;
    }
    return true;
}

EnforcingStatus StatusFromCmdline() {
    EnforcingStatus status = SELINUX_ENFORCING;

    ImportKernelCmdline([&](const std::string& key, const std::string& value) {
        if (key == "androidboot.selinux" && value == "permissive") {
            status = SELINUX_PERMISSIVE;
        }
    });

    return status;
}

security_getenforce() 读取 sys/fs/selinux/enforce 文件值

获取 kernel 层 selinux 默认模式,当定义了 ALLOW_PERMISSIVE_SELINUX 时,会检测是否在

cmdline 写入了 androidboot.selinux=permissive(lk 阶段写入)

kernel_enforcing 和 is_enforcing 不相等时将 is_enforcing 写入 sys/fs/selinux/enforce

在 11 User 版本中,security_setenforce(is_enforcing) 执行失败,开机直接自动进入 fastboot 模式

提示 security_setenforce(false) failed: Invalid argument

4.475989\] \<2\>.(2)\[1:init\]init: security_setenforce(false) failed: Invalid argument 将下面这句注释能正常开机启动,但无法成功关闭 selinux PLOG(FATAL) \<\< "security_setenforce(" \<\< (is_enforcing ? "true" : "false") \<\< ") failed"; **11 eng 版本,默认烧写后 enforce 即为 Permissive,在之前的低版本 eng 中,默认 enforce 为 Enforcing** 来看下 security_setenforce() 具体实现, selinux_log() 打印语句是我增加的,需要引入上面的三个头文件, **external\\selinux\\libselinux\\src\\setenforce.c** ```java #include "callbacks.h" #include #include int security_setenforce(int value) { int fd, ret; char path[PATH_MAX]; char buf[20]; selinux_log(SELINUX_INFO, "SELinux: security_setenforce value %d\n", value); selinux_log(SELINUX_INFO, "SELinux: security_setenforce selinux_mnt %s\n", selinux_mnt); if (!selinux_mnt) { errno = ENOENT; return -1; } snprintf(path, sizeof path, "%s/enforce", selinux_mnt); selinux_log(SELINUX_INFO, "SELinux: security_setenforce path %s\n", path); fd = open(path, O_RDWR | O_CLOEXEC); selinux_log(SELINUX_INFO, "SELinux: security_setenforce fd %d\n", fd); if (fd < 0) return -1; snprintf(buf, sizeof buf, "%d", value); ret = write(fd, buf, strlen(buf)); selinux_log(SELINUX_INFO, "SELinux: security_setenforce ret %d\n", ret); close(fd); if (ret < 0) return -1; return 0; } hidden_def(security_setenforce) ``` selinux_mnt 的定义在 **external\\selinux\\libselinux\\src\\policy.h** 中 ```java /* Preferred selinux mount location */ #define SELINUXMNT "/sys/fs/selinux" #define OLDSELINUXMNT "/selinux" /* selinuxfs mount point */ extern char *selinux_mnt; ``` selinux_mnt 赋值在 init.c ```java external\selinux\libselinux\src\init.c void set_selinuxmnt(const char *mnt) { selinux_mnt = strdup(mnt); } external\selinux\libselinux\src\android\android_platform.c int selinux_android_load_policy_from_fd(int fd, const char *description) { ...... set_selinuxmnt(SELINUXMNT); ``` 所以最终的 path = sys/fs/selinux/enforce snprintf(path, sizeof path, "%s/enforce", selinux_mnt); security_setenforce() 和 security_getenforce() 都是读写 path = sys/fs/selinux/enforce 当使用 adb shell setenforce 0 时,调用对应文件位于, **external\\toybox\\toys\\android\\setenforce.c** 通过上面加的 log,最终还是调用到 setenforce.c ```java #define FOR_setenforce #include "toys.h" void setenforce_main(void) { char *new = *toys.optargs; int state, ret; if (!is_selinux_enabled()) error_exit("SELinux is disabled"); else if (!strcmp(new, "1") || !strcasecmp(new, "enforcing")) state = 1; else if (!strcmp(new, "0") || !strcasecmp(new, "permissive")) state = 0; else error_exit("Invalid state: %s", new); ret = security_setenforce(state); if (ret == -1) perror_msg("Couldn't set enforcing status to '%s'", new); } adb shell setenforce 0 SELinux: security_setenforce value 0 SELinux: security_setenforce selinux_mnt /sys/fs/selinux SELinux: security_setenforce path /sys/fs/selinux/enforce SELinux: security_setenforce fd 3 SELinux: security_setenforce ret -1 setenforce: Couldn't set enforcing status to '0': Invalid argument ``` 看到 eng 版本 logcat 中打印了 audit: type=1404 audit(1262304022.108:3): enforcing=0 old_enforcing=1 auid=4294967295 ses=4294967295 enabled=1 old-enabled=1 lsm=selinux res=1 搜索找到 kernel 中 **kernel-4.19\\security\\selinux\\selinuxfs.c** ```java #ifdef CONFIG_SECURITY_SELINUX_DEVELOP static ssize_t sel_write_enforce(struct file *file, const char __user *buf, size_t count, loff_t *ppos) { struct selinux_fs_info *fsi = file_inode(file)->i_sb->s_fs_info; struct selinux_state *state = fsi->state; char *page = NULL; ssize_t length; int old_value, new_value; if (count >= PAGE_SIZE) return -ENOMEM; /* No partial writes. */ if (*ppos != 0) return -EINVAL; page = memdup_user_nul(buf, count); if (IS_ERR(page)) return PTR_ERR(page); length = -EINVAL; if (sscanf(page, "%d", &new_value) != 1) goto out; new_value = !!new_value; old_value = enforcing_enabled(state); if (new_value != old_value) { length = avc_has_perm(&selinux_state, current_sid(), SECINITSID_SECURITY, SECCLASS_SECURITY, SECURITY__SETENFORCE, NULL); if (length) goto out; audit_log(audit_context(), GFP_KERNEL, AUDIT_MAC_STATUS, "enforcing=%d old_enforcing=%d auid=%u ses=%u" " enabled=%d old-enabled=%d lsm=selinux res=1", new_value, old_value, from_kuid(&init_user_ns, audit_get_loginuid(current)), audit_get_sessionid(current), selinux_enabled, selinux_enabled); enforcing_set(state, new_value); if (new_value) avc_ss_reset(state->avc, 0); selnl_notify_setenforce(new_value); selinux_status_update_setenforce(state, new_value); if (!new_value) call_lsm_notifier(LSM_POLICY_CHANGE, NULL); } length = count; out: kfree(page); return length; } #else #define sel_write_enforce NULL #endif ``` 可以看到 **CONFIG_SECURITY_SELINUX_DEVELOP** 宏决定了是否存在 sel_write_enforce 方法 接下来再来看 kernel 中 selinux 初始化设置 **kernel-4.19\\security\\selinux\\hooks.c** ```java static __init int selinux_init(void) { if (!security_module_enable("selinux")) { selinux_enabled = 0; return 0; } if (!selinux_enabled) { pr_info("SELinux: Disabled at boot.\n"); return 0; } pr_info("SELinux: Initializing. %d\n", selinux_enforcing_boot); memset(&selinux_state, 0, sizeof(selinux_state)); enforcing_set(&selinux_state, selinux_enforcing_boot); selinux_state.checkreqprot = selinux_checkreqprot_boot; selinux_ss_init(&selinux_state.ss); selinux_avc_init(&selinux_state.avc); .... if (selinux_enforcing_boot) pr_info("SELinux: Starting in enforcing mode\n"); else pr_info("SELinux: Starting in permissive mode\n"); return 0; } ``` enforcing_set(\&selinux_state, selinux_enforcing_boot); selinux_enforcing_boot 默认值定义由 **CONFIG_SECURITY_SELINUX_DEVELOP** 决定 全局搜索到 kernel-4.19\\kernel\\configs\\userdebug.config 中定义了 CONFIG_SECURITY_SELINUX_DEVELOP=y 由此可以解释上面说的 eng 版本默认为 permissive 0,user 版本默认为 enforce 1 但是最终搜索发现 eng 版本编译时并没有引入 userdebug.config,这就奇怪了,看 log 可以肯定的是 eng 版本中必须 定义了 CONFIG_SECURITY_SELINUX_DEVELOP,但为何找不到定义的地方??????? **device\\mediateksample\\k62v1_64_bsp\\vnd_k62v1_64_bsp.mk** ```java ifeq ($(TARGET_BUILD_VARIANT), eng) KERNEL_DEFCONFIG ?= k62v1_64_bsp_debug_defconfig endif ifeq ($(TARGET_BUILD_VARIANT), user) KERNEL_DEFCONFIG ?= k62v1_64_bsp_defconfig endif ifeq ($(TARGET_BUILD_VARIANT), userdebug) KERNEL_DEFCONFIG ?= k62v1_64_bsp_defconfig userdebug.config endif PRELOADER_TARGET_PRODUCT ?= k62v1_64_bsp LK_PROJECT ?= k62v1_64_bsp TRUSTY_PROJECT ?= k62v1_64_bsp ``` 可以看到有且仅有编译 userdebug 版本时才引入 userdebug.config,所以想要 user 版本中默认关闭 selinux,只需编译 时引入 userdebug.config。这样就定义了 **CONFIG_SECURITY_SELINUX_DEVELOP** 初始化时 enforcing_set(\&selinux_state, selinux_enforcing_boot); 直接写入 0 在 **kernel-4.19\\security\\selinux\\include\\security.h** 中才能成功写入 ```java #ifdef CONFIG_SECURITY_SELINUX_DEVELOP static inline bool enforcing_enabled(struct selinux_state *state) { return state->enforcing; } static inline void enforcing_set(struct selinux_state *state, bool value) { state->enforcing = value; } #else static inline bool enforcing_enabled(struct selinux_state *state) { return true; } static inline void enforcing_set(struct selinux_state *state, bool value) { } #endif ``` 最后当你在 user 版本关闭 selinux 后,烧写后重新开机系统会弹出**您的设备内部出现了问题。请联系您的设备制造商了解详情** 对话框 具体原因可查看这篇进行屏蔽 [blog.csdn.net/qq_18059855...](https://link.juejin.cn?target=https%3A%2F%2Fblog.csdn.net%2Fqq_18059855%2Farticle%2Fdetails%2F108409157 "https://blog.csdn.net/qq_18059855/article/details/108409157") [Linux权限详解(chmod、600、644、666、700、711、755、777、4755、6755、7755)](https://link.juejin.cn?target=https%3A%2F%2Fblog.csdn.net%2Fu013197629%2Farticle%2Fdetails%2F73608613 "https://blog.csdn.net/u013197629/article/details/73608613") [8.0selinux状态获取过程](https://link.juejin.cn?target=https%3A%2F%2Fblog.csdn.net%2Fmike8825%2Farticle%2Fdetails%2F90733610 "https://blog.csdn.net/mike8825/article/details/90733610") [深入理解SELinux/SEAndroid](https://link.juejin.cn?target=https%3A%2F%2Fblog.csdn.net%2FFybon%2Farticle%2Fdetails%2F37812695 "https://blog.csdn.net/Fybon/article/details/37812695") [玩转Android10源码开发定制(13)修改安卓源码关闭selinux](https://link.juejin.cn?target=https%3A%2F%2Fmp.weixin.qq.com%2Fs%2FUAPwYIMRFyDyPkvMfjNXCg "https://mp.weixin.qq.com/s/UAPwYIMRFyDyPkvMfjNXCg") [CONFIG_SECURITY_SELINUX_DEVELOP flag](https://link.juejin.cn?target=https%3A%2F%2Fwww.spinics.net%2Flists%2Fselinux%2Fmsg16412.html "https://www.spinics.net/lists/selinux/msg16412.html")

相关推荐
wangz766 分钟前
kotlin,jetpack compose,使用DataStore保存数据,让程序下次启动时自动获取
android·kotlin·datastore·jetpack compose
Thread.sleep(0)2 小时前
WebRTC源码解析:Android如何渲染画面
android·webrtc
Android 小码峰啊3 小时前
Android Dagger 2 框架的注解模块深入剖析 (一)
android·adb·android studio·android-studio·androidx·android runtime
Android 小码峰啊3 小时前
Android Fresco 框架缓存模块源码深度剖析(二)
android
大胃粥5 小时前
Android V app 冷启动(8) 动画结束
android
ufo00l5 小时前
Kotlin在Android中有哪些重要的应用和知识点是需要学习或者重点关注的
android
AJi5 小时前
Android音视频框架探索(二):Binder——系统服务的通信基础
android·ffmpeg·音视频开发
tjsoft6 小时前
Nginx配置伪静态,URL重写
android·运维·nginx
努力学习的小廉6 小时前
【C++11(中)】—— 我与C++的不解之缘(三十一)
android·java·c++
tangweiguo030519877 小时前
打破界限:Android XML与Jetpack Compose深度互操作指南
android·kotlin·compose