当前位置:   article > 正文

自定义Android系统级权限组

自定义Android系统级权限组

Android安全模型基于Linux的权限管理,使用沙箱隔离机制将每个应用的进程资源隔离。Android应用程序在安装时赋予一个UID,UID不同的应用程序完全隔离。
另一方面,应用如果想使用某种服务,需要在AndroidManifest.xml中申请。比如,想使用网络的话,需要在AndroidManifest.xml中添加:

<uses-permission android:name="android.permission.INTERNET" />

INTERNET权限将被映射到底层的GID。所以,一个应用有一个UID,可以有多个GID,来获得多个权限。
关于Android权限管理更详细的内容这里就不再赘述了,这方面的资料很多。直接进入正题,如何自定义一个类似于上面的INTERNET的系统级权限组?
我们知道,Android本身支持在应用程序的AndroidManifest.xml中自定义权限,但这种自定义的权限没有被映射到系统底层的用户组中,没有独立的GID。如果在系统中有一个C语言写的服务,只有应用申请了权限才可以使用,我们就需要将这个权限映射到底层。

分析

本文中,作为例子,我们假设有一个C语言实现的功能,它提供say_hello的服务,使用这个服务的应用要在AndroidManifest.xml中添加来申请权限。
AndroidManifest.xml是在安装应用的时候解析的。最终调用的解析函数是
frameworks/base/core/java/android/content/pm/PackageParser.java

  1. private Package parsePackage(
  2. Resources res, XmlResourceParser parser, int flags, String[] outError)
  3. throws XmlPullParserException, IOException {
  4. ......
  5. while ((type = parser.next()) != XmlPullParser.END_DOCUMENT
  6. && (type != XmlPullParser.END_TAG || parser.getDepth() > outerDepth)) {
  7. if (type == XmlPullParser.END_TAG || type == XmlPullParser.TEXT) {
  8. continue;
  9. }
  10. String tagName = parser.getName();
  11. if (tagName.equals("application")) {
  12. ......
  13. } else if (tagName.equals("keys")) {
  14. if (!parseKeys(pkg, res, parser, attrs, outError)) {
  15. return null;
  16. }
  17. } else if (tagName.equals("permission-group")) {
  18. if (parsePermissionGroup(pkg, flags, res, parser, attrs, outError) == null) {
  19. return null;
  20. }
  21. } else if (tagName.equals("permission")) {
  22. if (parsePermission(pkg, res, parser, attrs, outError) == null) {
  23. return null;
  24. }
  25. } else if (tagName.equals("permission-tree")) {
  26. if (parsePermissionTree(pkg, res, parser, attrs, outError) == null) {
  27. return null;
  28. }
  29. } else if (tagName.equals("uses-permission")) {
  30. if (!parseUsesPermission(pkg, res, parser, attrs, outError)) {
  31. return null;
  32. }
  33. } else if (tagName.equals("uses-configuration")) {
  34. ......

针对不同标签调用对应的解析函数。对于uses-permission调用的是parseUsesPermission:
frameworks/base/core/java/android/content/pm/PackageParser.java

  1. private boolean parseUsesPermission(Package pkg, Resources res, XmlResourceParser parser,
  2. AttributeSet attrs, String[] outError)
  3. throws XmlPullParserException, IOException {
  4. ······
  5. if ((maxSdkVersion == 0) || (maxSdkVersion >= Build.VERSION.RESOURCES_SDK_INT)) {
  6. if (name != null) {
  7. int index = pkg.requestedPermissions.indexOf(name);
  8. if (index == -1) {
  9. pkg.requestedPermissions.add(name.intern());
  10. pkg.requestedPermissionsRequired.add(required ? Boolean.TRUE : Boolean.FALSE);
  11. } else {
  12. if (pkg.requestedPermissionsRequired.get(index) != required) {
  13. outError[0] = "conflicting <uses-permission> entries";
  14. mParseError = PackageManager.INSTALL_PARSE_FAILED_MANIFEST_MALFORMED;
  15. return false;
  16. }
  17. }
  18. }
  19. }
  20. XmlUtils.skipCurrentTag(parser);
  21. return true;
  22. }

它的工作就是调用pkg.requestedPermissions.add(name.intern());将诸如android.permission.INTERNET这样的字符串添加到pkg.requestedPermissions列表中。
解析完成后,会调用grantPermissionsLPw获取相应的GID:
frameworks/base/services/java/com/android/server/pm/PackageManagerService.java

  1. private void grantPermissionsLPw(PackageParser.Package pkg, boolean replace) {
  2. .......
  3. final int N = pkg.requestedPermissions.size();
  4. for (int i=0; i<N; i++) {
  5. final String name = pkg.requestedPermissions.get(i);
  6. final boolean required = pkg.requestedPermissionsRequired.get(i);
  7. final BasePermission bp = mSettings.mPermissions.get(name);
  8. if (DEBUG_INSTALL) {
  9. if (gp != ps) {
  10. Log.i(TAG, "Package " + pkg.packageName + " checking " + name + ": " + bp);
  11. }
  12. }
  13. if (bp == null || bp.packageSetting == null) {
  14. Slog.w(TAG, "Unknown permission " + name
  15. + " in package " + pkg.packageName);
  16. continue;
  17. }
  18. final String perm = bp.name;
  19. boolean allowed;
  20. boolean allowedSig = false;
  21. ......
  22. if (allowed) {
  23. ......
  24. if (allowed) {
  25. if (!gp.grantedPermissions.contains(perm)) {
  26. changedPermission = true;
  27. gp.grantedPermissions.add(perm);
  28. gp.gids = appendInts(gp.gids, bp.gids);
  29. } else if (!ps.haveGids) {
  30. gp.gids = appendInts(gp.gids, bp.gids);
  31. }
  32. } else {
  33. Slog.w(TAG, "Not granting permission " + perm
  34. + " to package " + pkg.packageName
  35. + " because it was previously installed without");
  36. }
  37. } else {
  38. ......
  39. }
  40. }
  41. ......
  42. }

需要注意的是final BasePermission bp = mSettings.mPermissions.get(name);
mSettings保存了与设定相关的东西,class Settings定义在frameworks/base/services/java/com/android/server/pm/Settings.java中,它的mPermissions成员的类型是HashMap,保存了权限名字到权限信息的映射。BasePermission中有一个int[] gids成员,这就是这个权限对应的gid;还有一个PackageSettingBase类型的packageSetting成员,它指定了声明这个权限的包的配置信息。

定义权限名

那么,mSettings.mPermissions是在什么时候初始化的呢?
PackageManagerService在初始化时,会调用readPermissions();它又调用了readPermissionsFromXml(permFile),permFile文件的文件路径是/etc/permissions/platform.xml,这个文件中定义了底层GID和高层权限名字之间的对应关系:
frameworks/base/data/etc/platform.xml

  1. <permissions>
  2. ......
  3. <permission name="android.permission.INTERNET" >
  4. <group gid="inet" />
  5. </permission>
  6. ......
  7. </permissions>

所以我们在这个文件中添加say_hello权限:
frameworks/base/data/etc/platform.xml

  1. <permission name="android.permission.SAY_HELLO" >
  2. <group gid="say_hello" />
  3. </permission>

获取整型GID

回到readPermissionsFromXml函数,对于名字是“permission”的标签,会调用readPermission函数:
frameworks/base/services/java/com/android/server/pm/PackageManagerService.java

  1. void readPermission(XmlPullParser parser, String name)
  2. throws IOException, XmlPullParserException {
  3. name = name.intern();
  4. BasePermission bp = mSettings.mPermissions.get(name);
  5. if (bp == null) {
  6. bp = new BasePermission(name, null, BasePermission.TYPE_BUILTIN);
  7. mSettings.mPermissions.put(name, bp);
  8. }
  9. int outerDepth = parser.getDepth();
  10. int type;
  11. while ((type=parser.next()) != XmlPullParser.END_DOCUMENT
  12. && (type != XmlPullParser.END_TAG
  13. || parser.getDepth() > outerDepth)) {
  14. if (type == XmlPullParser.END_TAG
  15. || type == XmlPullParser.TEXT) {
  16. continue;
  17. }
  18. String tagName = parser.getName();
  19. if ("group".equals(tagName)) {
  20. String gidStr = parser.getAttributeValue(null, "gid");
  21. if (gidStr != null) {
  22. int gid = Process.getGidForName(gidStr);
  23. bp.gids = appendInt(bp.gids, gid);
  24. } else {
  25. Slog.w(TAG, "<group> without gid at "
  26. + parser.getPositionDescription());
  27. }
  28. }
  29. XmlUtils.skipCurrentTag(parser);
  30. }
  31. }

首先将权限的名字添加到mSettings.mPermissions列表中,然后进入while循环,把这个权限对应的所有gid都添加到bp.gids中。gid是调用Process.getGidForName根据gid的名字得到了,在我们的例子中,也就是"say_hello"。getGidForName是Process中的一个native方法:
frameworks/base/core/java/android/os/Process.java

public static final native int getGidForName(String name);

它的实际定义是
frameworks/base/core/jni/android_util_Process.cpp

  1. jint android_os_Process_getGidForName(JNIEnv* env, jobject clazz, jstring name)
  2. {
  3. ......
  4. const size_t N = name8.size();
  5. if (N > 0) {
  6. const char* str = name8.string();
  7. for (size_t i=0; i<N; i++) {
  8. if (str[i] < '0' || str[i] > '9') {
  9. struct group* grp = getgrnam(str);
  10. if (grp == NULL) {
  11. return -1;
  12. }
  13. return grp->gr_gid;
  14. }
  15. }
  16. return atoi(str);
  17. }
  18. return -1;
  19. }

它就是根据组名调用getgrnam获取组信息。我们知道,getgrnam是一个C库函数,在Linux中标准定义是根据读取/etc/group文件获取组信息,但在Android中并没有这个文件,那么这个函数是怎么实现的呢?
bionic/libc/bionic/stubs.cpp

  1. static group* android_iinfo_to_group(group* gr,
  2. const android_id_info* iinfo) {
  3. gr->gr_name = (char*) iinfo->name;
  4. gr->gr_gid = iinfo->aid;
  5. gr->gr_mem[0] = gr->gr_name;
  6. gr->gr_mem[1] = NULL;
  7. return gr;
  8. }
  9. static group* android_name_to_group(group* gr, const char* name) {
  10. for (size_t n = 0; n < android_id_count; ++n) {
  11. if (!strcmp(android_ids[n].name, name)) {
  12. return android_iinfo_to_group(gr, android_ids + n);
  13. }
  14. }
  15. return NULL;
  16. }
  17. group* getgrnam(const char* name) { // NOLINT: implementing bad function.
  18. stubs_state_t* state = __stubs_state();
  19. if (state == NULL) {
  20. return NULL;
  21. }
  22. if (android_name_to_group(&state->group_, name) != 0) {
  23. return &state->group_;
  24. }
  25. return app_id_to_group(app_id_from_name(name), state);
  26. }

显而易见,它是遍历android_ids数组,查找是否有对应的组。
android_ids的定义在android_filesystem_config.h中
system/core/include/private/android_filesystem_config.h

  1. ......
  2. #define AID_INET 3003 /* can create AF_INET and AF_INET6 sockets */
  3. ......
  4. static const struct android_id_info android_ids[] = {
  5. ......
  6. { "inet", AID_INET, },
  7. ......
  8. };

这样就把inet字符串和整型值3003关联起来了。所以我们不妨把say_hello的整型gid定义为8001,在android_filesystem_config.h中添加

#define AID_SAY_HELLO          8001

在android_ids数组中添加

{ "say_hello",          AID_SAY_HELLO, },

这样就把字符串的say_hello和数字8001关联起来了。

在android中声明权限

回到readPermissions,readPermissions()完成后会调用scanDirLI扫描系统中安装的apk,它调用scanPackageLI建立每个apk的配置结构PackageSetting(继承于上面提到的PackageSettingBase),并把mSettings.mPermissions中保存的权限与之相关联。然后调用updatePermissionsLPw更新mSettings.mPermissions列表。
frameworks/base/services/java/com/android/server/pm/PackageManagerService.java

  1. private void updatePermissionsLPw(String changingPkg,
  2. PackageParser.Package pkgInfo, int flags) {
  3. ......
  4. // Make sure all dynamic permissions have been assigned to a package,
  5. // and make sure there are no dangling permissions.
  6. it = mSettings.mPermissions.values().iterator();
  7. while (it.hasNext()) {
  8. final BasePermission bp = it.next();
  9. if (bp.type == BasePermission.TYPE_DYNAMIC) {
  10. if (DEBUG_SETTINGS) Log.v(TAG, "Dynamic permission: name="
  11. + bp.name + " pkg=" + bp.sourcePackage
  12. + " info=" + bp.pendingInfo);
  13. if (bp.packageSetting == null && bp.pendingInfo != null) {
  14. final BasePermission tree = findPermissionTreeLP(bp.name);
  15. if (tree != null && tree.perm != null) {
  16. bp.packageSetting = tree.packageSetting;
  17. bp.perm = new PackageParser.Permission(tree.perm.owner,
  18. new PermissionInfo(bp.pendingInfo));
  19. bp.perm.info.packageName = tree.perm.info.packageName;
  20. bp.perm.info.name = bp.name;
  21. bp.uid = tree.uid;
  22. }
  23. }
  24. }
  25. if (bp.packageSetting == null) {
  26. // We may not yet have parsed the package, so just see if
  27. // we still know about its settings.
  28. bp.packageSetting = mSettings.mPackages.get(bp.sourcePackage);
  29. } else {
  30. }
  31. if (bp.packageSetting == null) {
  32. Slog.w(TAG, "Removing dangling permission: " + bp.name
  33. + " from package " + bp.sourcePackage);
  34. it.remove();
  35. } else if (changingPkg != null && changingPkg.equals(bp.sourcePackage)) {
  36. if (pkgInfo == null || !hasPermission(pkgInfo, bp.name)) {
  37. Slog.i(TAG, "Removing old permission: " + bp.name
  38. + " from package " + bp.sourcePackage);
  39. flags |= UPDATE_PERMISSIONS_ALL;
  40. it.remove();
  41. }
  42. }
  43. }

可以看到如果权限的packageSetting为空,则将被从列表中删除。所以,只在platform.xml中定义了权限是不够的。必须有包声明这个权限,从而使bp.packageSetting不为空(前面说过,scanPackageLI会将权限和包配置关联起来)。像INTERNET这样的系统权限是在framework-res.apk(包名是android)中声明的:
frameworks/base/core/res/AndroidManifest.xml

  1. ......
  2. <!-- Allows applications to open network sockets. -->
  3. <permission android:name="android.permission.INTERNET"
  4. android:permissionGroup="android.permission-group.NETWORK"
  5. android:protectionLevel="dangerous"
  6. android:description="@string/permdesc_createNetworkSockets"
  7. android:label="@string/permlab_createNetworkSockets" />
  8. ......

所以我们也在frameworks/base/core/res/AndroidManifest.xml中添加如下内容:

  1. <permission android:name="android.permission.SAY_HELLO"
  2. android:protectionLevel="dangerous"
  3. android:label="say hello"
  4. />

至此,我们就完成了say_hello权限的定义。

实现过程总结

1、在platform.xml中添加
frameworks/base/data/etc/platform.xml

  1. <permission name="android.permission.SAY_HELLO" >
  2. <group gid="say_hello" />
  3. </permission>

2、在android_filesystem_config.h中添加

#define AID_SAY_HELLO          8001

在android_ids数组中添加

{ "say_hello",          AID_SAY_HELLO, },

3、在frameworks/base/core/res/AndroidManifest.xml中添加

  1. <permission android:name="android.permission.SAY_HELLO"
  2. android:protectionLevel="dangerous"
  3. android:label="say hello"
  4. />

4、将frameworks/base/data/etc/platform.xml push到/etc/permissions/下
5、执行mmm bionic/libc/ 编译出libc.so,并将其push到/system/lib下
6、执行mmm frameworks/base/core/res/编译出framework-res.apk,并将其push到/system/framework下
完成,可以在android应用中验证成果了!

在底层获取应用的权限

我们的应用场景是在C语言中管理权限,那么如何在C语言中获取各应用的权限呢?
其实,在PackageManagerService初始化所有包信息之后就会调用mSettings.writeLPr()(只要系统中包的信息有改变,比如安装应用,都会调用这个函数)。
frameworks/base/services/java/com/android/server/pm/Settings.java

  1. void writeLPr() {
  2. ......
  3. // Write package list file now, use a JournaledFile.
  4. File tempFile = new File(mPackageListFilename.getAbsolutePath() + ".tmp");
  5. JournaledFile journal = new JournaledFile(mPackageListFilename, tempFile);
  6. final File writeTarget = journal.chooseForWrite();
  7. fstr = new FileOutputStream(writeTarget);
  8. str = new BufferedOutputStream(fstr);
  9. try {
  10. FileUtils.setPermissions(fstr.getFD(), 0660, SYSTEM_UID, PACKAGE_INFO_GID);
  11. StringBuilder sb = new StringBuilder();
  12. for (final PackageSetting pkg : mPackages.values()) {
  13. if (pkg.pkg == null || pkg.pkg.applicationInfo == null) {
  14. Slog.w(TAG, "Skipping " + pkg + " due to missing metadata");
  15. continue;
  16. }
  17. final ApplicationInfo ai = pkg.pkg.applicationInfo;
  18. final String dataPath = ai.dataDir;
  19. final boolean isDebug = (ai.flags & ApplicationInfo.FLAG_DEBUGGABLE) != 0;
  20. final int[] gids = pkg.getGids();
  21. // Avoid any application that has a space in its path.
  22. if (dataPath.indexOf(" ") >= 0)
  23. continue;
  24. // we store on each line the following information for now:
  25. //
  26. // pkgName - package name
  27. // userId - application-specific user id
  28. // debugFlag - 0 or 1 if the package is debuggable.
  29. // dataPath - path to package's data path
  30. // seinfo - seinfo label for the app (assigned at install time)
  31. // gids - supplementary gids this app launches with
  32. //
  33. // NOTE: We prefer not to expose all ApplicationInfo flags for now.
  34. //
  35. // DO NOT MODIFY THIS FORMAT UNLESS YOU CAN ALSO MODIFY ITS USERS
  36. // FROM NATIVE CODE. AT THE MOMENT, LOOK AT THE FOLLOWING SOURCES:
  37. // system/core/run-as/run-as.c
  38. // system/core/sdcard/sdcard.c
  39. //
  40. sb.setLength(0);
  41. sb.append(ai.packageName);
  42. sb.append(" ");
  43. sb.append((int)ai.uid);
  44. sb.append(isDebug ? " 1 " : " 0 ");
  45. sb.append(dataPath);
  46. sb.append(" ");
  47. sb.append(ai.seinfo);
  48. sb.append(" ");
  49. sb.append(" ");
  50. if (gids != null && gids.length > 0) {
  51. sb.append(gids[0]);
  52. for (int i = 1; i < gids.length; i++) {
  53. sb.append(",");
  54. sb.append(gids[i]);
  55. }
  56. } else {
  57. sb.append("none");
  58. }
  59. sb.append("\n");
  60. str.write(sb.toString().getBytes());
  61. }
  62. str.flush();
  63. FileUtils.sync(fstr);
  64. str.close();
  65. journal.commit();
  66. } catch (Exception e) {
  67. ......
  68. }

mPackageListFilename.getAbsolutePath()的结果是/data/system/packages.list,这段代码的任务就是将mPackages中保存的所有包的信息保存到/data/system/packages.list.tmp,保存的内容和格式见注释。如果这个过程没有出错,最后调用journal.commit()将/data/system/packages.list.tmp重命名为/data/system/packages.list覆盖原来的文件。
所以,/data/system/packages.list中保存了所有应用申请的权限,C代码只要读这个文件就能判断某个应用是否申请了我们要求的权限。
通常情况下,在接收到应用的请求时,我们不愿意每次都读取这个文件然后解析、判断这个应用的gids中是否有我们定义的id,更好的做法是将所有申请了权限的包缓存起来,这样就不必每次都读文件。而且,writeLPr更新这个文件的方法是直接用新文件覆盖旧文件,所以我们只需要监听这个文件的删除事件,在事件发生时,更新缓存。下面的代码片段是一个使用这种方法的例子。

  1. const static char *package_list_file = "/data/system/packages.list";/*packages.list文件*/
  2. static int read_package_list() {
  3. FILE* file = fopen(package_list_file, "r");
  4. if (!file) {
  5. return -1;
  6. }
  7. char buf[512];
  8. while (fgets(buf, sizeof(buf), file) != NULL) {
  9. char package_name[512];
  10. int appid;
  11. char gids[512];
  12. if (sscanf(buf, "%s %d %*d %*s %*s %s", package_name, &appid, gids) == 3) {
  13. char* package_name_dup = strdup(package_name);
  14. char* token = strtok(gids, ",");
  15. /*将appid(也就是应用进程的uid)从缓存中删除*/
  16. while (token != NULL) {
  17. if (strtoul(token, NULL, 10) == AID_SAY_HELLO /*权限gid*/) {
  18. /*该应用申请了权限,将其添加到缓存中*/
  19. break;
  20. }
  21. token = strtok(NULL, ",");
  22. }
  23. }
  24. }
  25. fclose(file);
  26. return 0;
  27. }
  28. void watch_package_list() {
  29. struct inotify_event *event;
  30. char event_buf[512];
  31. int nfd = inotify_init();
  32. if (nfd < 0) {
  33. return;
  34. }
  35. bool active = false;
  36. while (1) {
  37. if (!active) {
  38. int res = inotify_add_watch(nfd, package_list_file, IN_DELETE_SELF);/*监听删除事件*/
  39. if (res == -1) {
  40. if (errno == ENOENT || errno == EACCES) {
  41. sleep(3);
  42. continue;
  43. } else {
  44. return;
  45. }
  46. }
  47. if (read_package_list() == -1) {
  48. return;
  49. }
  50. active = true;
  51. }
  52. int event_pos = 0;
  53. int res = read(nfd, event_buf, sizeof(event_buf));
  54. if (res < (int) sizeof(*event)) {
  55. if (errno == EINTR)
  56. continue;
  57. return;
  58. }
  59. while (res >= (int) sizeof(*event)) {
  60. int event_size;
  61. event = (struct inotify_event *) (event_buf + event_pos);
  62. if ((event->mask & IN_IGNORED) == IN_IGNORED) {
  63. active = false;
  64. }
  65. event_size = sizeof(*event) + event->len;
  66. res -= event_size;
  67. event_pos += event_size;
  68. }
  69. }
  70. }
声明:本文内容由网友自发贡献,不代表【wpsshop博客】立场,版权归原作者所有,本站不承担相应法律责任。如您发现有侵权的内容,请联系我们。转载请注明出处:https://www.wpsshop.cn/w/一键难忘520/article/detail/800224
推荐阅读
相关标签
  

闽ICP备14008679号