You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
145 lines
4.3 KiB
145 lines
4.3 KiB
/*
|
|
* Copyright (C) 2017 The Android Open Source Project
|
|
*
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
* you may not use this file except in compliance with the License.
|
|
* You may obtain a copy of the License at
|
|
*
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
*
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
* See the License for the specific language governing permissions and
|
|
* limitations under the License.
|
|
*/
|
|
|
|
#define LOG_TAG "hwservicemanager"
|
|
|
|
#include <android-base/logging.h>
|
|
#include <hidl-util/FQName.h>
|
|
#include <log/log.h>
|
|
|
|
#include "AccessControl.h"
|
|
|
|
namespace android {
|
|
|
|
static const char *kPermissionAdd = "add";
|
|
static const char *kPermissionGet = "find";
|
|
static const char *kPermissionList = "list";
|
|
|
|
struct audit_data {
|
|
const char* interfaceName;
|
|
const char* sid;
|
|
pid_t pid;
|
|
};
|
|
|
|
using android::FQName;
|
|
|
|
AccessControl::AccessControl() {
|
|
mSeHandle = selinux_android_hw_service_context_handle();
|
|
LOG_ALWAYS_FATAL_IF(mSeHandle == nullptr, "Failed to acquire SELinux handle.");
|
|
|
|
if (getcon(&mSeContext) != 0) {
|
|
LOG_ALWAYS_FATAL("Failed to acquire hwservicemanager context.");
|
|
}
|
|
|
|
selinux_status_open(true);
|
|
|
|
mSeCallbacks.func_audit = AccessControl::auditCallback;
|
|
selinux_set_callback(SELINUX_CB_AUDIT, mSeCallbacks);
|
|
|
|
mSeCallbacks.func_log = selinux_log_callback; /* defined in libselinux */
|
|
selinux_set_callback(SELINUX_CB_LOG, mSeCallbacks);
|
|
}
|
|
|
|
bool AccessControl::canAdd(const std::string& fqName, const CallingContext& callingContext) {
|
|
FQName fqIface;
|
|
|
|
if (!FQName::parse(fqName, &fqIface)) {
|
|
return false;
|
|
}
|
|
const std::string checkName = fqIface.package() + "::" + fqIface.name();
|
|
|
|
return checkPermission(callingContext, kPermissionAdd, checkName.c_str());
|
|
}
|
|
|
|
bool AccessControl::canGet(const std::string& fqName, const CallingContext& callingContext) {
|
|
FQName fqIface;
|
|
|
|
if (!FQName::parse(fqName, &fqIface)) {
|
|
return false;
|
|
}
|
|
const std::string checkName = fqIface.package() + "::" + fqIface.name();
|
|
|
|
return checkPermission(callingContext, kPermissionGet, checkName.c_str());
|
|
}
|
|
|
|
bool AccessControl::canList(const CallingContext& callingContext) {
|
|
return checkPermission(callingContext, mSeContext, kPermissionList, nullptr);
|
|
}
|
|
|
|
AccessControl::CallingContext AccessControl::getCallingContext(pid_t sourcePid) {
|
|
char *sourceContext = nullptr;
|
|
|
|
if (getpidcon(sourcePid, &sourceContext) < 0) {
|
|
ALOGE("SELinux: failed to retrieve process context for pid %d", sourcePid);
|
|
return { false, "", sourcePid };
|
|
}
|
|
|
|
std::string context = sourceContext;
|
|
freecon(sourceContext);
|
|
return { true, context, sourcePid };
|
|
}
|
|
|
|
bool AccessControl::checkPermission(const CallingContext& source, const char *targetContext, const char *perm, const char *interface) {
|
|
if (!source.sidPresent) {
|
|
return false;
|
|
}
|
|
|
|
bool allowed = false;
|
|
|
|
struct audit_data ad;
|
|
ad.pid = source.pid;
|
|
ad.sid = source.sid.c_str();
|
|
ad.interfaceName = interface;
|
|
|
|
allowed = (selinux_check_access(source.sid.c_str(), targetContext, "hwservice_manager",
|
|
perm, (void *) &ad) == 0);
|
|
|
|
return allowed;
|
|
}
|
|
|
|
bool AccessControl::checkPermission(const CallingContext& source, const char *perm, const char *interface) {
|
|
char *targetContext = nullptr;
|
|
bool allowed = false;
|
|
|
|
// Lookup service in hwservice_contexts
|
|
if (selabel_lookup(mSeHandle, &targetContext, interface, 0) != 0) {
|
|
ALOGE("No match for interface %s in hwservice_contexts", interface);
|
|
return false;
|
|
}
|
|
|
|
allowed = checkPermission(source, targetContext, perm, interface);
|
|
|
|
freecon(targetContext);
|
|
|
|
return allowed;
|
|
}
|
|
|
|
int AccessControl::auditCallback(void *data, security_class_t /*cls*/, char *buf, size_t len) {
|
|
struct audit_data *ad = (struct audit_data *)data;
|
|
|
|
if (!ad || !ad->interfaceName) {
|
|
ALOGE("No valid hwservicemanager audit data");
|
|
return 0;
|
|
}
|
|
|
|
const char* sid = ad->sid ? ad->sid : "N/A";
|
|
|
|
snprintf(buf, len, "interface=%s sid=%s pid=%d", ad->interfaceName, sid, ad->pid);
|
|
return 0;
|
|
}
|
|
|
|
} // namespace android
|