145 lines
		
	
	
		
			4.3 KiB
		
	
	
	
		
			C++
		
	
	
	
			
		
		
	
	
			145 lines
		
	
	
		
			4.3 KiB
		
	
	
	
		
			C++
		
	
	
	
| /*
 | |
|  * Copyright (C) 2017 The Android Open Source Project
 | |
|  *
 | |
|  * Licensed under the Apache License, Version 2.0 (the "License");
 | |
|  * you may not use this file except in compliance with the License.
 | |
|  * You may obtain a copy of the License at
 | |
|  *
 | |
|  *      http://www.apache.org/licenses/LICENSE-2.0
 | |
|  *
 | |
|  * Unless required by applicable law or agreed to in writing, software
 | |
|  * distributed under the License is distributed on an "AS IS" BASIS,
 | |
|  * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | |
|  * See the License for the specific language governing permissions and
 | |
|  * limitations under the License.
 | |
|  */
 | |
| 
 | |
| #define LOG_TAG "hwservicemanager"
 | |
| 
 | |
| #include <android-base/logging.h>
 | |
| #include <hidl-util/FQName.h>
 | |
| #include <log/log.h>
 | |
| 
 | |
| #include "AccessControl.h"
 | |
| 
 | |
| namespace android {
 | |
| 
 | |
| static const char *kPermissionAdd = "add";
 | |
| static const char *kPermissionGet = "find";
 | |
| static const char *kPermissionList = "list";
 | |
| 
 | |
| struct audit_data {
 | |
|     const char* interfaceName;
 | |
|     const char* sid;
 | |
|     pid_t       pid;
 | |
| };
 | |
| 
 | |
| using android::FQName;
 | |
| 
 | |
| AccessControl::AccessControl() {
 | |
|     mSeHandle = selinux_android_hw_service_context_handle();
 | |
|     LOG_ALWAYS_FATAL_IF(mSeHandle == nullptr, "Failed to acquire SELinux handle.");
 | |
| 
 | |
|     if (getcon(&mSeContext) != 0) {
 | |
|         LOG_ALWAYS_FATAL("Failed to acquire hwservicemanager context.");
 | |
|     }
 | |
| 
 | |
|     selinux_status_open(true);
 | |
| 
 | |
|     mSeCallbacks.func_audit = AccessControl::auditCallback;
 | |
|     selinux_set_callback(SELINUX_CB_AUDIT, mSeCallbacks);
 | |
| 
 | |
|     mSeCallbacks.func_log = selinux_log_callback; /* defined in libselinux */
 | |
|     selinux_set_callback(SELINUX_CB_LOG, mSeCallbacks);
 | |
| }
 | |
| 
 | |
| bool AccessControl::canAdd(const std::string& fqName, const CallingContext& callingContext) {
 | |
|     FQName fqIface;
 | |
| 
 | |
|     if (!FQName::parse(fqName, &fqIface)) {
 | |
|         return false;
 | |
|     }
 | |
|     const std::string checkName = fqIface.package() + "::" + fqIface.name();
 | |
| 
 | |
|     return checkPermission(callingContext, kPermissionAdd, checkName.c_str());
 | |
| }
 | |
| 
 | |
| bool AccessControl::canGet(const std::string& fqName, const CallingContext& callingContext) {
 | |
|     FQName fqIface;
 | |
| 
 | |
|     if (!FQName::parse(fqName, &fqIface)) {
 | |
|         return false;
 | |
|     }
 | |
|     const std::string checkName = fqIface.package() + "::" + fqIface.name();
 | |
| 
 | |
|     return checkPermission(callingContext, kPermissionGet, checkName.c_str());
 | |
| }
 | |
| 
 | |
| bool AccessControl::canList(const CallingContext& callingContext) {
 | |
|     return checkPermission(callingContext, mSeContext, kPermissionList, nullptr);
 | |
| }
 | |
| 
 | |
| AccessControl::CallingContext AccessControl::getCallingContext(pid_t sourcePid) {
 | |
|     char *sourceContext = nullptr;
 | |
| 
 | |
|     if (getpidcon(sourcePid, &sourceContext) < 0) {
 | |
|         ALOGE("SELinux: failed to retrieve process context for pid %d", sourcePid);
 | |
|         return { false, "", sourcePid };
 | |
|     }
 | |
| 
 | |
|     std::string context = sourceContext;
 | |
|     freecon(sourceContext);
 | |
|     return { true, context, sourcePid };
 | |
| }
 | |
| 
 | |
| bool AccessControl::checkPermission(const CallingContext& source, const char *targetContext, const char *perm, const char *interface) {
 | |
|     if (!source.sidPresent) {
 | |
|         return false;
 | |
|     }
 | |
| 
 | |
|     bool allowed = false;
 | |
| 
 | |
|     struct audit_data ad;
 | |
|     ad.pid = source.pid;
 | |
|     ad.sid = source.sid.c_str();
 | |
|     ad.interfaceName = interface;
 | |
| 
 | |
|     allowed = (selinux_check_access(source.sid.c_str(), targetContext, "hwservice_manager",
 | |
|                                     perm, (void *) &ad) == 0);
 | |
| 
 | |
|     return allowed;
 | |
| }
 | |
| 
 | |
| bool AccessControl::checkPermission(const CallingContext& source, const char *perm, const char *interface) {
 | |
|     char *targetContext = nullptr;
 | |
|     bool allowed = false;
 | |
| 
 | |
|     // Lookup service in hwservice_contexts
 | |
|     if (selabel_lookup(mSeHandle, &targetContext, interface, 0) != 0) {
 | |
|         ALOGE("No match for interface %s in hwservice_contexts", interface);
 | |
|         return false;
 | |
|     }
 | |
| 
 | |
|     allowed = checkPermission(source, targetContext, perm, interface);
 | |
| 
 | |
|     freecon(targetContext);
 | |
| 
 | |
|     return allowed;
 | |
| }
 | |
| 
 | |
| int AccessControl::auditCallback(void *data, security_class_t /*cls*/, char *buf, size_t len) {
 | |
|     struct audit_data *ad = (struct audit_data *)data;
 | |
| 
 | |
|     if (!ad || !ad->interfaceName) {
 | |
|         ALOGE("No valid hwservicemanager audit data");
 | |
|         return 0;
 | |
|     }
 | |
| 
 | |
|     const char* sid = ad->sid ? ad->sid : "N/A";
 | |
| 
 | |
|     snprintf(buf, len, "interface=%s sid=%s pid=%d", ad->interfaceName, sid, ad->pid);
 | |
|     return 0;
 | |
| }
 | |
| 
 | |
| } // namespace android
 |