/* * Copyright (C) 2017 The Android Open Source Project * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ #define LOG_TAG "hwservicemanager" #include #include #include #include "AccessControl.h" namespace android { static const char *kPermissionAdd = "add"; static const char *kPermissionGet = "find"; static const char *kPermissionList = "list"; struct audit_data { const char* interfaceName; const char* sid; pid_t pid; }; using android::FQName; AccessControl::AccessControl() { mSeHandle = selinux_android_hw_service_context_handle(); LOG_ALWAYS_FATAL_IF(mSeHandle == nullptr, "Failed to acquire SELinux handle."); if (getcon(&mSeContext) != 0) { LOG_ALWAYS_FATAL("Failed to acquire hwservicemanager context."); } selinux_status_open(true); mSeCallbacks.func_audit = AccessControl::auditCallback; selinux_set_callback(SELINUX_CB_AUDIT, mSeCallbacks); mSeCallbacks.func_log = selinux_log_callback; /* defined in libselinux */ selinux_set_callback(SELINUX_CB_LOG, mSeCallbacks); } bool AccessControl::canAdd(const std::string& fqName, const CallingContext& callingContext) { FQName fqIface; if (!FQName::parse(fqName, &fqIface)) { return false; } const std::string checkName = fqIface.package() + "::" + fqIface.name(); return checkPermission(callingContext, kPermissionAdd, checkName.c_str()); } bool AccessControl::canGet(const std::string& fqName, const CallingContext& callingContext) { FQName fqIface; if (!FQName::parse(fqName, &fqIface)) { return false; } const std::string checkName = fqIface.package() + "::" + fqIface.name(); return checkPermission(callingContext, kPermissionGet, checkName.c_str()); } bool AccessControl::canList(const CallingContext& callingContext) { return checkPermission(callingContext, mSeContext, kPermissionList, nullptr); } AccessControl::CallingContext AccessControl::getCallingContext(pid_t sourcePid) { char *sourceContext = nullptr; if (getpidcon(sourcePid, &sourceContext) < 0) { ALOGE("SELinux: failed to retrieve process context for pid %d", sourcePid); return { false, "", sourcePid }; } std::string context = sourceContext; freecon(sourceContext); return { true, context, sourcePid }; } bool AccessControl::checkPermission(const CallingContext& source, const char *targetContext, const char *perm, const char *interface) { if (!source.sidPresent) { return false; } bool allowed = false; struct audit_data ad; ad.pid = source.pid; ad.sid = source.sid.c_str(); ad.interfaceName = interface; allowed = (selinux_check_access(source.sid.c_str(), targetContext, "hwservice_manager", perm, (void *) &ad) == 0); return allowed; } bool AccessControl::checkPermission(const CallingContext& source, const char *perm, const char *interface) { char *targetContext = nullptr; bool allowed = false; // Lookup service in hwservice_contexts if (selabel_lookup(mSeHandle, &targetContext, interface, 0) != 0) { ALOGE("No match for interface %s in hwservice_contexts", interface); return false; } allowed = checkPermission(source, targetContext, perm, interface); freecon(targetContext); return allowed; } int AccessControl::auditCallback(void *data, security_class_t /*cls*/, char *buf, size_t len) { struct audit_data *ad = (struct audit_data *)data; if (!ad || !ad->interfaceName) { ALOGE("No valid hwservicemanager audit data"); return 0; } const char* sid = ad->sid ? ad->sid : "N/A"; snprintf(buf, len, "interface=%s sid=%s pid=%d", ad->interfaceName, sid, ad->pid); return 0; } } // namespace android