Home | History | Annotate | Download | only in servicemanager
      1 /* Copyright 2008 The Android Open Source Project
      2  */
      3 
      4 #include <errno.h>
      5 #include <fcntl.h>
      6 #include <inttypes.h>
      7 #include <stdio.h>
      8 #include <stdlib.h>
      9 #include <string.h>
     10 
     11 #include <cutils/android_filesystem_config.h>
     12 #include <cutils/multiuser.h>
     13 
     14 #include <selinux/android.h>
     15 #include <selinux/avc.h>
     16 
     17 #include "binder.h"
     18 
     19 #ifdef VENDORSERVICEMANAGER
     20 #define LOG_TAG "VendorServiceManager"
     21 #else
     22 #define LOG_TAG "ServiceManager"
     23 #endif
     24 #include <log/log.h>
     25 
     26 struct audit_data {
     27     pid_t pid;
     28     uid_t uid;
     29     const char *name;
     30 };
     31 
     32 const char *str8(const uint16_t *x, size_t x_len)
     33 {
     34     static char buf[128];
     35     size_t max = 127;
     36     char *p = buf;
     37 
     38     if (x_len < max) {
     39         max = x_len;
     40     }
     41 
     42     if (x) {
     43         while ((max > 0) && (*x != '\0')) {
     44             *p++ = *x++;
     45             max--;
     46         }
     47     }
     48     *p++ = 0;
     49     return buf;
     50 }
     51 
     52 int str16eq(const uint16_t *a, const char *b)
     53 {
     54     while (*a && *b)
     55         if (*a++ != *b++) return 0;
     56     if (*a || *b)
     57         return 0;
     58     return 1;
     59 }
     60 
     61 static char *service_manager_context;
     62 static struct selabel_handle* sehandle;
     63 
     64 static bool check_mac_perms(pid_t spid, const char* sid, uid_t uid, const char *tctx, const char *perm, const char *name)
     65 {
     66     char *lookup_sid = NULL;
     67     const char *class = "service_manager";
     68     bool allowed;
     69     struct audit_data ad;
     70 
     71     if (sid == NULL && getpidcon(spid, &lookup_sid) < 0) {
     72         ALOGE("SELinux: getpidcon(pid=%d) failed to retrieve pid context.\n", spid);
     73         return false;
     74     }
     75 
     76     ad.pid = spid;
     77     ad.uid = uid;
     78     ad.name = name;
     79 
     80     if (sid == NULL) {
     81         android_errorWriteLog(0x534e4554, "121035042");
     82     }
     83 
     84     int result = selinux_check_access(sid ? sid : lookup_sid, tctx, class, perm, (void *) &ad);
     85     allowed = (result == 0);
     86 
     87     freecon(lookup_sid);
     88     return allowed;
     89 }
     90 
     91 static bool check_mac_perms_from_getcon(pid_t spid, const char* sid, uid_t uid, const char *perm)
     92 {
     93     return check_mac_perms(spid, sid, uid, service_manager_context, perm, NULL);
     94 }
     95 
     96 static bool check_mac_perms_from_lookup(pid_t spid, const char* sid, uid_t uid, const char *perm, const char *name)
     97 {
     98     bool allowed;
     99     char *tctx = NULL;
    100 
    101     if (!sehandle) {
    102         ALOGE("SELinux: Failed to find sehandle. Aborting service_manager.\n");
    103         abort();
    104     }
    105 
    106     if (selabel_lookup(sehandle, &tctx, name, 0) != 0) {
    107         ALOGE("SELinux: No match for %s in service_contexts.\n", name);
    108         return false;
    109     }
    110 
    111     allowed = check_mac_perms(spid, sid, uid, tctx, perm, name);
    112     freecon(tctx);
    113     return allowed;
    114 }
    115 
    116 static int svc_can_register(const uint16_t *name, size_t name_len, pid_t spid, const char* sid, uid_t uid)
    117 {
    118     const char *perm = "add";
    119 
    120     if (multiuser_get_app_id(uid) >= AID_APP) {
    121         return 0; /* Don't allow apps to register services */
    122     }
    123 
    124     return check_mac_perms_from_lookup(spid, sid, uid, perm, str8(name, name_len)) ? 1 : 0;
    125 }
    126 
    127 static int svc_can_list(pid_t spid, const char* sid, uid_t uid)
    128 {
    129     const char *perm = "list";
    130     return check_mac_perms_from_getcon(spid, sid, uid, perm) ? 1 : 0;
    131 }
    132 
    133 static int svc_can_find(const uint16_t *name, size_t name_len, pid_t spid, const char* sid, uid_t uid)
    134 {
    135     const char *perm = "find";
    136     return check_mac_perms_from_lookup(spid, sid, uid, perm, str8(name, name_len)) ? 1 : 0;
    137 }
    138 
    139 struct svcinfo
    140 {
    141     struct svcinfo *next;
    142     uint32_t handle;
    143     struct binder_death death;
    144     int allow_isolated;
    145     uint32_t dumpsys_priority;
    146     size_t len;
    147     uint16_t name[0];
    148 };
    149 
    150 struct svcinfo *svclist = NULL;
    151 
    152 struct svcinfo *find_svc(const uint16_t *s16, size_t len)
    153 {
    154     struct svcinfo *si;
    155 
    156     for (si = svclist; si; si = si->next) {
    157         if ((len == si->len) &&
    158             !memcmp(s16, si->name, len * sizeof(uint16_t))) {
    159             return si;
    160         }
    161     }
    162     return NULL;
    163 }
    164 
    165 void svcinfo_death(struct binder_state *bs, void *ptr)
    166 {
    167     struct svcinfo *si = (struct svcinfo* ) ptr;
    168 
    169     ALOGI("service '%s' died\n", str8(si->name, si->len));
    170     if (si->handle) {
    171         binder_release(bs, si->handle);
    172         si->handle = 0;
    173     }
    174 }
    175 
    176 uint16_t svcmgr_id[] = {
    177     'a','n','d','r','o','i','d','.','o','s','.',
    178     'I','S','e','r','v','i','c','e','M','a','n','a','g','e','r'
    179 };
    180 
    181 
    182 uint32_t do_find_service(const uint16_t *s, size_t len, uid_t uid, pid_t spid, const char* sid)
    183 {
    184     struct svcinfo *si = find_svc(s, len);
    185 
    186     if (!si || !si->handle) {
    187         return 0;
    188     }
    189 
    190     if (!si->allow_isolated) {
    191         // If this service doesn't allow access from isolated processes,
    192         // then check the uid to see if it is isolated.
    193         uid_t appid = uid % AID_USER;
    194         if (appid >= AID_ISOLATED_START && appid <= AID_ISOLATED_END) {
    195             return 0;
    196         }
    197     }
    198 
    199     if (!svc_can_find(s, len, spid, sid, uid)) {
    200         return 0;
    201     }
    202 
    203     return si->handle;
    204 }
    205 
    206 int do_add_service(struct binder_state *bs, const uint16_t *s, size_t len, uint32_t handle,
    207                    uid_t uid, int allow_isolated, uint32_t dumpsys_priority, pid_t spid, const char* sid) {
    208     struct svcinfo *si;
    209 
    210     //ALOGI("add_service('%s',%x,%s) uid=%d\n", str8(s, len), handle,
    211     //        allow_isolated ? "allow_isolated" : "!allow_isolated", uid);
    212 
    213     if (!handle || (len == 0) || (len > 127))
    214         return -1;
    215 
    216     if (!svc_can_register(s, len, spid, sid, uid)) {
    217         ALOGE("add_service('%s',%x) uid=%d - PERMISSION DENIED\n",
    218              str8(s, len), handle, uid);
    219         return -1;
    220     }
    221 
    222     si = find_svc(s, len);
    223     if (si) {
    224         if (si->handle) {
    225             ALOGE("add_service('%s',%x) uid=%d - ALREADY REGISTERED, OVERRIDE\n",
    226                  str8(s, len), handle, uid);
    227             svcinfo_death(bs, si);
    228         }
    229         si->handle = handle;
    230     } else {
    231         si = malloc(sizeof(*si) + (len + 1) * sizeof(uint16_t));
    232         if (!si) {
    233             ALOGE("add_service('%s',%x) uid=%d - OUT OF MEMORY\n",
    234                  str8(s, len), handle, uid);
    235             return -1;
    236         }
    237         si->handle = handle;
    238         si->len = len;
    239         memcpy(si->name, s, (len + 1) * sizeof(uint16_t));
    240         si->name[len] = '\0';
    241         si->death.func = (void*) svcinfo_death;
    242         si->death.ptr = si;
    243         si->allow_isolated = allow_isolated;
    244         si->dumpsys_priority = dumpsys_priority;
    245         si->next = svclist;
    246         svclist = si;
    247     }
    248 
    249     binder_acquire(bs, handle);
    250     binder_link_to_death(bs, handle, &si->death);
    251     return 0;
    252 }
    253 
    254 int svcmgr_handler(struct binder_state *bs,
    255                    struct binder_transaction_data_secctx *txn_secctx,
    256                    struct binder_io *msg,
    257                    struct binder_io *reply)
    258 {
    259     struct svcinfo *si;
    260     uint16_t *s;
    261     size_t len;
    262     uint32_t handle;
    263     uint32_t strict_policy;
    264     int allow_isolated;
    265     uint32_t dumpsys_priority;
    266 
    267     struct binder_transaction_data *txn = &txn_secctx->transaction_data;
    268 
    269     //ALOGI("target=%p code=%d pid=%d uid=%d\n",
    270     //      (void*) txn->target.ptr, txn->code, txn->sender_pid, txn->sender_euid);
    271 
    272     if (txn->target.ptr != BINDER_SERVICE_MANAGER)
    273         return -1;
    274 
    275     if (txn->code == PING_TRANSACTION)
    276         return 0;
    277 
    278     // Equivalent to Parcel::enforceInterface(), reading the RPC
    279     // header with the strict mode policy mask and the interface name.
    280     // Note that we ignore the strict_policy and don't propagate it
    281     // further (since we do no outbound RPCs anyway).
    282     strict_policy = bio_get_uint32(msg);
    283     bio_get_uint32(msg);  // Ignore worksource header.
    284     s = bio_get_string16(msg, &len);
    285     if (s == NULL) {
    286         return -1;
    287     }
    288 
    289     if ((len != (sizeof(svcmgr_id) / 2)) ||
    290         memcmp(svcmgr_id, s, sizeof(svcmgr_id))) {
    291         fprintf(stderr,"invalid id %s\n", str8(s, len));
    292         return -1;
    293     }
    294 
    295     if (sehandle && selinux_status_updated() > 0) {
    296 #ifdef VENDORSERVICEMANAGER
    297         struct selabel_handle *tmp_sehandle = selinux_android_vendor_service_context_handle();
    298 #else
    299         struct selabel_handle *tmp_sehandle = selinux_android_service_context_handle();
    300 #endif
    301         if (tmp_sehandle) {
    302             selabel_close(sehandle);
    303             sehandle = tmp_sehandle;
    304         }
    305     }
    306 
    307     switch(txn->code) {
    308     case SVC_MGR_GET_SERVICE:
    309     case SVC_MGR_CHECK_SERVICE:
    310         s = bio_get_string16(msg, &len);
    311         if (s == NULL) {
    312             return -1;
    313         }
    314         handle = do_find_service(s, len, txn->sender_euid, txn->sender_pid,
    315                                  (const char*) txn_secctx->secctx);
    316         if (!handle)
    317             break;
    318         bio_put_ref(reply, handle);
    319         return 0;
    320 
    321     case SVC_MGR_ADD_SERVICE:
    322         s = bio_get_string16(msg, &len);
    323         if (s == NULL) {
    324             return -1;
    325         }
    326         handle = bio_get_ref(msg);
    327         allow_isolated = bio_get_uint32(msg) ? 1 : 0;
    328         dumpsys_priority = bio_get_uint32(msg);
    329         if (do_add_service(bs, s, len, handle, txn->sender_euid, allow_isolated, dumpsys_priority,
    330                            txn->sender_pid, (const char*) txn_secctx->secctx))
    331             return -1;
    332         break;
    333 
    334     case SVC_MGR_LIST_SERVICES: {
    335         uint32_t n = bio_get_uint32(msg);
    336         uint32_t req_dumpsys_priority = bio_get_uint32(msg);
    337 
    338         if (!svc_can_list(txn->sender_pid, (const char*) txn_secctx->secctx, txn->sender_euid)) {
    339             ALOGE("list_service() uid=%d - PERMISSION DENIED\n",
    340                     txn->sender_euid);
    341             return -1;
    342         }
    343         si = svclist;
    344         // walk through the list of services n times skipping services that
    345         // do not support the requested priority
    346         while (si) {
    347             if (si->dumpsys_priority & req_dumpsys_priority) {
    348                 if (n == 0) break;
    349                 n--;
    350             }
    351             si = si->next;
    352         }
    353         if (si) {
    354             bio_put_string16(reply, si->name);
    355             return 0;
    356         }
    357         return -1;
    358     }
    359     default:
    360         ALOGE("unknown code %d\n", txn->code);
    361         return -1;
    362     }
    363 
    364     bio_put_uint32(reply, 0);
    365     return 0;
    366 }
    367 
    368 
    369 static int audit_callback(void *data, __unused security_class_t cls, char *buf, size_t len)
    370 {
    371     struct audit_data *ad = (struct audit_data *)data;
    372 
    373     if (!ad || !ad->name) {
    374         ALOGE("No service manager audit data");
    375         return 0;
    376     }
    377 
    378     snprintf(buf, len, "service=%s pid=%d uid=%d", ad->name, ad->pid, ad->uid);
    379     return 0;
    380 }
    381 
    382 int main(int argc, char** argv)
    383 {
    384     struct binder_state *bs;
    385     union selinux_callback cb;
    386     char *driver;
    387 
    388     if (argc > 1) {
    389         driver = argv[1];
    390     } else {
    391         driver = "/dev/binder";
    392     }
    393 
    394     bs = binder_open(driver, 128*1024);
    395     if (!bs) {
    396 #ifdef VENDORSERVICEMANAGER
    397         ALOGW("failed to open binder driver %s\n", driver);
    398         while (true) {
    399             sleep(UINT_MAX);
    400         }
    401 #else
    402         ALOGE("failed to open binder driver %s\n", driver);
    403 #endif
    404         return -1;
    405     }
    406 
    407     if (binder_become_context_manager(bs)) {
    408         ALOGE("cannot become context manager (%s)\n", strerror(errno));
    409         return -1;
    410     }
    411 
    412     cb.func_audit = audit_callback;
    413     selinux_set_callback(SELINUX_CB_AUDIT, cb);
    414 #ifdef VENDORSERVICEMANAGER
    415     cb.func_log = selinux_vendor_log_callback;
    416 #else
    417     cb.func_log = selinux_log_callback;
    418 #endif
    419     selinux_set_callback(SELINUX_CB_LOG, cb);
    420 
    421 #ifdef VENDORSERVICEMANAGER
    422     sehandle = selinux_android_vendor_service_context_handle();
    423 #else
    424     sehandle = selinux_android_service_context_handle();
    425 #endif
    426     selinux_status_open(true);
    427 
    428     if (sehandle == NULL) {
    429         ALOGE("SELinux: Failed to acquire sehandle. Aborting.\n");
    430         abort();
    431     }
    432 
    433     if (getcon(&service_manager_context) != 0) {
    434         ALOGE("SELinux: Failed to acquire service_manager context. Aborting.\n");
    435         abort();
    436     }
    437 
    438 
    439     binder_loop(bs, svcmgr_handler);
    440 
    441     return 0;
    442 }
    443