diff options
Diffstat (limited to 'services/core/java/com/android/server/firewall/IntentFirewall.java')
-rw-r--r-- | services/core/java/com/android/server/firewall/IntentFirewall.java | 601 |
1 files changed, 601 insertions, 0 deletions
diff --git a/services/core/java/com/android/server/firewall/IntentFirewall.java b/services/core/java/com/android/server/firewall/IntentFirewall.java new file mode 100644 index 0000000..aaa0b58 --- /dev/null +++ b/services/core/java/com/android/server/firewall/IntentFirewall.java @@ -0,0 +1,601 @@ +/* + * Copyright (C) 2013 The Android Open Source Project + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package com.android.server.firewall; + +import android.app.AppGlobals; +import android.content.ComponentName; +import android.content.Intent; +import android.content.IntentFilter; +import android.content.pm.ApplicationInfo; +import android.content.pm.IPackageManager; +import android.content.pm.PackageManager; +import android.os.Environment; +import android.os.FileObserver; +import android.os.Handler; +import android.os.Message; +import android.os.RemoteException; +import android.util.ArrayMap; +import android.util.Slog; +import android.util.Xml; +import com.android.internal.util.ArrayUtils; +import com.android.internal.util.XmlUtils; +import com.android.server.EventLogTags; +import com.android.server.IntentResolver; +import org.xmlpull.v1.XmlPullParser; +import org.xmlpull.v1.XmlPullParserException; + +import java.io.File; +import java.io.FileInputStream; +import java.io.FileNotFoundException; +import java.io.IOException; +import java.util.ArrayList; +import java.util.Arrays; +import java.util.HashMap; +import java.util.List; + +public class IntentFirewall { + static final String TAG = "IntentFirewall"; + + // e.g. /data/system/ifw or /data/secure/system/ifw + private static final File RULES_DIR = new File(Environment.getSystemSecureDirectory(), "ifw"); + + private static final int LOG_PACKAGES_MAX_LENGTH = 150; + private static final int LOG_PACKAGES_SUFFICIENT_LENGTH = 125; + + private static final String TAG_RULES = "rules"; + private static final String TAG_ACTIVITY = "activity"; + private static final String TAG_SERVICE = "service"; + private static final String TAG_BROADCAST = "broadcast"; + + private static final int TYPE_ACTIVITY = 0; + private static final int TYPE_BROADCAST = 1; + private static final int TYPE_SERVICE = 2; + + private static final HashMap<String, FilterFactory> factoryMap; + + private final AMSInterface mAms; + + private final RuleObserver mObserver; + + private FirewallIntentResolver mActivityResolver = new FirewallIntentResolver(); + private FirewallIntentResolver mBroadcastResolver = new FirewallIntentResolver(); + private FirewallIntentResolver mServiceResolver = new FirewallIntentResolver(); + + static { + FilterFactory[] factories = new FilterFactory[] { + AndFilter.FACTORY, + OrFilter.FACTORY, + NotFilter.FACTORY, + + StringFilter.ACTION, + StringFilter.COMPONENT, + StringFilter.COMPONENT_NAME, + StringFilter.COMPONENT_PACKAGE, + StringFilter.DATA, + StringFilter.HOST, + StringFilter.MIME_TYPE, + StringFilter.SCHEME, + StringFilter.PATH, + StringFilter.SSP, + + CategoryFilter.FACTORY, + SenderFilter.FACTORY, + SenderPermissionFilter.FACTORY, + PortFilter.FACTORY + }; + + // load factor ~= .75 + factoryMap = new HashMap<String, FilterFactory>(factories.length * 4 / 3); + for (int i=0; i<factories.length; i++) { + FilterFactory factory = factories[i]; + factoryMap.put(factory.getTagName(), factory); + } + } + + public IntentFirewall(AMSInterface ams) { + mAms = ams; + File rulesDir = getRulesDir(); + rulesDir.mkdirs(); + + readRulesDir(rulesDir); + + mObserver = new RuleObserver(rulesDir); + mObserver.startWatching(); + } + + /** + * This is called from ActivityManager to check if a start activity intent should be allowed. + * It is assumed the caller is already holding the global ActivityManagerService lock. + */ + public boolean checkStartActivity(Intent intent, int callerUid, int callerPid, + String resolvedType, ApplicationInfo resolvedApp) { + return checkIntent(mActivityResolver, intent.getComponent(), TYPE_ACTIVITY, intent, + callerUid, callerPid, resolvedType, resolvedApp.uid); + } + + public boolean checkService(ComponentName resolvedService, Intent intent, int callerUid, + int callerPid, String resolvedType, ApplicationInfo resolvedApp) { + return checkIntent(mServiceResolver, resolvedService, TYPE_SERVICE, intent, callerUid, + callerPid, resolvedType, resolvedApp.uid); + } + + public boolean checkBroadcast(Intent intent, int callerUid, int callerPid, + String resolvedType, int receivingUid) { + return checkIntent(mBroadcastResolver, intent.getComponent(), TYPE_BROADCAST, intent, + callerUid, callerPid, resolvedType, receivingUid); + } + + public boolean checkIntent(FirewallIntentResolver resolver, ComponentName resolvedComponent, + int intentType, Intent intent, int callerUid, int callerPid, String resolvedType, + int receivingUid) { + boolean log = false; + boolean block = false; + + // For the first pass, find all the rules that have at least one intent-filter or + // component-filter that matches this intent + List<Rule> candidateRules; + candidateRules = resolver.queryIntent(intent, resolvedType, false, 0); + if (candidateRules == null) { + candidateRules = new ArrayList<Rule>(); + } + resolver.queryByComponent(resolvedComponent, candidateRules); + + // For the second pass, try to match the potentially more specific conditions in each + // rule against the intent + for (int i=0; i<candidateRules.size(); i++) { + Rule rule = candidateRules.get(i); + if (rule.matches(this, resolvedComponent, intent, callerUid, callerPid, resolvedType, + receivingUid)) { + block |= rule.getBlock(); + log |= rule.getLog(); + + // if we've already determined that we should both block and log, there's no need + // to continue trying rules + if (block && log) { + break; + } + } + } + + if (log) { + logIntent(intentType, intent, callerUid, resolvedType); + } + + return !block; + } + + private static void logIntent(int intentType, Intent intent, int callerUid, + String resolvedType) { + // The component shouldn't be null, but let's double check just to be safe + ComponentName cn = intent.getComponent(); + String shortComponent = null; + if (cn != null) { + shortComponent = cn.flattenToShortString(); + } + + String callerPackages = null; + int callerPackageCount = 0; + IPackageManager pm = AppGlobals.getPackageManager(); + if (pm != null) { + try { + String[] callerPackagesArray = pm.getPackagesForUid(callerUid); + if (callerPackagesArray != null) { + callerPackageCount = callerPackagesArray.length; + callerPackages = joinPackages(callerPackagesArray); + } + } catch (RemoteException ex) { + Slog.e(TAG, "Remote exception while retrieving packages", ex); + } + } + + EventLogTags.writeIfwIntentMatched(intentType, shortComponent, callerUid, + callerPackageCount, callerPackages, intent.getAction(), resolvedType, + intent.getDataString(), intent.getFlags()); + } + + /** + * Joins a list of package names such that the resulting string is no more than + * LOG_PACKAGES_MAX_LENGTH. + * + * Only full package names will be added to the result, unless every package is longer than the + * limit, in which case one of the packages will be truncated and added. In this case, an + * additional '-' character will be added to the end of the string, to denote the truncation. + * + * If it encounters a package that won't fit in the remaining space, it will continue on to the + * next package, unless the total length of the built string so far is greater than + * LOG_PACKAGES_SUFFICIENT_LENGTH, in which case it will stop and return what it has. + */ + private static String joinPackages(String[] packages) { + boolean first = true; + StringBuilder sb = new StringBuilder(); + for (int i=0; i<packages.length; i++) { + String pkg = packages[i]; + + // + 1 length for the comma. This logic technically isn't correct for the first entry, + // but it's not critical. + if (sb.length() + pkg.length() + 1 < LOG_PACKAGES_MAX_LENGTH) { + if (!first) { + sb.append(','); + } else { + first = false; + } + sb.append(pkg); + } else if (sb.length() >= LOG_PACKAGES_SUFFICIENT_LENGTH) { + return sb.toString(); + } + } + if (sb.length() == 0 && packages.length > 0) { + String pkg = packages[0]; + // truncating from the end - the last part of the package name is more likely to be + // interesting/unique + return pkg.substring(pkg.length() - LOG_PACKAGES_MAX_LENGTH + 1) + '-'; + } + return null; + } + + public static File getRulesDir() { + return RULES_DIR; + } + + /** + * Reads rules from all xml files (*.xml) in the given directory, and replaces our set of rules + * with the newly read rules. + * + * We only check for files ending in ".xml", to allow for temporary files that are atomically + * renamed to .xml + * + * All calls to this method from the file observer come through a handler and are inherently + * serialized + */ + private void readRulesDir(File rulesDir) { + FirewallIntentResolver[] resolvers = new FirewallIntentResolver[3]; + for (int i=0; i<resolvers.length; i++) { + resolvers[i] = new FirewallIntentResolver(); + } + + File[] files = rulesDir.listFiles(); + for (int i=0; i<files.length; i++) { + File file = files[i]; + + if (file.getName().endsWith(".xml")) { + readRules(file, resolvers); + } + } + + Slog.i(TAG, "Read new rules (A:" + resolvers[TYPE_ACTIVITY].filterSet().size() + + " B:" + resolvers[TYPE_BROADCAST].filterSet().size() + + " S:" + resolvers[TYPE_SERVICE].filterSet().size() + ")"); + + synchronized (mAms.getAMSLock()) { + mActivityResolver = resolvers[TYPE_ACTIVITY]; + mBroadcastResolver = resolvers[TYPE_BROADCAST]; + mServiceResolver = resolvers[TYPE_SERVICE]; + } + } + + /** + * Reads rules from the given file and add them to the given resolvers + */ + private void readRules(File rulesFile, FirewallIntentResolver[] resolvers) { + // some temporary lists to hold the rules while we parse the xml file, so that we can + // add the rules all at once, after we know there weren't any major structural problems + // with the xml file + List<List<Rule>> rulesByType = new ArrayList<List<Rule>>(3); + for (int i=0; i<3; i++) { + rulesByType.add(new ArrayList<Rule>()); + } + + FileInputStream fis; + try { + fis = new FileInputStream(rulesFile); + } catch (FileNotFoundException ex) { + // Nope, no rules. Nothing else to do! + return; + } + + try { + XmlPullParser parser = Xml.newPullParser(); + + parser.setInput(fis, null); + + XmlUtils.beginDocument(parser, TAG_RULES); + + int outerDepth = parser.getDepth(); + while (XmlUtils.nextElementWithin(parser, outerDepth)) { + int ruleType = -1; + + String tagName = parser.getName(); + if (tagName.equals(TAG_ACTIVITY)) { + ruleType = TYPE_ACTIVITY; + } else if (tagName.equals(TAG_BROADCAST)) { + ruleType = TYPE_BROADCAST; + } else if (tagName.equals(TAG_SERVICE)) { + ruleType = TYPE_SERVICE; + } + + if (ruleType != -1) { + Rule rule = new Rule(); + + List<Rule> rules = rulesByType.get(ruleType); + + // if we get an error while parsing a particular rule, we'll just ignore + // that rule and continue on with the next rule + try { + rule.readFromXml(parser); + } catch (XmlPullParserException ex) { + Slog.e(TAG, "Error reading an intent firewall rule from " + rulesFile, ex); + continue; + } + + rules.add(rule); + } + } + } catch (XmlPullParserException ex) { + // if there was an error outside of a specific rule, then there are probably + // structural problems with the xml file, and we should completely ignore it + Slog.e(TAG, "Error reading intent firewall rules from " + rulesFile, ex); + return; + } catch (IOException ex) { + Slog.e(TAG, "Error reading intent firewall rules from " + rulesFile, ex); + return; + } finally { + try { + fis.close(); + } catch (IOException ex) { + Slog.e(TAG, "Error while closing " + rulesFile, ex); + } + } + + for (int ruleType=0; ruleType<rulesByType.size(); ruleType++) { + List<Rule> rules = rulesByType.get(ruleType); + FirewallIntentResolver resolver = resolvers[ruleType]; + + for (int ruleIndex=0; ruleIndex<rules.size(); ruleIndex++) { + Rule rule = rules.get(ruleIndex); + for (int i=0; i<rule.getIntentFilterCount(); i++) { + resolver.addFilter(rule.getIntentFilter(i)); + } + for (int i=0; i<rule.getComponentFilterCount(); i++) { + resolver.addComponentFilter(rule.getComponentFilter(i), rule); + } + } + } + } + + static Filter parseFilter(XmlPullParser parser) throws IOException, XmlPullParserException { + String elementName = parser.getName(); + + FilterFactory factory = factoryMap.get(elementName); + + if (factory == null) { + throw new XmlPullParserException("Unknown element in filter list: " + elementName); + } + return factory.newFilter(parser); + } + + /** + * Represents a single activity/service/broadcast rule within one of the xml files. + * + * Rules are matched against an incoming intent in two phases. The goal of the first phase + * is to select a subset of rules that might match a given intent. + * + * For the first phase, we use a combination of intent filters (via an IntentResolver) + * and component filters to select which rules to check. If a rule has multiple intent or + * component filters, only a single filter must match for the rule to be passed on to the + * second phase. + * + * In the second phase, we check the specific conditions in each rule against the values in the + * intent. All top level conditions (but not filters) in the rule must match for the rule as a + * whole to match. + * + * If the rule matches, then we block or log the intent, as specified by the rule. If multiple + * rules match, we combine the block/log flags from any matching rule. + */ + private static class Rule extends AndFilter { + private static final String TAG_INTENT_FILTER = "intent-filter"; + private static final String TAG_COMPONENT_FILTER = "component-filter"; + private static final String ATTR_NAME = "name"; + + private static final String ATTR_BLOCK = "block"; + private static final String ATTR_LOG = "log"; + + private final ArrayList<FirewallIntentFilter> mIntentFilters = + new ArrayList<FirewallIntentFilter>(1); + private final ArrayList<ComponentName> mComponentFilters = new ArrayList<ComponentName>(0); + private boolean block; + private boolean log; + + @Override + public Rule readFromXml(XmlPullParser parser) throws IOException, XmlPullParserException { + block = Boolean.parseBoolean(parser.getAttributeValue(null, ATTR_BLOCK)); + log = Boolean.parseBoolean(parser.getAttributeValue(null, ATTR_LOG)); + + super.readFromXml(parser); + return this; + } + + @Override + protected void readChild(XmlPullParser parser) throws IOException, XmlPullParserException { + String currentTag = parser.getName(); + + if (currentTag.equals(TAG_INTENT_FILTER)) { + FirewallIntentFilter intentFilter = new FirewallIntentFilter(this); + intentFilter.readFromXml(parser); + mIntentFilters.add(intentFilter); + } else if (currentTag.equals(TAG_COMPONENT_FILTER)) { + String componentStr = parser.getAttributeValue(null, ATTR_NAME); + if (componentStr == null) { + throw new XmlPullParserException("Component name must be specified.", + parser, null); + } + + ComponentName componentName = ComponentName.unflattenFromString(componentStr); + if (componentName == null) { + throw new XmlPullParserException("Invalid component name: " + componentStr); + } + + mComponentFilters.add(componentName); + } else { + super.readChild(parser); + } + } + + public int getIntentFilterCount() { + return mIntentFilters.size(); + } + + public FirewallIntentFilter getIntentFilter(int index) { + return mIntentFilters.get(index); + } + + public int getComponentFilterCount() { + return mComponentFilters.size(); + } + + public ComponentName getComponentFilter(int index) { + return mComponentFilters.get(index); + } + public boolean getBlock() { + return block; + } + + public boolean getLog() { + return log; + } + } + + private static class FirewallIntentFilter extends IntentFilter { + private final Rule rule; + + public FirewallIntentFilter(Rule rule) { + this.rule = rule; + } + } + + private static class FirewallIntentResolver + extends IntentResolver<FirewallIntentFilter, Rule> { + @Override + protected boolean allowFilterResult(FirewallIntentFilter filter, List<Rule> dest) { + return !dest.contains(filter.rule); + } + + @Override + protected boolean isPackageForFilter(String packageName, FirewallIntentFilter filter) { + return true; + } + + @Override + protected FirewallIntentFilter[] newArray(int size) { + return new FirewallIntentFilter[size]; + } + + @Override + protected Rule newResult(FirewallIntentFilter filter, int match, int userId) { + return filter.rule; + } + + @Override + protected void sortResults(List<Rule> results) { + // there's no need to sort the results + return; + } + + public void queryByComponent(ComponentName componentName, List<Rule> candidateRules) { + Rule[] rules = mRulesByComponent.get(componentName); + if (rules != null) { + candidateRules.addAll(Arrays.asList(rules)); + } + } + + public void addComponentFilter(ComponentName componentName, Rule rule) { + Rule[] rules = mRulesByComponent.get(componentName); + rules = ArrayUtils.appendElement(Rule.class, rules, rule); + mRulesByComponent.put(componentName, rules); + } + + private final ArrayMap<ComponentName, Rule[]> mRulesByComponent = + new ArrayMap<ComponentName, Rule[]>(0); + } + + final Handler mHandler = new Handler() { + @Override + public void handleMessage(Message msg) { + readRulesDir(getRulesDir()); + } + }; + + /** + * Monitors for the creation/deletion/modification of any .xml files in the rule directory + */ + private class RuleObserver extends FileObserver { + private static final int MONITORED_EVENTS = FileObserver.CREATE|FileObserver.MOVED_TO| + FileObserver.CLOSE_WRITE|FileObserver.DELETE|FileObserver.MOVED_FROM; + + public RuleObserver(File monitoredDir) { + super(monitoredDir.getAbsolutePath(), MONITORED_EVENTS); + } + + @Override + public void onEvent(int event, String path) { + if (path.endsWith(".xml")) { + // we wait 250ms before taking any action on an event, in order to dedup multiple + // events. E.g. a delete event followed by a create event followed by a subsequent + // write+close event + mHandler.removeMessages(0); + mHandler.sendEmptyMessageDelayed(0, 250); + } + } + } + + /** + * This interface contains the methods we need from ActivityManagerService. This allows AMS to + * export these methods to us without making them public, and also makes it easier to test this + * component. + */ + public interface AMSInterface { + int checkComponentPermission(String permission, int pid, int uid, + int owningUid, boolean exported); + Object getAMSLock(); + } + + /** + * Checks if the caller has access to a component + * + * @param permission If present, the caller must have this permission + * @param pid The pid of the caller + * @param uid The uid of the caller + * @param owningUid The uid of the application that owns the component + * @param exported Whether the component is exported + * @return True if the caller can access the described component + */ + boolean checkComponentPermission(String permission, int pid, int uid, int owningUid, + boolean exported) { + return mAms.checkComponentPermission(permission, pid, uid, owningUid, exported) == + PackageManager.PERMISSION_GRANTED; + } + + boolean signaturesMatch(int uid1, int uid2) { + try { + IPackageManager pm = AppGlobals.getPackageManager(); + return pm.checkUidSignatures(uid1, uid2) == PackageManager.SIGNATURE_MATCH; + } catch (RemoteException ex) { + Slog.e(TAG, "Remote exception while checking signatures", ex); + return false; + } + } + +} |