/*
|
* Copyright (C) 2013 The Android Open Source Project
|
*
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
* you may not use this file except in compliance with the License.
|
* You may obtain a copy of the License at
|
*
|
* http://www.apache.org/licenses/LICENSE-2.0
|
*
|
* Unless required by applicable law or agreed to in writing, software
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
* See the License for the specific language governing permissions and
|
* limitations under the License.
|
*/
|
|
package com.android.server.firewall;
|
|
import android.app.AppGlobals;
|
import android.content.ComponentName;
|
import android.content.Intent;
|
import android.content.IntentFilter;
|
import android.content.pm.ApplicationInfo;
|
import android.content.pm.IPackageManager;
|
import android.content.pm.PackageManager;
|
import android.os.Environment;
|
import android.os.FileObserver;
|
import android.os.Handler;
|
import android.os.Looper;
|
import android.os.Message;
|
import android.os.RemoteException;
|
import android.util.ArrayMap;
|
import android.util.Slog;
|
import android.util.Xml;
|
import com.android.internal.util.ArrayUtils;
|
import com.android.internal.util.XmlUtils;
|
import com.android.server.EventLogTags;
|
import com.android.server.IntentResolver;
|
import org.xmlpull.v1.XmlPullParser;
|
import org.xmlpull.v1.XmlPullParserException;
|
|
import java.io.File;
|
import java.io.FileInputStream;
|
import java.io.FileNotFoundException;
|
import java.io.IOException;
|
import java.util.ArrayList;
|
import java.util.Arrays;
|
import java.util.HashMap;
|
import java.util.List;
|
|
public class IntentFirewall {
|
static final String TAG = "IntentFirewall";
|
|
// e.g. /data/system/ifw or /data/secure/system/ifw
|
private static final File RULES_DIR = new File(Environment.getDataSystemDirectory(), "ifw");
|
|
private static final int LOG_PACKAGES_MAX_LENGTH = 150;
|
private static final int LOG_PACKAGES_SUFFICIENT_LENGTH = 125;
|
|
private static final String TAG_RULES = "rules";
|
private static final String TAG_ACTIVITY = "activity";
|
private static final String TAG_SERVICE = "service";
|
private static final String TAG_BROADCAST = "broadcast";
|
|
private static final int TYPE_ACTIVITY = 0;
|
private static final int TYPE_BROADCAST = 1;
|
private static final int TYPE_SERVICE = 2;
|
|
private static final HashMap<String, FilterFactory> factoryMap;
|
|
private final AMSInterface mAms;
|
|
private final RuleObserver mObserver;
|
|
private FirewallIntentResolver mActivityResolver = new FirewallIntentResolver();
|
private FirewallIntentResolver mBroadcastResolver = new FirewallIntentResolver();
|
private FirewallIntentResolver mServiceResolver = new FirewallIntentResolver();
|
|
static {
|
FilterFactory[] factories = new FilterFactory[] {
|
AndFilter.FACTORY,
|
OrFilter.FACTORY,
|
NotFilter.FACTORY,
|
|
StringFilter.ACTION,
|
StringFilter.COMPONENT,
|
StringFilter.COMPONENT_NAME,
|
StringFilter.COMPONENT_PACKAGE,
|
StringFilter.DATA,
|
StringFilter.HOST,
|
StringFilter.MIME_TYPE,
|
StringFilter.SCHEME,
|
StringFilter.PATH,
|
StringFilter.SSP,
|
|
CategoryFilter.FACTORY,
|
SenderFilter.FACTORY,
|
SenderPackageFilter.FACTORY,
|
SenderPermissionFilter.FACTORY,
|
PortFilter.FACTORY
|
};
|
|
// load factor ~= .75
|
factoryMap = new HashMap<String, FilterFactory>(factories.length * 4 / 3);
|
for (int i=0; i<factories.length; i++) {
|
FilterFactory factory = factories[i];
|
factoryMap.put(factory.getTagName(), factory);
|
}
|
}
|
|
public IntentFirewall(AMSInterface ams, Handler handler) {
|
mAms = ams;
|
mHandler = new FirewallHandler(handler.getLooper());
|
File rulesDir = getRulesDir();
|
rulesDir.mkdirs();
|
|
readRulesDir(rulesDir);
|
|
mObserver = new RuleObserver(rulesDir);
|
mObserver.startWatching();
|
}
|
|
/**
|
* This is called from ActivityManager to check if a start activity intent should be allowed.
|
* It is assumed the caller is already holding the global ActivityManagerService lock.
|
*/
|
public boolean checkStartActivity(Intent intent, int callerUid, int callerPid,
|
String resolvedType, ApplicationInfo resolvedApp) {
|
return checkIntent(mActivityResolver, intent.getComponent(), TYPE_ACTIVITY, intent,
|
callerUid, callerPid, resolvedType, resolvedApp.uid);
|
}
|
|
public boolean checkService(ComponentName resolvedService, Intent intent, int callerUid,
|
int callerPid, String resolvedType, ApplicationInfo resolvedApp) {
|
return checkIntent(mServiceResolver, resolvedService, TYPE_SERVICE, intent, callerUid,
|
callerPid, resolvedType, resolvedApp.uid);
|
}
|
|
public boolean checkBroadcast(Intent intent, int callerUid, int callerPid,
|
String resolvedType, int receivingUid) {
|
return checkIntent(mBroadcastResolver, intent.getComponent(), TYPE_BROADCAST, intent,
|
callerUid, callerPid, resolvedType, receivingUid);
|
}
|
|
public boolean checkIntent(FirewallIntentResolver resolver, ComponentName resolvedComponent,
|
int intentType, Intent intent, int callerUid, int callerPid, String resolvedType,
|
int receivingUid) {
|
boolean log = false;
|
boolean block = false;
|
|
// For the first pass, find all the rules that have at least one intent-filter or
|
// component-filter that matches this intent
|
List<Rule> candidateRules;
|
candidateRules = resolver.queryIntent(intent, resolvedType, false /*defaultOnly*/, 0);
|
if (candidateRules == null) {
|
candidateRules = new ArrayList<Rule>();
|
}
|
resolver.queryByComponent(resolvedComponent, candidateRules);
|
|
// For the second pass, try to match the potentially more specific conditions in each
|
// rule against the intent
|
for (int i=0; i<candidateRules.size(); i++) {
|
Rule rule = candidateRules.get(i);
|
if (rule.matches(this, resolvedComponent, intent, callerUid, callerPid, resolvedType,
|
receivingUid)) {
|
block |= rule.getBlock();
|
log |= rule.getLog();
|
|
// if we've already determined that we should both block and log, there's no need
|
// to continue trying rules
|
if (block && log) {
|
break;
|
}
|
}
|
}
|
|
if (log) {
|
logIntent(intentType, intent, callerUid, resolvedType);
|
}
|
|
return !block;
|
}
|
|
private static void logIntent(int intentType, Intent intent, int callerUid,
|
String resolvedType) {
|
// The component shouldn't be null, but let's double check just to be safe
|
ComponentName cn = intent.getComponent();
|
String shortComponent = null;
|
if (cn != null) {
|
shortComponent = cn.flattenToShortString();
|
}
|
|
String callerPackages = null;
|
int callerPackageCount = 0;
|
IPackageManager pm = AppGlobals.getPackageManager();
|
if (pm != null) {
|
try {
|
String[] callerPackagesArray = pm.getPackagesForUid(callerUid);
|
if (callerPackagesArray != null) {
|
callerPackageCount = callerPackagesArray.length;
|
callerPackages = joinPackages(callerPackagesArray);
|
}
|
} catch (RemoteException ex) {
|
Slog.e(TAG, "Remote exception while retrieving packages", ex);
|
}
|
}
|
|
EventLogTags.writeIfwIntentMatched(intentType, shortComponent, callerUid,
|
callerPackageCount, callerPackages, intent.getAction(), resolvedType,
|
intent.getDataString(), intent.getFlags());
|
}
|
|
/**
|
* Joins a list of package names such that the resulting string is no more than
|
* LOG_PACKAGES_MAX_LENGTH.
|
*
|
* Only full package names will be added to the result, unless every package is longer than the
|
* limit, in which case one of the packages will be truncated and added. In this case, an
|
* additional '-' character will be added to the end of the string, to denote the truncation.
|
*
|
* If it encounters a package that won't fit in the remaining space, it will continue on to the
|
* next package, unless the total length of the built string so far is greater than
|
* LOG_PACKAGES_SUFFICIENT_LENGTH, in which case it will stop and return what it has.
|
*/
|
private static String joinPackages(String[] packages) {
|
boolean first = true;
|
StringBuilder sb = new StringBuilder();
|
for (int i=0; i<packages.length; i++) {
|
String pkg = packages[i];
|
|
// + 1 length for the comma. This logic technically isn't correct for the first entry,
|
// but it's not critical.
|
if (sb.length() + pkg.length() + 1 < LOG_PACKAGES_MAX_LENGTH) {
|
if (!first) {
|
sb.append(',');
|
} else {
|
first = false;
|
}
|
sb.append(pkg);
|
} else if (sb.length() >= LOG_PACKAGES_SUFFICIENT_LENGTH) {
|
return sb.toString();
|
}
|
}
|
if (sb.length() == 0 && packages.length > 0) {
|
String pkg = packages[0];
|
// truncating from the end - the last part of the package name is more likely to be
|
// interesting/unique
|
return pkg.substring(pkg.length() - LOG_PACKAGES_MAX_LENGTH + 1) + '-';
|
}
|
return null;
|
}
|
|
public static File getRulesDir() {
|
return RULES_DIR;
|
}
|
|
/**
|
* Reads rules from all xml files (*.xml) in the given directory, and replaces our set of rules
|
* with the newly read rules.
|
*
|
* We only check for files ending in ".xml", to allow for temporary files that are atomically
|
* renamed to .xml
|
*
|
* All calls to this method from the file observer come through a handler and are inherently
|
* serialized
|
*/
|
private void readRulesDir(File rulesDir) {
|
FirewallIntentResolver[] resolvers = new FirewallIntentResolver[3];
|
for (int i=0; i<resolvers.length; i++) {
|
resolvers[i] = new FirewallIntentResolver();
|
}
|
|
File[] files = rulesDir.listFiles();
|
if (files != null) {
|
for (int i=0; i<files.length; i++) {
|
File file = files[i];
|
|
if (file.getName().endsWith(".xml")) {
|
readRules(file, resolvers);
|
}
|
}
|
}
|
|
Slog.i(TAG, "Read new rules (A:" + resolvers[TYPE_ACTIVITY].filterSet().size() +
|
" B:" + resolvers[TYPE_BROADCAST].filterSet().size() +
|
" S:" + resolvers[TYPE_SERVICE].filterSet().size() + ")");
|
|
synchronized (mAms.getAMSLock()) {
|
mActivityResolver = resolvers[TYPE_ACTIVITY];
|
mBroadcastResolver = resolvers[TYPE_BROADCAST];
|
mServiceResolver = resolvers[TYPE_SERVICE];
|
}
|
}
|
|
/**
|
* Reads rules from the given file and add them to the given resolvers
|
*/
|
private void readRules(File rulesFile, FirewallIntentResolver[] resolvers) {
|
// some temporary lists to hold the rules while we parse the xml file, so that we can
|
// add the rules all at once, after we know there weren't any major structural problems
|
// with the xml file
|
List<List<Rule>> rulesByType = new ArrayList<List<Rule>>(3);
|
for (int i=0; i<3; i++) {
|
rulesByType.add(new ArrayList<Rule>());
|
}
|
|
FileInputStream fis;
|
try {
|
fis = new FileInputStream(rulesFile);
|
} catch (FileNotFoundException ex) {
|
// Nope, no rules. Nothing else to do!
|
return;
|
}
|
|
try {
|
XmlPullParser parser = Xml.newPullParser();
|
|
parser.setInput(fis, null);
|
|
XmlUtils.beginDocument(parser, TAG_RULES);
|
|
int outerDepth = parser.getDepth();
|
while (XmlUtils.nextElementWithin(parser, outerDepth)) {
|
int ruleType = -1;
|
|
String tagName = parser.getName();
|
if (tagName.equals(TAG_ACTIVITY)) {
|
ruleType = TYPE_ACTIVITY;
|
} else if (tagName.equals(TAG_BROADCAST)) {
|
ruleType = TYPE_BROADCAST;
|
} else if (tagName.equals(TAG_SERVICE)) {
|
ruleType = TYPE_SERVICE;
|
}
|
|
if (ruleType != -1) {
|
Rule rule = new Rule();
|
|
List<Rule> rules = rulesByType.get(ruleType);
|
|
// if we get an error while parsing a particular rule, we'll just ignore
|
// that rule and continue on with the next rule
|
try {
|
rule.readFromXml(parser);
|
} catch (XmlPullParserException ex) {
|
Slog.e(TAG, "Error reading an intent firewall rule from " + rulesFile, ex);
|
continue;
|
}
|
|
rules.add(rule);
|
}
|
}
|
} catch (XmlPullParserException ex) {
|
// if there was an error outside of a specific rule, then there are probably
|
// structural problems with the xml file, and we should completely ignore it
|
Slog.e(TAG, "Error reading intent firewall rules from " + rulesFile, ex);
|
return;
|
} catch (IOException ex) {
|
Slog.e(TAG, "Error reading intent firewall rules from " + rulesFile, ex);
|
return;
|
} finally {
|
try {
|
fis.close();
|
} catch (IOException ex) {
|
Slog.e(TAG, "Error while closing " + rulesFile, ex);
|
}
|
}
|
|
for (int ruleType=0; ruleType<rulesByType.size(); ruleType++) {
|
List<Rule> rules = rulesByType.get(ruleType);
|
FirewallIntentResolver resolver = resolvers[ruleType];
|
|
for (int ruleIndex=0; ruleIndex<rules.size(); ruleIndex++) {
|
Rule rule = rules.get(ruleIndex);
|
for (int i=0; i<rule.getIntentFilterCount(); i++) {
|
resolver.addFilter(rule.getIntentFilter(i));
|
}
|
for (int i=0; i<rule.getComponentFilterCount(); i++) {
|
resolver.addComponentFilter(rule.getComponentFilter(i), rule);
|
}
|
}
|
}
|
}
|
|
static Filter parseFilter(XmlPullParser parser) throws IOException, XmlPullParserException {
|
String elementName = parser.getName();
|
|
FilterFactory factory = factoryMap.get(elementName);
|
|
if (factory == null) {
|
throw new XmlPullParserException("Unknown element in filter list: " + elementName);
|
}
|
return factory.newFilter(parser);
|
}
|
|
/**
|
* Represents a single activity/service/broadcast rule within one of the xml files.
|
*
|
* Rules are matched against an incoming intent in two phases. The goal of the first phase
|
* is to select a subset of rules that might match a given intent.
|
*
|
* For the first phase, we use a combination of intent filters (via an IntentResolver)
|
* and component filters to select which rules to check. If a rule has multiple intent or
|
* component filters, only a single filter must match for the rule to be passed on to the
|
* second phase.
|
*
|
* In the second phase, we check the specific conditions in each rule against the values in the
|
* intent. All top level conditions (but not filters) in the rule must match for the rule as a
|
* whole to match.
|
*
|
* If the rule matches, then we block or log the intent, as specified by the rule. If multiple
|
* rules match, we combine the block/log flags from any matching rule.
|
*/
|
private static class Rule extends AndFilter {
|
private static final String TAG_INTENT_FILTER = "intent-filter";
|
private static final String TAG_COMPONENT_FILTER = "component-filter";
|
private static final String ATTR_NAME = "name";
|
|
private static final String ATTR_BLOCK = "block";
|
private static final String ATTR_LOG = "log";
|
|
private final ArrayList<FirewallIntentFilter> mIntentFilters =
|
new ArrayList<FirewallIntentFilter>(1);
|
private final ArrayList<ComponentName> mComponentFilters = new ArrayList<ComponentName>(0);
|
private boolean block;
|
private boolean log;
|
|
@Override
|
public Rule readFromXml(XmlPullParser parser) throws IOException, XmlPullParserException {
|
block = Boolean.parseBoolean(parser.getAttributeValue(null, ATTR_BLOCK));
|
log = Boolean.parseBoolean(parser.getAttributeValue(null, ATTR_LOG));
|
|
super.readFromXml(parser);
|
return this;
|
}
|
|
@Override
|
protected void readChild(XmlPullParser parser) throws IOException, XmlPullParserException {
|
String currentTag = parser.getName();
|
|
if (currentTag.equals(TAG_INTENT_FILTER)) {
|
FirewallIntentFilter intentFilter = new FirewallIntentFilter(this);
|
intentFilter.readFromXml(parser);
|
mIntentFilters.add(intentFilter);
|
} else if (currentTag.equals(TAG_COMPONENT_FILTER)) {
|
String componentStr = parser.getAttributeValue(null, ATTR_NAME);
|
if (componentStr == null) {
|
throw new XmlPullParserException("Component name must be specified.",
|
parser, null);
|
}
|
|
ComponentName componentName = ComponentName.unflattenFromString(componentStr);
|
if (componentName == null) {
|
throw new XmlPullParserException("Invalid component name: " + componentStr);
|
}
|
|
mComponentFilters.add(componentName);
|
} else {
|
super.readChild(parser);
|
}
|
}
|
|
public int getIntentFilterCount() {
|
return mIntentFilters.size();
|
}
|
|
public FirewallIntentFilter getIntentFilter(int index) {
|
return mIntentFilters.get(index);
|
}
|
|
public int getComponentFilterCount() {
|
return mComponentFilters.size();
|
}
|
|
public ComponentName getComponentFilter(int index) {
|
return mComponentFilters.get(index);
|
}
|
public boolean getBlock() {
|
return block;
|
}
|
|
public boolean getLog() {
|
return log;
|
}
|
}
|
|
private static class FirewallIntentFilter extends IntentFilter {
|
private final Rule rule;
|
|
public FirewallIntentFilter(Rule rule) {
|
this.rule = rule;
|
}
|
}
|
|
private static class FirewallIntentResolver
|
extends IntentResolver<FirewallIntentFilter, Rule> {
|
@Override
|
protected boolean allowFilterResult(FirewallIntentFilter filter, List<Rule> dest) {
|
return !dest.contains(filter.rule);
|
}
|
|
@Override
|
protected boolean isPackageForFilter(String packageName, FirewallIntentFilter filter) {
|
return true;
|
}
|
|
@Override
|
protected FirewallIntentFilter[] newArray(int size) {
|
return new FirewallIntentFilter[size];
|
}
|
|
@Override
|
protected Rule newResult(FirewallIntentFilter filter, int match, int userId) {
|
return filter.rule;
|
}
|
|
@Override
|
protected void sortResults(List<Rule> results) {
|
// there's no need to sort the results
|
return;
|
}
|
|
public void queryByComponent(ComponentName componentName, List<Rule> candidateRules) {
|
Rule[] rules = mRulesByComponent.get(componentName);
|
if (rules != null) {
|
candidateRules.addAll(Arrays.asList(rules));
|
}
|
}
|
|
public void addComponentFilter(ComponentName componentName, Rule rule) {
|
Rule[] rules = mRulesByComponent.get(componentName);
|
rules = ArrayUtils.appendElement(Rule.class, rules, rule);
|
mRulesByComponent.put(componentName, rules);
|
}
|
|
private final ArrayMap<ComponentName, Rule[]> mRulesByComponent =
|
new ArrayMap<ComponentName, Rule[]>(0);
|
}
|
|
final FirewallHandler mHandler;
|
|
private final class FirewallHandler extends Handler {
|
public FirewallHandler(Looper looper) {
|
super(looper, null, true);
|
}
|
|
@Override
|
public void handleMessage(Message msg) {
|
readRulesDir(getRulesDir());
|
}
|
};
|
|
/**
|
* Monitors for the creation/deletion/modification of any .xml files in the rule directory
|
*/
|
private class RuleObserver extends FileObserver {
|
private static final int MONITORED_EVENTS = FileObserver.CREATE|FileObserver.MOVED_TO|
|
FileObserver.CLOSE_WRITE|FileObserver.DELETE|FileObserver.MOVED_FROM;
|
|
public RuleObserver(File monitoredDir) {
|
super(monitoredDir.getAbsolutePath(), MONITORED_EVENTS);
|
}
|
|
@Override
|
public void onEvent(int event, String path) {
|
if (path.endsWith(".xml")) {
|
// we wait 250ms before taking any action on an event, in order to dedup multiple
|
// events. E.g. a delete event followed by a create event followed by a subsequent
|
// write+close event
|
mHandler.removeMessages(0);
|
mHandler.sendEmptyMessageDelayed(0, 250);
|
}
|
}
|
}
|
|
/**
|
* This interface contains the methods we need from ActivityManagerService. This allows AMS to
|
* export these methods to us without making them public, and also makes it easier to test this
|
* component.
|
*/
|
public interface AMSInterface {
|
int checkComponentPermission(String permission, int pid, int uid,
|
int owningUid, boolean exported);
|
Object getAMSLock();
|
}
|
|
/**
|
* Checks if the caller has access to a component
|
*
|
* @param permission If present, the caller must have this permission
|
* @param pid The pid of the caller
|
* @param uid The uid of the caller
|
* @param owningUid The uid of the application that owns the component
|
* @param exported Whether the component is exported
|
* @return True if the caller can access the described component
|
*/
|
boolean checkComponentPermission(String permission, int pid, int uid, int owningUid,
|
boolean exported) {
|
return mAms.checkComponentPermission(permission, pid, uid, owningUid, exported) ==
|
PackageManager.PERMISSION_GRANTED;
|
}
|
|
boolean signaturesMatch(int uid1, int uid2) {
|
try {
|
IPackageManager pm = AppGlobals.getPackageManager();
|
return pm.checkUidSignatures(uid1, uid2) == PackageManager.SIGNATURE_MATCH;
|
} catch (RemoteException ex) {
|
Slog.e(TAG, "Remote exception while checking signatures", ex);
|
return false;
|
}
|
}
|
|
}
|