Files
frameworks_base/cmds/idmap2/libidmap2/FileUtils.cpp
Mårten Kongstad 1da49dc9b4 idmap2: lock down write access to /data/resouce-cache
Deny write access to /data/resource-cache for UIDs other than root and
system. While this is already handled by SELinux rules, add an
additional layer of security to explicitly prevent malicious apps from
messing with the system's idmap files.

Test: make idmap2_tests
Change-Id: Id986633558d5d02452276f05f64337a8700f148a
2019-01-18 10:05:48 -08:00

111 lines
3.3 KiB
C++

/*
* Copyright (C) 2018 The Android Open Source Project
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
#include <dirent.h>
#include <sys/types.h>
#include <unistd.h>
#include <cerrno>
#include <climits>
#include <cstdlib>
#include <cstring>
#include <fstream>
#include <memory>
#include <string>
#include <utility>
#include <vector>
#include "android-base/file.h"
#include "android-base/macros.h"
#include "android-base/stringprintf.h"
#include "private/android_filesystem_config.h"
#include "idmap2/FileUtils.h"
namespace android::idmap2::utils {
std::unique_ptr<std::vector<std::string>> FindFiles(const std::string& root, bool recurse,
const FindFilesPredicate& predicate) {
DIR* dir = opendir(root.c_str());
if (dir == nullptr) {
return nullptr;
}
std::unique_ptr<std::vector<std::string>> vector(new std::vector<std::string>());
struct dirent* dirent;
while ((dirent = readdir(dir)) != nullptr) {
const std::string path = root + "/" + dirent->d_name;
if (predicate(dirent->d_type, path)) {
vector->push_back(path);
}
if (recurse && dirent->d_type == DT_DIR && strcmp(dirent->d_name, ".") != 0 &&
strcmp(dirent->d_name, "..") != 0) {
auto sub_vector = FindFiles(path, recurse, predicate);
if (!sub_vector) {
closedir(dir);
return nullptr;
}
vector->insert(vector->end(), sub_vector->begin(), sub_vector->end());
}
}
closedir(dir);
return vector;
}
std::unique_ptr<std::string> ReadFile(const std::string& path) {
std::unique_ptr<std::string> str(new std::string());
std::ifstream fin(path);
str->append({std::istreambuf_iterator<char>(fin), std::istreambuf_iterator<char>()});
fin.close();
return str;
}
std::unique_ptr<std::string> ReadFile(int fd) {
static constexpr const size_t kBufSize = 1024;
std::unique_ptr<std::string> str(new std::string());
char buf[kBufSize];
ssize_t r;
while ((r = read(fd, buf, sizeof(buf))) > 0) {
str->append(buf, r);
}
return r == 0 ? std::move(str) : nullptr;
}
#ifdef __ANDROID__
bool UidHasWriteAccessToPath(uid_t uid, const std::string& path) {
// resolve symlinks and relative paths; the directories must exist
std::string canonical_path;
if (!base::Realpath(base::Dirname(path), &canonical_path)) {
return false;
}
const std::string cache_subdir = base::StringPrintf("%s/", kIdmapCacheDir);
if (canonical_path == kIdmapCacheDir ||
canonical_path.compare(0, cache_subdir.size(), cache_subdir) == 0) {
// limit access to /data/resource-cache to root and system
return uid == AID_ROOT || uid == AID_SYSTEM;
}
return true;
}
#else
bool UidHasWriteAccessToPath(uid_t uid ATTRIBUTE_UNUSED, const std::string& path ATTRIBUTE_UNUSED) {
return true;
}
#endif
} // namespace android::idmap2::utils