Find hal_foo_hwservice -> you are hal_foo_client.

Before, it was possible to access a hwservice without declaring
that you were a client.

This introduces the following macro:
hal_attribute_hwservice_client(hal_foo, hal_foo_hwservice)

which makes sure the above implication holds using a neverallow rule.

Bug: 80319537
Test: boot + sanity
Change-Id: Iededae68f14f0f3bd412c1205aa3b650a54d55c6
This commit is contained in:
Steven Moreland 2018-05-30 16:43:17 -07:00
parent 7baf725ea6
commit 8fc7981885
48 changed files with 64 additions and 56 deletions

View file

@ -12,6 +12,10 @@
(typeattributeset hal_allocator_client ((and (appdomain) ((not (isolated_app))))))
(typeattributeset halclientdomain (hal_allocator_client))
; Apps, except isolated apps, are clients of OMX-related services
; Unfortunately, we can't currently express this in module policy language:
(typeattributeset hal_omx_client ((and (appdomain) ((not (isolated_app))))))
; Apps, except isolated apps, are clients of Configstore HAL
; Unfortunately, we can't currently express this in module policy language:
; typeattribute { appdomain -isolated_app } hal_configstore_client;

View file

@ -219,15 +219,6 @@ binder_call(appdomain, appdomain)
# Perform binder IPC to ephemeral apps.
binder_call(appdomain, ephemeral_app)
# TODO(b/80317992): use hal_client_domain on individual domains or have tests
# that the required individual permissions are all granted
hwbinder_use({ appdomain -isolated_app })
allow { appdomain -isolated_app } hal_codec2_hwservice:hwservice_manager find;
allow { appdomain -isolated_app } hal_omx_hwservice:hwservice_manager find;
allow { appdomain -isolated_app } hidl_token_hwservice:hwservice_manager find;
get_prop({ appdomain -isolated_app }, hwservicemanager_prop);
binder_call({ appdomain -isolated_app }, hal_omx_server)
# Talk with graphics composer fences
allow appdomain hal_graphics_composer:fd use;

View file

@ -3,7 +3,7 @@ binder_call(hal_audio_client, hal_audio_server)
binder_call(hal_audio_server, hal_audio_client)
add_hwservice(hal_audio_server, hal_audio_hwservice)
allow hal_audio_client hal_audio_hwservice:hwservice_manager find;
hal_attribute_hwservice_client(hal_audio, hal_audio_hwservice)
allow hal_audio ion_device:chr_file r_file_perms;

View file

@ -3,5 +3,4 @@ binder_call(hal_audiocontrol_client, hal_audiocontrol_server)
binder_call(hal_audiocontrol_server, hal_audiocontrol_client)
add_hwservice(hal_audiocontrol_server, hal_audiocontrol_hwservice)
allow hal_audiocontrol_client hal_audiocontrol_hwservice:hwservice_manager find;
hal_attribute_hwservice_client(hal_audiocontrol, hal_audiocontrol_hwservice)

View file

@ -2,4 +2,4 @@
binder_call(hal_authsecret_client, hal_authsecret_server)
add_hwservice(hal_authsecret_server, hal_authsecret_hwservice)
allow hal_authsecret_client hal_authsecret_hwservice:hwservice_manager find;
hal_attribute_hwservice_client(hal_authsecret, hal_authsecret_hwservice)

View file

@ -3,7 +3,7 @@ binder_call(hal_bluetooth_client, hal_bluetooth_server)
binder_call(hal_bluetooth_server, hal_bluetooth_client)
add_hwservice(hal_bluetooth_server, hal_bluetooth_hwservice)
allow hal_bluetooth_client hal_bluetooth_hwservice:hwservice_manager find;
hal_attribute_hwservice_client(hal_bluetooth, hal_bluetooth_hwservice)
wakelock_use(hal_bluetooth);

View file

@ -3,6 +3,6 @@ binder_call(hal_bootctl_client, hal_bootctl_server)
binder_call(hal_bootctl_server, hal_bootctl_client)
add_hwservice(hal_bootctl_server, hal_bootctl_hwservice)
allow hal_bootctl_client hal_bootctl_hwservice:hwservice_manager find;
hal_attribute_hwservice_client(hal_bootctl, hal_bootctl_hwservice)
dontaudit hal_bootctl self:capability sys_rawio;

View file

@ -1,4 +1,4 @@
binder_call(hal_broadcastradio_client, hal_broadcastradio_server)
add_hwservice(hal_broadcastradio_server, hal_broadcastradio_hwservice)
allow hal_broadcastradio_client hal_broadcastradio_hwservice:hwservice_manager find;
hal_attribute_hwservice_client(hal_broadcastradio, hal_broadcastradio_hwservice)

View file

@ -3,7 +3,7 @@ binder_call(hal_camera_client, hal_camera_server)
binder_call(hal_camera_server, hal_camera_client)
add_hwservice(hal_camera_server, hal_camera_hwservice)
allow hal_camera_client hal_camera_hwservice:hwservice_manager find;
hal_attribute_hwservice_client(hal_camera, hal_camera_hwservice)
allow hal_camera device:dir r_dir_perms;
allow hal_camera video_device:dir r_dir_perms;

View file

@ -3,7 +3,7 @@ binder_call(hal_cas_client, hal_cas_server)
binder_call(hal_cas_server, hal_cas_client)
add_hwservice(hal_cas_server, hal_cas_hwservice)
allow hal_cas_client hal_cas_hwservice:hwservice_manager find;
hal_attribute_hwservice_client(hal_cas, hal_cas_hwservice)
allow hal_cas_server hidl_memory_hwservice:hwservice_manager find;
# Permit reading device's serial number from system properties

View file

@ -2,4 +2,4 @@
binder_call(hal_confirmationui_client, hal_confirmationui_server)
add_hwservice(hal_confirmationui_server, hal_confirmationui_hwservice)
allow hal_confirmationui_client hal_confirmationui_hwservice:hwservice_manager find;
hal_attribute_hwservice_client(hal_confirmationui, hal_confirmationui_hwservice)

View file

@ -3,4 +3,4 @@ binder_call(hal_contexthub_client, hal_contexthub_server)
binder_call(hal_contexthub_server, hal_contexthub_client)
add_hwservice(hal_contexthub_server, hal_contexthub_hwservice)
allow hal_contexthub_client hal_contexthub_hwservice:hwservice_manager find;
hal_attribute_hwservice_client(hal_contexthub, hal_contexthub_hwservice)

View file

@ -3,7 +3,7 @@ binder_call(hal_drm_client, hal_drm_server)
binder_call(hal_drm_server, hal_drm_client)
add_hwservice(hal_drm_server, hal_drm_hwservice)
allow hal_drm_client hal_drm_hwservice:hwservice_manager find;
hal_attribute_hwservice_client(hal_drm, hal_drm_hwservice)
allow hal_drm hidl_memory_hwservice:hwservice_manager find;

View file

@ -3,7 +3,7 @@ binder_call(hal_dumpstate_client, hal_dumpstate_server)
binder_call(hal_dumpstate_server, hal_dumpstate_client)
add_hwservice(hal_dumpstate_server, hal_dumpstate_hwservice)
allow hal_dumpstate_client hal_dumpstate_hwservice:hwservice_manager find;
hal_attribute_hwservice_client(hal_dumpstate, hal_dumpstate_hwservice)
# write bug reports in /data/data/com.android.shell/files/bugreports/bugreport
allow hal_dumpstate shell_data_file:file write;

View file

@ -3,7 +3,7 @@ binder_call(hal_fingerprint_client, hal_fingerprint_server)
binder_call(hal_fingerprint_server, hal_fingerprint_client)
add_hwservice(hal_fingerprint_server, hal_fingerprint_hwservice)
allow hal_fingerprint_client hal_fingerprint_hwservice:hwservice_manager find;
hal_attribute_hwservice_client(hal_fingerprint, hal_fingerprint_hwservice)
# For memory allocation
allow hal_fingerprint ion_device:chr_file r_file_perms;

View file

@ -1,7 +1,7 @@
binder_call(hal_gatekeeper_client, hal_gatekeeper_server)
add_hwservice(hal_gatekeeper_server, hal_gatekeeper_hwservice)
allow hal_gatekeeper_client hal_gatekeeper_hwservice:hwservice_manager find;
hal_attribute_hwservice_client(hal_gatekeeper, hal_gatekeeper_hwservice)
# TEE access.
allow hal_gatekeeper tee_device:chr_file rw_file_perms;

View file

@ -3,4 +3,4 @@ binder_call(hal_gnss_client, hal_gnss_server)
binder_call(hal_gnss_server, hal_gnss_client)
add_hwservice(hal_gnss_server, hal_gnss_hwservice)
allow hal_gnss_client hal_gnss_hwservice:hwservice_manager find;
hal_attribute_hwservice_client(hal_gnss, hal_gnss_hwservice)

View file

@ -2,7 +2,7 @@
binder_call(hal_graphics_allocator_client, hal_graphics_allocator_server)
add_hwservice(hal_graphics_allocator_server, hal_graphics_allocator_hwservice)
allow hal_graphics_allocator_client hal_graphics_allocator_hwservice:hwservice_manager find;
hal_attribute_hwservice_client(hal_graphics_allocator, hal_graphics_allocator_hwservice)
allow hal_graphics_allocator_client hal_graphics_mapper_hwservice:hwservice_manager find;
# GPU device access

View file

@ -3,7 +3,7 @@ binder_call(hal_graphics_composer_client, hal_graphics_composer_server)
binder_call(hal_graphics_composer_server, hal_graphics_composer_client)
add_hwservice(hal_graphics_composer_server, hal_graphics_composer_hwservice)
allow hal_graphics_composer_client hal_graphics_composer_hwservice:hwservice_manager find;
hal_attribute_hwservice_client(hal_graphics_composer, hal_graphics_composer_hwservice)
# Coordinate with hal_graphics_mapper
allow hal_graphics_composer_server hal_graphics_mapper_hwservice:hwservice_manager find;

View file

@ -3,7 +3,7 @@ binder_call(hal_health_client, hal_health_server)
binder_call(hal_health_server, hal_health_client)
add_hwservice(hal_health_server, hal_health_hwservice)
allow hal_health_client hal_health_hwservice:hwservice_manager find;
hal_attribute_hwservice_client(hal_health, hal_health_hwservice)
# Read access to system files for HALs in
# /{system,vendor,odm}/lib[64]/hw/ in order

View file

@ -3,4 +3,4 @@ binder_call(hal_ir_client, hal_ir_server)
binder_call(hal_ir_server, hal_ir_client)
add_hwservice(hal_ir_server, hal_ir_hwservice)
allow hal_ir_client hal_ir_hwservice:hwservice_manager find;
hal_attribute_hwservice_client(hal_ir, hal_ir_hwservice)

View file

@ -2,7 +2,7 @@
binder_call(hal_keymaster_client, hal_keymaster_server)
add_hwservice(hal_keymaster_server, hal_keymaster_hwservice)
allow hal_keymaster_client hal_keymaster_hwservice:hwservice_manager find;
hal_attribute_hwservice_client(hal_keymaster, hal_keymaster_hwservice)
allow hal_keymaster tee_device:chr_file rw_file_perms;
allow hal_keymaster ion_device:chr_file r_file_perms;

View file

@ -3,7 +3,7 @@ binder_call(hal_light_client, hal_light_server)
binder_call(hal_light_server, hal_light_client)
add_hwservice(hal_light_server, hal_light_hwservice)
allow hal_light_client hal_light_hwservice:hwservice_manager find;
hal_attribute_hwservice_client(hal_light, hal_light_hwservice)
allow hal_light sysfs_leds:lnk_file read;
allow hal_light sysfs_leds:file rw_file_perms;

View file

@ -5,7 +5,7 @@ binder_call(hal_lowpan_server, hal_lowpan_client)
add_hwservice(hal_lowpan_server, hal_lowpan_hwservice)
# Allow hal_lowpan_client to be able to find the hal_lowpan_server
allow hal_lowpan_client hal_lowpan_hwservice:hwservice_manager find;
hal_attribute_hwservice_client(hal_lowpan, hal_lowpan_hwservice)
# hal_lowpan domain can write/read to/from lowpan_prop
set_prop(hal_lowpan_server, lowpan_prop)

View file

@ -2,4 +2,4 @@
binder_call(hal_memtrack_client, hal_memtrack_server)
add_hwservice(hal_memtrack_server, hal_memtrack_hwservice)
allow hal_memtrack_client hal_memtrack_hwservice:hwservice_manager find;
hal_attribute_hwservice_client(hal_memtrack, hal_memtrack_hwservice)

View file

@ -3,6 +3,6 @@ binder_call(hal_neuralnetworks_client, hal_neuralnetworks_server)
binder_call(hal_neuralnetworks_server, hal_neuralnetworks_client)
add_hwservice(hal_neuralnetworks_server, hal_neuralnetworks_hwservice)
allow hal_neuralnetworks_client hal_neuralnetworks_hwservice:hwservice_manager find;
hal_attribute_hwservice_client(hal_neuralnetworks, hal_neuralnetworks_hwservice)
allow hal_neuralnetworks hidl_memory_hwservice:hwservice_manager find;
allow hal_neuralnetworks hal_allocator:fd use;

View file

@ -3,7 +3,7 @@ binder_call(hal_nfc_client, hal_nfc_server)
binder_call(hal_nfc_server, hal_nfc_client)
add_hwservice(hal_nfc_server, hal_nfc_hwservice)
allow hal_nfc_client hal_nfc_hwservice:hwservice_manager find;
hal_attribute_hwservice_client(hal_nfc, hal_nfc_hwservice)
# Set NFC properties (used by bcm2079x HAL).
set_prop(hal_nfc, nfc_prop)

View file

@ -2,4 +2,4 @@
binder_call(hal_oemlock_client, hal_oemlock_server)
add_hwservice(hal_oemlock_server, hal_oemlock_hwservice)
allow hal_oemlock_client hal_oemlock_hwservice:hwservice_manager find;
hal_attribute_hwservice_client(hal_oemlock, hal_oemlock_hwservice)

View file

@ -27,11 +27,13 @@ crash_dump_fallback(hal_omx_server)
# via PDX. Thus, there is no need to use pdx_client macro.
allow hal_omx_server bufferhubd:fd use;
allow hal_omx_client hal_codec2_hwservice:hwservice_manager find;
allow hal_omx_client hal_omx_hwservice:hwservice_manager find;
hal_attribute_hwservice_client(hal_omx, hal_omx_hwservice)
hal_attribute_hwservice_client(hal_omx, hal_codec2_hwservice)
allow hal_omx_client hidl_token_hwservice:hwservice_manager find;
binder_call(hal_omx_client, hal_omx_server)
binder_call(hal_omx_server, hal_omx_client)
###
### neverallow rules

View file

@ -3,4 +3,4 @@ binder_call(hal_power_client, hal_power_server)
binder_call(hal_power_server, hal_power_client)
add_hwservice(hal_power_server, hal_power_hwservice)
allow hal_power_client hal_power_hwservice:hwservice_manager find;
hal_attribute_hwservice_client(hal_power, hal_power_hwservice)

View file

@ -3,4 +3,4 @@ binder_call(hal_secure_element_client, hal_secure_element_server)
binder_call(hal_secure_element_server, hal_secure_element_client)
add_hwservice(hal_secure_element_server, hal_secure_element_hwservice)
allow hal_secure_element_client hal_secure_element_hwservice:hwservice_manager find;
hal_attribute_hwservice_client(hal_secure_element, hal_secure_element_hwservice)

View file

@ -2,7 +2,7 @@
binder_call(hal_sensors_client, hal_sensors_server)
add_hwservice(hal_sensors_server, hal_sensors_hwservice)
allow hal_sensors_client hal_sensors_hwservice:hwservice_manager find;
hal_attribute_hwservice_client(hal_sensors, hal_sensors_hwservice)
# Allow sensor hals to access ashmem memory allocated by apps
allow hal_sensors { appdomain -isolated_app }:fd use;

View file

@ -3,7 +3,7 @@ binder_call(hal_telephony_client, hal_telephony_server)
binder_call(hal_telephony_server, hal_telephony_client)
add_hwservice(hal_telephony_server, hal_telephony_hwservice)
allow hal_telephony_client hal_telephony_hwservice:hwservice_manager find;
hal_attribute_hwservice_client(hal_telephony, hal_telephony_hwservice)
allowxperm hal_telephony_server self:udp_socket ioctl priv_sock_ioctls;

View file

@ -2,7 +2,7 @@
binder_call(hal_tetheroffload_client, hal_tetheroffload_server)
binder_call(hal_tetheroffload_server, hal_tetheroffload_client)
allow hal_tetheroffload_client hal_tetheroffload_hwservice:hwservice_manager find;
hal_attribute_hwservice_client(hal_tetheroffload, hal_tetheroffload_hwservice)
# allow the client to pass the server already open netlink sockets
allow hal_tetheroffload_server hal_tetheroffload_client:netlink_netfilter_socket { getattr read setopt write };

View file

@ -3,4 +3,4 @@ binder_call(hal_thermal_client, hal_thermal_server)
binder_call(hal_thermal_server, hal_thermal_client)
add_hwservice(hal_thermal_server, hal_thermal_hwservice)
allow hal_thermal_client hal_thermal_hwservice:hwservice_manager find;
hal_attribute_hwservice_client(hal_thermal, hal_thermal_hwservice)

View file

@ -3,4 +3,4 @@ binder_call(hal_tv_cec_client, hal_tv_cec_server)
binder_call(hal_tv_cec_server, hal_tv_cec_client)
add_hwservice(hal_tv_cec_server, hal_tv_cec_hwservice)
allow hal_tv_cec_client hal_tv_cec_hwservice:hwservice_manager find;
hal_attribute_hwservice_client(hal_tv_cec, hal_tv_cec_hwservice)

View file

@ -3,4 +3,4 @@ binder_call(hal_tv_input_client, hal_tv_input_server)
binder_call(hal_tv_input_server, hal_tv_input_client)
add_hwservice(hal_tv_input_server, hal_tv_input_hwservice)
allow hal_tv_input_client hal_tv_input_hwservice:hwservice_manager find;
hal_attribute_hwservice_client(hal_tv_input, hal_tv_input_hwservice)

View file

@ -3,7 +3,7 @@ binder_call(hal_usb_client, hal_usb_server)
binder_call(hal_usb_server, hal_usb_client)
add_hwservice(hal_usb_server, hal_usb_hwservice)
allow hal_usb_client hal_usb_hwservice:hwservice_manager find;
hal_attribute_hwservice_client(hal_usb, hal_usb_hwservice)
allow hal_usb self:netlink_kobject_uevent_socket create;
allow hal_usb self:netlink_kobject_uevent_socket setopt;

View file

@ -3,7 +3,7 @@ binder_call(hal_usb_gadget_client, hal_usb_gadget_server)
binder_call(hal_usb_gadget_server, hal_usb_gadget_client)
add_hwservice(hal_usb_gadget_server, hal_usb_gadget_hwservice)
allow hal_usb_gadget_client hal_usb_gadget_hwservice:hwservice_manager find;
hal_attribute_hwservice_client(hal_usb_gadget, hal_usb_gadget_hwservice)
# Configuring usb gadget functions
allow hal_usb_gadget_server configfs:lnk_file { read create unlink};

View file

@ -4,4 +4,4 @@ binder_call(hal_vehicle_server, hal_vehicle_client)
add_hwservice(hal_vehicle_server, hal_vehicle_hwservice)
allow hal_vehicle_client hal_vehicle_hwservice:hwservice_manager find;
hal_attribute_hwservice_client(hal_vehicle, hal_vehicle_hwservice)

View file

@ -2,7 +2,7 @@
binder_call(hal_vibrator_client, hal_vibrator_server)
add_hwservice(hal_vibrator_server, hal_vibrator_hwservice)
allow hal_vibrator_client hal_vibrator_hwservice:hwservice_manager find;
hal_attribute_hwservice_client(hal_vibrator, hal_vibrator_hwservice)
# vibrator sysfs rw access
allow hal_vibrator sysfs_vibrator:file rw_file_perms;

View file

@ -3,4 +3,4 @@ binder_call(hal_vr_client, hal_vr_server)
binder_call(hal_vr_server, hal_vr_client)
add_hwservice(hal_vr_server, hal_vr_hwservice)
allow hal_vr_client hal_vr_hwservice:hwservice_manager find;
hal_attribute_hwservice_client(hal_vr, hal_vr_hwservice)

View file

@ -2,4 +2,4 @@
binder_call(hal_weaver_client, hal_weaver_server)
add_hwservice(hal_weaver_server, hal_weaver_hwservice)
allow hal_weaver_client hal_weaver_hwservice:hwservice_manager find;
hal_attribute_hwservice_client(hal_weaver, hal_weaver_hwservice)

View file

@ -3,7 +3,7 @@ binder_call(hal_wifi_client, hal_wifi_server)
binder_call(hal_wifi_server, hal_wifi_client)
add_hwservice(hal_wifi_server, hal_wifi_hwservice)
allow hal_wifi_client hal_wifi_hwservice:hwservice_manager find;
hal_attribute_hwservice_client(hal_wifi, hal_wifi_hwservice)
r_dir_file(hal_wifi, proc_net_type)
r_dir_file(hal_wifi, sysfs_type)

View file

@ -3,7 +3,7 @@ binder_call(hal_wifi_hostapd_client, hal_wifi_hostapd_server)
binder_call(hal_wifi_hostapd_server, hal_wifi_hostapd_client)
add_hwservice(hal_wifi_hostapd_server, hal_wifi_hostapd_hwservice)
allow hal_wifi_hostapd_client hal_wifi_hostapd_hwservice:hwservice_manager find;
hal_attribute_hwservice_client(hal_wifi_hostapd, hal_wifi_hostapd_hwservice)
allow hal_wifi_hostapd_server self:global_capability_class_set { net_admin net_raw };

View file

@ -3,7 +3,7 @@ binder_call(hal_wifi_offload_client, hal_wifi_offload_server)
binder_call(hal_wifi_offload_server, hal_wifi_offload_client)
add_hwservice(hal_wifi_offload_server, hal_wifi_offload_hwservice)
allow hal_wifi_offload_client hal_wifi_offload_hwservice:hwservice_manager find;
hal_attribute_hwservice_client(hal_wifi_offload, hal_wifi_offload_hwservice)
r_dir_file(hal_wifi_offload, proc_net_type)
r_dir_file(hal_wifi_offload, sysfs_type)

View file

@ -3,7 +3,7 @@ binder_call(hal_wifi_supplicant_client, hal_wifi_supplicant_server)
binder_call(hal_wifi_supplicant_server, hal_wifi_supplicant_client)
add_hwservice(hal_wifi_supplicant_server, hal_wifi_supplicant_hwservice)
allow hal_wifi_supplicant_client hal_wifi_supplicant_hwservice:hwservice_manager find;
hal_attribute_hwservice_client(hal_wifi_supplicant, hal_wifi_supplicant_hwservice)
# in addition to ioctls whitelisted for all domains, grant hal_wifi_supplicant priv_sock_ioctls.
allowxperm hal_wifi_supplicant self:udp_socket ioctl priv_sock_ioctls;

View file

@ -603,3 +603,15 @@ define(`add_hwservice', `
allow $1 hidl_base_hwservice:hwservice_manager add;
neverallow { domain -$1 } $2:hwservice_manager add;
')
###########################################
# hal_attribute_hwservice_client(attribute, service)
# Ability for domain to get a service to hwservice_manager
# and find it. It also creates a neverallow preventing
# others from adding it.
#
# Used to pair hal_foo_client with hal_foo_hwservice
define(`hal_attribute_hwservice_client', `
allow $1_client $2:hwservice_manager find;
neverallow { domain -$1_client -$1_server } $2:hwservice_manager find;
')