1 /*
2  * Copyright (C) 2015 The Android Open Source Project
3  *
4  * Licensed under the Apache License, Version 2.0 (the "License");
5  * you may not use this file except in compliance with the License.
6  * You may obtain a copy of the License at
7  *
8  *      http://www.apache.org/licenses/LICENSE-2.0
9  *
10  * Unless required by applicable law or agreed to in writing, software
11  * distributed under the License is distributed on an "AS IS" BASIS,
12  * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13  * See the License for the specific language governing permissions and
14  * limitations under the License.
15  */
16 
17 package com.android.commands.monkey;
18 
19 import android.Manifest;
20 import android.content.pm.ApplicationInfo;
21 import android.content.pm.IPackageManager;
22 import android.content.pm.PackageInfo;
23 import android.content.pm.PackageManager;
24 import android.content.pm.PermissionInfo;
25 import android.os.Build;
26 import android.os.RemoteException;
27 import android.os.ServiceManager;
28 import android.os.UserHandle;
29 import android.permission.IPermissionManager;
30 
31 import java.util.ArrayList;
32 import java.util.HashMap;
33 import java.util.List;
34 import java.util.Map;
35 import java.util.Random;
36 
37 /**
38  * Utility class that encapsulates runtime permission related methods for monkey
39  *
40  */
41 public class MonkeyPermissionUtil {
42 
43     private static final String PERMISSION_PREFIX = "android.permission.";
44     private static final String PERMISSION_GROUP_PREFIX = "android.permission-group.";
45 
46     // from com.android.packageinstaller.permission.utils
47     private static final String[] MODERN_PERMISSION_GROUPS = {
48             Manifest.permission_group.CALENDAR, Manifest.permission_group.CAMERA,
49             Manifest.permission_group.CONTACTS, Manifest.permission_group.LOCATION,
50             Manifest.permission_group.SENSORS, Manifest.permission_group.SMS,
51             Manifest.permission_group.PHONE, Manifest.permission_group.MICROPHONE,
52             Manifest.permission_group.STORAGE
53     };
54 
55     // from com.android.packageinstaller.permission.utils
isModernPermissionGroup(String name)56     private static boolean isModernPermissionGroup(String name) {
57         for (String modernGroup : MODERN_PERMISSION_GROUPS) {
58             if (modernGroup.equals(name)) {
59                 return true;
60             }
61         }
62         return false;
63     }
64 
65     /**
66      * actual list of packages to target, with invalid packages excluded, and may optionally include
67      * system packages
68      */
69     private List<String> mTargetedPackages;
70     /** if we should target system packages regardless if they are listed */
71     private boolean mTargetSystemPackages;
72     private IPackageManager mPm;
73     private final IPermissionManager mPermManager;
74 
75     /** keep track of runtime permissions requested for each package targeted */
76     private Map<String, List<PermissionInfo>> mPermissionMap;
77 
MonkeyPermissionUtil()78     public MonkeyPermissionUtil() {
79         mPm = IPackageManager.Stub.asInterface(ServiceManager.getService("package"));
80         mPermManager =
81                 IPermissionManager.Stub.asInterface(ServiceManager.getService("permissionmgr"));
82     }
83 
setTargetSystemPackages(boolean targetSystemPackages)84     public void setTargetSystemPackages(boolean targetSystemPackages) {
85         mTargetSystemPackages = targetSystemPackages;
86     }
87 
88     /**
89      * Decide if a package should be targeted by permission monkey
90      * @param info
91      * @return
92      */
shouldTargetPackage(PackageInfo info)93     private boolean shouldTargetPackage(PackageInfo info) {
94         // target if permitted by white listing / black listing rules
95         if (MonkeyUtils.getPackageFilter().checkEnteringPackage(info.packageName)) {
96             return true;
97         }
98         if (mTargetSystemPackages
99                 // not explicitly black listed
100                 && !MonkeyUtils.getPackageFilter().isPackageInvalid(info.packageName)
101                 // is a system app
102                 && (info.applicationInfo.flags & ApplicationInfo.FLAG_SYSTEM) != 0) {
103             return true;
104         }
105         return false;
106     }
107 
shouldTargetPermission(String pkg, PermissionInfo pi)108     private boolean shouldTargetPermission(String pkg, PermissionInfo pi) throws RemoteException {
109         int flags = mPermManager.getPermissionFlags(pi.name, pkg, UserHandle.myUserId());
110         int fixedPermFlags = PackageManager.FLAG_PERMISSION_SYSTEM_FIXED
111                 | PackageManager.FLAG_PERMISSION_POLICY_FIXED;
112         return pi.group != null && pi.protectionLevel == PermissionInfo.PROTECTION_DANGEROUS
113                 && ((flags & fixedPermFlags) == 0)
114                 && isModernPermissionGroup(pi.group);
115     }
116 
populatePermissionsMapping()117     public boolean populatePermissionsMapping() {
118         mPermissionMap = new HashMap<>();
119         try {
120             List<?> pkgInfos = mPm.getInstalledPackages(
121                     PackageManager.GET_PERMISSIONS, UserHandle.myUserId()).getList();
122             for (Object o : pkgInfos) {
123                 PackageInfo info = (PackageInfo)o;
124                 if (!shouldTargetPackage(info)) {
125                     continue;
126                 }
127                 List<PermissionInfo> permissions = new ArrayList<>();
128                 if (info.applicationInfo.targetSdkVersion <= Build.VERSION_CODES.LOLLIPOP_MR1) {
129                     // skip apps targetting lower API level
130                     continue;
131                 }
132                 if (info.requestedPermissions == null) {
133                     continue;
134                 }
135                 for (String perm : info.requestedPermissions) {
136                     PermissionInfo pi = mPermManager.getPermissionInfo(perm, "shell", 0);
137                     if (pi != null && shouldTargetPermission(info.packageName, pi)) {
138                         permissions.add(pi);
139                     }
140                 }
141                 if (!permissions.isEmpty()) {
142                     mPermissionMap.put(info.packageName, permissions);
143                 }
144             }
145         } catch (RemoteException re) {
146             Logger.err.println("** Failed talking with package manager!");
147             return false;
148         }
149         if (!mPermissionMap.isEmpty()) {
150             mTargetedPackages = new ArrayList<>(mPermissionMap.keySet());
151         }
152         return true;
153     }
154 
dump()155     public void dump() {
156         Logger.out.println("// Targeted packages and permissions:");
157         for (Map.Entry<String, List<PermissionInfo>> e : mPermissionMap.entrySet()) {
158             Logger.out.println(String.format("//  + Using %s", e.getKey()));
159             for (PermissionInfo pi : e.getValue()) {
160                 String name = pi.name;
161                 if (name != null) {
162                     if (name.startsWith(PERMISSION_PREFIX)) {
163                         name = name.substring(PERMISSION_PREFIX.length());
164                     }
165                 }
166                 String group = pi.group;
167                 if (group != null) {
168                     if (group.startsWith(PERMISSION_GROUP_PREFIX)) {
169                         group = group.substring(PERMISSION_GROUP_PREFIX.length());
170                     }
171                 }
172                 Logger.out.println(String.format("//    Permission: %s [%s]", name, group));
173             }
174         }
175     }
176 
generateRandomPermissionEvent(Random random)177     public MonkeyPermissionEvent generateRandomPermissionEvent(Random random) {
178         String pkg = mTargetedPackages.get(random.nextInt(mTargetedPackages.size()));
179         List<PermissionInfo> infos = mPermissionMap.get(pkg);
180         return new MonkeyPermissionEvent(pkg, infos.get(random.nextInt(infos.size())));
181     }
182 }
183