]> git.saurik.com Git - apple/security.git/blame - sectask/SecTask.c
Security-59754.80.3.tar.gz
[apple/security.git] / sectask / SecTask.c
CommitLineData
d8f41ccd
A
1/*
2 * Copyright (c) 2008,2010-2013 Apple Inc. All Rights Reserved.
3 *
4 * @APPLE_LICENSE_HEADER_START@
5 *
6 * This file contains Original Code and/or Modifications of Original Code
7 * as defined in and that are subject to the Apple Public Source License
8 * Version 2.0 (the 'License'). You may not use this file except in
9 * compliance with the License. Please obtain a copy of the License at
10 * http://www.opensource.apple.com/apsl/ and read it before using this
11 * file.
12 *
13 * The Original Code and all software distributed under the License are
14 * distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER
15 * EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES,
16 * INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY,
17 * FITNESS FOR A PARTICULAR PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT.
18 * Please see the License for the specific language governing rights and
19 * limitations under the License.
20 *
21 * @APPLE_LICENSE_HEADER_END@
22 */
23
24#include "SecTask.h"
866f8763 25#include "SecTaskPriv.h"
d8f41ccd
A
26
27#include <utilities/debugging.h>
d64be36e 28#include <utilities/entitlements.h>
d8f41ccd
A
29
30#include <AssertMacros.h>
31#include <CoreFoundation/CFRuntime.h>
32#include <IOKit/IOKitLib.h>
33#include <IOKit/IOCFUnserialize.h>
34#include <System/sys/codesign.h>
35#include <bsm/libbsm.h>
36#include <inttypes.h>
5c19dc3a 37#include <syslog.h>
d8f41ccd 38#include <utilities/SecCFWrappers.h>
b54c578e 39#include <xpc/private.h>
d8f41ccd 40
d8f41ccd 41#include <sys/sysctl.h>
866f8763
A
42
43#if TARGET_OS_OSX
44/* These won't exist until we unify codesigning */
b54c578e
A
45#include <Security/SecCode.h>
46#include <Security/SecCodePriv.h>
47#include <Security/SecRequirement.h>
866f8763 48#endif /* TARGET_OS_OSX */
d8f41ccd
A
49
50struct __SecTask {
51 CFRuntimeBase base;
52
d8f41ccd
A
53 audit_token_t token;
54
55 /* Track whether we've loaded entitlements independently since after the
56 * load, entitlements may legitimately be NULL */
57 Boolean entitlementsLoaded;
58 CFDictionaryRef entitlements;
fa7225c8
A
59
60 /* for debugging only, shown by debugDescription */
61 int lastFailure;
d8f41ccd
A
62};
63
64static bool check_task(SecTaskRef task) {
65 return SecTaskGetTypeID() == CFGetTypeID(task);
66}
67
68static void SecTaskFinalize(CFTypeRef cfTask)
69{
70 SecTaskRef task = (SecTaskRef) cfTask;
866f8763 71 CFReleaseNull(task->entitlements);
d8f41ccd
A
72}
73
74
75// Define PRIdPID (proper printf format string for pid_t)
76#define PRIdPID PRId32
77
78static CFStringRef SecTaskCopyDebugDescription(CFTypeRef cfTask)
79{
80 SecTaskRef task = (SecTaskRef) cfTask;
81 pid_t pid;
866f8763 82 audit_token_to_au32(task->token, NULL, NULL, NULL, NULL, NULL, &pid, NULL, NULL);
d8f41ccd 83
d8f41ccd
A
84 const char *task_name;
85 int mib[] = {CTL_KERN, KERN_PROC, KERN_PROC_PID, pid};
86 struct kinfo_proc kp;
87 size_t len = sizeof(kp);
88 if (sysctl(mib, 4, &kp, &len, NULL, 0) == -1 || len == 0)
89 task_name = strerror(errno);
90 else
91 task_name = kp.kp_proc.p_comm;
d8f41ccd 92
fa7225c8
A
93 return CFStringCreateWithFormat(CFGetAllocator(task), NULL, CFSTR("%s[%" PRIdPID "]/%d#%d LF=%d"), task_name, pid,
94 task->entitlementsLoaded, task->entitlements ? (int)CFDictionaryGetCount(task->entitlements) : -1, task->lastFailure);
d8f41ccd
A
95}
96
97CFGiblisWithFunctions(SecTask, NULL, NULL, SecTaskFinalize, NULL, NULL, NULL, SecTaskCopyDebugDescription, NULL, NULL, NULL)
98
99static SecTaskRef init_task_ref(CFAllocatorRef allocator)
100{
101 CFIndex extra = sizeof(struct __SecTask) - sizeof(CFRuntimeBase);
102 return (SecTaskRef) _CFRuntimeCreateInstance(allocator, SecTaskGetTypeID(), extra, NULL);
103}
104
105SecTaskRef SecTaskCreateFromSelf(CFAllocatorRef allocator)
106{
107 SecTaskRef task = init_task_ref(allocator);
108 if (task != NULL) {
109
866f8763
A
110 kern_return_t kr = KERN_FAILURE;
111 mach_msg_type_number_t autoken_cnt = TASK_AUDIT_TOKEN_COUNT;
112 kr = task_info(mach_task_self(), TASK_AUDIT_TOKEN, (task_info_t)&task->token, &autoken_cnt);
113 if (kr == KERN_SUCCESS) {
114 task->entitlementsLoaded = false;
115 task->entitlements = NULL;
116 } else {
117 CFReleaseNull(task);
118 }
d8f41ccd
A
119 }
120
121 return task;
122}
123
124SecTaskRef SecTaskCreateWithAuditToken(CFAllocatorRef allocator, audit_token_t token)
125{
126 SecTaskRef task = init_task_ref(allocator);
127 if (task != NULL) {
128
129 memcpy(&task->token, &token, sizeof(token));
130 task->entitlementsLoaded = false;
131 task->entitlements = NULL;
d8f41ccd
A
132 }
133
134 return task;
135}
136
b54c578e
A
137_Nullable SecTaskRef
138SecTaskCreateWithXPCMessage(xpc_object_t _Nonnull message)
139{
140 audit_token_t token;
141
142 if (message == NULL || xpc_get_type(message) != XPC_TYPE_DICTIONARY) {
143 return NULL;
144 }
145 xpc_dictionary_get_audit_token(message, &token);
146
147 return SecTaskCreateWithAuditToken(NULL, token);
148}
149
150
151
d8f41ccd
A
152struct csheader {
153 uint32_t magic;
154 uint32_t length;
155};
156
157static int
158csops_task(SecTaskRef task, int ops, void *blob, size_t size)
159{
fa7225c8 160 int rc;
866f8763
A
161
162 pid_t pid;
163 audit_token_to_au32(task->token, NULL, NULL, NULL, NULL, NULL, &pid, NULL, NULL);
164 rc = csops_audittoken(pid, ops, blob, size, &task->token);
165
fa7225c8
A
166 task->lastFailure = (rc == -1) ? errno : 0;
167 return rc;
d8f41ccd
A
168}
169
dbe77505
A
170static CFStringRef
171SecTaskCopyIdentifier(SecTaskRef task, int op, CFErrorRef *error)
d8f41ccd
A
172{
173 CFStringRef signingId = NULL;
174 char *data = NULL;
175 struct csheader header;
176 uint32_t bufferlen;
177 int ret;
178
dbe77505 179 ret = csops_task(task, op, &header, sizeof(header));
d8f41ccd
A
180 if (ret != -1 || errno != ERANGE)
181 return NULL;
182
183 bufferlen = ntohl(header.length);
184 /* check for insane values */
185 if (bufferlen > 1024 * 1024 || bufferlen < 8) {
186 ret = EINVAL;
187 goto out;
188 }
189 data = malloc(bufferlen + 1);
190 if (data == NULL) {
191 ret = ENOMEM;
192 goto out;
193 }
dbe77505 194 ret = csops_task(task, op, data, bufferlen);
d8f41ccd
A
195 if (ret) {
196 ret = errno;
197 goto out;
198 }
199 data[bufferlen] = '\0';
200
201 signingId = CFStringCreateWithCString(NULL, data + 8, kCFStringEncodingUTF8);
202
203 out:
204 if (data)
205 free(data);
206 if (ret && error)
207 *error = CFErrorCreate(NULL, kCFErrorDomainPOSIX, ret, NULL);
208
209 return signingId;
210}
211
dbe77505
A
212CFStringRef
213SecTaskCopySigningIdentifier(SecTaskRef task, CFErrorRef *error)
214{
215 return SecTaskCopyIdentifier(task, CS_OPS_IDENTITY, error);
216}
217
218CFStringRef
219SecTaskCopyTeamIdentifier(SecTaskRef task, CFErrorRef *error)
220{
221 return SecTaskCopyIdentifier(task, CS_OPS_TEAMID, error);
222}
223
fa7225c8
A
224uint32_t
225SecTaskGetCodeSignStatus(SecTaskRef task)
226{
227 uint32_t flags = 0;
228 if (csops_task(task, CS_OPS_STATUS, &flags, sizeof(flags)) != 0)
229 return 0;
230 return flags;
231}
d8f41ccd
A
232
233static bool SecTaskLoadEntitlements(SecTaskRef task, CFErrorRef *error)
234{
235 CFMutableDictionaryRef entitlements = NULL;
236 struct csheader header;
237 uint8_t *buffer = NULL;
238 uint32_t bufferlen;
239 int ret;
240
d8f41ccd
A
241 ret = csops_task(task, CS_OPS_ENTITLEMENTS_BLOB, &header, sizeof(header));
242 /* Any other combination means no entitlements */
d64be36e
A
243 if (ret == -1) {
244 if (errno != ERANGE) {
e0e0d90e
A
245 int entitlementErrno = errno;
246
d64be36e 247 uint32_t cs_flags = -1;
e0e0d90e
A
248 if (-1 == csops_task(task, CS_OPS_STATUS, &cs_flags, sizeof(cs_flags))) {
249 syslog(LOG_NOTICE, "Failed to get cs_flags, error=%d", errno);
250 }
251
d64be36e
A
252 if (cs_flags != 0) { // was signed
253 pid_t pid;
254 audit_token_to_au32(task->token, NULL, NULL, NULL, NULL, NULL, &pid, NULL, NULL);
255 syslog(LOG_NOTICE, "SecTaskLoadEntitlements failed error=%d cs_flags=%x, pid=%d", entitlementErrno, cs_flags, pid); // to ease diagnostics
256
257 CFStringRef description = SecTaskCopyDebugDescription(task);
258 char *descriptionBuf = NULL;
259 CFIndex descriptionSize = CFStringGetLength(description) * 4;
260 descriptionBuf = (char *)malloc(descriptionSize);
261 if (!CFStringGetCString(description, descriptionBuf, descriptionSize, kCFStringEncodingUTF8)) {
262 descriptionBuf[0] = 0;
263 }
264
265 syslog(LOG_NOTICE, "SecTaskCopyDebugDescription: %s", descriptionBuf);
266 CFReleaseNull(description);
267 free(descriptionBuf);
268 }
269 task->lastFailure = entitlementErrno; // was overwritten by csops_task(CS_OPS_STATUS) above
270
271 // EINVAL is what the kernel says for unsigned code, so we'll have to let that pass
272 if (entitlementErrno == EINVAL) {
273 task->entitlementsLoaded = true;
274 return true;
275 }
276 ret = entitlementErrno; // what really went wrong
277 goto out; // bail out
278 }
d8f41ccd
A
279 bufferlen = ntohl(header.length);
280 /* check for insane values */
281 if (bufferlen > 1024 * 1024 || bufferlen < 8) {
fa7225c8 282 ret = E2BIG;
d8f41ccd
A
283 goto out;
284 }
285 buffer = malloc(bufferlen);
286 if (buffer == NULL) {
287 ret = ENOMEM;
288 goto out;
289 }
290 ret = csops_task(task, CS_OPS_ENTITLEMENTS_BLOB, buffer, bufferlen);
291 if (ret) {
292 ret = errno;
293 goto out;
294 }
295
296 CFDataRef data = CFDataCreateWithBytesNoCopy(kCFAllocatorDefault, buffer+8, bufferlen-8, kCFAllocatorNull);
297 entitlements = (CFMutableDictionaryRef) CFPropertyListCreateWithData(kCFAllocatorDefault, data, kCFPropertyListMutableContainers, NULL, error);
866f8763 298 CFReleaseNull(data);
d8f41ccd 299
d64be36e 300 if ((entitlements==NULL) || (CFGetTypeID(entitlements)!=CFDictionaryGetTypeID())){
fa7225c8 301 ret = EDOM; // don't use EINVAL here; it conflates problems with syscall error returns
d8f41ccd
A
302 goto out;
303 }
d64be36e
A
304
305 bool entitlementsModified = updateCatalystEntitlements(entitlements);
306 if (entitlementsModified) {
307 pid_t pid;
308 audit_token_to_au32(task->token, NULL, NULL, NULL, NULL, NULL, &pid, NULL, NULL);
309 secinfo("SecTask", "Fixed catalyst entitlements for process %d", pid);
310 }
d8f41ccd
A
311 }
312
313 task->entitlements = entitlements ? CFRetain(entitlements) : NULL;
314 task->entitlementsLoaded = true;
315
316out:
866f8763 317 CFReleaseNull(entitlements);
d8f41ccd
A
318 if(buffer)
319 free(buffer);
320 if (ret && error && *error==NULL)
321 *error = CFErrorCreate(NULL, kCFErrorDomainPOSIX, ret, NULL);
322 return ret == 0;
323}
324
325
326CFTypeRef SecTaskCopyValueForEntitlement(SecTaskRef task, CFStringRef entitlement, CFErrorRef *error)
327{
328 CFTypeRef value = NULL;
329 require(check_task(task), out);
330
331 /* Load entitlements if necessary */
332 if (task->entitlementsLoaded == false) {
333 require_quiet(SecTaskLoadEntitlements(task, error), out);
334 }
335
336 if (task->entitlements != NULL) {
337 value = CFDictionaryGetValue(task->entitlements, entitlement);
338
339 /* Return something the caller must release */
340 if (value != NULL) {
341 CFRetain(value);
342 }
343 }
344out:
345 return value;
346}
347
348CFDictionaryRef SecTaskCopyValuesForEntitlements(SecTaskRef task, CFArrayRef entitlements, CFErrorRef *error)
349{
350 CFMutableDictionaryRef values = NULL;
351 require(check_task(task), out);
352
353 /* Load entitlements if necessary */
354 if (task->entitlementsLoaded == false) {
355 SecTaskLoadEntitlements(task, error);
356 }
357
358 /* Iterate over the passed in entitlements, populating the dictionary
359 * If entitlements were loaded but none were present, return an empty
360 * dictionary */
361 if (task->entitlementsLoaded == true) {
362
363 CFIndex i, count = CFArrayGetCount(entitlements);
364 values = CFDictionaryCreateMutable(CFGetAllocator(task), count, &kCFTypeDictionaryKeyCallBacks, &kCFTypeDictionaryValueCallBacks);
365 if (task->entitlements != NULL) {
366 for (i = 0; i < count; i++) {
367 CFStringRef entitlement = CFArrayGetValueAtIndex(entitlements, i);
368 CFTypeRef value = CFDictionaryGetValue(task->entitlements, entitlement);
369 if (value != NULL) {
370 CFDictionarySetValue(values, entitlement, value);
371 }
372 }
373 }
374 }
375out:
376 return values;
377}
866f8763 378
b54c578e 379#if SEC_OS_OSX
866f8763
A
380/*
381 * Determine if the given task meets a specified requirement.
382 */
383OSStatus
384SecTaskValidateForRequirement(SecTaskRef task, CFStringRef requirement)
385{
386 OSStatus status;
387 SecCodeRef code = NULL;
388 SecRequirementRef req = NULL;
389
390 CFMutableDictionaryRef codeDict = CFDictionaryCreateMutable(kCFAllocatorDefault, 0, &kCFTypeDictionaryKeyCallBacks, &kCFTypeDictionaryValueCallBacks);
391 CFDataRef auditData = CFDataCreate(kCFAllocatorDefault, (const UInt8 *)&task->token, sizeof(audit_token_t));
392 CFDictionarySetValue(codeDict, kSecGuestAttributeAudit, auditData);
393 status = SecCodeCopyGuestWithAttributes(NULL, codeDict, kSecCSDefaultFlags, &code);
394 CFReleaseNull(codeDict);
395 CFReleaseNull(auditData);
396
397 if (!status) {
398 status = SecRequirementCreateWithString(requirement,
399 kSecCSDefaultFlags, &req);
400 }
401 if (!status) {
402 status = SecCodeCheckValidity(code, kSecCSDefaultFlags, req);
403 }
404
405 CFReleaseNull(req);
406 CFReleaseNull(code);
407
408 return status;
409}
b54c578e 410#endif /* SEC_OS_OSX */
866f8763
A
411
412Boolean SecTaskEntitlementsValidated(SecTaskRef task) {
413 // TODO: Cache the result
414 uint32_t csflags = 0;
415 const uint32_t mask = CS_VALID | CS_KILL | CS_ENTITLEMENTS_VALIDATED;
79b9da22 416 const uint32_t debug_mask = CS_DEBUGGED | CS_ENTITLEMENTS_VALIDATED;
866f8763 417 int rc = csops_task(task, CS_OPS_STATUS, &csflags, sizeof(csflags));
79b9da22
A
418 // Allow debugged processes that were valid to continue being treated as valid
419 // We need this all the time (not just on internal) because third parties may need to debug their entitled process in xcode
420 return (rc != -1) && ((mask & csflags) == mask || (debug_mask & csflags) == debug_mask);
866f8763
A
421}
422