]>
Commit | Line | Data |
---|---|---|
3e170ce0 A |
1 | /* |
2 | * Copyright (c) 2015 Apple Inc. All rights reserved. | |
3 | * | |
4 | * @APPLE_OSREFERENCE_LICENSE_HEADER_START@ | |
5 | * | |
6 | * This file contains Original Code and/or Modifications of Original Code | |
7 | * as defined in and that are subject to the Apple Public Source License | |
8 | * Version 2.0 (the 'License'). You may not use this file except in | |
9 | * compliance with the License. The rights granted to you under the License | |
10 | * may not be used to create, or enable the creation or redistribution of, | |
11 | * unlawful or unlicensed copies of an Apple operating system, or to | |
12 | * circumvent, violate, or enable the circumvention or violation of, any | |
13 | * terms of an Apple operating system software license agreement. | |
14 | * | |
15 | * Please obtain a copy of the License at | |
16 | * http://www.opensource.apple.com/apsl/ and read it before using this file. | |
17 | * | |
18 | * The Original Code and all software distributed under the License are | |
19 | * distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER | |
20 | * EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES, | |
21 | * INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY, | |
22 | * FITNESS FOR A PARTICULAR PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT. | |
23 | * Please see the License for the specific language governing rights and | |
24 | * limitations under the License. | |
25 | * | |
26 | * @APPLE_OSREFERENCE_LICENSE_HEADER_END@ | |
27 | */ | |
28 | ||
29 | #include <mach/exception_types.h> | |
30 | #include <mach/mach_types.h> | |
39037602 A |
31 | #include <osfmk/kern/exception.h> |
32 | #include <osfmk/kern/task.h> | |
33 | #include <sys/codesign.h> | |
3e170ce0 A |
34 | #include <sys/param.h> |
35 | #include <sys/user.h> | |
36 | #include <sys/proc.h> | |
37 | #include <sys/proc_internal.h> | |
38 | #include <sys/kauth.h> | |
39 | #include <kern/task.h> | |
40 | ||
41 | #include <security/mac_framework.h> | |
42 | #include <security/mac_internal.h> | |
43 | #include <security/mac_mach_internal.h> | |
44 | ||
39037602 A |
45 | #if CONFIG_CSR |
46 | #include <sys/csr.h> | |
47 | // Panic on internal builds, just log otherwise. | |
48 | #define MAC_MACH_UNEXPECTED(fmt...) \ | |
49 | if (csr_check(CSR_ALLOW_APPLE_INTERNAL) == 0) { panic(fmt); } else { printf(fmt); } | |
50 | #else | |
51 | #define MAC_MACH_UNEXPECTED(fmt...) printf(fmt) | |
52 | #endif | |
53 | ||
3e170ce0 A |
54 | static struct proc * |
55 | mac_task_get_proc(struct task *task) | |
56 | { | |
0a7de745 | 57 | if (task == current_task()) { |
3e170ce0 | 58 | return proc_self(); |
0a7de745 | 59 | } |
3e170ce0 A |
60 | |
61 | /* | |
62 | * Tasks don't really hold a reference on a proc unless the | |
63 | * calling thread belongs to the task in question. | |
64 | */ | |
65 | int pid = task_pid(task); | |
66 | struct proc *p = proc_find(pid); | |
67 | ||
68 | if (p != NULL) { | |
0a7de745 | 69 | if (proc_task(p) == task) { |
3e170ce0 | 70 | return p; |
0a7de745 | 71 | } |
3e170ce0 A |
72 | proc_rele(p); |
73 | } | |
74 | return NULL; | |
75 | } | |
76 | ||
77 | int | |
78 | mac_task_check_expose_task(struct task *task) | |
79 | { | |
80 | int error; | |
81 | ||
82 | struct proc *p = mac_task_get_proc(task); | |
0a7de745 | 83 | if (p == NULL) { |
3e170ce0 | 84 | return ESRCH; |
0a7de745 | 85 | } |
f427ee49 | 86 | struct proc_ident pident = proc_ident(p); |
3e170ce0 A |
87 | |
88 | struct ucred *cred = kauth_cred_get(); | |
3e170ce0 | 89 | proc_rele(p); |
f427ee49 | 90 | MAC_CHECK(proc_check_expose_task, cred, &pident); |
0a7de745 | 91 | return error; |
3e170ce0 A |
92 | } |
93 | ||
94 | int | |
95 | mac_task_check_set_host_special_port(struct task *task, int id, struct ipc_port *port) | |
96 | { | |
97 | int error; | |
98 | ||
99 | struct proc *p = mac_task_get_proc(task); | |
0a7de745 | 100 | if (p == NULL) { |
3e170ce0 | 101 | return ESRCH; |
0a7de745 | 102 | } |
3e170ce0 A |
103 | |
104 | kauth_cred_t cred = kauth_cred_proc_ref(p); | |
105 | MAC_CHECK(proc_check_set_host_special_port, cred, id, port); | |
106 | kauth_cred_unref(&cred); | |
107 | proc_rele(p); | |
0a7de745 | 108 | return error; |
3e170ce0 A |
109 | } |
110 | ||
111 | int | |
112 | mac_task_check_set_host_exception_port(struct task *task, unsigned int exception) | |
113 | { | |
114 | int error; | |
115 | ||
116 | struct proc *p = mac_task_get_proc(task); | |
0a7de745 | 117 | if (p == NULL) { |
3e170ce0 | 118 | return ESRCH; |
0a7de745 | 119 | } |
3e170ce0 A |
120 | |
121 | kauth_cred_t cred = kauth_cred_proc_ref(p); | |
122 | MAC_CHECK(proc_check_set_host_exception_port, cred, exception); | |
123 | kauth_cred_unref(&cred); | |
124 | proc_rele(p); | |
0a7de745 | 125 | return error; |
3e170ce0 A |
126 | } |
127 | ||
128 | int | |
129 | mac_task_check_set_host_exception_ports(struct task *task, unsigned int exception_mask) | |
130 | { | |
131 | int error = 0; | |
132 | int exception; | |
133 | ||
134 | struct proc *p = mac_task_get_proc(task); | |
0a7de745 | 135 | if (p == NULL) { |
3e170ce0 | 136 | return ESRCH; |
0a7de745 | 137 | } |
3e170ce0 A |
138 | |
139 | kauth_cred_t cred = kauth_cred_proc_ref(p); | |
140 | for (exception = FIRST_EXCEPTION; exception < EXC_TYPES_COUNT; exception++) { | |
141 | if (exception_mask & (1 << exception)) { | |
142 | MAC_CHECK(proc_check_set_host_exception_port, cred, exception); | |
0a7de745 | 143 | if (error) { |
3e170ce0 | 144 | break; |
0a7de745 | 145 | } |
3e170ce0 A |
146 | } |
147 | } | |
148 | kauth_cred_unref(&cred); | |
149 | proc_rele(p); | |
0a7de745 | 150 | return error; |
3e170ce0 A |
151 | } |
152 | ||
153 | void | |
154 | mac_thread_userret(struct thread *td) | |
155 | { | |
3e170ce0 A |
156 | MAC_PERFORM(thread_userret, td); |
157 | } | |
158 | ||
d9a64523 A |
159 | void |
160 | mac_proc_notify_exec_complete(struct proc *proc) | |
161 | { | |
162 | thread_t thread = current_thread(); | |
163 | ||
164 | /* | |
165 | * Since this MAC hook was designed to support upcalls, make sure the hook | |
166 | * is called with kernel importance propagation enabled so any daemons | |
167 | * can get any appropriate importance donations. | |
168 | */ | |
169 | thread_enable_send_importance(thread, TRUE); | |
170 | MAC_PERFORM(proc_notify_exec_complete, proc); | |
171 | thread_enable_send_importance(thread, FALSE); | |
172 | } | |
173 | ||
5ba3f43e A |
174 | /**** Exception Policy |
175 | * | |
176 | * Note that the functions below do not fully follow the usual convention for mac policy functions | |
177 | * in the kernel. Besides avoiding confusion in how the mac function names are mixed with the actual | |
178 | * policy function names, we diverge because the exception policy is somewhat special: | |
179 | * It is used in places where allocation and association must be separate, and its labels do not | |
180 | * only belong to one type of object as usual, but to two (on exception actions and on tasks as | |
181 | * crash labels). | |
182 | */ | |
183 | ||
184 | // Label allocation and deallocation, may sleep. | |
185 | ||
186 | struct label * | |
187 | mac_exc_create_label(void) | |
39037602 A |
188 | { |
189 | struct label *label = mac_labelzone_alloc(MAC_WAITOK); | |
190 | ||
5ba3f43e A |
191 | if (label == NULL) { |
192 | return NULL; | |
193 | } | |
194 | ||
195 | // Policy initialization of the label, typically performs allocations as well. | |
196 | // (Unless the policy's full data really fits into a pointer size.) | |
39037602 | 197 | MAC_PERFORM(exc_action_label_init, label); |
0a7de745 | 198 | |
39037602 A |
199 | return label; |
200 | } | |
201 | ||
5ba3f43e A |
202 | void |
203 | mac_exc_free_label(struct label *label) | |
39037602 A |
204 | { |
205 | MAC_PERFORM(exc_action_label_destroy, label); | |
206 | mac_labelzone_free(label); | |
207 | } | |
208 | ||
5ba3f43e | 209 | // Action label initialization and teardown, may sleep. |
39037602 A |
210 | |
211 | void | |
5ba3f43e | 212 | mac_exc_associate_action_label(struct exception_action *action, struct label *label) |
39037602 | 213 | { |
5ba3f43e A |
214 | action->label = label; |
215 | MAC_PERFORM(exc_action_label_associate, action, action->label); | |
39037602 A |
216 | } |
217 | ||
218 | void | |
5ba3f43e | 219 | mac_exc_free_action_label(struct exception_action *action) |
39037602 | 220 | { |
5ba3f43e | 221 | mac_exc_free_label(action->label); |
39037602 | 222 | action->label = NULL; |
39037602 A |
223 | } |
224 | ||
5ba3f43e | 225 | // Action label update and inheritance, may NOT sleep and must be quick. |
39037602 | 226 | |
5ba3f43e A |
227 | int |
228 | mac_exc_update_action_label(struct exception_action *action, | |
0a7de745 A |
229 | struct label *newlabel) |
230 | { | |
5ba3f43e | 231 | int error; |
0a7de745 | 232 | |
5ba3f43e | 233 | MAC_CHECK(exc_action_label_update, action, action->label, newlabel); |
0a7de745 A |
234 | |
235 | return error; | |
5ba3f43e | 236 | } |
39037602 | 237 | |
5ba3f43e A |
238 | int |
239 | mac_exc_inherit_action_label(struct exception_action *parent, | |
0a7de745 A |
240 | struct exception_action *child) |
241 | { | |
5ba3f43e | 242 | return mac_exc_update_action_label(child, parent->label); |
39037602 A |
243 | } |
244 | ||
0a7de745 A |
245 | int |
246 | mac_exc_update_task_crash_label(struct task *task, struct label *label) | |
247 | { | |
5ba3f43e A |
248 | int error; |
249 | ||
250 | assert(task != kernel_task); | |
251 | ||
252 | struct label *crash_label = get_task_crash_label(task); | |
253 | ||
254 | MAC_CHECK(exc_action_label_update, NULL, crash_label, label); | |
0a7de745 A |
255 | |
256 | return error; | |
39037602 A |
257 | } |
258 | ||
5ba3f43e | 259 | // Process label creation, may sleep. |
39037602 | 260 | |
5ba3f43e A |
261 | struct label * |
262 | mac_exc_create_label_for_proc(struct proc *proc) | |
263 | { | |
264 | struct label *label = mac_exc_create_label(); | |
265 | MAC_PERFORM(exc_action_label_populate, label, proc); | |
266 | return label; | |
39037602 A |
267 | } |
268 | ||
5ba3f43e A |
269 | struct label * |
270 | mac_exc_create_label_for_current_proc(void) | |
271 | { | |
272 | return mac_exc_create_label_for_proc(current_proc()); | |
39037602 A |
273 | } |
274 | ||
5ba3f43e A |
275 | // Exception handler policy checking, may sleep. |
276 | ||
39037602 A |
277 | int |
278 | mac_exc_action_check_exception_send(struct task *victim_task, struct exception_action *action) | |
279 | { | |
280 | int error = 0; | |
281 | ||
282 | struct proc *p = get_bsdtask_info(victim_task); | |
283 | struct label *bsd_label = NULL; | |
284 | struct label *label = NULL; | |
285 | ||
286 | if (p != NULL) { | |
287 | // Create a label from the still existing bsd process... | |
5ba3f43e | 288 | label = bsd_label = mac_exc_create_label_for_proc(p); |
39037602 A |
289 | } else { |
290 | // ... otherwise use the crash label on the task. | |
291 | label = get_task_crash_label(victim_task); | |
292 | } | |
293 | ||
294 | if (label == NULL) { | |
5ba3f43e | 295 | MAC_MACH_UNEXPECTED("mac_exc_action_check_exception_send: no exc_action label for process"); |
39037602 A |
296 | return EPERM; |
297 | } | |
298 | ||
299 | MAC_CHECK(exc_action_check_exception_send, label, action, action->label); | |
300 | ||
301 | if (bsd_label != NULL) { | |
5ba3f43e | 302 | mac_exc_free_label(bsd_label); |
39037602 A |
303 | } |
304 | ||
0a7de745 | 305 | return error; |
39037602 | 306 | } |