Index: util/mach/task_for_pid.h |
diff --git a/util/mach/task_for_pid.h b/util/mach/task_for_pid.h |
new file mode 100644 |
index 0000000000000000000000000000000000000000..2b81fbebdddb173239cf03964ea1f9004e78c12a |
--- /dev/null |
+++ b/util/mach/task_for_pid.h |
@@ -0,0 +1,59 @@ |
+// Copyright 2014 The Crashpad Authors. All rights reserved. |
+// |
+// Licensed under the Apache License, Version 2.0 (the "License"); |
+// you may not use this file except in compliance with the License. |
+// You may obtain a copy of the License at |
+// |
+// http://www.apache.org/licenses/LICENSE-2.0 |
+// |
+// Unless required by applicable law or agreed to in writing, software |
+// distributed under the License is distributed on an "AS IS" BASIS, |
+// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
+// See the License for the specific language governing permissions and |
+// limitations under the License. |
+ |
+#ifndef CRASHPAD_UTIL_MACH_TASK_FOR_PID_H_ |
+#define CRASHPAD_UTIL_MACH_TASK_FOR_PID_H_ |
+ |
+#include <mach/mach.h> |
+#include <sys/types.h> |
+ |
+namespace crashpad { |
+ |
+//! \brief Wraps `task_for_pid()`. |
+//! |
+//! This function exists to support `task_for_pid()` access checks in a setuid |
+//! environment. Normally, `task_for_pid()` can only return an arbitrary task’s |
+//! port when running as root or when taskgated(8) approves. When not running as |
+//! root, a series of access checks are perfomed to ensure that the running |
+//! process has permission to obtain the other process’ task port. |
+//! |
+//! It is possible to make an executable setuid root to give it broader |
+//! `task_for_pid()` access by bypassing taskgated(8) checks, but this also has |
+//! the effect of bypassing the access checks, allowing any process’ task port |
+//! to be obtained. In most situations, these access checks are desirable to |
+//! prevent security and privacy breaches. |
+//! |
+//! When running as setuid root, this function wraps `task_for_pid()`, |
+//! reimplementing those access checks. A process whose effective user ID is 0 |
+//! and whose real user ID is nonzero is understood to be running setuid root. |
+//! In this case, the requested task’s real, effective, and saved set-user IDs |
+//! must all equal the running process’ real user ID, the requested task must |
+//! not have changed privileges, and the requested task’s set of all group IDs |
+//! (including its real, effective, and saved set-group IDs and supplementary |
+//! group list) must be a subset of the running process’ set of all group IDs. |
+//! These access checks mimic those that the kernel performs. |
+//! |
+//! When not running as setuid root, `task_for_pid()` is called directly, |
+//! without imposing any additional checks beyond what the kernel does. |
+//! |
+//! \param[in] pid The process ID of the task whose task port is desired. |
+//! |
+//! \return A send right to the task port if it could be obtained, or |
+//! `TASK_NULL` otherwise, with an error message logged. If a send right is |
+//! returned, the caller takes ownership of it. |
+task_t TaskForPID(pid_t pid); |
+ |
+} // namespace crashpad |
+ |
+#endif // CRASHPAD_UTIL_MACH_TASK_FOR_PID_H_ |