Magisk/native/jni/core/daemon.cpp

462 lines
12 KiB
C++
Raw Normal View History

2021-01-11 02:19:10 -08:00
#include <csignal>
2020-04-12 05:34:56 -07:00
#include <libgen.h>
2017-04-08 07:37:43 +08:00
#include <sys/un.h>
2017-11-28 04:43:46 +08:00
#include <sys/mount.h>
2017-04-08 07:37:43 +08:00
2020-03-09 01:50:30 -07:00
#include <magisk.hpp>
2022-05-12 02:03:42 -07:00
#include <base.hpp>
2020-03-09 01:50:30 -07:00
#include <daemon.hpp>
#include <selinux.hpp>
#include <db.hpp>
#include <resetprop.hpp>
#include <flags.h>
2022-07-01 04:53:41 -07:00
#include <core-rs.cpp>
2021-01-11 02:19:10 -08:00
#include "core.hpp"
2020-04-12 05:34:56 -07:00
using namespace std;
2019-01-20 17:52:19 -05:00
int SDK_INT = -1;
2020-04-12 05:34:56 -07:00
string MAGISKTMP;
2021-01-11 02:19:10 -08:00
bool RECOVERY_MODE = false;
int DAEMON_STATE = STATE_NONE;
2020-05-18 05:18:49 -07:00
static struct stat self_st;
2019-01-20 17:52:19 -05:00
2021-09-18 14:40:12 -07:00
static map<int, poll_callback> *poll_map;
static vector<pollfd> *poll_fds;
static int poll_ctrl;
enum {
POLL_CTRL_NEW,
POLL_CTRL_RM,
};
void register_poll(const pollfd *pfd, poll_callback callback) {
if (gettid() == getpid()) {
// On main thread, directly modify
poll_map->try_emplace(pfd->fd, callback);
poll_fds->emplace_back(*pfd);
} else {
// Send it to poll_ctrl
write_int(poll_ctrl, POLL_CTRL_NEW);
xwrite(poll_ctrl, pfd, sizeof(*pfd));
xwrite(poll_ctrl, &callback, sizeof(callback));
}
}
void unregister_poll(int fd, bool auto_close) {
if (fd < 0)
return;
2021-09-18 14:40:12 -07:00
if (gettid() == getpid()) {
// On main thread, directly modify
poll_map->erase(fd);
for (auto &poll_fd : *poll_fds) {
if (poll_fd.fd == fd) {
if (auto_close) {
close(poll_fd.fd);
}
// Cannot modify while iterating, invalidate it instead
// It will be removed in the next poll loop
poll_fd.fd = -1;
break;
}
}
} else {
// Send it to poll_ctrl
write_int(poll_ctrl, POLL_CTRL_RM);
write_int(poll_ctrl, fd);
write_int(poll_ctrl, auto_close);
}
}
2021-10-17 04:24:25 -07:00
void clear_poll() {
if (poll_fds) {
for (auto &poll_fd : *poll_fds) {
close(poll_fd.fd);
}
}
delete poll_fds;
delete poll_map;
poll_fds = nullptr;
poll_map = nullptr;
}
2021-09-18 14:40:12 -07:00
static void poll_ctrl_handler(pollfd *pfd) {
int code = read_int(pfd->fd);
switch (code) {
2022-02-12 23:43:36 +08:00
case POLL_CTRL_NEW: {
pollfd new_fd;
poll_callback cb;
xxread(pfd->fd, &new_fd, sizeof(new_fd));
xxread(pfd->fd, &cb, sizeof(cb));
register_poll(&new_fd, cb);
break;
}
case POLL_CTRL_RM: {
int fd = read_int(pfd->fd);
bool auto_close = read_int(pfd->fd);
unregister_poll(fd, auto_close);
break;
}
2021-09-18 14:40:12 -07:00
}
}
[[noreturn]] static void poll_loop() {
// Register poll_ctrl
int pipefd[2];
xpipe2(pipefd, O_CLOEXEC);
poll_ctrl = pipefd[1];
pollfd poll_ctrl_pfd = { pipefd[0], POLLIN, 0 };
register_poll(&poll_ctrl_pfd, poll_ctrl_handler);
for (;;) {
if (poll(poll_fds->data(), poll_fds->size(), -1) <= 0)
continue;
// MUST iterate with index because any poll_callback could add new elements to poll_fds
for (int i = 0; i < poll_fds->size();) {
auto &pfd = (*poll_fds)[i];
if (pfd.revents) {
if (pfd.revents & POLLERR || pfd.revents & POLLNVAL) {
poll_map->erase(pfd.fd);
poll_fds->erase(poll_fds->begin() + i);
continue;
}
if (auto it = poll_map->find(pfd.fd); it != poll_map->end()) {
it->second(&pfd);
}
}
++i;
}
}
}
2022-03-01 02:13:18 -08:00
static void handle_request_async(int client, int code, const sock_cred &cred) {
2021-08-11 22:57:08 -07:00
switch (code) {
2022-03-01 02:13:18 -08:00
case MainRequest::DENYLIST:
2021-09-12 12:40:34 -07:00
denylist_handler(client, &cred);
break;
2022-03-01 02:13:18 -08:00
case MainRequest::SUPERUSER:
su_daemon_handler(client, &cred);
break;
2022-03-01 02:13:18 -08:00
case MainRequest::POST_FS_DATA:
post_fs_data(client);
break;
2022-03-01 02:13:18 -08:00
case MainRequest::LATE_START:
late_start(client);
break;
2022-03-01 02:13:18 -08:00
case MainRequest::BOOT_COMPLETE:
boot_complete(client);
break;
2022-05-28 22:39:44 -07:00
case MainRequest::ZYGOTE_RESTART:
zygote_restart(client);
break;
2022-03-01 02:13:18 -08:00
case MainRequest::SQLITE_CMD:
exec_sql(client);
break;
2022-03-01 02:13:18 -08:00
case MainRequest::REMOVE_MODULES:
remove_modules();
write_int(client, 0);
close(client);
reboot();
break;
2022-03-01 02:13:18 -08:00
case MainRequest::ZYGISK:
case MainRequest::ZYGISK_PASSTHROUGH:
2021-08-18 03:44:32 -07:00
zygisk_handler(client, &cred);
break;
default:
2022-02-12 23:43:36 +08:00
__builtin_unreachable();
}
2018-10-12 21:46:09 -04:00
}
2022-03-01 02:13:18 -08:00
static void handle_request_sync(int client, int code) {
2021-08-11 22:57:08 -07:00
switch (code) {
2022-03-01 02:13:18 -08:00
case MainRequest::CHECK_VERSION:
#if MAGISK_DEBUG
write_string(client, MAGISK_VERSION ":MAGISK:D");
#else
write_string(client, MAGISK_VERSION ":MAGISK:R");
#endif
2021-08-11 22:57:08 -07:00
break;
2022-03-01 02:13:18 -08:00
case MainRequest::CHECK_VERSION_CODE:
2021-08-11 22:57:08 -07:00
write_int(client, MAGISK_VER_CODE);
break;
2022-03-01 02:13:18 -08:00
case MainRequest::GET_PATH:
2021-08-11 22:57:08 -07:00
write_string(client, MAGISKTMP.data());
break;
2022-03-01 02:13:18 -08:00
case MainRequest::START_DAEMON:
2021-08-11 22:57:08 -07:00
setup_logfile(true);
break;
2022-03-01 02:13:18 -08:00
case MainRequest::STOP_DAEMON:
2021-09-12 12:40:34 -07:00
denylist_handler(-1, nullptr);
2021-08-26 03:09:56 -07:00
write_int(client, 0);
// Terminate the daemon!
exit(0);
2022-02-12 23:43:36 +08:00
default:
__builtin_unreachable();
2021-08-11 22:57:08 -07:00
}
}
2021-10-19 23:46:38 -07:00
static bool is_client(pid_t pid) {
// Verify caller is the same as server
char path[32];
sprintf(path, "/proc/%d/exe", pid);
2022-02-12 23:43:36 +08:00
struct stat st{};
2021-10-19 23:46:38 -07:00
return !(stat(path, &st) || st.st_dev != self_st.st_dev || st.st_ino != self_st.st_ino);
}
2021-09-18 14:40:12 -07:00
static void handle_request(pollfd *pfd) {
int client = xaccept4(pfd->fd, nullptr, nullptr, SOCK_CLOEXEC);
// Verify client credentials
2021-10-19 23:46:38 -07:00
sock_cred cred;
bool is_root;
bool is_zygote;
2021-09-18 14:40:12 -07:00
int code;
if (!get_client_cred(client, &cred)) {
// Client died
2021-10-19 23:46:38 -07:00
goto done;
}
2022-05-30 02:09:07 -07:00
is_root = cred.uid == AID_ROOT;
2021-10-19 23:46:38 -07:00
is_zygote = cred.context == "u:r:zygote:s0";
if (!is_root && !is_zygote && !is_client(cred.pid)) {
// Unsupported client state
write_int(client, MainResponse::ACCESS_DENIED);
2021-08-11 22:57:08 -07:00
goto done;
}
2021-08-11 22:57:08 -07:00
code = read_int(client);
if (code < 0 || code >= MainRequest::END || code == MainRequest::_SYNC_BARRIER_) {
// Unknown request code
2021-08-11 22:57:08 -07:00
goto done;
}
// Check client permissions
2022-03-01 02:13:18 -08:00
switch (code) {
case MainRequest::POST_FS_DATA:
case MainRequest::LATE_START:
case MainRequest::BOOT_COMPLETE:
2022-05-28 22:39:44 -07:00
case MainRequest::ZYGOTE_RESTART:
2022-03-01 02:13:18 -08:00
case MainRequest::SQLITE_CMD:
case MainRequest::GET_PATH:
case MainRequest::DENYLIST:
case MainRequest::STOP_DAEMON:
if (!is_root) {
2022-03-01 02:13:18 -08:00
write_int(client, MainResponse::ROOT_REQUIRED);
2021-08-11 22:57:08 -07:00
goto done;
}
break;
2022-03-01 02:13:18 -08:00
case MainRequest::REMOVE_MODULES:
2022-05-30 02:09:07 -07:00
if (!is_root && cred.uid != AID_SHELL) {
write_int(client, MainResponse::ACCESS_DENIED);
goto done;
}
break;
case MainRequest::ZYGISK:
if (!is_zygote && selinux_enabled()) {
// Invalid client context
write_int(client, MainResponse::ACCESS_DENIED);
2021-08-11 22:57:08 -07:00
goto done;
}
break;
2022-02-12 23:43:36 +08:00
default:
break;
}
2022-03-01 02:13:18 -08:00
write_int(client, MainResponse::OK);
2022-02-12 23:43:36 +08:00
2022-03-01 02:13:18 -08:00
if (code < MainRequest::_SYNC_BARRIER_) {
handle_request_sync(client, code);
2021-08-11 22:57:08 -07:00
goto done;
}
// Handle async requests in another thread
2022-03-01 02:13:18 -08:00
exec_task([=] { handle_request_async(client, code, cred); });
return;
2020-05-18 05:18:49 -07:00
2021-08-11 22:57:08 -07:00
done:
close(client);
2017-04-08 07:37:43 +08:00
}
static void switch_cgroup(const char *cgroup, int pid) {
char buf[32];
snprintf(buf, sizeof(buf), "%s/cgroup.procs", cgroup);
if (access(buf, F_OK) != 0)
return;
int fd = xopen(buf, O_WRONLY | O_APPEND | O_CLOEXEC);
if (fd == -1)
return;
snprintf(buf, sizeof(buf), "%d\n", pid);
xwrite(fd, buf, strlen(buf));
close(fd);
}
2021-09-18 14:40:12 -07:00
static void daemon_entry() {
magisk_logging();
// Block all signals
sigset_t block_set;
sigfillset(&block_set);
pthread_sigmask(SIG_SETMASK, &block_set, nullptr);
// Change process name
set_nice_name("magiskd");
int fd = xopen("/dev/null", O_WRONLY);
xdup2(fd, STDOUT_FILENO);
xdup2(fd, STDERR_FILENO);
if (fd > STDERR_FILENO)
close(fd);
fd = xopen("/dev/zero", O_RDONLY);
xdup2(fd, STDIN_FILENO);
if (fd > STDERR_FILENO)
close(fd);
setsid();
setcon("u:r:" SEPOL_PROC_DOMAIN ":s0");
start_log_daemon();
LOGI(NAME_WITH_VER(Magisk) " daemon started\n");
// Escape from cgroup
int pid = getpid();
switch_cgroup("/acct", pid);
switch_cgroup("/dev/cg2_bpf", pid);
switch_cgroup("/sys/fs/cgroup", pid);
if (getprop("ro.config.per_app_memcg") != "false") {
switch_cgroup("/dev/memcg/apps", pid);
}
// Get self stat
char buf[64];
xreadlink("/proc/self/exe", buf, sizeof(buf));
MAGISKTMP = dirname(buf);
xstat("/proc/self/exe", &self_st);
// Get API level
parse_prop_file("/system/build.prop", [](auto key, auto val) -> bool {
if (key == "ro.build.version.sdk") {
SDK_INT = parse_int(val);
return false;
}
return true;
});
if (SDK_INT < 0) {
// In case some devices do not store this info in build.prop, fallback to getprop
auto sdk = getprop("ro.build.version.sdk");
if (!sdk.empty()) {
SDK_INT = parse_int(sdk);
}
}
LOGI("* Device API level: %d\n", SDK_INT);
restore_tmpcon();
// SAR cleanups
auto mount_list = MAGISKTMP + "/" ROOTMNT;
if (access(mount_list.data(), F_OK) == 0) {
file_readline(true, mount_list.data(), [](string_view line) -> bool {
umount2(line.data(), MNT_DETACH);
return true;
});
}
2022-04-09 17:13:30 +08:00
rm_rf((MAGISKTMP + "/" ROOTOVL).data());
// Load config status
auto config = MAGISKTMP + "/" INTLROOT "/config";
parse_prop_file(config.data(), [](auto key, auto val) -> bool {
if (key == "RECOVERYMODE" && val == "true")
RECOVERY_MODE = true;
return true;
});
// Use isolated devpts if kernel support
if (access("/dev/pts/ptmx", F_OK) == 0) {
auto pts = MAGISKTMP + "/" SHELLPTS;
2021-09-20 13:15:16 +08:00
if (access(pts.data(), F_OK)) {
xmkdirs(pts.data(), 0755);
xmount("devpts", pts.data(), "devpts",
MS_NOSUID | MS_NOEXEC, "newinstance");
auto ptmx = pts + "/ptmx";
if (access(ptmx.data(), F_OK)) {
xumount(pts.data());
rmdir(pts.data());
}
}
}
2021-09-23 15:18:34 +08:00
sockaddr_un sun{};
socklen_t len = setup_sockaddr(&sun, MAIN_SOCKET);
fd = xsocket(AF_LOCAL, SOCK_STREAM | SOCK_CLOEXEC, 0);
2022-02-12 23:43:36 +08:00
if (xbind(fd, (sockaddr *) &sun, len))
exit(1);
xlisten(fd, 10);
2021-09-18 14:40:12 -07:00
default_new(poll_map);
default_new(poll_fds);
default_new(module_list);
2021-09-18 14:40:12 -07:00
// Register handler for main socket
pollfd main_socket_pfd = { fd, POLLIN, 0 };
register_poll(&main_socket_pfd, handle_request);
// Loop forever to listen for requests
2021-09-18 14:40:12 -07:00
poll_loop();
2017-04-08 07:37:43 +08:00
}
2022-03-01 02:13:18 -08:00
int connect_daemon(int req, bool create) {
2021-09-23 15:18:34 +08:00
sockaddr_un sun{};
socklen_t len = setup_sockaddr(&sun, MAIN_SOCKET);
int fd = xsocket(AF_UNIX, SOCK_STREAM | SOCK_CLOEXEC, 0);
2022-02-12 23:43:36 +08:00
if (connect(fd, (sockaddr *) &sun, len)) {
2022-05-30 02:09:07 -07:00
if (!create || getuid() != AID_ROOT) {
LOGE("No daemon is currently running!\n");
2021-09-23 15:18:34 +08:00
close(fd);
2021-08-22 02:11:48 -07:00
return -1;
}
2022-05-29 14:28:56 +08:00
char buf[64];
xreadlink("/proc/self/exe", buf, sizeof(buf));
if (str_starts(buf, "/system/bin/")) {
LOGE("Start daemon on /dev or /sbin\n");
close(fd);
return -1;
}
if (fork_dont_care() == 0) {
close(fd);
daemon_entry();
}
2022-02-12 23:43:36 +08:00
while (connect(fd, (struct sockaddr *) &sun, len))
usleep(10000);
}
2022-03-01 02:13:18 -08:00
write_int(fd, req);
int res = read_int(fd);
if (res < MainResponse::ERROR || res >= MainResponse::END)
res = MainResponse::ERROR;
2022-02-12 23:43:36 +08:00
switch (res) {
2022-03-01 02:13:18 -08:00
case MainResponse::OK:
2022-02-12 23:43:36 +08:00
break;
2022-03-01 02:13:18 -08:00
case MainResponse::ERROR:
2022-02-12 23:43:36 +08:00
LOGE("Daemon error\n");
exit(-1);
2022-03-01 02:13:18 -08:00
case MainResponse::ROOT_REQUIRED:
2022-02-12 23:43:36 +08:00
LOGE("Root is required for this operation\n");
exit(-1);
case MainResponse::ACCESS_DENIED:
LOGE("Access denied\n");
2022-02-12 23:43:36 +08:00
exit(-1);
2022-03-01 02:13:18 -08:00
default:
2022-02-12 23:43:36 +08:00
__builtin_unreachable();
}
return fd;
2017-04-08 07:37:43 +08:00
}