2017-04-15 03:21:31 +08:00
|
|
|
/* su_socket.c - Functions for communication to client
|
|
|
|
*/
|
|
|
|
|
|
|
|
#include <stdlib.h>
|
|
|
|
#include <stdio.h>
|
|
|
|
#include <string.h>
|
|
|
|
#include <unistd.h>
|
|
|
|
#include <fcntl.h>
|
|
|
|
#include <errno.h>
|
2017-04-16 23:12:53 +08:00
|
|
|
#include <endian.h>
|
2017-04-15 03:21:31 +08:00
|
|
|
#include <sys/types.h>
|
|
|
|
#include <sys/socket.h>
|
|
|
|
#include <sys/un.h>
|
2017-04-17 16:32:41 +08:00
|
|
|
#include <selinux/selinux.h>
|
2017-04-15 03:21:31 +08:00
|
|
|
|
|
|
|
#include "magisk.h"
|
|
|
|
#include "utils.h"
|
|
|
|
#include "su.h"
|
2018-04-21 13:18:33 +08:00
|
|
|
#include "magiskpolicy.h"
|
2017-04-15 03:21:31 +08:00
|
|
|
|
|
|
|
int socket_create_temp(char *path, size_t len) {
|
|
|
|
int fd;
|
|
|
|
struct sockaddr_un sun;
|
|
|
|
|
2017-07-08 23:50:47 +08:00
|
|
|
fd = xsocket(AF_LOCAL, SOCK_STREAM | SOCK_CLOEXEC, 0);
|
2017-04-15 03:21:31 +08:00
|
|
|
if (fcntl(fd, F_SETFD, FD_CLOEXEC)) {
|
|
|
|
PLOGE("fcntl FD_CLOEXEC");
|
|
|
|
}
|
|
|
|
|
|
|
|
memset(&sun, 0, sizeof(sun));
|
|
|
|
sun.sun_family = AF_LOCAL;
|
2017-11-23 23:46:23 +08:00
|
|
|
snprintf(path, len, "/dev/.socket%d", getpid());
|
2017-10-28 16:03:39 +08:00
|
|
|
strcpy(sun.sun_path, path);
|
2017-04-15 03:21:31 +08:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Delete the socket to protect from situations when
|
|
|
|
* something bad occured previously and the kernel reused pid from that process.
|
|
|
|
* Small probability, isn't it.
|
|
|
|
*/
|
2017-10-28 16:03:39 +08:00
|
|
|
unlink(path);
|
2017-04-15 03:21:31 +08:00
|
|
|
|
|
|
|
xbind(fd, (struct sockaddr*) &sun, sizeof(sun));
|
|
|
|
xlisten(fd, 1);
|
|
|
|
|
2017-10-28 16:03:39 +08:00
|
|
|
// Set attributes so requester can access it
|
2018-04-21 13:18:33 +08:00
|
|
|
setfilecon(path, "u:object_r:"SEPOL_FILE_DOMAIN":s0");
|
2018-06-13 23:04:57 +08:00
|
|
|
chown(path, su_ctx->info->manager_stat.st_uid, su_ctx->info->manager_stat.st_gid);
|
2017-04-17 16:32:41 +08:00
|
|
|
|
2017-04-15 03:21:31 +08:00
|
|
|
return fd;
|
|
|
|
}
|
|
|
|
|
|
|
|
int socket_accept(int serv_fd) {
|
|
|
|
struct timeval tv;
|
|
|
|
fd_set fds;
|
|
|
|
int rc;
|
|
|
|
|
2017-05-29 18:54:33 +08:00
|
|
|
/* Wait 60 seconds for a connection, then give up. */
|
|
|
|
tv.tv_sec = 60;
|
2017-04-15 03:21:31 +08:00
|
|
|
tv.tv_usec = 0;
|
|
|
|
FD_ZERO(&fds);
|
|
|
|
FD_SET(serv_fd, &fds);
|
|
|
|
do {
|
|
|
|
rc = select(serv_fd + 1, &fds, NULL, NULL, &tv);
|
|
|
|
} while (rc < 0 && errno == EINTR);
|
|
|
|
if (rc < 1) {
|
|
|
|
PLOGE("select");
|
|
|
|
}
|
|
|
|
|
2017-07-08 23:50:47 +08:00
|
|
|
return xaccept4(serv_fd, NULL, NULL, SOCK_CLOEXEC);
|
2017-04-15 03:21:31 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
#define write_data(fd, data, data_len) \
|
|
|
|
do { \
|
|
|
|
uint32_t __len = htonl(data_len); \
|
|
|
|
__len = write((fd), &__len, sizeof(__len)); \
|
|
|
|
if (__len != sizeof(__len)) { \
|
|
|
|
PLOGE("write(" #data ")"); \
|
|
|
|
} \
|
|
|
|
__len = write((fd), data, data_len); \
|
|
|
|
if (__len != data_len) { \
|
|
|
|
PLOGE("write(" #data ")"); \
|
|
|
|
} \
|
|
|
|
} while (0)
|
|
|
|
|
|
|
|
#define write_string_data(fd, name, data) \
|
|
|
|
do { \
|
|
|
|
write_data(fd, name, strlen(name)); \
|
|
|
|
write_data(fd, data, strlen(data)); \
|
|
|
|
} while (0)
|
|
|
|
|
|
|
|
// stringify everything.
|
|
|
|
#define write_token(fd, name, data) \
|
|
|
|
do { \
|
|
|
|
char buf[16]; \
|
|
|
|
snprintf(buf, sizeof(buf), "%d", data); \
|
|
|
|
write_string_data(fd, name, buf); \
|
|
|
|
} while (0)
|
|
|
|
|
|
|
|
void socket_send_request(int fd, const struct su_context *ctx) {
|
2017-05-29 18:54:33 +08:00
|
|
|
write_token(fd, "uid", ctx->info->uid);
|
2017-04-15 03:21:31 +08:00
|
|
|
write_token(fd, "eof", 1);
|
|
|
|
}
|
|
|
|
|
|
|
|
void socket_receive_result(int fd, char *result, ssize_t result_len) {
|
|
|
|
ssize_t len;
|
|
|
|
len = xread(fd, result, result_len - 1);
|
|
|
|
result[len] = '\0';
|
|
|
|
}
|