Magisk/native/jni/core/daemon.c

184 lines
3.9 KiB
C
Raw Normal View History

2017-04-07 23:37:43 +00:00
/* daemon.c - Magisk Daemon
*
* Start the daemon and wait for requests
* Connect the daemon and send requests through sockets
*/
#include <stdlib.h>
#include <unistd.h>
#include <fcntl.h>
#include <string.h>
#include <pthread.h>
#include <signal.h>
2017-04-07 23:37:43 +00:00
#include <sys/un.h>
#include <sys/types.h>
2017-11-27 20:43:46 +00:00
#include <sys/mount.h>
2017-04-28 13:48:38 +00:00
#include <selinux/selinux.h>
2017-04-07 23:37:43 +00:00
#include "magisk.h"
#include "utils.h"
#include "daemon.h"
2017-10-10 11:49:15 +00:00
#include "resetprop.h"
2018-04-14 19:18:18 +00:00
#include "magiskpolicy.h"
int setup_done = 0;
2018-04-14 19:18:18 +00:00
int seperate_vendor = 0;
2017-04-07 23:37:43 +00:00
2017-04-21 16:54:08 +00:00
static void *request_handler(void *args) {
int client = *((int *) args);
free(args);
2018-02-11 09:23:36 +00:00
int req = read_int(client);
2017-05-05 08:13:26 +00:00
struct ucred credential;
get_client_cred(client, &credential);
2017-05-05 08:13:26 +00:00
switch (req) {
case LAUNCH_MAGISKHIDE:
case STOP_MAGISKHIDE:
case ADD_HIDELIST:
case RM_HIDELIST:
case LS_HIDELIST:
2017-05-05 08:13:26 +00:00
case POST_FS_DATA:
case LATE_START:
2018-08-09 06:52:44 +00:00
case BOOT_COMPLETE:
if (credential.uid != 0) {
2017-05-05 08:13:26 +00:00
write_int(client, ROOT_REQUIRED);
close(client);
return NULL;
}
default:
break;
}
switch (req) {
case LAUNCH_MAGISKHIDE:
launch_magiskhide(client);
break;
case STOP_MAGISKHIDE:
stop_magiskhide(client);
break;
case ADD_HIDELIST:
2017-04-20 14:45:56 +00:00
add_hide_list(client);
break;
case RM_HIDELIST:
2017-04-20 14:45:56 +00:00
rm_hide_list(client);
break;
case LS_HIDELIST:
ls_hide_list(client);
break;
case SUPERUSER:
su_daemon_receiver(client, &credential);
2017-04-14 19:23:09 +00:00
break;
case CHECK_VERSION:
2017-04-18 13:31:12 +00:00
write_string(client, MAGISK_VER_STR);
2017-04-14 19:23:09 +00:00
close(client);
break;
case CHECK_VERSION_CODE:
2017-04-18 13:31:12 +00:00
write_int(client, MAGISK_VER_CODE);
2017-04-14 19:23:09 +00:00
close(client);
break;
2017-04-15 11:02:07 +00:00
case POST_FS_DATA:
post_fs_data(client);
2017-04-15 11:02:07 +00:00
break;
case LATE_START:
late_start(client);
2017-04-15 11:02:07 +00:00
break;
2018-08-09 06:52:44 +00:00
case BOOT_COMPLETE:
boot_complete(client);
break;
case HANDSHAKE:
/* Do NOT close the client, make it hold */
break;
2017-05-05 08:13:26 +00:00
default:
2018-07-02 14:11:28 +00:00
close(client);
2017-05-07 19:11:14 +00:00
break;
}
2017-04-21 16:54:08 +00:00
return NULL;
2017-04-07 23:37:43 +00:00
}
2018-07-02 14:11:28 +00:00
void main_daemon() {
2017-11-22 08:12:08 +00:00
setsid();
2018-04-14 19:18:18 +00:00
setcon("u:r:"SEPOL_PROC_DOMAIN":s0");
int fd = xopen("/dev/null", O_RDWR | O_CLOEXEC);
xdup2(fd, STDOUT_FILENO);
xdup2(fd, STDERR_FILENO);
close(fd);
2018-07-02 14:11:28 +00:00
fd = xopen("/dev/zero", O_RDWR | O_CLOEXEC);
xdup2(fd, STDIN_FILENO);
close(fd);
2017-04-07 23:37:43 +00:00
2018-07-02 14:11:28 +00:00
// Start the log monitor
2018-08-02 17:58:56 +00:00
check_and_start_logger();
2018-07-02 14:11:28 +00:00
struct sockaddr_un sun;
2018-07-02 14:11:28 +00:00
fd = setup_socket(&sun, MAIN_DAEMON);
2018-09-15 06:49:19 +00:00
if (xbind(fd, (struct sockaddr*) &sun, sizeof(sun.sun_family) + strlen(sun.sun_path + 1) + 1))
2017-11-27 19:42:48 +00:00
exit(1);
xlisten(fd, 10);
LOGI("Magisk v" xstr(MAGISK_VERSION) "(" xstr(MAGISK_VER_CODE) ") daemon started\n");
2017-04-07 23:37:43 +00:00
// Change process name
2018-04-29 04:17:28 +00:00
strcpy(argv0, "magiskd");
// Block all user signals
sigset_t block_set;
sigemptyset(&block_set);
sigaddset(&block_set, SIGUSR1);
sigaddset(&block_set, SIGUSR2);
pthread_sigmask(SIG_SETMASK, &block_set, NULL);
// Ignore SIGPIPE
struct sigaction act;
memset(&act, 0, sizeof(act));
act.sa_handler = SIG_IGN;
sigaction(SIGPIPE, &act, NULL);
2017-05-07 19:11:14 +00:00
// Loop forever to listen for requests
2017-04-07 23:37:43 +00:00
while(1) {
2017-04-21 16:54:08 +00:00
int *client = xmalloc(sizeof(int));
*client = xaccept4(fd, NULL, NULL, SOCK_CLOEXEC);
2017-04-21 16:54:08 +00:00
pthread_t thread;
xpthread_create(&thread, NULL, request_handler, client);
// Detach the thread, we will never join it
pthread_detach(thread);
2017-04-07 23:37:43 +00:00
}
}
2018-07-02 14:11:28 +00:00
/* Connect the daemon, set sockfd, and return if new daemon is spawned */
int connect_daemon2(daemon_t d, int *sockfd) {
2017-04-07 23:37:43 +00:00
struct sockaddr_un sun;
2018-07-02 14:11:28 +00:00
*sockfd = setup_socket(&sun, d);
2018-09-15 06:49:19 +00:00
socklen_t len = sizeof(sun.sun_family) + strlen(sun.sun_path + 1) + 1;
if (connect(*sockfd, (struct sockaddr*) &sun, len)) {
if (getuid() != UID_ROOT || getgid() != UID_ROOT) {
2017-10-13 16:08:12 +00:00
fprintf(stderr, "No daemon is currently running!\n");
exit(1);
}
2018-04-29 04:17:28 +00:00
if (fork_dont_care() == 0) {
LOGD("client: connect fail, try launching new daemon process\n");
2018-07-02 14:11:28 +00:00
close(*sockfd);
switch (d) {
case MAIN_DAEMON:
main_daemon();
break;
case LOG_DAEMON:
log_daemon();
break;
}
}
2018-09-15 06:49:19 +00:00
while (connect(*sockfd, (struct sockaddr*) &sun, len))
2017-11-27 19:42:48 +00:00
usleep(10000);
2018-07-02 14:11:28 +00:00
return 1;
2017-04-07 23:37:43 +00:00
}
2018-07-02 14:11:28 +00:00
return 0;
}
int connect_daemon() {
int fd;
connect_daemon2(MAIN_DAEMON, &fd);
2017-04-07 23:37:43 +00:00
return fd;
}