Magisk/su.h

134 lines
3.5 KiB
C
Raw Normal View History

2017-04-14 19:21:31 +00:00
/* su.h - Store all general su info
*/
2017-04-14 19:21:31 +00:00
#ifndef _SU_H_
#define _SU_H_
2017-04-14 19:21:31 +00:00
#include <limits.h>
#include <sys/types.h>
2017-04-18 13:09:53 +00:00
#define MAGISKSU_VER_STR xstr(MAGISK_VERSION) ":MAGISKSU (topjohnwu)"
2017-04-14 19:21:31 +00:00
// Property check for root access
#define ROOT_ACCESS_PROP "persist.sys.root_access"
#define ROOT_ACCESS_DISABLED 0
#define ROOT_ACCESS_APPS_ONLY 1
#define ROOT_ACCESS_ADB_ONLY 2
#define ROOT_ACCESS_APPS_AND_ADB 3
// DO NOT CHANGE LINE BELOW, java package name will always be the same
2017-01-23 14:51:00 +00:00
#define JAVA_PACKAGE_NAME "com.topjohnwu.magisk"
2017-04-14 19:21:31 +00:00
#define APPLICATION_DATA_PATH "/data/data/"
#define USER_DATA_PATH "/data/user"
// If --rename-manifest-package is used in AAPT, this
// must be changed to correspond to the new APK package name
// See the two Android.mk files for more details.
2017-01-23 14:51:00 +00:00
#define REQUESTOR JAVA_PACKAGE_NAME
// This is used if wrapping the fragment classes and activities
2017-04-14 19:21:31 +00:00
// with classes in another package.
2017-01-23 14:51:00 +00:00
#define REQUESTOR_PREFIX JAVA_PACKAGE_NAME ".superuser"
2017-04-14 19:21:31 +00:00
#define REQUESTOR_FILES_PATH APPLICATION_DATA_PATH REQUESTOR "/files"
#define REQUESTOR_CACHE_PATH "/dev/" REQUESTOR
2017-04-14 19:21:31 +00:00
// there's no guarantee that the db or files are actually created named as such by
// SQLiteOpenHelper, etc. Though that is the behavior as of current.
// it is up to the Android application to symlink as appropriate.
2017-01-23 14:51:00 +00:00
#define REQUESTOR_DATABASE_PATH REQUESTOR "/databases/su.db"
#define REQUESTOR_MULTIUSER_MODE REQUESTOR_FILES_PATH "/multiuser_mode"
#define DEFAULT_SHELL "/system/bin/sh"
struct su_initiator {
2017-04-14 19:21:31 +00:00
pid_t pid;
unsigned uid;
};
struct su_request {
2017-04-14 19:21:31 +00:00
unsigned uid;
int login;
int keepenv;
char *shell;
char *command;
char **argv;
int argc;
};
struct su_user_info {
2017-04-14 19:21:31 +00:00
// the user in android userspace (multiuser)
// that invoked this action.
unsigned android_user_id;
// how su behaves with multiuser. see enum below.
int multiuser_mode;
// path to superuser directory. this is populated according
// to the multiuser mode.
// this is used to check uid/gid for protecting socket.
// this is used instead of database, as it is more likely
// to exist. db will not exist if su has never launched.
char base_path[PATH_MAX];
// path to su database. this is populated according
// to the multiuser mode.
char database_path[PATH_MAX];
};
struct su_context {
2017-04-14 19:21:31 +00:00
struct su_initiator from;
struct su_request to;
struct su_user_info user;
mode_t umask;
char sock_path[PATH_MAX];
};
// multiuser su behavior
typedef enum {
2017-04-14 19:21:31 +00:00
// only owner can su
MULTIUSER_MODE_OWNER_ONLY = 0,
// owner gets a su prompt
MULTIUSER_MODE_OWNER_MANAGED = 1,
// user gets a su prompt
MULTIUSER_MODE_USER = 2,
MULTIUSER_MODE_NONE = 3,
} multiuser_mode_t;
#define MULTIUSER_VALUE_OWNER_ONLY "owner"
#define MULTIUSER_VALUE_OWNER_MANAGED "managed"
#define MULTIUSER_VALUE_USER "user"
#define MULTIUSER_VALUE_NONE "none"
typedef enum {
2017-04-14 19:21:31 +00:00
INTERACTIVE = 0,
DENY = 1,
ALLOW = 2,
} policy_t;
2017-05-07 19:08:34 +00:00
extern struct ucred su_credentials;
2017-04-14 19:21:31 +00:00
// su.c
int su_daemon_main(int argc, char **argv);
// su_client.c
int socket_create_temp(char *path, size_t len);
int socket_accept(int serv_fd);
void socket_send_request(int fd, const struct su_context *ctx);
void socket_receive_result(int fd, char *result, ssize_t result_len);
// activity.c
void app_send_result(struct su_context *ctx, policy_t policy);
void app_send_request(struct su_context *ctx);
// db.c
policy_t database_check(struct su_context *ctx);
// misc.c
void set_identity(unsigned uid);
char *get_command(const struct su_request *to);
2017-04-15 18:28:12 +00:00
int fork_zero_fucks();
#endif