Magisk/jni/daemon/daemon.c

204 lines
4.6 KiB
C
Raw Normal View History

2017-04-07 23:37:43 +00:00
/* daemon.c - Magisk Daemon
*
* Start the daemon and wait for requests
* Connect the daemon and send requests through sockets
*/
#include <stdlib.h>
#include <unistd.h>
#include <fcntl.h>
#include <string.h>
#include <errno.h>
#include <pthread.h>
2017-04-07 23:37:43 +00:00
#include <sys/un.h>
#include <sys/types.h>
#include <sys/socket.h>
#include <sys/stat.h>
2017-04-15 11:02:07 +00:00
#include <sys/mount.h>
2017-04-28 13:48:38 +00:00
#include <selinux/selinux.h>
2017-04-07 23:37:43 +00:00
#include "magisk.h"
#include "utils.h"
#include "daemon.h"
#include "magiskpolicy.h"
pthread_t sepol_patch;
2017-04-07 23:37:43 +00:00
2017-04-21 16:54:08 +00:00
static void *request_handler(void *args) {
2017-04-21 22:33:40 +00:00
// Setup the default error handler for threads
err_handler = exit_thread;
2017-04-21 16:54:08 +00:00
int client = *((int *) args);
free(args);
client_request req = read_int(client);
2017-05-05 08:13:26 +00:00
struct ucred credentials;
get_client_cred(client, &credentials);
switch (req) {
case LAUNCH_MAGISKHIDE:
case STOP_MAGISKHIDE:
case ADD_HIDELIST:
case RM_HIDELIST:
case LS_HIDELIST:
2017-05-05 08:13:26 +00:00
case POST_FS:
case POST_FS_DATA:
case LATE_START:
if (credentials.uid != 0) {
write_int(client, ROOT_REQUIRED);
close(client);
return NULL;
}
default:
break;
}
switch (req) {
case LAUNCH_MAGISKHIDE:
launch_magiskhide(client);
break;
case STOP_MAGISKHIDE:
stop_magiskhide(client);
break;
case ADD_HIDELIST:
2017-04-20 14:45:56 +00:00
add_hide_list(client);
break;
case RM_HIDELIST:
2017-04-20 14:45:56 +00:00
rm_hide_list(client);
break;
case LS_HIDELIST:
ls_hide_list(client);
break;
case SUPERUSER:
2017-04-14 19:23:09 +00:00
su_daemon_receiver(client);
break;
case CHECK_VERSION:
2017-04-18 13:31:12 +00:00
write_string(client, MAGISK_VER_STR);
2017-04-14 19:23:09 +00:00
close(client);
break;
case CHECK_VERSION_CODE:
2017-04-18 13:31:12 +00:00
write_int(client, MAGISK_VER_CODE);
2017-04-14 19:23:09 +00:00
close(client);
break;
2017-04-15 11:02:07 +00:00
case POST_FS:
post_fs(client);
2017-04-15 11:02:07 +00:00
break;
case POST_FS_DATA:
post_fs_data(client);
2017-04-15 11:02:07 +00:00
break;
case LATE_START:
late_start(client);
2017-04-15 11:02:07 +00:00
break;
2017-05-05 08:13:26 +00:00
default:
2017-05-07 19:11:14 +00:00
break;
}
2017-04-21 16:54:08 +00:00
return NULL;
2017-04-07 23:37:43 +00:00
}
/* Setup the address and return socket fd */
static int setup_socket(struct sockaddr_un *sun) {
int fd = xsocket(AF_LOCAL, SOCK_STREAM | SOCK_CLOEXEC, 0);
2017-04-07 23:37:43 +00:00
memset(sun, 0, sizeof(*sun));
sun->sun_family = AF_LOCAL;
2017-07-30 10:15:00 +00:00
memcpy(sun->sun_path, REQUESTOR_DAEMON_PATH, sizeof(REQUESTOR_DAEMON_PATH) - 1);
2017-04-07 23:37:43 +00:00
return fd;
}
static void *large_sepol_patch(void *args) {
LOGD("sepol: Starting large patch thread\n");
// Patch su to everything
sepol_allow("su", ALL, ALL, ALL);
2017-04-30 17:58:52 +00:00
dump_policydb(SELINUX_LOAD);
LOGD("sepol: Large patch done\n");
destroy_policydb();
return NULL;
}
2017-05-07 19:11:14 +00:00
void start_daemon(int client) {
2017-04-07 23:37:43 +00:00
// Launch the daemon, create new session, set proper context
2017-04-14 19:23:09 +00:00
if (getuid() != UID_ROOT || getgid() != UID_ROOT) {
fprintf(stderr, "Starting daemon requires root: %s\n", strerror(errno));
PLOGE("start daemon");
2017-04-07 23:37:43 +00:00
}
2017-05-07 19:11:14 +00:00
2017-04-07 23:37:43 +00:00
switch (fork()) {
case -1:
PLOGE("fork");
case 0:
break;
default:
return;
}
2017-05-07 19:11:14 +00:00
// First close the client, it's useless for us
close(client);
2017-04-07 23:37:43 +00:00
xsetsid();
2017-04-28 13:48:38 +00:00
setcon("u:r:su:s0");
2017-09-13 07:45:07 +00:00
umask(0);
int fd = xopen("/dev/null", O_RDWR | O_CLOEXEC);
xdup2(fd, STDIN_FILENO);
xdup2(fd, STDOUT_FILENO);
xdup2(fd, STDERR_FILENO);
close(fd);
2017-04-07 23:37:43 +00:00
2017-04-21 16:54:08 +00:00
// Patch selinux with medium patch before we do anything
2017-04-30 17:58:52 +00:00
load_policydb(SELINUX_POLICY);
sepol_med_rules();
2017-04-30 17:58:52 +00:00
dump_policydb(SELINUX_LOAD);
2017-05-07 19:11:14 +00:00
// Continue the larger patch in another thread, we will join later
pthread_create(&sepol_patch, NULL, large_sepol_patch, NULL);
2017-04-07 23:37:43 +00:00
struct sockaddr_un sun;
fd = setup_socket(&sun);
2017-05-07 19:11:14 +00:00
2017-04-07 23:37:43 +00:00
xbind(fd, (struct sockaddr*) &sun, sizeof(sun));
xlisten(fd, 10);
// Change process name
strcpy(argv0, "magisk_daemon");
// The root daemon should not do anything if an error occurs
2017-04-14 19:23:09 +00:00
// It should stay intact under any circumstances
err_handler = do_nothing;
LOGI("Magisk v" xstr(MAGISK_VERSION) "(" xstr(MAGISK_VER_CODE) ") daemon started\n");
2017-04-15 10:33:16 +00:00
// Unlock all blocks for rw
unlock_blocks();
2017-04-15 11:02:07 +00:00
// Setup links under /sbin
2017-04-17 08:36:49 +00:00
xmount(NULL, "/", NULL, MS_REMOUNT, NULL);
2017-04-15 11:02:07 +00:00
create_links(NULL, "/sbin");
2017-05-07 19:11:14 +00:00
xchmod("/sbin", 0755);
2017-06-30 15:22:51 +00:00
xmkdir("/magisk", 0755);
2017-04-17 08:36:49 +00:00
xmount(NULL, "/", NULL, MS_REMOUNT | MS_RDONLY, NULL);
2017-04-15 11:02:07 +00:00
2017-05-07 19:11:14 +00:00
// Loop forever to listen for requests
2017-04-07 23:37:43 +00:00
while(1) {
2017-04-21 16:54:08 +00:00
int *client = xmalloc(sizeof(int));
*client = xaccept4(fd, NULL, NULL, SOCK_CLOEXEC);
2017-04-21 16:54:08 +00:00
pthread_t thread;
xpthread_create(&thread, NULL, request_handler, client);
// Detach the thread, we will never join it
pthread_detach(thread);
2017-04-07 23:37:43 +00:00
}
}
/* Connect the daemon, and return a socketfd */
int connect_daemon() {
struct sockaddr_un sun;
int fd = setup_socket(&sun);
if (connect(fd, (struct sockaddr*) &sun, sizeof(sun))) {
/* If we cannot access the daemon, we start the daemon
* since there is no clear entry point when the daemon should be started
*/
2017-04-17 08:36:49 +00:00
LOGD("client: connect fail, try launching new daemon process\n");
2017-05-07 19:11:14 +00:00
start_daemon(fd);
2017-04-07 23:37:43 +00:00
do {
// Wait for 10ms
2017-04-17 08:36:49 +00:00
usleep(10);
2017-04-07 23:37:43 +00:00
} while (connect(fd, (struct sockaddr*) &sun, sizeof(sun)));
}
return fd;
}