Magisk/native/jni/zygisk/entry.cpp

435 lines
13 KiB
C++
Raw Normal View History

#include <libgen.h>
#include <dlfcn.h>
2021-01-06 23:41:37 -08:00
#include <sys/prctl.h>
2021-08-21 03:52:59 -07:00
#include <android/log.h>
#include <android/dlext.h>
#include <utils.hpp>
2021-08-18 03:44:32 -07:00
#include <daemon.hpp>
#include <magisk.hpp>
2021-09-18 02:38:53 -07:00
#include <db.hpp>
2021-10-05 03:53:11 -07:00
#include "zygisk.hpp"
2022-01-17 19:54:33 -08:00
#include "module.hpp"
2021-09-18 14:50:11 -07:00
#include "deny/deny.hpp"
using namespace std;
2021-11-07 13:05:44 -08:00
void *self_handle = nullptr;
2021-08-21 03:52:59 -07:00
static int zygisk_log(int prio, const char *fmt, va_list ap);
#define zlog(prio) [](auto fmt, auto ap){ return zygisk_log(ANDROID_LOG_##prio, fmt, ap); }
static void zygisk_logging() {
log_cb.d = zlog(DEBUG);
log_cb.i = zlog(INFO);
log_cb.w = zlog(WARN);
log_cb.e = zlog(ERROR);
log_cb.ex = nop_ex;
}
2021-09-18 05:11:10 -07:00
// Make sure /proc/self/environ is sanitized
// Filter env and reset MM_ENV_END
2021-01-06 23:41:37 -08:00
static void sanitize_environ() {
2021-09-18 05:11:10 -07:00
char *cur = environ[0];
2021-01-06 23:41:37 -08:00
for (int i = 0; environ[i]; ++i) {
2021-09-22 00:14:22 -07:00
// Copy all env onto the original stack
size_t len = strlen(environ[i]);
2021-09-18 05:11:10 -07:00
memmove(cur, environ[i], len + 1);
environ[i] = cur;
cur += len + 1;
2021-01-06 23:41:37 -08:00
}
2021-09-18 05:11:10 -07:00
prctl(PR_SET_MM, PR_SET_MM_ENV_END, cur, 0, 0);
2021-01-06 23:41:37 -08:00
}
[[gnu::destructor]] [[maybe_unused]]
2021-09-22 00:14:22 -07:00
static void zygisk_cleanup_wait() {
2021-09-22 02:52:33 -07:00
if (self_handle) {
// Wait 10us to make sure none of our code is executing
timespec ts = { .tv_sec = 0, .tv_nsec = 10000L };
nanosleep(&ts, nullptr);
}
}
static void second_stage_entry() {
2021-09-22 00:14:22 -07:00
zygisk_logging();
2021-10-14 02:13:23 -07:00
ZLOGD("inject 2nd stage\n");
char path[PATH_MAX];
MAGISKTMP = getenv(MAGISKTMP_ENV);
int fd = parse_int(getenv(MAGISKFD_ENV));
snprintf(path, sizeof(path), "/proc/self/fd/%d", fd);
xreadlink(path, path, PATH_MAX);
android_dlextinfo info {
.flags = ANDROID_DLEXT_USE_LIBRARY_FD,
.library_fd = fd,
};
self_handle = android_dlopen_ext(path, RTLD_LAZY, &info);
dlclose(self_handle);
close(fd);
unsetenv(MAGISKTMP_ENV);
unsetenv(MAGISKFD_ENV);
sanitize_environ();
hook_functions();
2021-09-22 00:14:22 -07:00
}
static void first_stage_entry() {
android_logging();
2021-10-14 02:13:23 -07:00
ZLOGD("inject 1st stage\n");
2021-09-22 00:14:22 -07:00
char path[PATH_MAX];
char buf[256];
2021-09-22 00:14:22 -07:00
char *ld = getenv("LD_PRELOAD");
if (char *c = strrchr(ld, ':')) {
*c = '\0';
strlcpy(path, c + 1, sizeof(path));
2021-09-22 00:14:22 -07:00
setenv("LD_PRELOAD", ld, 1); // Restore original LD_PRELOAD
} else {
unsetenv("LD_PRELOAD");
strlcpy(path, ld, sizeof(path));
2021-09-22 00:14:22 -07:00
}
// Force the linker to load the library on top of ourselves, so we do not
// need to unmap the 1st stage library that was loaded with LD_PRELOAD.
int fd = xopen(path, O_RDONLY | O_CLOEXEC);
// Use fd here instead of path to make sure inode is the same as 2nd stage
snprintf(buf, sizeof(buf), "%d", fd);
setenv(MAGISKFD_ENV, buf, 1);
struct stat s{};
xfstat(fd, &s);
android_dlextinfo info {
.flags = ANDROID_DLEXT_FORCE_LOAD | ANDROID_DLEXT_USE_LIBRARY_FD,
.library_fd = fd,
};
auto [addr, size] = find_map_range(path, s.st_ino);
if (addr && size) {
info.flags |= ANDROID_DLEXT_RESERVED_ADDRESS;
info.reserved_addr = addr;
// The existing address is guaranteed to fit, as 1st stage and 2nd stage
// are exactly the same ELF (same inode). However, the linker could over
// estimate the required size and refuse to dlopen. Add 2 more page_sizes
// (one at the beginning and one at the end) as a safety measure.
info.reserved_size = size + 2 * 4096;
}
2021-09-22 00:14:22 -07:00
setenv(INJECT_ENV_2, "1", 1);
// Force dlopen ourselves to make ourselves dlclose-able.
// After this call, all global variables will be reset.
android_dlopen_ext(path, RTLD_LAZY, &info);
2021-09-22 00:14:22 -07:00
}
[[gnu::constructor]] [[maybe_unused]]
2021-09-22 00:14:22 -07:00
static void zygisk_init() {
if (getenv(INJECT_ENV_1)) {
unsetenv(INJECT_ENV_1);
2021-09-22 00:14:22 -07:00
first_stage_entry();
} else if (getenv(INJECT_ENV_2)) {
unsetenv(INJECT_ENV_2);
second_stage_entry();
}
}
// The following code runs in zygote/app process
2021-08-18 03:44:32 -07:00
2021-08-21 03:52:59 -07:00
static int zygisk_log(int prio, const char *fmt, va_list ap) {
// If we don't have log pipe set, ask magiskd for it
// This could happen multiple times in zygote because it was closed to prevent crashing
if (logd_fd < 0) {
// Change logging temporarily to prevent infinite recursion and stack overflow
android_logging();
if (int fd = connect_daemon(); fd >= 0) {
write_int(fd, ZYGISK_REQUEST);
write_int(fd, ZYGISK_GET_LOG_PIPE);
if (read_int(fd) == 0) {
logd_fd = recv_fd(fd);
}
close(fd);
}
zygisk_logging();
}
sigset_t mask;
sigset_t orig_mask;
bool sig = false;
// Make sure SIGPIPE won't crash zygote
if (logd_fd >= 0) {
sig = true;
sigemptyset(&mask);
sigaddset(&mask, SIGPIPE);
pthread_sigmask(SIG_BLOCK, &mask, &orig_mask);
}
int ret = magisk_log(prio, fmt, ap);
if (sig) {
timespec ts{};
sigtimedwait(&mask, nullptr, &ts);
pthread_sigmask(SIG_SETMASK, &orig_mask, nullptr);
}
return ret;
}
static inline bool should_load_modules(uint32_t flags) {
return (flags & UNMOUNT_MASK) != UNMOUNT_MASK &&
(flags & PROCESS_IS_MAGISK_APP) != PROCESS_IS_MAGISK_APP;
}
2022-01-21 04:43:27 -08:00
int remote_get_info(int uid, const char *process, uint32_t *flags, vector<int> &fds) {
2021-08-19 04:55:17 -07:00
if (int fd = connect_daemon(); fd >= 0) {
write_int(fd, ZYGISK_REQUEST);
2021-10-13 04:52:02 -07:00
write_int(fd, ZYGISK_GET_INFO);
2021-09-18 02:38:53 -07:00
write_int(fd, uid);
write_string(fd, process);
2022-01-17 19:54:33 -08:00
xxread(fd, flags, sizeof(*flags));
if (should_load_modules(*flags)) {
2021-10-13 04:52:02 -07:00
fds = recv_fds(fd);
}
2022-01-21 04:43:27 -08:00
return fd;
2021-08-19 04:55:17 -07:00
}
2022-01-21 04:43:27 -08:00
return -1;
2021-08-19 04:55:17 -07:00
}
2021-08-18 03:44:32 -07:00
// The following code runs in magiskd
2022-01-14 03:10:02 -08:00
static vector<int> get_module_fds(bool is_64_bit) {
vector<int> fds;
// All fds passed to send_fds have to be valid file descriptors.
// To workaround this issue, send over STDOUT_FILENO as an indicator of an
// invalid fd as it will always be /dev/null in magiskd
if (is_64_bit) {
#if defined(__LP64__)
std::transform(module_list->begin(), module_list->end(), std::back_inserter(fds),
[](const module_info &info) { return info.z64 < 0 ? STDOUT_FILENO : info.z64; });
#endif
} else {
std::transform(module_list->begin(), module_list->end(), std::back_inserter(fds),
[](const module_info &info) { return info.z32 < 0 ? STDOUT_FILENO : info.z32; });
}
return fds;
}
2021-10-23 14:38:30 -07:00
static bool get_exe(int pid, char *buf, size_t sz) {
snprintf(buf, sz, "/proc/%d/exe", pid);
return xreadlink(buf, buf, sz) > 0;
}
static pthread_mutex_t zygiskd_lock = PTHREAD_MUTEX_INITIALIZER;
static int zygiskd_sockets[] = { -1, -1 };
#define zygiskd_socket zygiskd_sockets[is_64_bit]
static void connect_companion(int client, bool is_64_bit) {
mutex_guard g(zygiskd_lock);
if (zygiskd_socket >= 0) {
// Make sure the socket is still valid
pollfd pfd = { zygiskd_socket, 0, 0 };
poll(&pfd, 1, 0);
if (pfd.revents) {
// Any revent means error
close(zygiskd_socket);
zygiskd_socket = -1;
}
}
if (zygiskd_socket < 0) {
int fds[2];
socketpair(AF_UNIX, SOCK_STREAM | SOCK_CLOEXEC, 0, fds);
zygiskd_socket = fds[0];
if (fork_dont_care() == 0) {
string exe = MAGISKTMP + "/magisk" + (is_64_bit ? "64" : "32");
// This fd has to survive exec
fcntl(fds[1], F_SETFD, 0);
char buf[16];
snprintf(buf, sizeof(buf), "%d", fds[1]);
execl(exe.data(), "zygisk", "companion", buf, (char *) nullptr);
exit(-1);
}
close(fds[1]);
2022-01-14 03:10:02 -08:00
vector<int> module_fds = get_module_fds(is_64_bit);
send_fds(zygiskd_socket, module_fds.data(), module_fds.size());
// Wait for ack
if (read_int(zygiskd_socket) != 0) {
LOGE("zygiskd startup error\n");
return;
}
}
send_fd(zygiskd_socket, client);
}
static timespec last_zygote_start;
static int zygote_start_counts[] = { 0, 0 };
#define zygote_start_count zygote_start_counts[is_64_bit]
#define zygote_started (zygote_start_counts[0] + zygote_start_counts[1])
#define zygote_start_reset(val) { zygote_start_counts[0] = val; zygote_start_counts[1] = val; }
2021-10-19 23:46:38 -07:00
static void setup_files(int client, const sock_cred *cred) {
2021-08-22 02:11:48 -07:00
LOGD("zygisk: setup files for pid=[%d]\n", cred->pid);
2021-08-18 03:44:32 -07:00
2021-08-22 02:11:48 -07:00
char buf[256];
2021-10-23 14:38:30 -07:00
if (!get_exe(cred->pid, buf, sizeof(buf))) {
2021-08-18 03:44:32 -07:00
write_int(client, 1);
return;
}
bool is_64_bit = str_ends(buf, "64");
if (!zygote_started) {
// First zygote launch, record time
clock_gettime(CLOCK_MONOTONIC, &last_zygote_start);
}
if (zygote_start_count) {
// This zygote ABI had started before, kill existing zygiskd
close(zygiskd_sockets[0]);
close(zygiskd_sockets[1]);
zygiskd_sockets[0] = -1;
zygiskd_sockets[1] = -1;
}
++zygote_start_count;
if (zygote_start_count >= 5) {
// Bootloop prevention
timespec ts;
clock_gettime(CLOCK_MONOTONIC, &ts);
if (ts.tv_sec - last_zygote_start.tv_sec > 60) {
// This is very likely manual soft reboot
memcpy(&last_zygote_start, &ts, sizeof(ts));
zygote_start_reset(1);
} else {
// If any zygote relaunched more than 5 times within a minute,
// don't do any setups further to prevent bootloop.
zygote_start_reset(999);
write_int(client, 1);
return;
}
}
2021-08-18 03:44:32 -07:00
write_int(client, 0);
send_fd(client, is_64_bit ? app_process_64 : app_process_32);
2021-10-27 03:25:54 -07:00
write_string(client, MAGISKTMP);
2021-08-18 03:44:32 -07:00
}
static void magiskd_passthrough(int client) {
bool is_64_bit = read_int(client);
write_int(client, 0);
send_fd(client, is_64_bit ? app_process_64 : app_process_32);
}
atomic<int> cached_manager_app_id = -1;
2021-09-20 05:47:15 -07:00
2022-01-17 19:54:33 -08:00
extern bool uid_granted_root(int uid);
2021-10-19 23:46:38 -07:00
static void get_process_info(int client, const sock_cred *cred) {
2021-08-19 04:55:17 -07:00
int uid = read_int(client);
string process = read_string(client);
2021-09-20 05:47:15 -07:00
2022-01-17 19:54:33 -08:00
uint32_t flags = 0;
2021-10-13 04:52:02 -07:00
// This function is called on every single zygote process specialization,
2021-09-20 05:47:15 -07:00
// so performance is critical. get_manager_app_id() is expensive as it goes
// through a SQLite query and potentially multiple filesystem stats, so we
// really want to cache the app ID value. inotify will invalidate the app ID
// cache for us.
2021-09-20 05:47:15 -07:00
int manager_app_id = cached_manager_app_id;
2021-09-20 05:47:15 -07:00
if (manager_app_id < 0) {
manager_app_id = get_manager_app_id();
cached_manager_app_id = manager_app_id;
}
2021-09-20 05:47:15 -07:00
if (to_app_id(uid) == manager_app_id) {
flags |= PROCESS_IS_MAGISK_APP;
}
if (denylist_enforced) {
flags |= DENYLIST_ENFORCING;
}
if (is_deny_target(uid, process)) {
flags |= PROCESS_ON_DENYLIST;
}
if (uid_granted_root(uid)) {
flags |= PROCESS_GRANTED_ROOT;
2021-09-18 02:38:53 -07:00
}
2021-10-13 04:52:02 -07:00
2022-01-17 19:54:33 -08:00
xwrite(client, &flags, sizeof(flags));
2021-10-13 04:52:02 -07:00
if (should_load_modules(flags)) {
2021-10-13 04:52:02 -07:00
char buf[256];
2021-10-23 14:38:30 -07:00
get_exe(cred->pid, buf, sizeof(buf));
2022-01-14 03:10:02 -08:00
vector<int> fds = get_module_fds(str_ends(buf, "64"));
2021-10-13 04:52:02 -07:00
send_fds(client, fds.data(), fds.size());
}
2022-01-21 04:43:27 -08:00
if (uid != 1000 || process != "system_server")
return;
// Collect module status from system_server
2022-01-21 04:43:27 -08:00
int slots = read_int(client);
2022-02-11 01:00:58 -08:00
dynamic_bitset bits;
2022-01-21 04:43:27 -08:00
for (int i = 0; i < slots; ++i) {
2022-01-23 04:39:00 -08:00
dynamic_bitset::slot_type l = 0;
2022-01-21 04:43:27 -08:00
xxread(client, &l, sizeof(l));
2022-02-11 01:00:58 -08:00
bits.emplace_back(l);
}
for (int id = 0; id < module_list->size(); ++id) {
if (!as_const(bits)[id]) {
// Either not a zygisk module, or incompatible
char buf[4096];
snprintf(buf, sizeof(buf), MODULEROOT "/%s/zygisk",
module_list->operator[](id).name.data());
if (int dirfd = open(buf, O_RDONLY | O_CLOEXEC); dirfd >= 0) {
close(xopenat(dirfd, "unloaded", O_CREAT | O_RDONLY, 0644));
close(dirfd);
2022-01-21 04:43:27 -08:00
}
}
}
2021-08-19 04:55:17 -07:00
}
2021-08-21 03:52:59 -07:00
static void send_log_pipe(int fd) {
// There is race condition here, but we can't really do much about it...
2021-08-22 02:11:48 -07:00
if (logd_fd >= 0) {
2021-08-21 03:52:59 -07:00
write_int(fd, 0);
send_fd(fd, logd_fd);
} else {
write_int(fd, 1);
}
}
2022-01-14 03:10:02 -08:00
static void get_moddir(int client) {
int id = read_int(client);
char buf[4096];
snprintf(buf, sizeof(buf), MODULEROOT "/%s", module_list->operator[](id).name.data());
int dfd = xopen(buf, O_RDONLY | O_CLOEXEC);
send_fd(client, dfd);
close(dfd);
}
2021-10-19 23:46:38 -07:00
void zygisk_handler(int client, const sock_cred *cred) {
2021-08-18 03:44:32 -07:00
int code = read_int(client);
2021-10-23 14:38:30 -07:00
char buf[256];
2021-08-18 03:44:32 -07:00
switch (code) {
case ZYGISK_SETUP:
setup_files(client, cred);
break;
case ZYGISK_PASSTHROUGH:
magiskd_passthrough(client);
break;
2021-10-13 04:52:02 -07:00
case ZYGISK_GET_INFO:
get_process_info(client, cred);
2021-08-19 04:55:17 -07:00
break;
2021-08-21 03:52:59 -07:00
case ZYGISK_GET_LOG_PIPE:
send_log_pipe(client);
break;
2021-10-23 14:38:30 -07:00
case ZYGISK_CONNECT_COMPANION:
get_exe(cred->pid, buf, sizeof(buf));
connect_companion(client, str_ends(buf, "64"));
2021-10-17 04:36:18 -07:00
break;
2022-01-14 03:10:02 -08:00
case ZYGISK_GET_MODDIR:
get_moddir(client);
break;
2021-08-18 03:44:32 -07:00
}
close(client);
}