2017-04-07 23:37:43 +00:00
|
|
|
/* daemon.c - Magisk Daemon
|
|
|
|
*
|
|
|
|
* Start the daemon and wait for requests
|
|
|
|
* Connect the daemon and send requests through sockets
|
|
|
|
*/
|
|
|
|
|
|
|
|
#include <stdlib.h>
|
|
|
|
#include <unistd.h>
|
|
|
|
#include <fcntl.h>
|
|
|
|
#include <string.h>
|
2017-04-08 23:25:10 +00:00
|
|
|
#include <errno.h>
|
2017-04-15 18:42:24 +00:00
|
|
|
#include <pthread.h>
|
2017-04-07 23:37:43 +00:00
|
|
|
#include <sys/un.h>
|
|
|
|
#include <sys/types.h>
|
|
|
|
#include <sys/socket.h>
|
|
|
|
#include <sys/stat.h>
|
2017-04-15 11:02:07 +00:00
|
|
|
#include <sys/mount.h>
|
2017-04-28 13:48:38 +00:00
|
|
|
#include <selinux/selinux.h>
|
2017-04-07 23:37:43 +00:00
|
|
|
|
|
|
|
#include "magisk.h"
|
|
|
|
#include "utils.h"
|
|
|
|
#include "daemon.h"
|
2017-04-15 18:42:24 +00:00
|
|
|
#include "magiskpolicy.h"
|
2017-10-10 11:49:15 +00:00
|
|
|
#include "resetprop.h"
|
2017-04-15 18:42:24 +00:00
|
|
|
|
|
|
|
pthread_t sepol_patch;
|
2017-10-10 11:49:15 +00:00
|
|
|
int is_restart = 0;
|
2017-04-07 23:37:43 +00:00
|
|
|
|
2017-04-21 16:54:08 +00:00
|
|
|
static void *request_handler(void *args) {
|
|
|
|
int client = *((int *) args);
|
|
|
|
free(args);
|
2017-04-08 23:25:10 +00:00
|
|
|
client_request req = read_int(client);
|
2017-05-05 08:13:26 +00:00
|
|
|
|
|
|
|
struct ucred credentials;
|
|
|
|
get_client_cred(client, &credentials);
|
|
|
|
|
|
|
|
switch (req) {
|
|
|
|
case LAUNCH_MAGISKHIDE:
|
|
|
|
case STOP_MAGISKHIDE:
|
|
|
|
case ADD_HIDELIST:
|
|
|
|
case RM_HIDELIST:
|
2017-09-05 18:25:40 +00:00
|
|
|
case LS_HIDELIST:
|
2017-05-05 08:13:26 +00:00
|
|
|
case POST_FS:
|
|
|
|
case POST_FS_DATA:
|
|
|
|
case LATE_START:
|
|
|
|
if (credentials.uid != 0) {
|
|
|
|
write_int(client, ROOT_REQUIRED);
|
|
|
|
close(client);
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
default:
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2017-04-08 23:25:10 +00:00
|
|
|
switch (req) {
|
|
|
|
case LAUNCH_MAGISKHIDE:
|
|
|
|
launch_magiskhide(client);
|
|
|
|
break;
|
|
|
|
case STOP_MAGISKHIDE:
|
|
|
|
stop_magiskhide(client);
|
|
|
|
break;
|
|
|
|
case ADD_HIDELIST:
|
2017-04-20 14:45:56 +00:00
|
|
|
add_hide_list(client);
|
2017-04-08 23:25:10 +00:00
|
|
|
break;
|
|
|
|
case RM_HIDELIST:
|
2017-04-20 14:45:56 +00:00
|
|
|
rm_hide_list(client);
|
2017-04-08 23:25:10 +00:00
|
|
|
break;
|
2017-09-05 18:25:40 +00:00
|
|
|
case LS_HIDELIST:
|
|
|
|
ls_hide_list(client);
|
|
|
|
break;
|
2017-04-08 23:25:10 +00:00
|
|
|
case SUPERUSER:
|
2017-04-14 19:23:09 +00:00
|
|
|
su_daemon_receiver(client);
|
|
|
|
break;
|
|
|
|
case CHECK_VERSION:
|
2017-04-18 13:31:12 +00:00
|
|
|
write_string(client, MAGISK_VER_STR);
|
2017-04-14 19:23:09 +00:00
|
|
|
close(client);
|
|
|
|
break;
|
|
|
|
case CHECK_VERSION_CODE:
|
2017-04-18 13:31:12 +00:00
|
|
|
write_int(client, MAGISK_VER_CODE);
|
2017-04-14 19:23:09 +00:00
|
|
|
close(client);
|
2017-04-08 23:25:10 +00:00
|
|
|
break;
|
2017-04-15 11:02:07 +00:00
|
|
|
case POST_FS:
|
2017-04-15 18:42:24 +00:00
|
|
|
post_fs(client);
|
2017-04-15 11:02:07 +00:00
|
|
|
break;
|
|
|
|
case POST_FS_DATA:
|
2017-04-15 18:42:24 +00:00
|
|
|
post_fs_data(client);
|
2017-04-15 11:02:07 +00:00
|
|
|
break;
|
2017-04-15 18:42:24 +00:00
|
|
|
case LATE_START:
|
|
|
|
late_start(client);
|
2017-04-15 11:02:07 +00:00
|
|
|
break;
|
2017-05-05 08:13:26 +00:00
|
|
|
default:
|
2017-05-07 19:11:14 +00:00
|
|
|
break;
|
2017-04-08 23:25:10 +00:00
|
|
|
}
|
2017-04-21 16:54:08 +00:00
|
|
|
return NULL;
|
2017-04-07 23:37:43 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/* Setup the address and return socket fd */
|
|
|
|
static int setup_socket(struct sockaddr_un *sun) {
|
2017-07-08 15:51:58 +00:00
|
|
|
int fd = xsocket(AF_LOCAL, SOCK_STREAM | SOCK_CLOEXEC, 0);
|
2017-04-07 23:37:43 +00:00
|
|
|
memset(sun, 0, sizeof(*sun));
|
|
|
|
sun->sun_family = AF_LOCAL;
|
2017-07-30 10:15:00 +00:00
|
|
|
memcpy(sun->sun_path, REQUESTOR_DAEMON_PATH, sizeof(REQUESTOR_DAEMON_PATH) - 1);
|
2017-04-07 23:37:43 +00:00
|
|
|
return fd;
|
|
|
|
}
|
|
|
|
|
2017-10-10 11:49:15 +00:00
|
|
|
static void *start_magisk_hide(void *args) {
|
|
|
|
launch_magiskhide(-1);
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
void auto_start_magiskhide() {
|
|
|
|
char *hide_prop = getprop2(MAGISKHIDE_PROP, 1);
|
|
|
|
if (hide_prop == NULL || strcmp(hide_prop, "0") != 0) {
|
|
|
|
pthread_t thread;
|
|
|
|
xpthread_create(&thread, NULL, start_magisk_hide, NULL);
|
|
|
|
pthread_detach(thread);
|
|
|
|
}
|
|
|
|
free(hide_prop);
|
|
|
|
}
|
|
|
|
|
2017-10-08 14:00:22 +00:00
|
|
|
void start_daemon() {
|
2017-04-28 13:48:38 +00:00
|
|
|
setcon("u:r:su:s0");
|
2017-09-13 07:45:07 +00:00
|
|
|
umask(0);
|
2017-07-08 15:51:58 +00:00
|
|
|
int fd = xopen("/dev/null", O_RDWR | O_CLOEXEC);
|
|
|
|
xdup2(fd, STDIN_FILENO);
|
|
|
|
xdup2(fd, STDOUT_FILENO);
|
|
|
|
xdup2(fd, STDERR_FILENO);
|
|
|
|
close(fd);
|
2017-04-07 23:37:43 +00:00
|
|
|
|
2017-10-14 13:08:05 +00:00
|
|
|
struct sockaddr_un sun;
|
|
|
|
fd = setup_socket(&sun);
|
|
|
|
|
|
|
|
if (xbind(fd, (struct sockaddr*) &sun, sizeof(sun)) == -1)
|
|
|
|
exit(1);
|
|
|
|
xlisten(fd, 10);
|
|
|
|
|
2017-10-10 18:26:28 +00:00
|
|
|
if ((is_restart = access(UNBLOCKFILE, F_OK) == 0)) {
|
|
|
|
// Restart stuffs if the daemon is restarted
|
|
|
|
exec_command_sync("logcat", "-b", "all", "-c", NULL);
|
2017-10-10 11:49:15 +00:00
|
|
|
auto_start_magiskhide();
|
|
|
|
start_debug_log();
|
|
|
|
}
|
|
|
|
|
2017-10-08 21:05:52 +00:00
|
|
|
// Start the log monitor
|
|
|
|
monitor_logs();
|
|
|
|
|
2017-10-14 13:08:05 +00:00
|
|
|
LOGI("Magisk v" xstr(MAGISK_VERSION) "(" xstr(MAGISK_VER_CODE) ") daemon started\n");
|
2017-04-07 23:37:43 +00:00
|
|
|
|
|
|
|
// Change process name
|
|
|
|
strcpy(argv0, "magisk_daemon");
|
2017-04-08 23:25:10 +00:00
|
|
|
|
2017-04-15 10:33:16 +00:00
|
|
|
// Unlock all blocks for rw
|
|
|
|
unlock_blocks();
|
|
|
|
|
2017-10-10 18:26:28 +00:00
|
|
|
// Notifiy init the daemon is started
|
2017-10-13 16:19:13 +00:00
|
|
|
close(xopen(UNBLOCKFILE, O_RDONLY | O_CREAT));
|
2017-10-10 18:26:28 +00:00
|
|
|
|
2017-05-07 19:11:14 +00:00
|
|
|
// Loop forever to listen for requests
|
2017-04-07 23:37:43 +00:00
|
|
|
while(1) {
|
2017-04-21 16:54:08 +00:00
|
|
|
int *client = xmalloc(sizeof(int));
|
2017-07-08 15:51:58 +00:00
|
|
|
*client = xaccept4(fd, NULL, NULL, SOCK_CLOEXEC);
|
2017-04-21 16:54:08 +00:00
|
|
|
pthread_t thread;
|
|
|
|
xpthread_create(&thread, NULL, request_handler, client);
|
|
|
|
// Detach the thread, we will never join it
|
|
|
|
pthread_detach(thread);
|
2017-04-07 23:37:43 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Connect the daemon, and return a socketfd */
|
|
|
|
int connect_daemon() {
|
|
|
|
struct sockaddr_un sun;
|
|
|
|
int fd = setup_socket(&sun);
|
2017-10-13 16:08:12 +00:00
|
|
|
if (xconnect(fd, (struct sockaddr*) &sun, sizeof(sun))) {
|
2017-10-08 14:00:22 +00:00
|
|
|
// If we cannot access the daemon, we start a daemon in the child process if possible
|
|
|
|
|
|
|
|
if (getuid() != UID_ROOT || getgid() != UID_ROOT) {
|
2017-10-13 16:08:12 +00:00
|
|
|
fprintf(stderr, "No daemon is currently running!\n");
|
|
|
|
exit(1);
|
2017-10-08 14:00:22 +00:00
|
|
|
}
|
|
|
|
|
2017-10-13 16:08:12 +00:00
|
|
|
if (xfork() == 0) {
|
2017-10-08 14:00:22 +00:00
|
|
|
LOGD("client: connect fail, try launching new daemon process\n");
|
|
|
|
close(fd);
|
|
|
|
xsetsid();
|
|
|
|
start_daemon();
|
|
|
|
}
|
|
|
|
|
2017-04-07 23:37:43 +00:00
|
|
|
do {
|
|
|
|
// Wait for 10ms
|
2017-04-17 08:36:49 +00:00
|
|
|
usleep(10);
|
2017-04-07 23:37:43 +00:00
|
|
|
} while (connect(fd, (struct sockaddr*) &sun, sizeof(sun)));
|
|
|
|
}
|
|
|
|
return fd;
|
|
|
|
}
|
2017-11-09 17:51:41 +00:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Receive a file descriptor from a Unix socket.
|
|
|
|
* Contributed by @mkasick
|
|
|
|
*
|
|
|
|
* Returns the file descriptor on success, or -1 if a file
|
|
|
|
* descriptor was not actually included in the message
|
|
|
|
*
|
|
|
|
* On error the function terminates by calling exit(-1)
|
|
|
|
*/
|
|
|
|
int recv_fd(int sockfd) {
|
|
|
|
// Need to receive data from the message, otherwise don't care about it.
|
|
|
|
char iovbuf;
|
|
|
|
|
|
|
|
struct iovec iov = {
|
|
|
|
.iov_base = &iovbuf,
|
|
|
|
.iov_len = 1,
|
|
|
|
};
|
|
|
|
|
|
|
|
char cmsgbuf[CMSG_SPACE(sizeof(int))];
|
|
|
|
|
|
|
|
struct msghdr msg = {
|
|
|
|
.msg_iov = &iov,
|
|
|
|
.msg_iovlen = 1,
|
|
|
|
.msg_control = cmsgbuf,
|
|
|
|
.msg_controllen = sizeof(cmsgbuf),
|
|
|
|
};
|
|
|
|
|
|
|
|
xrecvmsg(sockfd, &msg, MSG_WAITALL);
|
|
|
|
|
|
|
|
// Was a control message actually sent?
|
|
|
|
switch (msg.msg_controllen) {
|
|
|
|
case 0:
|
|
|
|
// No, so the file descriptor was closed and won't be used.
|
|
|
|
return -1;
|
|
|
|
case sizeof(cmsgbuf):
|
|
|
|
// Yes, grab the file descriptor from it.
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
goto error;
|
|
|
|
}
|
|
|
|
|
|
|
|
struct cmsghdr *cmsg = CMSG_FIRSTHDR(&msg);
|
|
|
|
|
|
|
|
if (cmsg == NULL ||
|
|
|
|
cmsg->cmsg_len != CMSG_LEN(sizeof(int)) ||
|
|
|
|
cmsg->cmsg_level != SOL_SOCKET ||
|
|
|
|
cmsg->cmsg_type != SCM_RIGHTS) {
|
|
|
|
error:
|
|
|
|
LOGE("unable to read fd");
|
|
|
|
exit(-1);
|
|
|
|
}
|
|
|
|
|
|
|
|
return *(int *)CMSG_DATA(cmsg);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Send a file descriptor through a Unix socket.
|
|
|
|
* Contributed by @mkasick
|
|
|
|
*
|
|
|
|
* On error the function terminates by calling exit(-1)
|
|
|
|
*
|
|
|
|
* fd may be -1, in which case the dummy data is sent,
|
|
|
|
* but no control message with the FD is sent.
|
|
|
|
*/
|
|
|
|
void send_fd(int sockfd, int fd) {
|
|
|
|
// Need to send some data in the message, this will do.
|
|
|
|
struct iovec iov = {
|
|
|
|
.iov_base = "",
|
|
|
|
.iov_len = 1,
|
|
|
|
};
|
|
|
|
|
|
|
|
struct msghdr msg = {
|
|
|
|
.msg_iov = &iov,
|
|
|
|
.msg_iovlen = 1,
|
|
|
|
};
|
|
|
|
|
|
|
|
char cmsgbuf[CMSG_SPACE(sizeof(int))];
|
|
|
|
|
|
|
|
if (fd != -1) {
|
|
|
|
// Is the file descriptor actually open?
|
|
|
|
if (fcntl(fd, F_GETFD) == -1) {
|
|
|
|
if (errno != EBADF) {
|
|
|
|
PLOGE("unable to send fd");
|
|
|
|
}
|
|
|
|
// It's closed, don't send a control message or sendmsg will EBADF.
|
|
|
|
} else {
|
|
|
|
// It's open, send the file descriptor in a control message.
|
|
|
|
msg.msg_control = cmsgbuf;
|
|
|
|
msg.msg_controllen = sizeof(cmsgbuf);
|
|
|
|
|
|
|
|
struct cmsghdr *cmsg = CMSG_FIRSTHDR(&msg);
|
|
|
|
|
|
|
|
cmsg->cmsg_len = CMSG_LEN(sizeof(int));
|
|
|
|
cmsg->cmsg_level = SOL_SOCKET;
|
|
|
|
cmsg->cmsg_type = SCM_RIGHTS;
|
|
|
|
|
|
|
|
*(int *)CMSG_DATA(cmsg) = fd;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
xsendmsg(sockfd, &msg, 0);
|
|
|
|
}
|
|
|
|
|
|
|
|
int read_int(int fd) {
|
|
|
|
int val;
|
|
|
|
xxread(fd, &val, sizeof(int));
|
|
|
|
return val;
|
|
|
|
}
|
|
|
|
|
|
|
|
void write_int(int fd, int val) {
|
|
|
|
if (fd < 0) return;
|
|
|
|
xwrite(fd, &val, sizeof(int));
|
|
|
|
}
|
|
|
|
|
|
|
|
char* read_string(int fd) {
|
|
|
|
int len = read_int(fd);
|
|
|
|
if (len > PATH_MAX || len < 0) {
|
|
|
|
LOGE("invalid string length %d", len);
|
|
|
|
exit(1);
|
|
|
|
}
|
|
|
|
char* val = xmalloc(sizeof(char) * (len + 1));
|
|
|
|
xxread(fd, val, len);
|
|
|
|
val[len] = '\0';
|
|
|
|
return val;
|
|
|
|
}
|
|
|
|
|
|
|
|
void write_string(int fd, const char* val) {
|
|
|
|
if (fd < 0) return;
|
|
|
|
int len = strlen(val);
|
|
|
|
write_int(fd, len);
|
|
|
|
xwrite(fd, val, len);
|
|
|
|
}
|