Magisk/jni/daemon/daemon.c

218 lines
4.8 KiB
C
Raw Normal View History

2017-04-07 23:37:43 +00:00
/* daemon.c - Magisk Daemon
*
* Start the daemon and wait for requests
* Connect the daemon and send requests through sockets
*/
#include <stdlib.h>
#include <unistd.h>
#include <fcntl.h>
#include <string.h>
#include <errno.h>
#include <pthread.h>
2017-04-07 23:37:43 +00:00
#include <sys/un.h>
#include <sys/types.h>
#include <sys/socket.h>
#include <sys/stat.h>
2017-04-15 11:02:07 +00:00
#include <sys/mount.h>
2017-04-28 13:48:38 +00:00
#include <selinux/selinux.h>
2017-04-07 23:37:43 +00:00
#include "magisk.h"
#include "utils.h"
#include "daemon.h"
#include "magiskpolicy.h"
2017-10-10 11:49:15 +00:00
#include "resetprop.h"
pthread_t sepol_patch;
2017-10-10 11:49:15 +00:00
int is_restart = 0;
2017-04-07 23:37:43 +00:00
2017-04-21 16:54:08 +00:00
static void *request_handler(void *args) {
int client = *((int *) args);
free(args);
client_request req = read_int(client);
2017-05-05 08:13:26 +00:00
struct ucred credentials;
get_client_cred(client, &credentials);
switch (req) {
case LAUNCH_MAGISKHIDE:
case STOP_MAGISKHIDE:
case ADD_HIDELIST:
case RM_HIDELIST:
case LS_HIDELIST:
2017-05-05 08:13:26 +00:00
case POST_FS:
case POST_FS_DATA:
case LATE_START:
if (credentials.uid != 0) {
write_int(client, ROOT_REQUIRED);
close(client);
return NULL;
}
default:
break;
}
switch (req) {
case LAUNCH_MAGISKHIDE:
launch_magiskhide(client);
break;
case STOP_MAGISKHIDE:
stop_magiskhide(client);
break;
case ADD_HIDELIST:
2017-04-20 14:45:56 +00:00
add_hide_list(client);
break;
case RM_HIDELIST:
2017-04-20 14:45:56 +00:00
rm_hide_list(client);
break;
case LS_HIDELIST:
ls_hide_list(client);
break;
case SUPERUSER:
2017-04-14 19:23:09 +00:00
su_daemon_receiver(client);
break;
case CHECK_VERSION:
2017-04-18 13:31:12 +00:00
write_string(client, MAGISK_VER_STR);
2017-04-14 19:23:09 +00:00
close(client);
break;
case CHECK_VERSION_CODE:
2017-04-18 13:31:12 +00:00
write_int(client, MAGISK_VER_CODE);
2017-04-14 19:23:09 +00:00
close(client);
break;
2017-04-15 11:02:07 +00:00
case POST_FS:
post_fs(client);
2017-04-15 11:02:07 +00:00
break;
case POST_FS_DATA:
post_fs_data(client);
2017-04-15 11:02:07 +00:00
break;
case LATE_START:
late_start(client);
2017-04-15 11:02:07 +00:00
break;
2017-05-05 08:13:26 +00:00
default:
2017-05-07 19:11:14 +00:00
break;
}
2017-04-21 16:54:08 +00:00
return NULL;
2017-04-07 23:37:43 +00:00
}
/* Setup the address and return socket fd */
static int setup_socket(struct sockaddr_un *sun) {
int fd = xsocket(AF_LOCAL, SOCK_STREAM | SOCK_CLOEXEC, 0);
2017-04-07 23:37:43 +00:00
memset(sun, 0, sizeof(*sun));
sun->sun_family = AF_LOCAL;
2017-07-30 10:15:00 +00:00
memcpy(sun->sun_path, REQUESTOR_DAEMON_PATH, sizeof(REQUESTOR_DAEMON_PATH) - 1);
2017-04-07 23:37:43 +00:00
return fd;
}
static void *large_sepol_patch(void *args) {
LOGD("sepol: Starting large patch thread\n");
// Patch su to everything
sepol_allow("su", ALL, ALL, ALL);
2017-04-30 17:58:52 +00:00
dump_policydb(SELINUX_LOAD);
LOGD("sepol: Large patch done\n");
destroy_policydb();
return NULL;
}
2017-10-10 11:49:15 +00:00
static void *start_magisk_hide(void *args) {
launch_magiskhide(-1);
return NULL;
}
void auto_start_magiskhide() {
char *hide_prop = getprop2(MAGISKHIDE_PROP, 1);
if (hide_prop == NULL || strcmp(hide_prop, "0") != 0) {
pthread_t thread;
xpthread_create(&thread, NULL, start_magisk_hide, NULL);
pthread_detach(thread);
}
free(hide_prop);
}
void start_daemon() {
2017-04-28 13:48:38 +00:00
setcon("u:r:su:s0");
2017-09-13 07:45:07 +00:00
umask(0);
int fd = xopen("/dev/null", O_RDWR | O_CLOEXEC);
xdup2(fd, STDIN_FILENO);
xdup2(fd, STDOUT_FILENO);
xdup2(fd, STDERR_FILENO);
close(fd);
2017-04-07 23:37:43 +00:00
if ((is_restart = access(UNBLOCKFILE, F_OK) == 0)) {
// Restart stuffs if the daemon is restarted
exec_command_sync("logcat", "-b", "all", "-c", NULL);
2017-10-10 11:49:15 +00:00
auto_start_magiskhide();
start_debug_log();
}
// Start the log monitor
monitor_logs();
2017-10-10 11:49:15 +00:00
LOGI("Magisk v" xstr(MAGISK_VERSION) "(" xstr(MAGISK_VER_CODE) ") daemon started\n");
2017-04-21 16:54:08 +00:00
// Patch selinux with medium patch before we do anything
2017-04-30 17:58:52 +00:00
load_policydb(SELINUX_POLICY);
sepol_med_rules();
2017-04-30 17:58:52 +00:00
dump_policydb(SELINUX_LOAD);
2017-05-07 19:11:14 +00:00
// Continue the larger patch in another thread, we will join later
pthread_create(&sepol_patch, NULL, large_sepol_patch, NULL);
2017-04-07 23:37:43 +00:00
struct sockaddr_un sun;
fd = setup_socket(&sun);
2017-05-07 19:11:14 +00:00
2017-04-07 23:37:43 +00:00
xbind(fd, (struct sockaddr*) &sun, sizeof(sun));
xlisten(fd, 10);
// Change process name
strcpy(argv0, "magisk_daemon");
2017-04-15 10:33:16 +00:00
// Unlock all blocks for rw
unlock_blocks();
// Notifiy init the daemon is started
close(open(UNBLOCKFILE, O_RDONLY));
2017-05-07 19:11:14 +00:00
// Loop forever to listen for requests
2017-04-07 23:37:43 +00:00
while(1) {
2017-04-21 16:54:08 +00:00
int *client = xmalloc(sizeof(int));
*client = xaccept4(fd, NULL, NULL, SOCK_CLOEXEC);
2017-04-21 16:54:08 +00:00
pthread_t thread;
xpthread_create(&thread, NULL, request_handler, client);
// Detach the thread, we will never join it
pthread_detach(thread);
2017-04-07 23:37:43 +00:00
}
}
/* Connect the daemon, and return a socketfd */
int connect_daemon() {
struct sockaddr_un sun;
int fd = setup_socket(&sun);
if (connect(fd, (struct sockaddr*) &sun, sizeof(sun))) {
// If we cannot access the daemon, we start a daemon in the child process if possible
if (getuid() != UID_ROOT || getgid() != UID_ROOT) {
fprintf(stderr, "Starting daemon requires root: %s\n", strerror(errno));
PLOGE("start daemon");
}
switch (fork()) {
case -1:
PLOGE("fork");
case 0:
LOGD("client: connect fail, try launching new daemon process\n");
close(fd);
xsetsid();
start_daemon();
break;
default:
break;
}
2017-04-07 23:37:43 +00:00
do {
// Wait for 10ms
2017-04-17 08:36:49 +00:00
usleep(10);
2017-04-07 23:37:43 +00:00
} while (connect(fd, (struct sockaddr*) &sun, sizeof(sun)));
}
return fd;
}