2017-04-07 23:37:43 +00:00
|
|
|
#include <stdlib.h>
|
|
|
|
#include <unistd.h>
|
|
|
|
#include <fcntl.h>
|
|
|
|
#include <string.h>
|
2017-04-15 18:42:24 +00:00
|
|
|
#include <pthread.h>
|
2017-11-14 21:15:58 +00:00
|
|
|
#include <signal.h>
|
2017-04-07 23:37:43 +00:00
|
|
|
#include <sys/un.h>
|
|
|
|
#include <sys/types.h>
|
2017-11-27 20:43:46 +00:00
|
|
|
#include <sys/mount.h>
|
2017-04-07 23:37:43 +00:00
|
|
|
|
2019-02-10 08:57:51 +00:00
|
|
|
#include <magisk.h>
|
|
|
|
#include <utils.h>
|
|
|
|
#include <daemon.h>
|
|
|
|
#include <selinux.h>
|
|
|
|
#include <db.h>
|
|
|
|
#include <resetprop.h>
|
|
|
|
#include <flags.h>
|
2017-04-15 18:42:24 +00:00
|
|
|
|
2019-01-20 22:52:19 +00:00
|
|
|
int SDK_INT = -1;
|
2019-03-30 10:49:29 +00:00
|
|
|
bool RECOVERY_MODE = false;
|
2019-09-17 04:21:07 +00:00
|
|
|
static struct stat self_st;
|
2019-01-20 22:52:19 +00:00
|
|
|
|
2019-02-09 20:02:46 +00:00
|
|
|
static void verify_client(int client, pid_t pid) {
|
|
|
|
// Verify caller is the same as server
|
|
|
|
char path[32];
|
|
|
|
sprintf(path, "/proc/%d/exe", pid);
|
2019-09-13 07:14:21 +00:00
|
|
|
struct stat st;
|
2019-09-17 04:21:07 +00:00
|
|
|
if (stat(path, &st) || st.st_dev != self_st.st_dev || st.st_ino != self_st.st_ino) {
|
2019-02-09 20:02:46 +00:00
|
|
|
close(client);
|
|
|
|
pthread_exit(nullptr);
|
|
|
|
}
|
2018-10-13 01:46:09 +00:00
|
|
|
}
|
|
|
|
|
2019-09-13 07:14:21 +00:00
|
|
|
static void remove_modules() {
|
|
|
|
LOGI("* Remove all modules and reboot");
|
|
|
|
rm_rf(MODULEROOT);
|
|
|
|
rm_rf(MODULEUPGRADE);
|
|
|
|
reboot();
|
|
|
|
}
|
|
|
|
|
2017-04-21 16:54:08 +00:00
|
|
|
static void *request_handler(void *args) {
|
2019-09-19 04:13:42 +00:00
|
|
|
int client = reinterpret_cast<intptr_t>(args);
|
2017-05-05 08:13:26 +00:00
|
|
|
|
2017-12-18 07:46:18 +00:00
|
|
|
struct ucred credential;
|
|
|
|
get_client_cred(client, &credential);
|
2019-02-09 20:02:46 +00:00
|
|
|
if (credential.uid != 0)
|
|
|
|
verify_client(client, credential.pid);
|
2017-05-05 08:13:26 +00:00
|
|
|
|
2019-02-09 20:02:46 +00:00
|
|
|
int req = read_int(client);
|
2017-05-05 08:13:26 +00:00
|
|
|
switch (req) {
|
2018-11-01 18:08:33 +00:00
|
|
|
case MAGISKHIDE:
|
2017-05-05 08:13:26 +00:00
|
|
|
case POST_FS_DATA:
|
|
|
|
case LATE_START:
|
2018-08-09 06:52:44 +00:00
|
|
|
case BOOT_COMPLETE:
|
2018-11-16 08:20:30 +00:00
|
|
|
case SQLITE_CMD:
|
2019-05-13 09:01:10 +00:00
|
|
|
case BROADCAST_ACK:
|
2017-12-18 07:46:18 +00:00
|
|
|
if (credential.uid != 0) {
|
2017-05-05 08:13:26 +00:00
|
|
|
write_int(client, ROOT_REQUIRED);
|
|
|
|
close(client);
|
2019-01-20 22:52:19 +00:00
|
|
|
return nullptr;
|
2017-05-05 08:13:26 +00:00
|
|
|
}
|
|
|
|
default:
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2017-04-08 23:25:10 +00:00
|
|
|
switch (req) {
|
2018-11-01 18:08:33 +00:00
|
|
|
case MAGISKHIDE:
|
|
|
|
magiskhide_handler(client);
|
2017-09-05 18:25:40 +00:00
|
|
|
break;
|
2017-04-08 23:25:10 +00:00
|
|
|
case SUPERUSER:
|
2018-10-04 08:59:51 +00:00
|
|
|
su_daemon_handler(client, &credential);
|
2017-04-14 19:23:09 +00:00
|
|
|
break;
|
|
|
|
case CHECK_VERSION:
|
2019-02-12 10:17:02 +00:00
|
|
|
write_string(client, MAGISK_VERSION ":MAGISK");
|
2017-04-14 19:23:09 +00:00
|
|
|
close(client);
|
|
|
|
break;
|
|
|
|
case CHECK_VERSION_CODE:
|
2017-04-18 13:31:12 +00:00
|
|
|
write_int(client, MAGISK_VER_CODE);
|
2017-04-14 19:23:09 +00:00
|
|
|
close(client);
|
2017-04-08 23:25:10 +00:00
|
|
|
break;
|
2017-04-15 11:02:07 +00:00
|
|
|
case POST_FS_DATA:
|
2017-04-15 18:42:24 +00:00
|
|
|
post_fs_data(client);
|
2017-04-15 11:02:07 +00:00
|
|
|
break;
|
2017-04-15 18:42:24 +00:00
|
|
|
case LATE_START:
|
|
|
|
late_start(client);
|
2017-04-15 11:02:07 +00:00
|
|
|
break;
|
2018-08-09 06:52:44 +00:00
|
|
|
case BOOT_COMPLETE:
|
|
|
|
boot_complete(client);
|
|
|
|
break;
|
2018-11-16 08:20:30 +00:00
|
|
|
case SQLITE_CMD:
|
|
|
|
exec_sql(client);
|
2019-03-04 21:45:18 +00:00
|
|
|
break;
|
2019-05-13 09:01:10 +00:00
|
|
|
case BROADCAST_ACK:
|
|
|
|
LOGD("* Use broadcasts for su logging and notify\n");
|
|
|
|
CONNECT_BROADCAST = true;
|
|
|
|
close(client);
|
2019-09-13 07:14:21 +00:00
|
|
|
break;
|
|
|
|
case REMOVE_MODULES:
|
|
|
|
if (credential.uid == UID_SHELL || credential.uid == UID_ROOT) {
|
|
|
|
remove_modules();
|
|
|
|
write_int(client, 0);
|
|
|
|
} else {
|
|
|
|
write_int(client, 1);
|
|
|
|
}
|
|
|
|
close(client);
|
|
|
|
break;
|
2017-05-05 08:13:26 +00:00
|
|
|
default:
|
2018-07-02 14:11:28 +00:00
|
|
|
close(client);
|
2017-05-07 19:11:14 +00:00
|
|
|
break;
|
2017-04-08 23:25:10 +00:00
|
|
|
}
|
2018-11-07 07:10:38 +00:00
|
|
|
return nullptr;
|
2017-04-07 23:37:43 +00:00
|
|
|
}
|
|
|
|
|
2018-10-12 04:50:47 +00:00
|
|
|
static void main_daemon() {
|
2018-09-27 07:11:10 +00:00
|
|
|
android_logging();
|
2017-11-22 08:12:08 +00:00
|
|
|
setsid();
|
2018-11-04 08:38:06 +00:00
|
|
|
setcon("u:r:" SEPOL_PROC_DOMAIN ":s0");
|
2019-04-24 04:13:48 +00:00
|
|
|
restore_rootcon();
|
|
|
|
|
2019-06-26 06:31:59 +00:00
|
|
|
// Unmount pre-init patches
|
2019-07-17 06:54:52 +00:00
|
|
|
if (access(ROOTMNT, F_OK) == 0) {
|
|
|
|
file_readline(ROOTMNT, [](auto line) -> bool {
|
|
|
|
umount2(line.data(), MNT_DETACH);
|
|
|
|
return true;
|
|
|
|
}, true);
|
|
|
|
}
|
2019-06-26 06:31:59 +00:00
|
|
|
|
2017-07-08 15:51:58 +00:00
|
|
|
int fd = xopen("/dev/null", O_RDWR | O_CLOEXEC);
|
|
|
|
xdup2(fd, STDOUT_FILENO);
|
|
|
|
xdup2(fd, STDERR_FILENO);
|
|
|
|
close(fd);
|
2018-07-02 14:11:28 +00:00
|
|
|
fd = xopen("/dev/zero", O_RDWR | O_CLOEXEC);
|
|
|
|
xdup2(fd, STDIN_FILENO);
|
|
|
|
close(fd);
|
2017-04-07 23:37:43 +00:00
|
|
|
|
2019-02-12 10:17:02 +00:00
|
|
|
LOGI(SHOW_VER(Magisk) " daemon started\n");
|
2019-02-09 20:02:46 +00:00
|
|
|
|
|
|
|
// Get server stat
|
2019-09-17 04:21:07 +00:00
|
|
|
stat("/proc/self/exe", &self_st);
|
2019-02-09 20:02:46 +00:00
|
|
|
|
2019-01-20 22:52:19 +00:00
|
|
|
// Get API level
|
|
|
|
parse_prop_file("/system/build.prop", [](auto key, auto val) -> bool {
|
2019-03-06 01:27:09 +00:00
|
|
|
if (key == "ro.build.version.sdk") {
|
|
|
|
LOGI("* Device API level: %s\n", val.data());
|
2019-03-08 01:31:35 +00:00
|
|
|
SDK_INT = parse_int(val);
|
2019-01-20 22:52:19 +00:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
return true;
|
|
|
|
});
|
|
|
|
|
2019-03-30 10:49:29 +00:00
|
|
|
// Load config status
|
|
|
|
parse_prop_file(MAGISKTMP "/config", [](auto key, auto val) -> bool {
|
|
|
|
if (key == "RECOVERYMODE" && val == "true")
|
|
|
|
RECOVERY_MODE = true;
|
|
|
|
return true;
|
|
|
|
});
|
|
|
|
|
2017-10-14 13:08:05 +00:00
|
|
|
struct sockaddr_un sun;
|
2018-10-12 04:50:47 +00:00
|
|
|
socklen_t len = setup_sockaddr(&sun, MAIN_SOCKET);
|
2018-09-16 08:16:18 +00:00
|
|
|
fd = xsocket(AF_LOCAL, SOCK_STREAM | SOCK_CLOEXEC, 0);
|
|
|
|
if (xbind(fd, (struct sockaddr*) &sun, len))
|
2017-11-27 19:42:48 +00:00
|
|
|
exit(1);
|
2017-10-14 13:08:05 +00:00
|
|
|
xlisten(fd, 10);
|
2017-04-07 23:37:43 +00:00
|
|
|
|
|
|
|
// Change process name
|
2019-02-15 09:31:39 +00:00
|
|
|
set_nice_name("magiskd");
|
2017-04-08 23:25:10 +00:00
|
|
|
|
2019-02-10 09:18:50 +00:00
|
|
|
// Block all signals
|
2018-07-02 17:38:19 +00:00
|
|
|
sigset_t block_set;
|
2019-02-10 09:18:50 +00:00
|
|
|
sigfillset(&block_set);
|
2019-01-20 22:52:19 +00:00
|
|
|
pthread_sigmask(SIG_SETMASK, &block_set, nullptr);
|
2018-07-02 17:38:19 +00:00
|
|
|
|
2017-05-07 19:11:14 +00:00
|
|
|
// Loop forever to listen for requests
|
2019-02-14 22:36:18 +00:00
|
|
|
for (;;) {
|
2019-09-19 04:13:42 +00:00
|
|
|
int client = xaccept4(fd, nullptr, nullptr, SOCK_CLOEXEC);
|
|
|
|
new_daemon_thread(request_handler, reinterpret_cast<void*>(client));
|
2017-04-07 23:37:43 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-09-13 07:14:21 +00:00
|
|
|
void reboot() {
|
|
|
|
if (RECOVERY_MODE)
|
|
|
|
exec_command_sync("/system/bin/reboot", "recovery");
|
|
|
|
else
|
|
|
|
exec_command_sync("/system/bin/reboot");
|
|
|
|
}
|
|
|
|
|
2018-11-13 07:07:02 +00:00
|
|
|
int switch_mnt_ns(int pid) {
|
|
|
|
char mnt[32];
|
|
|
|
snprintf(mnt, sizeof(mnt), "/proc/%d/ns/mnt", pid);
|
2019-02-14 22:36:18 +00:00
|
|
|
if (access(mnt, R_OK) == -1) return 1; // Maybe process died..
|
2018-11-13 07:07:02 +00:00
|
|
|
|
|
|
|
int fd, ret;
|
|
|
|
fd = xopen(mnt, O_RDONLY);
|
|
|
|
if (fd < 0) return 1;
|
|
|
|
// Switch to its namespace
|
|
|
|
ret = xsetns(fd, 0);
|
|
|
|
close(fd);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2019-03-04 21:45:18 +00:00
|
|
|
int connect_daemon(bool create) {
|
2017-04-07 23:37:43 +00:00
|
|
|
struct sockaddr_un sun;
|
2018-10-12 04:50:47 +00:00
|
|
|
socklen_t len = setup_sockaddr(&sun, MAIN_SOCKET);
|
|
|
|
int fd = xsocket(AF_LOCAL, SOCK_STREAM | SOCK_CLOEXEC, 0);
|
|
|
|
if (connect(fd, (struct sockaddr*) &sun, len)) {
|
2019-03-04 21:45:18 +00:00
|
|
|
if (!create || getuid() != UID_ROOT || getgid() != UID_ROOT) {
|
|
|
|
LOGE("No daemon is currently running!\n");
|
2017-10-13 16:08:12 +00:00
|
|
|
exit(1);
|
2017-10-08 14:00:22 +00:00
|
|
|
}
|
|
|
|
|
2018-10-12 04:50:47 +00:00
|
|
|
LOGD("client: launching new main daemon process\n");
|
2018-04-29 04:17:28 +00:00
|
|
|
if (fork_dont_care() == 0) {
|
2018-10-12 04:50:47 +00:00
|
|
|
close(fd);
|
|
|
|
main_daemon();
|
2017-10-08 14:00:22 +00:00
|
|
|
}
|
|
|
|
|
2018-10-12 04:50:47 +00:00
|
|
|
while (connect(fd, (struct sockaddr*) &sun, len))
|
2017-11-27 19:42:48 +00:00
|
|
|
usleep(10000);
|
2017-04-07 23:37:43 +00:00
|
|
|
}
|
|
|
|
return fd;
|
|
|
|
}
|