2017-04-07 23:37:43 +00:00
|
|
|
#include <fcntl.h>
|
2017-04-15 18:42:24 +00:00
|
|
|
#include <pthread.h>
|
2021-01-11 10:19:10 +00:00
|
|
|
#include <csignal>
|
2020-04-12 12:34:56 +00:00
|
|
|
#include <libgen.h>
|
2017-04-07 23:37:43 +00:00
|
|
|
#include <sys/un.h>
|
|
|
|
#include <sys/types.h>
|
2017-11-27 20:43:46 +00:00
|
|
|
#include <sys/mount.h>
|
2020-05-10 07:48:41 +00:00
|
|
|
#include <android/log.h>
|
2017-04-07 23:37:43 +00:00
|
|
|
|
2020-03-09 08:50:30 +00:00
|
|
|
#include <magisk.hpp>
|
|
|
|
#include <utils.hpp>
|
|
|
|
#include <daemon.hpp>
|
|
|
|
#include <selinux.hpp>
|
|
|
|
#include <db.hpp>
|
|
|
|
#include <resetprop.hpp>
|
2020-06-01 11:15:37 +00:00
|
|
|
#include <flags.hpp>
|
2020-12-04 04:15:18 +00:00
|
|
|
#include <stream.hpp>
|
2017-04-15 18:42:24 +00:00
|
|
|
|
2021-01-11 10:19:10 +00:00
|
|
|
#include "core.hpp"
|
|
|
|
|
2020-04-12 12:34:56 +00:00
|
|
|
using namespace std;
|
|
|
|
|
2019-01-20 22:52:19 +00:00
|
|
|
int SDK_INT = -1;
|
2020-04-12 12:34:56 +00:00
|
|
|
string MAGISKTMP;
|
2021-01-11 10:19:10 +00:00
|
|
|
|
|
|
|
bool RECOVERY_MODE = false;
|
2020-12-15 11:40:37 +00:00
|
|
|
int DAEMON_STATE = STATE_NONE;
|
2020-05-18 12:18:49 +00:00
|
|
|
|
2019-09-17 04:21:07 +00:00
|
|
|
static struct stat self_st;
|
2019-01-20 22:52:19 +00:00
|
|
|
|
2020-12-04 09:07:47 +00:00
|
|
|
static bool verify_client(pid_t pid) {
|
2020-12-31 06:11:24 +00:00
|
|
|
// Verify caller is the same as server
|
|
|
|
char path[32];
|
|
|
|
sprintf(path, "/proc/%d/exe", pid);
|
|
|
|
struct stat st;
|
|
|
|
return !(stat(path, &st) || st.st_dev != self_st.st_dev || st.st_ino != self_st.st_ino);
|
2020-05-18 12:18:49 +00:00
|
|
|
}
|
|
|
|
|
2021-01-12 11:28:00 +00:00
|
|
|
static bool check_zygote(pid_t pid) {
|
|
|
|
char buf[32];
|
|
|
|
sprintf(buf, "/proc/%d/attr/current", pid);
|
|
|
|
auto fp = open_file(buf, "r");
|
|
|
|
if (!fp)
|
|
|
|
return false;
|
|
|
|
fscanf(fp.get(), "%s", buf);
|
|
|
|
return buf == "u:r:zygote:s0"sv;
|
|
|
|
}
|
|
|
|
|
2020-05-18 12:18:49 +00:00
|
|
|
static void request_handler(int client, int req_code, ucred cred) {
|
2020-12-31 06:11:24 +00:00
|
|
|
switch (req_code) {
|
|
|
|
case MAGISKHIDE:
|
2021-01-12 11:28:00 +00:00
|
|
|
magiskhide_handler(client, &cred);
|
2020-12-31 06:11:24 +00:00
|
|
|
break;
|
|
|
|
case SUPERUSER:
|
|
|
|
su_daemon_handler(client, &cred);
|
|
|
|
break;
|
|
|
|
case POST_FS_DATA:
|
|
|
|
post_fs_data(client);
|
|
|
|
break;
|
|
|
|
case LATE_START:
|
|
|
|
late_start(client);
|
|
|
|
break;
|
|
|
|
case BOOT_COMPLETE:
|
|
|
|
boot_complete(client);
|
|
|
|
break;
|
|
|
|
case SQLITE_CMD:
|
|
|
|
exec_sql(client);
|
|
|
|
break;
|
|
|
|
case REMOVE_MODULES:
|
|
|
|
remove_modules();
|
|
|
|
write_int(client, 0);
|
|
|
|
close(client);
|
|
|
|
reboot();
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
close(client);
|
|
|
|
break;
|
|
|
|
}
|
2018-10-13 01:46:09 +00:00
|
|
|
}
|
|
|
|
|
2020-05-18 12:18:49 +00:00
|
|
|
static void handle_request(int client) {
|
2020-12-31 06:11:24 +00:00
|
|
|
int req_code;
|
|
|
|
|
|
|
|
// Verify client credentials
|
|
|
|
ucred cred;
|
|
|
|
get_client_cred(client, &cred);
|
2021-01-12 11:28:00 +00:00
|
|
|
|
|
|
|
bool is_root = cred.uid == 0;
|
|
|
|
bool is_zygote = check_zygote(cred.pid);
|
|
|
|
bool is_client = verify_client(cred.pid);
|
|
|
|
|
|
|
|
if (!is_root && !is_zygote && !is_client)
|
2020-12-31 06:11:24 +00:00
|
|
|
goto shortcut;
|
|
|
|
|
|
|
|
req_code = read_int(client);
|
|
|
|
if (req_code < 0 || req_code >= DAEMON_CODE_END)
|
|
|
|
goto shortcut;
|
|
|
|
|
|
|
|
// Check client permissions
|
|
|
|
switch (req_code) {
|
|
|
|
case POST_FS_DATA:
|
|
|
|
case LATE_START:
|
|
|
|
case BOOT_COMPLETE:
|
|
|
|
case SQLITE_CMD:
|
|
|
|
case GET_PATH:
|
2021-01-12 11:28:00 +00:00
|
|
|
if (!is_root) {
|
2020-12-31 06:11:24 +00:00
|
|
|
write_int(client, ROOT_REQUIRED);
|
|
|
|
goto shortcut;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
case REMOVE_MODULES:
|
|
|
|
if (cred.uid != UID_SHELL && cred.uid != UID_ROOT) {
|
|
|
|
write_int(client, 1);
|
|
|
|
goto shortcut;
|
|
|
|
}
|
|
|
|
break;
|
2021-01-12 11:28:00 +00:00
|
|
|
case MAGISKHIDE: // accept hide request from zygote
|
|
|
|
if (!is_root && !is_zygote) {
|
|
|
|
write_int(client, ROOT_REQUIRED);
|
|
|
|
goto shortcut;
|
|
|
|
}
|
|
|
|
break;
|
2020-12-31 06:11:24 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Simple requests
|
|
|
|
switch (req_code) {
|
|
|
|
case CHECK_VERSION:
|
|
|
|
write_string(client, MAGISK_VERSION ":MAGISK");
|
|
|
|
goto shortcut;
|
|
|
|
case CHECK_VERSION_CODE:
|
|
|
|
write_int(client, MAGISK_VER_CODE);
|
|
|
|
goto shortcut;
|
|
|
|
case GET_PATH:
|
|
|
|
write_string(client, MAGISKTMP.data());
|
|
|
|
goto shortcut;
|
|
|
|
case START_DAEMON:
|
|
|
|
setup_logfile(true);
|
|
|
|
goto shortcut;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Create new thread to handle complex requests
|
|
|
|
new_daemon_thread([=] { return request_handler(client, req_code, cred); });
|
|
|
|
return;
|
2020-05-18 12:18:49 +00:00
|
|
|
|
|
|
|
shortcut:
|
2020-12-31 06:11:24 +00:00
|
|
|
close(client);
|
2017-04-07 23:37:43 +00:00
|
|
|
}
|
|
|
|
|
2021-02-27 15:40:55 +00:00
|
|
|
static int switch_cgroup(const char *cgroup, int pid) {
|
|
|
|
char buf[32];
|
|
|
|
snprintf(buf, sizeof(buf), "%s/cgroup.procs", cgroup);
|
|
|
|
int fd = open(buf, O_WRONLY | O_APPEND | O_CLOEXEC);
|
|
|
|
if (fd == -1)
|
|
|
|
return -1;
|
|
|
|
snprintf(buf, sizeof(buf), "%d\n", pid);
|
|
|
|
if (xwrite(fd, buf, strlen(buf)) == -1) {
|
|
|
|
close(fd);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
close(fd);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2021-03-14 00:34:41 +00:00
|
|
|
static void magisk_logging();
|
|
|
|
static void start_log_daemon();
|
|
|
|
|
2021-02-27 15:40:55 +00:00
|
|
|
[[noreturn]] static void daemon_entry() {
|
2021-03-14 00:34:41 +00:00
|
|
|
magisk_logging();
|
|
|
|
|
2021-03-09 10:40:12 +00:00
|
|
|
// Block all signals
|
|
|
|
sigset_t block_set;
|
|
|
|
sigfillset(&block_set);
|
|
|
|
pthread_sigmask(SIG_SETMASK, &block_set, nullptr);
|
|
|
|
|
|
|
|
// Change process name
|
|
|
|
set_nice_name("magiskd");
|
|
|
|
|
2020-12-31 06:11:24 +00:00
|
|
|
int fd = xopen("/dev/null", O_WRONLY);
|
|
|
|
xdup2(fd, STDOUT_FILENO);
|
|
|
|
xdup2(fd, STDERR_FILENO);
|
|
|
|
if (fd > STDERR_FILENO)
|
|
|
|
close(fd);
|
|
|
|
fd = xopen("/dev/zero", O_RDONLY);
|
|
|
|
xdup2(fd, STDIN_FILENO);
|
|
|
|
if (fd > STDERR_FILENO)
|
|
|
|
close(fd);
|
|
|
|
|
|
|
|
setsid();
|
|
|
|
setcon("u:r:" SEPOL_PROC_DOMAIN ":s0");
|
|
|
|
|
2021-03-14 00:34:41 +00:00
|
|
|
start_log_daemon();
|
|
|
|
|
2020-12-31 06:11:24 +00:00
|
|
|
LOGI(NAME_WITH_VER(Magisk) " daemon started\n");
|
|
|
|
|
2021-02-27 15:40:55 +00:00
|
|
|
// Escape from cgroup
|
|
|
|
int pid = getpid();
|
|
|
|
if (switch_cgroup("/acct", pid) && switch_cgroup("/sys/fs/cgroup", pid))
|
|
|
|
LOGW("Can't switch cgroup\n");
|
2020-12-31 06:11:24 +00:00
|
|
|
|
|
|
|
// Get self stat
|
2021-02-27 15:40:55 +00:00
|
|
|
char buf[64];
|
|
|
|
xreadlink("/proc/self/exe", buf, sizeof(buf));
|
|
|
|
MAGISKTMP = dirname(buf);
|
2020-12-31 06:11:24 +00:00
|
|
|
xstat("/proc/self/exe", &self_st);
|
|
|
|
|
|
|
|
// Get API level
|
|
|
|
parse_prop_file("/system/build.prop", [](auto key, auto val) -> bool {
|
|
|
|
if (key == "ro.build.version.sdk") {
|
|
|
|
SDK_INT = parse_int(val);
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
return true;
|
|
|
|
});
|
|
|
|
if (SDK_INT < 0) {
|
|
|
|
// In case some devices do not store this info in build.prop, fallback to getprop
|
|
|
|
auto sdk = getprop("ro.build.version.sdk");
|
|
|
|
if (!sdk.empty()) {
|
|
|
|
SDK_INT = parse_int(sdk);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
LOGI("* Device API level: %d\n", SDK_INT);
|
|
|
|
|
|
|
|
restore_tmpcon();
|
|
|
|
|
|
|
|
// SAR cleanups
|
|
|
|
auto mount_list = MAGISKTMP + "/" ROOTMNT;
|
|
|
|
if (access(mount_list.data(), F_OK) == 0) {
|
|
|
|
file_readline(true, mount_list.data(), [](string_view line) -> bool {
|
|
|
|
umount2(line.data(), MNT_DETACH);
|
|
|
|
return true;
|
|
|
|
});
|
|
|
|
}
|
|
|
|
unlink("/dev/.se");
|
|
|
|
|
|
|
|
// Load config status
|
|
|
|
auto config = MAGISKTMP + "/" INTLROOT "/config";
|
|
|
|
parse_prop_file(config.data(), [](auto key, auto val) -> bool {
|
|
|
|
if (key == "RECOVERYMODE" && val == "true")
|
|
|
|
RECOVERY_MODE = true;
|
|
|
|
return true;
|
|
|
|
});
|
|
|
|
|
|
|
|
struct sockaddr_un sun;
|
|
|
|
socklen_t len = setup_sockaddr(&sun, MAIN_SOCKET);
|
|
|
|
fd = xsocket(AF_LOCAL, SOCK_STREAM | SOCK_CLOEXEC, 0);
|
|
|
|
if (xbind(fd, (struct sockaddr*) &sun, len))
|
|
|
|
exit(1);
|
|
|
|
xlisten(fd, 10);
|
|
|
|
|
|
|
|
// Loop forever to listen for requests
|
|
|
|
for (;;) {
|
|
|
|
int client = xaccept4(fd, nullptr, nullptr, SOCK_CLOEXEC);
|
|
|
|
handle_request(client);
|
|
|
|
}
|
2017-04-07 23:37:43 +00:00
|
|
|
}
|
|
|
|
|
2019-03-04 21:45:18 +00:00
|
|
|
int connect_daemon(bool create) {
|
2021-03-06 21:55:30 +00:00
|
|
|
sockaddr_un sun;
|
2020-12-31 06:11:24 +00:00
|
|
|
socklen_t len = setup_sockaddr(&sun, MAIN_SOCKET);
|
2021-03-09 10:40:12 +00:00
|
|
|
int fd = xsocket(AF_UNIX, SOCK_STREAM | SOCK_CLOEXEC, 0);
|
2020-12-31 06:11:24 +00:00
|
|
|
if (connect(fd, (struct sockaddr*) &sun, len)) {
|
|
|
|
if (!create || getuid() != UID_ROOT || getgid() != UID_ROOT) {
|
|
|
|
LOGE("No daemon is currently running!\n");
|
|
|
|
exit(1);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (fork_dont_care() == 0) {
|
|
|
|
close(fd);
|
2021-02-27 15:40:55 +00:00
|
|
|
daemon_entry();
|
2020-12-31 06:11:24 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
while (connect(fd, (struct sockaddr*) &sun, len))
|
|
|
|
usleep(10000);
|
|
|
|
}
|
|
|
|
return fd;
|
2017-04-07 23:37:43 +00:00
|
|
|
}
|
2021-03-06 21:55:30 +00:00
|
|
|
|
2021-03-09 10:40:12 +00:00
|
|
|
struct log_meta {
|
|
|
|
int prio;
|
|
|
|
int len;
|
|
|
|
int pid;
|
|
|
|
int tid;
|
2021-03-06 21:55:30 +00:00
|
|
|
};
|
|
|
|
|
2021-03-09 10:40:12 +00:00
|
|
|
static atomic<int> log_sockfd = -1;
|
2021-03-06 21:55:30 +00:00
|
|
|
|
|
|
|
void setup_logfile(bool reset) {
|
2021-03-09 10:40:12 +00:00
|
|
|
if (log_sockfd < 0)
|
2021-03-06 21:55:30 +00:00
|
|
|
return;
|
|
|
|
|
2021-03-09 10:40:12 +00:00
|
|
|
msghdr msg{};
|
|
|
|
iovec iov{};
|
|
|
|
msg.msg_iov = &iov;
|
|
|
|
msg.msg_iovlen = 1;
|
2021-03-06 21:55:30 +00:00
|
|
|
|
2021-03-09 10:40:12 +00:00
|
|
|
log_meta meta = {
|
|
|
|
.prio = -1,
|
|
|
|
.len = reset
|
|
|
|
};
|
2021-03-06 21:55:30 +00:00
|
|
|
|
2021-03-09 10:40:12 +00:00
|
|
|
iov.iov_base = &meta;
|
|
|
|
iov.iov_len = sizeof(meta);
|
|
|
|
sendmsg(log_sockfd, &msg, MSG_NOSIGNAL);
|
2021-03-06 21:55:30 +00:00
|
|
|
}
|
|
|
|
|
2021-03-09 10:40:12 +00:00
|
|
|
static void logfile_writer(int sockfd) {
|
|
|
|
run_finally close_socket([=] {
|
|
|
|
// Close up all logging sockets when thread dies
|
|
|
|
close(sockfd);
|
|
|
|
close(log_sockfd.exchange(-1));
|
|
|
|
});
|
|
|
|
|
|
|
|
char *log_buf;
|
|
|
|
size_t buf_len;
|
2021-03-14 00:17:28 +00:00
|
|
|
stream *log_strm = new byte_stream(log_buf, buf_len);
|
2021-03-09 10:40:12 +00:00
|
|
|
|
|
|
|
msghdr msg{};
|
|
|
|
iovec iov{};
|
|
|
|
msg.msg_iov = &iov;
|
|
|
|
msg.msg_iovlen = 1;
|
2021-03-06 21:55:30 +00:00
|
|
|
|
2021-03-09 10:40:12 +00:00
|
|
|
log_meta meta{};
|
|
|
|
char buf[4096];
|
2021-03-06 21:55:30 +00:00
|
|
|
|
2021-03-09 10:40:12 +00:00
|
|
|
for (;;) {
|
|
|
|
// Read meta data
|
|
|
|
iov.iov_base = &meta;
|
|
|
|
iov.iov_len = sizeof(meta);
|
|
|
|
if (recvmsg(sockfd, &msg, 0) <= 0)
|
|
|
|
return;
|
|
|
|
|
|
|
|
if (meta.prio < 0 && buf_len >= 0) {
|
|
|
|
run_finally free_buf([&] {
|
|
|
|
free(log_buf);
|
|
|
|
log_buf = nullptr;
|
|
|
|
buf_len = -1;
|
|
|
|
});
|
|
|
|
|
|
|
|
if (meta.len)
|
|
|
|
rename(LOGFILE, LOGFILE ".bak");
|
|
|
|
|
|
|
|
int fd = open(LOGFILE, O_WRONLY | O_APPEND | O_CREAT | O_CLOEXEC, 0644);
|
|
|
|
if (fd < 0)
|
|
|
|
return;
|
|
|
|
if (log_buf)
|
|
|
|
write(fd, log_buf, buf_len);
|
2021-03-14 00:17:28 +00:00
|
|
|
|
|
|
|
delete log_strm;
|
|
|
|
log_strm = new fd_stream(fd);
|
2021-03-09 10:40:12 +00:00
|
|
|
continue;
|
|
|
|
}
|
2021-03-06 21:55:30 +00:00
|
|
|
|
2021-03-09 10:40:12 +00:00
|
|
|
timeval tv;
|
|
|
|
tm tm;
|
|
|
|
gettimeofday(&tv, nullptr);
|
|
|
|
localtime_r(&tv.tv_sec, &tm);
|
|
|
|
|
|
|
|
// Format detailed info
|
|
|
|
char type;
|
|
|
|
switch (meta.prio) {
|
|
|
|
case ANDROID_LOG_DEBUG:
|
|
|
|
type = 'D';
|
|
|
|
break;
|
|
|
|
case ANDROID_LOG_INFO:
|
|
|
|
type = 'I';
|
|
|
|
break;
|
|
|
|
case ANDROID_LOG_WARN:
|
|
|
|
type = 'W';
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
type = 'E';
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
size_t off = strftime(buf, sizeof(buf), "%m-%d %T", &tm);
|
|
|
|
int ms = tv.tv_usec / 1000;
|
|
|
|
off += snprintf(buf + off, sizeof(buf) - off,
|
|
|
|
".%03d %5d %5d %c : ", ms, meta.pid, meta.tid, type);
|
|
|
|
|
|
|
|
// Read log msg
|
|
|
|
iov.iov_base = buf + off;
|
|
|
|
iov.iov_len = meta.len;
|
|
|
|
if (recvmsg(sockfd, &msg, 0) <= 0)
|
|
|
|
return;
|
2021-03-14 00:17:28 +00:00
|
|
|
log_strm->write(buf, off + meta.len);
|
2021-03-09 10:40:12 +00:00
|
|
|
}
|
|
|
|
}
|
2021-03-06 21:55:30 +00:00
|
|
|
|
2021-03-09 10:40:12 +00:00
|
|
|
static int magisk_log(int prio, const char *fmt, va_list ap) {
|
2021-03-14 00:17:28 +00:00
|
|
|
char buf[4000];
|
2021-03-09 10:40:12 +00:00
|
|
|
int len = vsnprintf(buf, sizeof(buf), fmt, ap) + 1;
|
|
|
|
|
|
|
|
if (log_sockfd >= 0) {
|
|
|
|
log_meta meta = {
|
|
|
|
.prio = prio,
|
|
|
|
.len = len,
|
|
|
|
.pid = getpid(),
|
|
|
|
.tid = gettid()
|
|
|
|
};
|
|
|
|
|
|
|
|
msghdr msg{};
|
|
|
|
iovec iov[2];
|
|
|
|
msg.msg_iov = iov;
|
|
|
|
msg.msg_iovlen = 2;
|
|
|
|
|
|
|
|
iov[0].iov_base = &meta;
|
|
|
|
iov[0].iov_len = sizeof(meta);
|
|
|
|
iov[1].iov_base = buf;
|
|
|
|
iov[1].iov_len = len;
|
|
|
|
|
|
|
|
if (sendmsg(log_sockfd, &msg, MSG_NOSIGNAL) < 0) {
|
|
|
|
// Stop trying to write to file
|
|
|
|
close(log_sockfd.exchange(-1));
|
|
|
|
}
|
2021-03-06 21:55:30 +00:00
|
|
|
}
|
2021-03-09 10:40:12 +00:00
|
|
|
__android_log_write(prio, "Magisk", buf);
|
|
|
|
|
|
|
|
return len - 1;
|
2021-03-06 21:55:30 +00:00
|
|
|
}
|
|
|
|
|
2021-03-14 00:34:41 +00:00
|
|
|
static void start_log_daemon() {
|
2021-03-09 10:40:12 +00:00
|
|
|
int fds[2];
|
|
|
|
if (socketpair(AF_UNIX, SOCK_STREAM | SOCK_CLOEXEC, 0, fds) == 0) {
|
|
|
|
log_sockfd = fds[0];
|
|
|
|
new_daemon_thread([=] { logfile_writer(fds[1]); });
|
2021-03-06 21:55:30 +00:00
|
|
|
}
|
2021-03-14 00:34:41 +00:00
|
|
|
}
|
2021-03-06 21:55:30 +00:00
|
|
|
|
2021-03-14 00:34:41 +00:00
|
|
|
#define mlog(prio) [](auto fmt, auto ap){ return magisk_log(ANDROID_LOG_##prio, fmt, ap); }
|
|
|
|
static void magisk_logging() {
|
2021-03-06 21:55:30 +00:00
|
|
|
log_cb.d = mlog(DEBUG);
|
|
|
|
log_cb.i = mlog(INFO);
|
|
|
|
log_cb.w = mlog(WARN);
|
|
|
|
log_cb.e = mlog(ERROR);
|
|
|
|
log_cb.ex = nop_ex;
|
|
|
|
}
|