Magisk/jni/daemon/daemon.c

183 lines
4.2 KiB
C
Raw Normal View History

2017-04-07 23:37:43 +00:00
/* daemon.c - Magisk Daemon
*
* Start the daemon and wait for requests
* Connect the daemon and send requests through sockets
*/
#include <stdlib.h>
#include <unistd.h>
#include <fcntl.h>
#include <string.h>
#include <errno.h>
#include <pthread.h>
2017-04-07 23:37:43 +00:00
#include <sys/un.h>
#include <sys/types.h>
#include <sys/socket.h>
#include <sys/stat.h>
2017-04-15 11:02:07 +00:00
#include <sys/mount.h>
2017-04-28 13:48:38 +00:00
#include <selinux/selinux.h>
2017-04-07 23:37:43 +00:00
#include "magisk.h"
#include "utils.h"
#include "daemon.h"
#include "magiskpolicy.h"
pthread_t sepol_patch;
2017-04-07 23:37:43 +00:00
2017-04-21 16:54:08 +00:00
static void *request_handler(void *args) {
2017-04-21 22:33:40 +00:00
// Setup the default error handler for threads
err_handler = exit_thread;
2017-04-21 16:54:08 +00:00
int client = *((int *) args);
free(args);
client_request req = read_int(client);
switch (req) {
case LAUNCH_MAGISKHIDE:
launch_magiskhide(client);
break;
case STOP_MAGISKHIDE:
stop_magiskhide(client);
break;
case ADD_HIDELIST:
2017-04-20 14:45:56 +00:00
add_hide_list(client);
break;
case RM_HIDELIST:
2017-04-20 14:45:56 +00:00
rm_hide_list(client);
break;
case SUPERUSER:
2017-04-14 19:23:09 +00:00
su_daemon_receiver(client);
break;
case CHECK_VERSION:
2017-04-18 13:31:12 +00:00
write_string(client, MAGISK_VER_STR);
2017-04-14 19:23:09 +00:00
close(client);
break;
case CHECK_VERSION_CODE:
2017-04-18 13:31:12 +00:00
write_int(client, MAGISK_VER_CODE);
2017-04-14 19:23:09 +00:00
close(client);
break;
2017-04-15 11:02:07 +00:00
case POST_FS:
post_fs(client);
2017-04-15 11:02:07 +00:00
break;
case POST_FS_DATA:
post_fs_data(client);
2017-04-15 11:02:07 +00:00
break;
case LATE_START:
late_start(client);
2017-04-15 11:02:07 +00:00
break;
case TEST:
2017-04-30 17:58:52 +00:00
// test(client);
break;
}
2017-04-21 16:54:08 +00:00
return NULL;
2017-04-07 23:37:43 +00:00
}
/* Setup the address and return socket fd */
static int setup_socket(struct sockaddr_un *sun) {
int fd = xsocket(AF_LOCAL, SOCK_STREAM, 0);
if (fcntl(fd, F_SETFD, FD_CLOEXEC)) {
2017-04-14 19:23:09 +00:00
PLOGE("fcntl FD_CLOEXEC");
2017-04-07 23:37:43 +00:00
}
memset(sun, 0, sizeof(*sun));
sun->sun_family = AF_LOCAL;
memcpy(sun->sun_path, REQUESTOR_DAEMON_PATH, REQUESTOR_DAEMON_PATH_LEN);
return fd;
}
static void *large_sepol_patch(void *args) {
LOGD("sepol: Starting large patch thread\n");
// Patch su to everything
sepol_allow("su", ALL, ALL, ALL);
2017-04-30 17:58:52 +00:00
dump_policydb(SELINUX_LOAD);
LOGD("sepol: Large patch done\n");
destroy_policydb();
return NULL;
}
2017-04-07 23:37:43 +00:00
void start_daemon() {
// Launch the daemon, create new session, set proper context
2017-04-14 19:23:09 +00:00
if (getuid() != UID_ROOT || getgid() != UID_ROOT) {
fprintf(stderr, "Starting daemon requires root: %s\n", strerror(errno));
PLOGE("start daemon");
2017-04-07 23:37:43 +00:00
}
switch (fork()) {
case -1:
PLOGE("fork");
case 0:
break;
default:
return;
}
xsetsid();
2017-04-28 13:48:38 +00:00
setcon("u:r:su:s0");
2017-04-24 13:43:30 +00:00
umask(022);
2017-04-30 17:58:52 +00:00
close(STDIN_FILENO);
close(STDOUT_FILENO);
close(STDERR_FILENO);
2017-04-07 23:37:43 +00:00
2017-04-21 16:54:08 +00:00
// Patch selinux with medium patch before we do anything
2017-04-30 17:58:52 +00:00
load_policydb(SELINUX_POLICY);
sepol_med_rules();
2017-04-30 17:58:52 +00:00
dump_policydb(SELINUX_LOAD);
2017-04-21 16:54:08 +00:00
// Continue the larger patch in another thread, we will need to join later
pthread_create(&sepol_patch, NULL, large_sepol_patch, NULL);
2017-04-07 23:37:43 +00:00
struct sockaddr_un sun;
int fd = setup_socket(&sun);
xbind(fd, (struct sockaddr*) &sun, sizeof(sun));
xlisten(fd, 10);
// Change process name
strcpy(argv0, "magisk_daemon");
// The root daemon should not do anything if an error occurs
2017-04-14 19:23:09 +00:00
// It should stay intact under any circumstances
err_handler = do_nothing;
// Start log monitor
monitor_logs();
2017-04-07 23:37:43 +00:00
2017-04-20 14:45:56 +00:00
LOGI("Magisk v" xstr(MAGISK_VERSION) " daemon started\n");
2017-04-15 10:33:16 +00:00
// Unlock all blocks for rw
unlock_blocks();
2017-04-15 11:02:07 +00:00
// Setup links under /sbin
2017-04-17 08:36:49 +00:00
xmount(NULL, "/", NULL, MS_REMOUNT, NULL);
2017-04-15 11:02:07 +00:00
create_links(NULL, "/sbin");
chmod("/sbin", 0755);
2017-04-21 16:54:08 +00:00
mkdir("/magisk", 0755);
chmod("/magisk", 0755);
2017-04-17 08:36:49 +00:00
xmount(NULL, "/", NULL, MS_REMOUNT | MS_RDONLY, NULL);
2017-04-15 11:02:07 +00:00
2017-04-07 23:37:43 +00:00
// Loop forever to listen to requests
while(1) {
2017-04-21 16:54:08 +00:00
int *client = xmalloc(sizeof(int));
*client = xaccept(fd, NULL, NULL);
pthread_t thread;
xpthread_create(&thread, NULL, request_handler, client);
// Detach the thread, we will never join it
pthread_detach(thread);
2017-04-07 23:37:43 +00:00
}
}
/* Connect the daemon, and return a socketfd */
int connect_daemon() {
struct sockaddr_un sun;
int fd = setup_socket(&sun);
2017-04-17 08:36:49 +00:00
// LOGD("client: trying to connect socket\n");
2017-04-07 23:37:43 +00:00
if (connect(fd, (struct sockaddr*) &sun, sizeof(sun))) {
/* If we cannot access the daemon, we start the daemon
* since there is no clear entry point when the daemon should be started
*/
2017-04-17 08:36:49 +00:00
LOGD("client: connect fail, try launching new daemon process\n");
2017-04-07 23:37:43 +00:00
start_daemon();
do {
// Wait for 10ms
2017-04-17 08:36:49 +00:00
usleep(10);
2017-04-07 23:37:43 +00:00
} while (connect(fd, (struct sockaddr*) &sun, sizeof(sun)));
}
return fd;
}