Magisk/native/jni/core/daemon.cpp

299 lines
7.3 KiB
C++
Raw Normal View History

2021-01-11 10:19:10 +00:00
#include <csignal>
2020-04-12 12:34:56 +00:00
#include <libgen.h>
2017-04-07 23:37:43 +00:00
#include <sys/un.h>
2017-11-27 20:43:46 +00:00
#include <sys/mount.h>
2017-04-07 23:37:43 +00:00
2020-03-09 08:50:30 +00:00
#include <magisk.hpp>
#include <utils.hpp>
#include <daemon.hpp>
#include <selinux.hpp>
#include <db.hpp>
#include <resetprop.hpp>
#include <flags.hpp>
2021-01-11 10:19:10 +00:00
#include "core.hpp"
2020-04-12 12:34:56 +00:00
using namespace std;
2019-01-20 22:52:19 +00:00
int SDK_INT = -1;
2020-04-12 12:34:56 +00:00
string MAGISKTMP;
2021-01-11 10:19:10 +00:00
bool RECOVERY_MODE = false;
int DAEMON_STATE = STATE_NONE;
2020-05-18 12:18:49 +00:00
static struct stat self_st;
2019-01-20 22:52:19 +00:00
static bool verify_client(pid_t pid) {
// Verify caller is the same as server
char path[32];
sprintf(path, "/proc/%d/exe", pid);
struct stat st;
return !(stat(path, &st) || st.st_dev != self_st.st_dev || st.st_ino != self_st.st_ino);
2020-05-18 12:18:49 +00:00
}
static bool check_zygote(pid_t pid) {
char buf[32];
sprintf(buf, "/proc/%d/attr/current", pid);
2021-08-12 05:57:08 +00:00
if (auto fp = open_file(buf, "r")) {
fscanf(fp.get(), "%s", buf);
return buf == "u:r:zygote:s0"sv;
} else {
return false;
2021-08-12 05:57:08 +00:00
}
}
2021-08-12 05:57:08 +00:00
static void handle_request_async(int client, int code, ucred cred) {
switch (code) {
case MAGISKHIDE:
magiskhide_handler(client, &cred);
break;
case SUPERUSER:
su_daemon_handler(client, &cred);
break;
case POST_FS_DATA:
post_fs_data(client);
break;
case LATE_START:
late_start(client);
break;
case BOOT_COMPLETE:
boot_complete(client);
break;
case SQLITE_CMD:
exec_sql(client);
break;
case REMOVE_MODULES:
remove_modules();
write_int(client, 0);
close(client);
reboot();
break;
2021-08-18 10:44:32 +00:00
case ZYGISK_REQUEST:
zygisk_handler(client, &cred);
break;
default:
close(client);
break;
}
2018-10-13 01:46:09 +00:00
}
2021-08-12 05:57:08 +00:00
static void handle_request_sync(int client, int code) {
switch (code) {
case CHECK_VERSION:
write_string(client, MAGISK_VERSION ":MAGISK");
break;
case CHECK_VERSION_CODE:
write_int(client, MAGISK_VER_CODE);
break;
case GET_PATH:
write_string(client, MAGISKTMP.data());
break;
case START_DAEMON:
setup_logfile(true);
break;
2021-08-26 10:09:56 +00:00
case STOP_DAEMON:
magiskhide_handler(-1, nullptr);
write_int(client, 0);
// Terminate the daemon!
exit(0);
2021-08-12 05:57:08 +00:00
}
}
2020-05-18 12:18:49 +00:00
static void handle_request(int client) {
2021-08-12 05:57:08 +00:00
int code;
// Verify client credentials
ucred cred;
get_client_cred(client, &cred);
2021-08-12 10:26:54 +00:00
bool is_root = cred.uid == UID_ROOT;
bool is_client = verify_client(cred.pid);
2021-08-12 05:57:08 +00:00
bool is_zygote = !is_client && check_zygote(cred.pid);
if (!is_root && !is_zygote && !is_client)
2021-08-12 05:57:08 +00:00
goto done;
2021-08-12 05:57:08 +00:00
code = read_int(client);
if (code < 0 || (code & DAEMON_CODE_MASK) >= DAEMON_CODE_END)
goto done;
// Check client permissions
2021-08-12 05:57:08 +00:00
switch (code) {
case POST_FS_DATA:
case LATE_START:
case BOOT_COMPLETE:
case SQLITE_CMD:
case GET_PATH:
2021-08-18 10:44:32 +00:00
case MAGISKHIDE:
2021-08-26 10:09:56 +00:00
case STOP_DAEMON:
if (!is_root) {
write_int(client, ROOT_REQUIRED);
2021-08-12 05:57:08 +00:00
goto done;
}
break;
case REMOVE_MODULES:
2021-08-12 05:57:08 +00:00
if (!is_root && cred.uid != UID_SHELL) {
write_int(client, 1);
2021-08-12 05:57:08 +00:00
goto done;
}
break;
2021-08-18 10:44:32 +00:00
case ZYGISK_REQUEST:
if (!is_zygote) {
write_int(client, DAEMON_ERROR);
2021-08-12 05:57:08 +00:00
goto done;
}
break;
}
2021-08-12 05:57:08 +00:00
if (code & SYNC_FLAG) {
handle_request_sync(client, code);
goto done;
}
2021-08-24 09:39:54 +00:00
// Handle complex requests in another thread
exec_task([=] { handle_request_async(client, code, cred); });
return;
2020-05-18 12:18:49 +00:00
2021-08-12 05:57:08 +00:00
done:
close(client);
2017-04-07 23:37:43 +00:00
}
static int switch_cgroup(const char *cgroup, int pid) {
char buf[32];
snprintf(buf, sizeof(buf), "%s/cgroup.procs", cgroup);
int fd = open(buf, O_WRONLY | O_APPEND | O_CLOEXEC);
if (fd == -1)
return -1;
snprintf(buf, sizeof(buf), "%d\n", pid);
if (xwrite(fd, buf, strlen(buf)) == -1) {
close(fd);
return -1;
}
close(fd);
return 0;
}
[[noreturn]] static void daemon_entry() {
magisk_logging();
// Block all signals
sigset_t block_set;
sigfillset(&block_set);
pthread_sigmask(SIG_SETMASK, &block_set, nullptr);
// Change process name
set_nice_name("magiskd");
int fd = xopen("/dev/null", O_WRONLY);
xdup2(fd, STDOUT_FILENO);
xdup2(fd, STDERR_FILENO);
if (fd > STDERR_FILENO)
close(fd);
fd = xopen("/dev/zero", O_RDONLY);
xdup2(fd, STDIN_FILENO);
if (fd > STDERR_FILENO)
close(fd);
setsid();
setcon("u:r:" SEPOL_PROC_DOMAIN ":s0");
start_log_daemon();
LOGI(NAME_WITH_VER(Magisk) " daemon started\n");
// Escape from cgroup
int pid = getpid();
if (switch_cgroup("/acct", pid) && switch_cgroup("/sys/fs/cgroup", pid))
LOGW("Can't switch cgroup\n");
// Get self stat
char buf[64];
xreadlink("/proc/self/exe", buf, sizeof(buf));
MAGISKTMP = dirname(buf);
xstat("/proc/self/exe", &self_st);
// Get API level
parse_prop_file("/system/build.prop", [](auto key, auto val) -> bool {
if (key == "ro.build.version.sdk") {
SDK_INT = parse_int(val);
return false;
}
return true;
});
if (SDK_INT < 0) {
// In case some devices do not store this info in build.prop, fallback to getprop
auto sdk = getprop("ro.build.version.sdk");
if (!sdk.empty()) {
SDK_INT = parse_int(sdk);
}
}
LOGI("* Device API level: %d\n", SDK_INT);
restore_tmpcon();
// SAR cleanups
auto mount_list = MAGISKTMP + "/" ROOTMNT;
if (access(mount_list.data(), F_OK) == 0) {
file_readline(true, mount_list.data(), [](string_view line) -> bool {
umount2(line.data(), MNT_DETACH);
return true;
});
}
unlink("/dev/.se");
// Load config status
auto config = MAGISKTMP + "/" INTLROOT "/config";
parse_prop_file(config.data(), [](auto key, auto val) -> bool {
if (key == "RECOVERYMODE" && val == "true")
RECOVERY_MODE = true;
return true;
});
// Use isolated devpts if kernel support
if (access("/dev/pts/ptmx", F_OK) == 0) {
auto pts = MAGISKTMP + "/" SHELLPTS;
xmkdirs(pts.data(), 0755);
xmount("devpts", pts.data(), "devpts",
MS_NOSUID | MS_NOEXEC, "newinstance");
auto ptmx = pts + "/ptmx";
if (access(ptmx.data(), F_OK)) {
xumount(pts.data());
rmdir(pts.data());
}
}
2021-08-12 10:26:54 +00:00
sockaddr_un sun;
socklen_t len = setup_sockaddr(&sun, MAIN_SOCKET);
fd = xsocket(AF_LOCAL, SOCK_STREAM | SOCK_CLOEXEC, 0);
2021-08-12 10:26:54 +00:00
if (xbind(fd, (sockaddr*) &sun, len))
exit(1);
xlisten(fd, 10);
// Loop forever to listen for requests
for (;;) {
int client = xaccept4(fd, nullptr, nullptr, SOCK_CLOEXEC);
handle_request(client);
}
2017-04-07 23:37:43 +00:00
}
2019-03-04 21:45:18 +00:00
int connect_daemon(bool create) {
sockaddr_un sun;
socklen_t len = setup_sockaddr(&sun, MAIN_SOCKET);
int fd = xsocket(AF_UNIX, SOCK_STREAM | SOCK_CLOEXEC, 0);
2021-08-12 10:26:54 +00:00
if (connect(fd, (sockaddr*) &sun, len)) {
if (!create || getuid() != UID_ROOT) {
LOGE("No daemon is currently running!\n");
2021-08-22 09:11:48 +00:00
return -1;
}
if (fork_dont_care() == 0) {
close(fd);
daemon_entry();
}
while (connect(fd, (struct sockaddr*) &sun, len))
usleep(10000);
}
return fd;
2017-04-07 23:37:43 +00:00
}