#include #include #include #include #include #include #include #include #include #include #include #include "core.hpp" using namespace std; int SDK_INT = -1; string MAGISKTMP; bool RECOVERY_MODE = false; int DAEMON_STATE = STATE_NONE; static struct stat self_st; static map *poll_map; static vector *poll_fds; static int poll_ctrl; enum { POLL_CTRL_NEW, POLL_CTRL_RM, }; void register_poll(const pollfd *pfd, poll_callback callback) { if (gettid() == getpid()) { // On main thread, directly modify poll_map->try_emplace(pfd->fd, callback); poll_fds->emplace_back(*pfd); } else { // Send it to poll_ctrl write_int(poll_ctrl, POLL_CTRL_NEW); xwrite(poll_ctrl, pfd, sizeof(*pfd)); xwrite(poll_ctrl, &callback, sizeof(callback)); } } void unregister_poll(int fd, bool auto_close) { if (fd < 0) return; if (gettid() == getpid()) { // On main thread, directly modify poll_map->erase(fd); for (auto &poll_fd : *poll_fds) { if (poll_fd.fd == fd) { if (auto_close) { close(poll_fd.fd); } // Cannot modify while iterating, invalidate it instead // It will be removed in the next poll loop poll_fd.fd = -1; break; } } } else { // Send it to poll_ctrl write_int(poll_ctrl, POLL_CTRL_RM); write_int(poll_ctrl, fd); write_int(poll_ctrl, auto_close); } } void clear_poll() { if (poll_fds) { for (auto &poll_fd : *poll_fds) { close(poll_fd.fd); } } delete poll_fds; delete poll_map; poll_fds = nullptr; poll_map = nullptr; } static void poll_ctrl_handler(pollfd *pfd) { int code = read_int(pfd->fd); switch (code) { case POLL_CTRL_NEW: { pollfd new_fd; poll_callback cb; xxread(pfd->fd, &new_fd, sizeof(new_fd)); xxread(pfd->fd, &cb, sizeof(cb)); register_poll(&new_fd, cb); break; } case POLL_CTRL_RM: { int fd = read_int(pfd->fd); bool auto_close = read_int(pfd->fd); unregister_poll(fd, auto_close); break; } } } [[noreturn]] static void poll_loop() { // Register poll_ctrl int pipefd[2]; xpipe2(pipefd, O_CLOEXEC); poll_ctrl = pipefd[1]; pollfd poll_ctrl_pfd = { pipefd[0], POLLIN, 0 }; register_poll(&poll_ctrl_pfd, poll_ctrl_handler); for (;;) { if (poll(poll_fds->data(), poll_fds->size(), -1) <= 0) continue; // MUST iterate with index because any poll_callback could add new elements to poll_fds for (int i = 0; i < poll_fds->size();) { auto &pfd = (*poll_fds)[i]; if (pfd.revents) { if (pfd.revents & POLLERR || pfd.revents & POLLNVAL) { poll_map->erase(pfd.fd); poll_fds->erase(poll_fds->begin() + i); continue; } if (auto it = poll_map->find(pfd.fd); it != poll_map->end()) { it->second(&pfd); } } ++i; } } } static void handle_request_async(int client, int code, const sock_cred &cred) { switch (code) { case MainRequest::DENYLIST: denylist_handler(client, &cred); break; case MainRequest::SUPERUSER: su_daemon_handler(client, &cred); break; case MainRequest::POST_FS_DATA: post_fs_data(client); break; case MainRequest::LATE_START: late_start(client); break; case MainRequest::BOOT_COMPLETE: boot_complete(client); break; case MainRequest::SQLITE_CMD: exec_sql(client); break; case MainRequest::REMOVE_MODULES: remove_modules(); write_int(client, 0); close(client); reboot(); break; case MainRequest::ZYGISK: case MainRequest::ZYGISK_PASSTHROUGH: zygisk_handler(client, &cred); break; default: __builtin_unreachable(); } } static void handle_request_sync(int client, int code) { switch (code) { case MainRequest::CHECK_VERSION: write_string(client, MAGISK_VERSION ":MAGISK"); break; case MainRequest::CHECK_VERSION_CODE: write_int(client, MAGISK_VER_CODE); break; case MainRequest::GET_PATH: write_string(client, MAGISKTMP.data()); break; case MainRequest::START_DAEMON: setup_logfile(true); break; case MainRequest::STOP_DAEMON: denylist_handler(-1, nullptr); write_int(client, 0); // Terminate the daemon! exit(0); default: __builtin_unreachable(); } } static bool is_client(pid_t pid) { // Verify caller is the same as server char path[32]; sprintf(path, "/proc/%d/exe", pid); struct stat st{}; return !(stat(path, &st) || st.st_dev != self_st.st_dev || st.st_ino != self_st.st_ino); } static void handle_request(pollfd *pfd) { int client = xaccept4(pfd->fd, nullptr, nullptr, SOCK_CLOEXEC); // Verify client credentials sock_cred cred; bool is_root; bool is_zygote; int code; if (!get_client_cred(client, &cred)) { // Client died goto done; } is_root = cred.uid == UID_ROOT; is_zygote = cred.context == "u:r:zygote:s0"; if (!is_root && !is_zygote && !is_client(cred.pid)) { // Unsupported client state write_int(client, MainResponse::ACCESS_DENIED); goto done; } code = read_int(client); if (code < 0 || code >= MainRequest::END || code == MainRequest::_SYNC_BARRIER_) { // Unknown request code goto done; } // Check client permissions switch (code) { case MainRequest::POST_FS_DATA: case MainRequest::LATE_START: case MainRequest::BOOT_COMPLETE: case MainRequest::SQLITE_CMD: case MainRequest::GET_PATH: case MainRequest::DENYLIST: case MainRequest::STOP_DAEMON: if (!is_root) { write_int(client, MainResponse::ROOT_REQUIRED); goto done; } break; case MainRequest::REMOVE_MODULES: if (!is_root && cred.uid != UID_SHELL) { write_int(client, MainResponse::ACCESS_DENIED); goto done; } break; case MainRequest::ZYGISK: if (!is_zygote) { // Invalid client context write_int(client, MainResponse::ACCESS_DENIED); goto done; } break; default: break; } write_int(client, MainResponse::OK); if (code < MainRequest::_SYNC_BARRIER_) { handle_request_sync(client, code); goto done; } // Handle async requests in another thread exec_task([=] { handle_request_async(client, code, cred); }); return; done: close(client); } static void switch_cgroup(const char *cgroup, int pid) { char buf[32]; snprintf(buf, sizeof(buf), "%s/cgroup.procs", cgroup); if (access(buf, F_OK) != 0) return; int fd = xopen(buf, O_WRONLY | O_APPEND | O_CLOEXEC); if (fd == -1) return; snprintf(buf, sizeof(buf), "%d\n", pid); if (xwrite(fd, buf, strlen(buf)) == -1) { close(fd); return; } close(fd); } static void daemon_entry() { magisk_logging(); // Block all signals sigset_t block_set; sigfillset(&block_set); pthread_sigmask(SIG_SETMASK, &block_set, nullptr); // Change process name set_nice_name("magiskd"); int fd = xopen("/dev/null", O_WRONLY); xdup2(fd, STDOUT_FILENO); xdup2(fd, STDERR_FILENO); if (fd > STDERR_FILENO) close(fd); fd = xopen("/dev/zero", O_RDONLY); xdup2(fd, STDIN_FILENO); if (fd > STDERR_FILENO) close(fd); setsid(); setcon("u:r:" SEPOL_PROC_DOMAIN ":s0"); start_log_daemon(); LOGI(NAME_WITH_VER(Magisk) " daemon started\n"); // Escape from cgroup int pid = getpid(); switch_cgroup("/acct", pid); switch_cgroup("/dev/cg2_bpf", pid); switch_cgroup("/sys/fs/cgroup", pid); if (getprop("ro.config.per_app_memcg") != "false") { switch_cgroup("/dev/memcg/apps", pid); } // Get self stat char buf[64]; xreadlink("/proc/self/exe", buf, sizeof(buf)); MAGISKTMP = dirname(buf); xstat("/proc/self/exe", &self_st); // Get API level parse_prop_file("/system/build.prop", [](auto key, auto val) -> bool { if (key == "ro.build.version.sdk") { SDK_INT = parse_int(val); return false; } return true; }); if (SDK_INT < 0) { // In case some devices do not store this info in build.prop, fallback to getprop auto sdk = getprop("ro.build.version.sdk"); if (!sdk.empty()) { SDK_INT = parse_int(sdk); } } LOGI("* Device API level: %d\n", SDK_INT); restore_tmpcon(); // SAR cleanups auto mount_list = MAGISKTMP + "/" ROOTMNT; if (access(mount_list.data(), F_OK) == 0) { file_readline(true, mount_list.data(), [](string_view line) -> bool { umount2(line.data(), MNT_DETACH); return true; }); } unlink("/dev/.se"); unlink(mount_list.data()); // Load config status auto config = MAGISKTMP + "/" INTLROOT "/config"; parse_prop_file(config.data(), [](auto key, auto val) -> bool { if (key == "RECOVERYMODE" && val == "true") RECOVERY_MODE = true; return true; }); // Use isolated devpts if kernel support if (access("/dev/pts/ptmx", F_OK) == 0) { auto pts = MAGISKTMP + "/" SHELLPTS; if (access(pts.data(), F_OK)) { xmkdirs(pts.data(), 0755); xmount("devpts", pts.data(), "devpts", MS_NOSUID | MS_NOEXEC, "newinstance"); auto ptmx = pts + "/ptmx"; if (access(ptmx.data(), F_OK)) { xumount(pts.data()); rmdir(pts.data()); } } } sockaddr_un sun{}; socklen_t len = setup_sockaddr(&sun, MAIN_SOCKET); fd = xsocket(AF_LOCAL, SOCK_STREAM | SOCK_CLOEXEC, 0); if (xbind(fd, (sockaddr *) &sun, len)) exit(1); xlisten(fd, 10); default_new(poll_map); default_new(poll_fds); // Register handler for main socket pollfd main_socket_pfd = { fd, POLLIN, 0 }; register_poll(&main_socket_pfd, handle_request); // Loop forever to listen for requests poll_loop(); } int connect_daemon(int req, bool create) { sockaddr_un sun{}; socklen_t len = setup_sockaddr(&sun, MAIN_SOCKET); int fd = xsocket(AF_UNIX, SOCK_STREAM | SOCK_CLOEXEC, 0); if (connect(fd, (sockaddr *) &sun, len)) { if (!create || getuid() != UID_ROOT) { LOGE("No daemon is currently running!\n"); close(fd); return -1; } if (fork_dont_care() == 0) { close(fd); daemon_entry(); } while (connect(fd, (struct sockaddr *) &sun, len)) usleep(10000); } write_int(fd, req); int res = read_int(fd); if (res < MainResponse::ERROR || res >= MainResponse::END) res = MainResponse::ERROR; switch (res) { case MainResponse::OK: break; case MainResponse::ERROR: LOGE("Daemon error\n"); exit(-1); case MainResponse::ROOT_REQUIRED: LOGE("Root is required for this operation\n"); exit(-1); case MainResponse::ACCESS_DENIED: LOGE("Access denied\n"); exit(-1); default: __builtin_unreachable(); } return fd; }