mirror of
https://github.com/topjohnwu/Magisk.git
synced 2024-11-28 12:35:26 +00:00
449 lines
10 KiB
C
449 lines
10 KiB
C
/* su_client.c - The entrypoint for su, connect to daemon and send correct info
|
|
*/
|
|
|
|
#define _GNU_SOURCE
|
|
#include <limits.h>
|
|
#include <unistd.h>
|
|
#include <pthread.h>
|
|
#include <stdlib.h>
|
|
#include <unistd.h>
|
|
#include <fcntl.h>
|
|
#include <string.h>
|
|
#include <signal.h>
|
|
#include <sys/socket.h>
|
|
#include <sys/types.h>
|
|
#include <sys/stat.h>
|
|
#include <sys/wait.h>
|
|
|
|
#include "magisk.h"
|
|
#include "daemon.h"
|
|
#include "resetprop.h"
|
|
#include "utils.h"
|
|
#include "su.h"
|
|
#include "pts.h"
|
|
#include "list.h"
|
|
|
|
// Constants for the atty bitfield
|
|
#define ATTY_IN 1
|
|
#define ATTY_OUT 2
|
|
#define ATTY_ERR 4
|
|
|
|
#define TIMEOUT 3
|
|
|
|
static struct list_head active_list, waiting_list;
|
|
static pthread_t su_collector = 0;
|
|
static pthread_mutex_t list_lock = PTHREAD_MUTEX_INITIALIZER;
|
|
|
|
int pipefd[2];
|
|
|
|
static void sighandler(int sig) {
|
|
restore_stdin();
|
|
|
|
// Assume we'll only be called before death
|
|
// See note before sigaction() in set_stdin_raw()
|
|
//
|
|
// Now, close all standard I/O to cause the pumps
|
|
// to exit so we can continue and retrieve the exit
|
|
// code
|
|
close(STDIN_FILENO);
|
|
close(STDOUT_FILENO);
|
|
close(STDERR_FILENO);
|
|
|
|
// Put back all the default handlers
|
|
struct sigaction act;
|
|
|
|
memset(&act, 0, sizeof(act));
|
|
act.sa_handler = SIG_DFL;
|
|
for (int i = 0; quit_signals[i]; ++i) {
|
|
sigaction(quit_signals[i], &act, NULL);
|
|
}
|
|
}
|
|
|
|
static void sigpipe_handler(int sig) {
|
|
LOGD("su: Client killed unexpectedly\n");
|
|
}
|
|
|
|
static int get_multiuser_mode() {
|
|
char *prop = getprop(MULTIUSER_MODE_PROP);
|
|
if (prop) {
|
|
int ret = atoi(prop);
|
|
free(prop);
|
|
return ret;
|
|
}
|
|
return MULTIUSER_MODE_OWNER_ONLY;
|
|
}
|
|
|
|
|
|
// Maintain the lists periodically
|
|
static void *collector(void *args) {
|
|
LOGD("su: collector started\n");
|
|
struct list_head *pos, *temp;
|
|
struct su_initiator *node;
|
|
while(1) {
|
|
sleep(1);
|
|
pthread_mutex_lock(&list_lock);
|
|
list_for_each(pos, &active_list) {
|
|
node = list_entry(pos, struct su_initiator, pos);
|
|
--node->clock;
|
|
// Timeout, move to waiting list
|
|
if (node->clock == 0) {
|
|
temp = pos;
|
|
pos = pos->prev;
|
|
list_pop(temp);
|
|
list_insert_end(&waiting_list, temp);
|
|
}
|
|
}
|
|
list_for_each(pos, &waiting_list) {
|
|
node = list_entry(pos, struct su_initiator, pos);
|
|
// Nothing is using the info, remove it
|
|
if (node->count == 0) {
|
|
temp = pos;
|
|
pos = pos->prev;
|
|
list_pop(temp);
|
|
pthread_mutex_destroy(&node->lock);
|
|
free(node);
|
|
}
|
|
}
|
|
pthread_mutex_unlock(&list_lock);
|
|
}
|
|
}
|
|
|
|
void su_daemon_receiver(int client) {
|
|
LOGD("su: request from client: %d\n", client);
|
|
|
|
struct su_initiator *info = NULL, *node;
|
|
struct list_head *pos;
|
|
int new_request = 0;
|
|
|
|
pthread_mutex_lock(&list_lock);
|
|
|
|
if (!su_collector) {
|
|
init_list_head(&active_list);
|
|
init_list_head(&waiting_list);
|
|
xpthread_create(&su_collector, NULL, collector, NULL);
|
|
}
|
|
|
|
// Get client credntial
|
|
struct ucred credential;
|
|
get_client_cred(client, &credential);
|
|
|
|
// Search for existing in the active list
|
|
list_for_each(pos, &active_list) {
|
|
node = list_entry(pos, struct su_initiator, pos);
|
|
if (node->uid == credential.uid)
|
|
info = node;
|
|
}
|
|
|
|
// If no exist, create a new request
|
|
if (info == NULL) {
|
|
new_request = 1;
|
|
info = malloc(sizeof(*info));
|
|
info->uid = credential.uid;
|
|
info->policy = QUERY;
|
|
info->count = 0;
|
|
pthread_mutex_init(&info->lock, NULL);
|
|
list_insert_end(&active_list, &info->pos);
|
|
}
|
|
info->clock = TIMEOUT; /* Reset timer */
|
|
++info->count; /* Increment reference count */
|
|
|
|
pthread_mutex_unlock(&list_lock);
|
|
|
|
LOGD("su: request from uid=[%d] (#%d)\n", info->uid, info->count);
|
|
|
|
// Lock before the policy is determined
|
|
pthread_mutex_lock(&info->lock);
|
|
|
|
info->pid = credential.pid;
|
|
|
|
// Default values
|
|
struct su_context ctx = {
|
|
.info = info,
|
|
.to = {
|
|
.uid = UID_ROOT,
|
|
.login = 0,
|
|
.keepenv = 0,
|
|
.shell = DEFAULT_SHELL,
|
|
.command = NULL,
|
|
},
|
|
.user = {
|
|
.android_user_id = info->uid / 100000,
|
|
.multiuser_mode = get_multiuser_mode(),
|
|
},
|
|
.umask = 022,
|
|
.notify = new_request,
|
|
};
|
|
su_ctx = &ctx;
|
|
|
|
snprintf(su_ctx->user.database_path, PATH_MAX, "%s/%d/%s",
|
|
USER_DATA_PATH, su_ctx->user.android_user_id, REQUESTOR_DATABASE_PATH);
|
|
snprintf(su_ctx->user.base_path, PATH_MAX, "%s/%d/%s",
|
|
USER_DATA_PATH, su_ctx->user.android_user_id, REQUESTOR);
|
|
|
|
// verify if Magisk Manager is installed
|
|
struct stat st;
|
|
xstat(su_ctx->user.base_path, &st);
|
|
// odd perms on superuser data dir
|
|
if (st.st_gid != st.st_uid) {
|
|
LOGE("Bad uid/gid %d/%d for Superuser Requestor application", st.st_uid, st.st_gid);
|
|
info->policy = DENY;
|
|
}
|
|
|
|
// Not cached, do the checks
|
|
if (info->policy == QUERY) {
|
|
if (su_ctx->user.android_user_id &&
|
|
su_ctx->user.multiuser_mode == MULTIUSER_MODE_OWNER_ONLY) {
|
|
info->policy = DENY;
|
|
su_ctx->notify = 0;
|
|
}
|
|
|
|
// always allow if this is Magisk Manager
|
|
if (info->policy == QUERY && (info->uid % 100000) == (st.st_uid % 100000)) {
|
|
info->policy = ALLOW;
|
|
su_ctx->notify = 0;
|
|
}
|
|
|
|
// always allow if it's root
|
|
if (info->uid == UID_ROOT) {
|
|
info->policy = ALLOW;
|
|
su_ctx->notify = 0;
|
|
}
|
|
|
|
// If not determined, check database
|
|
if (info->policy == QUERY)
|
|
database_check(su_ctx);
|
|
|
|
// If still not determined, open a pipe and wait for results
|
|
if (info->policy == QUERY)
|
|
pipe2(pipefd, O_CLOEXEC);
|
|
}
|
|
|
|
// Fork a new process, the child process will need to setsid,
|
|
// open a pseudo-terminal if needed, and will eventually run exec
|
|
// The parent process will wait for the result and
|
|
// send the return code back to our client
|
|
int child = fork();
|
|
if (child < 0)
|
|
PLOGE("fork");
|
|
|
|
if (child) {
|
|
// Wait for results
|
|
if (info->policy == QUERY) {
|
|
xxread(pipefd[0], &info->policy, sizeof(info->policy));
|
|
close(pipefd[0]);
|
|
close(pipefd[1]);
|
|
}
|
|
|
|
// The policy is determined, unlock
|
|
pthread_mutex_unlock(&info->lock);
|
|
|
|
// Wait result
|
|
LOGD("su: wait_result waiting for %d\n", child);
|
|
int status, code;
|
|
|
|
// Handle SIGPIPE, since we don't want to crash our daemon
|
|
struct sigaction act;
|
|
memset(&act, 0, sizeof(act));
|
|
act.sa_handler = sigpipe_handler;
|
|
sigaction(SIGPIPE, &act, NULL);
|
|
|
|
if (waitpid(child, &status, 0) > 0)
|
|
code = WEXITSTATUS(status);
|
|
else
|
|
code = -1;
|
|
|
|
// Pass the return code back to the client
|
|
write(client, &code, sizeof(code)); /* Might SIGPIPE, ignored */
|
|
LOGD("su: return code to client: %d\n", code);
|
|
close(client);
|
|
|
|
// Decrement reference count
|
|
--info->count;
|
|
|
|
return;
|
|
}
|
|
|
|
LOGD("su: child process started\n");
|
|
|
|
// ack
|
|
write_int(client, 1);
|
|
|
|
// Become session leader
|
|
xsetsid();
|
|
|
|
// Let's read some info from the socket
|
|
int argc = read_int(client);
|
|
if (argc < 0 || argc > 512) {
|
|
LOGE("unable to allocate args: %d", argc);
|
|
exit2(1);
|
|
}
|
|
LOGD("su: argc=[%d]\n", argc);
|
|
|
|
char **argv = (char**) xmalloc(sizeof(char*) * (argc + 1));
|
|
argv[argc] = NULL;
|
|
for (int i = 0; i < argc; i++) {
|
|
argv[i] = read_string(client);
|
|
LOGD("su: argv[%d]=[%s]\n", i, argv[i]);
|
|
}
|
|
|
|
// Change directory to cwd
|
|
char *cwd = read_string(client);
|
|
LOGD("su: cwd=[%s]\n", cwd);
|
|
chdir(cwd);
|
|
free(cwd);
|
|
|
|
// Get pts_slave
|
|
char *pts_slave = read_string(client);
|
|
LOGD("su: pts_slave=[%s]\n", pts_slave);
|
|
|
|
// The the FDs for each of the streams
|
|
int infd = recv_fd(client);
|
|
int outfd = recv_fd(client);
|
|
int errfd = recv_fd(client);
|
|
int ptsfd = -1;
|
|
|
|
// We no longer need the access to socket in the child, close it
|
|
close(client);
|
|
|
|
if (pts_slave[0]) {
|
|
//Check pts_slave file is owned by daemon_from_uid
|
|
struct stat stbuf;
|
|
xstat(pts_slave, &stbuf);
|
|
|
|
//If caller is not root, ensure the owner of pts_slave is the caller
|
|
if(stbuf.st_uid != credential.uid && credential.uid != 0) {
|
|
LOGE("su: Wrong permission of pts_slave");
|
|
exit2(1);
|
|
}
|
|
|
|
// Opening the TTY has to occur after the
|
|
// fork() and setsid() so that it becomes
|
|
// our controlling TTY and not the daemon's
|
|
ptsfd = xopen(pts_slave, O_RDWR);
|
|
|
|
if (infd < 0) {
|
|
LOGD("su: stdin using PTY");
|
|
infd = ptsfd;
|
|
}
|
|
if (outfd < 0) {
|
|
LOGD("su: stdout using PTY");
|
|
outfd = ptsfd;
|
|
}
|
|
if (errfd < 0) {
|
|
LOGD("su: stderr using PTY");
|
|
errfd = ptsfd;
|
|
}
|
|
}
|
|
|
|
free(pts_slave);
|
|
|
|
// Swap out stdin, stdout, stderr
|
|
xdup2(infd, STDIN_FILENO);
|
|
xdup2(outfd, STDOUT_FILENO);
|
|
xdup2(errfd, STDERR_FILENO);
|
|
|
|
close(ptsfd);
|
|
|
|
mkdir(REQUESTOR_CACHE_PATH, 0770);
|
|
|
|
if (chown(REQUESTOR_CACHE_PATH, st.st_uid, st.st_gid))
|
|
PLOGE("chown (%s, %u, %u)", REQUESTOR_CACHE_PATH, st.st_uid, st.st_gid);
|
|
|
|
if (setgroups(0, NULL))
|
|
PLOGE("setgroups");
|
|
|
|
if (setegid(st.st_gid))
|
|
PLOGE("setegid (%u)", st.st_gid);
|
|
|
|
if (seteuid(st.st_uid))
|
|
PLOGE("seteuid (%u)", st.st_uid);
|
|
|
|
su_daemon_main(argc, argv);
|
|
}
|
|
|
|
/*
|
|
* Connect daemon, send argc, argv, cwd, pts slave
|
|
*/
|
|
int su_client_main(int argc, char *argv[]) {
|
|
char buffer[PATH_MAX];
|
|
int ptmx, socketfd;
|
|
|
|
// Connect to client
|
|
socketfd = connect_daemon();
|
|
|
|
// Tell the daemon we are su
|
|
write_int(socketfd, SUPERUSER);
|
|
|
|
// Number of command line arguments
|
|
write_int(socketfd, argc);
|
|
|
|
// Command line arguments
|
|
for (int i = 0; i < argc; i++) {
|
|
write_string(socketfd, argv[i]);
|
|
}
|
|
|
|
// CWD
|
|
getcwd(buffer, sizeof(buffer));
|
|
write_string(socketfd, buffer);
|
|
|
|
// Determine which one of our streams are attached to a TTY
|
|
int atty = 0;
|
|
if (isatty(STDIN_FILENO)) atty |= ATTY_IN;
|
|
if (isatty(STDOUT_FILENO)) atty |= ATTY_OUT;
|
|
if (isatty(STDERR_FILENO)) atty |= ATTY_ERR;
|
|
|
|
if (atty) {
|
|
// We need a PTY. Get one.
|
|
ptmx = pts_open(buffer, sizeof(buffer));
|
|
} else {
|
|
buffer[0] = '\0';
|
|
}
|
|
|
|
// Send the pts_slave path to the daemon
|
|
write_string(socketfd, buffer);
|
|
|
|
// Send stdin
|
|
if (atty & ATTY_IN) {
|
|
// Using PTY
|
|
send_fd(socketfd, -1);
|
|
} else {
|
|
send_fd(socketfd, STDIN_FILENO);
|
|
}
|
|
|
|
// Send stdout
|
|
if (atty & ATTY_OUT) {
|
|
// Forward SIGWINCH
|
|
watch_sigwinch_async(STDOUT_FILENO, ptmx);
|
|
|
|
// Using PTY
|
|
send_fd(socketfd, -1);
|
|
} else {
|
|
send_fd(socketfd, STDOUT_FILENO);
|
|
}
|
|
|
|
// Send stderr
|
|
if (atty & ATTY_ERR) {
|
|
// Using PTY
|
|
send_fd(socketfd, -1);
|
|
} else {
|
|
send_fd(socketfd, STDERR_FILENO);
|
|
}
|
|
|
|
// Wait for acknowledgement from daemon
|
|
read_int(socketfd);
|
|
|
|
if (atty & ATTY_IN) {
|
|
setup_sighandlers(sighandler);
|
|
pump_stdin_async(ptmx);
|
|
}
|
|
if (atty & ATTY_OUT) {
|
|
pump_stdout_blocking(ptmx);
|
|
}
|
|
|
|
// Get the exit code
|
|
int code = read_int(socketfd);
|
|
close(socketfd);
|
|
|
|
return code;
|
|
}
|