mirror of
https://github.com/topjohnwu/Magisk.git
synced 2024-11-25 02:55:33 +00:00
482 lines
13 KiB
C++
482 lines
13 KiB
C++
#include <csignal>
|
|
#include <libgen.h>
|
|
#include <sys/un.h>
|
|
#include <sys/mount.h>
|
|
|
|
#include <magisk.hpp>
|
|
#include <base.hpp>
|
|
#include <daemon.hpp>
|
|
#include <selinux.hpp>
|
|
#include <db.hpp>
|
|
#include <flags.h>
|
|
|
|
#include "core.hpp"
|
|
|
|
using namespace std;
|
|
|
|
int SDK_INT = -1;
|
|
string MAGISKTMP;
|
|
|
|
bool RECOVERY_MODE = false;
|
|
|
|
static struct stat self_st;
|
|
|
|
static map<int, poll_callback> *poll_map;
|
|
static vector<pollfd> *poll_fds;
|
|
static int poll_ctrl;
|
|
|
|
enum {
|
|
POLL_CTRL_NEW,
|
|
POLL_CTRL_RM,
|
|
};
|
|
|
|
void register_poll(const pollfd *pfd, poll_callback callback) {
|
|
if (gettid() == getpid()) {
|
|
// On main thread, directly modify
|
|
poll_map->try_emplace(pfd->fd, callback);
|
|
poll_fds->emplace_back(*pfd);
|
|
} else {
|
|
// Send it to poll_ctrl
|
|
write_int(poll_ctrl, POLL_CTRL_NEW);
|
|
xwrite(poll_ctrl, pfd, sizeof(*pfd));
|
|
xwrite(poll_ctrl, &callback, sizeof(callback));
|
|
}
|
|
}
|
|
|
|
void unregister_poll(int fd, bool auto_close) {
|
|
if (fd < 0)
|
|
return;
|
|
|
|
if (gettid() == getpid()) {
|
|
// On main thread, directly modify
|
|
poll_map->erase(fd);
|
|
for (auto &poll_fd : *poll_fds) {
|
|
if (poll_fd.fd == fd) {
|
|
if (auto_close) {
|
|
close(poll_fd.fd);
|
|
}
|
|
// Cannot modify while iterating, invalidate it instead
|
|
// It will be removed in the next poll loop
|
|
poll_fd.fd = -1;
|
|
break;
|
|
}
|
|
}
|
|
} else {
|
|
// Send it to poll_ctrl
|
|
write_int(poll_ctrl, POLL_CTRL_RM);
|
|
write_int(poll_ctrl, fd);
|
|
write_int(poll_ctrl, auto_close);
|
|
}
|
|
}
|
|
|
|
void clear_poll() {
|
|
if (poll_fds) {
|
|
for (auto &poll_fd : *poll_fds) {
|
|
close(poll_fd.fd);
|
|
}
|
|
}
|
|
delete poll_fds;
|
|
delete poll_map;
|
|
poll_fds = nullptr;
|
|
poll_map = nullptr;
|
|
}
|
|
|
|
static void poll_ctrl_handler(pollfd *pfd) {
|
|
int code = read_int(pfd->fd);
|
|
switch (code) {
|
|
case POLL_CTRL_NEW: {
|
|
pollfd new_fd{};
|
|
poll_callback cb;
|
|
xxread(pfd->fd, &new_fd, sizeof(new_fd));
|
|
xxread(pfd->fd, &cb, sizeof(cb));
|
|
register_poll(&new_fd, cb);
|
|
break;
|
|
}
|
|
case POLL_CTRL_RM: {
|
|
int fd = read_int(pfd->fd);
|
|
bool auto_close = read_int(pfd->fd);
|
|
unregister_poll(fd, auto_close);
|
|
break;
|
|
}
|
|
default:
|
|
__builtin_unreachable();
|
|
}
|
|
}
|
|
|
|
[[noreturn]] static void poll_loop() {
|
|
// Register poll_ctrl
|
|
auto pipefd = array<int, 2>{-1, -1};
|
|
xpipe2(pipefd, O_CLOEXEC);
|
|
poll_ctrl = pipefd[1];
|
|
pollfd poll_ctrl_pfd = { pipefd[0], POLLIN, 0 };
|
|
register_poll(&poll_ctrl_pfd, poll_ctrl_handler);
|
|
|
|
for (;;) {
|
|
if (poll(poll_fds->data(), poll_fds->size(), -1) <= 0)
|
|
continue;
|
|
|
|
// MUST iterate with index because any poll_callback could add new elements to poll_fds
|
|
for (int i = 0; i < poll_fds->size();) {
|
|
auto &pfd = (*poll_fds)[i];
|
|
if (pfd.revents) {
|
|
if (pfd.revents & POLLERR || pfd.revents & POLLNVAL) {
|
|
poll_map->erase(pfd.fd);
|
|
poll_fds->erase(poll_fds->begin() + i);
|
|
continue;
|
|
}
|
|
if (auto it = poll_map->find(pfd.fd); it != poll_map->end()) {
|
|
it->second(&pfd);
|
|
}
|
|
}
|
|
++i;
|
|
}
|
|
}
|
|
}
|
|
|
|
static void handle_request_async(int client, int code, const sock_cred &cred) {
|
|
switch (code) {
|
|
case MainRequest::DENYLIST:
|
|
denylist_handler(client, &cred);
|
|
break;
|
|
case MainRequest::SUPERUSER:
|
|
su_daemon_handler(client, &cred);
|
|
break;
|
|
case MainRequest::ZYGOTE_RESTART:
|
|
close(client);
|
|
LOGI("** zygote restarted\n");
|
|
pkg_xml_ino = 0;
|
|
prune_su_access();
|
|
break;
|
|
case MainRequest::SQLITE_CMD:
|
|
exec_sql(client);
|
|
break;
|
|
case MainRequest::REMOVE_MODULES: {
|
|
int do_reboot = read_int(client);
|
|
remove_modules();
|
|
write_int(client, 0);
|
|
close(client);
|
|
if (do_reboot) reboot();
|
|
break;
|
|
}
|
|
case MainRequest::ZYGISK:
|
|
case MainRequest::ZYGISK_PASSTHROUGH:
|
|
zygisk_handler(client, &cred);
|
|
break;
|
|
default:
|
|
__builtin_unreachable();
|
|
}
|
|
}
|
|
|
|
static void handle_request_sync(int client, int code) {
|
|
switch (code) {
|
|
case MainRequest::CHECK_VERSION:
|
|
#if MAGISK_DEBUG
|
|
write_string(client, MAGISK_VERSION ":MAGISK:D");
|
|
#else
|
|
write_string(client, MAGISK_VERSION ":MAGISK:R");
|
|
#endif
|
|
break;
|
|
case MainRequest::CHECK_VERSION_CODE:
|
|
write_int(client, MAGISK_VER_CODE);
|
|
break;
|
|
case MainRequest::START_DAEMON:
|
|
rust::get_magiskd().setup_logfile();
|
|
break;
|
|
case MainRequest::STOP_DAEMON:
|
|
denylist_handler(-1, nullptr);
|
|
write_int(client, 0);
|
|
// Terminate the daemon!
|
|
exit(0);
|
|
default:
|
|
__builtin_unreachable();
|
|
}
|
|
}
|
|
|
|
static bool is_client(pid_t pid) {
|
|
// Verify caller is the same as server
|
|
char path[32];
|
|
sprintf(path, "/proc/%d/exe", pid);
|
|
struct stat st{};
|
|
return !(stat(path, &st) || st.st_dev != self_st.st_dev || st.st_ino != self_st.st_ino);
|
|
}
|
|
|
|
static void handle_request(pollfd *pfd) {
|
|
int client = xaccept4(pfd->fd, nullptr, nullptr, SOCK_CLOEXEC);
|
|
|
|
// Verify client credentials
|
|
sock_cred cred;
|
|
bool is_root;
|
|
bool is_zygote;
|
|
int code;
|
|
|
|
if (!get_client_cred(client, &cred)) {
|
|
// Client died
|
|
goto done;
|
|
}
|
|
is_root = cred.uid == AID_ROOT;
|
|
is_zygote = cred.context == "u:r:zygote:s0";
|
|
|
|
if (!is_root && !is_zygote && !is_client(cred.pid)) {
|
|
// Unsupported client state
|
|
write_int(client, MainResponse::ACCESS_DENIED);
|
|
goto done;
|
|
}
|
|
|
|
code = read_int(client);
|
|
if (code < 0 || code >= MainRequest::END ||
|
|
code == MainRequest::_SYNC_BARRIER_ ||
|
|
code == MainRequest::_STAGE_BARRIER_) {
|
|
// Unknown request code
|
|
goto done;
|
|
}
|
|
|
|
// Check client permissions
|
|
switch (code) {
|
|
case MainRequest::POST_FS_DATA:
|
|
case MainRequest::LATE_START:
|
|
case MainRequest::BOOT_COMPLETE:
|
|
case MainRequest::ZYGOTE_RESTART:
|
|
case MainRequest::SQLITE_CMD:
|
|
case MainRequest::DENYLIST:
|
|
case MainRequest::STOP_DAEMON:
|
|
if (!is_root) {
|
|
write_int(client, MainResponse::ROOT_REQUIRED);
|
|
goto done;
|
|
}
|
|
break;
|
|
case MainRequest::REMOVE_MODULES:
|
|
if (!is_root && cred.uid != AID_SHELL) {
|
|
write_int(client, MainResponse::ACCESS_DENIED);
|
|
goto done;
|
|
}
|
|
break;
|
|
case MainRequest::ZYGISK:
|
|
if (!is_zygote && selinux_enabled()) {
|
|
// Invalid client context
|
|
write_int(client, MainResponse::ACCESS_DENIED);
|
|
goto done;
|
|
}
|
|
break;
|
|
default:
|
|
break;
|
|
}
|
|
|
|
write_int(client, MainResponse::OK);
|
|
|
|
if (code < MainRequest::_SYNC_BARRIER_) {
|
|
handle_request_sync(client, code);
|
|
goto done;
|
|
} else if (code < MainRequest::_STAGE_BARRIER_) {
|
|
exec_task([=] { handle_request_async(client, code, cred); });
|
|
} else {
|
|
exec_task([=] { boot_stage_handler(client, code); });
|
|
}
|
|
return;
|
|
|
|
done:
|
|
close(client);
|
|
}
|
|
|
|
static void switch_cgroup(const char *cgroup, int pid) {
|
|
char buf[32];
|
|
ssprintf(buf, sizeof(buf), "%s/cgroup.procs", cgroup);
|
|
if (access(buf, F_OK) != 0)
|
|
return;
|
|
int fd = xopen(buf, O_WRONLY | O_APPEND | O_CLOEXEC);
|
|
if (fd == -1)
|
|
return;
|
|
ssprintf(buf, sizeof(buf), "%d\n", pid);
|
|
xwrite(fd, buf, strlen(buf));
|
|
close(fd);
|
|
}
|
|
|
|
static void daemon_entry() {
|
|
android_logging();
|
|
|
|
// Block all signals
|
|
sigset_t block_set;
|
|
sigfillset(&block_set);
|
|
pthread_sigmask(SIG_SETMASK, &block_set, nullptr);
|
|
|
|
// Change process name
|
|
set_nice_name("magiskd");
|
|
|
|
int fd = xopen("/dev/null", O_WRONLY);
|
|
xdup2(fd, STDOUT_FILENO);
|
|
xdup2(fd, STDERR_FILENO);
|
|
if (fd > STDERR_FILENO)
|
|
close(fd);
|
|
fd = xopen("/dev/zero", O_RDONLY);
|
|
xdup2(fd, STDIN_FILENO);
|
|
if (fd > STDERR_FILENO)
|
|
close(fd);
|
|
|
|
setsid();
|
|
setcon(MAGISK_PROC_CON);
|
|
|
|
rust::daemon_entry();
|
|
|
|
LOGI(NAME_WITH_VER(Magisk) " daemon started\n");
|
|
|
|
// Escape from cgroup
|
|
int pid = getpid();
|
|
switch_cgroup("/acct", pid);
|
|
switch_cgroup("/dev/cg2_bpf", pid);
|
|
switch_cgroup("/sys/fs/cgroup", pid);
|
|
if (get_prop("ro.config.per_app_memcg") != "false") {
|
|
switch_cgroup("/dev/memcg/apps", pid);
|
|
}
|
|
|
|
// Get self stat
|
|
char buf[64];
|
|
xreadlink("/proc/self/exe", buf, sizeof(buf));
|
|
MAGISKTMP = dirname(buf);
|
|
xstat("/proc/self/exe", &self_st);
|
|
|
|
// Get API level
|
|
parse_prop_file("/system/build.prop", [](auto key, auto val) -> bool {
|
|
if (key == "ro.build.version.sdk") {
|
|
SDK_INT = parse_int(val);
|
|
return false;
|
|
}
|
|
return true;
|
|
});
|
|
if (SDK_INT < 0) {
|
|
// In case some devices do not store this info in build.prop, fallback to getprop
|
|
auto sdk = get_prop("ro.build.version.sdk");
|
|
if (!sdk.empty()) {
|
|
SDK_INT = parse_int(sdk);
|
|
}
|
|
}
|
|
LOGI("* Device API level: %d\n", SDK_INT);
|
|
|
|
restore_tmpcon();
|
|
|
|
// Cleanups
|
|
auto mount_list = MAGISKTMP + "/" ROOTMNT;
|
|
if (access(mount_list.data(), F_OK) == 0) {
|
|
file_readline(true, mount_list.data(), [](string_view line) -> bool {
|
|
umount2(line.data(), MNT_DETACH);
|
|
return true;
|
|
});
|
|
}
|
|
if (getenv("REMOUNT_ROOT")) {
|
|
xmount(nullptr, "/", nullptr, MS_REMOUNT | MS_RDONLY, nullptr);
|
|
unsetenv("REMOUNT_ROOT");
|
|
}
|
|
rm_rf((MAGISKTMP + "/" ROOTOVL).data());
|
|
|
|
// Load config status
|
|
auto config = MAGISKTMP + "/" MAIN_CONFIG;
|
|
parse_prop_file(config.data(), [](auto key, auto val) -> bool {
|
|
if (key == "RECOVERYMODE" && val == "true")
|
|
RECOVERY_MODE = true;
|
|
return true;
|
|
});
|
|
|
|
// Use isolated devpts if kernel support
|
|
if (access("/dev/pts/ptmx", F_OK) == 0) {
|
|
auto pts = MAGISKTMP + "/" SHELLPTS;
|
|
if (access(pts.data(), F_OK)) {
|
|
xmkdirs(pts.data(), 0755);
|
|
xmount("devpts", pts.data(), "devpts",
|
|
MS_NOSUID | MS_NOEXEC, "newinstance");
|
|
auto ptmx = pts + "/ptmx";
|
|
if (access(ptmx.data(), F_OK)) {
|
|
xumount(pts.data());
|
|
rmdir(pts.data());
|
|
}
|
|
}
|
|
}
|
|
|
|
fd = xsocket(AF_LOCAL, SOCK_STREAM | SOCK_CLOEXEC, 0);
|
|
sockaddr_un addr = {.sun_family = AF_LOCAL};
|
|
strcpy(addr.sun_path, (MAGISKTMP + "/" MAIN_SOCKET).data());
|
|
unlink(addr.sun_path);
|
|
if (xbind(fd, (sockaddr *) &addr, sizeof(addr)))
|
|
exit(1);
|
|
chmod(addr.sun_path, 0666);
|
|
setfilecon(addr.sun_path, MAGISK_FILE_CON);
|
|
xlisten(fd, 10);
|
|
|
|
default_new(poll_map);
|
|
default_new(poll_fds);
|
|
default_new(module_list);
|
|
|
|
// Register handler for main socket
|
|
pollfd main_socket_pfd = { fd, POLLIN, 0 };
|
|
register_poll(&main_socket_pfd, handle_request);
|
|
|
|
// Loop forever to listen for requests
|
|
poll_loop();
|
|
}
|
|
|
|
string find_magisk_tmp() {
|
|
if (access("/debug_ramdisk/" INTLROOT, F_OK) == 0) {
|
|
return "/debug_ramdisk";
|
|
}
|
|
if (access("/sbin/" INTLROOT, F_OK) == 0) {
|
|
return "/sbin";
|
|
}
|
|
// Fallback to lookup from mountinfo for manual mount, e.g. avd
|
|
for (const auto &mount: parse_mount_info("self")) {
|
|
if (mount.source == "magisk" && mount.root == "/") {
|
|
return mount.target;
|
|
}
|
|
}
|
|
return "";
|
|
}
|
|
|
|
int connect_daemon(int req, bool create) {
|
|
int fd = xsocket(AF_LOCAL, SOCK_STREAM | SOCK_CLOEXEC, 0);
|
|
sockaddr_un addr = {.sun_family = AF_LOCAL};
|
|
string tmp = find_magisk_tmp();
|
|
strcpy(addr.sun_path, (tmp + "/" MAIN_SOCKET).data());
|
|
if (connect(fd, (sockaddr *) &addr, sizeof(addr))) {
|
|
if (!create || getuid() != AID_ROOT) {
|
|
LOGE("No daemon is currently running!\n");
|
|
close(fd);
|
|
return -1;
|
|
}
|
|
|
|
char buf[64];
|
|
xreadlink("/proc/self/exe", buf, sizeof(buf));
|
|
if (tmp.empty() || !str_starts(buf, tmp)) {
|
|
LOGE("Start daemon on magisk tmpfs\n");
|
|
close(fd);
|
|
return -1;
|
|
}
|
|
|
|
if (fork_dont_care() == 0) {
|
|
close(fd);
|
|
daemon_entry();
|
|
}
|
|
|
|
while (connect(fd, (sockaddr *) &addr, sizeof(addr)))
|
|
usleep(10000);
|
|
}
|
|
write_int(fd, req);
|
|
int res = read_int(fd);
|
|
if (res < MainResponse::ERROR || res >= MainResponse::END)
|
|
res = MainResponse::ERROR;
|
|
switch (res) {
|
|
case MainResponse::OK:
|
|
break;
|
|
case MainResponse::ERROR:
|
|
LOGE("Daemon error\n");
|
|
close(fd);
|
|
return -1;
|
|
case MainResponse::ROOT_REQUIRED:
|
|
LOGE("Root is required for this operation\n");
|
|
close(fd);
|
|
return -1;
|
|
case MainResponse::ACCESS_DENIED:
|
|
LOGE("Access denied\n");
|
|
close(fd);
|
|
return -1;
|
|
default:
|
|
__builtin_unreachable();
|
|
}
|
|
return fd;
|
|
}
|