Magisk/native/jni/core/daemon.cpp

315 lines
7.0 KiB
C++
Raw Normal View History

2017-04-08 01:37:43 +02:00
#include <fcntl.h>
#include <pthread.h>
#include <signal.h>
2020-04-12 14:34:56 +02:00
#include <libgen.h>
2017-04-08 01:37:43 +02:00
#include <sys/un.h>
#include <sys/types.h>
2017-11-27 21:43:46 +01:00
#include <sys/mount.h>
2020-05-10 09:48:41 +02:00
#include <android/log.h>
2017-04-08 01:37:43 +02:00
2020-03-09 09:50:30 +01:00
#include <magisk.hpp>
#include <utils.hpp>
#include <daemon.hpp>
#include <selinux.hpp>
#include <db.hpp>
#include <resetprop.hpp>
#include <flags.hpp>
2020-12-04 05:15:18 +01:00
#include <stream.hpp>
2020-04-12 14:34:56 +02:00
using namespace std;
2019-01-20 23:52:19 +01:00
int SDK_INT = -1;
bool RECOVERY_MODE = false;
2020-04-12 14:34:56 +02:00
string MAGISKTMP;
int DAEMON_STATE = STATE_NONE;
2020-05-18 14:18:49 +02:00
static struct stat self_st;
2019-01-20 23:52:19 +01:00
static bool verify_client(pid_t pid) {
// Verify caller is the same as server
char path[32];
sprintf(path, "/proc/%d/exe", pid);
struct stat st;
2020-05-18 14:18:49 +02:00
return !(stat(path, &st) || st.st_dev != self_st.st_dev || st.st_ino != self_st.st_ino);
}
static void request_handler(int client, int req_code, ucred cred) {
switch (req_code) {
case MAGISKHIDE:
magiskhide_handler(client);
break;
case SUPERUSER:
su_daemon_handler(client, &cred);
break;
case POST_FS_DATA:
post_fs_data(client);
break;
case LATE_START:
late_start(client);
break;
case BOOT_COMPLETE:
boot_complete(client);
break;
case SQLITE_CMD:
exec_sql(client);
break;
case REMOVE_MODULES:
remove_modules();
2020-05-18 14:18:49 +02:00
write_int(client, 0);
close(client);
2020-05-18 14:18:49 +02:00
reboot();
break;
default:
close(client);
break;
}
2018-10-13 03:46:09 +02:00
}
2020-05-18 14:18:49 +02:00
static void handle_request(int client) {
int req_code;
2017-05-05 10:13:26 +02:00
2020-05-18 14:18:49 +02:00
// Verify client credentials
ucred cred;
get_client_cred(client, &cred);
if (cred.uid != 0 && !verify_client(cred.pid))
2020-05-18 14:18:49 +02:00
goto shortcut;
2017-05-05 10:13:26 +02:00
2020-05-18 14:18:49 +02:00
req_code = read_int(client);
if (req_code < 0 || req_code >= DAEMON_CODE_END)
goto shortcut;
// Check client permissions
2020-05-18 14:18:49 +02:00
switch (req_code) {
case MAGISKHIDE:
2017-05-05 10:13:26 +02:00
case POST_FS_DATA:
case LATE_START:
2018-08-09 08:52:44 +02:00
case BOOT_COMPLETE:
case SQLITE_CMD:
2020-04-19 12:33:25 +02:00
case GET_PATH:
2020-05-18 14:18:49 +02:00
if (cred.uid != 0) {
2017-05-05 10:13:26 +02:00
write_int(client, ROOT_REQUIRED);
2020-05-18 14:18:49 +02:00
goto shortcut;
2017-05-05 10:13:26 +02:00
}
2020-04-30 10:26:50 +02:00
break;
case REMOVE_MODULES:
2020-05-18 14:18:49 +02:00
if (cred.uid != UID_SHELL && cred.uid != UID_ROOT) {
2020-04-30 10:26:50 +02:00
write_int(client, 1);
2020-05-18 14:18:49 +02:00
goto shortcut;
2020-04-30 10:26:50 +02:00
}
break;
2017-05-05 10:13:26 +02:00
}
// Simple requests
switch (req_code) {
2020-05-18 14:18:49 +02:00
case CHECK_VERSION:
write_string(client, MAGISK_VERSION ":MAGISK");
goto shortcut;
case CHECK_VERSION_CODE:
write_int(client, MAGISK_VER_CODE);
goto shortcut;
2020-04-12 14:34:56 +02:00
case GET_PATH:
write_string(client, MAGISKTMP.data());
2020-05-18 14:18:49 +02:00
goto shortcut;
case START_DAEMON:
setup_logfile(true);
2020-05-18 14:18:49 +02:00
goto shortcut;
}
2020-05-18 14:18:49 +02:00
// Create new thread to handle complex requests
2020-12-04 05:15:18 +01:00
new_daemon_thread([=] { return request_handler(client, req_code, cred); });
2020-05-18 14:18:49 +02:00
return;
shortcut:
close(client);
2017-04-08 01:37:43 +02:00
}
2020-12-07 08:09:24 +01:00
static shared_ptr<FILE> log_file;
2020-12-04 05:15:18 +01:00
2020-12-07 08:09:24 +01:00
atomic_flag file_backed = ATOMIC_FLAG_INIT;
2020-12-04 05:15:18 +01:00
static char *log_buf;
static size_t log_buf_len;
void setup_logfile(bool reset) {
2020-12-07 08:09:24 +01:00
if (file_backed.test_and_set(memory_order_relaxed))
2020-12-04 05:15:18 +01:00
return;
if (reset)
rename(LOGFILE, LOGFILE ".bak");
int fd = xopen(LOGFILE, O_WRONLY | O_APPEND | O_CREAT | O_CLOEXEC, 0644);
2020-12-07 08:09:24 +01:00
if (fd < 0) {
log_file.reset();
return;
}
2020-12-04 05:15:18 +01:00
// Dump all logs in memory (if exists)
2020-12-07 08:09:24 +01:00
if (log_buf)
2020-12-04 05:15:18 +01:00
write(fd, log_buf, log_buf_len);
2020-12-07 08:09:24 +01:00
if (FILE *fp = fdopen(fd, "a")) {
setbuf(fp, nullptr);
log_file.reset(fp, &fclose);
}
2020-12-04 05:15:18 +01:00
}
static int magisk_log(int prio, const char *fmt, va_list ap) {
2020-12-04 05:53:19 +01:00
va_list args;
va_copy(args, ap);
2020-12-04 05:15:18 +01:00
// Log to logcat
__android_log_vprint(prio, "Magisk", fmt, ap);
2020-12-07 08:09:24 +01:00
auto local_log_file = log_file;
if (!local_log_file)
return 0;
2020-12-04 05:15:18 +01:00
char buf[4096];
timeval tv;
tm tm;
char type;
switch (prio) {
case ANDROID_LOG_DEBUG:
type = 'D';
break;
case ANDROID_LOG_INFO:
type = 'I';
break;
case ANDROID_LOG_WARN:
type = 'W';
break;
default:
type = 'E';
break;
}
gettimeofday(&tv, nullptr);
localtime_r(&tv.tv_sec, &tm);
size_t len = strftime(buf, sizeof(buf), "%m-%d %T", &tm);
int ms = tv.tv_usec / 1000;
len += sprintf(buf + len, ".%03d %c : ", ms, type);
strcpy(buf + len, fmt);
2020-12-07 08:09:24 +01:00
return vfprintf(local_log_file.get(), buf, args);
2020-12-04 05:15:18 +01:00
}
2020-05-10 09:48:41 +02:00
static void android_logging() {
2020-12-07 08:09:24 +01:00
auto in_mem_file = make_stream_fp<byte_stream>(log_buf, log_buf_len);
log_file.reset(in_mem_file.release(), [](FILE *) {
free(log_buf);
log_buf = nullptr;
});
2020-12-04 05:15:18 +01:00
log_cb.d = [](auto fmt, auto ap){ return magisk_log(ANDROID_LOG_DEBUG, fmt, ap); };
log_cb.i = [](auto fmt, auto ap){ return magisk_log(ANDROID_LOG_INFO, fmt, ap); };
log_cb.w = [](auto fmt, auto ap){ return magisk_log(ANDROID_LOG_WARN, fmt, ap); };
log_cb.e = [](auto fmt, auto ap){ return magisk_log(ANDROID_LOG_ERROR, fmt, ap); };
2020-05-10 09:48:41 +02:00
log_cb.ex = nop_ex;
}
2020-04-19 12:33:25 +02:00
static void daemon_entry(int ppid) {
2018-09-27 09:11:10 +02:00
android_logging();
int fd = xopen("/dev/null", O_WRONLY);
xdup2(fd, STDOUT_FILENO);
xdup2(fd, STDERR_FILENO);
if (fd > STDERR_FILENO)
close(fd);
fd = xopen("/dev/zero", O_RDONLY);
xdup2(fd, STDIN_FILENO);
if (fd > STDERR_FILENO)
close(fd);
2017-11-22 09:12:08 +01:00
setsid();
2018-11-04 09:38:06 +01:00
setcon("u:r:" SEPOL_PROC_DOMAIN ":s0");
2020-04-12 14:34:56 +02:00
LOGI(NAME_WITH_VER(Magisk) " daemon started\n");
2020-04-19 12:33:25 +02:00
// Make sure ppid is not in acct
char src[64], dest[64];
sprintf(src, "/acct/uid_0/pid_%d", ppid);
sprintf(dest, "/acct/uid_0/pid_%d", getpid());
rename(src, dest);
2020-04-12 14:34:56 +02:00
// Get self stat
2020-04-19 12:33:25 +02:00
xreadlink("/proc/self/exe", src, sizeof(src));
MAGISKTMP = dirname(src);
2020-04-12 14:34:56 +02:00
xstat("/proc/self/exe", &self_st);
2019-01-20 23:52:19 +01:00
// Get API level
parse_prop_file("/system/build.prop", [](auto key, auto val) -> bool {
2019-03-06 02:27:09 +01:00
if (key == "ro.build.version.sdk") {
2019-03-08 02:31:35 +01:00
SDK_INT = parse_int(val);
2019-01-20 23:52:19 +01:00
return false;
}
return true;
});
if (SDK_INT < 0) {
// In case some devices do not store this info in build.prop, fallback to getprop
auto sdk = getprop("ro.build.version.sdk");
if (!sdk.empty()) {
SDK_INT = parse_int(sdk);
}
}
2020-04-19 12:33:25 +02:00
LOGI("* Device API level: %d\n", SDK_INT);
2019-01-20 23:52:19 +01:00
restore_tmpcon();
// SAR cleanups
auto mount_list = MAGISKTMP + "/" ROOTMNT;
if (access(mount_list.data(), F_OK) == 0) {
file_readline(true, mount_list.data(), [](string_view line) -> bool {
umount2(line.data(), MNT_DETACH);
return true;
});
}
unlink("/dev/.se");
// Load config status
2020-04-12 14:34:56 +02:00
auto config = MAGISKTMP + "/" INTLROOT "/config";
parse_prop_file(config.data(), [](auto key, auto val) -> bool {
if (key == "RECOVERYMODE" && val == "true")
RECOVERY_MODE = true;
return true;
});
struct sockaddr_un sun;
2018-10-12 06:50:47 +02:00
socklen_t len = setup_sockaddr(&sun, MAIN_SOCKET);
fd = xsocket(AF_LOCAL, SOCK_STREAM | SOCK_CLOEXEC, 0);
if (xbind(fd, (struct sockaddr*) &sun, len))
2017-11-27 20:42:48 +01:00
exit(1);
xlisten(fd, 10);
2017-04-08 01:37:43 +02:00
// Change process name
2019-02-15 10:31:39 +01:00
set_nice_name("magiskd");
2019-02-10 10:18:50 +01:00
// Block all signals
sigset_t block_set;
2019-02-10 10:18:50 +01:00
sigfillset(&block_set);
2019-01-20 23:52:19 +01:00
pthread_sigmask(SIG_SETMASK, &block_set, nullptr);
2017-05-07 21:11:14 +02:00
// Loop forever to listen for requests
for (;;) {
2019-09-19 06:13:42 +02:00
int client = xaccept4(fd, nullptr, nullptr, SOCK_CLOEXEC);
2020-05-18 14:18:49 +02:00
handle_request(client);
2017-04-08 01:37:43 +02:00
}
}
2019-03-04 22:45:18 +01:00
int connect_daemon(bool create) {
2017-04-08 01:37:43 +02:00
struct sockaddr_un sun;
2018-10-12 06:50:47 +02:00
socklen_t len = setup_sockaddr(&sun, MAIN_SOCKET);
int fd = xsocket(AF_LOCAL, SOCK_STREAM | SOCK_CLOEXEC, 0);
if (connect(fd, (struct sockaddr*) &sun, len)) {
2019-03-04 22:45:18 +01:00
if (!create || getuid() != UID_ROOT || getgid() != UID_ROOT) {
LOGE("No daemon is currently running!\n");
2017-10-13 18:08:12 +02:00
exit(1);
}
int ppid = getpid();
2018-10-12 06:50:47 +02:00
LOGD("client: launching new main daemon process\n");
2018-04-29 06:17:28 +02:00
if (fork_dont_care() == 0) {
2018-10-12 06:50:47 +02:00
close(fd);
2020-04-19 12:33:25 +02:00
daemon_entry(ppid);
}
2018-10-12 06:50:47 +02:00
while (connect(fd, (struct sockaddr*) &sun, len))
2017-11-27 20:42:48 +01:00
usleep(10000);
2017-04-08 01:37:43 +02:00
}
return fd;
}