Magisk/native/jni/su/su_daemon.c

427 lines
9.8 KiB
C
Raw Normal View History

/* su_daemon.c - The entrypoint for su, connect to daemon and send correct info
2017-04-14 21:21:31 +02:00
*/
2017-07-07 19:12:47 +02:00
#define _GNU_SOURCE
2017-04-14 21:21:31 +02:00
#include <limits.h>
#include <unistd.h>
#include <pthread.h>
#include <stdlib.h>
#include <fcntl.h>
#include <string.h>
#include <signal.h>
#include <sys/socket.h>
#include <sys/types.h>
#include <sys/stat.h>
#include <sys/wait.h>
#include "magisk.h"
#include "daemon.h"
#include "utils.h"
#include "su.h"
#include "pts.h"
2018-09-27 06:09:59 +02:00
#include "selinux.h"
2017-04-14 21:21:31 +02:00
2017-04-15 20:28:12 +02:00
// Constants for the atty bitfield
#define ATTY_IN 1
#define ATTY_OUT 2
#define ATTY_ERR 4
2017-04-14 21:21:31 +02:00
#define TIMEOUT 3
#define LOCK_CACHE() pthread_mutex_lock(&cache_lock)
#define LOCK_INFO() pthread_mutex_lock(&info->lock)
#define UNLOCK_CACHE() pthread_mutex_unlock(&cache_lock)
#define UNLOCK_INFO() pthread_mutex_unlock(&ctx.info->lock)
2017-07-16 09:31:40 +02:00
static pthread_mutex_t cache_lock = PTHREAD_MUTEX_INITIALIZER;
static struct su_info *cache;
2017-04-14 21:21:31 +02:00
static void sighandler(int sig) {
restore_stdin();
// Assume we'll only be called before death
// See note before sigaction() in set_stdin_raw()
//
// Now, close all standard I/O to cause the pumps
// to exit so we can continue and retrieve the exit
// code
close(STDIN_FILENO);
close(STDOUT_FILENO);
close(STDERR_FILENO);
// Put back all the default handlers
struct sigaction act;
memset(&act, 0, sizeof(act));
act.sa_handler = SIG_DFL;
for (int i = 0; quit_signals[i]; ++i) {
sigaction(quit_signals[i], &act, NULL);
}
}
static void *info_collector(void *node) {
struct su_info *info = node;
while (1) {
sleep(1);
if (info->life) {
LOCK_CACHE();
if (--info->life == 0 && cache && info->uid == cache->uid)
cache = NULL;
UNLOCK_CACHE();
}
if (!info->life && !info->ref) {
pthread_mutex_destroy(&info->lock);
free(info);
return NULL;
}
}
2017-05-07 21:08:34 +02:00
}
2017-04-15 20:28:12 +02:00
static void database_check(struct su_info *info) {
int uid = info->uid;
sqlite3 *db = get_magiskdb();
if (db) {
get_db_settings(db, -1, &info->dbs);
get_db_strings(db, -1, &info->str);
// Check multiuser settings
2018-10-04 07:49:52 +02:00
switch (DB_SET(info, SU_MULTIUSER_MODE)) {
case MULTIUSER_MODE_OWNER_ONLY:
if (info->uid / 100000) {
uid = -1;
info->access = NO_SU_ACCESS;
}
break;
case MULTIUSER_MODE_OWNER_MANAGED:
uid = info->uid % 100000;
break;
case MULTIUSER_MODE_USER:
default:
break;
}
if (uid > 0)
get_uid_policy(db, uid, &info->access);
sqlite3_close(db);
}
// We need to check our manager
if (info->access.log || info->access.notify)
2018-10-04 07:49:52 +02:00
validate_manager(DB_STR(info, SU_MANAGER), uid / 100000, &info->mgr_st);
}
static struct su_info *get_su_info(unsigned uid) {
struct su_info *info;
int cache_miss = 0;
LOCK_CACHE();
if (cache && cache->uid == uid) {
info = cache;
} else {
cache_miss = 1;
2018-10-04 07:49:52 +02:00
info = xcalloc(1, sizeof(*info));
info->uid = uid;
info->dbs = DEFAULT_DB_SETTINGS;
info->access = DEFAULT_SU_ACCESS;
pthread_mutex_init(&info->lock, NULL);
cache = info;
}
// Update the cache status
info->life = TIMEOUT;
++info->ref;
// Start a thread to maintain the cache
if (cache_miss) {
pthread_t thread;
xpthread_create(&thread, NULL, info_collector, info);
pthread_detach(thread);
}
UNLOCK_CACHE();
2017-07-16 09:31:40 +02:00
LOGD("su: request from uid=[%d] (#%d)\n", info->uid, ++info->count);
2017-07-16 09:31:40 +02:00
// Lock before the policy is determined
LOCK_INFO();
2017-07-16 09:31:40 +02:00
if (info->access.policy == QUERY) {
// Not cached, get data from database
database_check(info);
// Check su access settings
2018-10-04 07:49:52 +02:00
switch (DB_SET(info, ROOT_ACCESS)) {
case ROOT_ACCESS_DISABLED:
LOGE("Root access is disabled!\n");
info->access = NO_SU_ACCESS;
break;
case ROOT_ACCESS_ADB_ONLY:
if (info->uid != UID_SHELL) {
2018-06-13 12:14:23 +02:00
LOGE("Root access limited to ADB only!\n");
info->access = NO_SU_ACCESS;
}
break;
case ROOT_ACCESS_APPS_ONLY:
if (info->uid == UID_SHELL) {
2018-06-13 12:14:23 +02:00
LOGE("Root access is disabled for ADB!\n");
info->access = NO_SU_ACCESS;
}
break;
case ROOT_ACCESS_APPS_AND_ADB:
default:
break;
}
// If it's the manager, allow it silently
2018-10-04 07:49:52 +02:00
if ((info->uid % 100000) == (info->mgr_st.st_uid % 100000))
info->access = SILENT_SU_ACCESS;
// Allow if it's root
if (info->uid == UID_ROOT)
info->access = SILENT_SU_ACCESS;
// If still not determined, check if manager exists
2018-10-04 07:49:52 +02:00
if (info->access.policy == QUERY && DB_STR(info, SU_MANAGER)[0] == '\0')
info->access = NO_SU_ACCESS;
}
return info;
}
2018-06-26 12:45:51 +02:00
static void su_executor(int client) {
LOGD("su: executor started\n");
2017-04-14 21:21:31 +02:00
// Become session leader
xsetsid();
// Migrate environment from client
char path[32], buf[4096];
2018-06-26 12:45:51 +02:00
snprintf(path, sizeof(path), "/proc/%d/cwd", su_ctx->pid);
xreadlink(path, su_ctx->cwd, sizeof(su_ctx->cwd));
snprintf(path, sizeof(path), "/proc/%d/environ", su_ctx->pid);
memset(buf, 0, sizeof(buf));
int fd = open(path, O_RDONLY);
read(fd, buf, sizeof(buf));
clearenv();
for (size_t pos = 0; buf[pos];) {
putenv(buf + pos);
pos += strlen(buf + pos) + 1;
}
2017-04-14 21:21:31 +02:00
// Let's read some info from the socket
int argc = read_int(client);
if (argc < 0 || argc > 512) {
LOGE("unable to allocate args: %d", argc);
exit2(1);
2017-04-14 21:21:31 +02:00
}
LOGD("su: argc=[%d]\n", argc);
char **argv = (char**) xmalloc(sizeof(char*) * (argc + 1));
argv[argc] = NULL;
for (int i = 0; i < argc; i++) {
argv[i] = read_string(client);
LOGD("su: argv[%d]=[%s]\n", i, argv[i]);
2017-07-07 19:12:47 +02:00
// Replace -cn with -z, -mm with -M for supporting getopt_long
if (strcmp(argv[i], "-cn") == 0)
strcpy(argv[i], "-z");
else if (strcmp(argv[i], "-mm") == 0)
strcpy(argv[i], "-M");
2017-04-14 21:21:31 +02:00
}
// Get pts_slave
char *pts_slave = read_string(client);
// The FDs for each of the streams
2017-04-15 20:28:12 +02:00
int infd = recv_fd(client);
int outfd = recv_fd(client);
int errfd = recv_fd(client);
2017-05-07 21:08:34 +02:00
int ptsfd = -1;
2017-04-15 20:28:12 +02:00
if (pts_slave[0]) {
2018-06-26 12:45:51 +02:00
LOGD("su: pts_slave=[%s]\n", pts_slave);
// Check pts_slave file is owned by daemon_from_uid
struct stat st;
xstat(pts_slave, &st);
2017-04-15 20:28:12 +02:00
// If caller is not root, ensure the owner of pts_slave is the caller
2018-06-26 12:45:51 +02:00
if(st.st_uid != su_ctx->info->uid && su_ctx->info->uid != 0) {
2017-04-15 20:28:12 +02:00
LOGE("su: Wrong permission of pts_slave");
2018-06-26 12:45:51 +02:00
su_ctx->info->access.policy = DENY;
exit2(1);
2017-04-15 20:28:12 +02:00
}
// Set our pts_slave to devpts, same restriction as adb shell
lsetfilecon(pts_slave, "u:object_r:devpts:s0");
2017-04-15 20:28:12 +02:00
// Opening the TTY has to occur after the
// fork() and setsid() so that it becomes
// our controlling TTY and not the daemon's
2017-05-07 21:08:34 +02:00
ptsfd = xopen(pts_slave, O_RDWR);
2017-04-15 20:28:12 +02:00
if (infd < 0) {
LOGD("su: stdin using PTY");
infd = ptsfd;
}
if (outfd < 0) {
LOGD("su: stdout using PTY");
outfd = ptsfd;
}
if (errfd < 0) {
LOGD("su: stderr using PTY");
errfd = ptsfd;
}
2017-04-14 21:21:31 +02:00
}
free(pts_slave);
// Swap out stdin, stdout, stderr
2017-04-15 20:28:12 +02:00
xdup2(infd, STDIN_FILENO);
xdup2(outfd, STDOUT_FILENO);
xdup2(errfd, STDERR_FILENO);
2017-04-14 21:21:31 +02:00
2017-05-07 21:08:34 +02:00
close(ptsfd);
// ack and close
write_int(client, 0);
close(client);
2018-06-26 12:45:51 +02:00
// Run the actual main
2017-04-14 21:21:31 +02:00
su_daemon_main(argc, argv);
}
2018-06-26 12:45:51 +02:00
void su_daemon_receiver(int client, struct ucred *credential) {
LOGD("su: request from client: %d\n", client);
// Default values
struct su_context ctx = {
2018-10-04 07:49:52 +02:00
.info = get_su_info(credential->uid),
.to = {
.uid = UID_ROOT,
.login = 0,
.keepenv = 0,
.shell = DEFAULT_SHELL,
.command = NULL,
},
.pid = credential->pid,
.pipefd = { -1, -1 }
2018-06-26 12:45:51 +02:00
};
// Fail fast
if (ctx.info->access.policy == DENY && !ctx.info->access.log && !ctx.info->access.notify) {
UNLOCK_INFO();
2018-06-26 12:45:51 +02:00
write_int(client, DENY);
return;
}
// If still not determined, open a pipe and wait for results
if (ctx.info->access.policy == QUERY)
xpipe2(ctx.pipefd, O_CLOEXEC);
/* Fork a new process, the child process will need to setsid,
* open a pseudo-terminal if needed, and will eventually run exec
* The parent process will wait for the result and
* send the return code back to our client
*/
int child = xfork();
if (child == 0) {
su_ctx = &ctx;
su_executor(client);
}
// Wait for results
if (ctx.pipefd[0] >= 0) {
xxread(ctx.pipefd[0], &ctx.info->access.policy, sizeof(policy_t));
close(ctx.pipefd[0]);
close(ctx.pipefd[1]);
}
// The policy is determined, unlock
UNLOCK_INFO();
2018-06-26 12:45:51 +02:00
// Info is now useless to us, decrement reference count
--ctx.info->ref;
// Wait result
LOGD("su: waiting child: [%d]\n", child);
int status, code;
if (waitpid(child, &status, 0) > 0)
code = WEXITSTATUS(status);
else
code = -1;
LOGD("su: return code: [%d]\n", code);
write(client, &code, sizeof(code));
close(client);
return;
}
2017-08-06 18:31:27 +02:00
/*
2017-04-14 21:21:31 +02:00
* Connect daemon, send argc, argv, cwd, pts slave
*/
int su_client_main(int argc, char *argv[]) {
char pts_slave[PATH_MAX];
2017-04-14 21:21:31 +02:00
int ptmx, socketfd;
// Connect to client
2018-06-16 19:26:38 +02:00
socketfd = connect_daemon();
2017-04-14 21:21:31 +02:00
// Tell the daemon we are su
write_int(socketfd, SUPERUSER);
// Number of command line arguments
write_int(socketfd, argc);
// Command line arguments
for (int i = 0; i < argc; i++) {
write_string(socketfd, argv[i]);
}
2017-04-15 20:28:12 +02:00
// Determine which one of our streams are attached to a TTY
int atty = 0;
if (isatty(STDIN_FILENO)) atty |= ATTY_IN;
if (isatty(STDOUT_FILENO)) atty |= ATTY_OUT;
if (isatty(STDERR_FILENO)) atty |= ATTY_ERR;
if (atty) {
// We need a PTY. Get one.
ptmx = pts_open(pts_slave, sizeof(pts_slave));
2017-04-15 20:28:12 +02:00
} else {
pts_slave[0] = '\0';
2017-04-15 20:28:12 +02:00
}
2017-04-14 21:21:31 +02:00
2017-04-15 20:28:12 +02:00
// Send the pts_slave path to the daemon
write_string(socketfd, pts_slave);
2017-04-14 21:21:31 +02:00
2017-04-15 20:28:12 +02:00
// Send stdin
send_fd(socketfd, (atty & ATTY_IN) ? -1 : STDIN_FILENO);
2017-04-15 20:28:12 +02:00
// Send stdout
send_fd(socketfd, (atty & ATTY_OUT) ? -1 : STDOUT_FILENO);
2017-04-15 20:28:12 +02:00
// Send stderr
send_fd(socketfd, (atty & ATTY_ERR) ? -1 : STDERR_FILENO);
2017-04-15 20:28:12 +02:00
2017-04-14 21:21:31 +02:00
// Wait for acknowledgement from daemon
2018-06-13 12:14:23 +02:00
if (read_int(socketfd)) {
// Fast fail
fprintf(stderr, "%s\n", strerror(EACCES));
return DENY;
}
2017-04-14 21:21:31 +02:00
2017-04-15 20:28:12 +02:00
if (atty & ATTY_IN) {
setup_sighandlers(sighandler);
pump_stdin_async(ptmx);
}
if (atty & ATTY_OUT) {
// Forward SIGWINCH
watch_sigwinch_async(STDOUT_FILENO, ptmx);
2017-04-15 20:28:12 +02:00
pump_stdout_blocking(ptmx);
}
2017-04-14 21:21:31 +02:00
// Get the exit code
int code = read_int(socketfd);
close(socketfd);
return code;
}