Magisk/su.h

121 lines
3.2 KiB
C
Raw Normal View History

2017-04-14 21:21:31 +02:00
/* su.h - Store all general su info
*/
2017-04-14 21:21:31 +02:00
#ifndef _SU_H_
#define _SU_H_
2017-04-14 21:21:31 +02:00
#include <limits.h>
#include <sys/types.h>
2017-04-18 15:09:53 +02:00
#define MAGISKSU_VER_STR xstr(MAGISK_VERSION) ":MAGISKSU (topjohnwu)"
2017-04-14 21:21:31 +02:00
// Property check for root access
2017-05-26 20:40:12 +02:00
#define ROOT_ACCESS_PROP "persist.magisk.root"
#define ROOT_ACCESS_DISABLED 0
#define ROOT_ACCESS_APPS_ONLY 1
#define ROOT_ACCESS_ADB_ONLY 2
#define ROOT_ACCESS_APPS_AND_ADB 3
2017-05-26 20:40:12 +02:00
// Property for multiuser
#define MULTIUSER_MODE_PROP "persist.magisk.multiuser"
#define MULTIUSER_MODE_OWNER_ONLY 0
#define MULTIUSER_MODE_OWNER_MANAGED 1
#define MULTIUSER_MODE_USER 2
// DO NOT CHANGE LINE BELOW, java package name will always be the same
2017-01-23 15:51:00 +01:00
#define JAVA_PACKAGE_NAME "com.topjohnwu.magisk"
2017-05-26 20:40:12 +02:00
#define APP_DATA_PATH "/data/data/"
2017-04-14 21:21:31 +02:00
#define USER_DATA_PATH "/data/user"
// If --rename-manifest-package is used in AAPT, this
// must be changed to correspond to the new APK package name
// See the two Android.mk files for more details.
2017-01-23 15:51:00 +01:00
#define REQUESTOR JAVA_PACKAGE_NAME
// This is used if wrapping the fragment classes and activities
2017-04-14 21:21:31 +02:00
// with classes in another package.
2017-01-23 15:51:00 +01:00
#define REQUESTOR_PREFIX JAVA_PACKAGE_NAME ".superuser"
#define REQUESTOR_CACHE_PATH "/dev/" REQUESTOR
// there's no guarantee that the db or files are actually created named as such by
// SQLiteOpenHelper, etc. Though that is the behavior as of current.
// it is up to the Android application to symlink as appropriate.
2017-01-23 15:51:00 +01:00
#define REQUESTOR_DATABASE_PATH REQUESTOR "/databases/su.db"
#define DEFAULT_SHELL "/system/bin/sh"
struct su_initiator {
2017-05-26 20:40:12 +02:00
pid_t pid;
unsigned uid;
};
struct su_request {
2017-05-26 20:40:12 +02:00
unsigned uid;
int login;
int keepenv;
char *shell;
char *command;
char **argv;
int argc;
};
struct su_user_info {
2017-05-26 20:40:12 +02:00
// the user in android userspace (multiuser)
// that invoked this action.
unsigned android_user_id;
// how su behaves with multiuser. see enum below.
int multiuser_mode;
// path to superuser directory. this is populated according
// to the multiuser mode.
// this is used to check uid/gid for protecting socket.
// this is used instead of database, as it is more likely
// to exist. db will not exist if su has never launched.
char base_path[PATH_MAX];
// path to su database. this is populated according
// to the multiuser mode.
char database_path[PATH_MAX];
};
struct su_context {
2017-05-26 20:40:12 +02:00
struct su_initiator from;
struct su_request to;
struct su_user_info user;
mode_t umask;
char sock_path[PATH_MAX];
};
typedef enum {
2017-05-26 20:40:12 +02:00
INTERACTIVE = 0,
DENY = 1,
ALLOW = 2,
} policy_t;
2017-05-07 21:08:34 +02:00
extern struct ucred su_credentials;
2017-04-14 21:21:31 +02:00
// su.c
int su_daemon_main(int argc, char **argv);
// su_client.c
int socket_create_temp(char *path, size_t len);
int socket_accept(int serv_fd);
void socket_send_request(int fd, const struct su_context *ctx);
void socket_receive_result(int fd, char *result, ssize_t result_len);
// activity.c
void app_send_result(struct su_context *ctx, policy_t policy);
void app_send_request(struct su_context *ctx);
// db.c
policy_t database_check(struct su_context *ctx);
// misc.c
void set_identity(unsigned uid);
char *get_command(const struct su_request *to);
2017-04-15 20:28:12 +02:00
int fork_zero_fucks();
#endif