2017-04-08 01:37:43 +02:00
|
|
|
#include <fcntl.h>
|
2017-04-15 20:42:24 +02:00
|
|
|
#include <pthread.h>
|
2017-11-14 22:15:58 +01:00
|
|
|
#include <signal.h>
|
2020-04-12 14:34:56 +02:00
|
|
|
#include <libgen.h>
|
2017-04-08 01:37:43 +02:00
|
|
|
#include <sys/un.h>
|
|
|
|
#include <sys/types.h>
|
2017-11-27 21:43:46 +01:00
|
|
|
#include <sys/mount.h>
|
2020-05-10 09:48:41 +02:00
|
|
|
#include <android/log.h>
|
2017-04-08 01:37:43 +02:00
|
|
|
|
2020-03-09 09:50:30 +01:00
|
|
|
#include <magisk.hpp>
|
|
|
|
#include <utils.hpp>
|
|
|
|
#include <daemon.hpp>
|
|
|
|
#include <selinux.hpp>
|
|
|
|
#include <db.hpp>
|
|
|
|
#include <resetprop.hpp>
|
2020-06-01 13:15:37 +02:00
|
|
|
#include <flags.hpp>
|
2017-04-15 20:42:24 +02:00
|
|
|
|
2020-04-12 14:34:56 +02:00
|
|
|
using namespace std;
|
|
|
|
|
2019-01-20 23:52:19 +01:00
|
|
|
int SDK_INT = -1;
|
2019-03-30 11:49:29 +01:00
|
|
|
bool RECOVERY_MODE = false;
|
2020-04-12 14:34:56 +02:00
|
|
|
string MAGISKTMP;
|
2020-05-18 14:21:47 +02:00
|
|
|
int DAEMON_STATE = STATE_UNKNOWN;
|
2020-05-18 14:18:49 +02:00
|
|
|
|
2019-09-17 06:21:07 +02:00
|
|
|
static struct stat self_st;
|
2019-01-20 23:52:19 +01:00
|
|
|
|
2020-05-18 14:18:49 +02:00
|
|
|
static bool verify_client(int client, pid_t pid) {
|
2019-02-09 21:02:46 +01:00
|
|
|
// Verify caller is the same as server
|
|
|
|
char path[32];
|
|
|
|
sprintf(path, "/proc/%d/exe", pid);
|
2019-09-13 09:14:21 +02:00
|
|
|
struct stat st;
|
2020-05-18 14:18:49 +02:00
|
|
|
return !(stat(path, &st) || st.st_dev != self_st.st_dev || st.st_ino != self_st.st_ino);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void request_handler(int client, int req_code, ucred cred) {
|
|
|
|
switch (req_code) {
|
|
|
|
case MAGISKHIDE:
|
|
|
|
magiskhide_handler(client);
|
|
|
|
break;
|
|
|
|
case SUPERUSER:
|
|
|
|
su_daemon_handler(client, &cred);
|
|
|
|
break;
|
|
|
|
case POST_FS_DATA:
|
|
|
|
post_fs_data(client);
|
|
|
|
break;
|
|
|
|
case LATE_START:
|
|
|
|
late_start(client);
|
|
|
|
break;
|
|
|
|
case BOOT_COMPLETE:
|
|
|
|
boot_complete(client);
|
|
|
|
break;
|
|
|
|
case SQLITE_CMD:
|
|
|
|
exec_sql(client);
|
|
|
|
break;
|
|
|
|
case REMOVE_MODULES:
|
2020-10-12 03:30:03 +02:00
|
|
|
remove_modules();
|
2020-05-18 14:18:49 +02:00
|
|
|
write_int(client, 0);
|
2019-02-09 21:02:46 +01:00
|
|
|
close(client);
|
2020-05-18 14:18:49 +02:00
|
|
|
reboot();
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
close(client);
|
|
|
|
break;
|
2019-02-09 21:02:46 +01:00
|
|
|
}
|
2018-10-13 03:46:09 +02:00
|
|
|
}
|
|
|
|
|
2020-05-18 14:18:49 +02:00
|
|
|
static void handle_request(int client) {
|
|
|
|
int req_code;
|
2017-05-05 10:13:26 +02:00
|
|
|
|
2020-05-18 14:18:49 +02:00
|
|
|
// Verify client credentials
|
|
|
|
ucred cred;
|
|
|
|
get_client_cred(client, &cred);
|
|
|
|
if (cred.uid != 0 && !verify_client(client, cred.pid))
|
|
|
|
goto shortcut;
|
2017-05-05 10:13:26 +02:00
|
|
|
|
2020-05-18 14:18:49 +02:00
|
|
|
// Check client permissions
|
|
|
|
req_code = read_int(client);
|
|
|
|
switch (req_code) {
|
2018-11-01 19:08:33 +01:00
|
|
|
case MAGISKHIDE:
|
2017-05-05 10:13:26 +02:00
|
|
|
case POST_FS_DATA:
|
|
|
|
case LATE_START:
|
2018-08-09 08:52:44 +02:00
|
|
|
case BOOT_COMPLETE:
|
2018-11-16 09:20:30 +01:00
|
|
|
case SQLITE_CMD:
|
2020-04-19 12:33:25 +02:00
|
|
|
case GET_PATH:
|
2020-05-18 14:18:49 +02:00
|
|
|
if (cred.uid != 0) {
|
2017-05-05 10:13:26 +02:00
|
|
|
write_int(client, ROOT_REQUIRED);
|
2020-05-18 14:18:49 +02:00
|
|
|
goto shortcut;
|
2017-05-05 10:13:26 +02:00
|
|
|
}
|
2020-04-30 10:26:50 +02:00
|
|
|
break;
|
|
|
|
case REMOVE_MODULES:
|
2020-05-18 14:18:49 +02:00
|
|
|
if (cred.uid != UID_SHELL && cred.uid != UID_ROOT) {
|
2020-04-30 10:26:50 +02:00
|
|
|
write_int(client, 1);
|
2020-05-18 14:18:49 +02:00
|
|
|
goto shortcut;
|
2020-04-30 10:26:50 +02:00
|
|
|
}
|
|
|
|
break;
|
2017-05-05 10:13:26 +02:00
|
|
|
}
|
|
|
|
|
2020-05-18 14:18:49 +02:00
|
|
|
switch (req_code) {
|
|
|
|
// In case of init trigger launches, set the corresponding states
|
2017-04-15 13:02:07 +02:00
|
|
|
case POST_FS_DATA:
|
2020-05-18 14:21:47 +02:00
|
|
|
DAEMON_STATE = STATE_POST_FS_DATA;
|
2017-04-15 13:02:07 +02:00
|
|
|
break;
|
2017-04-15 20:42:24 +02:00
|
|
|
case LATE_START:
|
2020-05-18 14:21:47 +02:00
|
|
|
DAEMON_STATE = STATE_LATE_START;
|
2017-04-15 13:02:07 +02:00
|
|
|
break;
|
2018-08-09 08:52:44 +02:00
|
|
|
case BOOT_COMPLETE:
|
2020-05-18 14:21:47 +02:00
|
|
|
DAEMON_STATE = STATE_BOOT_COMPLETE;
|
2019-09-13 09:14:21 +02:00
|
|
|
break;
|
2020-05-18 14:18:49 +02:00
|
|
|
|
|
|
|
// Simple requests to query daemon info
|
|
|
|
case CHECK_VERSION:
|
|
|
|
write_string(client, MAGISK_VERSION ":MAGISK");
|
|
|
|
goto shortcut;
|
|
|
|
case CHECK_VERSION_CODE:
|
|
|
|
write_int(client, MAGISK_VER_CODE);
|
|
|
|
goto shortcut;
|
2020-04-12 14:34:56 +02:00
|
|
|
case GET_PATH:
|
|
|
|
write_string(client, MAGISKTMP.data());
|
2020-05-18 14:18:49 +02:00
|
|
|
goto shortcut;
|
|
|
|
case DO_NOTHING:
|
|
|
|
goto shortcut;
|
2017-04-09 01:25:10 +02:00
|
|
|
}
|
2020-05-18 14:18:49 +02:00
|
|
|
|
|
|
|
// Create new thread to handle complex requests
|
|
|
|
new_daemon_thread(std::bind(&request_handler, client, req_code, cred));
|
|
|
|
return;
|
|
|
|
|
|
|
|
shortcut:
|
|
|
|
close(client);
|
2017-04-08 01:37:43 +02:00
|
|
|
}
|
|
|
|
|
2020-06-01 13:15:37 +02:00
|
|
|
#define vlog __android_log_vprint
|
|
|
|
|
2020-05-10 09:48:41 +02:00
|
|
|
static void android_logging() {
|
|
|
|
static constexpr char TAG[] = "Magisk";
|
2020-06-01 13:15:37 +02:00
|
|
|
log_cb.d = [](auto fmt, auto ap){ return vlog(ANDROID_LOG_DEBUG, TAG, fmt, ap); };
|
|
|
|
log_cb.i = [](auto fmt, auto ap){ return vlog(ANDROID_LOG_INFO, TAG, fmt, ap); };
|
|
|
|
log_cb.w = [](auto fmt, auto ap){ return vlog(ANDROID_LOG_WARN, TAG, fmt, ap); };
|
|
|
|
log_cb.e = [](auto fmt, auto ap){ return vlog(ANDROID_LOG_ERROR, TAG, fmt, ap); };
|
2020-05-10 09:48:41 +02:00
|
|
|
log_cb.ex = nop_ex;
|
|
|
|
}
|
|
|
|
|
2020-04-19 12:33:25 +02:00
|
|
|
static void daemon_entry(int ppid) {
|
2018-09-27 09:11:10 +02:00
|
|
|
android_logging();
|
2019-11-26 01:07:06 +01:00
|
|
|
|
|
|
|
int fd = xopen("/dev/null", O_WRONLY);
|
|
|
|
xdup2(fd, STDOUT_FILENO);
|
|
|
|
xdup2(fd, STDERR_FILENO);
|
|
|
|
if (fd > STDERR_FILENO)
|
|
|
|
close(fd);
|
|
|
|
fd = xopen("/dev/zero", O_RDONLY);
|
|
|
|
xdup2(fd, STDIN_FILENO);
|
|
|
|
if (fd > STDERR_FILENO)
|
|
|
|
close(fd);
|
|
|
|
|
2017-11-22 09:12:08 +01:00
|
|
|
setsid();
|
2018-11-04 09:38:06 +01:00
|
|
|
setcon("u:r:" SEPOL_PROC_DOMAIN ":s0");
|
2020-04-12 14:34:56 +02:00
|
|
|
|
2020-07-06 10:13:50 +02:00
|
|
|
LOGI(NAME_WITH_VER(Magisk) " daemon started\n");
|
|
|
|
|
2020-04-19 12:33:25 +02:00
|
|
|
// Make sure ppid is not in acct
|
|
|
|
char src[64], dest[64];
|
|
|
|
sprintf(src, "/acct/uid_0/pid_%d", ppid);
|
|
|
|
sprintf(dest, "/acct/uid_0/pid_%d", getpid());
|
|
|
|
rename(src, dest);
|
|
|
|
|
2020-04-12 14:34:56 +02:00
|
|
|
// Get self stat
|
2020-04-19 12:33:25 +02:00
|
|
|
xreadlink("/proc/self/exe", src, sizeof(src));
|
|
|
|
MAGISKTMP = dirname(src);
|
2020-04-12 14:34:56 +02:00
|
|
|
xstat("/proc/self/exe", &self_st);
|
|
|
|
|
2019-01-20 23:52:19 +01:00
|
|
|
// Get API level
|
|
|
|
parse_prop_file("/system/build.prop", [](auto key, auto val) -> bool {
|
2019-03-06 02:27:09 +01:00
|
|
|
if (key == "ro.build.version.sdk") {
|
2019-03-08 02:31:35 +01:00
|
|
|
SDK_INT = parse_int(val);
|
2019-01-20 23:52:19 +01:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
return true;
|
|
|
|
});
|
2020-02-03 05:58:59 +01:00
|
|
|
if (SDK_INT < 0) {
|
|
|
|
// In case some devices do not store this info in build.prop, fallback to getprop
|
|
|
|
auto sdk = getprop("ro.build.version.sdk");
|
|
|
|
if (!sdk.empty()) {
|
|
|
|
SDK_INT = parse_int(sdk);
|
|
|
|
}
|
|
|
|
}
|
2020-04-19 12:33:25 +02:00
|
|
|
LOGI("* Device API level: %d\n", SDK_INT);
|
2019-01-20 23:52:19 +01:00
|
|
|
|
2020-07-06 10:13:50 +02:00
|
|
|
restore_tmpcon();
|
|
|
|
|
|
|
|
// SAR cleanups
|
|
|
|
auto mount_list = MAGISKTMP + "/" ROOTMNT;
|
|
|
|
if (access(mount_list.data(), F_OK) == 0) {
|
|
|
|
file_readline(true, mount_list.data(), [](string_view line) -> bool {
|
|
|
|
umount2(line.data(), MNT_DETACH);
|
|
|
|
return true;
|
|
|
|
});
|
|
|
|
}
|
|
|
|
unlink("/dev/.se");
|
|
|
|
|
2019-03-30 11:49:29 +01:00
|
|
|
// Load config status
|
2020-04-12 14:34:56 +02:00
|
|
|
auto config = MAGISKTMP + "/" INTLROOT "/config";
|
|
|
|
parse_prop_file(config.data(), [](auto key, auto val) -> bool {
|
2019-03-30 11:49:29 +01:00
|
|
|
if (key == "RECOVERYMODE" && val == "true")
|
|
|
|
RECOVERY_MODE = true;
|
|
|
|
return true;
|
|
|
|
});
|
|
|
|
|
2017-10-14 15:08:05 +02:00
|
|
|
struct sockaddr_un sun;
|
2018-10-12 06:50:47 +02:00
|
|
|
socklen_t len = setup_sockaddr(&sun, MAIN_SOCKET);
|
2018-09-16 10:16:18 +02:00
|
|
|
fd = xsocket(AF_LOCAL, SOCK_STREAM | SOCK_CLOEXEC, 0);
|
|
|
|
if (xbind(fd, (struct sockaddr*) &sun, len))
|
2017-11-27 20:42:48 +01:00
|
|
|
exit(1);
|
2017-10-14 15:08:05 +02:00
|
|
|
xlisten(fd, 10);
|
2017-04-08 01:37:43 +02:00
|
|
|
|
|
|
|
// Change process name
|
2019-02-15 10:31:39 +01:00
|
|
|
set_nice_name("magiskd");
|
2017-04-09 01:25:10 +02:00
|
|
|
|
2019-02-10 10:18:50 +01:00
|
|
|
// Block all signals
|
2018-07-02 19:38:19 +02:00
|
|
|
sigset_t block_set;
|
2019-02-10 10:18:50 +01:00
|
|
|
sigfillset(&block_set);
|
2019-01-20 23:52:19 +01:00
|
|
|
pthread_sigmask(SIG_SETMASK, &block_set, nullptr);
|
2018-07-02 19:38:19 +02:00
|
|
|
|
2017-05-07 21:11:14 +02:00
|
|
|
// Loop forever to listen for requests
|
2019-02-14 23:36:18 +01:00
|
|
|
for (;;) {
|
2019-09-19 06:13:42 +02:00
|
|
|
int client = xaccept4(fd, nullptr, nullptr, SOCK_CLOEXEC);
|
2020-05-18 14:18:49 +02:00
|
|
|
handle_request(client);
|
2017-04-08 01:37:43 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-03-04 22:45:18 +01:00
|
|
|
int connect_daemon(bool create) {
|
2017-04-08 01:37:43 +02:00
|
|
|
struct sockaddr_un sun;
|
2018-10-12 06:50:47 +02:00
|
|
|
socklen_t len = setup_sockaddr(&sun, MAIN_SOCKET);
|
|
|
|
int fd = xsocket(AF_LOCAL, SOCK_STREAM | SOCK_CLOEXEC, 0);
|
|
|
|
if (connect(fd, (struct sockaddr*) &sun, len)) {
|
2019-03-04 22:45:18 +01:00
|
|
|
if (!create || getuid() != UID_ROOT || getgid() != UID_ROOT) {
|
|
|
|
LOGE("No daemon is currently running!\n");
|
2017-10-13 18:08:12 +02:00
|
|
|
exit(1);
|
2017-10-08 16:00:22 +02:00
|
|
|
}
|
|
|
|
|
2019-10-31 06:57:47 +01:00
|
|
|
int ppid = getpid();
|
2018-10-12 06:50:47 +02:00
|
|
|
LOGD("client: launching new main daemon process\n");
|
2018-04-29 06:17:28 +02:00
|
|
|
if (fork_dont_care() == 0) {
|
2018-10-12 06:50:47 +02:00
|
|
|
close(fd);
|
2020-04-19 12:33:25 +02:00
|
|
|
daemon_entry(ppid);
|
2017-10-08 16:00:22 +02:00
|
|
|
}
|
|
|
|
|
2018-10-12 06:50:47 +02:00
|
|
|
while (connect(fd, (struct sockaddr*) &sun, len))
|
2017-11-27 20:42:48 +01:00
|
|
|
usleep(10000);
|
2017-04-08 01:37:43 +02:00
|
|
|
}
|
|
|
|
return fd;
|
|
|
|
}
|