You've already forked Magisk
mirror of
https://github.com/topjohnwu/Magisk.git
synced 2025-09-06 06:36:58 +00:00
365 lines
11 KiB
Rust
365 lines
11 KiB
Rust
use crate::consts::{MAGISK_FULL_VER, MAGISK_PROC_CON, MAIN_CONFIG, ROOTMNT, ROOTOVL, SECURE_DIR};
|
|
use crate::db::Sqlite3;
|
|
use crate::ffi::{
|
|
DbEntryKey, ModuleInfo, RequestCode, check_key_combo, disable_modules, exec_common_scripts,
|
|
exec_module_scripts, get_magisk_tmp, initialize_denylist, setup_magisk_env,
|
|
};
|
|
use crate::logging::{magisk_logging, setup_logfile, start_log_daemon};
|
|
use crate::mount::{clean_mounts, setup_mounts};
|
|
use crate::package::ManagerInfo;
|
|
use crate::selinux::restore_tmpcon;
|
|
use crate::su::SuInfo;
|
|
use crate::{get_prop, set_prop};
|
|
use base::libc::{O_APPEND, O_CLOEXEC, O_RDONLY, O_WRONLY};
|
|
use base::{
|
|
AtomicArc, BufReadExt, FsPathBuilder, ResultExt, Utf8CStr, Utf8CStrBuf, cstr, error, info, libc,
|
|
};
|
|
use std::fmt::Write as FmtWrite;
|
|
use std::io::{BufReader, Write};
|
|
use std::os::unix::net::UnixStream;
|
|
use std::sync::atomic::{AtomicBool, AtomicU32, Ordering};
|
|
use std::sync::{Mutex, OnceLock};
|
|
|
|
// Global magiskd singleton
|
|
pub static MAGISKD: OnceLock<MagiskD> = OnceLock::new();
|
|
|
|
#[repr(u32)]
|
|
enum BootState {
|
|
PostFsDataDone = (1 << 0),
|
|
LateStartDone = (1 << 1),
|
|
BootComplete = (1 << 2),
|
|
SafeMode = (1 << 3),
|
|
}
|
|
|
|
#[derive(Default)]
|
|
#[repr(transparent)]
|
|
struct BootStateFlags(u32);
|
|
|
|
impl BootStateFlags {
|
|
fn contains(&self, stage: BootState) -> bool {
|
|
(self.0 & stage as u32) != 0
|
|
}
|
|
|
|
fn set(&mut self, stage: BootState) {
|
|
self.0 |= stage as u32;
|
|
}
|
|
}
|
|
|
|
pub const AID_ROOT: i32 = 0;
|
|
pub const AID_SHELL: i32 = 2000;
|
|
pub const AID_APP_START: i32 = 10000;
|
|
pub const AID_APP_END: i32 = 19999;
|
|
pub const AID_USER_OFFSET: i32 = 100000;
|
|
|
|
pub const fn to_app_id(uid: i32) -> i32 {
|
|
uid % AID_USER_OFFSET
|
|
}
|
|
|
|
pub const fn to_user_id(uid: i32) -> i32 {
|
|
uid / AID_USER_OFFSET
|
|
}
|
|
|
|
#[derive(Default)]
|
|
pub struct MagiskD {
|
|
pub sql_connection: Mutex<Option<Sqlite3>>,
|
|
pub manager_info: Mutex<ManagerInfo>,
|
|
boot_stage_lock: Mutex<BootStateFlags>,
|
|
pub module_list: OnceLock<Vec<ModuleInfo>>,
|
|
pub zygiskd_sockets: Mutex<(Option<UnixStream>, Option<UnixStream>)>,
|
|
pub zygisk_enabled: AtomicBool,
|
|
pub zygote_start_count: AtomicU32,
|
|
pub cached_su_info: AtomicArc<SuInfo>,
|
|
sdk_int: i32,
|
|
pub is_emulator: bool,
|
|
is_recovery: bool,
|
|
}
|
|
|
|
impl MagiskD {
|
|
pub fn get() -> &'static MagiskD {
|
|
unsafe { MAGISKD.get().unwrap_unchecked() }
|
|
}
|
|
|
|
pub fn is_recovery(&self) -> bool {
|
|
self.is_recovery
|
|
}
|
|
|
|
pub fn zygisk_enabled(&self) -> bool {
|
|
self.zygisk_enabled.load(Ordering::Acquire)
|
|
}
|
|
|
|
pub fn sdk_int(&self) -> i32 {
|
|
self.sdk_int
|
|
}
|
|
|
|
pub fn app_data_dir(&self) -> &'static Utf8CStr {
|
|
if self.sdk_int >= 24 {
|
|
cstr!("/data/user_de")
|
|
} else {
|
|
cstr!("/data/user")
|
|
}
|
|
}
|
|
|
|
fn post_fs_data(&self) -> bool {
|
|
setup_logfile();
|
|
info!("** post-fs-data mode running");
|
|
|
|
self.preserve_stub_apk();
|
|
|
|
// Check secure dir
|
|
let secure_dir = cstr!(SECURE_DIR);
|
|
if !secure_dir.exists() {
|
|
if self.sdk_int < 24 {
|
|
secure_dir.mkdir(0o700).log_ok();
|
|
} else {
|
|
error!("* {} is not present, abort", SECURE_DIR);
|
|
return true;
|
|
}
|
|
}
|
|
|
|
self.prune_su_access();
|
|
|
|
if !setup_magisk_env() {
|
|
error!("* Magisk environment incomplete, abort");
|
|
return true;
|
|
}
|
|
|
|
// Check safe mode
|
|
let boot_cnt = self.get_db_setting(DbEntryKey::BootloopCount);
|
|
self.set_db_setting(DbEntryKey::BootloopCount, boot_cnt + 1)
|
|
.log()
|
|
.ok();
|
|
let safe_mode = boot_cnt >= 2
|
|
|| get_prop(cstr!("persist.sys.safemode"), true) == "1"
|
|
|| get_prop(cstr!("ro.sys.safemode"), false) == "1"
|
|
|| check_key_combo();
|
|
|
|
if safe_mode {
|
|
info!("* Safe mode triggered");
|
|
// Disable all modules and zygisk so next boot will be clean
|
|
disable_modules();
|
|
self.set_db_setting(DbEntryKey::ZygiskConfig, 0).log_ok();
|
|
return true;
|
|
}
|
|
|
|
exec_common_scripts(cstr!("post-fs-data"));
|
|
self.zygisk_enabled.store(
|
|
self.get_db_setting(DbEntryKey::ZygiskConfig) != 0,
|
|
Ordering::Release,
|
|
);
|
|
initialize_denylist();
|
|
setup_mounts();
|
|
let modules = self.handle_modules();
|
|
self.module_list.set(modules).ok();
|
|
clean_mounts();
|
|
|
|
false
|
|
}
|
|
|
|
fn late_start(&self) {
|
|
setup_logfile();
|
|
info!("** late_start service mode running");
|
|
|
|
exec_common_scripts(cstr!("service"));
|
|
if let Some(module_list) = self.module_list.get() {
|
|
exec_module_scripts(cstr!("service"), module_list);
|
|
}
|
|
}
|
|
|
|
fn boot_complete(&self) {
|
|
setup_logfile();
|
|
info!("** boot-complete triggered");
|
|
|
|
// Reset the bootloop counter once we have boot-complete
|
|
self.set_db_setting(DbEntryKey::BootloopCount, 0).log_ok();
|
|
|
|
// At this point it's safe to create the folder
|
|
let secure_dir = cstr!(SECURE_DIR);
|
|
if !secure_dir.exists() {
|
|
secure_dir.mkdir(0o700).log_ok();
|
|
}
|
|
|
|
self.ensure_manager();
|
|
self.zygisk_reset(true)
|
|
}
|
|
|
|
pub fn boot_stage_handler(&self, client: i32, code: i32) {
|
|
// Make sure boot stage execution is always serialized
|
|
let mut state = self.boot_stage_lock.lock().unwrap();
|
|
|
|
let code = RequestCode { repr: code };
|
|
match code {
|
|
RequestCode::POST_FS_DATA => {
|
|
if check_data() && !state.contains(BootState::PostFsDataDone) {
|
|
if self.post_fs_data() {
|
|
state.set(BootState::SafeMode);
|
|
}
|
|
state.set(BootState::PostFsDataDone);
|
|
}
|
|
unsafe { libc::close(client) };
|
|
}
|
|
RequestCode::LATE_START => {
|
|
unsafe { libc::close(client) };
|
|
if state.contains(BootState::PostFsDataDone) && !state.contains(BootState::SafeMode)
|
|
{
|
|
self.late_start();
|
|
state.set(BootState::LateStartDone);
|
|
}
|
|
}
|
|
RequestCode::BOOT_COMPLETE => {
|
|
unsafe { libc::close(client) };
|
|
if state.contains(BootState::PostFsDataDone) {
|
|
state.set(BootState::BootComplete);
|
|
self.boot_complete()
|
|
}
|
|
}
|
|
_ => {
|
|
unsafe { libc::close(client) };
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
pub fn daemon_entry() {
|
|
unsafe { libc::setsid() };
|
|
|
|
// Make sure the current context is magisk
|
|
if let Ok(mut current) = cstr!("/proc/self/attr/current").open(O_WRONLY | O_CLOEXEC) {
|
|
let con = cstr!(MAGISK_PROC_CON);
|
|
current.write_all(con.as_bytes_with_nul()).log_ok();
|
|
}
|
|
|
|
start_log_daemon();
|
|
magisk_logging();
|
|
info!("Magisk {} daemon started", MAGISK_FULL_VER);
|
|
|
|
let is_emulator = get_prop(cstr!("ro.kernel.qemu"), false) == "1"
|
|
|| get_prop(cstr!("ro.boot.qemu"), false) == "1"
|
|
|| get_prop(cstr!("ro.product.device"), false).contains("vsoc");
|
|
|
|
// Load config status
|
|
let magisk_tmp = get_magisk_tmp();
|
|
let mut tmp_path = cstr::buf::new::<64>()
|
|
.join_path(magisk_tmp)
|
|
.join_path(MAIN_CONFIG);
|
|
let mut is_recovery = false;
|
|
if let Ok(main_config) = tmp_path.open(O_RDONLY | O_CLOEXEC) {
|
|
BufReader::new(main_config).foreach_props(|key, val| {
|
|
if key == "RECOVERYMODE" {
|
|
is_recovery = val == "true";
|
|
return false;
|
|
}
|
|
true
|
|
});
|
|
}
|
|
tmp_path.truncate(magisk_tmp.len());
|
|
|
|
let mut sdk_int = -1;
|
|
if let Ok(build_prop) = cstr!("/system/build.prop").open(O_RDONLY | O_CLOEXEC) {
|
|
BufReader::new(build_prop).foreach_props(|key, val| {
|
|
if key == "ro.build.version.sdk" {
|
|
sdk_int = val.parse::<i32>().unwrap_or(-1);
|
|
return false;
|
|
}
|
|
true
|
|
});
|
|
}
|
|
if sdk_int < 0 {
|
|
// In case some devices do not store this info in build.prop, fallback to getprop
|
|
sdk_int = get_prop(cstr!("ro.build.version.sdk"), false)
|
|
.parse::<i32>()
|
|
.unwrap_or(-1);
|
|
}
|
|
info!("* Device API level: {}", sdk_int);
|
|
|
|
restore_tmpcon().log_ok();
|
|
|
|
// Escape from cgroup
|
|
let pid = unsafe { libc::getpid() };
|
|
switch_cgroup("/acct", pid);
|
|
switch_cgroup("/dev/cg2_bpf", pid);
|
|
switch_cgroup("/sys/fs/cgroup", pid);
|
|
if get_prop(cstr!("ro.config.per_app_memcg"), false) != "false" {
|
|
switch_cgroup("/dev/memcg/apps", pid);
|
|
}
|
|
|
|
// Samsung workaround #7887
|
|
if cstr!("/system_ext/app/mediatek-res/mediatek-res.apk").exists() {
|
|
set_prop(cstr!("ro.vendor.mtk_model"), cstr!("0"), false);
|
|
}
|
|
|
|
// Cleanup pre-init mounts
|
|
tmp_path.append_path(ROOTMNT);
|
|
if let Ok(mount_list) = tmp_path.open(O_RDONLY | O_CLOEXEC) {
|
|
BufReader::new(mount_list).foreach_lines(|line| {
|
|
let item = Utf8CStr::from_string(line);
|
|
item.unmount().log_ok();
|
|
true
|
|
})
|
|
}
|
|
tmp_path.truncate(magisk_tmp.len());
|
|
|
|
// Remount rootfs as read-only if requested
|
|
if std::env::var_os("REMOUNT_ROOT").is_some() {
|
|
cstr!("/").remount_mount_flags(libc::MS_RDONLY).log_ok();
|
|
unsafe { std::env::remove_var("REMOUNT_ROOT") };
|
|
}
|
|
|
|
// Remove all pre-init overlay files to free-up memory
|
|
tmp_path.append_path(ROOTOVL);
|
|
tmp_path.remove_all().log_ok();
|
|
tmp_path.truncate(magisk_tmp.len());
|
|
|
|
let magiskd = MagiskD {
|
|
sdk_int,
|
|
is_emulator,
|
|
is_recovery,
|
|
zygote_start_count: AtomicU32::new(1),
|
|
..Default::default()
|
|
};
|
|
MAGISKD.set(magiskd).ok();
|
|
}
|
|
|
|
fn switch_cgroup(cgroup: &str, pid: i32) {
|
|
let mut buf = cstr::buf::new::<64>()
|
|
.join_path(cgroup)
|
|
.join_path("cgroup.procs");
|
|
if !buf.exists() {
|
|
return;
|
|
}
|
|
if let Ok(mut file) = buf.open(O_WRONLY | O_APPEND | O_CLOEXEC) {
|
|
buf.clear();
|
|
buf.write_fmt(format_args!("{}", pid)).ok();
|
|
file.write_all(buf.as_bytes()).log_ok();
|
|
}
|
|
}
|
|
|
|
fn check_data() -> bool {
|
|
if let Ok(file) = cstr!("/proc/mounts").open(O_RDONLY | O_CLOEXEC) {
|
|
let mut mnt = false;
|
|
BufReader::new(file).foreach_lines(|line| {
|
|
if line.contains(" /data ") && !line.contains("tmpfs") {
|
|
mnt = true;
|
|
return false;
|
|
}
|
|
true
|
|
});
|
|
if !mnt {
|
|
return false;
|
|
}
|
|
let crypto = get_prop(cstr!("ro.crypto.state"), false);
|
|
return if !crypto.is_empty() {
|
|
if crypto != "encrypted" {
|
|
// Unencrypted, we can directly access data
|
|
true
|
|
} else {
|
|
// Encrypted, check whether vold is started
|
|
!get_prop(cstr!("init.svc.vold"), false).is_empty()
|
|
}
|
|
} else {
|
|
// ro.crypto.state is not set, assume it's unencrypted
|
|
true
|
|
};
|
|
}
|
|
false
|
|
}
|