2019-05-27 00:29:43 -07:00
|
|
|
#include <sys/sysmacros.h>
|
|
|
|
#include <sys/types.h>
|
|
|
|
#include <sys/stat.h>
|
|
|
|
#include <linux/input.h>
|
|
|
|
#include <fcntl.h>
|
2019-07-01 22:58:19 -07:00
|
|
|
#include <vector>
|
2019-05-27 00:29:43 -07:00
|
|
|
|
2020-03-09 01:50:30 -07:00
|
|
|
#include <utils.hpp>
|
2019-05-27 00:29:43 -07:00
|
|
|
|
2020-03-09 01:50:30 -07:00
|
|
|
#include "init.hpp"
|
2019-05-27 00:29:43 -07:00
|
|
|
|
|
|
|
using namespace std;
|
|
|
|
|
2020-10-26 20:46:15 -07:00
|
|
|
template<typename Func>
|
2020-10-28 04:17:34 -07:00
|
|
|
static void parse_cmdline(const Func &fn) {
|
2019-05-27 00:29:43 -07:00
|
|
|
char cmdline[4096];
|
2020-05-03 22:49:54 -07:00
|
|
|
int fd = xopen("/proc/cmdline", O_RDONLY | O_CLOEXEC);
|
2019-05-27 00:29:43 -07:00
|
|
|
cmdline[read(fd, cmdline, sizeof(cmdline))] = '\0';
|
|
|
|
close(fd);
|
|
|
|
|
|
|
|
char *tok, *eql, *tmp, *saveptr;
|
|
|
|
saveptr = cmdline;
|
|
|
|
while ((tok = strtok_r(nullptr, " \n", &saveptr)) != nullptr) {
|
|
|
|
eql = strchr(tok, '=');
|
|
|
|
if (eql) {
|
|
|
|
*eql = '\0';
|
|
|
|
if (eql[1] == '"') {
|
|
|
|
tmp = strchr(saveptr, '"');
|
|
|
|
if (tmp != nullptr) {
|
|
|
|
*tmp = '\0';
|
|
|
|
saveptr[-1] = ' ';
|
|
|
|
saveptr = tmp + 1;
|
|
|
|
eql++;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
fn(tok, eql + 1);
|
|
|
|
} else {
|
|
|
|
fn(tok, "");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
#define test_bit(bit, array) (array[bit / 8] & (1 << (bit % 8)))
|
|
|
|
|
|
|
|
static bool check_key_combo() {
|
|
|
|
uint8_t bitmask[(KEY_MAX + 1) / 8];
|
|
|
|
vector<int> events;
|
|
|
|
constexpr const char *name = "/event";
|
|
|
|
|
|
|
|
for (int minor = 64; minor < 96; ++minor) {
|
2020-05-19 04:53:16 -07:00
|
|
|
if (xmknod(name, S_IFCHR | 0444, makedev(13, minor)))
|
2019-05-27 00:29:43 -07:00
|
|
|
continue;
|
|
|
|
int fd = open(name, O_RDONLY | O_CLOEXEC);
|
|
|
|
unlink(name);
|
|
|
|
if (fd < 0)
|
|
|
|
continue;
|
|
|
|
memset(bitmask, 0, sizeof(bitmask));
|
|
|
|
ioctl(fd, EVIOCGBIT(EV_KEY, sizeof(bitmask)), bitmask);
|
|
|
|
if (test_bit(KEY_VOLUMEUP, bitmask))
|
|
|
|
events.push_back(fd);
|
2020-05-19 04:53:16 -07:00
|
|
|
else
|
|
|
|
close(fd);
|
2019-05-27 00:29:43 -07:00
|
|
|
}
|
|
|
|
if (events.empty())
|
|
|
|
return false;
|
|
|
|
|
2020-05-19 04:53:16 -07:00
|
|
|
run_finally fin([&]{ std::for_each(events.begin(), events.end(), close); });
|
2019-05-27 00:29:43 -07:00
|
|
|
|
2020-05-19 04:53:16 -07:00
|
|
|
// Return true if volume up key is held for more than 3 seconds
|
2019-05-27 00:29:43 -07:00
|
|
|
int count = 0;
|
|
|
|
for (int i = 0; i < 500; ++i) {
|
|
|
|
for (const int &fd : events) {
|
|
|
|
memset(bitmask, 0, sizeof(bitmask));
|
|
|
|
ioctl(fd, EVIOCGKEY(sizeof(bitmask)), bitmask);
|
|
|
|
if (test_bit(KEY_VOLUMEUP, bitmask)) {
|
|
|
|
count++;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (count >= 300) {
|
|
|
|
LOGD("KEY_VOLUMEUP detected: disable system-as-root\n");
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
// Check every 10ms
|
|
|
|
usleep(10000);
|
|
|
|
}
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2020-06-01 04:15:37 -07:00
|
|
|
static FILE *kmsg;
|
|
|
|
static char kmsg_buf[4096];
|
|
|
|
static int vprintk(const char *fmt, va_list ap) {
|
|
|
|
vsnprintf(kmsg_buf + 12, sizeof(kmsg_buf) - 12, fmt, ap);
|
|
|
|
return fprintf(kmsg, "%s", kmsg_buf);
|
|
|
|
}
|
|
|
|
void setup_klog() {
|
|
|
|
// Shut down first 3 fds
|
|
|
|
int fd;
|
|
|
|
if (access("/dev/null", W_OK) == 0) {
|
|
|
|
fd = xopen("/dev/null", O_RDWR | O_CLOEXEC);
|
|
|
|
} else {
|
|
|
|
mknod("/null", S_IFCHR | 0666, makedev(1, 3));
|
|
|
|
fd = xopen("/null", O_RDWR | O_CLOEXEC);
|
|
|
|
unlink("/null");
|
|
|
|
}
|
|
|
|
xdup3(fd, STDIN_FILENO, O_CLOEXEC);
|
|
|
|
xdup3(fd, STDOUT_FILENO, O_CLOEXEC);
|
|
|
|
xdup3(fd, STDERR_FILENO, O_CLOEXEC);
|
|
|
|
if (fd > STDERR_FILENO)
|
|
|
|
close(fd);
|
|
|
|
|
|
|
|
if (access("/dev/kmsg", W_OK) == 0) {
|
|
|
|
fd = xopen("/dev/kmsg", O_WRONLY | O_CLOEXEC);
|
|
|
|
} else {
|
|
|
|
mknod("/kmsg", S_IFCHR | 0666, makedev(1, 11));
|
|
|
|
fd = xopen("/kmsg", O_WRONLY | O_CLOEXEC);
|
|
|
|
unlink("/kmsg");
|
|
|
|
}
|
|
|
|
|
|
|
|
kmsg = fdopen(fd, "w");
|
|
|
|
setbuf(kmsg, nullptr);
|
|
|
|
log_cb.d = log_cb.i = log_cb.w = log_cb.e = vprintk;
|
|
|
|
log_cb.ex = nop_ex;
|
|
|
|
strcpy(kmsg_buf, "magiskinit: ");
|
2019-05-27 00:29:43 -07:00
|
|
|
|
2020-04-21 20:04:29 -07:00
|
|
|
// Disable kmsg rate limiting
|
2020-05-03 23:07:40 -07:00
|
|
|
if (FILE *rate = fopen("/proc/sys/kernel/printk_devkmsg", "w")) {
|
2020-04-21 20:04:29 -07:00
|
|
|
fprintf(rate, "on\n");
|
|
|
|
fclose(rate);
|
|
|
|
}
|
2020-06-01 04:15:37 -07:00
|
|
|
}
|
|
|
|
|
2020-12-09 20:22:17 +08:00
|
|
|
#define read_dt(name, key) \
|
|
|
|
sprintf(file_name, "%s/" name, cmd->dt_dir); \
|
|
|
|
if (access(file_name, R_OK) == 0){ \
|
|
|
|
string data = full_read(file_name); \
|
|
|
|
if (!data.empty()) { \
|
|
|
|
data.pop_back(); \
|
|
|
|
strcpy(cmd->key, data.data()); \
|
|
|
|
} \
|
|
|
|
}
|
|
|
|
|
2020-06-01 04:15:37 -07:00
|
|
|
void load_kernel_info(cmdline *cmd) {
|
|
|
|
// Get kernel data using procfs and sysfs
|
|
|
|
xmkdir("/proc", 0755);
|
|
|
|
xmount("proc", "/proc", "proc", 0, nullptr);
|
|
|
|
xmkdir("/sys", 0755);
|
|
|
|
xmount("sysfs", "/sys", "sysfs", 0, nullptr);
|
|
|
|
|
|
|
|
// Log to kernel
|
|
|
|
setup_klog();
|
2020-04-21 20:04:29 -07:00
|
|
|
|
2020-10-28 04:17:34 -07:00
|
|
|
parse_cmdline([=](string_view key, const char *value) -> void {
|
2019-05-27 00:29:43 -07:00
|
|
|
if (key == "androidboot.slot_suffix") {
|
2019-06-15 22:25:09 -07:00
|
|
|
strcpy(cmd->slot, value);
|
2019-05-27 00:29:43 -07:00
|
|
|
} else if (key == "androidboot.slot") {
|
2019-06-15 22:25:09 -07:00
|
|
|
cmd->slot[0] = '_';
|
|
|
|
strcpy(cmd->slot + 1, value);
|
2019-05-27 00:29:43 -07:00
|
|
|
} else if (key == "skip_initramfs") {
|
2019-12-06 12:02:34 -05:00
|
|
|
cmd->skip_initramfs = true;
|
Logical Resizable Android Partitions support
The way how logical partition, or "Logical Resizable Android Partitions"
as they say in AOSP source code, is setup makes it impossible to early
mount the partitions from the shared super partition with just
a few lines of code; in fact, AOSP has a whole "fs_mgr" folder which
consist of multiple complex libraries, with 15K lines of code just
to deal with the device mapper shenanigans.
In order to keep the already overly complicated MagiskInit more
managable, I chose NOT to go the route of including fs_mgr directly
into MagiskInit. Luckily, starting from Android Q, Google decided to
split init startup into 3 stages, with the first stage doing _only_
early mount. This is great news, because we can simply let the stock
init do its own thing for us, and we intercept the bootup sequence.
So the workflow can be visualized roughly below:
Magisk First Stage --> First Stage Mount --> Magisk Second Stage --+
(MagiskInit) (Original Init) (MagiskInit) +
+
+
...Rest of the boot... <-- Second Stage <-- Selinux Setup <--+
(__________________ Original Init ____________________)
The catch here is that after doing all the first stage mounting, /init
will pivot /system as root directory (/), leaving us impossible to
regain control after we hand it over. So the solution here is to patch
fstab in /first_stage_ramdisk on-the-fly to redirect /system to
/system_root, making the original init do all the hard work for
us and mount required early mount partitions, but skips the step of
switching root directory. It will also conveniently hand over execution
back to MagiskInit, which we will reuse the routine for patching
root directory in normal system-as-root situations.
2019-06-29 00:47:29 -07:00
|
|
|
} else if (key == "androidboot.force_normal_boot") {
|
|
|
|
cmd->force_normal_boot = value[0] == '1';
|
2019-05-27 00:29:43 -07:00
|
|
|
} else if (key == "androidboot.android_dt_dir") {
|
2019-06-15 22:25:09 -07:00
|
|
|
strcpy(cmd->dt_dir, value);
|
2019-05-27 00:29:43 -07:00
|
|
|
} else if (key == "androidboot.hardware") {
|
2020-05-03 22:49:54 -07:00
|
|
|
strcpy(cmd->hardware, value);
|
|
|
|
} else if (key == "androidboot.hardware.platform") {
|
|
|
|
strcpy(cmd->hardware_plat, value);
|
2020-10-08 03:04:12 -07:00
|
|
|
} else if (key == "androidboot.fstab_suffix") {
|
|
|
|
strcpy(cmd->fstab_suffix, value);
|
2019-05-27 00:29:43 -07:00
|
|
|
}
|
|
|
|
});
|
|
|
|
|
2020-12-09 20:22:17 +08:00
|
|
|
LOGD("Kernel cmdline info:\n");
|
2020-10-28 04:17:34 -07:00
|
|
|
LOGD("skip_initramfs=[%d]\n", cmd->skip_initramfs);
|
|
|
|
LOGD("force_normal_boot=[%d]\n", cmd->force_normal_boot);
|
|
|
|
LOGD("slot=[%s]\n", cmd->slot);
|
|
|
|
LOGD("dt_dir=[%s]\n", cmd->dt_dir);
|
|
|
|
LOGD("fstab_suffix=[%s]\n", cmd->fstab_suffix);
|
|
|
|
LOGD("hardware=[%s]\n", cmd->hardware);
|
|
|
|
LOGD("hardware.platform=[%s]\n", cmd->hardware_plat);
|
|
|
|
|
2020-05-03 23:07:40 -07:00
|
|
|
parse_prop_file("/.backup/.magisk", [=](auto key, auto value) -> bool {
|
|
|
|
if (key == "RECOVERYMODE" && value == "true") {
|
|
|
|
LOGD("Running in recovery mode, waiting for key...\n");
|
|
|
|
cmd->skip_initramfs = !check_key_combo();
|
|
|
|
return false;
|
|
|
|
}
|
2019-05-27 00:29:43 -07:00
|
|
|
return true;
|
|
|
|
});
|
|
|
|
|
2019-06-15 22:25:09 -07:00
|
|
|
if (cmd->dt_dir[0] == '\0')
|
|
|
|
strcpy(cmd->dt_dir, DEFAULT_DT_DIR);
|
2020-12-09 20:22:17 +08:00
|
|
|
|
|
|
|
char file_name[128];
|
|
|
|
read_dt("fstab_suffix", fstab_suffix)
|
|
|
|
read_dt("hardware", hardware)
|
|
|
|
read_dt("hardware.platform", hardware_plat)
|
|
|
|
|
|
|
|
LOGD("Device tree info:\n");
|
|
|
|
LOGD("dt_dir=[%s]\n", cmd->dt_dir);
|
|
|
|
LOGD("fstab_suffix=[%s]\n", cmd->fstab_suffix);
|
|
|
|
LOGD("hardware=[%s]\n", cmd->hardware);
|
|
|
|
LOGD("hardware.platform=[%s]\n", cmd->hardware_plat);
|
2019-05-27 00:29:43 -07:00
|
|
|
}
|
2020-09-02 21:20:00 -07:00
|
|
|
|
|
|
|
bool check_two_stage() {
|
|
|
|
if (access("/apex", F_OK) == 0)
|
|
|
|
return true;
|
2020-09-04 06:06:03 -07:00
|
|
|
if (access("/system/bin/init", F_OK) == 0)
|
|
|
|
return true;
|
|
|
|
// If we still have no indication, parse the original init and see what's up
|
|
|
|
auto init = raw_data::mmap_ro("/.backup/init");
|
2020-09-04 06:21:25 -07:00
|
|
|
return init.contains("selinux_setup");
|
2020-09-02 21:20:00 -07:00
|
|
|
}
|