2019-03-15 06:17:37 -04:00
|
|
|
#pragma once
|
2017-04-05 03:44:13 +08:00
|
|
|
|
2020-04-12 05:34:56 -07:00
|
|
|
#include <string>
|
2017-04-05 03:44:13 +08:00
|
|
|
|
2021-07-24 01:46:27 +08:00
|
|
|
// magiskinit will hex patch this constant,
|
|
|
|
// appending \0 to prevent the compiler from reusing the string for "1"
|
|
|
|
#define MAIN_SOCKET "d30138f2310a9fb9c54a3e0c21f58591\0"
|
2018-06-13 04:34:05 +08:00
|
|
|
#define JAVA_PACKAGE_NAME "com.topjohnwu.magisk"
|
2017-05-04 01:13:04 +08:00
|
|
|
#define LOGFILE "/cache/magisk.log"
|
2019-02-09 01:51:46 -05:00
|
|
|
#define UNBLOCKFILE "/dev/.magisk_unblock"
|
2018-06-03 14:43:03 +08:00
|
|
|
#define SECURE_DIR "/data/adb"
|
2019-02-12 02:14:57 -05:00
|
|
|
#define MODULEROOT SECURE_DIR "/modules"
|
|
|
|
#define MODULEUPGRADE SECURE_DIR "/modules_update"
|
2018-06-03 14:43:03 +08:00
|
|
|
#define DATABIN SECURE_DIR "/magisk"
|
|
|
|
#define MAGISKDB SECURE_DIR "/magisk.db"
|
2017-10-28 16:12:01 +08:00
|
|
|
|
2020-04-12 05:34:56 -07:00
|
|
|
// tmpfs paths
|
|
|
|
extern std::string MAGISKTMP;
|
|
|
|
#define INTLROOT ".magisk"
|
|
|
|
#define MIRRDIR INTLROOT "/mirror"
|
2020-11-02 23:20:38 -08:00
|
|
|
#define RULESDIR MIRRDIR "/sepolicy.rules"
|
2020-04-12 05:34:56 -07:00
|
|
|
#define BLOCKDIR INTLROOT "/block"
|
|
|
|
#define MODULEMNT INTLROOT "/modules"
|
|
|
|
#define BBPATH INTLROOT "/busybox"
|
|
|
|
#define ROOTOVL INTLROOT "/rootdir"
|
2021-07-22 23:35:14 +08:00
|
|
|
#define SHELLPTS INTLROOT "/pts"
|
2020-04-12 05:34:56 -07:00
|
|
|
#define ROOTMNT ROOTOVL "/.mount_list"
|
2021-09-15 01:59:43 -07:00
|
|
|
#define ZYGISKBIN INTLROOT "/zygisk"
|
Introduce new sepolicy injection mechanism
In the current implementation, Magisk will either have to recreate
all early mount implementation (for legacy SAR and rootfs devices) or
delegate early mount to first stage init (for 2SI devices) to access
required partitions for loading sepolicy. It then has to recreate the
split sepolicy loading implementation in-house, apply patches, then
dump the compiled + patched policies into monolithic format somewhere.
Finally, it patches the original init to force it to load the sepolicy
file we just created.
With the increasing complexity involved in early mount and split
sepolicy (there is even APEX module involved in the future!),
it is about time to rethink Magisk's sepolicy strategy as rebuilding
init's functionality is not scalable and easy to maintain.
In this commit, instead of building sepolicy ourselves, we mock
selinuxfs with FIFO files connected to a pre-init daemon, waiting
for the actual init process to directly write the sepolicy file into
MagiskInit. We then patch the file and load it into the kernel. Some
FIFO tricks has to be used to hijack the original init process's
control flow and prevent race conditions, details are directly in the
comments in code.
At the moment, only system-as-root (read-only root) support is added.
Support for legacy rootfs devices will come with a follow up commit.
2022-03-16 00:31:53 -07:00
|
|
|
#define SELINUXMOCK INTLROOT "/selinux"
|
2020-04-12 05:34:56 -07:00
|
|
|
|
2021-09-12 12:40:34 -07:00
|
|
|
constexpr const char *applet_names[] = { "su", "resetprop", nullptr };
|
2017-04-15 18:10:54 +08:00
|
|
|
|
2020-12-17 16:54:53 -08:00
|
|
|
#define POST_FS_DATA_WAIT_TIME 40
|
|
|
|
#define POST_FS_DATA_SCRIPT_MAX_TIME 35
|
|
|
|
|
2021-01-11 02:19:10 -08:00
|
|
|
extern int SDK_INT;
|
|
|
|
#define APP_DATA_DIR (SDK_INT >= 24 ? "/data/user_de" : "/data/user")
|
|
|
|
|
2017-04-05 06:08:53 +08:00
|
|
|
// Multi-call entrypoints
|
2018-09-27 18:26:41 -04:00
|
|
|
int magisk_main(int argc, char *argv[]);
|
2017-04-15 03:23:09 +08:00
|
|
|
int su_client_main(int argc, char *argv[]);
|
2017-04-05 06:08:53 +08:00
|
|
|
int resetprop_main(int argc, char *argv[]);
|
2021-01-06 22:21:17 -08:00
|
|
|
int app_process_main(int argc, char *argv[]);
|
2021-10-27 01:53:16 -07:00
|
|
|
int zygisk_main(int argc, char *argv[]);
|