2020-12-06 11:07:47 +00:00
|
|
|
#include <sys/mount.h>
|
2019-05-27 07:29:43 +00:00
|
|
|
#include <sys/sysmacros.h>
|
2020-05-04 05:49:54 +00:00
|
|
|
#include <libgen.h>
|
2019-05-27 07:29:43 +00:00
|
|
|
|
2020-03-09 08:50:30 +00:00
|
|
|
#include <utils.hpp>
|
|
|
|
#include <selinux.hpp>
|
|
|
|
#include <magisk.hpp>
|
2019-05-27 07:29:43 +00:00
|
|
|
|
2020-03-09 08:50:30 +00:00
|
|
|
#include "init.hpp"
|
2019-05-27 07:29:43 +00:00
|
|
|
|
|
|
|
using namespace std;
|
|
|
|
|
2019-05-27 09:55:46 +00:00
|
|
|
struct devinfo {
|
2020-12-31 06:11:24 +00:00
|
|
|
int major;
|
|
|
|
int minor;
|
|
|
|
char devname[32];
|
|
|
|
char partname[32];
|
|
|
|
char dmname[32];
|
2019-05-27 09:55:46 +00:00
|
|
|
};
|
|
|
|
|
|
|
|
static vector<devinfo> dev_list;
|
|
|
|
|
|
|
|
static void parse_device(devinfo *dev, const char *uevent) {
|
2020-12-31 06:11:24 +00:00
|
|
|
dev->partname[0] = '\0';
|
|
|
|
parse_prop_file(uevent, [=](string_view key, string_view value) -> bool {
|
|
|
|
if (key == "MAJOR")
|
|
|
|
dev->major = parse_int(value.data());
|
|
|
|
else if (key == "MINOR")
|
|
|
|
dev->minor = parse_int(value.data());
|
|
|
|
else if (key == "DEVNAME")
|
|
|
|
strcpy(dev->devname, value.data());
|
|
|
|
else if (key == "PARTNAME")
|
|
|
|
strcpy(dev->partname, value.data());
|
|
|
|
|
|
|
|
return true;
|
|
|
|
});
|
2019-05-27 09:55:46 +00:00
|
|
|
}
|
2019-05-27 07:29:43 +00:00
|
|
|
|
|
|
|
static void collect_devices() {
|
2020-12-31 06:11:24 +00:00
|
|
|
char path[128];
|
|
|
|
devinfo dev{};
|
|
|
|
if (auto dir = xopen_dir("/sys/dev/block"); dir) {
|
|
|
|
for (dirent *entry; (entry = readdir(dir.get()));) {
|
|
|
|
if (entry->d_name == "."sv || entry->d_name == ".."sv)
|
|
|
|
continue;
|
|
|
|
sprintf(path, "/sys/dev/block/%s/uevent", entry->d_name);
|
|
|
|
parse_device(&dev, path);
|
|
|
|
sprintf(path, "/sys/dev/block/%s/dm/name", entry->d_name);
|
|
|
|
if (access(path, F_OK) == 0) {
|
|
|
|
auto name = rtrim(full_read(path));
|
|
|
|
strcpy(dev.dmname, name.data());
|
|
|
|
}
|
|
|
|
dev_list.push_back(dev);
|
|
|
|
}
|
|
|
|
}
|
2019-05-27 07:29:43 +00:00
|
|
|
}
|
|
|
|
|
2020-05-04 05:49:54 +00:00
|
|
|
static struct {
|
2020-12-31 06:11:24 +00:00
|
|
|
char partname[32];
|
|
|
|
char block_dev[64];
|
2020-05-04 05:49:54 +00:00
|
|
|
} blk_info;
|
|
|
|
|
2020-10-28 11:17:34 +00:00
|
|
|
static int64_t setup_block(bool write_block) {
|
2020-12-31 06:11:24 +00:00
|
|
|
if (dev_list.empty())
|
|
|
|
collect_devices();
|
|
|
|
xmkdir("/dev", 0755);
|
|
|
|
xmkdir("/dev/block", 0755);
|
|
|
|
|
|
|
|
for (int tries = 0; tries < 3; ++tries) {
|
|
|
|
for (auto &dev : dev_list) {
|
|
|
|
if (strcasecmp(dev.partname, blk_info.partname) == 0)
|
|
|
|
LOGD("Setup %s: [%s] (%d, %d)\n", dev.partname, dev.devname, dev.major, dev.minor);
|
|
|
|
else if (strcasecmp(dev.dmname, blk_info.partname) == 0)
|
|
|
|
LOGD("Setup %s: [%s] (%d, %d)\n", dev.dmname, dev.devname, dev.major, dev.minor);
|
|
|
|
else
|
|
|
|
continue;
|
|
|
|
|
|
|
|
if (write_block) {
|
|
|
|
sprintf(blk_info.block_dev, "/dev/block/%s", dev.devname);
|
|
|
|
}
|
|
|
|
dev_t rdev = makedev(dev.major, dev.minor);
|
2021-01-25 08:19:10 +00:00
|
|
|
xmknod(blk_info.block_dev, S_IFBLK | 0600, rdev);
|
2020-12-31 06:11:24 +00:00
|
|
|
return rdev;
|
|
|
|
}
|
|
|
|
// Wait 10ms and try again
|
|
|
|
usleep(10000);
|
|
|
|
dev_list.clear();
|
|
|
|
collect_devices();
|
|
|
|
}
|
|
|
|
|
|
|
|
// The requested partname does not exist
|
|
|
|
return -1;
|
2019-05-27 07:29:43 +00:00
|
|
|
}
|
|
|
|
|
2019-06-30 18:39:13 +00:00
|
|
|
static bool is_lnk(const char *name) {
|
2020-12-31 06:11:24 +00:00
|
|
|
struct stat st;
|
|
|
|
if (lstat(name, &st))
|
|
|
|
return false;
|
|
|
|
return S_ISLNK(st.st_mode);
|
2019-06-30 18:39:13 +00:00
|
|
|
}
|
|
|
|
|
2020-05-04 05:49:54 +00:00
|
|
|
#define read_info(val) \
|
|
|
|
if (access(#val, F_OK) == 0) {\
|
2020-12-31 06:11:24 +00:00
|
|
|
entry.val = rtrim(full_read(#val)); \
|
2020-05-04 05:49:54 +00:00
|
|
|
}
|
|
|
|
|
Force init to load fstab from file in 2SI
Patching DTBs is proven to be difficult and problematic as there are
tons of different formats out there. Adding support for all the formats
in magiskboot has been quite an headache in the past year, and it still
definitely does not cover all possible cases of them out there.
There is another issue: fake dt fstabs. Some super old devices do not
have device trees in their boot images, so some custom ROM developers
had came up with a "genius" solution: hardcode fstab entries directly
in the kernel source code and create fake device tree nodes even if
Android 10+ init can graciously take fstab files instead (-_-) 。。。
And there is YET another issue: DTBs are not always in boot images!
Google is crazy enough to litter DTBs all over the place, it is like
they cannot make up their minds (duh). This means the dt fstabs can be
either concatnated after the kernel (1), in the DTB partition (2), in
the DTBO partition (3), in the recovery_dtbo section in boot images (4),
or in the dtb section in boot images (5). FIVE f**king places, how can
anyone keep up with that!
With Android 10+ that uses 2 stage inits, it is crutual for Magisk to
be able to modify fstab mount points in order to let the original init
mount partitions for us, but NOT switch root and continue booting. For
devices using dt for early mount fstab, we used to patch the DTB at
install time with magiskboot. However these changes are permanent and
cannot be restored back at reinstallation.
With this commit, Magisk will read dt fstabs and write them to ramdisk
at boot time. And in that case, the init binary will also be patched
to force it to NEVER use fstabs in device-tree. By doing so, we can
unify ramdisk based 2SI fstab patching as basically we are just patching
fstab files. This also means we can manipulate fstab whatever Magisk
needs in the future without the need to going through the headache that
is patching DTBs at installation.
2020-05-04 09:21:51 +00:00
|
|
|
void BaseInit::read_dt_fstab(vector<fstab_entry> &fstab) {
|
2021-10-26 07:35:55 +00:00
|
|
|
if (access(config->dt_dir, F_OK) != 0)
|
2020-12-31 06:11:24 +00:00
|
|
|
return;
|
|
|
|
|
|
|
|
char cwd[128];
|
|
|
|
getcwd(cwd, sizeof(cwd));
|
2021-10-26 07:35:55 +00:00
|
|
|
chdir(config->dt_dir);
|
2020-12-31 06:11:24 +00:00
|
|
|
run_finally cd([&]{ chdir(cwd); });
|
|
|
|
|
|
|
|
if (access("fstab", F_OK) != 0)
|
|
|
|
return;
|
|
|
|
chdir("fstab");
|
|
|
|
|
|
|
|
// Make sure dt fstab is enabled
|
|
|
|
if (access("status", F_OK) == 0) {
|
|
|
|
auto status = rtrim(full_read("status"));
|
|
|
|
if (status != "okay" && status != "ok")
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
auto dir = xopen_dir(".");
|
|
|
|
for (dirent *dp; (dp = xreaddir(dir.get()));) {
|
|
|
|
if (dp->d_type != DT_DIR)
|
|
|
|
continue;
|
|
|
|
chdir(dp->d_name);
|
|
|
|
run_finally f([]{ chdir(".."); });
|
|
|
|
|
|
|
|
if (access("status", F_OK) == 0) {
|
|
|
|
auto status = rtrim(full_read("status"));
|
|
|
|
if (status != "okay" && status != "ok")
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
fstab_entry entry;
|
|
|
|
|
|
|
|
read_info(dev);
|
|
|
|
read_info(mnt_point) else {
|
|
|
|
entry.mnt_point = "/";
|
|
|
|
entry.mnt_point += dp->d_name;
|
|
|
|
}
|
|
|
|
read_info(type);
|
|
|
|
read_info(mnt_flags);
|
|
|
|
read_info(fsmgr_flags);
|
|
|
|
|
|
|
|
fstab.emplace_back(std::move(entry));
|
|
|
|
}
|
2019-05-27 07:29:43 +00:00
|
|
|
}
|
|
|
|
|
2020-10-27 03:46:15 +00:00
|
|
|
void MagiskInit::mount_with_dt() {
|
2020-12-31 06:11:24 +00:00
|
|
|
vector<fstab_entry> fstab;
|
|
|
|
read_dt_fstab(fstab);
|
|
|
|
for (const auto &entry : fstab) {
|
|
|
|
if (is_lnk(entry.mnt_point.data()))
|
|
|
|
continue;
|
|
|
|
// Derive partname from dev
|
2021-10-26 07:35:55 +00:00
|
|
|
sprintf(blk_info.partname, "%s%s", basename(entry.dev.data()), config->slot);
|
2020-12-31 06:11:24 +00:00
|
|
|
setup_block(true);
|
|
|
|
xmkdir(entry.mnt_point.data(), 0755);
|
|
|
|
xmount(blk_info.block_dev, entry.mnt_point.data(), entry.type.data(), MS_RDONLY, nullptr);
|
|
|
|
mount_list.push_back(entry.mnt_point);
|
|
|
|
}
|
2019-05-27 07:29:43 +00:00
|
|
|
}
|
|
|
|
|
2019-06-23 22:14:47 +00:00
|
|
|
static void switch_root(const string &path) {
|
2020-12-31 06:11:24 +00:00
|
|
|
LOGD("Switch root to %s\n", path.data());
|
|
|
|
int root = xopen("/", O_RDONLY);
|
|
|
|
vector<string> mounts;
|
|
|
|
parse_mnt("/proc/mounts", [&](mntent *me) {
|
|
|
|
// Skip root and self
|
|
|
|
if (me->mnt_dir == "/"sv || me->mnt_dir == path)
|
|
|
|
return true;
|
|
|
|
// Do not include subtrees
|
|
|
|
for (const auto &m : mounts) {
|
|
|
|
if (strncmp(me->mnt_dir, m.data(), m.length()) == 0 && me->mnt_dir[m.length()] == '/')
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
mounts.emplace_back(me->mnt_dir);
|
|
|
|
return true;
|
|
|
|
});
|
|
|
|
for (auto &dir : mounts) {
|
|
|
|
auto new_path = path + dir;
|
2021-08-14 05:29:12 +00:00
|
|
|
xmkdir(new_path.data(), 0755);
|
2020-12-31 06:11:24 +00:00
|
|
|
xmount(dir.data(), new_path.data(), nullptr, MS_MOVE, nullptr);
|
|
|
|
}
|
|
|
|
chdir(path.data());
|
|
|
|
xmount(path.data(), "/", nullptr, MS_MOVE, nullptr);
|
|
|
|
chroot(".");
|
|
|
|
|
|
|
|
LOGD("Cleaning rootfs\n");
|
|
|
|
frm_rf(root);
|
2019-06-23 22:14:47 +00:00
|
|
|
}
|
|
|
|
|
2020-11-03 07:20:38 +00:00
|
|
|
void MagiskInit::mount_rules_dir(const char *dev_base, const char *mnt_base) {
|
2020-12-31 06:11:24 +00:00
|
|
|
char path[128];
|
|
|
|
xrealpath(dev_base, blk_info.block_dev);
|
|
|
|
xrealpath(mnt_base, path);
|
|
|
|
char *b = blk_info.block_dev + strlen(blk_info.block_dev);
|
|
|
|
char *p = path + strlen(path);
|
|
|
|
|
|
|
|
auto do_mount = [&](const char *type) -> bool {
|
|
|
|
xmkdir(path, 0755);
|
|
|
|
bool success = xmount(blk_info.block_dev, path, type, 0, nullptr) == 0;
|
|
|
|
if (success)
|
|
|
|
mount_list.emplace_back(path);
|
|
|
|
return success;
|
|
|
|
};
|
|
|
|
|
|
|
|
// First try userdata
|
|
|
|
strcpy(blk_info.partname, "userdata");
|
|
|
|
strcpy(b, "/data");
|
|
|
|
strcpy(p, "/data");
|
|
|
|
if (setup_block(false) < 0) {
|
|
|
|
// Try NVIDIA naming scheme
|
|
|
|
strcpy(blk_info.partname, "UDA");
|
|
|
|
if (setup_block(false) < 0)
|
|
|
|
goto cache;
|
|
|
|
}
|
2021-01-15 10:23:53 +00:00
|
|
|
// WARNING: DO NOT ATTEMPT TO MOUNT F2FS AS IT MAY CRASH THE KERNEL
|
|
|
|
// Failure means either f2fs, FDE, or metadata encryption
|
|
|
|
if (!do_mount("ext4"))
|
2020-12-31 06:11:24 +00:00
|
|
|
goto cache;
|
|
|
|
|
|
|
|
strcpy(p, "/data/unencrypted");
|
2021-03-13 14:13:39 +00:00
|
|
|
if (xaccess(path, F_OK) == 0) {
|
2020-12-31 06:11:24 +00:00
|
|
|
// FBE, need to use an unencrypted path
|
|
|
|
custom_rules_dir = path + "/magisk"s;
|
|
|
|
} else {
|
|
|
|
// Skip if /data/adb does not exist
|
2021-03-13 14:13:39 +00:00
|
|
|
strcpy(p, SECURE_DIR);
|
|
|
|
if (xaccess(path, F_OK) != 0)
|
2020-12-31 06:11:24 +00:00
|
|
|
return;
|
2021-03-13 14:13:39 +00:00
|
|
|
strcpy(p, MODULEROOT);
|
|
|
|
if (xaccess(path, F_OK) != 0) {
|
|
|
|
goto cache;
|
|
|
|
}
|
2020-12-31 06:11:24 +00:00
|
|
|
// Unencrypted, directly use module paths
|
2021-03-13 14:13:39 +00:00
|
|
|
custom_rules_dir = string(path);
|
2020-12-31 06:11:24 +00:00
|
|
|
}
|
|
|
|
goto success;
|
2020-11-03 07:20:38 +00:00
|
|
|
|
|
|
|
cache:
|
2020-12-31 06:11:24 +00:00
|
|
|
// Fallback to cache
|
|
|
|
strcpy(blk_info.partname, "cache");
|
|
|
|
strcpy(b, "/cache");
|
|
|
|
strcpy(p, "/cache");
|
|
|
|
if (setup_block(false) < 0) {
|
|
|
|
// Try NVIDIA naming scheme
|
|
|
|
strcpy(blk_info.partname, "CAC");
|
|
|
|
if (setup_block(false) < 0)
|
|
|
|
goto metadata;
|
|
|
|
}
|
|
|
|
if (!do_mount("ext4"))
|
|
|
|
goto metadata;
|
|
|
|
custom_rules_dir = path + "/magisk"s;
|
|
|
|
goto success;
|
2020-11-03 07:20:38 +00:00
|
|
|
|
|
|
|
metadata:
|
2020-12-31 06:11:24 +00:00
|
|
|
// Fallback to metadata
|
|
|
|
strcpy(blk_info.partname, "metadata");
|
|
|
|
strcpy(b, "/metadata");
|
|
|
|
strcpy(p, "/metadata");
|
|
|
|
if (setup_block(false) < 0 || !do_mount("ext4"))
|
|
|
|
goto persist;
|
|
|
|
custom_rules_dir = path + "/magisk"s;
|
|
|
|
goto success;
|
2020-11-03 07:20:38 +00:00
|
|
|
|
|
|
|
persist:
|
2020-12-31 06:11:24 +00:00
|
|
|
// Fallback to persist
|
|
|
|
strcpy(blk_info.partname, "persist");
|
|
|
|
strcpy(b, "/persist");
|
|
|
|
strcpy(p, "/persist");
|
|
|
|
if (setup_block(false) < 0 || !do_mount("ext4"))
|
|
|
|
return;
|
|
|
|
custom_rules_dir = path + "/magisk"s;
|
2020-11-03 07:20:38 +00:00
|
|
|
|
|
|
|
success:
|
2020-12-31 06:11:24 +00:00
|
|
|
// Create symlinks so we don't need to go through this logic again
|
|
|
|
strcpy(p, "/sepolicy.rules");
|
|
|
|
xsymlink(custom_rules_dir.data(), path);
|
2020-01-08 14:42:54 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
void RootFSInit::early_mount() {
|
2021-01-13 06:50:55 +00:00
|
|
|
self = mmap_data::ro("/init");
|
2020-01-08 14:42:54 +00:00
|
|
|
|
2020-12-31 06:11:24 +00:00
|
|
|
LOGD("Restoring /init\n");
|
|
|
|
rename("/.backup/init", "/init");
|
2020-01-08 14:42:54 +00:00
|
|
|
|
2020-12-31 06:11:24 +00:00
|
|
|
mount_with_dt();
|
2020-01-08 14:42:54 +00:00
|
|
|
}
|
|
|
|
|
2020-04-01 11:39:28 +00:00
|
|
|
void SARBase::backup_files() {
|
2020-12-31 06:11:24 +00:00
|
|
|
if (access("/overlay.d", F_OK) == 0)
|
|
|
|
backup_folder("/overlay.d", overlays);
|
2019-07-16 08:08:28 +00:00
|
|
|
|
2021-01-13 06:50:55 +00:00
|
|
|
self = mmap_data::ro("/proc/self/exe");
|
2020-12-31 06:11:24 +00:00
|
|
|
if (access("/.backup/.magisk", R_OK) == 0)
|
2021-10-26 07:35:55 +00:00
|
|
|
magisk_config = mmap_data::ro("/.backup/.magisk");
|
2019-07-16 08:08:28 +00:00
|
|
|
}
|
|
|
|
|
2020-04-01 11:39:28 +00:00
|
|
|
void SARBase::mount_system_root() {
|
2020-12-31 06:11:24 +00:00
|
|
|
LOGD("Early mount system_root\n");
|
|
|
|
strcpy(blk_info.block_dev, "/dev/root");
|
|
|
|
|
|
|
|
do {
|
|
|
|
// Try legacy SAR dm-verity
|
|
|
|
strcpy(blk_info.partname, "vroot");
|
|
|
|
auto dev = setup_block(false);
|
|
|
|
if (dev >= 0)
|
|
|
|
goto mount_root;
|
|
|
|
|
|
|
|
// Try NVIDIA naming scheme
|
|
|
|
strcpy(blk_info.partname, "APP");
|
|
|
|
dev = setup_block(false);
|
|
|
|
if (dev >= 0)
|
|
|
|
goto mount_root;
|
|
|
|
|
2021-10-26 07:35:55 +00:00
|
|
|
sprintf(blk_info.partname, "system%s", config->slot);
|
2020-12-31 06:11:24 +00:00
|
|
|
dev = setup_block(false);
|
|
|
|
if (dev >= 0)
|
|
|
|
goto mount_root;
|
|
|
|
|
|
|
|
// Poll forever if rootwait was given in cmdline
|
2021-10-26 07:35:55 +00:00
|
|
|
} while (config->rootwait);
|
2020-12-31 06:11:24 +00:00
|
|
|
|
|
|
|
// We don't really know what to do at this point...
|
|
|
|
LOGE("Cannot find root partition, abort\n");
|
|
|
|
exit(1);
|
2020-09-23 21:18:51 +00:00
|
|
|
mount_root:
|
2020-12-31 06:11:24 +00:00
|
|
|
xmkdir("/system_root", 0755);
|
|
|
|
if (xmount("/dev/root", "/system_root", "ext4", MS_RDONLY, nullptr))
|
|
|
|
xmount("/dev/root", "/system_root", "erofs", MS_RDONLY, nullptr);
|
2020-04-01 11:39:28 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
void SARInit::early_mount() {
|
2020-12-31 06:11:24 +00:00
|
|
|
backup_files();
|
|
|
|
mount_system_root();
|
|
|
|
switch_root("/system_root");
|
|
|
|
|
2021-01-15 10:44:40 +00:00
|
|
|
// Use the apex folder to determine whether 2SI (Android 10+)
|
|
|
|
is_two_stage = access("/apex", F_OK) == 0;
|
2020-12-31 06:11:24 +00:00
|
|
|
LOGD("is_two_stage: [%d]\n", is_two_stage);
|
|
|
|
|
|
|
|
if (!is_two_stage) {
|
|
|
|
// Make dev writable
|
|
|
|
xmkdir("/dev", 0755);
|
|
|
|
xmount("tmpfs", "/dev", "tmpfs", 0, "mode=755");
|
|
|
|
mount_list.emplace_back("/dev");
|
|
|
|
mount_with_dt();
|
|
|
|
}
|
2020-04-01 11:39:28 +00:00
|
|
|
}
|
Logical Resizable Android Partitions support
The way how logical partition, or "Logical Resizable Android Partitions"
as they say in AOSP source code, is setup makes it impossible to early
mount the partitions from the shared super partition with just
a few lines of code; in fact, AOSP has a whole "fs_mgr" folder which
consist of multiple complex libraries, with 15K lines of code just
to deal with the device mapper shenanigans.
In order to keep the already overly complicated MagiskInit more
managable, I chose NOT to go the route of including fs_mgr directly
into MagiskInit. Luckily, starting from Android Q, Google decided to
split init startup into 3 stages, with the first stage doing _only_
early mount. This is great news, because we can simply let the stock
init do its own thing for us, and we intercept the bootup sequence.
So the workflow can be visualized roughly below:
Magisk First Stage --> First Stage Mount --> Magisk Second Stage --+
(MagiskInit) (Original Init) (MagiskInit) +
+
+
...Rest of the boot... <-- Second Stage <-- Selinux Setup <--+
(__________________ Original Init ____________________)
The catch here is that after doing all the first stage mounting, /init
will pivot /system as root directory (/), leaving us impossible to
regain control after we hand it over. So the solution here is to patch
fstab in /first_stage_ramdisk on-the-fly to redirect /system to
/system_root, making the original init do all the hard work for
us and mount required early mount partitions, but skips the step of
switching root directory. It will also conveniently hand over execution
back to MagiskInit, which we will reuse the routine for patching
root directory in normal system-as-root situations.
2019-06-29 07:47:29 +00:00
|
|
|
|
2021-08-14 05:29:12 +00:00
|
|
|
bool SecondStageInit::prepare() {
|
2020-12-31 06:11:24 +00:00
|
|
|
backup_files();
|
Logical Resizable Android Partitions support
The way how logical partition, or "Logical Resizable Android Partitions"
as they say in AOSP source code, is setup makes it impossible to early
mount the partitions from the shared super partition with just
a few lines of code; in fact, AOSP has a whole "fs_mgr" folder which
consist of multiple complex libraries, with 15K lines of code just
to deal with the device mapper shenanigans.
In order to keep the already overly complicated MagiskInit more
managable, I chose NOT to go the route of including fs_mgr directly
into MagiskInit. Luckily, starting from Android Q, Google decided to
split init startup into 3 stages, with the first stage doing _only_
early mount. This is great news, because we can simply let the stock
init do its own thing for us, and we intercept the bootup sequence.
So the workflow can be visualized roughly below:
Magisk First Stage --> First Stage Mount --> Magisk Second Stage --+
(MagiskInit) (Original Init) (MagiskInit) +
+
+
...Rest of the boot... <-- Second Stage <-- Selinux Setup <--+
(__________________ Original Init ____________________)
The catch here is that after doing all the first stage mounting, /init
will pivot /system as root directory (/), leaving us impossible to
regain control after we hand it over. So the solution here is to patch
fstab in /first_stage_ramdisk on-the-fly to redirect /system to
/system_root, making the original init do all the hard work for
us and mount required early mount partitions, but skips the step of
switching root directory. It will also conveniently hand over execution
back to MagiskInit, which we will reuse the routine for patching
root directory in normal system-as-root situations.
2019-06-29 07:47:29 +00:00
|
|
|
|
2020-12-31 06:11:24 +00:00
|
|
|
umount2("/init", MNT_DETACH);
|
|
|
|
umount2("/proc/self/exe", MNT_DETACH);
|
2020-04-01 11:39:28 +00:00
|
|
|
|
2021-08-14 05:29:12 +00:00
|
|
|
// some weird devices, like meizu, embrace two stage init but still have legacy rootfs behaviour
|
|
|
|
bool legacy = false;
|
|
|
|
if (access("/system_root", F_OK) == 0) {
|
|
|
|
if (access("/system_root/proc", F_OK) == 0) {
|
|
|
|
switch_root("/system_root");
|
|
|
|
} else {
|
|
|
|
xmount("/system_root", "/system", nullptr, MS_MOVE, nullptr);
|
|
|
|
rmdir("/system_root");
|
|
|
|
legacy = true;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return legacy;
|
Logical Resizable Android Partitions support
The way how logical partition, or "Logical Resizable Android Partitions"
as they say in AOSP source code, is setup makes it impossible to early
mount the partitions from the shared super partition with just
a few lines of code; in fact, AOSP has a whole "fs_mgr" folder which
consist of multiple complex libraries, with 15K lines of code just
to deal with the device mapper shenanigans.
In order to keep the already overly complicated MagiskInit more
managable, I chose NOT to go the route of including fs_mgr directly
into MagiskInit. Luckily, starting from Android Q, Google decided to
split init startup into 3 stages, with the first stage doing _only_
early mount. This is great news, because we can simply let the stock
init do its own thing for us, and we intercept the bootup sequence.
So the workflow can be visualized roughly below:
Magisk First Stage --> First Stage Mount --> Magisk Second Stage --+
(MagiskInit) (Original Init) (MagiskInit) +
+
+
...Rest of the boot... <-- Second Stage <-- Selinux Setup <--+
(__________________ Original Init ____________________)
The catch here is that after doing all the first stage mounting, /init
will pivot /system as root directory (/), leaving us impossible to
regain control after we hand it over. So the solution here is to patch
fstab in /first_stage_ramdisk on-the-fly to redirect /system to
/system_root, making the original init do all the hard work for
us and mount required early mount partitions, but skips the step of
switching root directory. It will also conveniently hand over execution
back to MagiskInit, which we will reuse the routine for patching
root directory in normal system-as-root situations.
2019-06-29 07:47:29 +00:00
|
|
|
}
|
2019-12-05 21:29:45 +00:00
|
|
|
|
2020-12-06 11:07:47 +00:00
|
|
|
void BaseInit::exec_init() {
|
2020-12-31 06:11:24 +00:00
|
|
|
// Unmount in reverse order
|
|
|
|
for (auto &p : reversed(mount_list)) {
|
|
|
|
if (xumount(p.data()) == 0)
|
|
|
|
LOGD("Unmount [%s]\n", p.data());
|
|
|
|
}
|
|
|
|
execv("/init", argv);
|
|
|
|
exit(1);
|
2019-12-05 21:29:45 +00:00
|
|
|
}
|
2019-12-09 07:44:49 +00:00
|
|
|
|
2020-10-27 03:46:15 +00:00
|
|
|
void MagiskInit::setup_tmp(const char *path) {
|
2020-12-31 06:11:24 +00:00
|
|
|
LOGD("Setup Magisk tmp at %s\n", path);
|
|
|
|
xmount("tmpfs", path, "tmpfs", 0, "mode=755");
|
|
|
|
|
|
|
|
chdir(path);
|
|
|
|
|
|
|
|
xmkdir(INTLROOT, 0755);
|
|
|
|
xmkdir(MIRRDIR, 0);
|
|
|
|
xmkdir(BLOCKDIR, 0);
|
|
|
|
|
|
|
|
int fd = xopen(INTLROOT "/config", O_WRONLY | O_CREAT, 0);
|
2021-10-26 07:35:55 +00:00
|
|
|
xwrite(fd, magisk_config.buf, magisk_config.sz);
|
2020-12-31 06:11:24 +00:00
|
|
|
close(fd);
|
|
|
|
fd = xopen("magiskinit", O_WRONLY | O_CREAT, 0755);
|
|
|
|
xwrite(fd, self.buf, self.sz);
|
|
|
|
close(fd);
|
2021-01-18 12:25:26 +00:00
|
|
|
|
|
|
|
// The magisk binary will be handled later
|
2020-12-31 06:11:24 +00:00
|
|
|
|
|
|
|
// Create applet symlinks
|
|
|
|
for (int i = 0; applet_names[i]; ++i)
|
|
|
|
xsymlink("./magisk", applet_names[i]);
|
|
|
|
xsymlink("./magiskinit", "magiskpolicy");
|
|
|
|
xsymlink("./magiskinit", "supolicy");
|
|
|
|
|
|
|
|
chdir("/");
|
2019-12-09 07:44:49 +00:00
|
|
|
}
|