Directly guard boot state with mutex

This commit is contained in:
topjohnwu 2023-11-27 17:40:58 +08:00
parent a6d1803105
commit c7083659aa
4 changed files with 22 additions and 27 deletions

View File

@ -304,7 +304,7 @@ static bool check_key_combo() {
extern int disable_deny(); extern int disable_deny();
void MagiskD::post_fs_data() const { bool MagiskD::post_fs_data() const {
as_rust().setup_logfile(); as_rust().setup_logfile();
LOGI("** post-fs-data mode running\n"); LOGI("** post-fs-data mode running\n");
@ -313,6 +313,8 @@ void MagiskD::post_fs_data() const {
mount_mirrors(); mount_mirrors();
prune_su_access(); prune_su_access();
bool safe_mode = false;
if (access(SECURE_DIR, F_OK) != 0) { if (access(SECURE_DIR, F_OK) != 0) {
LOGE(SECURE_DIR " is not present, abort\n"); LOGE(SECURE_DIR " is not present, abort\n");
goto early_abort; goto early_abort;
@ -325,7 +327,7 @@ void MagiskD::post_fs_data() const {
if (get_prop("persist.sys.safemode", true) == "1" || if (get_prop("persist.sys.safemode", true) == "1" ||
get_prop("ro.sys.safemode") == "1" || check_key_combo()) { get_prop("ro.sys.safemode") == "1" || check_key_combo()) {
as_rust().enable_safe_mode(); safe_mode = true;
// Disable all modules and denylist so next boot will be clean // Disable all modules and denylist so next boot will be clean
disable_modules(); disable_modules();
disable_deny(); disable_deny();
@ -341,6 +343,7 @@ void MagiskD::post_fs_data() const {
early_abort: early_abort:
// We still do magic mount because root itself might need it // We still do magic mount because root itself might need it
load_modules(); load_modules();
return safe_mode;
} }
void MagiskD::late_start() const { void MagiskD::late_start() const {

View File

@ -1,6 +1,5 @@
use std::fs::File; use std::fs::File;
use std::io::BufReader; use std::io::BufReader;
use std::sync::atomic::{AtomicU32, Ordering};
use std::sync::{Mutex, OnceLock}; use std::sync::{Mutex, OnceLock};
use std::{io, mem}; use std::{io, mem};
@ -27,25 +26,22 @@ enum BootState {
#[derive(Default)] #[derive(Default)]
#[repr(transparent)] #[repr(transparent)]
struct BootStateFlags(AtomicU32); struct BootStateFlags(u32);
impl BootStateFlags { impl BootStateFlags {
fn contains(&self, stage: BootState) -> bool { fn contains(&self, stage: BootState) -> bool {
let v = self.0.load(Ordering::Relaxed); (self.0 & stage as u32) != 0
(v & stage as u32) != 0
} }
fn set(&self, stage: BootState) { fn set(&mut self, stage: BootState) {
let v = self.0.load(Ordering::Relaxed); self.0 |= stage as u32;
self.0.store(v | stage as u32, Ordering::Relaxed);
} }
} }
#[derive(Default)] #[derive(Default)]
pub struct MagiskD { pub struct MagiskD {
pub logd: Mutex<Option<File>>, pub logd: Mutex<Option<File>>,
boot_stage_lock: Mutex<()>, boot_stage_lock: Mutex<BootStateFlags>,
boot_state_flags: BootStateFlags,
is_emulator: bool, is_emulator: bool,
is_recovery: bool, is_recovery: bool,
} }
@ -59,36 +55,33 @@ impl MagiskD {
self.is_recovery self.is_recovery
} }
pub fn enable_safe_mode(&self) {
self.boot_state_flags.set(BootState::SafeMode)
}
pub fn boot_stage_handler(&self, client: i32, code: i32) { pub fn boot_stage_handler(&self, client: i32, code: i32) {
// Make sure boot stage execution is always serialized // Make sure boot stage execution is always serialized
let _guard = self.boot_stage_lock.lock().unwrap(); let mut state = self.boot_stage_lock.lock().unwrap();
let code = RequestCode { repr: code }; let code = RequestCode { repr: code };
match code { match code {
RequestCode::POST_FS_DATA => { RequestCode::POST_FS_DATA => {
if check_data() && !self.boot_state_flags.contains(BootState::PostFsDataDone) { if check_data() && !state.contains(BootState::PostFsDataDone) {
self.as_cxx().post_fs_data(); if self.as_cxx().post_fs_data() {
self.boot_state_flags.set(BootState::PostFsDataDone); state.set(BootState::SafeMode);
}
state.set(BootState::PostFsDataDone);
} }
unsafe { libc::close(client) }; unsafe { libc::close(client) };
} }
RequestCode::LATE_START => { RequestCode::LATE_START => {
unsafe { libc::close(client) }; unsafe { libc::close(client) };
if self.boot_state_flags.contains(BootState::PostFsDataDone) if state.contains(BootState::PostFsDataDone) && !state.contains(BootState::SafeMode)
&& !self.boot_state_flags.contains(BootState::SafeMode)
{ {
self.as_cxx().late_start(); self.as_cxx().late_start();
self.boot_state_flags.set(BootState::LateStartDone); state.set(BootState::LateStartDone);
} }
} }
RequestCode::BOOT_COMPLETE => { RequestCode::BOOT_COMPLETE => {
unsafe { libc::close(client) }; unsafe { libc::close(client) };
if !self.boot_state_flags.contains(BootState::SafeMode) { if !state.contains(BootState::SafeMode) {
self.boot_state_flags.set(BootState::BootComplete); state.set(BootState::BootComplete);
self.as_cxx().boot_complete() self.as_cxx().boot_complete()
} }
} }

View File

@ -32,7 +32,7 @@ struct MagiskD {
// C++ implementation // C++ implementation
void reboot() const; void reboot() const;
void post_fs_data() const; bool post_fs_data() const;
void late_start() const; void late_start() const;
void boot_complete() const; void boot_complete() const;

View File

@ -57,7 +57,7 @@ pub mod ffi {
#[cxx_name = "MagiskD"] #[cxx_name = "MagiskD"]
type CxxMagiskD; type CxxMagiskD;
fn post_fs_data(self: &CxxMagiskD); fn post_fs_data(self: &CxxMagiskD) -> bool;
fn late_start(self: &CxxMagiskD); fn late_start(self: &CxxMagiskD);
fn boot_complete(self: &CxxMagiskD); fn boot_complete(self: &CxxMagiskD);
} }
@ -87,7 +87,6 @@ pub mod ffi {
fn is_emulator(self: &MagiskD) -> bool; fn is_emulator(self: &MagiskD) -> bool;
fn is_recovery(self: &MagiskD) -> bool; fn is_recovery(self: &MagiskD) -> bool;
fn boot_stage_handler(self: &MagiskD, client: i32, code: i32); fn boot_stage_handler(self: &MagiskD, client: i32, code: i32);
fn enable_safe_mode(self: &MagiskD);
} }
} }