mirror of
https://github.com/topjohnwu/Magisk.git
synced 2024-12-20 23:17:37 +00:00
16e4c67992
Previously, Magisk uses persist or cache for storing modules' custom sepolicy rules. In this commit, we significantly broaden its compatibility and also prevent mounting errors. The persist partition is non-standard and also critical for Snapdragon devices, so we prefer not to use it by default. We will go through the following logic to find the best suitable non-volatile, writable location to store and load sepolicy.rule files: Unencrypted data -> FBE data unencrypted dir -> cache -> metadata -> persist This should cover almost all possible cases: very old devices have cache partitions; newer devices will use FBE; latest devices will use metadata FBE (which guarantees a metadata parition); and finally, all Snapdragon devices have the persist partition (as a last resort). Fix #3179
414 lines
9.9 KiB
C++
414 lines
9.9 KiB
C++
#include <sys/sysmacros.h>
|
|
#include <string.h>
|
|
#include <stdio.h>
|
|
#include <libgen.h>
|
|
#include <vector>
|
|
|
|
#include <utils.hpp>
|
|
#include <selinux.hpp>
|
|
#include <magisk.hpp>
|
|
|
|
#include "init.hpp"
|
|
|
|
using namespace std;
|
|
|
|
static string rtrim(string &&str) {
|
|
// Trim space, newline, and null byte from end of string
|
|
while (memchr(" \n\r", str[str.length() - 1], 4))
|
|
str.pop_back();
|
|
return std::move(str);
|
|
}
|
|
|
|
struct devinfo {
|
|
int major;
|
|
int minor;
|
|
char devname[32];
|
|
char partname[32];
|
|
char dmname[32];
|
|
};
|
|
|
|
static vector<devinfo> dev_list;
|
|
|
|
static void parse_device(devinfo *dev, const char *uevent) {
|
|
dev->partname[0] = '\0';
|
|
parse_prop_file(uevent, [=](string_view key, string_view value) -> bool {
|
|
if (key == "MAJOR")
|
|
dev->major = parse_int(value.data());
|
|
else if (key == "MINOR")
|
|
dev->minor = parse_int(value.data());
|
|
else if (key == "DEVNAME")
|
|
strcpy(dev->devname, value.data());
|
|
else if (key == "PARTNAME")
|
|
strcpy(dev->partname, value.data());
|
|
|
|
return true;
|
|
});
|
|
}
|
|
|
|
static void collect_devices() {
|
|
char path[128];
|
|
devinfo dev{};
|
|
if (auto dir = xopen_dir("/sys/dev/block"); dir) {
|
|
for (dirent *entry; (entry = readdir(dir.get()));) {
|
|
if (entry->d_name == "."sv || entry->d_name == ".."sv)
|
|
continue;
|
|
sprintf(path, "/sys/dev/block/%s/uevent", entry->d_name);
|
|
parse_device(&dev, path);
|
|
sprintf(path, "/sys/dev/block/%s/dm/name", entry->d_name);
|
|
if (access(path, F_OK) == 0) {
|
|
auto name = rtrim(full_read(path));
|
|
strcpy(dev.dmname, name.data());
|
|
}
|
|
dev_list.push_back(dev);
|
|
}
|
|
}
|
|
}
|
|
|
|
static struct {
|
|
char partname[32];
|
|
char block_dev[64];
|
|
} blk_info;
|
|
|
|
static int64_t setup_block(bool write_block) {
|
|
if (dev_list.empty())
|
|
collect_devices();
|
|
xmkdir("/dev", 0755);
|
|
xmkdir("/dev/block", 0755);
|
|
|
|
for (int tries = 0; tries < 3; ++tries) {
|
|
for (auto &dev : dev_list) {
|
|
if (strcasecmp(dev.partname, blk_info.partname) == 0)
|
|
LOGD("Setup %s: [%s] (%d, %d)\n", dev.partname, dev.devname, dev.major, dev.minor);
|
|
else if (strcasecmp(dev.dmname, blk_info.partname) == 0)
|
|
LOGD("Setup %s: [%s] (%d, %d)\n", dev.dmname, dev.devname, dev.major, dev.minor);
|
|
else
|
|
continue;
|
|
|
|
if (write_block) {
|
|
sprintf(blk_info.block_dev, "/dev/block/%s", dev.devname);
|
|
}
|
|
dev_t rdev = makedev(dev.major, dev.minor);
|
|
mknod(blk_info.block_dev, S_IFBLK | 0600, rdev);
|
|
return rdev;
|
|
}
|
|
// Wait 10ms and try again
|
|
usleep(10000);
|
|
dev_list.clear();
|
|
collect_devices();
|
|
}
|
|
|
|
// The requested partname does not exist
|
|
return -1;
|
|
}
|
|
|
|
static bool is_lnk(const char *name) {
|
|
struct stat st;
|
|
if (lstat(name, &st))
|
|
return false;
|
|
return S_ISLNK(st.st_mode);
|
|
}
|
|
|
|
#define read_info(val) \
|
|
if (access(#val, F_OK) == 0) {\
|
|
entry.val = rtrim(full_read(#val)); \
|
|
}
|
|
|
|
void BaseInit::read_dt_fstab(vector<fstab_entry> &fstab) {
|
|
if (access(cmd->dt_dir, F_OK) != 0)
|
|
return;
|
|
|
|
char cwd[128];
|
|
getcwd(cwd, sizeof(cwd));
|
|
chdir(cmd->dt_dir);
|
|
run_finally cd([&]{ chdir(cwd); });
|
|
|
|
if (access("fstab", F_OK) != 0)
|
|
return;
|
|
chdir("fstab");
|
|
|
|
// Make sure dt fstab is enabled
|
|
if (access("status", F_OK) == 0) {
|
|
auto status = rtrim(full_read("status"));
|
|
if (status != "okay" && status != "ok")
|
|
return;
|
|
}
|
|
|
|
auto dir = xopen_dir(".");
|
|
for (dirent *dp; (dp = xreaddir(dir.get()));) {
|
|
if (dp->d_type != DT_DIR)
|
|
continue;
|
|
chdir(dp->d_name);
|
|
run_finally f([]{ chdir(".."); });
|
|
|
|
if (access("status", F_OK) == 0) {
|
|
auto status = rtrim(full_read("status"));
|
|
if (status != "okay" && status != "ok")
|
|
continue;
|
|
}
|
|
|
|
fstab_entry entry;
|
|
|
|
read_info(dev);
|
|
read_info(mnt_point) else {
|
|
entry.mnt_point = "/";
|
|
entry.mnt_point += dp->d_name;
|
|
}
|
|
read_info(type);
|
|
read_info(mnt_flags);
|
|
read_info(fsmgr_flags);
|
|
|
|
fstab.emplace_back(std::move(entry));
|
|
}
|
|
}
|
|
|
|
void MagiskInit::mount_with_dt() {
|
|
vector<fstab_entry> fstab;
|
|
read_dt_fstab(fstab);
|
|
for (const auto &entry : fstab) {
|
|
if (is_lnk(entry.mnt_point.data()))
|
|
continue;
|
|
// Derive partname from dev
|
|
sprintf(blk_info.partname, "%s%s", basename(entry.dev.data()), cmd->slot);
|
|
setup_block(true);
|
|
xmkdir(entry.mnt_point.data(), 0755);
|
|
xmount(blk_info.block_dev, entry.mnt_point.data(), entry.type.data(), MS_RDONLY, nullptr);
|
|
mount_list.push_back(entry.mnt_point);
|
|
}
|
|
}
|
|
|
|
static void switch_root(const string &path) {
|
|
LOGD("Switch root to %s\n", path.data());
|
|
int root = xopen("/", O_RDONLY);
|
|
vector<string> mounts;
|
|
parse_mnt("/proc/mounts", [&](mntent *me) {
|
|
// Skip root and self
|
|
if (me->mnt_dir == "/"sv || me->mnt_dir == path)
|
|
return true;
|
|
// Do not include subtrees
|
|
for (const auto &m : mounts) {
|
|
if (strncmp(me->mnt_dir, m.data(), m.length()) == 0 && me->mnt_dir[m.length()] == '/')
|
|
return true;
|
|
}
|
|
mounts.emplace_back(me->mnt_dir);
|
|
return true;
|
|
});
|
|
for (auto &dir : mounts) {
|
|
auto new_path = path + dir;
|
|
mkdir(new_path.data(), 0755);
|
|
xmount(dir.data(), new_path.data(), nullptr, MS_MOVE, nullptr);
|
|
}
|
|
chdir(path.data());
|
|
xmount(path.data(), "/", nullptr, MS_MOVE, nullptr);
|
|
chroot(".");
|
|
|
|
LOGD("Cleaning rootfs\n");
|
|
frm_rf(root);
|
|
}
|
|
|
|
void MagiskInit::mount_rules_dir(const char *dev_base, const char *mnt_base) {
|
|
char path[128];
|
|
xrealpath(dev_base, blk_info.block_dev);
|
|
xrealpath(mnt_base, path);
|
|
char *b = blk_info.block_dev + strlen(blk_info.block_dev);
|
|
char *p = path + strlen(path);
|
|
|
|
auto do_mount = [&](const char *type) -> bool {
|
|
xmkdir(path, 0755);
|
|
bool success = xmount(blk_info.block_dev, path, type, 0, nullptr) == 0;
|
|
if (success)
|
|
mount_list.emplace_back(path);
|
|
return success;
|
|
};
|
|
|
|
// First try userdata
|
|
strcpy(blk_info.partname, "userdata");
|
|
strcpy(b, "/data");
|
|
strcpy(p, "/data");
|
|
if (setup_block(false) < 0) {
|
|
// Try NVIDIA naming scheme
|
|
strcpy(blk_info.partname, "UDA");
|
|
if (setup_block(false) < 0)
|
|
goto cache;
|
|
}
|
|
// Try to mount with either ext4 or f2fs
|
|
// Failure means either FDE or metadata encryption
|
|
if (!do_mount("ext4") && !do_mount("f2fs"))
|
|
goto cache;
|
|
|
|
strcpy(p, "/data/unencrypted");
|
|
if (access(path, F_OK) == 0) {
|
|
// FBE, need to use an unencrypted path
|
|
custom_rules_dir = path + "/magisk"s;
|
|
} else {
|
|
// Skip if /data/adb does not exist
|
|
strcpy(p, "/data/adb");
|
|
if (access(path, F_OK) != 0)
|
|
return;
|
|
// Unencrypted, directly use module paths
|
|
custom_rules_dir = string(mnt_base) + MODULEROOT;
|
|
}
|
|
goto success;
|
|
|
|
cache:
|
|
// Fallback to cache
|
|
strcpy(blk_info.partname, "cache");
|
|
strcpy(b, "/cache");
|
|
strcpy(p, "/cache");
|
|
if (setup_block(false) < 0) {
|
|
// Try NVIDIA naming scheme
|
|
strcpy(blk_info.partname, "CAC");
|
|
if (setup_block(false) < 0)
|
|
goto metadata;
|
|
}
|
|
if (!do_mount("ext4"))
|
|
goto metadata;
|
|
custom_rules_dir = path + "/magisk"s;
|
|
goto success;
|
|
|
|
metadata:
|
|
// Fallback to metadata
|
|
strcpy(blk_info.partname, "metadata");
|
|
strcpy(b, "/metadata");
|
|
strcpy(p, "/metadata");
|
|
if (setup_block(false) < 0 || !do_mount("ext4"))
|
|
goto persist;
|
|
custom_rules_dir = path + "/magisk"s;
|
|
goto success;
|
|
|
|
persist:
|
|
// Fallback to persist
|
|
strcpy(blk_info.partname, "persist");
|
|
strcpy(b, "/persist");
|
|
strcpy(p, "/persist");
|
|
if (setup_block(false) < 0 || !do_mount("ext4"))
|
|
return;
|
|
custom_rules_dir = path + "/magisk"s;
|
|
|
|
success:
|
|
// Create symlinks so we don't need to go through this logic again
|
|
strcpy(p, "/sepolicy.rules");
|
|
xsymlink(custom_rules_dir.data(), path);
|
|
}
|
|
|
|
void RootFSInit::early_mount() {
|
|
self = raw_data::read("/init");
|
|
|
|
LOGD("Restoring /init\n");
|
|
rename("/.backup/init", "/init");
|
|
|
|
mount_with_dt();
|
|
}
|
|
|
|
void SARBase::backup_files() {
|
|
if (access("/overlay.d", F_OK) == 0)
|
|
backup_folder("/overlay.d", overlays);
|
|
|
|
self = raw_data::read("/proc/self/exe");
|
|
if (access("/.backup/.magisk", R_OK) == 0)
|
|
config = raw_data::read("/.backup/.magisk");
|
|
}
|
|
|
|
void SARBase::mount_system_root() {
|
|
LOGD("Early mount system_root\n");
|
|
strcpy(blk_info.block_dev, "/dev/root");
|
|
// Try legacy SAR dm-verity
|
|
strcpy(blk_info.partname, "vroot");
|
|
auto dev = setup_block(false);
|
|
if (dev >= 0)
|
|
goto mount_root;
|
|
|
|
// Try NVIDIA naming scheme
|
|
strcpy(blk_info.partname, "APP");
|
|
dev = setup_block(false);
|
|
if (dev >= 0)
|
|
goto mount_root;
|
|
|
|
sprintf(blk_info.partname, "system%s", cmd->slot);
|
|
dev = setup_block(false);
|
|
if (dev >= 0)
|
|
goto mount_root;
|
|
|
|
// We don't really know what to do at this point...
|
|
LOGE("Cannot find root partition, abort\n");
|
|
exit(1);
|
|
mount_root:
|
|
xmkdir("/system_root", 0755);
|
|
if (xmount("/dev/root", "/system_root", "ext4", MS_RDONLY, nullptr))
|
|
xmount("/dev/root", "/system_root", "erofs", MS_RDONLY, nullptr);
|
|
}
|
|
|
|
void SARInit::early_mount() {
|
|
// Make dev writable
|
|
xmkdir("/dev", 0755);
|
|
xmount("tmpfs", "/dev", "tmpfs", 0, "mode=755");
|
|
mount_list.emplace_back("/dev");
|
|
|
|
backup_files();
|
|
|
|
mount_system_root();
|
|
switch_root("/system_root");
|
|
|
|
mount_with_dt();
|
|
}
|
|
|
|
void SARFirstStageInit::early_mount() {
|
|
backup_files();
|
|
mount_system_root();
|
|
switch_root("/system_root");
|
|
}
|
|
|
|
void SecondStageInit::early_mount() {
|
|
backup_files();
|
|
|
|
umount2("/init", MNT_DETACH);
|
|
umount2("/proc/self/exe", MNT_DETACH);
|
|
|
|
if (access("/system_root", F_OK) == 0)
|
|
switch_root("/system_root");
|
|
}
|
|
|
|
void BaseInit::cleanup() {
|
|
// Unmount in reverse order
|
|
for (auto &p : reversed(mount_list)) {
|
|
if (xumount(p.data()) == 0)
|
|
LOGD("Unmount [%s]\n", p.data());
|
|
}
|
|
mount_list.clear();
|
|
mount_list.shrink_to_fit();
|
|
}
|
|
|
|
static void patch_socket_name(const char *path) {
|
|
char rstr[16];
|
|
gen_rand_str(rstr, sizeof(rstr));
|
|
auto bin = raw_data::mmap_rw(path);
|
|
bin.patch({ make_pair(MAIN_SOCKET, rstr) });
|
|
}
|
|
|
|
void MagiskInit::setup_tmp(const char *path) {
|
|
LOGD("Setup Magisk tmp at %s\n", path);
|
|
xmount("tmpfs", path, "tmpfs", 0, "mode=755");
|
|
|
|
chdir(path);
|
|
|
|
xmkdir(INTLROOT, 0755);
|
|
xmkdir(MIRRDIR, 0);
|
|
xmkdir(BLOCKDIR, 0);
|
|
|
|
int fd = xopen(INTLROOT "/config", O_WRONLY | O_CREAT, 0);
|
|
xwrite(fd, config.buf, config.sz);
|
|
close(fd);
|
|
fd = xopen("magiskinit", O_WRONLY | O_CREAT, 0755);
|
|
xwrite(fd, self.buf, self.sz);
|
|
close(fd);
|
|
dump_magisk("magisk", 0755);
|
|
patch_socket_name("magisk");
|
|
|
|
// Create applet symlinks
|
|
for (int i = 0; applet_names[i]; ++i)
|
|
xsymlink("./magisk", applet_names[i]);
|
|
xsymlink("./magiskinit", "magiskpolicy");
|
|
xsymlink("./magiskinit", "supolicy");
|
|
|
|
chdir("/");
|
|
}
|