mirror of
https://github.com/topjohnwu/Magisk.git
synced 2024-11-29 04:55:23 +00:00
517 lines
17 KiB
C++
517 lines
17 KiB
C++
#include <sys/mman.h>
|
|
#include <sys/syscall.h>
|
|
#include <sys/mount.h>
|
|
#include <map>
|
|
#include <utility>
|
|
|
|
#include <base.hpp>
|
|
#include <consts.hpp>
|
|
#include <core.hpp>
|
|
#include <selinux.hpp>
|
|
|
|
#include "node.hpp"
|
|
|
|
using namespace std;
|
|
|
|
#define VLOGD(tag, from, to) LOGD("%-8s: %s <- %s\n", tag, to, from)
|
|
|
|
static int bind_mount(const char *reason, const char *from, const char *to) {
|
|
int ret = xmount(from, to, nullptr, MS_BIND | MS_REC, nullptr);
|
|
if (ret == 0)
|
|
VLOGD(reason, from, to);
|
|
return ret;
|
|
}
|
|
|
|
/*************************
|
|
* Node Tree Construction
|
|
*************************/
|
|
|
|
tmpfs_node::tmpfs_node(node_entry *node) : dir_node(node, this) {
|
|
if (!replace()) {
|
|
if (auto dir = open_dir(node_path().data())) {
|
|
set_exist(true);
|
|
for (dirent *entry; (entry = xreaddir(dir.get()));) {
|
|
// create a dummy inter_node to upgrade later
|
|
emplace<inter_node>(entry->d_name, entry);
|
|
}
|
|
}
|
|
}
|
|
|
|
for (auto it = children.begin(); it != children.end(); ++it) {
|
|
// Upgrade resting inter_node children to tmpfs_node
|
|
if (isa<inter_node>(it->second))
|
|
it = upgrade<tmpfs_node>(it);
|
|
}
|
|
}
|
|
|
|
bool dir_node::prepare() {
|
|
// If direct replace or not exist, mount ourselves as tmpfs
|
|
bool upgrade_to_tmpfs = replace() || !exist();
|
|
|
|
for (auto it = children.begin(); it != children.end();) {
|
|
// We also need to upgrade to tmpfs node if any child:
|
|
// - Target does not exist
|
|
// - Source or target is a symlink (since we cannot bind mount symlink)
|
|
bool cannot_mnt;
|
|
if (struct stat st{}; lstat(it->second->node_path().data(), &st) != 0) {
|
|
cannot_mnt = true;
|
|
} else {
|
|
it->second->set_exist(true);
|
|
cannot_mnt = it->second->is_lnk() || S_ISLNK(st.st_mode);
|
|
}
|
|
|
|
if (cannot_mnt) {
|
|
if (_node_type > type_id<tmpfs_node>()) {
|
|
// Upgrade will fail, remove the unsupported child node
|
|
LOGW("Unable to add: %s, skipped\n", it->second->node_path().data());
|
|
delete it->second;
|
|
it = children.erase(it);
|
|
continue;
|
|
}
|
|
upgrade_to_tmpfs = true;
|
|
}
|
|
if (auto dn = dyn_cast<dir_node>(it->second)) {
|
|
if (replace()) {
|
|
// Propagate skip mirror state to all children
|
|
dn->set_replace(true);
|
|
}
|
|
if (dn->prepare()) {
|
|
// Upgrade child to tmpfs
|
|
it = upgrade<tmpfs_node>(it);
|
|
}
|
|
}
|
|
++it;
|
|
}
|
|
return upgrade_to_tmpfs;
|
|
}
|
|
|
|
void dir_node::collect_module_files(const char *module, int dfd) {
|
|
auto dir = xopen_dir(xopenat(dfd, name().data(), O_RDONLY | O_CLOEXEC));
|
|
if (!dir)
|
|
return;
|
|
|
|
for (dirent *entry; (entry = xreaddir(dir.get()));) {
|
|
if (entry->d_name == ".replace"sv) {
|
|
set_replace(true);
|
|
continue;
|
|
}
|
|
|
|
if (entry->d_type == DT_DIR) {
|
|
inter_node *node;
|
|
if (auto it = children.find(entry->d_name); it == children.end()) {
|
|
node = emplace<inter_node>(entry->d_name, entry->d_name);
|
|
} else {
|
|
node = dyn_cast<inter_node>(it->second);
|
|
}
|
|
if (node) {
|
|
node->collect_module_files(module, dirfd(dir.get()));
|
|
}
|
|
} else {
|
|
emplace<module_node>(entry->d_name, module, entry);
|
|
}
|
|
}
|
|
}
|
|
|
|
/************************
|
|
* Mount Implementations
|
|
************************/
|
|
|
|
void node_entry::create_and_mount(const char *reason, const string &src, bool ro) {
|
|
const string dest = isa<tmpfs_node>(parent()) ? worker_path() : node_path();
|
|
if (is_lnk()) {
|
|
VLOGD("cp_link", src.data(), dest.data());
|
|
cp_afc(src.data(), dest.data());
|
|
} else {
|
|
if (is_dir())
|
|
xmkdir(dest.data(), 0);
|
|
else if (is_reg())
|
|
close(xopen(dest.data(), O_RDONLY | O_CREAT | O_CLOEXEC, 0));
|
|
else
|
|
return;
|
|
bind_mount(reason, src.data(), dest.data());
|
|
if (ro) {
|
|
xmount(nullptr, dest.data(), nullptr, MS_REMOUNT | MS_BIND | MS_RDONLY, nullptr);
|
|
}
|
|
}
|
|
}
|
|
|
|
void module_node::mount() {
|
|
std::string path = module + (parent()->root()->prefix + node_path());
|
|
string mnt_src = module_mnt + path;
|
|
{
|
|
string src = MODULEROOT "/" + path;
|
|
if (exist()) clone_attr(node_path().data(), src.data());
|
|
}
|
|
if (isa<tmpfs_node>(parent())) {
|
|
create_and_mount("module", mnt_src);
|
|
} else {
|
|
bind_mount("module", mnt_src.data(), node_path().data());
|
|
}
|
|
}
|
|
|
|
void tmpfs_node::mount() {
|
|
if (!is_dir()) {
|
|
create_and_mount("mirror", node_path());
|
|
return;
|
|
}
|
|
if (!isa<tmpfs_node>(parent())) {
|
|
auto worker_dir = worker_path();
|
|
mkdirs(worker_dir.data(), 0);
|
|
bind_mount("tmpfs", worker_dir.data(), worker_dir.data());
|
|
clone_attr(exist() ? node_path().data() : parent()->node_path().data(), worker_dir.data());
|
|
dir_node::mount();
|
|
VLOGD(replace() ? "replace" : "move", worker_dir.data(), node_path().data());
|
|
xmount(worker_dir.data(), node_path().data(), nullptr, MS_MOVE, nullptr);
|
|
xmount(nullptr, node_path().data(), nullptr, MS_REMOUNT | MS_BIND | MS_RDONLY, nullptr);
|
|
} else {
|
|
const string dest = worker_path();
|
|
// We don't need another layer of tmpfs if parent is tmpfs
|
|
mkdir(dest.data(), 0);
|
|
clone_attr(exist() ? node_path().data() : parent()->worker_path().data(), dest.data());
|
|
dir_node::mount();
|
|
}
|
|
}
|
|
|
|
/****************
|
|
* Magisk Stuffs
|
|
****************/
|
|
|
|
class magisk_node : public node_entry {
|
|
public:
|
|
explicit magisk_node(const char *name) : node_entry(name, DT_REG, this) {}
|
|
|
|
void mount() override {
|
|
const string src = get_magisk_tmp() + "/"s + name();
|
|
if (access(src.data(), F_OK))
|
|
return;
|
|
|
|
const string dir_name = isa<tmpfs_node>(parent()) ? parent()->worker_path() : parent()->node_path();
|
|
if (name() == "magisk") {
|
|
for (int i = 0; applet_names[i]; ++i) {
|
|
string dest = dir_name + "/" + applet_names[i];
|
|
VLOGD("create", "./magisk", dest.data());
|
|
xsymlink("./magisk", dest.data());
|
|
}
|
|
} else {
|
|
string dest = dir_name + "/supolicy";
|
|
VLOGD("create", "./magiskpolicy", dest.data());
|
|
xsymlink("./magiskpolicy", dest.data());
|
|
}
|
|
create_and_mount("magisk", src, true);
|
|
}
|
|
};
|
|
|
|
class zygisk_node : public node_entry {
|
|
public:
|
|
explicit zygisk_node(const char *name, bool is64bit)
|
|
: node_entry(name, DT_REG, this), is64bit(is64bit) {}
|
|
|
|
void mount() override {
|
|
#if defined(__LP64__)
|
|
const string src = get_magisk_tmp() + "/magisk"s + (is64bit ? "" : "32");
|
|
#else
|
|
const string src = get_magisk_tmp() + "/magisk"s;
|
|
(void) is64bit;
|
|
#endif
|
|
create_and_mount("zygisk", src, true);
|
|
}
|
|
|
|
private:
|
|
bool is64bit;
|
|
};
|
|
|
|
static void inject_magisk_bins(root_node *system) {
|
|
auto bin = system->get_child<inter_node>("bin");
|
|
if (!bin) {
|
|
bin = new inter_node("bin");
|
|
system->insert(bin);
|
|
}
|
|
|
|
// Insert binaries
|
|
bin->insert(new magisk_node("magisk"));
|
|
bin->insert(new magisk_node("magiskpolicy"));
|
|
|
|
// Also delete all applets to make sure no modules can override it
|
|
for (int i = 0; applet_names[i]; ++i)
|
|
delete bin->extract(applet_names[i]);
|
|
delete bin->extract("supolicy");
|
|
}
|
|
|
|
static void inject_zygisk_libs(root_node *system) {
|
|
if (access("/system/bin/linker", F_OK) == 0) {
|
|
auto lib = system->get_child<inter_node>("lib");
|
|
if (!lib) {
|
|
lib = new inter_node("lib");
|
|
system->insert(lib);
|
|
}
|
|
lib->insert(new zygisk_node(native_bridge.data(), false));
|
|
}
|
|
|
|
if (access("/system/bin/linker64", F_OK) == 0) {
|
|
auto lib64 = system->get_child<inter_node>("lib64");
|
|
if (!lib64) {
|
|
lib64 = new inter_node("lib64");
|
|
system->insert(lib64);
|
|
}
|
|
lib64->insert(new zygisk_node(native_bridge.data(), true));
|
|
}
|
|
}
|
|
|
|
vector<module_info> *module_list;
|
|
|
|
void load_modules() {
|
|
node_entry::module_mnt = get_magisk_tmp() + "/"s MODULEMNT "/";
|
|
|
|
auto root = make_unique<root_node>("");
|
|
auto system = new root_node("system");
|
|
root->insert(system);
|
|
|
|
char buf[4096];
|
|
LOGI("* Loading modules\n");
|
|
for (const auto &m : *module_list) {
|
|
const char *module = m.name.data();
|
|
char *b = buf + ssprintf(buf, sizeof(buf), "%s/" MODULEMNT "/%s/", get_magisk_tmp(), module);
|
|
|
|
// Read props
|
|
strcpy(b, "system.prop");
|
|
if (access(buf, F_OK) == 0) {
|
|
LOGI("%s: loading [system.prop]\n", module);
|
|
// Do NOT go through property service as it could cause boot lock
|
|
load_prop_file(buf, true);
|
|
}
|
|
|
|
// Check whether skip mounting
|
|
strcpy(b, "skip_mount");
|
|
if (access(buf, F_OK) == 0)
|
|
continue;
|
|
|
|
// Double check whether the system folder exists
|
|
strcpy(b, "system");
|
|
if (access(buf, F_OK) != 0)
|
|
continue;
|
|
|
|
LOGI("%s: loading mount files\n", module);
|
|
b[-1] = '\0';
|
|
int fd = xopen(buf, O_RDONLY | O_CLOEXEC);
|
|
system->collect_module_files(module, fd);
|
|
close(fd);
|
|
}
|
|
if (get_magisk_tmp() != "/sbin"sv || !str_contains(getenv("PATH") ?: "", "/sbin")) {
|
|
// Need to inject our binaries into /system/bin
|
|
inject_magisk_bins(system);
|
|
}
|
|
|
|
if (zygisk_enabled) {
|
|
string native_bridge_orig = get_prop(NBPROP);
|
|
if (native_bridge_orig.empty()) {
|
|
native_bridge_orig = "0";
|
|
}
|
|
native_bridge = native_bridge_orig != "0" ? ZYGISKLDR + native_bridge_orig : ZYGISKLDR;
|
|
set_prop(NBPROP, native_bridge.data());
|
|
// Weather Huawei's Maple compiler is enabled.
|
|
// If so, system server will be created by a special Zygote which ignores the native bridge
|
|
// and make system server out of our control. Avoid it by disabling.
|
|
if (get_prop("ro.maple.enable") == "1") {
|
|
set_prop("ro.maple.enable", "0");
|
|
}
|
|
inject_zygisk_libs(system);
|
|
}
|
|
|
|
if (!system->is_empty()) {
|
|
// Handle special read-only partitions
|
|
for (const char *part : { "/vendor", "/product", "/system_ext" }) {
|
|
struct stat st{};
|
|
if (lstat(part, &st) == 0 && S_ISDIR(st.st_mode)) {
|
|
if (auto old = system->extract(part + 1)) {
|
|
auto new_node = new root_node(old);
|
|
root->insert(new_node);
|
|
}
|
|
}
|
|
}
|
|
root->prepare();
|
|
root->mount();
|
|
}
|
|
|
|
// cleanup mounts
|
|
ssprintf(buf, sizeof(buf), "%s/" WORKERDIR, get_magisk_tmp());
|
|
xumount2(buf, MNT_DETACH);
|
|
ssprintf(buf, sizeof(buf), "%s/" MODULEMNT, get_magisk_tmp());
|
|
xumount2(buf, MNT_DETACH);
|
|
}
|
|
|
|
/************************
|
|
* Filesystem operations
|
|
************************/
|
|
|
|
static void prepare_modules() {
|
|
// Upgrade modules
|
|
if (auto dir = open_dir(MODULEUPGRADE); dir) {
|
|
int ufd = dirfd(dir.get());
|
|
int mfd = xopen(MODULEROOT, O_RDONLY | O_CLOEXEC);
|
|
for (dirent *entry; (entry = xreaddir(dir.get()));) {
|
|
if (entry->d_type == DT_DIR) {
|
|
// Cleanup old module if exists
|
|
if (faccessat(mfd, entry->d_name, F_OK, 0) == 0) {
|
|
int modfd = xopenat(mfd, entry->d_name, O_RDONLY | O_CLOEXEC);
|
|
if (faccessat(modfd, "disable", F_OK, 0) == 0) {
|
|
auto disable = entry->d_name + "/disable"s;
|
|
close(xopenat(ufd, disable.data(), O_RDONLY | O_CREAT | O_CLOEXEC, 0));
|
|
}
|
|
frm_rf(modfd);
|
|
unlinkat(mfd, entry->d_name, AT_REMOVEDIR);
|
|
}
|
|
LOGI("Upgrade / New module: %s\n", entry->d_name);
|
|
renameat(ufd, entry->d_name, mfd, entry->d_name);
|
|
}
|
|
}
|
|
close(mfd);
|
|
rm_rf(MODULEUPGRADE);
|
|
}
|
|
}
|
|
|
|
template<typename Func>
|
|
static void foreach_module(Func fn) {
|
|
auto dir = open_dir(MODULEROOT);
|
|
if (!dir)
|
|
return;
|
|
|
|
int dfd = dirfd(dir.get());
|
|
for (dirent *entry; (entry = xreaddir(dir.get()));) {
|
|
if (entry->d_type == DT_DIR && entry->d_name != ".core"sv) {
|
|
int modfd = xopenat(dfd, entry->d_name, O_RDONLY | O_CLOEXEC);
|
|
fn(dfd, entry, modfd);
|
|
close(modfd);
|
|
}
|
|
}
|
|
}
|
|
|
|
static void collect_modules(bool open_zygisk) {
|
|
foreach_module([=](int dfd, dirent *entry, int modfd) {
|
|
if (faccessat(modfd, "remove", F_OK, 0) == 0) {
|
|
LOGI("%s: remove\n", entry->d_name);
|
|
auto uninstaller = MODULEROOT + "/"s + entry->d_name + "/uninstall.sh";
|
|
if (access(uninstaller.data(), F_OK) == 0)
|
|
exec_script(uninstaller.data());
|
|
frm_rf(xdup(modfd));
|
|
unlinkat(dfd, entry->d_name, AT_REMOVEDIR);
|
|
return;
|
|
}
|
|
unlinkat(modfd, "update", 0);
|
|
if (faccessat(modfd, "disable", F_OK, 0) == 0)
|
|
return;
|
|
|
|
module_info info;
|
|
if (zygisk_enabled) {
|
|
// Riru and its modules are not compatible with zygisk
|
|
if (entry->d_name == "riru-core"sv || faccessat(modfd, "riru", F_OK, 0) == 0) {
|
|
LOGI("%s: ignore\n", entry->d_name);
|
|
return;
|
|
}
|
|
if (open_zygisk) {
|
|
#if defined(__arm__)
|
|
info.z32 = openat(modfd, "zygisk/armeabi-v7a.so", O_RDONLY | O_CLOEXEC);
|
|
#elif defined(__aarch64__)
|
|
info.z32 = openat(modfd, "zygisk/armeabi-v7a.so", O_RDONLY | O_CLOEXEC);
|
|
info.z64 = openat(modfd, "zygisk/arm64-v8a.so", O_RDONLY | O_CLOEXEC);
|
|
#elif defined(__i386__)
|
|
info.z32 = openat(modfd, "zygisk/x86.so", O_RDONLY | O_CLOEXEC);
|
|
#elif defined(__x86_64__)
|
|
info.z32 = openat(modfd, "zygisk/x86.so", O_RDONLY | O_CLOEXEC);
|
|
info.z64 = openat(modfd, "zygisk/x86_64.so", O_RDONLY | O_CLOEXEC);
|
|
#else
|
|
#error Unsupported ABI
|
|
#endif
|
|
unlinkat(modfd, "zygisk/unloaded", 0);
|
|
}
|
|
} else {
|
|
// Ignore zygisk modules when zygisk is not enabled
|
|
if (faccessat(modfd, "zygisk", F_OK, 0) == 0) {
|
|
LOGI("%s: ignore\n", entry->d_name);
|
|
return;
|
|
}
|
|
}
|
|
info.name = entry->d_name;
|
|
module_list->push_back(info);
|
|
});
|
|
if (zygisk_enabled) {
|
|
bool use_memfd = true;
|
|
auto convert_to_memfd = [&](int fd) -> int {
|
|
if (fd < 0)
|
|
return -1;
|
|
if (use_memfd) {
|
|
int memfd = syscall(__NR_memfd_create, "jit-cache", MFD_CLOEXEC);
|
|
if (memfd >= 0) {
|
|
xsendfile(memfd, fd, nullptr, INT_MAX);
|
|
close(fd);
|
|
return memfd;
|
|
} else {
|
|
// memfd_create failed, just use what we had
|
|
use_memfd = false;
|
|
}
|
|
}
|
|
return fd;
|
|
};
|
|
std::for_each(module_list->begin(), module_list->end(), [&](module_info &info) {
|
|
info.z32 = convert_to_memfd(info.z32);
|
|
#if defined(__LP64__)
|
|
info.z64 = convert_to_memfd(info.z64);
|
|
#endif
|
|
});
|
|
}
|
|
}
|
|
|
|
void handle_modules() {
|
|
prepare_modules();
|
|
collect_modules(false);
|
|
exec_module_scripts("post-fs-data");
|
|
|
|
// Recollect modules (module scripts could remove itself)
|
|
module_list->clear();
|
|
collect_modules(true);
|
|
}
|
|
|
|
static int check_rules_dir(char *buf, size_t sz) {
|
|
int off = ssprintf(buf, sz, "%s/" PREINITMIRR, get_magisk_tmp());
|
|
struct stat st1{};
|
|
struct stat st2{};
|
|
if (xstat(buf, &st1) < 0 || xstat(MODULEROOT, &st2) < 0)
|
|
return 0;
|
|
if (st1.st_dev == st2.st_dev && st1.st_ino == st2.st_ino)
|
|
return 0;
|
|
return off;
|
|
}
|
|
|
|
void disable_modules() {
|
|
char buf[4096];
|
|
int off = check_rules_dir(buf, sizeof(buf));
|
|
foreach_module([&](int, dirent *entry, int modfd) {
|
|
close(xopenat(modfd, "disable", O_RDONLY | O_CREAT | O_CLOEXEC, 0));
|
|
if (off) {
|
|
ssprintf(buf + off, sizeof(buf) - off, "/%s/sepolicy.rule", entry->d_name);
|
|
unlink(buf);
|
|
}
|
|
});
|
|
}
|
|
|
|
void remove_modules() {
|
|
char buf[4096];
|
|
int off = check_rules_dir(buf, sizeof(buf));
|
|
foreach_module([&](int, dirent *entry, int) {
|
|
auto uninstaller = MODULEROOT + "/"s + entry->d_name + "/uninstall.sh";
|
|
if (access(uninstaller.data(), F_OK) == 0)
|
|
exec_script(uninstaller.data());
|
|
if (off) {
|
|
ssprintf(buf + off, sizeof(buf) - off, "/%s/sepolicy.rule", entry->d_name);
|
|
unlink(buf);
|
|
}
|
|
});
|
|
rm_rf(MODULEROOT);
|
|
}
|
|
|
|
void exec_module_scripts(const char *stage) {
|
|
vector<string_view> module_names;
|
|
std::transform(module_list->begin(), module_list->end(), std::back_inserter(module_names),
|
|
[](const module_info &info) -> string_view { return info.name; });
|
|
exec_module_scripts(stage, module_names);
|
|
}
|