#include #include #include #include #include #include #include #include #include #include "init.hpp" #include "magiskrc.inc" #ifdef USE_64BIT #define LIBNAME "lib64" #else #define LIBNAME "lib" #endif using namespace std; static vector rc_list; static void patch_init_rc(const char *src, const char *dest, const char *tmp_dir) { FILE *rc = xfopen(dest, "we"); file_readline(src, [=](string_view line) -> bool { // Do not start vaultkeeper if (str_contains(line, "start vaultkeeper")) { LOGD("Remove vaultkeeper\n"); return true; } // Do not run flash_recovery if (str_starts(line, "service flash_recovery")) { LOGD("Remove flash_recovery\n"); fprintf(rc, "service flash_recovery /system/bin/xxxxx\n"); return true; } // Else just write the line fprintf(rc, "%s", line.data()); return true; }); fprintf(rc, "\n"); // Inject custom rc scripts for (auto &d : rc_list) fprintf(rc, "\n%s\n", d.buf); rc_list.clear(); // Inject Magisk rc scripts char pfd_svc[16], ls_svc[16], bc_svc[16]; gen_rand_str(pfd_svc, sizeof(pfd_svc)); gen_rand_str(ls_svc, sizeof(ls_svc)); gen_rand_str(bc_svc, sizeof(bc_svc)); LOGD("Inject magisk services: [%s] [%s] [%s]\n", pfd_svc, ls_svc, bc_svc); fprintf(rc, magiskrc, tmp_dir, pfd_svc, ls_svc, bc_svc); fclose(rc); clone_attr(src, dest); } static void load_overlay_rc(const char *overlay) { auto dir = open_dir(overlay); if (!dir) return; int dfd = dirfd(dir.get()); // Do not allow overwrite init.rc unlinkat(dfd, "init.rc", 0); for (dirent *entry; (entry = readdir(dir.get()));) { if (strend(entry->d_name, ".rc") == 0) { LOGD("Found rc script [%s]\n", entry->d_name); int rc = xopenat(dfd, entry->d_name, O_RDONLY | O_CLOEXEC); raw_data data; fd_full_read(rc, data.buf, data.sz); close(rc); rc_list.push_back(std::move(data)); unlinkat(dfd, entry->d_name, 0); } } } void RootFSInit::setup_rootfs() { if (patch_sepolicy()) { char *addr; size_t size; mmap_rw("/init", addr, size); for (char *p = addr; p < addr + size; ++p) { if (memcmp(p, SPLIT_PLAT_CIL, sizeof(SPLIT_PLAT_CIL)) == 0) { // Force init to load /sepolicy LOGD("Remove from init: " SPLIT_PLAT_CIL "\n"); memset(p, 'x', sizeof(SPLIT_PLAT_CIL) - 1); break; } } munmap(addr, size); } // Handle overlays if (access("/overlay.d", F_OK) == 0) { LOGD("Merge overlay.d\n"); load_overlay_rc("/overlay.d"); mv_path("/overlay.d", "/"); } patch_init_rc("/init.rc", "/init.p.rc", "/sbin"); rename("/init.p.rc", "/init.rc"); // Create hardlink mirror of /sbin to /root mkdir("/root", 0750); clone_attr("/sbin", "/root"); link_path("/sbin", "/root"); // Dump magiskinit as magisk int fd = xopen("/sbin/magisk", O_WRONLY | O_CREAT, 0755); write(fd, self.buf, self.sz); close(fd); } bool MagiskInit::patch_sepolicy(const char *file) { bool patch_init = false; if (access(SPLIT_PLAT_CIL, R_OK) == 0) { LOGD("sepol: split policy\n"); patch_init = true; } else if (access("/sepolicy", R_OK) == 0) { LOGD("sepol: monolithic policy\n"); load_policydb("/sepolicy"); } else { LOGD("sepol: no selinux\n"); return false; } // Mount selinuxfs to communicate with kernel xmount("selinuxfs", SELINUX_MNT, "selinuxfs", 0, nullptr); mount_list.emplace_back(SELINUX_MNT); if (patch_init) load_split_cil(); sepol_magisk_rules(); sepol_allow(SEPOL_PROC_DOMAIN, ALL, ALL, ALL); // Custom rules if (auto dir = xopen_dir(persist_dir.data()); dir) { for (dirent *entry; (entry = xreaddir(dir.get()));) { auto rule = persist_dir + "/" + entry->d_name + "/sepolicy.rule"; if (access(rule.data(), R_OK) == 0) { LOGD("Loading custom sepolicy patch: %s\n", rule.data()); load_rule_file(rule.data()); } } } dump_policydb(file); destroy_policydb(); // Remove OnePlus stupid debug sepolicy and use our own if (access("/sepolicy_debug", F_OK) == 0) { unlink("/sepolicy_debug"); link("/sepolicy", "/sepolicy_debug"); } return patch_init; } static void recreate_sbin(const char *mirror, bool use_bind_mount) { auto dp = xopen_dir(mirror); int src = dirfd(dp.get()); char buf[4096]; for (dirent *entry; (entry = xreaddir(dp.get()));) { string sbin_path = "/sbin/"s + entry->d_name; struct stat st; fstatat(src, entry->d_name, &st, AT_SYMLINK_NOFOLLOW); if (S_ISLNK(st.st_mode)) { xreadlinkat(src, entry->d_name, buf, sizeof(buf)); xsymlink(buf, sbin_path.data()); } else { sprintf(buf, "%s/%s", mirror, entry->d_name); if (use_bind_mount) { auto mode = st.st_mode & 0777; // Create dummy if (S_ISDIR(st.st_mode)) xmkdir(sbin_path.data(), mode); else close(xopen(sbin_path.data(), O_CREAT | O_WRONLY | O_CLOEXEC, mode)); xmount(buf, sbin_path.data(), nullptr, MS_BIND, nullptr); } else { xsymlink(buf, sbin_path.data()); } } } } static string magic_mount_list; static void magic_mount(const string &sdir, const string &ddir = "") { auto dir = xopen_dir(sdir.data()); for (dirent *entry; (entry = xreaddir(dir.get()));) { string src = sdir + "/" + entry->d_name; string dest = ddir + "/" + entry->d_name; if (access(dest.data(), F_OK) == 0) { if (entry->d_type == DT_DIR) { // Recursive magic_mount(src, dest); } else { LOGD("Mount [%s] -> [%s]\n", src.data(), dest.data()); xmount(src.data(), dest.data(), nullptr, MS_BIND, nullptr); magic_mount_list += dest; magic_mount_list += '\n'; } } } } #define ROOTMIR MIRRDIR "/system_root" #define ROOTBLK BLOCKDIR "/system_root" #define MONOPOLICY "/sepolicy" #define LIBSELINUX "/system/" LIBNAME "/libselinux.so" #define NEW_INITRC "/system/etc/init/hw/init.rc" void SARBase::patch_rootdir() { char tmp_dir[16]; const char *sepol; char *p; if (access("/sbin", F_OK) == 0) { p = tmp_dir + sprintf(tmp_dir, "%s", "/sbin"); sepol = "/sbin/.se"; } else { p = tmp_dir + sprintf(tmp_dir, "%s", "/dev/"); p += gen_rand_str(p, 8); xmkdir(tmp_dir, 0); sepol = "/dev/.se"; } setup_tmp(tmp_dir, self, config); persist_dir = string(tmp_dir) + "/" MIRRDIR "/persist"; chdir(tmp_dir); // Mount system_root mirror struct stat st; xstat("/", &st); xmkdir(ROOTMIR, 0755); mknod(ROOTBLK, S_IFBLK | 0600, st.st_dev); strcpy(p, "/" ROOTBLK); if (xmount(tmp_dir, ROOTMIR, "ext4", MS_RDONLY, nullptr)) xmount(tmp_dir, ROOTMIR, "erofs", MS_RDONLY, nullptr); *p = '\0'; // Recreate original sbin structure if necessary if (tmp_dir == "/sbin"sv) recreate_sbin(ROOTMIR "/sbin", true); // Patch init raw_data init; bool redirect = false; int src = xopen("/init", O_RDONLY | O_CLOEXEC); fd_full_read(src, init.buf, init.sz); uint8_t *eof = init.buf + init.sz; for (uint8_t *p = init.buf; p < eof;) { if (memcmp(p, SPLIT_PLAT_CIL, sizeof(SPLIT_PLAT_CIL)) == 0) { LOGD("Remove from init: " SPLIT_PLAT_CIL "\n"); memset(p, 'x', sizeof(SPLIT_PLAT_CIL) - 1); p += sizeof(SPLIT_PLAT_CIL); } else if (memcmp(p, MONOPOLICY, sizeof(MONOPOLICY)) == 0) { LOGD("Patch init [" MONOPOLICY "] -> [%s]\n", sepol); strcpy(reinterpret_cast(p), sepol); redirect = true; p += sizeof(MONOPOLICY); } else { ++p; } } xmkdir(ROOTOVL, 0); int dest = xopen(ROOTOVL "/init", O_CREAT | O_WRONLY | O_CLOEXEC); xwrite(dest, init.buf, init.sz); fclone_attr(src, dest); close(src); close(dest); if (!redirect) { // init is dynamically linked, need to patch libselinux raw_data lib; full_read(LIBSELINUX, lib.buf, lib.sz); eof = lib.buf + lib.sz; for (uint8_t *p = lib.buf; p < eof; ++p) { if (memcmp(p, MONOPOLICY, sizeof(MONOPOLICY)) == 0) { LOGD("Patch libselinux.so [" MONOPOLICY "] -> [%s]\n", sepol); strcpy(reinterpret_cast(p), sepol); break; } } xmkdirs(dirname(ROOTOVL LIBSELINUX), 0755); dest = xopen(ROOTOVL LIBSELINUX, O_CREAT | O_WRONLY | O_CLOEXEC); xwrite(dest, lib.buf, lib.sz); close(dest); clone_attr(LIBSELINUX, ROOTOVL LIBSELINUX); } // sepolicy patch_sepolicy(sepol); // Handle overlay struct sockaddr_un sun; int sockfd = xsocket(AF_LOCAL, SOCK_STREAM | SOCK_CLOEXEC, 0); if (connect(sockfd, (struct sockaddr*) &sun, setup_sockaddr(&sun, INIT_SOCKET)) == 0) { LOGD("ACK init tracer to write backup files\n"); // Let tracer know where tmp_dir is write_string(sockfd, tmp_dir); // Wait for tracer to finish copying files int ack; read(sockfd, &ack, sizeof(ack)); } else { LOGD("Restore backup files locally\n"); restore_folder(ROOTOVL, overlays); overlays.clear(); } close(sockfd); if (access(ROOTOVL "/sbin", F_OK) == 0) { file_attr a; getattr("/sbin", &a); cp_afc(ROOTOVL "/sbin", "/sbin"); rm_rf(ROOTOVL "/sbin"); setattr("/sbin", &a); } // Patch init.rc if (access("/init.rc", F_OK) == 0) { patch_init_rc("/init.rc", ROOTOVL "/init.rc", tmp_dir); } else { // Android 11's new init.rc xmkdirs(dirname(ROOTOVL NEW_INITRC), 0755); patch_init_rc(NEW_INITRC, ROOTOVL NEW_INITRC, tmp_dir); } // Mount rootdir magic_mount(ROOTOVL); dest = xopen(ROOTMNT, O_WRONLY | O_CREAT | O_CLOEXEC, 0); write(dest, magic_mount_list.data(), magic_mount_list.length()); close(dest); chdir("/"); } int magisk_proxy_main(int argc, char *argv[]) { setup_klog(); raw_data config; raw_data self; full_read("/sbin/magisk", self.buf, self.sz); full_read("/.backup/.magisk", config.buf, config.sz); xmount(nullptr, "/", nullptr, MS_REMOUNT, nullptr); unlink("/sbin/magisk"); rm_rf("/.backup"); setup_tmp("/sbin", self, config); // Create symlinks pointing back to /root recreate_sbin("/root", false); setenv("REMOUNT_ROOT", "1", 1); execv("/sbin/magisk", argv); return 1; }