f24df4f43d
The root nodes are /system and /vendor. Adding new files into these directories, although works on some devices, mostly bootloops on many devices out there. So don't allow it, which also makes the whole magic mounting logic much easier and extensible.
736 lines
18 KiB
C++
736 lines
18 KiB
C++
/* bootstages.c - Core bootstage operations
|
|
*
|
|
* All bootstage operations, including simple mount in post-fs,
|
|
* magisk mount in post-fs-data, various image handling, script
|
|
* execution, load modules, install Magisk Manager etc.
|
|
*/
|
|
|
|
#include <sys/mount.h>
|
|
#include <sys/wait.h>
|
|
#include <stdlib.h>
|
|
#include <stdio.h>
|
|
#include <unistd.h>
|
|
#include <fcntl.h>
|
|
#include <string.h>
|
|
#include <dirent.h>
|
|
#include <vector>
|
|
#include <string>
|
|
|
|
#include <magisk.h>
|
|
#include <db.h>
|
|
#include <utils.h>
|
|
#include <daemon.h>
|
|
#include <resetprop.h>
|
|
#include <selinux.h>
|
|
#include <flags.h>
|
|
|
|
using namespace std;
|
|
|
|
static char buf[PATH_MAX], buf2[PATH_MAX];
|
|
static vector<string> module_list;
|
|
static bool no_secure_dir = false;
|
|
|
|
static int bind_mount(const char *from, const char *to, bool log = true);
|
|
extern void auto_start_magiskhide();
|
|
|
|
/***************
|
|
* Magic Mount *
|
|
***************/
|
|
|
|
#ifdef MAGISK_DEBUG
|
|
#define VLOGI(tag, from, to) LOGI("%s: %s <- %s\n", tag, to, from)
|
|
#else
|
|
#define VLOGI(tag, from, to) LOGI("%s: %s\n", tag, to)
|
|
#endif
|
|
|
|
// Precedence: MODULE > SKEL > INTER > DUMMY
|
|
#define IS_DUMMY 0x01 /* mount from mirror */
|
|
#define IS_INTER 0x02 /* intermediate node */
|
|
#define IS_SKEL 0x04 /* replace with tmpfs */
|
|
#define IS_MODULE 0x08 /* mount from module */
|
|
|
|
#define IS_DIR(n) ((n)->type == DT_DIR)
|
|
#define IS_LNK(n) ((n)->type == DT_LNK)
|
|
#define IS_REG(n) ((n)->type == DT_REG)
|
|
|
|
class node_entry {
|
|
public:
|
|
explicit node_entry(const char *name, uint8_t status = 0, uint8_t type = 0)
|
|
: name(name), type(type), status(status), parent(nullptr) {}
|
|
~node_entry();
|
|
void create_module_tree(const char *module);
|
|
void magic_mount();
|
|
node_entry *extract(const char *name);
|
|
|
|
private:
|
|
const char *module; /* Only used when status & IS_MODULE */
|
|
const string name;
|
|
uint8_t type;
|
|
uint8_t status;
|
|
node_entry *parent;
|
|
vector<node_entry *> children;
|
|
|
|
node_entry(node_entry *parent, const char *module, const char *name, uint8_t type)
|
|
: node_entry(name, 0, type) {
|
|
this->parent = parent;
|
|
this->module = module;
|
|
}
|
|
bool is_special();
|
|
bool is_root();
|
|
string get_path();
|
|
void insert(node_entry *&);
|
|
void clone_skeleton();
|
|
int get_path(char *path);
|
|
};
|
|
|
|
node_entry::~node_entry() {
|
|
for (auto &node : children)
|
|
delete node;
|
|
}
|
|
|
|
bool node_entry::is_special() {
|
|
return parent ? (parent->parent ? false : name == "vendor") : false;
|
|
}
|
|
|
|
bool node_entry::is_root() {
|
|
return parent ? (parent->parent ? false : name == "vendor") : true;
|
|
}
|
|
|
|
string node_entry::get_path() {
|
|
get_path(buf);
|
|
return buf;
|
|
}
|
|
|
|
int node_entry::get_path(char *path) {
|
|
int len = 0;
|
|
if (parent)
|
|
len = parent->get_path(path);
|
|
len += sprintf(path + len, "/%s", name.c_str());
|
|
return len;
|
|
}
|
|
|
|
void node_entry::insert(node_entry *&node) {
|
|
node->parent = this;
|
|
for (auto &child : children) {
|
|
if (child->name == node->name) {
|
|
if (node->status > child->status) {
|
|
// The new node has higher precedence
|
|
delete child;
|
|
child = node;
|
|
} else {
|
|
delete node;
|
|
node = child;
|
|
}
|
|
return;
|
|
}
|
|
}
|
|
children.push_back(node);
|
|
}
|
|
|
|
void node_entry::create_module_tree(const char *module) {
|
|
DIR *dir;
|
|
struct dirent *entry;
|
|
|
|
auto full_path = get_path();
|
|
snprintf(buf, PATH_MAX, "%s/%s%s", MODULEROOT, module, full_path.c_str());
|
|
if (!(dir = xopendir(buf)))
|
|
return;
|
|
|
|
while ((entry = xreaddir(dir))) {
|
|
if (strcmp(entry->d_name, ".") == 0 || strcmp(entry->d_name, "..") == 0)
|
|
continue;
|
|
// Create new node
|
|
auto node = new node_entry(this, module, entry->d_name, entry->d_type);
|
|
|
|
// buf = real path, buf2 = module path
|
|
snprintf(buf, PATH_MAX, "%s/%s", full_path.c_str(), entry->d_name);
|
|
int eof = snprintf(buf2, PATH_MAX, MODULEROOT "/%s%s/%s",
|
|
module, full_path.c_str(), entry->d_name);
|
|
|
|
/*
|
|
* Clone current node directory in the following condition:
|
|
* 1. We are not a root node
|
|
* 2. Target does not exist or
|
|
* 3. Module file is a symlink or
|
|
* 4. Target file is a symlink (exclude special nodes)
|
|
*/
|
|
bool clone = false;
|
|
if (IS_LNK(node) || access(buf, F_OK) == -1) {
|
|
clone = true;
|
|
} else if (!node->is_special()) {
|
|
struct stat s;
|
|
xlstat(buf, &s);
|
|
if (S_ISLNK(s.st_mode))
|
|
clone = true;
|
|
}
|
|
if (clone && is_root()) {
|
|
// Remove both the new node and file that requires cloning ourselves
|
|
rm_rf(buf2);
|
|
delete node;
|
|
continue;
|
|
}
|
|
|
|
if (clone) {
|
|
// Mark self as a skeleton
|
|
status |= IS_SKEL; /* This will not overwrite if parent is module */
|
|
node->status = IS_MODULE;
|
|
} else if (node->is_special()) {
|
|
// Special nodes will be pulled out as root nodes later
|
|
node->status = IS_INTER;
|
|
} else {
|
|
// Clone attributes from real path
|
|
clone_attr(buf, buf2);
|
|
if (IS_DIR(node)) {
|
|
// Check if marked as replace
|
|
strcpy(buf2 + eof, "/.replace");
|
|
if (access(buf2, F_OK) == 0) {
|
|
// Replace everything, mark as leaf
|
|
node->status = IS_MODULE;
|
|
} else {
|
|
// This will be an intermediate node
|
|
node->status = IS_INTER;
|
|
}
|
|
} else if (IS_REG(node)) {
|
|
// This is a file, mark as leaf
|
|
node->status = IS_MODULE;
|
|
}
|
|
}
|
|
insert(node);
|
|
if (IS_DIR(node)) {
|
|
// Recursive traverse through everything
|
|
node->create_module_tree(module);
|
|
}
|
|
}
|
|
closedir(dir);
|
|
}
|
|
|
|
void node_entry::clone_skeleton() {
|
|
DIR *dir;
|
|
struct dirent *entry;
|
|
struct node_entry *dummy;
|
|
|
|
// Clone the structure
|
|
auto full_path = get_path();
|
|
snprintf(buf, PATH_MAX, "%s%s", MIRRDIR, full_path.c_str());
|
|
if (!(dir = xopendir(buf)))
|
|
return;
|
|
while ((entry = xreaddir(dir))) {
|
|
if (strcmp(entry->d_name, ".") == 0 || strcmp(entry->d_name, "..") == 0)
|
|
continue;
|
|
// Create dummy node
|
|
dummy = new node_entry(entry->d_name, IS_DUMMY, entry->d_type);
|
|
insert(dummy);
|
|
}
|
|
closedir(dir);
|
|
|
|
if (status & IS_SKEL) {
|
|
file_attr attr;
|
|
getattr(full_path.c_str(), &attr);
|
|
LOGI("mnt_tmpfs : %s\n", full_path.c_str());
|
|
xmount("tmpfs", full_path.c_str(), "tmpfs", 0, nullptr);
|
|
setattr(full_path.c_str(), &attr);
|
|
}
|
|
|
|
for (auto &child : children) {
|
|
snprintf(buf, PATH_MAX, "%s/%s", full_path.c_str(), child->name.c_str());
|
|
|
|
// Create the dummy file/directory
|
|
if (IS_DIR(child))
|
|
xmkdir(buf, 0755);
|
|
else if (IS_REG(child))
|
|
close(creat(buf, 0644));
|
|
// Links will be handled later
|
|
|
|
if (child->status & IS_MODULE) {
|
|
// Mount from module file to dummy file
|
|
snprintf(buf2, PATH_MAX, "%s/%s%s/%s", MODULEMNT,
|
|
child->module, full_path.c_str(), child->name.c_str());
|
|
} else if (child->status & (IS_SKEL | IS_INTER)) {
|
|
// It's an intermediate folder, recursive clone
|
|
child->clone_skeleton();
|
|
continue;
|
|
} else if (child->status & IS_DUMMY) {
|
|
// Mount from mirror to dummy file
|
|
snprintf(buf2, PATH_MAX, "%s%s/%s", MIRRDIR, full_path.c_str(), child->name.c_str());
|
|
}
|
|
|
|
if (IS_LNK(child)) {
|
|
// Copy symlinks directly
|
|
cp_afc(buf2, buf);
|
|
VLOGI("copy_link ", buf2, buf);
|
|
} else {
|
|
snprintf(buf, PATH_MAX, "%s/%s", full_path.c_str(), child->name.c_str());
|
|
bind_mount(buf2, buf);
|
|
}
|
|
}
|
|
}
|
|
|
|
void node_entry::magic_mount() {
|
|
if (status & IS_MODULE) {
|
|
// Mount module item
|
|
auto real_path = get_path();
|
|
snprintf(buf, PATH_MAX, "%s/%s%s", MODULEMNT, module, real_path.c_str());
|
|
bind_mount(buf, real_path.c_str());
|
|
} else if (status & IS_SKEL) {
|
|
// The node is labeled to be cloned with skeleton, lets do it
|
|
clone_skeleton();
|
|
} else if (status & IS_INTER) {
|
|
// It's an intermediate node, travel deeper
|
|
for (auto &child : children)
|
|
child->magic_mount();
|
|
}
|
|
}
|
|
|
|
node_entry *node_entry::extract(const char *name) {
|
|
node_entry *node = nullptr;
|
|
// Extract the node out of the tree
|
|
for (auto it = children.begin(); it != children.end(); ++it) {
|
|
if ((*it)->name == name) {
|
|
node = *it;
|
|
node->parent = nullptr;
|
|
children.erase(it);
|
|
break;
|
|
}
|
|
}
|
|
return node;
|
|
}
|
|
|
|
/*****************
|
|
* Miscellaneous *
|
|
*****************/
|
|
|
|
static int bind_mount(const char *from, const char *to, bool log) {
|
|
int ret = xmount(from, to, nullptr, MS_BIND, nullptr);
|
|
if (log) VLOGI("bind_mount", from, to);
|
|
return ret;
|
|
}
|
|
|
|
#define MIRRMNT(part) MIRRDIR "/" #part
|
|
#define PARTBLK(part) BLOCKDIR "/" #part
|
|
|
|
#define mount_mirror(part, flag) { \
|
|
sscanf(line.data(), "%s %*s %s", buf, buf2); \
|
|
xstat(buf, &st); \
|
|
mknod(PARTBLK(part), S_IFBLK | 0600, st.st_rdev); \
|
|
xmkdir(MIRRMNT(part), 0755); \
|
|
xmount(PARTBLK(part), MIRRMNT(part), buf2, flag, nullptr); \
|
|
VLOGI("mount", PARTBLK(part), MIRRMNT(part)); \
|
|
}
|
|
|
|
static bool magisk_env() {
|
|
LOGI("* Initializing Magisk environment\n");
|
|
|
|
// Alternative binaries paths
|
|
constexpr const char *alt_bin[] = {
|
|
"/cache/data_adb/magisk", "/data/magisk",
|
|
"/data/data/com.topjohnwu.magisk/install",
|
|
"/data/user_de/0/com.topjohnwu.magisk/install"
|
|
};
|
|
for (auto &alt : alt_bin) {
|
|
struct stat st;
|
|
if (lstat(alt, &st) != -1) {
|
|
if (S_ISLNK(st.st_mode)) {
|
|
unlink(alt);
|
|
continue;
|
|
}
|
|
rm_rf(DATABIN);;
|
|
cp_afc(alt, DATABIN);
|
|
rm_rf(alt);
|
|
break;
|
|
}
|
|
}
|
|
|
|
// Remove stuffs
|
|
rm_rf("/cache/data_adb");
|
|
unlink("/data/magisk.img");
|
|
unlink("/data/magisk_debug.log");
|
|
|
|
// Backwards compatibility
|
|
symlink(MAGISKTMP, "/sbin/.core");
|
|
symlink(MODULEMNT, MAGISKTMP "/img");
|
|
|
|
// Directories in tmpfs overlay
|
|
xmkdir(MIRRDIR, 0);
|
|
xmkdir(BLOCKDIR, 0);
|
|
xmkdir(BBPATH, 0755);
|
|
xmkdir(MODULEMNT, 0755);
|
|
|
|
// Directories in /data/adb
|
|
xmkdir(DATABIN, 0755);
|
|
xmkdir(MODULEROOT, 0755);
|
|
xmkdir(SECURE_DIR "/post-fs-data.d", 0755);
|
|
xmkdir(SECURE_DIR "/service.d", 0755);
|
|
|
|
LOGI("* Mounting mirrors");
|
|
bool system_as_root = false;
|
|
struct stat st;
|
|
file_readline("/proc/mounts", [&](string_view line) -> bool {
|
|
if (str_contains(line, " /system_root ")) {
|
|
mount_mirror(system_root, MS_RDONLY);
|
|
xsymlink(MIRRMNT(system_root) "/system", MIRRMNT(system));
|
|
VLOGI("link", MIRRMNT(system_root) "/system", MIRRMNT(system));
|
|
system_as_root = true;
|
|
} else if (!system_as_root && str_contains(line, " /system ")) {
|
|
mount_mirror(system, MS_RDONLY);
|
|
} else if (str_contains(line, " /vendor ")) {
|
|
mount_mirror(vendor, MS_RDONLY);
|
|
} else if (str_contains(line, " /data ")) {
|
|
mount_mirror(data, 0);
|
|
} else if (SDK_INT >= 24 &&
|
|
str_contains(line, " /proc ") && !str_contains(line, "hidepid=2")) {
|
|
// Enforce hidepid
|
|
xmount(nullptr, "/proc", nullptr, MS_REMOUNT, "hidepid=2,gid=3009");
|
|
}
|
|
return true;
|
|
});
|
|
if (access(MIRRMNT(vendor), F_OK) != 0) {
|
|
xsymlink(MIRRMNT(system) "/vendor", MIRRMNT(vendor));
|
|
VLOGI("link", MIRRMNT(system) "/vendor", MIRRMNT(vendor));
|
|
}
|
|
|
|
// Disable/remove magiskhide, resetprop, and modules
|
|
if (SDK_INT < 19) {
|
|
close(xopen(DISABLEFILE, O_RDONLY | O_CREAT | O_CLOEXEC, 0));
|
|
unlink("/sbin/resetprop");
|
|
unlink("/sbin/magiskhide");
|
|
}
|
|
|
|
if (access(DATABIN "/busybox", X_OK) == -1)
|
|
return false;
|
|
LOGI("* Setting up internal busybox");
|
|
cp_afc(DATABIN "/busybox", BBPATH "/busybox");
|
|
exec_command_sync(BBPATH "/busybox", "--install", "-s", BBPATH);
|
|
|
|
return true;
|
|
}
|
|
|
|
static void prepare_modules() {
|
|
const char *legacy_imgs[] = {SECURE_DIR "/magisk.img", SECURE_DIR "/magisk_merge.img"};
|
|
for (auto img : legacy_imgs) {
|
|
if (access(img, F_OK) == 0)
|
|
migrate_img(img);
|
|
}
|
|
DIR *dir;
|
|
struct dirent *entry;
|
|
if ((dir = opendir(MODULEUPGRADE))) {
|
|
while ((entry = xreaddir(dir))) {
|
|
if (entry->d_type == DT_DIR) {
|
|
if (strcmp(entry->d_name, ".") == 0 || strcmp(entry->d_name, "..") == 0)
|
|
continue;
|
|
// Cleanup old module if exists
|
|
snprintf(buf, sizeof(buf), "%s/%s", MODULEROOT, entry->d_name);
|
|
if (access(buf, F_OK) == 0)
|
|
rm_rf(buf);
|
|
LOGI("Upgrade / New module: %s\n", entry->d_name);
|
|
snprintf(buf2, sizeof(buf2), "%s/%s", MODULEUPGRADE, entry->d_name);
|
|
rename(buf2, buf);
|
|
}
|
|
}
|
|
closedir(dir);
|
|
rm_rf(MODULEUPGRADE);
|
|
}
|
|
bind_mount(MIRRDIR MODULEROOT, MODULEMNT, false);
|
|
// Legacy support
|
|
xmkdir(LEGACYCORE, 0755);
|
|
symlink(SECURE_DIR "/post-fs-data.d", LEGACYCORE "/post-fs-data.d");
|
|
symlink(SECURE_DIR "/service.d", LEGACYCORE "/service.d");
|
|
}
|
|
|
|
static void collect_modules() {
|
|
chdir(MODULEROOT);
|
|
rm_rf("lost+found");
|
|
DIR *dir = xopendir(".");
|
|
struct dirent *entry;
|
|
while ((entry = xreaddir(dir))) {
|
|
if (entry->d_type == DT_DIR) {
|
|
if (strcmp(entry->d_name, ".") == 0 ||
|
|
strcmp(entry->d_name, "..") == 0 ||
|
|
strcmp(entry->d_name, ".core") == 0)
|
|
continue;
|
|
chdir(entry->d_name);
|
|
if (access("remove", F_OK) == 0) {
|
|
chdir("..");
|
|
LOGI("%s: remove\n", entry->d_name);
|
|
sprintf(buf, "%s/uninstall.sh", entry->d_name);
|
|
if (access(buf, F_OK) == 0)
|
|
exec_script(buf);
|
|
rm_rf(entry->d_name);
|
|
continue;
|
|
}
|
|
unlink("update");
|
|
if (access("disable", F_OK))
|
|
module_list.emplace_back(entry->d_name);
|
|
chdir("..");
|
|
}
|
|
}
|
|
closedir(dir);
|
|
chdir("/");
|
|
}
|
|
|
|
static bool check_data() {
|
|
bool mnt = false;
|
|
bool data = false;
|
|
file_readline("/proc/mounts", [&](string_view s) -> bool {
|
|
if (str_contains(s, " /data ") && !str_contains(s, "tmpfs"))
|
|
mnt = true;
|
|
return true;
|
|
});
|
|
if (mnt) {
|
|
auto crypto = getprop("ro.crypto.state");
|
|
if (!crypto.empty()) {
|
|
if (crypto == "unencrypted") {
|
|
// Unencrypted, we can directly access data
|
|
data = true;
|
|
} else {
|
|
// Encrypted, check whether vold is started
|
|
data = !getprop("init.svc.vold").empty();
|
|
}
|
|
} else {
|
|
// ro.crypto.state is not set, assume it's unencrypted
|
|
data = true;
|
|
}
|
|
}
|
|
return data;
|
|
}
|
|
|
|
void unlock_blocks() {
|
|
DIR *dir;
|
|
struct dirent *entry;
|
|
int fd, dev, OFF = 0;
|
|
|
|
if ((dev = xopen("/dev/block", O_RDONLY | O_CLOEXEC)) < 0)
|
|
return;
|
|
dir = xfdopendir(dev);
|
|
|
|
while((entry = readdir(dir))) {
|
|
if (entry->d_type == DT_BLK) {
|
|
if ((fd = openat(dev, entry->d_name, O_RDONLY)) < 0)
|
|
continue;
|
|
if (ioctl(fd, BLKROSET, &OFF) == -1)
|
|
PLOGE("unlock %s", entry->d_name);
|
|
close(fd);
|
|
}
|
|
}
|
|
close(dev);
|
|
}
|
|
|
|
static bool log_dump = false;
|
|
static void dump_logs() {
|
|
if (log_dump)
|
|
return;
|
|
int test = exec_command_sync("/system/bin/logcat", "-d", "-f", "/dev/null");
|
|
chmod("/dev/null", 0666);
|
|
if (test != 0)
|
|
return;
|
|
rename(LOGFILE, LOGFILE ".bak");
|
|
log_dump = true;
|
|
// Start a daemon thread and wait indefinitely
|
|
new_daemon_thread([](auto) -> void* {
|
|
int fd = xopen(LOGFILE, O_WRONLY | O_APPEND | O_CREAT | O_CLOEXEC, 0644);
|
|
exec_t exec {
|
|
.fd = fd,
|
|
.fork = fork_no_zombie
|
|
};
|
|
int pid = exec_command(exec, "/system/bin/logcat", "-s", "Magisk");
|
|
close(fd);
|
|
if (pid < 0) {
|
|
log_dump = false;
|
|
return nullptr;
|
|
}
|
|
waitpid(pid, nullptr, 0);
|
|
return nullptr;
|
|
});
|
|
}
|
|
|
|
/****************
|
|
* Entry points *
|
|
****************/
|
|
|
|
[[noreturn]] static void unblock_boot_process() {
|
|
close(xopen(UNBLOCKFILE, O_RDONLY | O_CREAT, 0));
|
|
pthread_exit(nullptr);
|
|
}
|
|
|
|
[[noreturn]] static void core_only() {
|
|
auto_start_magiskhide();
|
|
unblock_boot_process();
|
|
}
|
|
|
|
void post_fs_data(int client) {
|
|
// ack
|
|
write_int(client, 0);
|
|
close(client);
|
|
|
|
if (!check_data())
|
|
unblock_boot_process();
|
|
|
|
dump_logs();
|
|
|
|
LOGI("** post-fs-data mode running\n");
|
|
|
|
// Unlock all blocks for rw
|
|
unlock_blocks();
|
|
|
|
if (access(SECURE_DIR, F_OK) != 0) {
|
|
/* If the folder is not automatically created by the system,
|
|
* do NOT proceed further. Manual creation of the folder
|
|
* will cause bootloops on FBE devices. */
|
|
LOGE(SECURE_DIR " is not present, abort...");
|
|
no_secure_dir = true;
|
|
unblock_boot_process();
|
|
}
|
|
|
|
#if 0
|
|
// Increment boot count
|
|
int boot_count = 0;
|
|
FILE *cf = fopen(BOOTCOUNT, "r");
|
|
if (cf) {
|
|
fscanf(cf, "%d", &boot_count);
|
|
fclose(cf);
|
|
}
|
|
boot_count++;
|
|
if (boot_count > 2)
|
|
creat(DISABLEFILE, 0644);
|
|
cf = xfopen(BOOTCOUNT, "w");
|
|
fprintf(cf, "%d", boot_count);
|
|
fclose(cf);
|
|
#endif
|
|
|
|
if (!magisk_env()) {
|
|
LOGE("* Magisk environment setup incomplete, abort\n");
|
|
unblock_boot_process();
|
|
}
|
|
|
|
LOGI("* Running post-fs-data.d scripts\n");
|
|
exec_common_script("post-fs-data");
|
|
|
|
prepare_modules();
|
|
|
|
// Core only mode
|
|
if (access(DISABLEFILE, F_OK) == 0)
|
|
core_only();
|
|
|
|
restorecon();
|
|
chmod(SECURE_DIR, 0700);
|
|
|
|
collect_modules();
|
|
|
|
// Execute module scripts
|
|
LOGI("* Running module post-fs-data scripts\n");
|
|
exec_module_script("post-fs-data", module_list);
|
|
|
|
// Recollect modules
|
|
module_list.clear();
|
|
collect_modules();
|
|
|
|
// Create the system root entry
|
|
auto sys_root = new node_entry("system", IS_INTER);
|
|
|
|
bool has_modules = false;
|
|
|
|
LOGI("* Loading modules\n");
|
|
for (const auto &m : module_list) {
|
|
const auto module = m.c_str();
|
|
// Read props
|
|
snprintf(buf, PATH_MAX, "%s/%s/system.prop", MODULEROOT, module);
|
|
if (access(buf, F_OK) == 0) {
|
|
LOGI("%s: loading [system.prop]\n", module);
|
|
load_prop_file(buf, false);
|
|
}
|
|
// Check whether skip mounting
|
|
snprintf(buf, PATH_MAX, "%s/%s/skip_mount", MODULEROOT, module);
|
|
if (access(buf, F_OK) == 0)
|
|
continue;
|
|
// Double check whether the system folder exists
|
|
snprintf(buf, PATH_MAX, "%s/%s/system", MODULEROOT, module);
|
|
if (access(buf, F_OK) == -1)
|
|
continue;
|
|
|
|
// Construct structure
|
|
has_modules = true;
|
|
LOGI("%s: constructing magic mount structure\n", module);
|
|
// If /system/vendor exists in module, create a link outside
|
|
snprintf(buf, PATH_MAX, "%s/%s/system/vendor", MODULEROOT, module);
|
|
if (access(buf, F_OK) == 0) {
|
|
snprintf(buf2, PATH_MAX, "%s/%s/vendor", MODULEROOT, module);
|
|
unlink(buf2);
|
|
xsymlink(buf, buf2);
|
|
}
|
|
sys_root->create_module_tree(module);
|
|
}
|
|
|
|
if (has_modules) {
|
|
// Pull out special nodes if exist
|
|
node_entry *special;
|
|
if ((special = sys_root->extract("vendor"))) {
|
|
special->magic_mount();
|
|
delete special;
|
|
}
|
|
|
|
sys_root->magic_mount();
|
|
}
|
|
|
|
// Cleanup memory
|
|
delete sys_root;
|
|
|
|
core_only();
|
|
}
|
|
|
|
void late_start(int client) {
|
|
LOGI("** late_start service mode running\n");
|
|
// ack
|
|
write_int(client, 0);
|
|
close(client);
|
|
|
|
dump_logs();
|
|
|
|
if (no_secure_dir) {
|
|
// It's safe to create the folder at this point if the system didn't create it
|
|
if (access(SECURE_DIR, F_OK) != 0)
|
|
xmkdir(SECURE_DIR, 0700);
|
|
// And reboot to make proper setup possible
|
|
if (RECOVERY_MODE)
|
|
exec_command_sync("/system/bin/reboot", "recovery");
|
|
else
|
|
exec_command_sync("/system/bin/reboot");
|
|
}
|
|
|
|
auto_start_magiskhide();
|
|
|
|
// Run scripts after full patch, most reliable way to run scripts
|
|
LOGI("* Running service.d scripts\n");
|
|
exec_common_script("service");
|
|
|
|
// Core only mode
|
|
if (access(DISABLEFILE, F_OK) != 0) {
|
|
LOGI("* Running module service scripts\n");
|
|
exec_module_script("service", module_list);
|
|
}
|
|
|
|
// All boot stage done, cleanup
|
|
module_list.clear();
|
|
module_list.shrink_to_fit();
|
|
}
|
|
|
|
void boot_complete(int client) {
|
|
LOGI("** boot_complete triggered\n");
|
|
// ack
|
|
write_int(client, 0);
|
|
close(client);
|
|
|
|
if (access(MANAGERAPK, F_OK) == 0) {
|
|
// Install Magisk Manager if exists
|
|
rename(MANAGERAPK, "/data/magisk.apk");
|
|
install_apk("/data/magisk.apk");
|
|
} else {
|
|
// Check whether we have a valid manager installed
|
|
db_strings str;
|
|
get_db_strings(str, SU_MANAGER);
|
|
if (validate_manager(str[SU_MANAGER], 0, nullptr)) {
|
|
// There is no manager installed, install the stub
|
|
exec_command_sync("/sbin/magiskinit", "-x", "manager", "/data/magisk.apk");
|
|
install_apk("/data/magisk.apk");
|
|
}
|
|
}
|
|
}
|