fixes and stuff for droid x

This commit is contained in:
Koushik Dutta 2010-08-17 16:55:38 -07:00
parent d632c0def4
commit f0e31b89b9
5 changed files with 80 additions and 35 deletions

View File

@ -796,6 +796,7 @@ void show_advanced_menu()
"Wipe Battery Stats",
"Report Error",
"Key Test",
"Restart adbd",
NULL
};
@ -847,6 +848,11 @@ void show_advanced_menu()
}
while (action != GO_BACK);
}
case 5:
{
__system("kill $(ps | grep adbd)");
__system("/sbin/adbd &");
}
}
}
}

View File

@ -6,7 +6,7 @@ include $(CLEAR_VARS)
LOCAL_SRC_FILES := hijack.c
LOCAL_MODULE := hijack
LOCAL_MODULE_TAGS := eng
LOCAL_STATIC_LIBRARIES := libmtdutils libcutils libc
LOCAL_STATIC_LIBRARIES := libbusybox libclearsilverregex libm libcutils libc
LOCAL_FORCE_STATIC_EXECUTABLE := true
LOCAL_CFLAGS += -DBOARD_HIJACK_RECOVERY_PATH=\"$(BOARD_HIJACK_RECOVERY_PATH)\"
include $(BUILD_EXECUTABLE)

View File

@ -19,33 +19,33 @@
#include <signal.h>
#include <sys/wait.h>
#include <sys/types.h>
#include <sys/stat.h>
#include <stdio.h>
#include <errno.h>
#include <stdlib.h>
#include <sys/mount.h>
#include <sys/stat.h>
#include <sys/types.h>
#include <unistd.h>
#include <limits.h>
#define RECOVERY_MODE_FILE "/cache/.recovery_mode"
#include <cutils/properties.h>
#define RECOVERY_MODE_FILE "/data/.recovery_mode"
#define UPDATE_BINARY BOARD_HIJACK_RECOVERY_PATH"/update-binary"
#define UPDATE_PACKAGE BOARD_HIJACK_RECOVERY_PATH"/recovery.zip"
#define BUSYBOX BOARD_HIJACK_RECOVERY_PATH"/busybox"
#define PREPARE_SCRIPT BOARD_HIJACK_RECOVERY_PATH"/prepare.sh"
#define PRERECOVERY_BOOT BOARD_HIJACK_RECOVERY_PATH"/prerecoveryboot.sh"
// This was pulled from bionic: The default system command always looks
// for shell in /system/bin/sh. This is bad.
#define _PATH_BSHELL BOARD_HIJACK_RECOVERY_PATH"/sh"
extern char **environ;
int
__system(const char *command)
exec_and_wait(char** argp)
{
pid_t pid;
sig_t intsave, quitsave;
sigset_t mask, omask;
int pstat;
char *argp[] = {"sh", "-c", NULL, NULL};
if (!command) /* just checking... */
return(1);
argp[2] = (char *)command;
sigemptyset(&mask);
sigaddset(&mask, SIGCHLD);
sigprocmask(SIG_BLOCK, &mask, &omask);
@ -55,7 +55,7 @@ __system(const char *command)
return(-1);
case 0: /* child */
sigprocmask(SIG_SETMASK, &omask, NULL);
execve(_PATH_BSHELL, argp, environ);
execve(argp[0], argp, environ);
_exit(127);
}
@ -68,12 +68,27 @@ __system(const char *command)
return (pid == -1 ? -1 : pstat);
}
typedef char* string;
int main(int argc, char** argv) {
char* hijacked_executable = argv[0];
struct stat info;
if (NULL != strstr(hijacked_executable, "hijack")) {
// no op
if (argc >= 2) {
if (strcmp("sh", argv[1]) == 0) {
return ash_main(argc - 1, argv + 1);
}
if (strcmp("mount", argv[1]) == 0) {
printf("mount!\n");
return mount_main(argc - 1, argv + 1);
}
if (strcmp("umount", argv[1]) == 0) {
printf("umount!\n");
return umount_main(argc - 1, argv + 1);
}
}
printf("Hijack!\n");
return 0;
}
@ -81,19 +96,46 @@ int main(int argc, char** argv) {
char cmd[PATH_MAX];
if (0 == stat(RECOVERY_MODE_FILE, &info)) {
remove(RECOVERY_MODE_FILE);
kill(getppid(), SIGKILL);
sprintf(cmd, "%s 2 0 %s", UPDATE_BINARY, UPDATE_PACKAGE);
return __system(cmd);
char* remount_root_args[] = { "/system/bin/hijack", "mount", "-orw,remount", "/", NULL };
//mount_main(3, remount_root_args);
//__system("/system/bin/hijack mount -orw,remount /");
exec_and_wait(remount_root_args);
mkdir("/preinstall", S_IRWXU);
mkdir("/tmp", S_IRWXU);
mkdir("/res", S_IRWXU);
mkdir("/res/images", S_IRWXU);
remove("/etc");
mkdir("/etc", S_IRWXU);
rename("/sbin/adbd", "/sbin/adbd.old");
property_set("ctl.stop", "runtime");
property_set("ctl.stop", "zygote");
property_set("persist.service.adb.enable", "1");
char* mount_preinstall_args[] = { "/system/bin/hijack", "mount", "/dev/block/preinstall", "/preinstall", NULL };
//mount_main(3, mount_preinstall_args);
//__system("/system/bin/hijack mount /dev/block/preinstall /preinstall");
exec_and_wait(mount_preinstall_args);
char* umount_args[] = { "/system/bin/hijack", "umount", "-l", "/system", NULL };
exec_and_wait(umount_args);
char* updater_args[] = { UPDATE_BINARY, "2", "0", UPDATE_PACKAGE, NULL };
return exec_and_wait(updater_args);
}
sprintf(cmd, "%s.bin", hijacked_executable);
char real_executable[PATH_MAX];
sprintf(real_executable, "%s.bin", hijacked_executable);
string* argp = (string*)malloc(sizeof(string) * (argc + 1));
int i;
for (i = 1; i < argc; i++) {
strcat(cmd, " '");
strcat(cmd, argv[i]);
strcat(cmd, "'");
for (i = 0; i < argc; i++) {
argp[i]=argv[i];
}
argp[argc] = NULL;
__system(PREPARE_SCRIPT);
return __system(cmd);
argp[0] = real_executable;
return exec_and_wait(argp);
}

View File

@ -1,4 +0,0 @@
#!/preinstall/recovery/sh
export PATH=$PATH:/preinstall/recovery
busybox mount -orw,remount /
busybox mkdir -p /res/images

View File

@ -3,8 +3,8 @@ mkdir -p /sd-ext
rm /cache/recovery/command
rm /cache/update.zip
touch /tmp/.ignorebootmessage
#kill $(ps | grep /sbin/adbd)
#kill $(ps | grep /sbin/recovery)
kill $(ps | grep /sbin/adbd)
kill $(ps | grep /sbin/recovery)
# On the Galaxy S, the recovery comes test signed, but the
# recovery is not automatically restarted.
@ -13,9 +13,10 @@ then
/sbin/recovery &
fi
if [ -f init.mapphone_cdma.rc ]
# Droid X
if [ -f /init.mapphone_cdma.rc ]
then
/sbin/recovery &
fi
exit 1
exit 1