2017-07-03 00:57:20 +08:00
|
|
|
#include <stdio.h>
|
|
|
|
#include <stdlib.h>
|
2017-04-20 22:45:56 +08:00
|
|
|
#include <unistd.h>
|
2018-07-13 22:14:32 +08:00
|
|
|
#include <fcntl.h>
|
2017-07-03 00:57:20 +08:00
|
|
|
#include <dirent.h>
|
|
|
|
#include <string.h>
|
2018-10-12 21:46:09 -04:00
|
|
|
#include <libgen.h>
|
2017-07-03 00:57:20 +08:00
|
|
|
#include <sys/types.h>
|
|
|
|
#include <sys/stat.h>
|
2017-04-20 22:45:56 +08:00
|
|
|
|
|
|
|
#include "magisk.h"
|
2018-11-03 03:06:01 -04:00
|
|
|
#include "utils.h"
|
2017-07-03 00:57:20 +08:00
|
|
|
#include "resetprop.h"
|
2017-04-20 22:45:56 +08:00
|
|
|
#include "magiskhide.h"
|
2017-07-03 00:57:20 +08:00
|
|
|
#include "daemon.h"
|
2018-11-01 13:23:12 -04:00
|
|
|
#include "db.h"
|
|
|
|
|
2018-11-27 01:21:59 -05:00
|
|
|
#define SAFETYNET_COMPONENT "com.google.android.gms/.droidguard.DroidGuardService"
|
|
|
|
#define SAFETYNET_PROCESS "com.google.android.gms.unstable"
|
|
|
|
|
2018-11-08 05:03:59 -05:00
|
|
|
Vector<CharArray> hide_list;
|
2018-11-16 01:15:34 -05:00
|
|
|
pthread_mutex_t list_lock;
|
|
|
|
|
|
|
|
static pthread_t proc_monitor_thread;
|
2017-07-03 00:57:20 +08:00
|
|
|
|
2018-11-01 13:23:12 -04:00
|
|
|
static const char *prop_key[] =
|
|
|
|
{ "ro.boot.vbmeta.device_state", "ro.boot.verifiedbootstate", "ro.boot.flash.locked",
|
|
|
|
"ro.boot.veritymode", "ro.boot.warranty_bit", "ro.warranty_bit", "ro.debuggable",
|
|
|
|
"ro.secure", "ro.build.type", "ro.build.tags", "ro.build.selinux", nullptr };
|
2017-07-03 00:57:20 +08:00
|
|
|
|
2018-11-01 13:23:12 -04:00
|
|
|
static const char *prop_value[] =
|
|
|
|
{ "locked", "green", "1",
|
|
|
|
"enforcing", "0", "0", "0",
|
|
|
|
"1", "user", "release-keys", "0", nullptr };
|
2017-07-03 00:57:20 +08:00
|
|
|
|
2018-11-07 22:46:56 -05:00
|
|
|
struct ps_arg {
|
|
|
|
const char *name;
|
|
|
|
uid_t uid;
|
|
|
|
};
|
2018-08-08 05:47:58 +08:00
|
|
|
|
2017-07-03 00:57:20 +08:00
|
|
|
void manage_selinux() {
|
2018-07-04 01:52:23 +08:00
|
|
|
char val;
|
2017-07-03 00:57:20 +08:00
|
|
|
int fd = xopen(SELINUX_ENFORCE, O_RDONLY);
|
2018-07-04 01:52:23 +08:00
|
|
|
xxread(fd, &val, sizeof(val));
|
2017-07-03 00:57:20 +08:00
|
|
|
close(fd);
|
|
|
|
// Permissive
|
2018-07-04 01:52:23 +08:00
|
|
|
if (val == '0') {
|
2017-07-03 00:57:20 +08:00
|
|
|
chmod(SELINUX_ENFORCE, 0640);
|
|
|
|
chmod(SELINUX_POLICY, 0440);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
void hide_sensitive_props() {
|
2017-07-10 23:39:33 +08:00
|
|
|
LOGI("hide_utils: Hiding sensitive props\n");
|
2017-07-03 00:57:20 +08:00
|
|
|
|
|
|
|
// Hide all sensitive props
|
|
|
|
for (int i = 0; prop_key[i]; ++i) {
|
2018-11-07 02:10:38 -05:00
|
|
|
CharArray value = getprop(prop_key[i]);
|
|
|
|
if (!value.empty() && value != prop_value[i])
|
|
|
|
setprop(prop_key[i], prop_value[i], false);
|
2017-07-03 00:57:20 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-11-27 01:21:59 -05:00
|
|
|
static bool is_digits(const char *s) {
|
|
|
|
for (const char *c = s; *c; ++c) {
|
|
|
|
if (*c < '0' || *c > '9')
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2018-11-07 22:46:56 -05:00
|
|
|
static void ps(void (*cb)(int, void*), void *arg) {
|
2018-10-12 21:46:09 -04:00
|
|
|
DIR *dir;
|
|
|
|
struct dirent *entry;
|
|
|
|
|
|
|
|
if (!(dir = xopendir("/proc")))
|
|
|
|
return;
|
|
|
|
|
|
|
|
while ((entry = xreaddir(dir))) {
|
2018-11-27 01:21:59 -05:00
|
|
|
if (entry->d_type == DT_DIR && is_digits(entry->d_name))
|
2018-11-07 22:46:56 -05:00
|
|
|
cb(atoi(entry->d_name), arg);
|
2018-10-12 21:46:09 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
closedir(dir);
|
|
|
|
}
|
|
|
|
|
2018-11-27 01:21:59 -05:00
|
|
|
static bool proc_name_match(int pid, const char *name) {
|
2018-11-07 22:46:56 -05:00
|
|
|
char buf[4019];
|
2018-10-12 21:46:09 -04:00
|
|
|
FILE *f;
|
|
|
|
sprintf(buf, "/proc/%d/comm", pid);
|
2018-11-27 01:21:59 -05:00
|
|
|
if ((f = fopen(buf, "re"))) {
|
2018-10-12 21:46:09 -04:00
|
|
|
fgets(buf, sizeof(buf), f);
|
|
|
|
if (strcmp(buf, name) == 0)
|
2018-11-07 22:46:56 -05:00
|
|
|
return true;
|
2018-10-12 21:46:09 -04:00
|
|
|
} else {
|
|
|
|
// The PID is already killed
|
2018-11-07 22:46:56 -05:00
|
|
|
return false;
|
2018-10-12 21:46:09 -04:00
|
|
|
}
|
|
|
|
fclose(f);
|
|
|
|
|
|
|
|
sprintf(buf, "/proc/%d/cmdline", pid);
|
2018-11-27 01:21:59 -05:00
|
|
|
if ((f = fopen(buf, "re"))) {
|
2018-11-07 22:46:56 -05:00
|
|
|
fgets(buf, sizeof(buf), f);
|
|
|
|
if (strcmp(basename(buf), name) == 0)
|
|
|
|
return true;
|
|
|
|
} else {
|
|
|
|
// The PID is already killed
|
|
|
|
return false;
|
|
|
|
}
|
2018-10-12 21:46:09 -04:00
|
|
|
fclose(f);
|
|
|
|
|
|
|
|
sprintf(buf, "/proc/%d/exe", pid);
|
2018-11-27 01:21:59 -05:00
|
|
|
ssize_t len;
|
|
|
|
if ((len = readlink(buf, buf, sizeof(buf))) < 0)
|
2018-11-07 22:46:56 -05:00
|
|
|
return false;
|
2018-11-27 01:21:59 -05:00
|
|
|
buf[len] = '\0';
|
2018-11-07 22:46:56 -05:00
|
|
|
return strcmp(basename(buf), name) == 0;
|
2018-10-12 21:46:09 -04:00
|
|
|
}
|
|
|
|
|
2018-11-07 22:46:56 -05:00
|
|
|
static void kill_proc_cb(int pid, void *v) {
|
|
|
|
ps_arg *args = static_cast<ps_arg *>(v);
|
2018-11-27 01:21:59 -05:00
|
|
|
if (proc_name_match(pid, args->name))
|
2018-08-08 05:47:58 +08:00
|
|
|
kill(pid, SIGTERM);
|
2018-11-07 22:46:56 -05:00
|
|
|
else if (args->uid > 0) {
|
|
|
|
char buf[64];
|
2018-08-08 05:47:58 +08:00
|
|
|
struct stat st;
|
|
|
|
sprintf(buf, "/proc/%d", pid);
|
|
|
|
stat(buf, &st);
|
2018-11-07 22:46:56 -05:00
|
|
|
if (args->uid == st.st_uid)
|
2018-08-08 05:47:58 +08:00
|
|
|
kill(pid, SIGTERM);
|
|
|
|
}
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
static void kill_process(const char *name) {
|
2018-11-27 01:21:59 -05:00
|
|
|
ps_arg args;
|
|
|
|
char *slash = nullptr;
|
|
|
|
if (strcmp(name, SAFETYNET_COMPONENT) == 0) {
|
|
|
|
// We do NOT want to kill gms, it will cause massive system crashes
|
|
|
|
args.name = SAFETYNET_PROCESS;
|
|
|
|
} else {
|
|
|
|
// Only leave the package name part of component name temporarily
|
|
|
|
slash = strchr((char *)name, '/');
|
|
|
|
if (slash)
|
|
|
|
*slash = '\0';
|
|
|
|
args.name = name;
|
|
|
|
}
|
2018-08-08 05:47:58 +08:00
|
|
|
struct stat st;
|
2018-11-07 22:46:56 -05:00
|
|
|
int fd = xopen("/data/data", O_RDONLY | O_CLOEXEC);
|
2018-11-27 01:21:59 -05:00
|
|
|
if (fstatat(fd, args.name, &st, 0) == 0)
|
2018-11-07 22:46:56 -05:00
|
|
|
args.uid = st.st_uid;
|
2018-08-08 05:47:58 +08:00
|
|
|
else
|
2018-11-07 22:46:56 -05:00
|
|
|
args.uid = 0;
|
|
|
|
close(fd);
|
|
|
|
ps(kill_proc_cb, &args);
|
2018-11-27 01:21:59 -05:00
|
|
|
// Revert back to component name
|
|
|
|
if (slash)
|
|
|
|
*slash = '/';
|
2018-07-04 01:52:23 +08:00
|
|
|
}
|
2017-07-18 12:26:23 +08:00
|
|
|
|
|
|
|
void clean_magisk_props() {
|
|
|
|
LOGD("hide_utils: Cleaning magisk props\n");
|
2018-11-04 03:38:06 -05:00
|
|
|
getprop([](const char *name, auto, auto) -> void {
|
2018-11-03 00:15:21 -04:00
|
|
|
if (strstr(name, "magisk"))
|
2018-11-04 03:38:06 -05:00
|
|
|
deleteprop(name);
|
|
|
|
}, nullptr, false);
|
2017-07-18 12:26:23 +08:00
|
|
|
}
|
|
|
|
|
2018-11-16 03:20:30 -05:00
|
|
|
int add_list(const char *proc) {
|
2018-11-01 13:23:12 -04:00
|
|
|
for (auto &s : hide_list) {
|
2017-04-20 22:45:56 +08:00
|
|
|
// They should be unique
|
2018-11-07 02:10:38 -05:00
|
|
|
if (s == proc)
|
2017-04-22 01:40:07 +08:00
|
|
|
return HIDE_ITEM_EXIST;
|
2017-04-20 22:45:56 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
LOGI("hide_list add: [%s]\n", proc);
|
|
|
|
|
2018-11-16 03:20:30 -05:00
|
|
|
// Add to database
|
|
|
|
char sql[4096];
|
|
|
|
snprintf(sql, sizeof(sql), "INSERT INTO hidelist (process) VALUES('%s')", proc);
|
|
|
|
char *err = db_exec(sql);
|
|
|
|
db_err_cmd(err, return DAEMON_ERROR);
|
|
|
|
|
2017-04-20 22:45:56 +08:00
|
|
|
// Critical region
|
2018-11-01 13:23:12 -04:00
|
|
|
pthread_mutex_lock(&list_lock);
|
|
|
|
hide_list.push_back(proc);
|
2018-11-07 22:46:56 -05:00
|
|
|
kill_process(proc);
|
2018-11-01 13:23:12 -04:00
|
|
|
pthread_mutex_unlock(&list_lock);
|
|
|
|
|
2017-05-05 16:13:26 +08:00
|
|
|
return DAEMON_SUCCESS;
|
2017-04-20 22:45:56 +08:00
|
|
|
}
|
|
|
|
|
2018-11-01 14:08:33 -04:00
|
|
|
int add_list(int client) {
|
2018-11-07 02:10:38 -05:00
|
|
|
char *proc = read_string(client);
|
|
|
|
int ret = add_list(proc);
|
|
|
|
free(proc);
|
|
|
|
return ret;
|
2018-11-01 14:08:33 -04:00
|
|
|
}
|
2017-04-20 22:45:56 +08:00
|
|
|
|
2018-11-07 02:10:38 -05:00
|
|
|
static int rm_list(const char *proc) {
|
2018-11-01 13:23:12 -04:00
|
|
|
// Update list in critical region
|
|
|
|
bool do_rm = false;
|
|
|
|
pthread_mutex_lock(&list_lock);
|
|
|
|
for (auto it = hide_list.begin(); it != hide_list.end(); ++it) {
|
2018-11-07 02:10:38 -05:00
|
|
|
if (*it == proc) {
|
2018-11-01 13:23:12 -04:00
|
|
|
do_rm = true;
|
|
|
|
LOGI("hide_list rm: [%s]\n", proc);
|
|
|
|
hide_list.erase(it);
|
2018-11-07 22:46:56 -05:00
|
|
|
kill_process(proc);
|
2018-11-01 13:23:12 -04:00
|
|
|
break;
|
2017-04-20 22:45:56 +08:00
|
|
|
}
|
|
|
|
}
|
2018-11-01 13:23:12 -04:00
|
|
|
pthread_mutex_unlock(&list_lock);
|
2017-04-20 22:45:56 +08:00
|
|
|
|
2017-05-04 02:58:37 +08:00
|
|
|
if (do_rm) {
|
2018-11-07 22:46:56 -05:00
|
|
|
char sql[4096];
|
|
|
|
snprintf(sql, sizeof(sql), "DELETE FROM hidelist WHERE process='%s'", proc);
|
2018-11-16 03:20:30 -05:00
|
|
|
char *err = db_exec(sql);
|
|
|
|
db_err(err);
|
2018-11-07 02:10:38 -05:00
|
|
|
return DAEMON_SUCCESS;
|
2017-04-22 01:40:07 +08:00
|
|
|
} else {
|
2018-11-07 02:10:38 -05:00
|
|
|
return HIDE_ITEM_NOT_EXIST;
|
2017-04-20 22:45:56 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-11-01 14:08:33 -04:00
|
|
|
int rm_list(int client) {
|
2018-11-07 02:10:38 -05:00
|
|
|
char *proc = read_string(client);
|
|
|
|
int ret = rm_list(proc);
|
|
|
|
free(proc);
|
|
|
|
return ret;
|
2018-11-01 14:08:33 -04:00
|
|
|
}
|
|
|
|
|
2018-11-01 13:23:12 -04:00
|
|
|
#define LEGACY_LIST MOUNTPOINT "/.core/hidelist"
|
|
|
|
|
2018-11-16 03:20:30 -05:00
|
|
|
static int collect_list(void *, int, char **data, char**) {
|
|
|
|
LOGI("hide_list: [%s]\n", data[0]);
|
|
|
|
hide_list.push_back(data[0]);
|
2018-11-27 01:21:59 -05:00
|
|
|
kill_process(data[0]);
|
2018-11-16 03:20:30 -05:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2018-11-07 02:10:38 -05:00
|
|
|
bool init_list() {
|
2018-11-01 13:23:12 -04:00
|
|
|
LOGD("hide_list: initialize\n");
|
2017-04-20 22:45:56 +08:00
|
|
|
|
2018-11-16 03:20:30 -05:00
|
|
|
char *err = db_exec("SELECT process FROM hidelist", collect_list);
|
|
|
|
db_err_cmd(err, return false);
|
2018-11-01 13:23:12 -04:00
|
|
|
|
|
|
|
// Migrate old hide list into database
|
|
|
|
if (access(LEGACY_LIST, R_OK) == 0) {
|
2018-11-08 05:03:59 -05:00
|
|
|
Vector<CharArray> tmp;
|
|
|
|
file_to_vector(LEGACY_LIST, tmp);
|
2018-11-01 13:23:12 -04:00
|
|
|
for (auto &s : tmp)
|
2018-11-16 03:20:30 -05:00
|
|
|
add_list(s);
|
2018-11-01 13:23:12 -04:00
|
|
|
unlink(LEGACY_LIST);
|
2017-04-20 22:45:56 +08:00
|
|
|
}
|
2018-11-01 13:23:12 -04:00
|
|
|
|
2018-11-07 02:10:38 -05:00
|
|
|
return true;
|
2017-04-20 22:45:56 +08:00
|
|
|
}
|
|
|
|
|
2018-11-01 14:08:33 -04:00
|
|
|
void ls_list(int client) {
|
2018-11-16 01:49:15 -05:00
|
|
|
FILE *out = fdopen(recv_fd(client), "a");
|
2018-11-01 13:23:12 -04:00
|
|
|
for (auto &s : hide_list)
|
2018-11-16 01:49:15 -05:00
|
|
|
fprintf(out, "%s\n", s.c_str());
|
|
|
|
fclose(out);
|
|
|
|
write_int(client, DAEMON_SUCCESS);
|
2017-09-06 02:25:40 +08:00
|
|
|
close(client);
|
|
|
|
}
|
2018-11-16 01:15:34 -05:00
|
|
|
|
|
|
|
static void set_hide_config() {
|
|
|
|
char sql[64];
|
|
|
|
sprintf(sql, "REPLACE INTO settings (key,value) VALUES('%s',%d)",
|
|
|
|
DB_SETTING_KEYS[HIDE_CONFIG], hide_enabled);
|
2018-11-16 03:20:30 -05:00
|
|
|
char *err = db_exec(sql);
|
|
|
|
db_err(err);
|
2018-11-16 01:15:34 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
int launch_magiskhide(int client) {
|
|
|
|
if (hide_enabled)
|
|
|
|
return HIDE_IS_ENABLED;
|
|
|
|
|
|
|
|
if (!log_daemon_started)
|
|
|
|
return LOGCAT_DISABLED;
|
|
|
|
|
|
|
|
hide_enabled = true;
|
|
|
|
set_hide_config();
|
|
|
|
LOGI("* Starting MagiskHide\n");
|
|
|
|
|
|
|
|
hide_sensitive_props();
|
|
|
|
|
|
|
|
// Initialize the mutex lock
|
|
|
|
pthread_mutex_init(&list_lock, nullptr);
|
|
|
|
|
|
|
|
// Initialize the hide list
|
|
|
|
if (!init_list())
|
|
|
|
goto error;
|
|
|
|
|
|
|
|
// Add SafetyNet by default
|
2018-11-27 01:21:59 -05:00
|
|
|
rm_list(SAFETYNET_PROCESS);
|
|
|
|
add_list(SAFETYNET_COMPONENT);
|
2018-11-16 01:15:34 -05:00
|
|
|
|
|
|
|
// Get thread reference
|
|
|
|
proc_monitor_thread = pthread_self();
|
|
|
|
if (client >= 0) {
|
|
|
|
write_int(client, DAEMON_SUCCESS);
|
|
|
|
close(client);
|
|
|
|
}
|
|
|
|
// Start monitoring
|
|
|
|
proc_monitor();
|
|
|
|
|
|
|
|
error:
|
|
|
|
hide_enabled = false;
|
|
|
|
return DAEMON_ERROR;
|
|
|
|
}
|
|
|
|
|
|
|
|
int stop_magiskhide() {
|
|
|
|
LOGI("* Stopping MagiskHide\n");
|
|
|
|
|
|
|
|
hide_enabled = false;
|
|
|
|
set_hide_config();
|
|
|
|
pthread_kill(proc_monitor_thread, TERM_THREAD);
|
|
|
|
|
|
|
|
return DAEMON_SUCCESS;
|
|
|
|
}
|
|
|
|
|
|
|
|
void auto_start_magiskhide() {
|
|
|
|
if (!start_log_daemon())
|
|
|
|
return;
|
|
|
|
db_settings dbs;
|
2018-11-16 03:20:30 -05:00
|
|
|
get_db_settings(&dbs, HIDE_CONFIG);
|
2018-11-16 01:15:34 -05:00
|
|
|
if (dbs[HIDE_CONFIG]) {
|
|
|
|
pthread_t thread;
|
|
|
|
xpthread_create(&thread, nullptr, [](void*) -> void* {
|
|
|
|
launch_magiskhide(-1);
|
|
|
|
return nullptr;
|
|
|
|
}, nullptr);
|
|
|
|
pthread_detach(thread);
|
|
|
|
}
|
|
|
|
}
|