Magisk/native/jni/magiskhide/hide_utils.c

289 lines
5.8 KiB
C
Raw Normal View History

2017-07-03 00:57:20 +08:00
/* hide_utils.c - Some utility functions for MagiskHide
2017-04-20 22:45:56 +08:00
*/
2017-07-03 00:57:20 +08:00
#include <stdio.h>
#include <stdlib.h>
2017-04-20 22:45:56 +08:00
#include <unistd.h>
2018-07-13 22:14:32 +08:00
#include <fcntl.h>
2017-07-03 00:57:20 +08:00
#include <dirent.h>
#include <string.h>
2018-10-12 21:46:09 -04:00
#include <libgen.h>
2017-07-03 00:57:20 +08:00
#include <sys/types.h>
#include <sys/stat.h>
2017-04-20 22:45:56 +08:00
#include "magisk.h"
#include "utils.h"
2017-07-03 00:57:20 +08:00
#include "resetprop.h"
2017-04-20 22:45:56 +08:00
#include "magiskhide.h"
2017-07-03 00:57:20 +08:00
#include "daemon.h"
static char *prop_key[] =
{ "ro.boot.vbmeta.device_state", "ro.boot.verifiedbootstate", "ro.boot.flash.locked", "ro.boot.veritymode",
"ro.boot.warranty_bit", "ro.warranty_bit", "ro.debuggable", "ro.secure",
"ro.build.type", "ro.build.tags", "ro.build.selinux", NULL };
2017-07-03 00:57:20 +08:00
static char *prop_value[] =
{ "locked", "green", "1", "enforcing",
"0", "0", "0", "1",
"user", "release-keys", "0", NULL };
2017-07-03 00:57:20 +08:00
static const char *proc_name;
static gid_t proc_gid;
2017-07-03 00:57:20 +08:00
void manage_selinux() {
char val;
2017-07-03 00:57:20 +08:00
int fd = xopen(SELINUX_ENFORCE, O_RDONLY);
xxread(fd, &val, sizeof(val));
2017-07-03 00:57:20 +08:00
close(fd);
// Permissive
if (val == '0') {
2017-07-03 00:57:20 +08:00
chmod(SELINUX_ENFORCE, 0640);
chmod(SELINUX_POLICY, 0440);
}
}
void hide_sensitive_props() {
2017-07-10 23:39:33 +08:00
LOGI("hide_utils: Hiding sensitive props\n");
2017-07-03 00:57:20 +08:00
// Hide all sensitive props
char *value;
for (int i = 0; prop_key[i]; ++i) {
value = getprop(prop_key[i]);
if (value) {
if (strcmp(value, prop_value[i]) != 0)
setprop2(prop_key[i], prop_value[i], 0);
free(value);
}
}
}
2018-04-28 20:22:42 +08:00
static void rm_magisk_prop(const char *name, const char *value, void *v) {
2017-07-18 12:26:23 +08:00
if (strstr(name, "magisk")) {
2017-10-10 02:04:50 +08:00
deleteprop2(name, 0);
2017-07-18 12:26:23 +08:00
}
}
2018-10-12 21:46:09 -04:00
/* Call func for each process */
static void ps(void (*func)(int)) {
DIR *dir;
struct dirent *entry;
if (!(dir = xopendir("/proc")))
return;
while ((entry = xreaddir(dir))) {
if (entry->d_type == DT_DIR) {
if (is_num(entry->d_name))
func(atoi(entry->d_name));
}
}
closedir(dir);
}
static int check_proc_name(int pid, const char *name) {
char buf[128];
FILE *f;
sprintf(buf, "/proc/%d/comm", pid);
if ((f = fopen(buf, "r"))) {
fgets(buf, sizeof(buf), f);
if (strcmp(buf, name) == 0)
return 1;
} else {
// The PID is already killed
return 0;
}
fclose(f);
sprintf(buf, "/proc/%d/cmdline", pid);
f = fopen(buf, "r");
fgets(buf, sizeof(buf), f);
fclose(f);
if (strcmp(basename(buf), name) == 0)
return 1;
sprintf(buf, "/proc/%d/exe", pid);
if (access(buf, F_OK) != 0)
return 0;
xreadlink(buf, buf, sizeof(buf));
if (strcmp(basename(buf), name) == 0)
return 1;
return 0;
}
static void kill_proc_cb(int pid) {
if (check_proc_name(pid, proc_name))
kill(pid, SIGTERM);
else if (proc_gid > 0) {
char buf[128];
struct stat st;
sprintf(buf, "/proc/%d", pid);
stat(buf, &st);
if (proc_gid == st.st_gid)
kill(pid, SIGTERM);
}
}
static void kill_process(const char *name) {
proc_name = name;
char buf[128];
struct stat st;
sprintf(buf, "/data/data/%s", name);
if (stat(buf, &st) == 0)
proc_gid = st.st_gid;
else
proc_gid = 0;
ps(kill_proc_cb);
}
2017-07-18 12:26:23 +08:00
void clean_magisk_props() {
LOGD("hide_utils: Cleaning magisk props\n");
2018-04-28 20:22:42 +08:00
getprop_all(rm_magisk_prop, NULL);
2017-07-18 12:26:23 +08:00
}
2017-04-20 22:45:56 +08:00
int add_list(char *proc) {
2017-04-22 01:40:07 +08:00
if (!hideEnabled) {
free(proc);
return HIDE_NOT_ENABLED;
}
2017-04-20 22:45:56 +08:00
char *line;
2017-05-04 02:58:37 +08:00
struct vector *new_list = xmalloc(sizeof(*new_list));
2017-04-20 22:45:56 +08:00
if (new_list == NULL)
2017-05-05 16:13:26 +08:00
return DAEMON_ERROR;
2017-04-20 22:45:56 +08:00
vec_init(new_list);
vec_for_each(hide_list, line) {
// They should be unique
if (strcmp(line, proc) == 0) {
free(proc);
vec_destroy(new_list);
free(new_list);
2017-04-22 01:40:07 +08:00
return HIDE_ITEM_EXIST;
2017-04-20 22:45:56 +08:00
}
vec_push_back(new_list, line);
}
vec_push_back(new_list, proc);
LOGI("hide_list add: [%s]\n", proc);
kill_process(proc);
2017-04-20 22:45:56 +08:00
// Critical region
2017-04-22 00:54:08 +08:00
pthread_mutex_lock(&hide_lock);
2017-05-04 02:58:37 +08:00
vec_destroy(hide_list);
free(hide_list);
2017-04-20 22:45:56 +08:00
hide_list = new_list;
2017-04-22 00:54:08 +08:00
pthread_mutex_unlock(&hide_lock);
2017-04-20 22:45:56 +08:00
2017-05-04 02:58:37 +08:00
pthread_mutex_lock(&file_lock);
vector_to_file(HIDELIST, hide_list); // Do not complain if file not found
2017-05-04 02:58:37 +08:00
pthread_mutex_unlock(&file_lock);
2017-05-05 16:13:26 +08:00
return DAEMON_SUCCESS;
2017-04-20 22:45:56 +08:00
}
int rm_list(char *proc) {
2017-04-22 01:40:07 +08:00
if (!hideEnabled) {
free(proc);
return HIDE_NOT_ENABLED;
}
2017-04-20 22:45:56 +08:00
2018-02-11 17:23:36 +08:00
int ret = DAEMON_ERROR;
2017-04-20 22:45:56 +08:00
char *line;
2017-05-04 02:58:37 +08:00
int do_rm = 0;
struct vector *new_list = xmalloc(sizeof(*new_list));
2017-04-20 22:45:56 +08:00
if (new_list == NULL)
2017-04-22 01:40:07 +08:00
goto error;
2017-04-20 22:45:56 +08:00
vec_init(new_list);
vec_for_each(hide_list, line) {
if (strcmp(line, proc) == 0) {
free(proc);
proc = line;
2017-05-04 02:58:37 +08:00
do_rm = 1;
2017-04-20 22:45:56 +08:00
continue;
}
vec_push_back(new_list, line);
}
2017-05-04 02:58:37 +08:00
if (do_rm) {
2017-04-20 22:45:56 +08:00
LOGI("hide_list rm: [%s]\n", proc);
kill_process(proc);
2017-04-20 22:45:56 +08:00
// Critical region
2017-04-22 00:54:08 +08:00
pthread_mutex_lock(&hide_lock);
2017-05-04 02:58:37 +08:00
vec_destroy(hide_list);
free(hide_list);
2017-04-20 22:45:56 +08:00
hide_list = new_list;
2017-04-22 00:54:08 +08:00
pthread_mutex_unlock(&hide_lock);
2017-05-04 02:58:37 +08:00
2017-05-05 16:13:26 +08:00
ret = DAEMON_SUCCESS;
2017-05-04 02:58:37 +08:00
pthread_mutex_lock(&file_lock);
vector_to_file(HIDELIST, hide_list); // Do not complain if file not found
2017-05-04 02:58:37 +08:00
pthread_mutex_unlock(&file_lock);
2017-04-22 01:40:07 +08:00
} else {
ret = HIDE_ITEM_NOT_EXIST;
2017-05-04 02:58:37 +08:00
vec_destroy(new_list);
free(new_list);
2017-04-20 22:45:56 +08:00
}
2017-04-22 01:40:07 +08:00
error:
2017-04-20 22:45:56 +08:00
free(proc);
2017-04-22 01:40:07 +08:00
return ret;
2017-04-20 22:45:56 +08:00
}
int init_list() {
LOGD("hide_list: initialize...\n");
if ((hide_list = xmalloc(sizeof(*hide_list))) == NULL)
return 1;
vec_init(hide_list);
2017-04-24 21:43:30 +08:00
// Might error if file doesn't exist, no need to report
2017-04-20 22:45:56 +08:00
file_to_vector(HIDELIST, hide_list);
char *line;
vec_for_each(hide_list, line) {
LOGI("hide_list: [%s]\n", line);
kill_process(line);
2017-04-20 22:45:56 +08:00
}
return 0;
}
int destroy_list() {
char *line;
vec_for_each(hide_list, line) {
kill_process(line);
2017-04-20 22:45:56 +08:00
}
vec_deep_destroy(hide_list);
free(hide_list);
hide_list = NULL;
return 0;
}
void add_hide_list(int client) {
char *proc = read_string(client);
// ack
write_int(client, add_list(proc));
close(client);
}
void rm_hide_list(int client) {
char *proc = read_string(client);
// ack
write_int(client, rm_list(proc));
close(client);
}
void ls_hide_list(int client) {
if (!hideEnabled) {
write_int(client, HIDE_NOT_ENABLED);
return;
}
write_int(client, DAEMON_SUCCESS);
write_int(client, vec_size(hide_list));
char *s;
vec_for_each(hide_list, s) {
write_string(client, s);
}
close(client);
}