2019-03-05 03:22:20 -05:00
|
|
|
#include <sys/types.h>
|
|
|
|
#include <sys/stat.h>
|
2017-04-20 22:45:56 +08:00
|
|
|
#include <unistd.h>
|
2018-07-13 22:14:32 +08:00
|
|
|
#include <fcntl.h>
|
2017-07-03 00:57:20 +08:00
|
|
|
#include <dirent.h>
|
2021-01-10 19:27:54 -08:00
|
|
|
#include <set>
|
2017-04-20 22:45:56 +08:00
|
|
|
|
2020-03-09 01:50:30 -07:00
|
|
|
#include <magisk.hpp>
|
|
|
|
#include <utils.hpp>
|
|
|
|
#include <db.hpp>
|
2019-02-10 01:05:19 -05:00
|
|
|
|
2020-03-09 01:50:30 -07:00
|
|
|
#include "magiskhide.hpp"
|
2018-11-01 13:23:12 -04:00
|
|
|
|
2019-01-19 23:59:37 -05:00
|
|
|
using namespace std;
|
|
|
|
|
2020-05-17 14:45:08 -07:00
|
|
|
static bool hide_state = false;
|
2021-01-10 17:11:00 -08:00
|
|
|
static set<pair<string, string>> hide_set; /* set of <pkg, process> pair */
|
|
|
|
map<int, vector<string_view>> uid_proc_map; /* uid -> list of process */
|
|
|
|
|
|
|
|
// Locks the variables above
|
|
|
|
pthread_mutex_t hide_state_lock = PTHREAD_MUTEX_INITIALIZER;
|
|
|
|
|
|
|
|
void update_uid_map() {
|
|
|
|
mutex_guard lock(hide_state_lock);
|
|
|
|
uid_proc_map.clear();
|
|
|
|
string data_path(APP_DATA_DIR);
|
|
|
|
size_t len = data_path.length();
|
|
|
|
auto dir = open_dir(APP_DATA_DIR);
|
|
|
|
bool first_iter = true;
|
|
|
|
for (dirent *entry; (entry = xreaddir(dir.get()));) {
|
|
|
|
data_path.resize(len);
|
|
|
|
data_path += '/';
|
|
|
|
data_path += entry->d_name; // multiuser user id
|
|
|
|
data_path += '/';
|
|
|
|
size_t user_len = data_path.length();
|
|
|
|
struct stat st;
|
|
|
|
for (auto &hide : hide_set) {
|
|
|
|
if (hide.first == ISOLATED_MAGIC) {
|
|
|
|
if (!first_iter) continue;
|
|
|
|
// Setup isolated processes
|
|
|
|
uid_proc_map[-1].emplace_back(hide.second);
|
|
|
|
}
|
|
|
|
data_path.resize(user_len);
|
|
|
|
data_path += hide.first;
|
|
|
|
if (stat(data_path.data(), &st))
|
|
|
|
continue;
|
|
|
|
uid_proc_map[st.st_uid].emplace_back(hide.second);
|
|
|
|
}
|
|
|
|
first_iter = false;
|
|
|
|
}
|
|
|
|
}
|
2017-07-03 00:57:20 +08:00
|
|
|
|
2019-02-13 20:16:26 -05:00
|
|
|
// Leave /proc fd opened as we're going to read from it repeatedly
|
|
|
|
static DIR *procfp;
|
2020-05-17 14:45:08 -07:00
|
|
|
void crawl_procfs(const function<bool(int)> &fn) {
|
2020-12-30 22:11:24 -08:00
|
|
|
rewinddir(procfp);
|
|
|
|
crawl_procfs(procfp, fn);
|
2019-03-12 16:48:01 -04:00
|
|
|
}
|
|
|
|
|
2020-05-17 14:45:08 -07:00
|
|
|
void crawl_procfs(DIR *dir, const function<bool(int)> &fn) {
|
2020-12-30 22:11:24 -08:00
|
|
|
struct dirent *dp;
|
|
|
|
int pid;
|
|
|
|
while ((dp = readdir(dir))) {
|
|
|
|
pid = parse_int(dp->d_name);
|
|
|
|
if (pid > 0 && !fn(pid))
|
|
|
|
break;
|
|
|
|
}
|
2018-10-12 21:46:09 -04:00
|
|
|
}
|
|
|
|
|
2020-05-16 23:31:30 -07:00
|
|
|
bool hide_enabled() {
|
2020-12-30 22:11:24 -08:00
|
|
|
mutex_guard g(hide_state_lock);
|
|
|
|
return hide_state;
|
2020-05-16 23:31:30 -07:00
|
|
|
}
|
|
|
|
|
2020-12-30 15:55:53 -08:00
|
|
|
template <bool str_op(string_view, string_view)>
|
2019-04-22 16:36:23 -04:00
|
|
|
static bool proc_name_match(int pid, const char *name) {
|
2020-12-30 22:11:24 -08:00
|
|
|
char buf[4019];
|
|
|
|
sprintf(buf, "/proc/%d/cmdline", pid);
|
|
|
|
if (auto fp = open_file(buf, "re")) {
|
|
|
|
fgets(buf, sizeof(buf), fp.get());
|
|
|
|
if (str_op(buf, name)) {
|
2021-01-10 19:27:54 -08:00
|
|
|
LOGD("hide: kill PID=[%d] (%s)\n", pid, buf);
|
2020-12-30 22:11:24 -08:00
|
|
|
return true;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return false;
|
2018-10-12 21:46:09 -04:00
|
|
|
}
|
|
|
|
|
2020-12-30 15:55:53 -08:00
|
|
|
static inline bool str_eql(string_view s, string_view ss) { return s == ss; }
|
|
|
|
|
|
|
|
static void kill_process(const char *name, bool multi = false,
|
2020-12-30 22:11:24 -08:00
|
|
|
bool (*filter)(int, const char *) = proc_name_match<&str_eql>) {
|
|
|
|
crawl_procfs([=](int pid) -> bool {
|
|
|
|
if (filter(pid, name)) {
|
2021-04-26 14:25:18 +08:00
|
|
|
kill(pid, SIGKILL);
|
2020-12-30 22:11:24 -08:00
|
|
|
return multi;
|
|
|
|
}
|
|
|
|
return true;
|
|
|
|
});
|
2018-08-08 05:47:58 +08:00
|
|
|
}
|
|
|
|
|
2021-04-16 14:08:51 +08:00
|
|
|
static bool validate(const char *pkg, const char *proc) {
|
|
|
|
bool pkg_valid = false;
|
|
|
|
bool proc_valid = true;
|
|
|
|
|
|
|
|
if (str_eql(pkg, ISOLATED_MAGIC)) {
|
|
|
|
pkg_valid = true;
|
|
|
|
for (char c; (c = *proc); ++proc) {
|
|
|
|
if (isalnum(c) || c == '_' || c == '.')
|
|
|
|
continue;
|
|
|
|
if (c == ':')
|
|
|
|
break;
|
|
|
|
proc_valid = false;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
for (char c; (c = *pkg); ++pkg) {
|
|
|
|
if (isalnum(c) || c == '_')
|
|
|
|
continue;
|
|
|
|
if (c == '.') {
|
|
|
|
pkg_valid = true;
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
pkg_valid = false;
|
|
|
|
break;
|
2020-12-30 22:11:24 -08:00
|
|
|
}
|
2021-04-16 14:08:51 +08:00
|
|
|
|
|
|
|
for (char c; (c = *proc); ++proc) {
|
|
|
|
if (isalnum(c) || c == '_' || c == ':' || c == '.')
|
|
|
|
continue;
|
|
|
|
proc_valid = false;
|
|
|
|
break;
|
2020-12-30 22:11:24 -08:00
|
|
|
}
|
|
|
|
}
|
2021-04-16 14:08:51 +08:00
|
|
|
return pkg_valid && proc_valid;
|
2019-09-01 14:16:12 +08:00
|
|
|
}
|
|
|
|
|
2020-12-30 15:55:53 -08:00
|
|
|
static void add_hide_set(const char *pkg, const char *proc) {
|
2020-12-30 22:11:24 -08:00
|
|
|
LOGI("hide_list add: [%s/%s]\n", pkg, proc);
|
|
|
|
hide_set.emplace(pkg, proc);
|
|
|
|
if (strcmp(pkg, ISOLATED_MAGIC) == 0) {
|
|
|
|
// Kill all matching isolated processes
|
|
|
|
kill_process(proc, true, proc_name_match<&str_starts>);
|
|
|
|
} else {
|
|
|
|
kill_process(proc);
|
|
|
|
}
|
2020-12-30 15:55:53 -08:00
|
|
|
}
|
|
|
|
|
|
|
|
static int add_list(const char *pkg, const char *proc) {
|
2020-12-30 22:11:24 -08:00
|
|
|
if (proc[0] == '\0')
|
|
|
|
proc = pkg;
|
|
|
|
|
2021-04-16 14:08:51 +08:00
|
|
|
if (!validate(pkg, proc))
|
2020-12-30 22:11:24 -08:00
|
|
|
return HIDE_INVALID_PKG;
|
|
|
|
|
|
|
|
for (auto &hide : hide_set)
|
|
|
|
if (hide.first == pkg && hide.second == proc)
|
|
|
|
return HIDE_ITEM_EXIST;
|
|
|
|
|
|
|
|
// Add to database
|
|
|
|
char sql[4096];
|
|
|
|
snprintf(sql, sizeof(sql),
|
|
|
|
"INSERT INTO hidelist (package_name, process) VALUES('%s', '%s')", pkg, proc);
|
|
|
|
char *err = db_exec(sql);
|
|
|
|
db_err_cmd(err, return DAEMON_ERROR);
|
|
|
|
|
|
|
|
{
|
|
|
|
// Critical region
|
2021-01-10 17:11:00 -08:00
|
|
|
mutex_guard lock(hide_state_lock);
|
2020-12-30 22:11:24 -08:00
|
|
|
add_hide_set(pkg, proc);
|
|
|
|
}
|
|
|
|
|
|
|
|
return DAEMON_SUCCESS;
|
2017-04-20 22:45:56 +08:00
|
|
|
}
|
|
|
|
|
2018-11-01 14:08:33 -04:00
|
|
|
int add_list(int client) {
|
2021-01-12 00:07:48 -08:00
|
|
|
string pkg = read_string(client);
|
|
|
|
string proc = read_string(client);
|
|
|
|
int ret = add_list(pkg.data(), proc.data());
|
2020-12-30 22:11:24 -08:00
|
|
|
if (ret == DAEMON_SUCCESS)
|
|
|
|
update_uid_map();
|
|
|
|
return ret;
|
2018-11-01 14:08:33 -04:00
|
|
|
}
|
2017-04-20 22:45:56 +08:00
|
|
|
|
2020-12-30 15:55:53 -08:00
|
|
|
static int rm_list(const char *pkg, const char *proc) {
|
2020-12-30 22:11:24 -08:00
|
|
|
bool remove = false;
|
|
|
|
{
|
|
|
|
// Critical region
|
2021-01-10 17:11:00 -08:00
|
|
|
mutex_guard lock(hide_state_lock);
|
2020-12-30 22:11:24 -08:00
|
|
|
for (auto it = hide_set.begin(); it != hide_set.end();) {
|
|
|
|
if (it->first == pkg && (proc[0] == '\0' || it->second == proc)) {
|
|
|
|
remove = true;
|
|
|
|
LOGI("hide_list rm: [%s/%s]\n", it->first.data(), it->second.data());
|
|
|
|
it = hide_set.erase(it);
|
|
|
|
} else {
|
|
|
|
++it;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (!remove)
|
|
|
|
return HIDE_ITEM_NOT_EXIST;
|
|
|
|
|
|
|
|
char sql[4096];
|
|
|
|
if (proc[0] == '\0')
|
|
|
|
snprintf(sql, sizeof(sql), "DELETE FROM hidelist WHERE package_name='%s'", pkg);
|
|
|
|
else
|
|
|
|
snprintf(sql, sizeof(sql),
|
|
|
|
"DELETE FROM hidelist WHERE package_name='%s' AND process='%s'", pkg, proc);
|
|
|
|
char *err = db_exec(sql);
|
|
|
|
db_err(err);
|
|
|
|
return DAEMON_SUCCESS;
|
2017-04-20 22:45:56 +08:00
|
|
|
}
|
|
|
|
|
2018-11-01 14:08:33 -04:00
|
|
|
int rm_list(int client) {
|
2021-01-12 00:07:48 -08:00
|
|
|
string pkg = read_string(client);
|
|
|
|
string proc = read_string(client);
|
|
|
|
int ret = rm_list(pkg.data(), proc.data());
|
2020-12-30 22:11:24 -08:00
|
|
|
if (ret == DAEMON_SUCCESS)
|
|
|
|
update_uid_map();
|
|
|
|
return ret;
|
2018-11-01 14:08:33 -04:00
|
|
|
}
|
|
|
|
|
2020-12-30 15:55:53 -08:00
|
|
|
static bool str_ends_safe(string_view s, string_view ss) {
|
2020-12-30 22:11:24 -08:00
|
|
|
// Never kill webview zygote
|
|
|
|
if (s == "webview_zygote")
|
|
|
|
return false;
|
|
|
|
return str_ends(s, ss);
|
2018-11-16 03:20:30 -05:00
|
|
|
}
|
|
|
|
|
2020-04-18 23:46:56 -07:00
|
|
|
#define SNET_PROC "com.google.android.gms.unstable"
|
|
|
|
#define GMS_PKG "com.google.android.gms"
|
2020-04-18 23:45:00 -07:00
|
|
|
|
2020-05-17 14:45:08 -07:00
|
|
|
static bool init_list() {
|
2021-01-10 19:27:54 -08:00
|
|
|
LOGD("hide: initialize\n");
|
2020-12-30 22:11:24 -08:00
|
|
|
|
|
|
|
char *err = db_exec("SELECT * FROM hidelist", [](db_row &row) -> bool {
|
|
|
|
add_hide_set(row["package_name"].data(), row["process"].data());
|
|
|
|
return true;
|
|
|
|
});
|
|
|
|
db_err_cmd(err, return false);
|
|
|
|
|
|
|
|
// If Android Q+, also kill blastula pool and all app zygotes
|
|
|
|
if (SDK_INT >= 29) {
|
|
|
|
kill_process("usap32", true);
|
|
|
|
kill_process("usap64", true);
|
|
|
|
kill_process("_zygote", true, proc_name_match<&str_ends_safe>);
|
|
|
|
}
|
|
|
|
|
|
|
|
// Add SafetyNet by default
|
|
|
|
add_hide_set(GMS_PKG, SNET_PROC);
|
|
|
|
|
|
|
|
// We also need to hide the default GMS process if MAGISKTMP != /sbin
|
|
|
|
// The snet process communicates with the main process and get additional info
|
|
|
|
if (MAGISKTMP != "/sbin")
|
|
|
|
add_hide_set(GMS_PKG, GMS_PKG);
|
|
|
|
|
|
|
|
return true;
|
2017-04-20 22:45:56 +08:00
|
|
|
}
|
|
|
|
|
2018-11-01 14:08:33 -04:00
|
|
|
void ls_list(int client) {
|
2020-12-30 22:11:24 -08:00
|
|
|
write_int(client, DAEMON_SUCCESS);
|
2021-01-12 00:07:48 -08:00
|
|
|
for (auto &hide : hide_set) {
|
|
|
|
write_int(client, hide.first.size() + hide.second.size() + 1);
|
|
|
|
xwrite(client, hide.first.data(), hide.first.size());
|
|
|
|
xwrite(client, "|", 1);
|
|
|
|
xwrite(client, hide.second.data(), hide.second.size());
|
|
|
|
}
|
|
|
|
write_int(client, 0);
|
2020-12-30 22:11:24 -08:00
|
|
|
close(client);
|
2017-09-06 02:25:40 +08:00
|
|
|
}
|
2018-11-16 01:15:34 -05:00
|
|
|
|
2020-05-17 14:45:08 -07:00
|
|
|
static void update_hide_config() {
|
2020-12-30 22:11:24 -08:00
|
|
|
char sql[64];
|
|
|
|
sprintf(sql, "REPLACE INTO settings (key,value) VALUES('%s',%d)",
|
|
|
|
DB_SETTING_KEYS[HIDE_CONFIG], hide_state);
|
|
|
|
char *err = db_exec(sql);
|
|
|
|
db_err(err);
|
2018-11-16 01:15:34 -05:00
|
|
|
}
|
|
|
|
|
2021-01-11 02:19:10 -08:00
|
|
|
int launch_magiskhide(bool late_props) {
|
2021-01-12 00:07:48 -08:00
|
|
|
mutex_guard lock(hide_state_lock);
|
2020-05-16 23:31:30 -07:00
|
|
|
|
2020-12-30 22:11:24 -08:00
|
|
|
if (hide_state)
|
|
|
|
return HIDE_IS_ENABLED;
|
2018-11-16 01:15:34 -05:00
|
|
|
|
2021-01-12 03:28:00 -08:00
|
|
|
if (access("/proc/self/ns/mnt", F_OK) != 0)
|
2020-12-30 22:11:24 -08:00
|
|
|
return HIDE_NO_NS;
|
2020-05-17 14:45:08 -07:00
|
|
|
|
2020-12-30 22:11:24 -08:00
|
|
|
if (procfp == nullptr && (procfp = opendir("/proc")) == nullptr)
|
|
|
|
return DAEMON_ERROR;
|
2019-02-14 04:08:05 -05:00
|
|
|
|
2021-01-10 19:27:54 -08:00
|
|
|
LOGI("* Enable MagiskHide\n");
|
2018-11-16 01:15:34 -05:00
|
|
|
|
2020-12-30 22:11:24 -08:00
|
|
|
// Initialize the hide list
|
|
|
|
if (!init_list())
|
|
|
|
return DAEMON_ERROR;
|
2019-02-13 20:16:26 -05:00
|
|
|
|
2020-12-30 22:11:24 -08:00
|
|
|
hide_sensitive_props();
|
2021-01-11 02:19:10 -08:00
|
|
|
if (late_props)
|
2020-12-30 22:11:24 -08:00
|
|
|
hide_late_sensitive_props();
|
2018-11-16 01:15:34 -05:00
|
|
|
|
2021-01-13 20:07:23 -08:00
|
|
|
#if !ENABLE_INJECT
|
2020-12-30 22:11:24 -08:00
|
|
|
// Start monitoring
|
2021-01-10 17:11:00 -08:00
|
|
|
if (new_daemon_thread(&proc_monitor))
|
2020-12-30 22:11:24 -08:00
|
|
|
return DAEMON_ERROR;
|
2021-01-10 19:27:54 -08:00
|
|
|
#endif
|
2018-11-16 01:15:34 -05:00
|
|
|
|
2020-12-30 22:11:24 -08:00
|
|
|
hide_state = true;
|
|
|
|
update_hide_config();
|
2021-01-12 00:07:48 -08:00
|
|
|
|
|
|
|
// Unlock here or else we'll be stuck in deadlock
|
|
|
|
lock.unlock();
|
|
|
|
|
|
|
|
update_uid_map();
|
2020-12-30 22:11:24 -08:00
|
|
|
return DAEMON_SUCCESS;
|
2018-11-16 01:15:34 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
int stop_magiskhide() {
|
2020-12-30 22:11:24 -08:00
|
|
|
mutex_guard g(hide_state_lock);
|
2020-05-17 14:45:08 -07:00
|
|
|
|
2020-12-30 22:11:24 -08:00
|
|
|
if (hide_state) {
|
2021-01-10 19:27:54 -08:00
|
|
|
LOGI("* Disable MagiskHide\n");
|
2021-01-10 17:11:00 -08:00
|
|
|
uid_proc_map.clear();
|
|
|
|
hide_set.clear();
|
2021-01-13 20:07:23 -08:00
|
|
|
#if !ENABLE_INJECT
|
2021-01-10 17:11:00 -08:00
|
|
|
pthread_kill(monitor_thread, SIGTERMTHRD);
|
2021-01-10 19:27:54 -08:00
|
|
|
#endif
|
2020-12-30 22:11:24 -08:00
|
|
|
}
|
2018-11-16 01:15:34 -05:00
|
|
|
|
2020-12-30 22:11:24 -08:00
|
|
|
hide_state = false;
|
|
|
|
update_hide_config();
|
|
|
|
return DAEMON_SUCCESS;
|
2018-11-16 01:15:34 -05:00
|
|
|
}
|
|
|
|
|
2021-01-11 02:19:10 -08:00
|
|
|
void auto_start_magiskhide(bool late_props) {
|
2020-12-30 22:11:24 -08:00
|
|
|
if (hide_enabled()) {
|
2021-01-13 20:07:23 -08:00
|
|
|
#if !ENABLE_INJECT
|
2021-01-10 17:11:00 -08:00
|
|
|
pthread_kill(monitor_thread, SIGALRM);
|
2021-01-10 19:27:54 -08:00
|
|
|
#endif
|
2020-12-30 22:11:24 -08:00
|
|
|
hide_late_sensitive_props();
|
2021-04-09 21:29:42 -07:00
|
|
|
} else {
|
2020-12-30 22:11:24 -08:00
|
|
|
db_settings dbs;
|
|
|
|
get_db_settings(dbs, HIDE_CONFIG);
|
|
|
|
if (dbs[HIDE_CONFIG])
|
2021-01-11 02:19:10 -08:00
|
|
|
launch_magiskhide(late_props);
|
2020-12-30 22:11:24 -08:00
|
|
|
}
|
2018-11-16 01:15:34 -05:00
|
|
|
}
|
2019-05-25 16:08:53 -07:00
|
|
|
|
2021-03-18 13:36:42 +08:00
|
|
|
bool is_hide_target(int uid, string_view process, int max_len) {
|
2021-01-12 03:28:00 -08:00
|
|
|
mutex_guard lock(hide_state_lock);
|
|
|
|
|
2021-01-15 20:22:49 -08:00
|
|
|
if (uid % 100000 >= 90000) {
|
|
|
|
// Isolated processes
|
2021-01-12 03:28:00 -08:00
|
|
|
auto it = uid_proc_map.find(-1);
|
|
|
|
if (it == uid_proc_map.end())
|
2021-01-15 20:22:49 -08:00
|
|
|
return false;
|
2021-01-12 03:28:00 -08:00
|
|
|
|
|
|
|
for (auto &s : it->second) {
|
2021-03-18 13:36:42 +08:00
|
|
|
if (s.length() > max_len && process.length() > max_len && str_starts(s, process))
|
|
|
|
return true;
|
2021-01-12 03:28:00 -08:00
|
|
|
if (str_starts(process, s))
|
2021-01-15 20:22:49 -08:00
|
|
|
return true;
|
2021-01-12 03:28:00 -08:00
|
|
|
}
|
|
|
|
} else {
|
|
|
|
auto it = uid_proc_map.find(uid);
|
|
|
|
if (it == uid_proc_map.end())
|
2021-01-15 20:22:49 -08:00
|
|
|
return false;
|
2021-01-12 03:28:00 -08:00
|
|
|
|
|
|
|
for (auto &s : it->second) {
|
2021-03-18 13:36:42 +08:00
|
|
|
if (s.length() > max_len && process.length() > max_len && str_starts(s, process))
|
|
|
|
return true;
|
2021-01-15 20:22:49 -08:00
|
|
|
if (s == process)
|
|
|
|
return true;
|
2021-01-12 03:28:00 -08:00
|
|
|
}
|
|
|
|
}
|
2021-01-15 20:22:49 -08:00
|
|
|
return false;
|
|
|
|
}
|
2021-01-12 03:28:00 -08:00
|
|
|
|
2021-01-15 20:22:49 -08:00
|
|
|
#if !ENABLE_INJECT
|
|
|
|
void test_proc_monitor() {
|
|
|
|
if (procfp == nullptr && (procfp = opendir("/proc")) == nullptr)
|
|
|
|
exit(1);
|
|
|
|
proc_monitor();
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#if ENABLE_INJECT
|
|
|
|
int check_uid_map(int client) {
|
|
|
|
if (!hide_enabled())
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
int uid = read_int(client);
|
|
|
|
string process = read_string(client);
|
|
|
|
return is_hide_target(uid, process) ? 1 : 0;
|
2021-01-12 03:28:00 -08:00
|
|
|
}
|
2021-01-13 20:07:23 -08:00
|
|
|
#endif
|