2021-01-07 06:21:17 +00:00
|
|
|
#include <libgen.h>
|
|
|
|
#include <dlfcn.h>
|
|
|
|
#include <sys/mount.h>
|
|
|
|
#include <sys/sendfile.h>
|
2021-01-07 07:41:37 +00:00
|
|
|
#include <sys/prctl.h>
|
2021-01-07 06:21:17 +00:00
|
|
|
|
|
|
|
#include <utils.hpp>
|
2021-08-18 10:44:32 +00:00
|
|
|
#include <daemon.hpp>
|
|
|
|
#include <magisk.hpp>
|
2021-01-07 06:21:17 +00:00
|
|
|
|
|
|
|
#include "inject.hpp"
|
|
|
|
|
|
|
|
using namespace std;
|
|
|
|
|
|
|
|
static void *self_handle = nullptr;
|
|
|
|
static atomic<int> active_threads = -1;
|
|
|
|
|
2021-01-08 08:53:24 +00:00
|
|
|
void self_unload() {
|
2021-08-19 08:54:12 +00:00
|
|
|
LOGD("zygisk: Request to self unload\n");
|
|
|
|
// If deny failed, do not unload or else it will cause SIGSEGV
|
2021-01-08 08:53:24 +00:00
|
|
|
if (!unhook_functions())
|
|
|
|
return;
|
2021-08-01 21:35:16 +00:00
|
|
|
new_daemon_thread(reinterpret_cast<thread_entry>(&dlclose), self_handle);
|
2021-01-07 06:21:17 +00:00
|
|
|
active_threads--;
|
|
|
|
}
|
|
|
|
|
2021-08-18 10:44:32 +00:00
|
|
|
static void *unload_first_stage(void *v) {
|
2021-01-07 06:21:17 +00:00
|
|
|
// Setup 1ms
|
|
|
|
timespec ts = { .tv_sec = 0, .tv_nsec = 1000000L };
|
|
|
|
|
2021-01-07 07:59:05 +00:00
|
|
|
while (getenv(INJECT_ENV_1))
|
2021-01-07 06:21:17 +00:00
|
|
|
nanosleep(&ts, nullptr);
|
|
|
|
|
|
|
|
// Wait another 1ms to make sure all threads left our code
|
|
|
|
nanosleep(&ts, nullptr);
|
|
|
|
|
2021-08-18 10:44:32 +00:00
|
|
|
char *path = static_cast<char *>(v);
|
|
|
|
unmap_all(path);
|
2021-01-07 06:21:17 +00:00
|
|
|
active_threads--;
|
|
|
|
return nullptr;
|
|
|
|
}
|
|
|
|
|
2021-01-07 07:41:37 +00:00
|
|
|
// Make sure /proc/self/environ does not reveal our secrets
|
|
|
|
// Copy all env to a contiguous memory and set the memory region as MM_ENV
|
|
|
|
static void sanitize_environ() {
|
|
|
|
static string env;
|
|
|
|
|
|
|
|
for (int i = 0; environ[i]; ++i) {
|
2021-01-07 07:59:05 +00:00
|
|
|
if (str_starts(environ[i], INJECT_ENV_1 "="))
|
|
|
|
continue;
|
2021-01-07 07:41:37 +00:00
|
|
|
env += environ[i];
|
|
|
|
env += '\0';
|
|
|
|
}
|
|
|
|
|
|
|
|
for (int i = 0; i < 2; ++i) {
|
|
|
|
bool success = true;
|
|
|
|
success &= (0 <= prctl(PR_SET_MM, PR_SET_MM_ENV_START, env.data(), 0, 0));
|
|
|
|
success &= (0 <= prctl(PR_SET_MM, PR_SET_MM_ENV_END, env.data() + env.size(), 0, 0));
|
|
|
|
if (success)
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-08-01 21:35:16 +00:00
|
|
|
__attribute__((destructor))
|
|
|
|
static void inject_cleanup_wait() {
|
|
|
|
if (active_threads < 0)
|
|
|
|
return;
|
|
|
|
|
|
|
|
// Setup 1ms
|
|
|
|
timespec ts = { .tv_sec = 0, .tv_nsec = 1000000L };
|
|
|
|
|
|
|
|
// Check flag in busy loop
|
|
|
|
while (active_threads)
|
|
|
|
nanosleep(&ts, nullptr);
|
|
|
|
|
|
|
|
// Wait another 1ms to make sure all threads left our code
|
|
|
|
nanosleep(&ts, nullptr);
|
|
|
|
}
|
|
|
|
|
2021-01-07 06:21:17 +00:00
|
|
|
__attribute__((constructor))
|
|
|
|
static void inject_init() {
|
2021-08-18 10:44:32 +00:00
|
|
|
if (char *env = getenv(INJECT_ENV_2)) {
|
|
|
|
android_logging();
|
2021-08-19 08:54:12 +00:00
|
|
|
LOGD("zygisk: inject 2nd stage\n");
|
2021-01-07 06:21:17 +00:00
|
|
|
active_threads = 1;
|
2021-01-07 07:59:05 +00:00
|
|
|
unsetenv(INJECT_ENV_2);
|
2021-01-07 06:21:17 +00:00
|
|
|
|
|
|
|
// Get our own handle
|
2021-08-18 10:44:32 +00:00
|
|
|
self_handle = dlopen(env, RTLD_LAZY);
|
2021-01-07 06:21:17 +00:00
|
|
|
dlclose(self_handle);
|
|
|
|
|
2021-01-08 08:53:24 +00:00
|
|
|
hook_functions();
|
2021-01-07 06:21:17 +00:00
|
|
|
|
2021-08-18 10:44:32 +00:00
|
|
|
// Update path to 1st stage lib
|
|
|
|
*(strrchr(env, '.') - 1) = '1';
|
|
|
|
|
2021-01-07 07:59:05 +00:00
|
|
|
// Some cleanup
|
2021-01-07 07:41:37 +00:00
|
|
|
sanitize_environ();
|
2021-01-07 07:59:05 +00:00
|
|
|
active_threads++;
|
2021-08-18 10:44:32 +00:00
|
|
|
new_daemon_thread(&unload_first_stage, env);
|
|
|
|
} else if (getenv(INJECT_ENV_1)) {
|
|
|
|
android_logging();
|
2021-08-19 08:54:12 +00:00
|
|
|
LOGD("zygisk: inject 1st stage\n");
|
2021-01-07 07:59:05 +00:00
|
|
|
|
2021-08-18 10:44:32 +00:00
|
|
|
char *ld = getenv("LD_PRELOAD");
|
|
|
|
char *path;
|
|
|
|
if (char *c = strrchr(ld, ':')) {
|
|
|
|
*c = '\0';
|
|
|
|
setenv("LD_PRELOAD", ld, 1); // Restore original LD_PRELOAD
|
|
|
|
path = c + 1;
|
|
|
|
} else {
|
2021-01-07 07:59:05 +00:00
|
|
|
unsetenv("LD_PRELOAD");
|
2021-08-18 10:44:32 +00:00
|
|
|
path = ld;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Update path to 2nd stage lib
|
|
|
|
*(strrchr(path, '.') - 1) = '2';
|
2021-01-07 07:59:05 +00:00
|
|
|
|
|
|
|
// Setup second stage
|
2021-08-18 10:44:32 +00:00
|
|
|
setenv(INJECT_ENV_2, path, 1);
|
|
|
|
dlopen(path, RTLD_LAZY);
|
2021-01-07 07:59:05 +00:00
|
|
|
|
|
|
|
unsetenv(INJECT_ENV_1);
|
2021-01-07 06:21:17 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
int app_process_main(int argc, char *argv[]) {
|
2021-08-18 10:44:32 +00:00
|
|
|
android_logging();
|
|
|
|
|
|
|
|
if (int fd = connect_daemon(); fd >= 0) {
|
|
|
|
write_int(fd, ZYGISK_REQUEST);
|
|
|
|
write_int(fd, ZYGISK_SETUP);
|
|
|
|
|
|
|
|
if (read_int(fd) == 0) {
|
|
|
|
string path = read_string(fd);
|
|
|
|
string lib = path + ".1.so";
|
|
|
|
if (char *ld = getenv("LD_PRELOAD")) {
|
|
|
|
char env[256];
|
|
|
|
sprintf(env, "%s:%s", ld, lib.data());
|
|
|
|
setenv("LD_PRELOAD", env, 1);
|
|
|
|
} else {
|
|
|
|
setenv("LD_PRELOAD", lib.data(), 1);
|
|
|
|
}
|
|
|
|
setenv(INJECT_ENV_1, "1", 1);
|
|
|
|
}
|
|
|
|
close(fd);
|
2021-01-07 06:21:17 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Execute real app_process
|
2021-08-18 10:44:32 +00:00
|
|
|
char buf[256];
|
|
|
|
xreadlink("/proc/self/exe", buf, sizeof(buf));
|
|
|
|
xumount2("/proc/self/exe", MNT_DETACH);
|
2021-01-07 06:21:17 +00:00
|
|
|
execve(buf, argv, environ);
|
2021-01-07 07:41:37 +00:00
|
|
|
return 1;
|
2021-01-07 06:21:17 +00:00
|
|
|
}
|
2021-08-18 10:44:32 +00:00
|
|
|
|
|
|
|
// The following code runs in magiskd
|
|
|
|
|
|
|
|
static void setup_files(int client, ucred *cred) {
|
|
|
|
LOGD("zygisk: setup files\n");
|
|
|
|
|
|
|
|
char buf[PATH_MAX];
|
|
|
|
sprintf(buf, "/proc/%d/exe", cred->pid);
|
|
|
|
if (realpath(buf, buf) == nullptr) {
|
|
|
|
write_int(client, 1);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
write_int(client, 0);
|
|
|
|
|
|
|
|
string path = MAGISKTMP + "/zygisk." + basename(buf);
|
|
|
|
cp_afc(buf, (path + ".1.so").data());
|
|
|
|
cp_afc(buf, (path + ".2.so").data());
|
|
|
|
|
|
|
|
write_string(client, path);
|
|
|
|
}
|
|
|
|
|
|
|
|
void zygisk_handler(int client, ucred *cred) {
|
|
|
|
int code = read_int(client);
|
|
|
|
switch (code) {
|
|
|
|
case ZYGISK_SETUP:
|
|
|
|
setup_files(client, cred);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
close(client);
|
|
|
|
}
|