mirror of
https://github.com/topjohnwu/Magisk.git
synced 2025-04-16 22:11:25 +00:00
Move vendor property manipulation to late start
This commit is contained in:
parent
eca2168685
commit
97db49a57b
@ -19,8 +19,8 @@
|
|||||||
|
|
||||||
using namespace std;
|
using namespace std;
|
||||||
|
|
||||||
|
bool pfs_done = false;
|
||||||
static bool no_secure_dir = false;
|
static bool no_secure_dir = false;
|
||||||
static bool pfs_done = false;
|
|
||||||
static bool safe_mode = false;
|
static bool safe_mode = false;
|
||||||
|
|
||||||
/*********
|
/*********
|
||||||
|
@ -31,6 +31,7 @@ enum {
|
|||||||
|
|
||||||
extern int SDK_INT;
|
extern int SDK_INT;
|
||||||
extern bool RECOVERY_MODE;
|
extern bool RECOVERY_MODE;
|
||||||
|
extern bool pfs_done;
|
||||||
extern std::vector<std::string> module_list;
|
extern std::vector<std::string> module_list;
|
||||||
#define APP_DATA_DIR (SDK_INT >= 24 ? "/data/user_de" : "/data/user")
|
#define APP_DATA_DIR (SDK_INT >= 24 ? "/data/user_de" : "/data/user")
|
||||||
|
|
||||||
|
@ -13,51 +13,63 @@ static const char *prop_key[] =
|
|||||||
{ "ro.boot.vbmeta.device_state", "ro.boot.verifiedbootstate", "ro.boot.flash.locked",
|
{ "ro.boot.vbmeta.device_state", "ro.boot.verifiedbootstate", "ro.boot.flash.locked",
|
||||||
"ro.boot.veritymode", "ro.boot.warranty_bit", "ro.warranty_bit", "ro.debuggable",
|
"ro.boot.veritymode", "ro.boot.warranty_bit", "ro.warranty_bit", "ro.debuggable",
|
||||||
"ro.secure", "ro.build.type", "ro.build.tags", "ro.build.selinux",
|
"ro.secure", "ro.build.type", "ro.build.tags", "ro.build.selinux",
|
||||||
"ro.vendor.boot.warranty_bit", "ro.vendor.warranty_bit",
|
"ro.vendor.boot.warranty_bit", "ro.vendor.warranty_bit", nullptr };
|
||||||
"vendor.boot.vbmeta.device_state", "vendor.boot.verifiedbootstate", nullptr };
|
|
||||||
|
|
||||||
|
static const char *prop_val[] =
|
||||||
static const char *prop_value[] =
|
|
||||||
{ "locked", "green", "1",
|
{ "locked", "green", "1",
|
||||||
"enforcing", "0", "0", "0",
|
"enforcing", "0", "0", "0",
|
||||||
"1", "user", "release-keys", "0",
|
"1", "user", "release-keys", "0",
|
||||||
"0", "0",
|
"0", "0", nullptr };
|
||||||
"locked", "green", nullptr };
|
|
||||||
|
static const char *late_prop_key[] =
|
||||||
|
{ "vendor.boot.vbmeta.device_state", "vendor.boot.verifiedbootstate", nullptr };
|
||||||
|
|
||||||
|
static const char *late_prop_val[] =
|
||||||
|
{ "locked", "green", nullptr };
|
||||||
|
|
||||||
void hide_sensitive_props() {
|
void hide_sensitive_props() {
|
||||||
LOGI("hide_policy: Hiding sensitive props\n");
|
LOGI("hide_policy: Hiding sensitive props\n");
|
||||||
|
|
||||||
// Hide all sensitive props
|
|
||||||
for (int i = 0; prop_key[i]; ++i) {
|
for (int i = 0; prop_key[i]; ++i) {
|
||||||
auto value = getprop(prop_key[i]);
|
auto value = getprop(prop_key[i]);
|
||||||
if (!value.empty() && value != prop_value[i])
|
if (!value.empty() && value != prop_val[i])
|
||||||
setprop(prop_key[i], prop_value[i], false);
|
setprop(prop_key[i], prop_val[i], false);
|
||||||
}
|
}
|
||||||
|
|
||||||
// Hide that we booted from recovery when magisk is in recovery mode
|
// Hide that we booted from recovery when magisk is in recovery mode
|
||||||
auto bootmode = getprop("ro.bootmode");
|
auto bootmode = getprop("ro.bootmode");
|
||||||
if (!bootmode.empty() && bootmode.find("recovery") != string::npos) {
|
if (!bootmode.empty() && str_contains(bootmode, "recovery")) {
|
||||||
setprop("ro.bootmode", "unknown", false);
|
setprop("ro.bootmode", "unknown", false);
|
||||||
}
|
}
|
||||||
bootmode = getprop("ro.boot.mode");
|
bootmode = getprop("ro.boot.mode");
|
||||||
if (!bootmode.empty() && bootmode.find("recovery") != string::npos) {
|
if (!bootmode.empty() && str_contains(bootmode, "recovery")) {
|
||||||
setprop("ro.boot.mode", "unknown", false);
|
setprop("ro.boot.mode", "unknown", false);
|
||||||
}
|
}
|
||||||
bootmode = getprop("vendor.boot.mode");
|
|
||||||
if (!bootmode.empty() && bootmode.find("recovery") != string::npos) {
|
|
||||||
setprop("vendor.boot.mode", "unknown", false);
|
|
||||||
}
|
|
||||||
// Xiaomi cross region flash
|
// Xiaomi cross region flash
|
||||||
auto hwc = getprop("ro.boot.hwc");
|
auto hwc = getprop("ro.boot.hwc");
|
||||||
if (!hwc.empty() && hwc.find("CN") != string::npos) {
|
if (!hwc.empty() && str_contains(hwc, "CN")) {
|
||||||
setprop("ro.boot.hwc", "GLOBAL", false);
|
setprop("ro.boot.hwc", "GLOBAL", false);
|
||||||
}
|
}
|
||||||
auto hwcountry = getprop("ro.boot.hwcountry");
|
auto hwcountry = getprop("ro.boot.hwcountry");
|
||||||
if (!hwcountry.empty() && hwcountry.find("China") != string::npos) {
|
if (!hwcountry.empty() && str_contains(hwcountry, "China")) {
|
||||||
setprop("ro.boot.hwcountry", "GLOBAL", false);
|
setprop("ro.boot.hwcountry", "GLOBAL", false);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
void hide_late_sensitive_props() {
|
||||||
|
LOGI("hide_policy: Hiding sensitive props (late)\n");
|
||||||
|
|
||||||
|
for (int i = 0; late_prop_key[i]; ++i) {
|
||||||
|
auto value = getprop(late_prop_key[i]);
|
||||||
|
if (!value.empty() && value != late_prop_val[i])
|
||||||
|
setprop(prop_key[i], late_prop_val[i], false);
|
||||||
|
}
|
||||||
|
auto bootmode = getprop("vendor.boot.mode");
|
||||||
|
if (!bootmode.empty() && str_contains(bootmode, "recovery")) {
|
||||||
|
setprop("vendor.boot.mode", "unknown", false);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
static inline void lazy_unmount(const char* mountpoint) {
|
static inline void lazy_unmount(const char* mountpoint) {
|
||||||
if (umount2(mountpoint, MNT_DETACH) != -1)
|
if (umount2(mountpoint, MNT_DETACH) != -1)
|
||||||
LOGD("hide_policy: Unmounted (%s)\n", mountpoint);
|
LOGD("hide_policy: Unmounted (%s)\n", mountpoint);
|
||||||
|
@ -16,15 +16,19 @@
|
|||||||
using namespace std;
|
using namespace std;
|
||||||
|
|
||||||
static pthread_t proc_monitor_thread;
|
static pthread_t proc_monitor_thread;
|
||||||
|
static bool hide_state = false;
|
||||||
|
|
||||||
|
// This locks the 2 variables above
|
||||||
|
static pthread_mutex_t hide_state_lock = PTHREAD_MUTEX_INITIALIZER;
|
||||||
|
|
||||||
// Leave /proc fd opened as we're going to read from it repeatedly
|
// Leave /proc fd opened as we're going to read from it repeatedly
|
||||||
static DIR *procfp;
|
static DIR *procfp;
|
||||||
void crawl_procfs(const function<bool (int)> &fn) {
|
void crawl_procfs(const function<bool(int)> &fn) {
|
||||||
rewinddir(procfp);
|
rewinddir(procfp);
|
||||||
crawl_procfs(procfp, fn);
|
crawl_procfs(procfp, fn);
|
||||||
}
|
}
|
||||||
|
|
||||||
void crawl_procfs(DIR *dir, const function<bool (int)> &fn) {
|
void crawl_procfs(DIR *dir, const function<bool(int)> &fn) {
|
||||||
struct dirent *dp;
|
struct dirent *dp;
|
||||||
int pid;
|
int pid;
|
||||||
while ((dp = readdir(dir))) {
|
while ((dp = readdir(dir))) {
|
||||||
@ -34,18 +38,20 @@ void crawl_procfs(DIR *dir, const function<bool (int)> &fn) {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
static bool hide_state = false;
|
|
||||||
static pthread_mutex_t hide_state_lock = PTHREAD_MUTEX_INITIALIZER;
|
|
||||||
|
|
||||||
bool hide_enabled() {
|
bool hide_enabled() {
|
||||||
mutex_guard g(hide_state_lock);
|
mutex_guard g(hide_state_lock);
|
||||||
return hide_state;
|
return hide_state;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
void set_hide_state(bool state) {
|
||||||
|
mutex_guard g(hide_state_lock);
|
||||||
|
hide_state = state;
|
||||||
|
}
|
||||||
|
|
||||||
static bool proc_name_match(int pid, const char *name) {
|
static bool proc_name_match(int pid, const char *name) {
|
||||||
char buf[4019];
|
char buf[4019];
|
||||||
sprintf(buf, "/proc/%d/cmdline", pid);
|
sprintf(buf, "/proc/%d/cmdline", pid);
|
||||||
if (FILE *f; (f = fopen(buf, "re"))) {
|
if (FILE *f = fopen(buf, "re")) {
|
||||||
fgets(buf, sizeof(buf), f);
|
fgets(buf, sizeof(buf), f);
|
||||||
fclose(f);
|
fclose(f);
|
||||||
if (strcmp(buf, name) == 0)
|
if (strcmp(buf, name) == 0)
|
||||||
@ -174,7 +180,7 @@ static void init_list(const char *pkg, const char *proc) {
|
|||||||
#define GMS_PKG "com.google.android.gms"
|
#define GMS_PKG "com.google.android.gms"
|
||||||
#define MICROG_PKG "org.microg.gms.droidguard"
|
#define MICROG_PKG "org.microg.gms.droidguard"
|
||||||
|
|
||||||
bool init_list() {
|
static bool init_list() {
|
||||||
LOGD("hide_list: initialize\n");
|
LOGD("hide_list: initialize\n");
|
||||||
|
|
||||||
char *err = db_exec("SELECT * FROM hidelist", [](db_row &row) -> bool {
|
char *err = db_exec("SELECT * FROM hidelist", [](db_row &row) -> bool {
|
||||||
@ -211,7 +217,7 @@ void ls_list(int client) {
|
|||||||
close(client);
|
close(client);
|
||||||
}
|
}
|
||||||
|
|
||||||
static void set_hide_config() {
|
static void update_hide_config() {
|
||||||
char sql[64];
|
char sql[64];
|
||||||
sprintf(sql, "REPLACE INTO settings (key,value) VALUES('%s',%d)",
|
sprintf(sql, "REPLACE INTO settings (key,value) VALUES('%s',%d)",
|
||||||
DB_SETTING_KEYS[HIDE_CONFIG], hide_state);
|
DB_SETTING_KEYS[HIDE_CONFIG], hide_state);
|
||||||
@ -219,80 +225,66 @@ static void set_hide_config() {
|
|||||||
db_err(err);
|
db_err(err);
|
||||||
}
|
}
|
||||||
|
|
||||||
[[noreturn]] static void launch_err(int client, int code = DAEMON_ERROR) {
|
int launch_magiskhide() {
|
||||||
if (code != HIDE_IS_ENABLED)
|
mutex_guard g(hide_state_lock);
|
||||||
hide_state = false;
|
|
||||||
if (client >= 0) {
|
|
||||||
write_int(client, code);
|
|
||||||
close(client);
|
|
||||||
}
|
|
||||||
pthread_mutex_unlock(&hide_state_lock);
|
|
||||||
pthread_exit(nullptr);
|
|
||||||
}
|
|
||||||
|
|
||||||
void launch_magiskhide(int client) {
|
|
||||||
pthread_mutex_lock(&hide_state_lock);
|
|
||||||
|
|
||||||
if (SDK_INT < 19)
|
if (SDK_INT < 19)
|
||||||
launch_err(client);
|
return DAEMON_ERROR;
|
||||||
|
|
||||||
if (hide_state)
|
if (hide_state)
|
||||||
launch_err(client, HIDE_IS_ENABLED);
|
return HIDE_IS_ENABLED;
|
||||||
|
|
||||||
if (access("/proc/1/ns/mnt", F_OK) != 0)
|
if (access("/proc/1/ns/mnt", F_OK) != 0)
|
||||||
launch_err(client, HIDE_NO_NS);
|
return HIDE_NO_NS;
|
||||||
|
|
||||||
hide_state = true;
|
|
||||||
set_hide_config();
|
|
||||||
LOGI("* Starting MagiskHide\n");
|
|
||||||
|
|
||||||
if (procfp == nullptr && (procfp = opendir("/proc")) == nullptr)
|
if (procfp == nullptr && (procfp = opendir("/proc")) == nullptr)
|
||||||
launch_err(client);
|
return DAEMON_ERROR;
|
||||||
|
|
||||||
|
LOGI("* Starting MagiskHide\n");
|
||||||
|
|
||||||
|
// Initialize the hide list
|
||||||
|
if (!init_list())
|
||||||
|
return DAEMON_ERROR;
|
||||||
|
|
||||||
hide_sensitive_props();
|
hide_sensitive_props();
|
||||||
|
if (pfs_done)
|
||||||
|
hide_late_sensitive_props();
|
||||||
|
|
||||||
// Initialize the mutex lock
|
// Initialize the mutex lock
|
||||||
pthread_mutex_init(&monitor_lock, nullptr);
|
pthread_mutex_init(&monitor_lock, nullptr);
|
||||||
|
|
||||||
// Initialize the hide list
|
|
||||||
if (!init_list())
|
|
||||||
launch_err(client);
|
|
||||||
|
|
||||||
// Get thread reference
|
|
||||||
proc_monitor_thread = pthread_self();
|
|
||||||
if (client >= 0) {
|
|
||||||
write_int(client, DAEMON_SUCCESS);
|
|
||||||
close(client);
|
|
||||||
client = -1;
|
|
||||||
}
|
|
||||||
// Start monitoring
|
// Start monitoring
|
||||||
proc_monitor();
|
void *(*start)(void*) = [](void*) -> void* { proc_monitor(); return nullptr; };
|
||||||
|
if (xpthread_create(&proc_monitor_thread, nullptr, start, nullptr))
|
||||||
|
return DAEMON_ERROR;
|
||||||
|
|
||||||
// proc_monitor should not return
|
hide_state = true;
|
||||||
launch_err(client);
|
update_hide_config();
|
||||||
|
return DAEMON_SUCCESS;
|
||||||
}
|
}
|
||||||
|
|
||||||
int stop_magiskhide() {
|
int stop_magiskhide() {
|
||||||
LOGI("* Stopping MagiskHide\n");
|
|
||||||
|
|
||||||
mutex_guard g(hide_state_lock);
|
mutex_guard g(hide_state_lock);
|
||||||
if (hide_state)
|
|
||||||
pthread_kill(proc_monitor_thread, SIGTERMTHRD);
|
|
||||||
hide_state = false;
|
|
||||||
set_hide_config();
|
|
||||||
|
|
||||||
|
if (hide_state) {
|
||||||
|
LOGI("* Stopping MagiskHide\n");
|
||||||
|
pthread_kill(proc_monitor_thread, SIGTERMTHRD);
|
||||||
|
}
|
||||||
|
|
||||||
|
hide_state = false;
|
||||||
|
update_hide_config();
|
||||||
return DAEMON_SUCCESS;
|
return DAEMON_SUCCESS;
|
||||||
}
|
}
|
||||||
|
|
||||||
void auto_start_magiskhide() {
|
void auto_start_magiskhide() {
|
||||||
if (hide_enabled()) {
|
if (hide_enabled()) {
|
||||||
pthread_kill(proc_monitor_thread, SIGZYGOTE);
|
pthread_kill(proc_monitor_thread, SIGZYGOTE);
|
||||||
|
hide_late_sensitive_props();
|
||||||
} else if (SDK_INT >= 19) {
|
} else if (SDK_INT >= 19) {
|
||||||
db_settings dbs;
|
db_settings dbs;
|
||||||
get_db_settings(dbs, HIDE_CONFIG);
|
get_db_settings(dbs, HIDE_CONFIG);
|
||||||
if (dbs[HIDE_CONFIG]) {
|
if (dbs[HIDE_CONFIG])
|
||||||
new_daemon_thread([]{ launch_magiskhide(-1); });
|
launch_magiskhide();
|
||||||
}
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -54,8 +54,8 @@ void magiskhide_handler(int client) {
|
|||||||
|
|
||||||
switch (req) {
|
switch (req) {
|
||||||
case LAUNCH_MAGISKHIDE:
|
case LAUNCH_MAGISKHIDE:
|
||||||
launch_magiskhide(client);
|
res = launch_magiskhide();
|
||||||
return;
|
break;
|
||||||
case STOP_MAGISKHIDE:
|
case STOP_MAGISKHIDE:
|
||||||
res = stop_magiskhide();
|
res = stop_magiskhide();
|
||||||
break;
|
break;
|
||||||
@ -67,8 +67,7 @@ void magiskhide_handler(int client) {
|
|||||||
break;
|
break;
|
||||||
case LS_HIDELIST:
|
case LS_HIDELIST:
|
||||||
ls_list(client);
|
ls_list(client);
|
||||||
client = -1;
|
return;
|
||||||
break;
|
|
||||||
case HIDE_STATUS:
|
case HIDE_STATUS:
|
||||||
res = hide_enabled() ? HIDE_IS_ENABLED : HIDE_NOT_ENABLED;
|
res = hide_enabled() ? HIDE_IS_ENABLED : HIDE_NOT_ENABLED;
|
||||||
break;
|
break;
|
||||||
|
@ -16,7 +16,7 @@
|
|||||||
#define SIGZYGOTE SIGUSR2
|
#define SIGZYGOTE SIGUSR2
|
||||||
|
|
||||||
// CLI entries
|
// CLI entries
|
||||||
void launch_magiskhide(int client);
|
int launch_magiskhide();
|
||||||
int stop_magiskhide();
|
int stop_magiskhide();
|
||||||
int add_list(int client);
|
int add_list(int client);
|
||||||
int rm_list(int client);
|
int rm_list(int client);
|
||||||
@ -31,11 +31,13 @@ void update_uid_map();
|
|||||||
void crawl_procfs(const std::function<bool (int)> &fn);
|
void crawl_procfs(const std::function<bool (int)> &fn);
|
||||||
void crawl_procfs(DIR *dir, const std::function<bool (int)> &fn);
|
void crawl_procfs(DIR *dir, const std::function<bool (int)> &fn);
|
||||||
bool hide_enabled();
|
bool hide_enabled();
|
||||||
|
void set_hide_state(bool state);
|
||||||
|
|
||||||
// Hide policies
|
// Hide policies
|
||||||
void hide_daemon(int pid);
|
void hide_daemon(int pid);
|
||||||
void hide_unmount(int pid = getpid());
|
void hide_unmount(int pid = getpid());
|
||||||
void hide_sensitive_props();
|
void hide_sensitive_props();
|
||||||
|
void hide_late_sensitive_props();
|
||||||
|
|
||||||
extern pthread_mutex_t monitor_lock;
|
extern pthread_mutex_t monitor_lock;
|
||||||
extern std::set<std::pair<std::string, std::string>> hide_set;
|
extern std::set<std::pair<std::string, std::string>> hide_set;
|
||||||
|
@ -95,7 +95,7 @@ static void check_zygote() {
|
|||||||
crawl_procfs([](int pid) -> bool {
|
crawl_procfs([](int pid) -> bool {
|
||||||
char buf[512];
|
char buf[512];
|
||||||
snprintf(buf, sizeof(buf), "/proc/%d/cmdline", pid);
|
snprintf(buf, sizeof(buf), "/proc/%d/cmdline", pid);
|
||||||
if (FILE *f = fopen(buf, "re"); f) {
|
if (FILE *f = fopen(buf, "re")) {
|
||||||
fgets(buf, sizeof(buf), f);
|
fgets(buf, sizeof(buf), f);
|
||||||
if (strncmp(buf, "zygote", 6) == 0 && parse_ppid(pid) == 1)
|
if (strncmp(buf, "zygote", 6) == 0 && parse_ppid(pid) == 1)
|
||||||
new_zygote(pid);
|
new_zygote(pid);
|
||||||
@ -167,7 +167,7 @@ static void term_thread(int) {
|
|||||||
hide_set.clear();
|
hide_set.clear();
|
||||||
attaches.reset();
|
attaches.reset();
|
||||||
// Misc
|
// Misc
|
||||||
hide_enabled = false;
|
set_hide_state(false);
|
||||||
pthread_mutex_destroy(&monitor_lock);
|
pthread_mutex_destroy(&monitor_lock);
|
||||||
close(inotify_fd);
|
close(inotify_fd);
|
||||||
inotify_fd = -1;
|
inotify_fd = -1;
|
||||||
|
Loading…
x
Reference in New Issue
Block a user