#include #include #include #include #include #include #include #include #include #include #include #include #include "deny.hpp" using namespace std; // For the following data structures: // If package name == ISOLATED_MAGIC, or app ID == -1, it means isolated service // Package name -> list of process names static unique_ptr, StringCmp>> pkg_to_procs_; #define pkg_to_procs (*pkg_to_procs_) // app ID -> list of pkg names (string_view points to a pkg_to_procs key) static unique_ptr>> app_id_to_pkgs_; #define app_id_to_pkgs (*app_id_to_pkgs_) // Locks the data structures above static pthread_mutex_t data_lock = PTHREAD_MUTEX_INITIALIZER; atomic denylist_enforced = false; static int get_app_id(const vector &users, const string &pkg) { struct stat st{}; char buf[PATH_MAX]; for (const auto &user_id: users) { ssprintf(buf, sizeof(buf), "%s/%d/%s", APP_DATA_DIR, user_id, pkg.data()); if (stat(buf, &st) == 0) { return to_app_id(st.st_uid); } } return 0; } static void collect_users(vector &users) { auto data_dir = xopen_dir(APP_DATA_DIR); if (!data_dir) return; dirent *entry; while ((entry = xreaddir(data_dir.get()))) { users.emplace_back(parse_int(entry->d_name)); } } static int get_app_id(const string &pkg) { if (pkg == ISOLATED_MAGIC) return -1; vector users; collect_users(users); return get_app_id(users, pkg); } static void update_app_id(int app_id, const string &pkg, bool remove) { if (app_id <= 0) return; if (remove) { if (auto it = app_id_to_pkgs.find(app_id); it != app_id_to_pkgs.end()) { it->second.erase(pkg); if (it->second.empty()) { app_id_to_pkgs.erase(it); } } } else { app_id_to_pkgs[app_id].emplace(pkg); } } // Leave /proc fd opened as we're going to read from it repeatedly static DIR *procfp; template static void crawl_procfs(const F &fn) { rewinddir(procfp); dirent *dp; int pid; while ((dp = readdir(procfp))) { pid = parse_int(dp->d_name); if (pid > 0 && !fn(pid)) break; } } static inline bool str_eql(string_view a, string_view b) { return a == b; } template static bool proc_name_match(int pid, string_view name) { char buf[4019]; sprintf(buf, "/proc/%d/cmdline", pid); if (auto fp = open_file(buf, "re")) { fgets(buf, sizeof(buf), fp.get()); if (str_op(buf, name)) { return true; } } return false; } bool proc_context_match(int pid, string_view context) { char buf[PATH_MAX]; char con[1024]; sprintf(buf, "/proc/%d", pid); if (lgetfilecon(buf, { con, sizeof(con) }) >= 0) { return str_starts(con, context); } return false; } template static void kill_process(const char *name, bool multi = false) { crawl_procfs([=](int pid) -> bool { if (matcher(pid, name)) { kill(pid, SIGKILL); LOGD("denylist: kill PID=[%d] (%s)\n", pid, name); return multi; } return true; }); } static bool validate(const char *pkg, const char *proc) { bool pkg_valid = false; bool proc_valid = true; if (str_eql(pkg, ISOLATED_MAGIC)) { pkg_valid = true; for (char c; (c = *proc); ++proc) { if (isalnum(c) || c == '_' || c == '.') continue; if (c == ':') break; proc_valid = false; break; } } else { for (char c; (c = *pkg); ++pkg) { if (isalnum(c) || c == '_') continue; if (c == '.') { pkg_valid = true; continue; } pkg_valid = false; break; } for (char c; (c = *proc); ++proc) { if (isalnum(c) || c == '_' || c == ':' || c == '.') continue; proc_valid = false; break; } } return pkg_valid && proc_valid; } static bool add_hide_set(const char *pkg, const char *proc) { auto p = pkg_to_procs[pkg].emplace(proc); if (!p.second) return false; LOGI("denylist add: [%s/%s]\n", pkg, proc); if (!denylist_enforced) return true; if (str_eql(pkg, ISOLATED_MAGIC)) { // Kill all matching isolated processes kill_process<&proc_name_match>(proc, true); } else { kill_process(proc); } return true; } void scan_deny_apps() { if (!app_id_to_pkgs_) return; app_id_to_pkgs.clear(); char sql[4096]; vector users; collect_users(users); for (auto it = pkg_to_procs.begin(); it != pkg_to_procs.end();) { if (it->first == ISOLATED_MAGIC) { it++; continue; } int app_id = get_app_id(users, it->first); if (app_id == 0) { LOGI("denylist rm: [%s]\n", it->first.data()); ssprintf(sql, sizeof(sql), "DELETE FROM denylist WHERE package_name='%s'", it->first.data()); db_exec(sql); it = pkg_to_procs.erase(it); } else { update_app_id(app_id, it->first, false); it++; } } } static void clear_data() { pkg_to_procs_.reset(nullptr); app_id_to_pkgs_.reset(nullptr); } static bool ensure_data() { if (pkg_to_procs_) return true; LOGI("denylist: initializing internal data structures\n"); default_new(pkg_to_procs_); bool res = db_exec("SELECT * FROM denylist", {}, [](StringSlice columns, const DbValues &values) { const char *package_name; const char *process; for (int i = 0; i < columns.size(); ++i) { const auto &name = columns[i]; if (name == "package_name") { package_name = values.get_text(i); } else if (name == "process") { process = values.get_text(i); } } add_hide_set(package_name, process); }); if (!res) goto error; default_new(app_id_to_pkgs_); scan_deny_apps(); return true; error: clear_data(); return false; } static int add_list(const char *pkg, const char *proc) { if (proc[0] == '\0') proc = pkg; if (!validate(pkg, proc)) return DenyResponse::INVALID_PKG; { mutex_guard lock(data_lock); if (!ensure_data()) return DenyResponse::ERROR; int app_id = get_app_id(pkg); if (app_id == 0) return DenyResponse::INVALID_PKG; if (!add_hide_set(pkg, proc)) return DenyResponse::ITEM_EXIST; auto it = pkg_to_procs.find(pkg); update_app_id(app_id, it->first, false); } // Add to database char sql[4096]; ssprintf(sql, sizeof(sql), "INSERT INTO denylist (package_name, process) VALUES('%s', '%s')", pkg, proc); return db_exec(sql) ? DenyResponse::OK : DenyResponse::ERROR; } int add_list(int client) { string pkg = read_string(client); string proc = read_string(client); return add_list(pkg.data(), proc.data()); } static int rm_list(const char *pkg, const char *proc) { { mutex_guard lock(data_lock); if (!ensure_data()) return DenyResponse::ERROR; bool remove = false; auto it = pkg_to_procs.find(pkg); if (it != pkg_to_procs.end()) { if (proc[0] == '\0') { update_app_id(get_app_id(pkg), it->first, true); pkg_to_procs.erase(it); remove = true; LOGI("denylist rm: [%s]\n", pkg); } else if (it->second.erase(proc) != 0) { remove = true; LOGI("denylist rm: [%s/%s]\n", pkg, proc); if (it->second.empty()) { update_app_id(get_app_id(pkg), it->first, true); pkg_to_procs.erase(it); } } } if (!remove) return DenyResponse::ITEM_NOT_EXIST; } char sql[4096]; if (proc[0] == '\0') ssprintf(sql, sizeof(sql), "DELETE FROM denylist WHERE package_name='%s'", pkg); else ssprintf(sql, sizeof(sql), "DELETE FROM denylist WHERE package_name='%s' AND process='%s'", pkg, proc); return db_exec(sql) ? DenyResponse::OK : DenyResponse::ERROR; } int rm_list(int client) { string pkg = read_string(client); string proc = read_string(client); return rm_list(pkg.data(), proc.data()); } void ls_list(int client) { { mutex_guard lock(data_lock); if (!ensure_data()) { write_int(client, static_cast(DenyResponse::ERROR)); return; } scan_deny_apps(); write_int(client,static_cast(DenyResponse::OK)); for (const auto &[pkg, procs] : pkg_to_procs) { for (const auto &proc : procs) { write_int(client, pkg.size() + proc.size() + 1); xwrite(client, pkg.data(), pkg.size()); xwrite(client, "|", 1); xwrite(client, proc.data(), proc.size()); } } } write_int(client, 0); close(client); } int enable_deny() { if (denylist_enforced) { return DenyResponse::OK; } else { mutex_guard lock(data_lock); if (access("/proc/self/ns/mnt", F_OK) != 0) { LOGW("The kernel does not support mount namespace\n"); return DenyResponse::NO_NS; } if (procfp == nullptr && (procfp = opendir("/proc")) == nullptr) return DenyResponse::ERROR; LOGI("* Enable DenyList\n"); if (!ensure_data()) return DenyResponse::ERROR; denylist_enforced = true; if (!MagiskD::Get().zygisk_enabled()) { if (new_daemon_thread(&logcat)) { denylist_enforced = false; return DenyResponse::ERROR; } } // On Android Q+, also kill blastula pool and all app zygotes if (SDK_INT >= 29) { kill_process("usap32", true); kill_process("usap64", true); kill_process<&proc_context_match>("u:r:app_zygote:s0", true); } } MagiskD::Get().set_db_setting(DbEntryKey::DenylistConfig, true); return DenyResponse::OK; } int disable_deny() { if (denylist_enforced.exchange(false)) { LOGI("* Disable DenyList\n"); } MagiskD::Get().set_db_setting(DbEntryKey::DenylistConfig, false); return DenyResponse::OK; } void initialize_denylist() { if (!denylist_enforced) { if (MagiskD::Get().get_db_setting(DbEntryKey::DenylistConfig)) enable_deny(); } } bool is_deny_target(int uid, string_view process) { mutex_guard lock(data_lock); if (!ensure_data()) return false; int app_id = to_app_id(uid); if (app_id >= 90000) { if (auto it = pkg_to_procs.find(ISOLATED_MAGIC); it != pkg_to_procs.end()) { for (const auto &s : it->second) { if (str_starts(process, s)) return true; } } return false; } else { auto it = app_id_to_pkgs.find(app_id); if (it == app_id_to_pkgs.end()) return false; for (const auto &pkg : it->second) { if (pkg_to_procs.find(pkg)->second.count(process)) return true; } } return false; } void update_deny_flags(int uid, rust::Str process, uint32_t &flags) { if (is_deny_target(uid, { process.begin(), process.end() })) { flags |= +ZygiskStateFlags::ProcessOnDenyList; } if (denylist_enforced) { flags |= +ZygiskStateFlags::DenyListEnforced; } }