#include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include "magiskhide.hpp" using namespace std; static int inotify_fd = -1; static void term_thread(int sig = SIGTERMTHRD); static void new_zygote(int pid); /********************** * All data structures **********************/ set> hide_set; /* set of pair */ static map zygote_map; /* zygote pid -> mnt ns */ static map> uid_proc_map; /* uid -> list of process */ pthread_mutex_t monitor_lock; #define PID_MAX 32768 static bitset attaches; /* true if pid is monitored */ /******** * Utils ********/ static inline int read_ns(const int pid, struct stat *st) { char path[32]; sprintf(path, "/proc/%d/ns/mnt", pid); return stat(path, st); } static int parse_ppid(int pid) { char path[32]; int ppid; sprintf(path, "/proc/%d/stat", pid); FILE *stat = fopen(path, "re"); if (stat == nullptr) return -1; // PID COMM STATE PPID ..... fscanf(stat, "%*d %*s %*c %d", &ppid); fclose(stat); return ppid; } static inline long xptrace(int request, pid_t pid, void *addr, void *data) { long ret = ptrace(request, pid, addr, data); if (ret < 0) PLOGE("ptrace %d", pid); return ret; } static inline long xptrace(int request, pid_t pid, void *addr = nullptr, intptr_t data = 0) { return xptrace(request, pid, addr, reinterpret_cast(data)); } void update_uid_map() { mutex_guard lock(monitor_lock); uid_proc_map.clear(); string data_path(APP_DATA_DIR); size_t len = data_path.length(); auto dir = open_dir(APP_DATA_DIR); for (dirent *entry; (entry = xreaddir(dir.get()));) { data_path += '/'; data_path += entry->d_name; data_path += '/'; size_t user_len = data_path.length(); struct stat st; for (auto &hide : hide_set) { data_path.resize(user_len); data_path += hide.first; if (stat(data_path.data(), &st)) continue; uid_proc_map[st.st_uid].emplace_back(hide.second); } // Reset string data_path.resize(len); } } static void check_zygote() { crawl_procfs([](int pid) -> bool { char buf[512]; snprintf(buf, sizeof(buf), "/proc/%d/cmdline", pid); if (FILE *f = fopen(buf, "re")) { fgets(buf, sizeof(buf), f); if (strncmp(buf, "zygote", 6) == 0 && parse_ppid(pid) == 1) new_zygote(pid); fclose(f); } return true; }); } #define APP_PROC "/system/bin/app_process" static void setup_inotify() { inotify_fd = xinotify_init1(IN_CLOEXEC); if (inotify_fd < 0) term_thread(); // Setup inotify asynchronous I/O fcntl(inotify_fd, F_SETFL, O_ASYNC); struct f_owner_ex ex = { .type = F_OWNER_TID, .pid = gettid() }; fcntl(inotify_fd, F_SETOWN_EX, &ex); // Monitor packages.xml inotify_add_watch(inotify_fd, "/data/system", IN_CLOSE_WRITE); // Monitor app_process if (access(APP_PROC "32", F_OK) == 0) { inotify_add_watch(inotify_fd, APP_PROC "32", IN_ACCESS); if (access(APP_PROC "64", F_OK) == 0) inotify_add_watch(inotify_fd, APP_PROC "64", IN_ACCESS); } else { inotify_add_watch(inotify_fd, APP_PROC, IN_ACCESS); } } /************************ * Async signal handlers ************************/ static void inotify_event(int) { /* Make sure we can actually read stuffs * or else the whole thread will be blocked.*/ struct pollfd pfd = { .fd = inotify_fd, .events = POLLIN, .revents = 0 }; if (poll(&pfd, 1, 0) <= 0) return; // Nothing to read char buf[512]; auto event = reinterpret_cast(buf); read(inotify_fd, buf, sizeof(buf)); if ((event->mask & IN_CLOSE_WRITE) && event->name == "packages.xml"sv) update_uid_map(); check_zygote(); } static void check_zygote(int) { check_zygote(); } // Workaround for the lack of pthread_cancel static void term_thread(int) { LOGD("proc_monitor: cleaning up\n"); uid_proc_map.clear(); zygote_map.clear(); hide_set.clear(); attaches.reset(); // Misc set_hide_state(false); pthread_mutex_destroy(&monitor_lock); close(inotify_fd); inotify_fd = -1; LOGD("proc_monitor: terminate\n"); pthread_exit(nullptr); } /****************** * Ptrace Madness ******************/ // Ptrace is super tricky, preserve all excessive logging in code // but disable when actually building for usage (you won't want // your logcat spammed with new thread events from all apps) //#define PTRACE_LOG(fmt, args...) LOGD("PID=[%d] " fmt, pid, ##args) #define PTRACE_LOG(...) static void detach_pid(int pid, int signal = 0) { attaches[pid] = false; ptrace(PTRACE_DETACH, pid, 0, signal); PTRACE_LOG("detach\n"); } static bool check_pid(int pid) { char path[128]; char cmdline[1024]; struct stat st; sprintf(path, "/proc/%d", pid); if (stat(path, &st)) { // Process killed unexpectedly, ignore detach_pid(pid); return true; } // UID hasn't changed if (st.st_uid == 0) return false; sprintf(path, "/proc/%d/cmdline", pid); if (auto f = open_file(path, "re")) { fgets(cmdline, sizeof(cmdline), f.get()); } else { // Process killed unexpectedly, ignore detach_pid(pid); return true; } if (cmdline == "zygote"sv || cmdline == "zygote32"sv || cmdline == "zygote64"sv || cmdline == "usap32"sv || cmdline == "usap64"sv) return false; int uid = st.st_uid; auto it = uid_proc_map.find(uid); if (it != uid_proc_map.end()) { for (auto &s : it->second) { if (s == cmdline) { // Double check whether ns is separated read_ns(pid, &st); bool mnt_ns = true; for (auto &zit : zygote_map) { if (zit.second.st_ino == st.st_ino && zit.second.st_dev == st.st_dev) { mnt_ns = false; break; } } // For some reason ns is not separated, abort if (!mnt_ns) break; // Finally this is our target! // Detach from ptrace but should still remain stopped. // The hide daemon will resume the process. PTRACE_LOG("target found\n"); LOGI("proc_monitor: [%s] PID=[%d] UID=[%d]\n", cmdline, pid, uid); detach_pid(pid, SIGSTOP); hide_daemon(pid); return true; } } } PTRACE_LOG("[%s] not our target\n", cmdline); detach_pid(pid); return true; } static bool is_process(int pid) { char buf[128]; char key[32]; int tgid; sprintf(buf, "/proc/%d/status", pid); auto fp = open_file(buf, "re"); // PID is dead if (!fp) return false; while (fgets(buf, sizeof(buf), fp.get())) { sscanf(buf, "%s", key); if (key == "Tgid:"sv) { sscanf(buf, "%*s %d", &tgid); return tgid == pid; } } return false; } static void new_zygote(int pid) { struct stat st; if (read_ns(pid, &st)) return; auto it = zygote_map.find(pid); if (it != zygote_map.end()) { // Update namespace info it->second = st; return; } LOGD("proc_monitor: ptrace zygote PID=[%d]\n", pid); zygote_map[pid] = st; xptrace(PTRACE_ATTACH, pid); waitpid(pid, nullptr, __WALL | __WNOTHREAD); xptrace(PTRACE_SETOPTIONS, pid, nullptr, PTRACE_O_TRACEFORK | PTRACE_O_TRACEVFORK | PTRACE_O_TRACEEXIT); xptrace(PTRACE_CONT, pid); } #define WEVENT(s) (((s) & 0xffff0000) >> 16) #define DETACH_AND_CONT { detach = true; continue; } void proc_monitor() { // Unblock some signals sigset_t block_set; sigemptyset(&block_set); sigaddset(&block_set, SIGTERMTHRD); sigaddset(&block_set, SIGIO); pthread_sigmask(SIG_UNBLOCK, &block_set, nullptr); struct sigaction act{}; act.sa_handler = term_thread; sigaction(SIGTERMTHRD, &act, nullptr); act.sa_handler = inotify_event; sigaction(SIGIO, &act, nullptr); act.sa_handler = check_zygote; sigaction(SIGZYGOTE, &act, nullptr); setup_inotify(); // First find existing zygotes check_zygote(); int status; for (;;) { const int pid = waitpid(-1, &status, __WALL | __WNOTHREAD); if (pid < 0) { if (errno == ECHILD) { /* This mean we have nothing to wait, sleep * and wait till signal interruption */ LOGD("proc_monitor: nothing to monitor, wait for signal\n"); struct timespec ts = { .tv_sec = INT_MAX, .tv_nsec = 0 }; nanosleep(&ts, nullptr); } continue; } bool detach = false; run_finally f([&] { if (detach) // Non of our business now detach_pid(pid); }); if (!WIFSTOPPED(status) /* Ignore if not ptrace-stop */) DETACH_AND_CONT; if (WSTOPSIG(status) == SIGTRAP && WEVENT(status)) { unsigned long msg; xptrace(PTRACE_GETEVENTMSG, pid, nullptr, &msg); if (zygote_map.count(pid)) { // Zygote event switch (WEVENT(status)) { case PTRACE_EVENT_FORK: case PTRACE_EVENT_VFORK: PTRACE_LOG("zygote forked: [%d]\n", msg); attaches[msg] = true; break; case PTRACE_EVENT_EXIT: PTRACE_LOG("zygote exited with status: [%d]\n", msg); [[fallthrough]]; default: zygote_map.erase(pid); DETACH_AND_CONT; } } else { switch (WEVENT(status)) { case PTRACE_EVENT_CLONE: PTRACE_LOG("create new threads: [%d]\n", msg); if (attaches[pid] && check_pid(pid)) continue; break; case PTRACE_EVENT_EXEC: case PTRACE_EVENT_EXIT: PTRACE_LOG("exit or execve\n"); [[fallthrough]]; default: DETACH_AND_CONT; } } xptrace(PTRACE_CONT, pid); } else if (WSTOPSIG(status) == SIGSTOP) { if (!attaches[pid]) { // Double check if this is actually a process attaches[pid] = is_process(pid); } if (attaches[pid]) { // This is a process, continue monitoring PTRACE_LOG("SIGSTOP from child\n"); xptrace(PTRACE_SETOPTIONS, pid, nullptr, PTRACE_O_TRACECLONE | PTRACE_O_TRACEEXEC | PTRACE_O_TRACEEXIT); xptrace(PTRACE_CONT, pid); } else { // This is a thread, do NOT monitor PTRACE_LOG("SIGSTOP from thread\n"); DETACH_AND_CONT; } } else { // Not caused by us, resend signal xptrace(PTRACE_CONT, pid, nullptr, WSTOPSIG(status)); PTRACE_LOG("signal [%d]\n", WSTOPSIG(status)); } } }