#include #include #include #include "deny.hpp" using namespace std; [[noreturn]] static void usage() { fprintf(stderr, R"EOF(DenyList Config CLI Usage: magisk --denylist [action [arguments...] ] Actions: status Return the enforcement status enable Enable denylist enforcement disable Disable denylist enforcement add PKG [PROC] Add a new target to the denylist rm PKG [PROC] Remove target(s) from the denylist ls Print the current denylist exec CMDs... Execute commands in isolated mount namespace and do all unmounts )EOF"); exit(1); } void denylist_handler(int client, const sock_cred *cred) { if (client < 0) { revert_unmount(); return; } int req = read_int(client); int res = DenyResponse::ERROR; if (req < 0 || req >= DenyRequest::END) { goto done; } switch (req) { case DenyRequest::ENFORCE: res = enable_deny(); break; case DenyRequest::DISABLE: res = disable_deny(); break; case DenyRequest::ADD: res = add_list(client); break; case DenyRequest::REMOVE: res = rm_list(client); break; case DenyRequest::LIST: ls_list(client); return; case DenyRequest::STATUS: res = (zygisk_enabled && denylist_enforced) ? DenyResponse::ENFORCED : DenyResponse::NOT_ENFORCED; break; default: __builtin_unreachable(); } done: write_int(client, res); close(client); } int denylist_cli(int argc, char **argv) { if (argc < 2) usage(); int req; if (argv[1] == "enable"sv) req = DenyRequest::ENFORCE; else if (argv[1] == "disable"sv) req = DenyRequest::DISABLE; else if (argv[1] == "add"sv) req = DenyRequest::ADD; else if (argv[1] == "rm"sv) req = DenyRequest::REMOVE; else if (argv[1] == "ls"sv) req = DenyRequest::LIST; else if (argv[1] == "status"sv) req = DenyRequest::STATUS; else if (argv[1] == "exec"sv && argc > 2) { xunshare(CLONE_NEWNS); xmount(nullptr, "/", nullptr, MS_PRIVATE | MS_REC, nullptr); revert_unmount(); execvp(argv[2], argv + 2); exit(1); } else { usage(); } // Send request int fd = connect_daemon(MainRequest::DENYLIST); write_int(fd, req); if (req == DenyRequest::ADD || req == DenyRequest::REMOVE) { write_string(fd, argv[2]); write_string(fd, argv[3] ? argv[3] : ""); } // Get response int res = read_int(fd); if (res < 0 || res >= DenyResponse::END) res = DenyResponse::ERROR; switch (res) { case DenyResponse::NOT_ENFORCED: fprintf(stderr, "Denylist is not enforced\n"); goto return_code; case DenyResponse::ENFORCED: fprintf(stderr, "Denylist is enforced\n"); goto return_code; case DenyResponse::ITEM_EXIST: fprintf(stderr, "Target already exists in denylist\n"); goto return_code; case DenyResponse::ITEM_NOT_EXIST: fprintf(stderr, "Target does not exist in denylist\n"); goto return_code; case DenyResponse::NO_NS: fprintf(stderr, "The kernel does not support mount namespace\n"); goto return_code; case DenyResponse::INVALID_PKG: fprintf(stderr, "Invalid package / process name\n"); goto return_code; case DenyResponse::ERROR: fprintf(stderr, "deny: Daemon error\n"); return -1; case DenyResponse::OK: break; default: __builtin_unreachable(); } if (req == DenyRequest::LIST) { string out; for (;;) { read_string(fd, out); if (out.empty()) break; printf("%s\n", out.data()); } } return_code: return req == DenyRequest::STATUS ? res != DenyResponse::ENFORCED : res != DenyResponse::OK; }