mirror of
https://github.com/topjohnwu/Magisk.git
synced 2024-11-24 10:35:26 +00:00
612b51d48f
Since SafetyNet CTS is impossible to achieve, leaving MagiskHide on by default no longer serves a purpose. For more details regarding the latest SafetyNet changes, please check: https://twitter.com/topjohnwu/status/1237656703929180160 https://twitter.com/topjohnwu/status/1237830555523149824 MagiskHide's functionality will continue to exist within the Magisk project as it is still extremely effective to hide modifications in userspace (including SafetyNet's basicIntegrity check). Future MagiskHide improvements _may_ come, but since the holy grail has been taken, any form of improvement is now a very low priority.
404 lines
9.8 KiB
C++
404 lines
9.8 KiB
C++
#include <stdlib.h>
|
|
#include <stdio.h>
|
|
#include <time.h>
|
|
#include <string.h>
|
|
#include <unistd.h>
|
|
#include <dlfcn.h>
|
|
#include <sys/stat.h>
|
|
|
|
#include <magisk.hpp>
|
|
#include <db.hpp>
|
|
#include <daemon.hpp>
|
|
#include <utils.hpp>
|
|
|
|
#define DB_VERSION 10
|
|
|
|
using namespace std;
|
|
|
|
typedef struct sqlite3 sqlite3;
|
|
|
|
static sqlite3 *mDB = nullptr;
|
|
|
|
// SQLite APIs
|
|
|
|
#define SQLITE_OPEN_READWRITE 0x00000002 /* Ok for sqlite3_open_v2() */
|
|
#define SQLITE_OPEN_CREATE 0x00000004 /* Ok for sqlite3_open_v2() */
|
|
#define SQLITE_OPEN_FULLMUTEX 0x00010000 /* Ok for sqlite3_open_v2() */
|
|
|
|
static int (*sqlite3_open_v2)(
|
|
const char *filename,
|
|
sqlite3 **ppDb,
|
|
int flags,
|
|
const char *zVfs);
|
|
static const char *(*sqlite3_errmsg)(sqlite3 *db);
|
|
static int (*sqlite3_close)(sqlite3 *db);
|
|
static void (*sqlite3_free)(void *v);
|
|
static int (*sqlite3_exec)(
|
|
sqlite3 *db,
|
|
const char *sql,
|
|
int (*callback)(void*, int, char**, char**),
|
|
void *v,
|
|
char **errmsg);
|
|
|
|
// Internal Android linker APIs
|
|
|
|
static void (*android_get_LD_LIBRARY_PATH)(char *buffer, size_t buffer_size);
|
|
static void (*android_update_LD_LIBRARY_PATH)(const char *ld_library_path);
|
|
|
|
#define DLERR(ptr) if (!(ptr)) { \
|
|
LOGE("db: %s\n", dlerror()); \
|
|
return false; \
|
|
}
|
|
|
|
#define DLOAD(handle, arg) {\
|
|
auto f = dlsym(handle, #arg); \
|
|
DLERR(f) \
|
|
*(void **) &(arg) = f; \
|
|
}
|
|
|
|
#ifdef __LP64__
|
|
constexpr char apex_path[] = "/apex/com.android.runtime/lib64:";
|
|
#else
|
|
constexpr char apex_path[] = "/apex/com.android.runtime/lib:";
|
|
#endif
|
|
|
|
static int dl_init = 0;
|
|
|
|
static bool dload_sqlite() {
|
|
if (dl_init)
|
|
return dl_init > 0;
|
|
dl_init = -1;
|
|
|
|
auto sqlite = dlopen("libsqlite.so", RTLD_LAZY);
|
|
if (!sqlite) {
|
|
// Should only happen on Android 10+
|
|
auto dl = dlopen("libdl_android.so", RTLD_LAZY);
|
|
DLERR(dl);
|
|
|
|
DLOAD(dl, android_get_LD_LIBRARY_PATH);
|
|
DLOAD(dl, android_update_LD_LIBRARY_PATH);
|
|
|
|
// Inject APEX into LD_LIBRARY_PATH
|
|
char ld_path[4096];
|
|
memcpy(ld_path, apex_path, sizeof(apex_path));
|
|
constexpr int len = sizeof(apex_path) - 1;
|
|
android_get_LD_LIBRARY_PATH(ld_path + len, sizeof(ld_path) - len);
|
|
android_update_LD_LIBRARY_PATH(ld_path);
|
|
sqlite = dlopen("libsqlite.so", RTLD_LAZY);
|
|
|
|
// Revert LD_LIBRARY_PATH just in case
|
|
android_update_LD_LIBRARY_PATH(ld_path + len);
|
|
}
|
|
DLERR(sqlite);
|
|
|
|
DLOAD(sqlite, sqlite3_open_v2);
|
|
DLOAD(sqlite, sqlite3_errmsg);
|
|
DLOAD(sqlite, sqlite3_close);
|
|
DLOAD(sqlite, sqlite3_exec);
|
|
DLOAD(sqlite, sqlite3_free);
|
|
|
|
dl_init = 1;
|
|
return true;
|
|
}
|
|
|
|
int db_strings::getKeyIdx(string_view key) const {
|
|
int idx = DB_STRING_NUM;
|
|
for (int i = 0; i < DB_STRING_NUM; ++i) {
|
|
if (key == DB_STRING_KEYS[i])
|
|
idx = i;
|
|
}
|
|
return idx;
|
|
}
|
|
|
|
db_settings::db_settings() {
|
|
// Default settings
|
|
data[ROOT_ACCESS] = ROOT_ACCESS_APPS_AND_ADB;
|
|
data[SU_MULTIUSER_MODE] = MULTIUSER_MODE_OWNER_ONLY;
|
|
data[SU_MNT_NS] = NAMESPACE_MODE_REQUESTER;
|
|
data[HIDE_CONFIG] = false;
|
|
}
|
|
|
|
int db_settings::getKeyIdx(string_view key) const {
|
|
int idx = DB_SETTINGS_NUM;
|
|
for (int i = 0; i < DB_SETTINGS_NUM; ++i) {
|
|
if (key == DB_SETTING_KEYS[i])
|
|
idx = i;
|
|
}
|
|
return idx;
|
|
}
|
|
|
|
static int ver_cb(void *ver, int, char **data, char **) {
|
|
*((int *) ver) = parse_int(data[0]);
|
|
return 0;
|
|
}
|
|
|
|
#define err_ret(e) if (e) return e;
|
|
|
|
static char *open_and_init_db(sqlite3 *&db) {
|
|
if (!dload_sqlite())
|
|
return strdup("Cannot load libsqlite.so");
|
|
|
|
int ret = sqlite3_open_v2(MAGISKDB, &db,
|
|
SQLITE_OPEN_READWRITE | SQLITE_OPEN_CREATE | SQLITE_OPEN_FULLMUTEX, nullptr);
|
|
if (ret)
|
|
return strdup(sqlite3_errmsg(db));
|
|
int ver;
|
|
bool upgrade = false;
|
|
char *err;
|
|
sqlite3_exec(db, "PRAGMA user_version", ver_cb, &ver, &err);
|
|
err_ret(err);
|
|
if (ver > DB_VERSION) {
|
|
// Don't support downgrading database
|
|
sqlite3_close(db);
|
|
return nullptr;
|
|
}
|
|
if (ver < 3) {
|
|
// Policies
|
|
sqlite3_exec(db,
|
|
"CREATE TABLE IF NOT EXISTS policies "
|
|
"(uid INT, package_name TEXT, policy INT, until INT, "
|
|
"logging INT, notification INT, PRIMARY KEY(uid))",
|
|
nullptr, nullptr, &err);
|
|
err_ret(err);
|
|
// Settings
|
|
sqlite3_exec(db,
|
|
"CREATE TABLE IF NOT EXISTS settings "
|
|
"(key TEXT, value INT, PRIMARY KEY(key))",
|
|
nullptr, nullptr, &err);
|
|
err_ret(err);
|
|
ver = 3;
|
|
upgrade = true;
|
|
}
|
|
if (ver < 4) {
|
|
// Strings
|
|
sqlite3_exec(db,
|
|
"CREATE TABLE IF NOT EXISTS strings "
|
|
"(key TEXT, value TEXT, PRIMARY KEY(key))",
|
|
nullptr, nullptr, &err);
|
|
err_ret(err);
|
|
ver = 4;
|
|
upgrade = true;
|
|
}
|
|
if (ver < 5) {
|
|
sqlite3_exec(db, "UPDATE policies SET uid=uid%100000", nullptr, nullptr, &err);
|
|
err_ret(err);
|
|
/* Directly jump to version 6 */
|
|
ver = 6;
|
|
upgrade = true;
|
|
}
|
|
if (ver < 7) {
|
|
sqlite3_exec(db,
|
|
"CREATE TABLE IF NOT EXISTS hidelist "
|
|
"(package_name TEXT, process TEXT, PRIMARY KEY(package_name, process));",
|
|
nullptr, nullptr, &err);
|
|
err_ret(err);
|
|
/* Directly jump to version 9 */
|
|
ver = 9;
|
|
upgrade = true;
|
|
}
|
|
if (ver < 8) {
|
|
sqlite3_exec(db,
|
|
"BEGIN TRANSACTION;"
|
|
"ALTER TABLE hidelist RENAME TO hidelist_tmp;"
|
|
"CREATE TABLE IF NOT EXISTS hidelist "
|
|
"(package_name TEXT, process TEXT, PRIMARY KEY(package_name, process));"
|
|
"INSERT INTO hidelist SELECT process as package_name, process FROM hidelist_tmp;"
|
|
"DROP TABLE hidelist_tmp;"
|
|
"COMMIT;",
|
|
nullptr, nullptr, &err);
|
|
err_ret(err);
|
|
/* Directly jump to version 9 */
|
|
ver = 9;
|
|
upgrade = true;
|
|
}
|
|
if (ver < 9) {
|
|
sqlite3_exec(db,
|
|
"BEGIN TRANSACTION;"
|
|
"ALTER TABLE hidelist RENAME TO hidelist_tmp;"
|
|
"CREATE TABLE IF NOT EXISTS hidelist "
|
|
"(package_name TEXT, process TEXT, PRIMARY KEY(package_name, process));"
|
|
"INSERT INTO hidelist SELECT * FROM hidelist_tmp;"
|
|
"DROP TABLE hidelist_tmp;"
|
|
"COMMIT;",
|
|
nullptr, nullptr, &err);
|
|
err_ret(err);
|
|
ver = 9;
|
|
upgrade = true;
|
|
}
|
|
if (ver < 10) {
|
|
sqlite3_exec(db, "DROP TABLE IF EXISTS logs", nullptr, nullptr, &err);
|
|
err_ret(err);
|
|
ver = 10;
|
|
upgrade = true;
|
|
}
|
|
|
|
if (upgrade) {
|
|
// Set version
|
|
char query[32];
|
|
sprintf(query, "PRAGMA user_version=%d", ver);
|
|
sqlite3_exec(db, query, nullptr, nullptr, &err);
|
|
err_ret(err);
|
|
}
|
|
return nullptr;
|
|
}
|
|
|
|
char *db_exec(const char *sql) {
|
|
char *err;
|
|
if (mDB == nullptr) {
|
|
err = open_and_init_db(mDB);
|
|
db_err_cmd(err,
|
|
// Open fails, remove and reconstruct
|
|
unlink(MAGISKDB);
|
|
err = open_and_init_db(mDB);
|
|
err_ret(err);
|
|
);
|
|
}
|
|
if (mDB) {
|
|
sqlite3_exec(mDB, sql, nullptr, nullptr, &err);
|
|
return err;
|
|
}
|
|
return nullptr;
|
|
}
|
|
|
|
char *db_exec(const char *sql, const db_row_cb &fn) {
|
|
char *err;
|
|
if (mDB == nullptr) {
|
|
err = open_and_init_db(mDB);
|
|
db_err_cmd(err,
|
|
// Open fails, remove and reconstruct
|
|
unlink(MAGISKDB);
|
|
err = open_and_init_db(mDB);
|
|
err_ret(err);
|
|
);
|
|
}
|
|
if (mDB) {
|
|
sqlite3_exec(mDB, sql, [](void *cb, int col_num, char **data, char **col_name) -> int {
|
|
auto &func = *reinterpret_cast<const db_row_cb*>(cb);
|
|
db_row row;
|
|
for (int i = 0; i < col_num; ++i)
|
|
row[col_name[i]] = data[i];
|
|
return func(row) ? 0 : 1;
|
|
}, (void *) &fn, &err);
|
|
return err;
|
|
}
|
|
return nullptr;
|
|
}
|
|
|
|
int get_db_settings(db_settings &cfg, int key) {
|
|
char *err;
|
|
auto settings_cb = [&](db_row &row) -> bool {
|
|
cfg[row["key"]] = parse_int(row["value"]);
|
|
LOGD("magiskdb: query %s=[%s]\n", row["key"].data(), row["value"].data());
|
|
return true;
|
|
};
|
|
if (key >= 0) {
|
|
char query[128];
|
|
sprintf(query, "SELECT key, value FROM settings WHERE key='%s'", DB_SETTING_KEYS[key]);
|
|
err = db_exec(query, settings_cb);
|
|
} else {
|
|
err = db_exec("SELECT key, value FROM settings", settings_cb);
|
|
}
|
|
db_err_cmd(err, return 1);
|
|
return 0;
|
|
}
|
|
|
|
int get_db_strings(db_strings &str, int key) {
|
|
char *err;
|
|
auto string_cb = [&](db_row &row) -> bool {
|
|
str[row["key"]] = row["value"];
|
|
return true;
|
|
};
|
|
if (key >= 0) {
|
|
char query[128];
|
|
sprintf(query, "SELECT key, value FROM strings WHERE key='%s'", DB_STRING_KEYS[key]);
|
|
err = db_exec(query, string_cb);
|
|
} else {
|
|
err = db_exec("SELECT key, value FROM strings", string_cb);
|
|
}
|
|
db_err_cmd(err, return 1);
|
|
return 0;
|
|
}
|
|
|
|
int get_uid_policy(su_access &su, int uid) {
|
|
char query[256], *err;
|
|
sprintf(query, "SELECT policy, logging, notification FROM policies "
|
|
"WHERE uid=%d AND (until=0 OR until>%li)", uid, time(nullptr));
|
|
err = db_exec(query, [&](db_row &row) -> bool {
|
|
su.policy = (policy_t) parse_int(row["policy"]);
|
|
su.log = parse_int(row["logging"]);
|
|
su.notify = parse_int(row["notification"]);
|
|
LOGD("magiskdb: query policy=[%d] log=[%d] notify=[%d]\n", su.policy, su.log, su.notify);
|
|
return true;
|
|
});
|
|
db_err_cmd(err, return 1);
|
|
return 0;
|
|
}
|
|
|
|
bool check_manager(string *pkg) {
|
|
db_strings str;
|
|
get_db_strings(str, SU_MANAGER);
|
|
bool ret = validate_manager(str[SU_MANAGER], 0, nullptr);
|
|
if (pkg) {
|
|
if (ret)
|
|
pkg->swap(str[SU_MANAGER]);
|
|
else
|
|
*pkg = "xxx"; /* Make sure the return pkg can never exist */
|
|
}
|
|
return ret;
|
|
}
|
|
|
|
bool validate_manager(string &pkg, int userid, struct stat *st) {
|
|
struct stat tmp_st;
|
|
if (st == nullptr)
|
|
st = &tmp_st;
|
|
|
|
// Prefer DE storage
|
|
char app_path[128];
|
|
sprintf(app_path, "%s/%d/%s", APP_DATA_DIR, userid, pkg.data());
|
|
if (pkg.empty() || stat(app_path, st)) {
|
|
// Check the official package name
|
|
sprintf(app_path, "%s/%d/" JAVA_PACKAGE_NAME, APP_DATA_DIR, userid);
|
|
if (stat(app_path, st)) {
|
|
LOGE("su: cannot find manager");
|
|
memset(st, 0, sizeof(*st));
|
|
pkg.clear();
|
|
return false;
|
|
} else {
|
|
// Switch to official package if exists
|
|
pkg = JAVA_PACKAGE_NAME;
|
|
}
|
|
}
|
|
return true;
|
|
}
|
|
|
|
void exec_sql(int client) {
|
|
run_finally f([=]{ close(client); });
|
|
char *sql = read_string(client);
|
|
char *err = db_exec(sql, [&](db_row &row) -> bool {
|
|
string out;
|
|
bool first = true;
|
|
for (auto it : row) {
|
|
if (first) first = false;
|
|
else out += '|';
|
|
out += it.first;
|
|
out += '=';
|
|
out += it.second;
|
|
}
|
|
write_int(client, out.length());
|
|
xwrite(client, out.data(), out.length());
|
|
return true;
|
|
});
|
|
free(sql);
|
|
write_int(client, 0);
|
|
db_err_cmd(err, return; );
|
|
}
|
|
|
|
bool db_err(char *e) {
|
|
if (e) {
|
|
LOGE("sqlite3_exec: %s\n", e);
|
|
sqlite3_free(e);
|
|
return true;
|
|
}
|
|
return false;
|
|
}
|