Magisk/native/jni/magiskhide/magiskhide.cpp

197 lines
5.0 KiB
C++
Raw Normal View History

#include <sys/wait.h>
#include <sys/mount.h>
2016-12-30 19:44:24 +01:00
2020-03-09 09:50:30 +01:00
#include <utils.hpp>
2019-02-10 09:57:51 +01:00
2020-03-09 09:50:30 +01:00
#include "magiskhide.hpp"
2016-12-30 19:44:24 +01:00
2021-01-12 09:07:48 +01:00
using namespace std;
[[noreturn]] static void usage(char *arg0) {
fprintf(stderr,
"MagiskHide - Hide Config CLI\n\n"
"Usage: %s [action [arguments...] ]\n\n"
"Actions:\n"
" status Return the status of magiskhide\n"
" enable Start magiskhide\n"
" disable Stop magiskhide\n"
" add PKG [PROC] Add a new target to the hide list\n"
" rm PKG [PROC] Remove target(s) from the hide list\n"
" ls Print the current hide list\n"
" exec CMDs... Execute commands in isolated mount\n"
" namespace and do all hide unmounts\n"
#ifdef MAGISK_DEBUG
" test Run process monitor test\n"
#endif
, arg0);
exit(1);
}
void magiskhide_handler(int client, ucred *cred) {
int req = read_int(client);
int res = DAEMON_ERROR;
switch (req) {
case STOP_MAGISKHIDE:
case ADD_HIDELIST:
case RM_HIDELIST:
case LS_HIDELIST:
if (!hide_enabled()) {
write_int(client, HIDE_NOT_ENABLED);
close(client);
return;
}
}
switch (req) {
case LAUNCH_MAGISKHIDE:
2021-01-11 11:19:10 +01:00
res = launch_magiskhide(true);
break;
case STOP_MAGISKHIDE:
res = stop_magiskhide();
break;
case ADD_HIDELIST:
res = add_list(client);
break;
case RM_HIDELIST:
res = rm_list(client);
break;
case LS_HIDELIST:
ls_list(client);
return;
case HIDE_STATUS:
res = hide_enabled() ? HIDE_IS_ENABLED : HIDE_NOT_ENABLED;
break;
#if ENABLE_INJECT
case REMOTE_CHECK_HIDE:
res = check_uid_map(client);
break;
case REMOTE_DO_HIDE:
kill(cred->pid, SIGSTOP);
write_int(client, 0);
hide_daemon(cred->pid);
close(client);
return;
#endif
}
write_int(client, res);
close(client);
2017-04-06 00:12:29 +02:00
}
2016-12-30 19:44:24 +01:00
2017-04-06 00:12:29 +02:00
int magiskhide_main(int argc, char *argv[]) {
if (argc < 2)
usage(argv[0]);
2018-11-16 06:37:41 +01:00
// CLI backwards compatibility
const char *opt = argv[1];
if (opt[0] == '-' && opt[1] == '-')
opt += 2;
2019-05-26 11:59:38 +02:00
int req;
if (opt == "enable"sv)
req = LAUNCH_MAGISKHIDE;
else if (opt == "disable"sv)
req = STOP_MAGISKHIDE;
else if (opt == "add"sv)
req = ADD_HIDELIST;
else if (opt == "rm"sv)
req = RM_HIDELIST;
else if (opt == "ls"sv)
req = LS_HIDELIST;
else if (opt == "status"sv)
req = HIDE_STATUS;
else if (opt == "exec"sv && argc > 2) {
xunshare(CLONE_NEWNS);
xmount(nullptr, "/", nullptr, MS_PRIVATE | MS_REC, nullptr);
hide_unmount();
execvp(argv[2], argv + 2);
exit(1);
}
#if 0 && !ENABLE_INJECT
else if (opt == "test"sv)
test_proc_monitor();
#endif
else
usage(argv[0]);
// Send request
int fd = connect_daemon();
write_int(fd, MAGISKHIDE);
write_int(fd, req);
if (req == ADD_HIDELIST || req == RM_HIDELIST) {
write_string(fd, argv[2]);
write_string(fd, argv[3] ? argv[3] : "");
}
2018-11-16 06:37:41 +01:00
// Get response
int code = read_int(fd);
switch (code) {
case DAEMON_SUCCESS:
break;
case HIDE_NOT_ENABLED:
fprintf(stderr, "MagiskHide is not enabled\n");
2021-01-12 09:07:48 +01:00
goto return_code;
case HIDE_IS_ENABLED:
fprintf(stderr, "MagiskHide is enabled\n");
2021-01-12 09:07:48 +01:00
goto return_code;
case HIDE_ITEM_EXIST:
fprintf(stderr, "Target already exists in hide list\n");
2021-01-12 09:07:48 +01:00
goto return_code;
case HIDE_ITEM_NOT_EXIST:
fprintf(stderr, "Target does not exist in hide list\n");
2021-01-12 09:07:48 +01:00
goto return_code;
case HIDE_NO_NS:
fprintf(stderr, "Your kernel doesn't support mount namespace\n");
2021-01-12 09:07:48 +01:00
goto return_code;
case HIDE_INVALID_PKG:
fprintf(stderr, "Invalid package / process name\n");
2021-01-12 09:07:48 +01:00
goto return_code;
case ROOT_REQUIRED:
fprintf(stderr, "Root is required for this operation\n");
2021-01-12 09:07:48 +01:00
goto return_code;
case DAEMON_ERROR:
default:
fprintf(stderr, "Daemon error\n");
return DAEMON_ERROR;
}
2021-01-12 09:07:48 +01:00
if (req == LS_HIDELIST) {
string res;
for (;;) {
read_string(fd, res);
if (res.empty())
break;
printf("%s\n", res.data());
}
}
return_code:
return req == HIDE_STATUS ? (code == HIDE_IS_ENABLED ? 0 : 1) : code != DAEMON_SUCCESS;
2017-04-06 00:12:29 +02:00
}
#if ENABLE_INJECT
int remote_check_hide(int uid, const char *process) {
int fd = connect_daemon();
write_int(fd, MAGISKHIDE);
write_int(fd, REMOTE_CHECK_HIDE);
write_int(fd, uid);
write_string(fd, process);
int res = read_int(fd);
close(fd);
return res;
}
void remote_request_hide() {
int fd = connect_daemon();
write_int(fd, MAGISKHIDE);
write_int(fd, REMOTE_DO_HIDE);
// Should receive SIGSTOP before reading anything
// During process stop, magiskd will cleanup our mount ns
read_int(fd);
close(fd);
}
#endif