Magisk/jni/magiskhide/hide_utils.c

229 lines
4.9 KiB
C
Raw Normal View History

2017-07-02 18:57:20 +02:00
/* hide_utils.c - Some utility functions for MagiskHide
2017-04-20 16:45:56 +02:00
*/
2017-07-02 18:57:20 +02:00
#include <stdio.h>
#include <stdlib.h>
2017-04-20 16:45:56 +02:00
#include <unistd.h>
2017-07-02 18:57:20 +02:00
#include <errno.h>
#include <dirent.h>
#include <string.h>
#include <sys/mount.h>
#include <sys/types.h>
#include <sys/stat.h>
#include <selinux/selinux.h>
2017-04-20 16:45:56 +02:00
#include "magisk.h"
#include "utils.h"
2017-07-02 18:57:20 +02:00
#include "resetprop.h"
2017-04-20 16:45:56 +02:00
#include "magiskhide.h"
2017-07-02 18:57:20 +02:00
#include "daemon.h"
static char *prop_key[] =
{ "ro.boot.verifiedbootstate", "ro.boot.flash.locked", "ro.boot.veritymode", "ro.boot.warranty_bit", "ro.warranty_bit",
"ro.debuggable", "ro.secure", "ro.build.type", "ro.build.tags", "ro.build.selinux", NULL };
static char *prop_value[] =
{ "green", "1", "enforcing", "0", "0", "0", "1", "user", "release-keys", "0", NULL };
static int mocked = 0;
void manage_selinux() {
if (mocked) return;
char val[1];
int fd = xopen(SELINUX_ENFORCE, O_RDONLY);
xxread(fd, val, 1);
close(fd);
// Permissive
if (val[0] == '0') {
LOGI("hide_daemon: Permissive detected, hide the state\n");
chmod(SELINUX_ENFORCE, 0640);
chmod(SELINUX_POLICY, 0440);
mocked = 1;
}
}
void hide_sensitive_props() {
LOGI("hide_pre_proc: Hiding sensitive props\n");
// Hide all sensitive props
char *value;
for (int i = 0; prop_key[i]; ++i) {
value = getprop(prop_key[i]);
if (value) {
if (strcmp(value, prop_value[i]) != 0)
setprop2(prop_key[i], prop_value[i], 0);
free(value);
}
}
}
void relink_sbin() {
struct stat st;
if (stat("/sbin_orig", &st) == -1 && errno == ENOENT) {
// Re-link all binaries and bind mount
DIR *dir;
struct dirent *entry;
char from[PATH_MAX], to[PATH_MAX];
LOGI("hide_pre_proc: Re-linking /sbin\n");
xmount(NULL, "/", NULL, MS_REMOUNT, NULL);
xrename("/sbin", "/sbin_orig");
xmkdir("/sbin", 0755);
xchmod("/sbin", 0755);
xmount(NULL, "/", NULL, MS_REMOUNT | MS_RDONLY, NULL);
xmkdir("/dev/sbin_bind", 0755);
xchmod("/dev/sbin_bind", 0755);
dir = xopendir("/sbin_orig");
while ((entry = xreaddir(dir))) {
snprintf(from, sizeof(from), "%s/%s", "/sbin_orig", entry->d_name);
snprintf(to, sizeof(to), "%s/%s", "/dev/sbin_bind", entry->d_name);
symlink(from, to);
lsetfilecon(to, "u:object_r:system_file:s0");
}
closedir(dir);
xmount("/dev/sbin_bind", "/sbin", NULL, MS_BIND, NULL);
}
}
2017-04-20 16:45:56 +02:00
int add_list(char *proc) {
2017-04-21 19:40:07 +02:00
if (!hideEnabled) {
free(proc);
return HIDE_NOT_ENABLED;
}
2017-04-20 16:45:56 +02:00
char *line;
2017-05-03 20:58:37 +02:00
struct vector *new_list = xmalloc(sizeof(*new_list));
2017-04-20 16:45:56 +02:00
if (new_list == NULL)
2017-05-05 10:13:26 +02:00
return DAEMON_ERROR;
2017-04-20 16:45:56 +02:00
vec_init(new_list);
vec_for_each(hide_list, line) {
// They should be unique
if (strcmp(line, proc) == 0) {
free(proc);
vec_destroy(new_list);
free(new_list);
2017-04-21 19:40:07 +02:00
return HIDE_ITEM_EXIST;
2017-04-20 16:45:56 +02:00
}
vec_push_back(new_list, line);
}
vec_push_back(new_list, proc);
LOGI("hide_list add: [%s]\n", proc);
ps_filter_proc_name(proc, kill_proc);
// Critical region
2017-04-21 18:54:08 +02:00
pthread_mutex_lock(&hide_lock);
2017-05-03 20:58:37 +02:00
vec_destroy(hide_list);
free(hide_list);
2017-04-20 16:45:56 +02:00
hide_list = new_list;
2017-04-21 18:54:08 +02:00
pthread_mutex_unlock(&hide_lock);
2017-04-20 16:45:56 +02:00
2017-05-03 20:58:37 +02:00
pthread_mutex_lock(&file_lock);
if (vector_to_file(HIDELIST, hide_list)) {
pthread_mutex_unlock(&file_lock);
2017-05-05 10:13:26 +02:00
return DAEMON_ERROR;
2017-05-03 20:58:37 +02:00
}
pthread_mutex_unlock(&file_lock);
2017-05-05 10:13:26 +02:00
return DAEMON_SUCCESS;
2017-04-20 16:45:56 +02:00
}
int rm_list(char *proc) {
2017-04-21 19:40:07 +02:00
if (!hideEnabled) {
free(proc);
return HIDE_NOT_ENABLED;
}
2017-04-20 16:45:56 +02:00
2017-05-05 10:13:26 +02:00
daemon_response ret = DAEMON_ERROR;
2017-04-20 16:45:56 +02:00
char *line;
2017-05-03 20:58:37 +02:00
int do_rm = 0;
struct vector *new_list = xmalloc(sizeof(*new_list));
2017-04-20 16:45:56 +02:00
if (new_list == NULL)
2017-04-21 19:40:07 +02:00
goto error;
2017-04-20 16:45:56 +02:00
vec_init(new_list);
vec_for_each(hide_list, line) {
if (strcmp(line, proc) == 0) {
free(proc);
proc = line;
2017-05-03 20:58:37 +02:00
do_rm = 1;
2017-04-20 16:45:56 +02:00
continue;
}
vec_push_back(new_list, line);
}
2017-05-03 20:58:37 +02:00
if (do_rm) {
2017-04-20 16:45:56 +02:00
LOGI("hide_list rm: [%s]\n", proc);
ps_filter_proc_name(proc, kill_proc);
// Critical region
2017-04-21 18:54:08 +02:00
pthread_mutex_lock(&hide_lock);
2017-05-03 20:58:37 +02:00
vec_destroy(hide_list);
free(hide_list);
2017-04-20 16:45:56 +02:00
hide_list = new_list;
2017-04-21 18:54:08 +02:00
pthread_mutex_unlock(&hide_lock);
2017-05-03 20:58:37 +02:00
2017-05-05 10:13:26 +02:00
ret = DAEMON_SUCCESS;
2017-05-03 20:58:37 +02:00
pthread_mutex_lock(&file_lock);
2017-04-20 16:45:56 +02:00
if (vector_to_file(HIDELIST, hide_list))
2017-05-05 10:13:26 +02:00
ret = DAEMON_ERROR;
2017-05-03 20:58:37 +02:00
pthread_mutex_unlock(&file_lock);
2017-04-21 19:40:07 +02:00
} else {
ret = HIDE_ITEM_NOT_EXIST;
2017-05-03 20:58:37 +02:00
vec_destroy(new_list);
free(new_list);
2017-04-20 16:45:56 +02:00
}
2017-04-21 19:40:07 +02:00
error:
2017-04-20 16:45:56 +02:00
free(proc);
2017-04-21 19:40:07 +02:00
return ret;
2017-04-20 16:45:56 +02:00
}
int init_list() {
LOGD("hide_list: initialize...\n");
if ((hide_list = xmalloc(sizeof(*hide_list))) == NULL)
return 1;
vec_init(hide_list);
2017-04-24 15:43:30 +02:00
// Might error if file doesn't exist, no need to report
2017-04-20 16:45:56 +02:00
file_to_vector(HIDELIST, hide_list);
char *line;
vec_for_each(hide_list, line) {
LOGI("hide_list: [%s]\n", line);
ps_filter_proc_name(line, kill_proc);
}
return 0;
}
int destroy_list() {
char *line;
vec_for_each(hide_list, line) {
ps_filter_proc_name(line, kill_proc);
}
vec_deep_destroy(hide_list);
free(hide_list);
hide_list = NULL;
return 0;
}
void add_hide_list(int client) {
2017-05-03 20:58:37 +02:00
err_handler = do_nothing;
2017-04-20 16:45:56 +02:00
char *proc = read_string(client);
// ack
write_int(client, add_list(proc));
close(client);
}
void rm_hide_list(int client) {
2017-05-03 20:58:37 +02:00
err_handler = do_nothing;
2017-04-20 16:45:56 +02:00
char *proc = read_string(client);
// ack
write_int(client, rm_list(proc));
close(client);
}