#include #include #include #include #include #include #include #include #include #include "magisk.h" #include "utils.h" #include "resetprop.h" #include "magiskhide.h" #include "daemon.h" #include "db.h" Array hide_list; static const char *prop_key[] = { "ro.boot.vbmeta.device_state", "ro.boot.verifiedbootstate", "ro.boot.flash.locked", "ro.boot.veritymode", "ro.boot.warranty_bit", "ro.warranty_bit", "ro.debuggable", "ro.secure", "ro.build.type", "ro.build.tags", "ro.build.selinux", nullptr }; static const char *prop_value[] = { "locked", "green", "1", "enforcing", "0", "0", "0", "1", "user", "release-keys", "0", nullptr }; static const char *proc_name; static gid_t proc_gid; void manage_selinux() { char val; int fd = xopen(SELINUX_ENFORCE, O_RDONLY); xxread(fd, &val, sizeof(val)); close(fd); // Permissive if (val == '0') { chmod(SELINUX_ENFORCE, 0640); chmod(SELINUX_POLICY, 0440); } } void hide_sensitive_props() { LOGI("hide_utils: Hiding sensitive props\n"); // Hide all sensitive props for (int i = 0; prop_key[i]; ++i) { CharArray value = getprop(prop_key[i]); if (!value.empty() && value != prop_value[i]) setprop(prop_key[i], prop_value[i], false); } } /* Call func for each process */ static void ps(void (*func)(int)) { DIR *dir; struct dirent *entry; if (!(dir = xopendir("/proc"))) return; while ((entry = xreaddir(dir))) { if (entry->d_type == DT_DIR) { if (is_num(entry->d_name)) func(atoi(entry->d_name)); } } closedir(dir); } static int check_proc_name(int pid, const char *name) { char buf[128]; FILE *f; sprintf(buf, "/proc/%d/comm", pid); if ((f = fopen(buf, "r"))) { fgets(buf, sizeof(buf), f); if (strcmp(buf, name) == 0) return 1; } else { // The PID is already killed return 0; } fclose(f); sprintf(buf, "/proc/%d/cmdline", pid); f = fopen(buf, "r"); fgets(buf, sizeof(buf), f); fclose(f); if (strcmp(basename(buf), name) == 0) return 1; sprintf(buf, "/proc/%d/exe", pid); if (access(buf, F_OK) != 0) return 0; xreadlink(buf, buf, sizeof(buf)); if (strcmp(basename(buf), name) == 0) return 1; return 0; } static void kill_proc_cb(int pid) { if (check_proc_name(pid, proc_name)) kill(pid, SIGTERM); else if (proc_gid > 0) { char buf[128]; struct stat st; sprintf(buf, "/proc/%d", pid); stat(buf, &st); if (proc_gid == st.st_gid) kill(pid, SIGTERM); } } static void kill_process(const char *name) { proc_name = name; char buf[128]; struct stat st; sprintf(buf, "/data/data/%s", name); if (stat(buf, &st) == 0) proc_gid = st.st_gid; else proc_gid = 0; ps(kill_proc_cb); } void clean_magisk_props() { LOGD("hide_utils: Cleaning magisk props\n"); getprop([](const char *name, auto, auto) -> void { if (strstr(name, "magisk")) deleteprop(name); }, nullptr, false); } static int add_list(sqlite3 *db, const char *proc) { for (auto &s : hide_list) { // They should be unique if (s == proc) return HIDE_ITEM_EXIST; } LOGI("hide_list add: [%s]\n", proc); kill_process(proc); // Critical region pthread_mutex_lock(&list_lock); hide_list.push_back(proc); pthread_mutex_unlock(&list_lock); // Add to database char sql[128]; sprintf(sql, "INSERT INTO hidelist (process) VALUES('%s')", proc); sqlite3_exec(db, sql, nullptr, nullptr, nullptr); return DAEMON_SUCCESS; } int add_list(const char *proc) { sqlite3 *db = get_magiskdb(); if (db) { int ret = add_list(db, proc); sqlite3_close_v2(db); return ret; } return DAEMON_ERROR; } int add_list(int client) { char *proc = read_string(client); int ret = add_list(proc); free(proc); return ret; } static int rm_list(const char *proc) { // Update list in critical region bool do_rm = false; pthread_mutex_lock(&list_lock); for (auto it = hide_list.begin(); it != hide_list.end(); ++it) { if (*it == proc) { do_rm = true; LOGI("hide_list rm: [%s]\n", proc); hide_list.erase(it); break; } } pthread_mutex_unlock(&list_lock); if (do_rm) { kill_process(proc); sqlite3 *db = get_magiskdb(); if (db == nullptr) return DAEMON_ERROR; char sql[128]; sprintf(sql, "DELETE FROM hidelist WHERE process='%s'", proc); sqlite3_exec(db, sql, nullptr, nullptr, nullptr); sqlite3_close_v2(db); return DAEMON_SUCCESS; } else { return HIDE_ITEM_NOT_EXIST; } } int rm_list(int client) { char *proc = read_string(client); int ret = rm_list(proc); free(proc); return ret; } #define LEGACY_LIST MOUNTPOINT "/.core/hidelist" bool init_list() { LOGD("hide_list: initialize\n"); sqlite3 *db = get_magiskdb(); if (db == nullptr) return false; sqlite3_exec(db, "SELECT process FROM hidelist", [] (auto, auto, char **data, auto) -> int { LOGI("hide_list: [%s]\n", data[0]); hide_list.push_back(data[0]); return 0; }, nullptr, nullptr); // Migrate old hide list into database if (access(LEGACY_LIST, R_OK) == 0) { Array tmp; file_to_array(LEGACY_LIST, tmp); for (auto &s : tmp) add_list(db, s); unlink(LEGACY_LIST); } sqlite3_close_v2(db); return true; } void ls_list(int client) { write_int(client, DAEMON_SUCCESS); write_int(client, hide_list.size()); for (auto &s : hide_list) write_string(client, s); close(client); }