You've already forked ReZygisk
mirror of
https://github.com/PerformanC/ReZygisk.git
synced 2025-09-06 06:37:01 +00:00
213 lines
7.9 KiB
C++
213 lines
7.9 KiB
C++
#include <sys/ptrace.h>
|
|
#include <unistd.h>
|
|
#include <sys/uio.h>
|
|
#include <sys/auxv.h>
|
|
#include <elf.h>
|
|
#include <link.h>
|
|
#include <vector>
|
|
#include <string>
|
|
#include <sys/mman.h>
|
|
#include <sys/wait.h>
|
|
#include <cstdlib>
|
|
#include <cstdio>
|
|
#include <dlfcn.h>
|
|
#include <signal.h>
|
|
#include <sys/system_properties.h>
|
|
#include <string>
|
|
#include "utils.hpp"
|
|
|
|
bool inject_on_main(int pid, const char *lib_path) {
|
|
LOGI("injecting %s to zygote %d", lib_path, pid);
|
|
// parsing KernelArgumentBlock
|
|
// https://cs.android.com/android/platform/superproject/main/+/main:bionic/libc/private/KernelArgumentBlock.h;l=30;drc=6d1ee77ee32220e4202c3066f7e1f69572967ad8
|
|
struct user_regs_struct regs{}, backup{};
|
|
auto map = MapInfo::Scan(std::to_string(pid));
|
|
if (!get_regs(pid, regs)) return false;
|
|
auto arg = reinterpret_cast<uintptr_t *>(regs.REG_SP);
|
|
LOGD("kernel argument %p %s", arg, get_addr_mem_region(map, arg).c_str());
|
|
int argc;
|
|
auto argv = reinterpret_cast<char **>(reinterpret_cast<uintptr_t *>(arg) + 1);
|
|
LOGD("argv %p", argv);
|
|
read_proc(pid, arg, &argc, sizeof(argc));
|
|
LOGD("argc %d", argc);
|
|
auto envp = argv + argc + 1;
|
|
LOGD("envp %p", envp);
|
|
auto p = envp;
|
|
while (true) {
|
|
uintptr_t *buf;
|
|
read_proc(pid, (uintptr_t *) p, &buf, sizeof(buf));
|
|
if (buf != nullptr) ++p;
|
|
else break;
|
|
}
|
|
++p;
|
|
auto auxv = reinterpret_cast<ElfW(auxv_t) *>(p);
|
|
LOGD("auxv %p %s", auxv, get_addr_mem_region(map, auxv).c_str());
|
|
auto v = auxv;
|
|
void *entry_addr = nullptr;
|
|
void *addr_of_entry_addr = nullptr;
|
|
while (true) {
|
|
ElfW(auxv_t) buf;
|
|
read_proc(pid, (uintptr_t *) v, &buf, sizeof(buf));
|
|
if (buf.a_type == AT_ENTRY) {
|
|
entry_addr = reinterpret_cast<void *>(buf.a_un.a_val);
|
|
addr_of_entry_addr = reinterpret_cast<char *>(v) + offsetof(ElfW(auxv_t), a_un);
|
|
LOGD("entry address %p %s (v=%p, entry_addr=%p)", entry_addr,
|
|
get_addr_mem_region(map, entry_addr).c_str(), v, addr_of_entry_addr);
|
|
break;
|
|
}
|
|
if (buf.a_type == AT_NULL) break;
|
|
v++;
|
|
}
|
|
if (entry_addr == nullptr) {
|
|
LOGE("failed to get entry");
|
|
return false;
|
|
}
|
|
|
|
// Replace the program entry with an invalid address
|
|
// For arm32 compatibility, we set the last bit to the same as the entry address
|
|
uintptr_t break_addr = (-0x05ec1cff & ~1) | ((uintptr_t) entry_addr & 1);
|
|
if (!write_proc(pid, (uintptr_t *) addr_of_entry_addr, &break_addr, sizeof(break_addr))) return false;
|
|
ptrace(PTRACE_CONT, pid, 0, 0);
|
|
int status;
|
|
wait_for_trace(pid, &status, __WALL);
|
|
if (WIFSTOPPED(status) && WSTOPSIG(status) == SIGSEGV) {
|
|
if (!get_regs(pid, regs)) return false;
|
|
if ((regs.REG_IP & ~1) != (break_addr & ~1)) {
|
|
LOGE("stopped at unknown addr %p", (void *) regs.REG_IP);
|
|
return false;
|
|
}
|
|
// The linker has been initialized now, we can do dlopen
|
|
LOGD("stopped at entry");
|
|
|
|
// restore entry address
|
|
if (!write_proc(pid, (uintptr_t *) addr_of_entry_addr, &entry_addr, sizeof(entry_addr))) return false;
|
|
|
|
// backup registers
|
|
memcpy(&backup, ®s, sizeof(regs));
|
|
map = MapInfo::Scan(std::to_string(pid));
|
|
auto local_map = MapInfo::Scan();
|
|
auto libc_return_addr = find_module_return_addr(map, "libc.so");
|
|
LOGD("libc return addr %p", libc_return_addr);
|
|
|
|
// call dlopen
|
|
auto dlopen_addr = find_func_addr(local_map, map, "libdl.so", "dlopen");
|
|
if (dlopen_addr == nullptr) return false;
|
|
std::vector<long> args;
|
|
auto str = push_string(pid, regs, lib_path);
|
|
args.clear();
|
|
args.push_back((long) str);
|
|
args.push_back((long) RTLD_NOW);
|
|
auto remote_handle = remote_call(pid, regs, (uintptr_t) dlopen_addr, (uintptr_t) libc_return_addr, args);
|
|
LOGD("remote handle %p", (void *) remote_handle);
|
|
if (remote_handle == 0) {
|
|
LOGE("handle is null");
|
|
// call dlerror
|
|
auto dlerror_addr = find_func_addr(local_map, map, "libdl.so", "dlerror");
|
|
if (dlerror_addr == nullptr) {
|
|
LOGE("find dlerror");
|
|
return false;
|
|
}
|
|
args.clear();
|
|
auto dlerror_str_addr = remote_call(pid, regs, (uintptr_t) dlerror_addr, (uintptr_t) libc_return_addr, args);
|
|
LOGD("dlerror str %p", (void*) dlerror_str_addr);
|
|
if (dlerror_str_addr == 0) return false;
|
|
auto strlen_addr = find_func_addr(local_map, map, "libc.so", "strlen");
|
|
if (strlen_addr == nullptr) {
|
|
LOGE("find strlen");
|
|
return false;
|
|
}
|
|
args.clear();
|
|
args.push_back(dlerror_str_addr);
|
|
auto dlerror_len = remote_call(pid, regs, (uintptr_t) strlen_addr, (uintptr_t) libc_return_addr, args);
|
|
LOGD("dlerror len %ld", dlerror_len);
|
|
if (dlerror_len <= 0) return false;
|
|
std::string err;
|
|
err.resize(dlerror_len + 1, 0);
|
|
read_proc(pid, (uintptr_t*) dlerror_str_addr, err.data(), dlerror_len);
|
|
LOGE("dlerror info %s", err.c_str());
|
|
return false;
|
|
}
|
|
|
|
// call dlsym(handle, "entry")
|
|
auto dlsym_addr = find_func_addr(local_map, map, "libdl.so", "dlsym");
|
|
if (dlsym_addr == nullptr) return false;
|
|
args.clear();
|
|
str = push_string(pid, regs, "entry");
|
|
args.push_back(remote_handle);
|
|
args.push_back((long) str);
|
|
auto injector_entry = remote_call(pid, regs, (uintptr_t) dlsym_addr, (uintptr_t) libc_return_addr, args);
|
|
LOGD("injector entry %p", (void*) injector_entry);
|
|
if (injector_entry == 0) {
|
|
LOGE("injector entry is null");
|
|
return false;
|
|
}
|
|
|
|
// call injector entry(handle, magic)
|
|
args.clear();
|
|
args.push_back(remote_handle);
|
|
remote_call(pid, regs, injector_entry, (uintptr_t) libc_return_addr, args);
|
|
|
|
// reset pc to entry
|
|
backup.REG_IP = (long) entry_addr;
|
|
LOGD("invoke entry");
|
|
// restore registers
|
|
if (!set_regs(pid, backup)) return false;
|
|
|
|
return true;
|
|
} else {
|
|
LOGE("stopped by other reason: %s", parse_status(status).c_str());
|
|
}
|
|
return false;
|
|
}
|
|
|
|
#define STOPPED_WITH(sig, event) (WIFSTOPPED(status) && WSTOPSIG(status) == (sig) && (status >> 16) == (event))
|
|
|
|
bool trace_zygote(int pid) {
|
|
LOGI("start tracing %d", pid);
|
|
#define WAIT_OR_DIE wait_for_trace(pid, &status, __WALL);
|
|
#define CONT_OR_DIE \
|
|
if (ptrace(PTRACE_CONT, pid, 0, 0) == -1) { \
|
|
PLOGE("cont"); \
|
|
return false; \
|
|
}
|
|
int status;
|
|
LOGI("tracing %d (tracer %d)", pid, getpid());
|
|
if (ptrace(PTRACE_SEIZE, pid, 0, PTRACE_O_EXITKILL) == -1) {
|
|
PLOGE("seize");
|
|
return false;
|
|
}
|
|
WAIT_OR_DIE
|
|
if (STOPPED_WITH(SIGSTOP, PTRACE_EVENT_STOP)) {
|
|
std::string lib_path = TMP_PATH;
|
|
lib_path += "/lib" LP_SELECT("", "64") "/libzygisk.so";
|
|
if (!inject_on_main(pid, lib_path.c_str())) {
|
|
LOGE("failed to inject");
|
|
return false;
|
|
}
|
|
LOGD("inject done, continue process");
|
|
if (kill(pid, SIGCONT)) {
|
|
PLOGE("kill");
|
|
return false;
|
|
}
|
|
CONT_OR_DIE
|
|
WAIT_OR_DIE
|
|
if (STOPPED_WITH(SIGTRAP, PTRACE_EVENT_STOP)) {
|
|
CONT_OR_DIE
|
|
WAIT_OR_DIE
|
|
if (STOPPED_WITH(SIGCONT, 0)) {
|
|
LOGD("received SIGCONT");
|
|
ptrace(PTRACE_DETACH, pid, 0, SIGCONT);
|
|
}
|
|
} else {
|
|
LOGE("unknown state %s, not SIGTRAP + EVENT_STOP", parse_status(status).c_str());
|
|
ptrace(PTRACE_DETACH, pid, 0, 0);
|
|
return false;
|
|
}
|
|
} else {
|
|
LOGE("unknown state %s, not SIGSTOP + EVENT_STOP", parse_status(status).c_str());
|
|
ptrace(PTRACE_DETACH, pid, 0, 0);
|
|
return false;
|
|
}
|
|
return true;
|
|
}
|