Pure Rust Android Property Manipulation
Get. Set. Delete. Stealth. Nuke. No Magisk required.
Note
resetprop-rs is a standalone reimplementation of Magisk's resetprop in pure Rust. It does not depend on Magisk, forked bionic, or any custom Android symbols. Works with any root solution — KSU, Magisk, APatch, or bare su.
Android system properties live in mmap'd shared memory at /dev/__properties__/. Each file is a 128KB arena containing a prefix trie with BST siblings — the same data structure since Android 10.
Magisk's resetprop can manipulate these, but it's locked into Magisk's build system — it depends on a forked bionic with custom symbols (__system_property_find2, __system_property_delete, etc.) that don't exist in stock Android. You can't extract it as a standalone binary.
resetprop-rs reimplements the entire property area format in pure Rust. No bionic symbols. No Magisk dependency. Ships as a ~320KB static binary and an embeddable library crate.
It also introduces operations no existing tool provides: --stealth for detection-resistant writes, --nuke for count-preserving stealth deletes, --hexpatch-delete for dictionary-based name destruction, and --wait for blocking property watches. Under the hood, it parses the property_info binary trie for O(depth) area resolution and dual-writes to Android 14+ appcompat_override areas automatically.
🔓 Truly Standalone — Zero runtime dependencies. No Magisk, no forked libc, no JNI. A single static binary that works on any rooted Android device.
🥷 Stealth Set — Writes property values with zeroed serial counter, no global serial bump, and no futex wake. To detection apps, the property looks like it was written by init at boot. Combine with -p for stealth persist to disk.
💀 Nuke — Count-preserving stealth delete. Removes the target property, inserts a plausible replacement (drawn from the device's own property vocabulary), and compacts the arena. Property count stays identical. Zero forensic traces.
🔮 Hexpatch Delete — Overwrites property name bytes with realistic dictionary words instead of detaching trie nodes. Trie structure stays intact. Serial counters preserved. Invisible to __system_property_foreach.
📦 Embeddable Library — resetprop crate with typed errors, no anyhow. Drop it into your Rust project and manipulate properties programmatically.
⚡ Tiny Footprint — ~320KB ARM64, ~240KB ARMv7. Hand-rolled CLI parser, panic=abort, LTO, single codegen unit. Only dependency: libc.
🧪 Tested Off-Device — 60 unit tests against synthetic property areas. Verified: get, set, overwrite, delete, hexpatch, stealth, nuke, compaction, context parsing, trie integrity, serial preservation, name consistency, boundary conditions.
Property Operations
- Get — single property or list all
- Set — direct mmap write, bypasses
property_service - Set (init-style) —
--initzeros the serial counter, mimicking howinitwritesro.*props at boot - Stealth Set —
--stealth/-stsuppresses serial bump, global serial, and futex wake. Combine with-pfor stealth persist - Delete — trie node detach + value/name wipe + orphan pruning
- Hexpatch Delete — dictionary-based name destruction, serial-preserving
- Nuke —
--nuke/-nkcount-preserving stealth delete (delete + replacement + compact in one atomic operation) - Compact —
--compactdefragments arenas after deletes, reclaiming space - Persistent Properties —
-pwrites to both memory and/data/property/persistent_propertieson disk;-Preads directly from the persist file - Batch Load —
-fflag loadsname=valuepairs from file - Wait —
--wait NAME [VALUE]blocks until a property exists or matches, with optional--timeout - Privatize — remap areas as
MAP_PRIVATEfor per-process COW isolation
Library API
-
PropArea— single property file: open, get, set, set_stealth, delete, nuke, hexpatch, compact, foreach -
PropSystem— multi-file scan across/dev/__properties__/ -
PersistStore— read/write the on-disk persistent property store (protobuf + legacy format) - Typed errors —
NotFound,AreaCorrupt,PermissionDenied,AreaFull,Io,ValueTooLong,PersistCorrupt - RO fallback — automatically falls back to read-only when write access is denied
- Context-aware routing — parses
property_infobinary trie for O(depth) area lookup instead of O(n) scan - appcompat_override — dual-writes to Android 14+ override areas, preserving write mode (stealth, init, etc.)
- Bionic fallback — falls back to
__system_property_*via dlsym when mmap reads are unavailable - Wait —
PropSystem::wait()blocks on property changes via bionic or futex
Format Support
- Short values — ≤91 bytes, inline in prop_info
- Long values — Android 12+, >92 bytes via self-relative arena offset
- Serial protocol — spin-wait on dirty bit, verification loop for concurrent reads
- Length-first comparison — matches AOSP's
cmp_prop_nameexactly
Stealth
- Three-signal suppression — stealth writes zero per-prop serial, skip global serial bump, and suppress futex wake
- Count-preserving nuke — delete + plausible replacement + compaction in one operation; enumeration count unchanged
- Runtime harvest — replacement names drawn from the device's own property vocabulary (unfingerprintable)
- Randomized selection — OS-seeded entropy picks different names each run
- 3-tier fallback — harvest pool → static dictionary (~95 words) → dot-split compound generation
- Plausible value — replaced/mangled properties show value
0instead of empty string - Name consistency — trie segments and prop_info name written from same source (no cross-validation mismatch)
- Length-bucketed — replacement is always exact same byte length as original
- Shared segment detection — skips renaming prefixes used by other properties
- Arena compaction — defragments holes left by deleted properties, eliminating forensic gaps
Important
Write operations (set, delete, hexpatch) require root access with appropriate SELinux context. Read operations (get, list) work for any user since property files are world-readable.
You need:
- Android 10 or above
- Root access (KernelSU, Magisk, APatch, or equivalent)
- ARM64, ARMv7, x86_64, or x86 device/emulator
- Download the binary for your architecture from Releases
- Push to device:
adb push resetprop-arm64-v8a /data/local/tmp/resetprop-rs adb shell chmod +x /data/local/tmp/resetprop-rs
- Run with root:
adb shell su -c /data/local/tmp/resetprop-rs
Warning
Do NOT name the binary resetprop if you're on KernelSU or Magisk. Both ship their own resetprop in /data/adb/ksu/bin/ or /sbin/, and your shell will resolve to theirs instead of this one. Either:
- Name it
resetprop-rs(recommended) - Use the full path:
/data/local/tmp/resetprop-rs - Place it earlier in
$PATHthan the KSU/Magisk binary
If you bundle this binary in a KSU module or boot script, always call it by full path:
RESETPROP="/data/adb/modules/mymodule/resetprop-rs"
$RESETPROP -st ro.build.type user # stealth set
$RESETPROP -nk ro.lineage.version # count-preserving delete
$RESETPROP -st -p persist.sys.timezone UTC # stealth + persistDo not rely on bare resetprop in scripts. It will silently use KSU/Magisk's version, which lacks --stealth, --nuke, --hexpatch-delete, --init, -p, and -P.
resetprop-rs [OPTIONS] [NAME] [VALUE]
# List all properties
resetprop-rs
# Get a single property
resetprop-rs ro.build.type
# List persistent properties from disk (/data/property/)
resetprop-rs -P
# Get a single persistent property from disk
resetprop-rs -P persist.sys.timezone# Set a property (direct mmap write, bypasses property_service)
resetprop-rs -n ro.build.type user
# Set with zeroed serial counter (mimics how init writes ro.* at boot)
resetprop-rs --init ro.build.fingerprint "google/raven/raven:14/..."
# Set and persist to disk (survives reboot)
resetprop-rs -p persist.sys.timezone UTC
# Stealth set (zeroed serial, no global serial bump, no futex wake)
resetprop-rs --stealth ro.build.type user
resetprop-rs -st ro.build.type user # short alias
# Stealth set + persist to disk
resetprop-rs --stealth -p persist.sys.timezone UTC
resetprop-rs -st -p persist.sys.timezone UTC # short alias
# Batch set from file (one name=value per line, # comments allowed)
resetprop-rs -f props.txt
# Batch set with init-style serial
resetprop-rs --init -f props.txt# Delete (detaches trie node, zeroes value and name, prunes orphans)
resetprop-rs -d ro.debuggable
# Delete from both memory and persist file
resetprop-rs -p -d persist.sys.timezone
# Nuke: count-preserving stealth delete (delete + replacement + compact)
resetprop-rs --nuke ro.lineage.version
resetprop-rs -nk ro.lineage.version # short alias
# Nuke from both memory and persist file
resetprop-rs -p --nuke persist.sys.timezone
# Hexpatch delete (replaces name with dictionary words, keeps trie intact)
resetprop-rs --hexpatch-delete ro.lineage.version
# Compact arenas (reclaim space from deleted properties)
resetprop-rs --compact# Wait for a property to exist (blocks until set by any process)
resetprop-rs --wait sys.boot_completed
# Wait for a property to equal a specific value
resetprop-rs --wait sys.boot_completed 1
# Wait with a timeout (exits with error if not met in time)
resetprop-rs --wait ro.crypto.state encrypted --timeout 30| Flag | Description |
|---|---|
-n |
No-op (compatibility with Magisk's resetprop) |
--init |
Zero the serial counter when writing (mimics init for ro.* properties) |
--stealth, -st |
Stealth set: zeroed serial, no global serial bump, no futex wake |
-p |
Persist mode: write/delete affects both memory and /data/property/ on disk |
-P |
Read from the persist file on disk, not from the mmap'd property area |
-d NAME |
Delete a property |
--nuke NAME, -nk NAME |
Count-preserving stealth delete (delete + replacement + compact). Combine with -p for persist |
--hexpatch-delete NAME |
Stealth delete with dictionary-based name replacement |
--compact |
Defragment arenas after deletes |
-f FILE |
Load name=value pairs from a file |
--wait NAME [VALUE] |
Wait for property to exist or equal VALUE. Prints the value on success |
--timeout SECS |
Timeout for --wait in seconds (default: no timeout, waits forever) |
--dir PATH |
Use a custom property directory instead of /dev/__properties__/ |
-v |
Verbose output |
-h, --help |
Show help |
Add to your Cargo.toml:
[dependencies]
resetprop = "0.4"Or from git:
[dependencies]
resetprop = { git = "https://github.com/Enginex0/resetprop-rs" }use resetprop::{PropSystem, PersistStore};
let sys = PropSystem::open()?;
// read
if let Some(val) = sys.get("ro.build.type") {
println!("{val}");
}
// write (direct mmap, bypasses property_service)
sys.set("ro.build.type", "user")?;
// write with zeroed serial (mimics init for ro.* props)
sys.set_init("ro.build.fingerprint", "google/raven/...")?;
// stealth write (zeroed serial, no global serial bump, no futex wake)
sys.set_stealth("ro.build.type", "user")?;
// stealth write + persist to disk
sys.set_stealth_persist("persist.sys.timezone", "UTC")?;
// write to both memory and disk
sys.set_persist("persist.sys.timezone", "UTC")?;
// delete
sys.delete("ro.debuggable")?;
sys.delete_persist("persist.sys.timezone")?;
// nuke: count-preserving stealth delete
sys.nuke("ro.lineage.version")?;
sys.nuke_persist("persist.sys.timezone")?;
// hexpatch delete (dictionary-based name destruction)
sys.hexpatch_delete("ro.custom.prop")?;
// compact arenas after deletes
sys.compact()?;
// wait for a property to equal a value (30s timeout)
use std::time::Duration;
if let Some(val) = sys.wait("sys.boot_completed", Some("1"), Some(Duration::from_secs(30))) {
println!("boot completed: {val}");
}
// enumerate
for (name, value) in sys.list() {
println!("[{name}]: [{value}]");
}
// read persist file directly
let store = PersistStore::load()?;
for record in store.list() {
println!("{}: {}", record.name, record.value);
}Requires Android NDK for cross-compilation:
export ANDROID_NDK_HOME=/path/to/ndk
./build.shOutputs stripped binaries to out/:
| ABI | Binary |
|---|---|
| arm64-v8a | resetprop-arm64-v8a |
| armeabi-v7a | resetprop-armeabi-v7a |
| x86_64 | resetprop-x86_64 |
| x86 | resetprop-x86 |
The build uses opt-level=s, LTO, panic=abort, strip, and single codegen unit for minimal binary size.
No NDK? Fork the repo and go to Actions → Build → Run workflow — GitHub builds all four ABIs for you. Download them from the workflow artifacts.
Each file in /dev/__properties__/ is a 128KB mmap'd arena:
┌─────────────────────────────────────┐
│ Header (128 bytes) │
│ [0x00] bytes_used: u32 │
│ [0x04] serial: AtomicU32 │
│ [0x08] magic: 0x504f5250 "PROP" │
│ [0x0C] version: 0xfc6ed0ab │
├─────────────────────────────────────┤
│ Arena (bump-allocated, append-only) │
│ ┌─ prop_trie_node ──────────┐ │
│ │ namelen(4) prop(4) left(4)│ │
│ │ right(4) children(4) │ │
│ │ name[namelen+1] (aligned) │ │
│ └───────────────────────────┘ │
│ ┌─ prop_info ───────────────┐ │
│ │ serial(4) value[92] │ │
│ │ name[] (full dotted name) │ │
│ └───────────────────────────┘ │
└─────────────────────────────────────┘
Property names split on dots into a prefix trie. Each trie level uses a BST for siblings, compared length-first then lexicographically (not standard strcmp).
Standard set() bumps three detection signals: per-property serial, global serial (via notify()), and futex wake. Any monitoring app can observe these. Stealth set suppresses all three:
resetprop-rs --stealth ro.build.type user
- Write value with zeroed serial counter (
(value.len() << 24), same encoding asinit) - Skip
notify()entirely (no global serial bump viabump_serial_and_wake) - Skip
futex_wake()on the property's serial address - New properties created via stealth are already silent (the allocation path never wakes)
The result is indistinguishable from a property written by init at boot. Combine with -p to also persist to /data/property/persistent_properties.
Standard delete leaves a gap in the enumeration count. Hexpatch preserves count but leaves renamed trie segments. Nuke achieves both: zero artifacts AND preserved count.
Before: ro.lineage.version = "18.1" (2389 props total)
After: (original gone, plausible replacement added, 2389 props total)
- Delete the target property (detach trie node, wipe prop_info, prune orphans)
- Scan the area for existing property prefixes, pick the busiest prefix (most natural to add a sibling)
- Generate a plausible leaf segment (harvest pool → dictionary → compound generation)
- Insert the replacement via stealth write with value
"0"(zeroed serial, no wake) - Compact the arena to eliminate holes from the deletion
- Net result: target gone, replacement blends in, count unchanged, no detection signals fired
An alternative stealth delete that keeps the trie structure intact by overwriting name bytes in-place:
Before: ro.lineage.version = "18.1"
After: ro.codec.charger = "0"
- Harvest all property segments from the device into a length-bucketed pool
- Walk the trie path, collecting each segment's node offset
- For each non-shared segment, pick a same-length replacement (harvest → dict → dot-split compound)
- Overwrite name bytes in-place, randomized selection each run
- Write mangled name to prop_info from the same chosen segments (single source of truth)
- Set value to
0with correct serial encoding - No serial bump, no futex wake
Android stores properties across multiple files in /dev/__properties__/, one per SELinux context. The file property_info is a binary trie that maps property name prefixes to the correct area file.
resetprop-rs parses this trie on startup, enabling O(depth) lookup by property name instead of scanning every area file linearly. The algorithm walks the trie segment-by-segment (split on .), checking node contexts, prefix entries, child nodes, and exact matches at each level.
On Android 8-9 (pre-serialized format), it falls back to parsing text property_contexts files. If neither is available, it falls back to the original linear scan.
Android 14 introduced /dev/__properties__/appcompat_override/, a mirror directory containing duplicate property areas for app compatibility. When a property is set or deleted, the system writes to both the main area and the corresponding override file.
resetprop-rs detects this directory and automatically dual-writes to the mirror when performing set, set_init, set_stealth, or delete operations. The override write uses the same mode as the main write (stealth for stealth, init for init). Override failures are silently ignored.
On Android, if a property can't be found via direct mmap (e.g., areas not directly accessible), resetprop-rs falls back to bionic's __system_property_find and __system_property_read_callback loaded via dlsym at runtime. This is a secondary path; the primary pure mmap path is always tried first.
The --wait command also uses bionic's __system_property_wait when available, falling back to futex_wait on the property's serial address (or the global serial for properties that don't exist yet).
| Status | |
|---|---|
| Android | 10 – 15 |
| Architecture | ARM64, ARMv7, x86_64, x86 |
| Value format | Short (≤91B) + Long (Android 12+, >92B) |
| Root | KernelSU, Magisk, APatch, any su |
- hiking90/rsproperties — Rust property area parser that proved the approach viable (Apache-2.0)
- topjohnwu/Magisk — original
resetpropand the forked bionic approach - Pixel-Props/sensitive-props — property spoofing reference that informed the target property list
- AOSP bionic — canonical property area format specification
- frknkrc44 — aspiration, proposed building this project
- fatalcoder524 — stealth strategy design and testing
This project is licensed under the MIT License.
🔧 Because the best property manipulation is the one init never noticed.