You've already forked KernelSU
mirror of
https://github.com/tiann/KernelSU.git
synced 2025-08-27 23:46:34 +00:00
Compare commits
733 Commits
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
8685fa1f60 | ||
|
|
c95163b144 | ||
|
|
648d56da39 | ||
|
|
33c0a9eebd | ||
|
|
3f86fb016d | ||
|
|
66316e76f5 | ||
|
|
5591a94f87 | ||
|
|
f855f8148a | ||
|
|
0c52f24612 | ||
|
|
9635a00036 | ||
|
|
cbc04ff6df | ||
|
|
8e448767a5 | ||
|
|
2820779947 | ||
|
|
a99c69f9b4 | ||
|
|
a829707b16 | ||
|
|
77d16ac896 | ||
|
|
d02855a40a | ||
|
|
b904680f13 | ||
|
|
811c68cac0 | ||
|
|
f20ccc1728 | ||
|
|
66e7db2a4e | ||
|
|
e6b05b1d3c | ||
|
|
329010a694 | ||
|
|
9c4d20c0f2 | ||
|
|
355b55a01d | ||
|
|
e85646fad4 | ||
|
|
4969c5f548 | ||
|
|
55f8f2da90 | ||
|
|
65bff7bf03 | ||
|
|
30dfbbdc0e | ||
|
|
fceffc9cfe | ||
|
|
01b685ce58 | ||
|
|
cbd184421c | ||
|
|
b0a42abf4f | ||
|
|
cfc982f2f3 | ||
|
|
e0e7058d14 | ||
|
|
e0802b0d15 | ||
|
|
81f15ef120 | ||
|
|
20c19d7126 | ||
|
|
a360cd87c0 | ||
|
|
ea9b572402 | ||
|
|
6bf9e0478e | ||
|
|
abf0dacb36 | ||
|
|
263b986bcd | ||
|
|
15bdd9f507 | ||
|
|
810a62f795 | ||
|
|
07e475c5dc | ||
|
|
eb02e42bc7 | ||
|
|
5db51b0715 | ||
|
|
60d2685f7e | ||
|
|
a4b9ea04a4 | ||
|
|
f80d0764b5 | ||
|
|
f80769a82a | ||
|
|
64269c8c4f | ||
|
|
9f04482b90 | ||
|
|
aca505c3e6 | ||
|
|
d4826bc97c | ||
|
|
4efc8164f1 | ||
|
|
0fc25cf091 | ||
|
|
ca438291cc | ||
|
|
d6cab60e6d | ||
|
|
4d4bd4793f | ||
|
|
c1a2cbf1e4 | ||
|
|
4b1fb121b4 | ||
|
|
883a3e3407 | ||
|
|
27bd18f60e | ||
|
|
7cb5fb47e1 | ||
|
|
d43b40572d | ||
|
|
c99b5b31c1 | ||
|
|
ca960a2a8f | ||
|
|
cce423a2f6 | ||
|
|
946fb6f999 | ||
|
|
b6ecce4317 | ||
|
|
be70a91f16 | ||
|
|
71c2790f08 | ||
|
|
8733b390ca | ||
|
|
c4e106d6f8 | ||
|
|
b612efcfad | ||
|
|
7f53882007 | ||
|
|
23ba3182cf | ||
|
|
8abd37a35c | ||
|
|
d7bc853bfc | ||
|
|
16c5aba4ff | ||
|
|
3914242457 | ||
|
|
eaa12161d6 | ||
|
|
0f985917f9 | ||
|
|
a569b1c76e | ||
|
|
7f1ea2e178 | ||
|
|
da89a45d56 | ||
|
|
dc2fb20d24 | ||
|
|
d7625722db | ||
|
|
4144f10d9a | ||
|
|
aaddaf1a78 | ||
|
|
2fec279de3 | ||
|
|
1e676e5dc2 | ||
|
|
7b63e099ce | ||
|
|
aef943ebe3 | ||
|
|
1637864636 | ||
|
|
e934bfb648 | ||
|
|
653225bb5b | ||
|
|
decbdeb5d7 | ||
|
|
51ca19f267 | ||
|
|
5b920f8230 | ||
|
|
601ce2120a | ||
|
|
6d79060e4c | ||
|
|
e95e87a7a4 | ||
|
|
144b0cc8e9 | ||
|
|
d9d9066316 | ||
|
|
3af293f991 | ||
|
|
60c9fabb44 | ||
|
|
23ffc2a3b2 | ||
|
|
2bab388bbf | ||
|
|
e9997a07c1 | ||
|
|
757e69b15e | ||
|
|
506385cfad | ||
|
|
4b27a9a324 | ||
|
|
1326fd32c5 | ||
|
|
90d63fe184 | ||
|
|
0f8a1346c7 | ||
|
|
1fad91a4e2 | ||
|
|
ddff9ee701 | ||
|
|
c7a9655ab9 | ||
|
|
fd7681c3ff | ||
|
|
e3e4d2eed4 | ||
|
|
30e00859b9 | ||
|
|
faf7a8e3b1 | ||
|
|
b82fc971dd | ||
|
|
52f5727875 | ||
|
|
01711b4114 | ||
|
|
153ce9a39a | ||
|
|
f37cc16117 | ||
|
|
5f31571cc7 | ||
|
|
92a1267b29 | ||
|
|
b99701d216 | ||
|
|
097e291d93 | ||
|
|
eb3f604ab8 | ||
|
|
3d9ca63bac | ||
|
|
4be7485180 | ||
|
|
afefe20c96 | ||
|
|
76e7d7c60c | ||
|
|
d08f537c89 | ||
|
|
88e20d102d | ||
|
|
32b3ec9844 | ||
|
|
fbeea49318 | ||
|
|
5deecb3b50 | ||
|
|
534ac88195 | ||
|
|
d867c3c5e2 | ||
|
|
aca9ac50f3 | ||
|
|
d6cbda49aa | ||
|
|
fe7f509f9d | ||
|
|
26da7d590e | ||
|
|
706cd1e73e | ||
|
|
6472b14a59 | ||
|
|
c305dca5ab | ||
|
|
94978b7b28 | ||
|
|
161b3280c4 | ||
|
|
e69769d25f | ||
|
|
a1153683e1 | ||
|
|
79341ab501 | ||
|
|
05b33abb79 | ||
|
|
f5095f96fa | ||
|
|
dcd9d65c92 | ||
|
|
fa3dec8852 | ||
|
|
87d10054ae | ||
|
|
1a308afe63 | ||
|
|
f46830f28f | ||
|
|
c560d603e6 | ||
|
|
064de704f2 | ||
|
|
860911c455 | ||
|
|
1d04c5086c | ||
|
|
f4eab986a9 | ||
|
|
701e85d931 | ||
|
|
bf43654725 | ||
|
|
a56a922f96 | ||
|
|
19a697a968 | ||
|
|
c9b540b12c | ||
|
|
cd48f64154 | ||
|
|
acd2c343e2 | ||
|
|
dec7f91182 | ||
|
|
d2684292e8 | ||
|
|
07b940d127 | ||
|
|
845515fa6b | ||
|
|
0db7aa573e | ||
|
|
3783f82b28 | ||
|
|
684973b4bf | ||
|
|
0617c4440b | ||
|
|
9223558197 | ||
|
|
c13040a0ea | ||
|
|
b45c4f57c5 | ||
|
|
8196243478 | ||
|
|
b7f937b7f9 | ||
|
|
8fdff569d6 | ||
|
|
b658d820a1 | ||
|
|
ce56c19ad9 | ||
|
|
d27561c505 | ||
|
|
57898f13c1 | ||
|
|
5da1767ff8 | ||
|
|
aa21385a36 | ||
|
|
697e06125a | ||
|
|
95c383ea18 | ||
|
|
048e94ba69 | ||
|
|
4a9f1de7a0 | ||
|
|
00438a6d6e | ||
|
|
88d4eca8ff | ||
|
|
8a298bb867 | ||
|
|
5526fa2468 | ||
|
|
c26a26b92d | ||
|
|
75e64eafd2 | ||
|
|
961478fa23 | ||
|
|
a903b0fa4e | ||
|
|
0f09b90f5b | ||
|
|
8b81aeaf70 | ||
|
|
b4a52f89cc | ||
|
|
e9df5105b3 | ||
|
|
cd2711395a | ||
|
|
83a8d77018 | ||
|
|
426fde58fd | ||
|
|
59040c3aea | ||
|
|
f4b53daddf | ||
|
|
4c79ad7a81 | ||
|
|
fb6565bd19 | ||
|
|
a3e939ab90 | ||
|
|
80797548b5 | ||
|
|
f86fce6e16 | ||
|
|
318be535a8 | ||
|
|
92d4de3a73 | ||
|
|
3cf5fc4c51 | ||
|
|
4e3cbf627a | ||
|
|
72febb34c0 | ||
|
|
03068f279d | ||
|
|
7371eae382 | ||
|
|
fae1fd9826 | ||
|
|
ec5d9e6368 | ||
|
|
64f849dc10 | ||
|
|
d68fa5aed5 | ||
|
|
1b67c1b153 | ||
|
|
f349507232 | ||
|
|
bf823a29e8 | ||
|
|
55f712d1b2 | ||
|
|
ca10d7bcb9 | ||
|
|
d24813b2c3 | ||
|
|
a6325193cf | ||
|
|
7a1767b4c9 | ||
|
|
2d4d26c68e | ||
|
|
3f98493bb3 | ||
|
|
927f2a26bd | ||
|
|
344c08bb79 | ||
|
|
84f16e4c82 | ||
|
|
4ff9dcaa17 | ||
|
|
34b64b8310 | ||
|
|
8f4e7f8a79 | ||
|
|
75b5fdfb9d | ||
|
|
d4e19bb8fc | ||
|
|
571f89fac3 | ||
|
|
9e058c48a6 | ||
|
|
e828053439 | ||
|
|
8a7d153b02 | ||
|
|
06fdae18d2 | ||
|
|
df8c91b306 | ||
|
|
10b31bd09a | ||
|
|
54a705d8dc | ||
|
|
294caf3deb | ||
|
|
a1f7d474f9 | ||
|
|
1df5fec49b | ||
|
|
fd03626362 | ||
|
|
9b294682b0 | ||
|
|
a4fb9e4031 | ||
|
|
3ebee74efc | ||
|
|
433627c82b | ||
|
|
6cce322107 | ||
|
|
906007a7b3 | ||
|
|
583426ecc5 | ||
|
|
ce892bc439 | ||
|
|
1f1d4d454e | ||
|
|
4695b41f53 | ||
|
|
52f17cde40 | ||
|
|
3408f944e6 | ||
|
|
b1830049f1 | ||
|
|
79951f06ed | ||
|
|
8828939994 | ||
|
|
a3b92d6fee | ||
|
|
a22959beae | ||
|
|
7753dc0987 | ||
|
|
960c40129b | ||
|
|
f371d784ea | ||
|
|
59b45ce822 | ||
|
|
340595276f | ||
|
|
72d756c9f2 | ||
|
|
3d59071571 | ||
|
|
394cfe7516 | ||
|
|
0810db101e | ||
|
|
ab0ae9d196 | ||
|
|
13748300eb | ||
|
|
c4db2bab4f | ||
|
|
e352ccc470 | ||
|
|
7747c0e211 | ||
|
|
2661a36375 | ||
|
|
1bdddb13ce | ||
|
|
7d3c50ef0a | ||
|
|
2ee7696d67 | ||
|
|
54ee400dc5 | ||
|
|
945e2c3209 | ||
|
|
298e42cb42 | ||
|
|
3a657a9dbb | ||
|
|
55aa54ca85 | ||
|
|
0b8359a2e2 | ||
|
|
afb04126f6 | ||
|
|
98fae23864 | ||
|
|
23805d4784 | ||
|
|
01bf24fa7b | ||
|
|
47f05a139d | ||
|
|
3c0c70ba7f | ||
|
|
c19ba7fab0 | ||
|
|
1f42bbac5e | ||
|
|
cbb98a1de9 | ||
|
|
08745664a6 | ||
|
|
eac6fd0484 | ||
|
|
ad1dbf77a1 | ||
|
|
81bbb31098 | ||
|
|
52234d040f | ||
|
|
1fb2aad893 | ||
|
|
64744bb31d | ||
|
|
b9747fbe69 | ||
|
|
85922946b7 | ||
|
|
40fc6d2163 | ||
|
|
da662133ae | ||
|
|
25592a0614 | ||
|
|
2d96aaa28f | ||
|
|
64cf6eb8b9 | ||
|
|
7e44765074 | ||
|
|
d84fdada31 | ||
|
|
71c14d96ab | ||
|
|
5d988002c7 | ||
|
|
15ff9fbf41 | ||
|
|
542d3e40af | ||
|
|
7c4fb51b5c | ||
|
|
5b10d10b82 | ||
|
|
677d3357b9 | ||
|
|
5e893e3d04 | ||
|
|
685cd75c99 | ||
|
|
8354204c32 | ||
|
|
d394fd2e01 | ||
|
|
71799c7aed | ||
|
|
76bdd12f73 | ||
|
|
fb103472c6 | ||
|
|
9f17bafbf0 | ||
|
|
b2f9f3ade9 | ||
|
|
12a095fd1a | ||
|
|
7153336ad1 | ||
|
|
5f2566e478 | ||
|
|
0af25af1be | ||
|
|
ea3b397f34 | ||
|
|
6aeb76a3ef | ||
|
|
ae9519de42 | ||
|
|
8bf33e9aca | ||
|
|
b91a294138 | ||
|
|
d274a315b1 | ||
|
|
b0c3c3a9a2 | ||
|
|
1147eb205d | ||
|
|
f160abf9ce | ||
|
|
61ad99dbe5 | ||
|
|
9a126645e8 | ||
|
|
21f39f6de8 | ||
|
|
0ddb8a4c89 | ||
|
|
c9997b5ca9 | ||
|
|
0b1bab5b01 | ||
|
|
676590be15 | ||
|
|
b52bf53d01 | ||
|
|
7bdb885816 | ||
|
|
cde3e95180 | ||
|
|
7ecb4b03ee | ||
|
|
e8a90aadb2 | ||
|
|
beaa048be3 | ||
|
|
936b650f12 | ||
|
|
747c91d5c8 | ||
|
|
5023d0ab1d | ||
|
|
5b638c876e | ||
|
|
d6a7231fae | ||
|
|
06681a2490 | ||
|
|
278cbef3ec | ||
|
|
a83390b0ec | ||
|
|
907bcad1a7 | ||
|
|
4c0a36785b | ||
|
|
983ad2c1fd | ||
|
|
a3590b767e | ||
|
|
12e00dc717 | ||
|
|
e00a355fa8 | ||
|
|
e95c5a9675 | ||
|
|
d0b8144b96 | ||
|
|
d16d3f87a6 | ||
|
|
76decba8d9 | ||
|
|
d75678fca0 | ||
|
|
abe1fa471d | ||
|
|
07a430aa5b | ||
|
|
df9cf61575 | ||
|
|
bfe8c2eecd | ||
|
|
b732765811 | ||
|
|
a966252fa5 | ||
|
|
3664003260 | ||
|
|
978178afc0 | ||
|
|
16f6f30eae | ||
|
|
63851f8c88 | ||
|
|
34c6765752 | ||
|
|
c23d1bcf58 | ||
|
|
6ae7e1624f | ||
|
|
ba4b014a99 | ||
|
|
f192638943 | ||
|
|
0323ee7958 | ||
|
|
021ef521cb | ||
|
|
34086cd445 | ||
|
|
c306eddee8 | ||
|
|
c72f7d750e | ||
|
|
f9a91848ad | ||
|
|
cd8013a616 | ||
|
|
dc536d652a | ||
|
|
3114f6d7f6 | ||
|
|
e2f5015107 | ||
|
|
884dd606eb | ||
|
|
8d246a6b9d | ||
|
|
2ee3d55c88 | ||
|
|
55b540bf4c | ||
|
|
c0d147dcad | ||
|
|
be413fd147 | ||
|
|
786f3d6441 | ||
|
|
8f50b5f6e5 | ||
|
|
90639fad6c | ||
|
|
2979434e2a | ||
|
|
56d145666c | ||
|
|
db5f77aa96 | ||
|
|
5fbce8ef07 | ||
|
|
4cc3644416 | ||
|
|
01a7678a26 | ||
|
|
95d22d2bb4 | ||
|
|
3efb2be456 | ||
|
|
3b7ca2d7e8 | ||
|
|
7b45bc5aad | ||
|
|
ed1e892600 | ||
|
|
f188802044 | ||
|
|
965c23867f | ||
|
|
b271b2f587 | ||
|
|
0953f50e0c | ||
|
|
77ac974ce8 | ||
|
|
d714ab0c5d | ||
|
|
38eb93d5ca | ||
|
|
080d5bd9e8 | ||
|
|
d05ec41379 | ||
|
|
d07956ead6 | ||
|
|
4e3af6dab3 | ||
|
|
45d96b98c5 | ||
|
|
b554c66b46 | ||
|
|
fb87d0f0f5 | ||
|
|
37abe48702 | ||
|
|
ec9babea76 | ||
|
|
8a464ac7b2 | ||
|
|
eb5a99e4b6 | ||
|
|
047312e0e5 | ||
|
|
45a25eda50 | ||
|
|
120c2f43de | ||
|
|
9deb820923 | ||
|
|
ae21d4c9fd | ||
|
|
5381ceabae | ||
|
|
5d07e1d392 | ||
|
|
d78f24098a | ||
|
|
cd952f5e45 | ||
|
|
156b17f69d | ||
|
|
f4d2b0feab | ||
|
|
2c0a9cd64c | ||
|
|
134507b928 | ||
|
|
2b42d14ef8 | ||
|
|
e6071b5247 | ||
|
|
f288cfccae | ||
|
|
1cc9da5efe | ||
|
|
0aee64f339 | ||
|
|
cbbdc665c8 | ||
|
|
1b2635784f | ||
|
|
ee5d2f8c84 | ||
|
|
dfc2a86e70 | ||
|
|
c0066b68f5 | ||
|
|
6ef5e4ef76 | ||
|
|
e3e77fde78 | ||
|
|
8ea55c7f2f | ||
|
|
d2a976b3cc | ||
|
|
d675662862 | ||
|
|
839b318785 | ||
|
|
971f59c11e | ||
|
|
ab58808b64 | ||
|
|
9cbb7cb10e | ||
|
|
70f2df11d1 | ||
|
|
827a2f2901 | ||
|
|
a9c33f6940 | ||
|
|
2bb73a2a92 | ||
|
|
90407986be | ||
|
|
b85ece440b | ||
|
|
a10d2651c1 | ||
|
|
b308a368d3 | ||
|
|
e6fea652de | ||
|
|
0856b718de | ||
|
|
6f1ccc5b3c | ||
|
|
da959b4e17 | ||
|
|
0bfd6d9e30 | ||
|
|
980f1d09bc | ||
|
|
b644c124e3 | ||
|
|
65005131bd | ||
|
|
18aa7f2a17 | ||
|
|
cd5bc2efa9 | ||
|
|
477361f119 | ||
|
|
d3632e4b3b | ||
|
|
0c2f90123b | ||
|
|
09d90e1a0a | ||
|
|
4fe167c361 | ||
|
|
58ffaeb4e2 | ||
|
|
76499ee629 | ||
|
|
fedfa3e3fd | ||
|
|
2902e42f91 | ||
|
|
37f4045499 | ||
|
|
12761ee167 | ||
|
|
0d254237a4 | ||
|
|
f5bb24676e | ||
|
|
303a3a8482 | ||
|
|
07273b6971 | ||
|
|
c7c9e9c3ed | ||
|
|
c3c990c50a | ||
|
|
6942fe12b5 | ||
|
|
f5cfb32882 | ||
|
|
e17f3eab96 | ||
|
|
08884da423 | ||
|
|
5f1d70dabb | ||
|
|
79bb9813ef | ||
|
|
1cda4ba245 | ||
|
|
1cc678d20b | ||
|
|
cd3e292489 | ||
|
|
40ea27a59c | ||
|
|
e95ca9316c | ||
|
|
9b2f907a48 | ||
|
|
90299ad0bb | ||
|
|
22d084f89b | ||
|
|
99770a7362 | ||
|
|
bbc7ebe5b1 | ||
|
|
d131b7561d | ||
|
|
ff8c614737 | ||
|
|
c12ad9d1c7 | ||
|
|
1703c16948 | ||
|
|
a48d7b112f | ||
|
|
f2d5e57f01 | ||
|
|
4111bbf720 | ||
|
|
cd32ad8751 | ||
|
|
fefb826177 | ||
|
|
e27fc04b5b | ||
|
|
168f412324 | ||
|
|
bd8434f4f4 | ||
|
|
c697398893 | ||
|
|
1e0176242a | ||
|
|
0e5e12b331 | ||
|
|
a2b240121a | ||
|
|
246dadea05 | ||
|
|
b5291077a9 | ||
|
|
ee548d513a | ||
|
|
bdd269ea22 | ||
|
|
e1d7bb91e8 | ||
|
|
593bc06302 | ||
|
|
8b6204a534 | ||
|
|
01ea9c9dce | ||
|
|
12e664b0a4 | ||
|
|
0ca92b9de9 | ||
|
|
2fc9e03d86 | ||
|
|
4218aa488f | ||
|
|
d95ede1f76 | ||
|
|
56f72e8702 | ||
|
|
964bf34325 | ||
|
|
3191165ba2 | ||
|
|
3ad27c5999 | ||
|
|
5b27f6c010 | ||
|
|
be44fad288 | ||
|
|
2a5fb76f95 | ||
|
|
5db7075432 | ||
|
|
1408175a35 | ||
|
|
ab1dc894e1 | ||
|
|
c5bc1c8b15 | ||
|
|
6d1ee60d67 | ||
|
|
a58e929205 | ||
|
|
53be8612c8 | ||
|
|
c7f6a7d11b | ||
|
|
e9011041c5 | ||
|
|
9803371fdb | ||
|
|
710edb72fa | ||
|
|
a4ddf59562 | ||
|
|
37dc9a27a7 | ||
|
|
27ccfa6395 | ||
|
|
116bc56cfe | ||
|
|
9ae0126be5 | ||
|
|
e8755f8ae0 | ||
|
|
6ba2bd3af9 | ||
|
|
4c5e485e76 | ||
|
|
05c6892f43 | ||
|
|
670a20c37f | ||
|
|
75509aba72 | ||
|
|
887f02e742 | ||
|
|
ef8da39d34 | ||
|
|
b7c759ece1 | ||
|
|
019da4a634 | ||
|
|
33aa6de50b | ||
|
|
0b3688c3b1 | ||
|
|
076e5d3655 | ||
|
|
c9608af0c8 | ||
|
|
908fbadaf5 | ||
|
|
ee97fdfc56 | ||
|
|
4ac137313f | ||
|
|
11d0029a4b | ||
|
|
8af5a9038b | ||
|
|
5d449988fb | ||
|
|
e969563df0 | ||
|
|
990626cf7d | ||
|
|
fc77ca989f | ||
|
|
2ce3976023 | ||
|
|
63ec531814 | ||
|
|
a4b55b30ca | ||
|
|
807556f361 | ||
|
|
2d854f2f37 | ||
|
|
5980c113fe | ||
|
|
1491465b55 | ||
|
|
728380222a | ||
|
|
005404f552 | ||
|
|
b55c229038 | ||
|
|
32538c9833 | ||
|
|
b31fc47197 | ||
|
|
5003824fa8 | ||
|
|
eea75b72a4 | ||
|
|
82d5ec3cc1 | ||
|
|
75721be8c0 | ||
|
|
de72eedb46 | ||
|
|
66827ab7de | ||
|
|
2a33433272 | ||
|
|
581dff8a5f | ||
|
|
fc425cbba2 | ||
|
|
87f55c1acb | ||
|
|
68d639e325 | ||
|
|
89f6cd044e | ||
|
|
bd3a1291da | ||
|
|
3abb7e4ca2 | ||
|
|
41265b0203 | ||
|
|
f2cb841b8a | ||
|
|
c69da29081 | ||
|
|
e304ef8cfb | ||
|
|
2ce76351da | ||
|
|
66cbd931a7 | ||
|
|
07bc28e386 | ||
|
|
2ef4ffe5eb | ||
|
|
128e7e394e | ||
|
|
998dc9b94b | ||
|
|
c6dafb1333 | ||
|
|
8ae7299d59 | ||
|
|
8f1b9c579b | ||
|
|
4b6573b521 | ||
|
|
325e843569 | ||
|
|
d014947a54 | ||
|
|
8858cc899e | ||
|
|
8f3e59803f | ||
|
|
95044bb551 | ||
|
|
b56448a929 | ||
|
|
c2b981dbdb | ||
|
|
28fb482720 | ||
|
|
d744a705a8 | ||
|
|
c62b89f02b | ||
|
|
f876b0114e | ||
|
|
9965988f26 | ||
|
|
828bb6fbb4 | ||
|
|
10d8d9efcd | ||
|
|
e59f3333cb | ||
|
|
31a9189d80 | ||
|
|
d162221fac | ||
|
|
0cdca0d053 | ||
|
|
4c934d460b | ||
|
|
76612b9cf7 | ||
|
|
9cf8ac9c51 | ||
|
|
b80e06256d | ||
|
|
08d9e5d6bc | ||
|
|
ed0cfd231e | ||
|
|
538d3f06f4 | ||
|
|
f5d3fb6217 | ||
|
|
ffa3579e6f | ||
|
|
c7adb8e3b1 | ||
|
|
c1427f658a | ||
|
|
eccce7b31f | ||
|
|
f81caf75a9 | ||
|
|
d4680c6de7 | ||
|
|
2716ec58a0 | ||
|
|
f25dbd8fed | ||
|
|
e35180c919 | ||
|
|
2f54ceb7c4 | ||
|
|
6506ef468d | ||
|
|
da46dfbde1 | ||
|
|
09ecc2c9b5 | ||
|
|
0b2899a961 | ||
|
|
c6ed3fa27f | ||
|
|
43cd3b9cad | ||
|
|
294d6fa05e | ||
|
|
009a479c17 | ||
|
|
72ee14e6be | ||
|
|
2b01a1c395 | ||
|
|
f69793d38e | ||
|
|
eda0d6d23b | ||
|
|
abba36d786 | ||
|
|
33ea9a6f33 | ||
|
|
9a0da7270b | ||
|
|
9caf440200 | ||
|
|
c9e53cf355 | ||
|
|
432eb318ac | ||
|
|
cea0db4e0d | ||
|
|
842c0b674f | ||
|
|
36ed99d1f6 | ||
|
|
86d0f37b37 | ||
|
|
5303c9c461 | ||
|
|
67667b6df2 | ||
|
|
d9d27b4229 | ||
|
|
a2a1b19758 | ||
|
|
fb9d39d6d5 | ||
|
|
0f3d425f64 | ||
|
|
08e3580646 | ||
|
|
0fa4a4c6db | ||
|
|
d452e01a3d | ||
|
|
f7da373f8b | ||
|
|
b80cf7ba15 | ||
|
|
fe1cd4b27a | ||
|
|
925206f9c8 | ||
|
|
f24a317e2d | ||
|
|
aeaa3ce982 | ||
|
|
8c6913a9af | ||
|
|
7795232a58 | ||
|
|
057330c68f | ||
|
|
91c80279bd | ||
|
|
5715df0b10 | ||
|
|
9f0c540fba | ||
|
|
f9d19a957a |
5
.github/FUNDING.yml
vendored
Normal file
5
.github/FUNDING.yml
vendored
Normal file
@@ -0,0 +1,5 @@
|
|||||||
|
# These are supported funding model platforms
|
||||||
|
|
||||||
|
github: tiann
|
||||||
|
patreon: weishu
|
||||||
|
custom: https://vxposed.com/donate.html
|
||||||
2
.github/ISSUE_TEMPLATE/add_device.yml
vendored
2
.github/ISSUE_TEMPLATE/add_device.yml
vendored
@@ -6,7 +6,7 @@ body:
|
|||||||
- type: markdown
|
- type: markdown
|
||||||
attributes:
|
attributes:
|
||||||
value: |
|
value: |
|
||||||
Thanks for supporting KernelSU !
|
Thanks for supporting KernelSU!
|
||||||
- type: input
|
- type: input
|
||||||
id: repo-url
|
id: repo-url
|
||||||
attributes:
|
attributes:
|
||||||
|
|||||||
32
.github/ISSUE_TEMPLATE/bug_report.md
vendored
32
.github/ISSUE_TEMPLATE/bug_report.md
vendored
@@ -1,32 +0,0 @@
|
|||||||
---
|
|
||||||
name: Bug report
|
|
||||||
about: Create a report to help us improve
|
|
||||||
title: ''
|
|
||||||
labels: ''
|
|
||||||
assignees: ''
|
|
||||||
|
|
||||||
---
|
|
||||||
|
|
||||||
**Describe the bug**
|
|
||||||
A clear and concise description of what the bug is.
|
|
||||||
|
|
||||||
**To Reproduce**
|
|
||||||
Steps to reproduce the behavior:
|
|
||||||
1. Go to '...'
|
|
||||||
2. Click on '....'
|
|
||||||
3. Scroll down to '....'
|
|
||||||
4. See error
|
|
||||||
|
|
||||||
**Expected behavior**
|
|
||||||
A clear and concise description of what you expected to happen.
|
|
||||||
|
|
||||||
**Screenshots**
|
|
||||||
If applicable, add screenshots to help explain your problem.
|
|
||||||
|
|
||||||
**Smartphone (please complete the following information):**
|
|
||||||
- Device: [e.g. iPhone6]
|
|
||||||
- OS: [e.g. iOS8.1]
|
|
||||||
- Version [e.g. 22]
|
|
||||||
|
|
||||||
**Additional context**
|
|
||||||
Add any other context about the problem here.
|
|
||||||
72
.github/ISSUE_TEMPLATE/bug_report.yml
vendored
Normal file
72
.github/ISSUE_TEMPLATE/bug_report.yml
vendored
Normal file
@@ -0,0 +1,72 @@
|
|||||||
|
name: Bug report
|
||||||
|
description: Create a report to help us improve KernelSU
|
||||||
|
labels: [Bug]
|
||||||
|
|
||||||
|
body:
|
||||||
|
- type: checkboxes
|
||||||
|
attributes:
|
||||||
|
label: Please check before submitting an issue
|
||||||
|
options:
|
||||||
|
- label: I have searched the issues and haven't found anything relevant
|
||||||
|
required: true
|
||||||
|
|
||||||
|
- label: I will upload bugreport file in KernelSU Manager - Settings - Report log
|
||||||
|
required: true
|
||||||
|
|
||||||
|
- label: I know how to reproduce the issue which may not be specific to my device
|
||||||
|
required: false
|
||||||
|
|
||||||
|
|
||||||
|
- type: textarea
|
||||||
|
attributes:
|
||||||
|
label: Describe the bug
|
||||||
|
description: A clear and concise description of what the bug is
|
||||||
|
validations:
|
||||||
|
required: true
|
||||||
|
|
||||||
|
|
||||||
|
- type: textarea
|
||||||
|
attributes:
|
||||||
|
label: To Reproduce
|
||||||
|
description: Steps to reproduce the behaviour
|
||||||
|
placeholder: |
|
||||||
|
- 1. Go to '...'
|
||||||
|
- 2. Click on '....'
|
||||||
|
- 3. Scroll down to '....'
|
||||||
|
- 4. See error
|
||||||
|
|
||||||
|
|
||||||
|
- type: textarea
|
||||||
|
attributes:
|
||||||
|
label: Expected behavior
|
||||||
|
description: A clear and concise description of what you expected to happen.
|
||||||
|
|
||||||
|
|
||||||
|
- type: textarea
|
||||||
|
attributes:
|
||||||
|
label: Screenshots
|
||||||
|
description: If applicable, add screenshots to help explain your problem.
|
||||||
|
|
||||||
|
|
||||||
|
- type: textarea
|
||||||
|
attributes:
|
||||||
|
label: Logs
|
||||||
|
description: If applicable, add crash or any other logs to help us figure out the problem.
|
||||||
|
|
||||||
|
|
||||||
|
- type: textarea
|
||||||
|
attributes:
|
||||||
|
label: Device info
|
||||||
|
value: |
|
||||||
|
- Device:
|
||||||
|
- OS Version:
|
||||||
|
- KernelSU Version:
|
||||||
|
- Kernel Version:
|
||||||
|
validations:
|
||||||
|
required: true
|
||||||
|
|
||||||
|
|
||||||
|
- type: textarea
|
||||||
|
attributes:
|
||||||
|
label: Additional context
|
||||||
|
description: Add any other context about the problem here.
|
||||||
10
.github/ISSUE_TEMPLATE/custom.md
vendored
10
.github/ISSUE_TEMPLATE/custom.md
vendored
@@ -1,10 +0,0 @@
|
|||||||
---
|
|
||||||
name: Custom issue template
|
|
||||||
about: Describe this issue template's purpose here.
|
|
||||||
title: ''
|
|
||||||
labels: ''
|
|
||||||
assignees: ''
|
|
||||||
|
|
||||||
---
|
|
||||||
|
|
||||||
|
|
||||||
11
.github/ISSUE_TEMPLATE/custom.yml
vendored
Normal file
11
.github/ISSUE_TEMPLATE/custom.yml
vendored
Normal file
@@ -0,0 +1,11 @@
|
|||||||
|
name: Custom issue template
|
||||||
|
description: WARNING! If you are reporting a bug but use this template, the issue will be closed directly.
|
||||||
|
title: '[Custom]'
|
||||||
|
body:
|
||||||
|
- type: textarea
|
||||||
|
id: description
|
||||||
|
attributes:
|
||||||
|
label: "Describe your problem."
|
||||||
|
validations:
|
||||||
|
required: true
|
||||||
|
|
||||||
20
.github/ISSUE_TEMPLATE/feature_request.md
vendored
20
.github/ISSUE_TEMPLATE/feature_request.md
vendored
@@ -1,20 +0,0 @@
|
|||||||
---
|
|
||||||
name: Feature request
|
|
||||||
about: Suggest an idea for this project
|
|
||||||
title: ''
|
|
||||||
labels: ''
|
|
||||||
assignees: ''
|
|
||||||
|
|
||||||
---
|
|
||||||
|
|
||||||
**Is your feature request related to a problem? Please describe.**
|
|
||||||
A clear and concise description of what the problem is. Ex. I'm always frustrated when [...]
|
|
||||||
|
|
||||||
**Describe the solution you'd like**
|
|
||||||
A clear and concise description of what you want to happen.
|
|
||||||
|
|
||||||
**Describe alternatives you've considered**
|
|
||||||
A clear and concise description of any alternative solutions or features you've considered.
|
|
||||||
|
|
||||||
**Additional context**
|
|
||||||
Add any other context or screenshots about the feature request here.
|
|
||||||
40
.github/ISSUE_TEMPLATE/feature_request.yml
vendored
Normal file
40
.github/ISSUE_TEMPLATE/feature_request.yml
vendored
Normal file
@@ -0,0 +1,40 @@
|
|||||||
|
name: Feature Request
|
||||||
|
description: "Suggest an idea for this project"
|
||||||
|
title: "[Feature]"
|
||||||
|
labels: "feature"
|
||||||
|
assignees: tiann
|
||||||
|
body:
|
||||||
|
- type: markdown
|
||||||
|
id: feature-info
|
||||||
|
attributes:
|
||||||
|
value: "## Feature Infomation"
|
||||||
|
- type: textarea
|
||||||
|
id: feature-main
|
||||||
|
validations:
|
||||||
|
required: true
|
||||||
|
attributes:
|
||||||
|
label: "Is your feature request related to a problem? Please describe."
|
||||||
|
description: "A clear and concise description of what the problem is."
|
||||||
|
placeholder: "I'm always frustrated when [...]"
|
||||||
|
- type: textarea
|
||||||
|
id: feature-solution
|
||||||
|
validations:
|
||||||
|
required: true
|
||||||
|
attributes:
|
||||||
|
label: "Describe the solution you'd like."
|
||||||
|
description: "A clear and concise description of what you want to happen."
|
||||||
|
- type: textarea
|
||||||
|
id: feature-describe
|
||||||
|
validations:
|
||||||
|
required: true
|
||||||
|
attributes:
|
||||||
|
label: "Describe alternatives you've considered."
|
||||||
|
description: "A clear and concise description of any alternative solutions or features you've considered."
|
||||||
|
- type: textarea
|
||||||
|
id: feature-extra
|
||||||
|
validations:
|
||||||
|
required: false
|
||||||
|
attributes:
|
||||||
|
label: "Additional context"
|
||||||
|
description: "Add any other context or screenshots about the feature request here."
|
||||||
|
|
||||||
@@ -1,48 +0,0 @@
|
|||||||
From f1e398602b989ac197cdd0fda4a7c4c323b03eb9 Mon Sep 17 00:00:00 2001
|
|
||||||
From: DozNaka <dozdguide@gmail.com>
|
|
||||||
Date: Mon, 11 Apr 2022 20:43:45 -0400
|
|
||||||
Subject: [PATCH] Makefile: Use CCACHE for faster compilation
|
|
||||||
|
|
||||||
---
|
|
||||||
Makefile | 20 ++++++++++----------
|
|
||||||
1 file changed, 10 insertions(+), 10 deletions(-)
|
|
||||||
|
|
||||||
diff --git a/Makefile b/Makefile
|
|
||||||
index e8b8d5894..51e8aac6e 100644
|
|
||||||
--- a/Makefile
|
|
||||||
+++ b/Makefile
|
|
||||||
@@ -442,21 +442,21 @@ KBUILD_HOSTLDLIBS := $(HOST_LFS_LIBS) $(HOSTLDLIBS)
|
|
||||||
# Make variables (CC, etc...)
|
|
||||||
CPP = $(CC) -E
|
|
||||||
ifneq ($(LLVM),)
|
|
||||||
-CC = clang
|
|
||||||
-LD = ld.lld
|
|
||||||
-AR = llvm-ar
|
|
||||||
+CC = $(CCACHE) clang
|
|
||||||
+LD = $(CCACHE) ld.lld
|
|
||||||
+AR = $(CCACHE) llvm-ar
|
|
||||||
NM = llvm-nm
|
|
||||||
-OBJCOPY = llvm-objcopy
|
|
||||||
-OBJDUMP = llvm-objdump
|
|
||||||
+OBJCOPY = $(CCACHE) llvm-objcopy
|
|
||||||
+OBJDUMP = $(CCACHE) llvm-objdump
|
|
||||||
READELF = llvm-readelf
|
|
||||||
STRIP = llvm-strip
|
|
||||||
else
|
|
||||||
-CC = $(CROSS_COMPILE)gcc
|
|
||||||
-LD = $(CROSS_COMPILE)ld
|
|
||||||
-AR = $(CROSS_COMPILE)ar
|
|
||||||
+CC = $(CCACHE) $(CROSS_COMPILE)gcc
|
|
||||||
+LD = $(CCACHE) $(CROSS_COMPILE)ld
|
|
||||||
+AR = $(CCACHE) $(CROSS_COMPILE)ar
|
|
||||||
NM = $(CROSS_COMPILE)nm
|
|
||||||
-OBJCOPY = $(CROSS_COMPILE)objcopy
|
|
||||||
-OBJDUMP = $(CROSS_COMPILE)objdump
|
|
||||||
+OBJCOPY = $(CCACHE) $(CROSS_COMPILE)objcopy
|
|
||||||
+OBJDUMP = $(CCACHE) $(CROSS_COMPILE)objdump
|
|
||||||
READELF = $(CROSS_COMPILE)readelf
|
|
||||||
STRIP = $(CROSS_COMPILE)strip
|
|
||||||
endif
|
|
||||||
--
|
|
||||||
2.37.2
|
|
||||||
|
|
||||||
@@ -1,43 +0,0 @@
|
|||||||
From dbdd2906c0b3a967ca28c6b870b46f905c170661 Mon Sep 17 00:00:00 2001
|
|
||||||
From: Park Ju Hyung <qkrwngud825@gmail.com>
|
|
||||||
Date: Wed, 13 Mar 2019 13:36:37 +0900
|
|
||||||
Subject: [PATCH] setlocalversion: don't check for uncommitted changes
|
|
||||||
|
|
||||||
I ofter push after the build is done and I hate seeing "-dirty"
|
|
||||||
|
|
||||||
Signed-off-by: Park Ju Hyung <qkrwngud825@gmail.com>
|
|
||||||
Signed-off-by: Danny Lin <danny@kdrag0n.dev>
|
|
||||||
Signed-off-by: Divyanshu-Modi <divyan.m05@gmail.com>
|
|
||||||
Change-Id: I240c516520879da680794fd144b1f273f9e21e13
|
|
||||||
Signed-off-by: Divyanshu-Modi <divyan.m05@gmail.com>
|
|
||||||
---
|
|
||||||
scripts/setlocalversion | 13 -------------
|
|
||||||
1 file changed, 13 deletions(-)
|
|
||||||
|
|
||||||
diff --git a/scripts/setlocalversion b/scripts/setlocalversion
|
|
||||||
index 842936656b84..ef27a273ebf5 100755
|
|
||||||
--- a/scripts/setlocalversion
|
|
||||||
+++ b/scripts/setlocalversion
|
|
||||||
@@ -107,19 +107,6 @@ scm_version()
|
|
||||||
printf -- '-svn%s' "$(git svn find-rev $head)"
|
|
||||||
fi
|
|
||||||
|
|
||||||
- # Check for uncommitted changes.
|
|
||||||
- # First, with git-status, but --no-optional-locks is only
|
|
||||||
- # supported in git >= 2.14, so fall back to git-diff-index if
|
|
||||||
- # it fails. Note that git-diff-index does not refresh the
|
|
||||||
- # index, so it may give misleading results. See
|
|
||||||
- # git-update-index(1), git-diff-index(1), and git-status(1).
|
|
||||||
- if {
|
|
||||||
- git --no-optional-locks status -uno --porcelain 2>/dev/null ||
|
|
||||||
- git diff-index --name-only HEAD
|
|
||||||
- } | grep -qvE '^(.. )?scripts/package'; then
|
|
||||||
- printf '%s' -dirty
|
|
||||||
- fi
|
|
||||||
-
|
|
||||||
# All done with git
|
|
||||||
return
|
|
||||||
fi
|
|
||||||
--
|
|
||||||
2.37.2
|
|
||||||
|
|
||||||
@@ -1,48 +0,0 @@
|
|||||||
From f1e398602b989ac197cdd0fda4a7c4c323b03eb9 Mon Sep 17 00:00:00 2001
|
|
||||||
From: DozNaka <dozdguide@gmail.com>
|
|
||||||
Date: Mon, 11 Apr 2022 20:43:45 -0400
|
|
||||||
Subject: [PATCH] Makefile: Use CCACHE for faster compilation
|
|
||||||
|
|
||||||
---
|
|
||||||
Makefile | 20 ++++++++++----------
|
|
||||||
1 file changed, 10 insertions(+), 10 deletions(-)
|
|
||||||
|
|
||||||
diff --git a/Makefile b/Makefile
|
|
||||||
index e8b8d5894..51e8aac6e 100644
|
|
||||||
--- a/Makefile
|
|
||||||
+++ b/Makefile
|
|
||||||
@@ -442,21 +442,21 @@ KBUILD_HOSTLDLIBS := $(HOST_LFS_LIBS) $(HOSTLDLIBS)
|
|
||||||
# Make variables (CC, etc...)
|
|
||||||
CPP = $(CC) -E
|
|
||||||
ifneq ($(LLVM),)
|
|
||||||
-CC = clang
|
|
||||||
-LD = ld.lld
|
|
||||||
-AR = llvm-ar
|
|
||||||
+CC = $(CCACHE) clang
|
|
||||||
+LD = $(CCACHE) ld.lld
|
|
||||||
+AR = $(CCACHE) llvm-ar
|
|
||||||
NM = llvm-nm
|
|
||||||
-OBJCOPY = llvm-objcopy
|
|
||||||
-OBJDUMP = llvm-objdump
|
|
||||||
+OBJCOPY = $(CCACHE) llvm-objcopy
|
|
||||||
+OBJDUMP = $(CCACHE) llvm-objdump
|
|
||||||
READELF = llvm-readelf
|
|
||||||
STRIP = llvm-strip
|
|
||||||
else
|
|
||||||
-CC = $(CROSS_COMPILE)gcc
|
|
||||||
-LD = $(CROSS_COMPILE)ld
|
|
||||||
-AR = $(CROSS_COMPILE)ar
|
|
||||||
+CC = $(CCACHE) $(CROSS_COMPILE)gcc
|
|
||||||
+LD = $(CCACHE) $(CROSS_COMPILE)ld
|
|
||||||
+AR = $(CCACHE) $(CROSS_COMPILE)ar
|
|
||||||
NM = $(CROSS_COMPILE)nm
|
|
||||||
-OBJCOPY = $(CROSS_COMPILE)objcopy
|
|
||||||
-OBJDUMP = $(CROSS_COMPILE)objdump
|
|
||||||
+OBJCOPY = $(CCACHE) $(CROSS_COMPILE)objcopy
|
|
||||||
+OBJDUMP = $(CCACHE) $(CROSS_COMPILE)objdump
|
|
||||||
READELF = $(CROSS_COMPILE)readelf
|
|
||||||
STRIP = $(CROSS_COMPILE)strip
|
|
||||||
endif
|
|
||||||
--
|
|
||||||
2.37.2
|
|
||||||
|
|
||||||
@@ -1,46 +0,0 @@
|
|||||||
From bbb9e7fb1ccadac47b58ba615e6874ddeaa9e628 Mon Sep 17 00:00:00 2001
|
|
||||||
From: Park Ju Hyung <qkrwngud825@gmail.com>
|
|
||||||
Date: Wed, 13 Mar 2019 13:36:37 +0900
|
|
||||||
Subject: [PATCH] setlocalversion: don't check for uncommitted changes
|
|
||||||
|
|
||||||
I ofter push after the build is done and I hate seeing "-dirty"
|
|
||||||
|
|
||||||
Signed-off-by: Park Ju Hyung <qkrwngud825@gmail.com>
|
|
||||||
Signed-off-by: Danny Lin <danny@kdrag0n.dev>
|
|
||||||
Signed-off-by: Divyanshu-Modi <divyan.m05@gmail.com>
|
|
||||||
Change-Id: I240c516520879da680794fd144b1f273f9e21e13
|
|
||||||
Signed-off-by: Divyanshu-Modi <divyan.m05@gmail.com>
|
|
||||||
---
|
|
||||||
scripts/setlocalversion | 16 ----------------
|
|
||||||
1 file changed, 16 deletions(-)
|
|
||||||
|
|
||||||
diff --git a/scripts/setlocalversion b/scripts/setlocalversion
|
|
||||||
index 1b733ae4c..2a3ea7684 100755
|
|
||||||
--- a/scripts/setlocalversion
|
|
||||||
+++ b/scripts/setlocalversion
|
|
||||||
@@ -90,22 +90,6 @@ scm_version()
|
|
||||||
printf '%s%s' -g "$(echo $head | cut -c1-12)"
|
|
||||||
fi
|
|
||||||
|
|
||||||
- # Check for uncommitted changes.
|
|
||||||
- # This script must avoid any write attempt to the source tree,
|
|
||||||
- # which might be read-only.
|
|
||||||
- # You cannot use 'git describe --dirty' because it tries to
|
|
||||||
- # create .git/index.lock .
|
|
||||||
- # First, with git-status, but --no-optional-locks is only
|
|
||||||
- # supported in git >= 2.14, so fall back to git-diff-index if
|
|
||||||
- # it fails. Note that git-diff-index does not refresh the
|
|
||||||
- # index, so it may give misleading results. See
|
|
||||||
- # git-update-index(1), git-diff-index(1), and git-status(1).
|
|
||||||
- if {
|
|
||||||
- git --no-optional-locks status -uno --porcelain 2>/dev/null ||
|
|
||||||
- git diff-index --name-only HEAD
|
|
||||||
- } | read dummy; then
|
|
||||||
- printf '%s' -dirty
|
|
||||||
- fi
|
|
||||||
fi
|
|
||||||
}
|
|
||||||
|
|
||||||
--
|
|
||||||
2.37.2
|
|
||||||
|
|
||||||
10
.github/scripts/build_a12.sh
vendored
10
.github/scripts/build_a12.sh
vendored
@@ -11,7 +11,15 @@ build_from_image() {
|
|||||||
echo "[+] patch level: $PATCH_LEVEL"
|
echo "[+] patch level: $PATCH_LEVEL"
|
||||||
|
|
||||||
echo '[+] Download prebuilt ramdisk'
|
echo '[+] Download prebuilt ramdisk'
|
||||||
curl -Lo gki-kernel.zip https://dl.google.com/android/gki/gki-certified-boot-android12-5.10-"${PATCH_LEVEL}"_r1.zip
|
GKI_URL=https://dl.google.com/android/gki/gki-certified-boot-android12-5.10-"${PATCH_LEVEL}"_r1.zip
|
||||||
|
FALLBACK_URL=https://dl.google.com/android/gki/gki-certified-boot-android12-5.10-2023-01_r1.zip
|
||||||
|
status=$(curl -sL -w "%{http_code}" "$GKI_URL" -o /dev/null)
|
||||||
|
if [ "$status" = "200" ]; then
|
||||||
|
curl -Lo gki-kernel.zip "$GKI_URL"
|
||||||
|
else
|
||||||
|
echo "[+] $GKI_URL not found, using $FALLBACK_URL"
|
||||||
|
curl -Lo gki-kernel.zip "$FALLBACK_URL"
|
||||||
|
fi
|
||||||
unzip gki-kernel.zip && rm gki-kernel.zip
|
unzip gki-kernel.zip && rm gki-kernel.zip
|
||||||
|
|
||||||
echo '[+] Unpack prebuilt boot.img'
|
echo '[+] Unpack prebuilt boot.img'
|
||||||
|
|||||||
8
.github/workflows/add-device.yml
vendored
8
.github/workflows/add-device.yml
vendored
@@ -11,7 +11,7 @@ jobs:
|
|||||||
env:
|
env:
|
||||||
ISSUE_CONTENT: ${{ github.event.issue.body }}
|
ISSUE_CONTENT: ${{ github.event.issue.body }}
|
||||||
steps:
|
steps:
|
||||||
- uses: actions/checkout@v3
|
- uses: actions/checkout@v4
|
||||||
- name: Parse issue body
|
- name: Parse issue body
|
||||||
id: handle-add-device
|
id: handle-add-device
|
||||||
run: |
|
run: |
|
||||||
@@ -42,12 +42,12 @@ jobs:
|
|||||||
run: |
|
run: |
|
||||||
echo "Pull Request Number - ${{ steps.cpr.outputs.pull-request-number }}"
|
echo "Pull Request Number - ${{ steps.cpr.outputs.pull-request-number }}"
|
||||||
echo "Pull Request URL - ${{ steps.cpr.outputs.pull-request-url }}"
|
echo "Pull Request URL - ${{ steps.cpr.outputs.pull-request-url }}"
|
||||||
- uses: ben-z/actions-comment-on-issue@1.0.2
|
- uses: Kernel-SU/actions-comment-on-issue@master
|
||||||
if: ${{ steps.cpr.outputs.pull-request-number }}
|
if: ${{ steps.cpr.outputs.pull-request-number }}
|
||||||
with:
|
with:
|
||||||
message: "Automatically created pull request: ${{ steps.cpr.outputs.pull-request-url }}"
|
message: "Automatically created pull request: ${{ steps.cpr.outputs.pull-request-url }}"
|
||||||
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
|
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
|
||||||
- uses: ben-z/actions-comment-on-issue@1.0.2
|
- uses: Kernel-SU/actions-comment-on-issue@master
|
||||||
if: steps.handle-add-device.outputs.success != 'true'
|
if: steps.handle-add-device.outputs.success != 'true'
|
||||||
with:
|
with:
|
||||||
message: "Cannot create pull request. Please check the issue content. Or you can create a pull request manually."
|
message: "Cannot create pull request. Please check the issue content. Or you can create a pull request manually."
|
||||||
@@ -56,4 +56,4 @@ jobs:
|
|||||||
uses: peter-evans/close-issue@v1
|
uses: peter-evans/close-issue@v1
|
||||||
with:
|
with:
|
||||||
issue-number: ${{ github.event.issue.number }}
|
issue-number: ${{ github.event.issue.number }}
|
||||||
token: ${{ secrets.GITHUB_TOKEN }}
|
token: ${{ secrets.GITHUB_TOKEN }}
|
||||||
|
|||||||
31
.github/workflows/build-debug-kernel.yml
vendored
Normal file
31
.github/workflows/build-debug-kernel.yml
vendored
Normal file
@@ -0,0 +1,31 @@
|
|||||||
|
name: Build debug kernel
|
||||||
|
on:
|
||||||
|
workflow_dispatch:
|
||||||
|
|
||||||
|
jobs:
|
||||||
|
build-debug-kernel-a12:
|
||||||
|
uses: ./.github/workflows/gki-kernel.yml
|
||||||
|
with:
|
||||||
|
version: android12-5.10
|
||||||
|
version_name: android12-5.10.185
|
||||||
|
tag: android12-5.10-2023-09
|
||||||
|
os_patch_level: 2023-09
|
||||||
|
patch_path: "5.10"
|
||||||
|
debug: true
|
||||||
|
build-debug-kernel-a13:
|
||||||
|
strategy:
|
||||||
|
matrix:
|
||||||
|
include:
|
||||||
|
- version: "5.10"
|
||||||
|
sub_level: 187
|
||||||
|
os_patch_level: 2023-08
|
||||||
|
- version: "5.15"
|
||||||
|
sub_level: 119
|
||||||
|
os_patch_level: 2023-09
|
||||||
|
uses: ./.github/workflows/gki-kernel.yml
|
||||||
|
with:
|
||||||
|
version: android13-${{ matrix.version }}
|
||||||
|
version_name: android13-${{ matrix.version }}.${{ matrix.sub_level }}
|
||||||
|
tag: android13-${{ matrix.version }}-${{ matrix.os_patch_level }}
|
||||||
|
patch_path: ${{ matrix.version }}
|
||||||
|
debug: true
|
||||||
46
.github/workflows/build-kernel-a12.yml
vendored
46
.github/workflows/build-kernel-a12.yml
vendored
@@ -1,7 +1,7 @@
|
|||||||
name: Build Kernel - Android 12
|
name: Build Kernel - Android 12
|
||||||
on:
|
on:
|
||||||
push:
|
push:
|
||||||
branches: ["main", "ci"]
|
branches: ["main", "ci", "checkci"]
|
||||||
paths:
|
paths:
|
||||||
- ".github/workflows/build-kernel-a12.yml"
|
- ".github/workflows/build-kernel-a12.yml"
|
||||||
- ".github/workflows/gki-kernel.yml"
|
- ".github/workflows/gki-kernel.yml"
|
||||||
@@ -17,24 +17,34 @@ on:
|
|||||||
workflow_call:
|
workflow_call:
|
||||||
jobs:
|
jobs:
|
||||||
build-kernel:
|
build-kernel:
|
||||||
if: github.event_name != 'pull_request'
|
if: github.event_name != 'pull_request' && github.ref != 'refs/heads/checkci'
|
||||||
strategy:
|
strategy:
|
||||||
matrix:
|
matrix:
|
||||||
include:
|
include:
|
||||||
- sub_level: 66
|
- sub_level: 66
|
||||||
os_patch_level: 2021-11
|
os_patch_level: 2022-01
|
||||||
- sub_level: 81
|
- sub_level: 81
|
||||||
os_patch_level: 2022-03
|
os_patch_level: 2022-03
|
||||||
- sub_level: 101
|
- sub_level: 101
|
||||||
os_patch_level: 2022-05
|
os_patch_level: 2022-05
|
||||||
- sub_level: 110
|
- sub_level: 110
|
||||||
os_patch_level: 2022-07
|
os_patch_level: 2022-07
|
||||||
|
- sub_level: 117
|
||||||
|
os_patch_level: 2022-09
|
||||||
- sub_level: 136
|
- sub_level: 136
|
||||||
os_patch_level: 2022-11
|
os_patch_level: 2022-11
|
||||||
- sub_level: 149
|
- sub_level: 149
|
||||||
os_patch_level: 2023-01
|
os_patch_level: 2023-01
|
||||||
- sub_level: 160
|
- sub_level: 160
|
||||||
os_patch_level: 2023-02
|
os_patch_level: 2023-03
|
||||||
|
- sub_level: 168
|
||||||
|
os_patch_level: 2023-05
|
||||||
|
- sub_level: 177
|
||||||
|
os_patch_level: 2023-07
|
||||||
|
- sub_level: 185
|
||||||
|
os_patch_level: 2023-09
|
||||||
|
- sub_level: 198
|
||||||
|
os_patch_level: 2023-11
|
||||||
uses: ./.github/workflows/gki-kernel.yml
|
uses: ./.github/workflows/gki-kernel.yml
|
||||||
secrets: inherit
|
secrets: inherit
|
||||||
with:
|
with:
|
||||||
@@ -43,13 +53,13 @@ jobs:
|
|||||||
tag: android12-5.10-${{ matrix.os_patch_level }}
|
tag: android12-5.10-${{ matrix.os_patch_level }}
|
||||||
os_patch_level: ${{ matrix.os_patch_level }}
|
os_patch_level: ${{ matrix.os_patch_level }}
|
||||||
patch_path: "5.10"
|
patch_path: "5.10"
|
||||||
|
|
||||||
upload-artifacts:
|
upload-artifacts:
|
||||||
needs: build-kernel
|
needs: build-kernel
|
||||||
runs-on: ubuntu-latest
|
runs-on: ubuntu-latest
|
||||||
if: ${{ ( github.event_name != 'pull_request' && github.ref == 'refs/heads/main' ) || github.ref_type == 'tag' || github.ref == 'refs/heads/ci' }}
|
if: ${{ ( github.event_name != 'pull_request' && github.ref == 'refs/heads/main' ) || github.ref_type == 'tag' || github.ref == 'refs/heads/ci' }}
|
||||||
env:
|
env:
|
||||||
CHAT_ID: ${{ secrets.CHAT_ID }}
|
CHAT_ID: ${{ secrets.CHAT_ID }}
|
||||||
CACHE_CHAT_ID: ${{ secrets.CACHE_CHAT_ID }}
|
|
||||||
BOT_TOKEN: ${{ secrets.BOT_TOKEN }}
|
BOT_TOKEN: ${{ secrets.BOT_TOKEN }}
|
||||||
MESSAGE_THREAD_ID: ${{ secrets.MESSAGE_THREAD_ID }}
|
MESSAGE_THREAD_ID: ${{ secrets.MESSAGE_THREAD_ID }}
|
||||||
COMMIT_MESSAGE: ${{ github.event.head_commit.message }}
|
COMMIT_MESSAGE: ${{ github.event.head_commit.message }}
|
||||||
@@ -57,9 +67,9 @@ jobs:
|
|||||||
RUN_URL: ${{ github.server_url }}/${{ github.repository }}/actions/runs/${{ github.run_id }}
|
RUN_URL: ${{ github.server_url }}/${{ github.repository }}/actions/runs/${{ github.run_id }}
|
||||||
steps:
|
steps:
|
||||||
- name: Download artifacts
|
- name: Download artifacts
|
||||||
uses: actions/download-artifact@v3
|
uses: actions/download-artifact@v4
|
||||||
|
|
||||||
- uses: actions/checkout@v3
|
- uses: actions/checkout@v4
|
||||||
with:
|
with:
|
||||||
path: KernelSU
|
path: KernelSU
|
||||||
fetch-depth: 0
|
fetch-depth: 0
|
||||||
@@ -71,11 +81,11 @@ jobs:
|
|||||||
- name: Download prebuilt toolchain
|
- name: Download prebuilt toolchain
|
||||||
run: |
|
run: |
|
||||||
AOSP_MIRROR=https://android.googlesource.com
|
AOSP_MIRROR=https://android.googlesource.com
|
||||||
BRANCH=master-kernel-build-2022
|
BRANCH=main-kernel-build-2023
|
||||||
git clone $AOSP_MIRROR/platform/prebuilts/build-tools -b $BRANCH --depth 1 build-tools
|
git clone $AOSP_MIRROR/platform/prebuilts/build-tools -b $BRANCH --depth 1 build-tools
|
||||||
git clone $AOSP_MIRROR/kernel/prebuilts/build-tools -b $BRANCH --depth 1 kernel-build-tools
|
git clone $AOSP_MIRROR/kernel/prebuilts/build-tools -b $BRANCH --depth 1 kernel-build-tools
|
||||||
git clone $AOSP_MIRROR/platform/system/tools/mkbootimg -b $BRANCH --depth 1
|
git clone $AOSP_MIRROR/platform/system/tools/mkbootimg -b $BRANCH --depth 1
|
||||||
pip3 install python-telegram-bot
|
pip3 install telethon==1.31.1
|
||||||
|
|
||||||
- name: Set boot sign key
|
- name: Set boot sign key
|
||||||
env:
|
env:
|
||||||
@@ -85,8 +95,12 @@ jobs:
|
|||||||
echo "$BOOT_SIGN_KEY" > ./kernel-build-tools/linux-x86/share/avb/testkey_rsa2048.pem
|
echo "$BOOT_SIGN_KEY" > ./kernel-build-tools/linux-x86/share/avb/testkey_rsa2048.pem
|
||||||
fi
|
fi
|
||||||
|
|
||||||
- name: Setup mutex for uploading
|
- name: Bot session cache
|
||||||
uses: ben-z/gh-action-mutex@v1.0-alpha-7
|
id: bot_session_cache
|
||||||
|
uses: actions/cache@v3
|
||||||
|
with:
|
||||||
|
path: scripts/ksubot.session
|
||||||
|
key: ${{ runner.os }}-bot-session
|
||||||
|
|
||||||
- name: Build boot images
|
- name: Build boot images
|
||||||
run: |
|
run: |
|
||||||
@@ -105,17 +119,17 @@ jobs:
|
|||||||
run: ls -R
|
run: ls -R
|
||||||
|
|
||||||
- name: Upload images artifact
|
- name: Upload images artifact
|
||||||
uses: actions/upload-artifact@v3
|
uses: actions/upload-artifact@v4
|
||||||
with:
|
with:
|
||||||
name: boot-images-android12
|
name: boot-images-android12
|
||||||
path: Image-android12*/*.img.gz
|
path: Image-android12*/*.img.gz
|
||||||
|
|
||||||
check-build-kernel:
|
check-build-kernel:
|
||||||
if: github.event_name == 'pull_request'
|
if: (github.event_name == 'pull_request' && !github.event.pull_request.draft) || github.ref == 'refs/heads/checkci'
|
||||||
uses: ./.github/workflows/gki-kernel.yml
|
uses: ./.github/workflows/gki-kernel.yml
|
||||||
with:
|
with:
|
||||||
version: android12-5.10
|
version: android12-5.10
|
||||||
version_name: android12-5.10.160
|
version_name: android12-5.10.177
|
||||||
tag: android12-5.10-2023-02
|
tag: android12-5.10-2023-06
|
||||||
os_patch_level: 2023-02
|
os_patch_level: 2023-06
|
||||||
patch_path: "5.10"
|
patch_path: "5.10"
|
||||||
|
|||||||
77
.github/workflows/build-kernel-a13.yml
vendored
77
.github/workflows/build-kernel-a13.yml
vendored
@@ -1,7 +1,7 @@
|
|||||||
name: Build Kernel - Android 13
|
name: Build Kernel - Android 13
|
||||||
on:
|
on:
|
||||||
push:
|
push:
|
||||||
branches: ["main", "ci"]
|
branches: ["main", "ci", "checkci"]
|
||||||
paths:
|
paths:
|
||||||
- ".github/workflows/build-kernel-a13.yml"
|
- ".github/workflows/build-kernel-a13.yml"
|
||||||
- ".github/workflows/gki-kernel.yml"
|
- ".github/workflows/gki-kernel.yml"
|
||||||
@@ -17,7 +17,7 @@ on:
|
|||||||
workflow_call:
|
workflow_call:
|
||||||
jobs:
|
jobs:
|
||||||
build-kernel:
|
build-kernel:
|
||||||
if: github.event_name != 'pull_request'
|
if: github.event_name != 'pull_request' && github.ref != 'refs/heads/checkci'
|
||||||
strategy:
|
strategy:
|
||||||
matrix:
|
matrix:
|
||||||
include:
|
include:
|
||||||
@@ -29,7 +29,25 @@ jobs:
|
|||||||
os_patch_level: 2023-01
|
os_patch_level: 2023-01
|
||||||
- version: "5.10"
|
- version: "5.10"
|
||||||
sub_level: 157
|
sub_level: 157
|
||||||
os_patch_level: 2023-02
|
os_patch_level: 2023-03
|
||||||
|
- version: "5.10"
|
||||||
|
sub_level: 168
|
||||||
|
os_patch_level: 2023-05
|
||||||
|
- version: "5.10"
|
||||||
|
sub_level: 177
|
||||||
|
os_patch_level: 2023-06
|
||||||
|
- version: "5.10"
|
||||||
|
sub_level: 186
|
||||||
|
os_patch_level: 2023-08
|
||||||
|
- version: "5.10"
|
||||||
|
sub_level: 186
|
||||||
|
os_patch_level: 2023-09
|
||||||
|
- version: "5.10"
|
||||||
|
sub_level: 189
|
||||||
|
os_patch_level: 2023-11
|
||||||
|
- version: "5.10"
|
||||||
|
sub_level: 198
|
||||||
|
os_patch_level: 2023-12
|
||||||
- version: "5.15"
|
- version: "5.15"
|
||||||
sub_level: 41
|
sub_level: 41
|
||||||
os_patch_level: 2022-11
|
os_patch_level: 2022-11
|
||||||
@@ -38,21 +56,37 @@ jobs:
|
|||||||
os_patch_level: 2023-01
|
os_patch_level: 2023-01
|
||||||
- version: "5.15"
|
- version: "5.15"
|
||||||
sub_level: 78
|
sub_level: 78
|
||||||
os_patch_level: 2023-02
|
os_patch_level: 2023-03
|
||||||
|
- version: "5.15"
|
||||||
|
sub_level: 94
|
||||||
|
os_patch_level: 2023-05
|
||||||
|
- version: "5.15"
|
||||||
|
sub_level: 104
|
||||||
|
os_patch_level: 2023-07
|
||||||
|
- version: "5.15"
|
||||||
|
sub_level: 119
|
||||||
|
os_patch_level: 2023-09
|
||||||
|
- version: "5.15"
|
||||||
|
sub_level: 123
|
||||||
|
os_patch_level: 2023-11
|
||||||
|
- version: "5.15"
|
||||||
|
sub_level: 137
|
||||||
|
os_patch_level: 2023-12
|
||||||
uses: ./.github/workflows/gki-kernel.yml
|
uses: ./.github/workflows/gki-kernel.yml
|
||||||
secrets: inherit
|
secrets: inherit
|
||||||
with:
|
with:
|
||||||
version: android13-${{ matrix.version }}
|
version: android13-${{ matrix.version }}
|
||||||
version_name: android13-${{ matrix.version }}.${{ matrix.sub_level }}
|
version_name: android13-${{ matrix.version }}.${{ matrix.sub_level }}
|
||||||
tag: android13-${{ matrix.version }}-${{ matrix.os_patch_level }}
|
tag: android13-${{ matrix.version }}-${{ matrix.os_patch_level }}
|
||||||
|
os_patch_level: ${{ matrix.os_patch_level }}
|
||||||
patch_path: ${{ matrix.version }}
|
patch_path: ${{ matrix.version }}
|
||||||
|
|
||||||
upload-artifacts:
|
upload-artifacts:
|
||||||
needs: build-kernel
|
needs: build-kernel
|
||||||
runs-on: ubuntu-latest
|
runs-on: ubuntu-latest
|
||||||
if: ${{ ( github.event_name != 'pull_request' && github.ref == 'refs/heads/main' ) || github.ref_type == 'tag' || github.ref == 'refs/heads/ci' }}
|
if: ${{ ( github.event_name != 'pull_request' && github.ref == 'refs/heads/main' ) || github.ref_type == 'tag' || github.ref == 'refs/heads/ci' }}
|
||||||
env:
|
env:
|
||||||
CHAT_ID: ${{ secrets.CHAT_ID }}
|
CHAT_ID: ${{ secrets.CHAT_ID }}
|
||||||
CACHE_CHAT_ID: ${{ secrets.CACHE_CHAT_ID }}
|
|
||||||
BOT_TOKEN: ${{ secrets.BOT_TOKEN }}
|
BOT_TOKEN: ${{ secrets.BOT_TOKEN }}
|
||||||
MESSAGE_THREAD_ID: ${{ secrets.MESSAGE_THREAD_ID }}
|
MESSAGE_THREAD_ID: ${{ secrets.MESSAGE_THREAD_ID }}
|
||||||
COMMIT_MESSAGE: ${{ github.event.head_commit.message }}
|
COMMIT_MESSAGE: ${{ github.event.head_commit.message }}
|
||||||
@@ -60,9 +94,9 @@ jobs:
|
|||||||
RUN_URL: ${{ github.server_url }}/${{ github.repository }}/actions/runs/${{ github.run_id }}
|
RUN_URL: ${{ github.server_url }}/${{ github.repository }}/actions/runs/${{ github.run_id }}
|
||||||
steps:
|
steps:
|
||||||
- name: Download artifacts
|
- name: Download artifacts
|
||||||
uses: actions/download-artifact@v3
|
uses: actions/download-artifact@v4
|
||||||
|
|
||||||
- uses: actions/checkout@v3
|
- uses: actions/checkout@v4
|
||||||
with:
|
with:
|
||||||
path: KernelSU
|
path: KernelSU
|
||||||
fetch-depth: 0
|
fetch-depth: 0
|
||||||
@@ -74,11 +108,11 @@ jobs:
|
|||||||
- name: Download prebuilt toolchain
|
- name: Download prebuilt toolchain
|
||||||
run: |
|
run: |
|
||||||
AOSP_MIRROR=https://android.googlesource.com
|
AOSP_MIRROR=https://android.googlesource.com
|
||||||
BRANCH=master-kernel-build-2022
|
BRANCH=main-kernel-build-2023
|
||||||
git clone $AOSP_MIRROR/platform/prebuilts/build-tools -b $BRANCH --depth 1 build-tools
|
git clone $AOSP_MIRROR/platform/prebuilts/build-tools -b $BRANCH --depth 1 build-tools
|
||||||
git clone $AOSP_MIRROR/kernel/prebuilts/build-tools -b $BRANCH --depth 1 kernel-build-tools
|
git clone $AOSP_MIRROR/kernel/prebuilts/build-tools -b $BRANCH --depth 1 kernel-build-tools
|
||||||
git clone $AOSP_MIRROR/platform/system/tools/mkbootimg -b $BRANCH --depth 1
|
git clone $AOSP_MIRROR/platform/system/tools/mkbootimg -b $BRANCH --depth 1
|
||||||
pip3 install python-telegram-bot
|
pip3 install telethon==1.31.1
|
||||||
|
|
||||||
- name: Set boot sign key
|
- name: Set boot sign key
|
||||||
env:
|
env:
|
||||||
@@ -88,8 +122,12 @@ jobs:
|
|||||||
echo "$BOOT_SIGN_KEY" > ./kernel-build-tools/linux-x86/share/avb/testkey_rsa2048.pem
|
echo "$BOOT_SIGN_KEY" > ./kernel-build-tools/linux-x86/share/avb/testkey_rsa2048.pem
|
||||||
fi
|
fi
|
||||||
|
|
||||||
- name: Setup mutex for uploading
|
- name: Bot session cache
|
||||||
uses: ben-z/gh-action-mutex@v1.0-alpha-7
|
id: bot_session_cache
|
||||||
|
uses: actions/cache@v3
|
||||||
|
with:
|
||||||
|
path: scripts/ksubot.session
|
||||||
|
key: ${{ runner.os }}-bot-session
|
||||||
|
|
||||||
- name: Build boot images
|
- name: Build boot images
|
||||||
run: |
|
run: |
|
||||||
@@ -103,30 +141,31 @@ jobs:
|
|||||||
echo "VERSION: $VERSION"
|
echo "VERSION: $VERSION"
|
||||||
cd -
|
cd -
|
||||||
bash $GITHUB_WORKSPACE/KernelSU/.github/scripts/build_a13.sh
|
bash $GITHUB_WORKSPACE/KernelSU/.github/scripts/build_a13.sh
|
||||||
|
|
||||||
- name: Display structure of boot files
|
- name: Display structure of boot files
|
||||||
run: ls -R
|
run: ls -R
|
||||||
|
|
||||||
- name: Upload images artifact
|
- name: Upload images artifact
|
||||||
uses: actions/upload-artifact@v3
|
uses: actions/upload-artifact@v4
|
||||||
with:
|
with:
|
||||||
name: boot-images-android13
|
name: boot-images-android13
|
||||||
path: Image-android13*/*.img.gz
|
path: Image-android13*/*.img.gz
|
||||||
|
|
||||||
check-build-kernel:
|
check-build-kernel:
|
||||||
if: github.event_name == 'pull_request'
|
if: (github.event_name == 'pull_request' && !github.event.pull_request.draft) || github.ref == 'refs/heads/checkci'
|
||||||
strategy:
|
strategy:
|
||||||
matrix:
|
matrix:
|
||||||
include:
|
include:
|
||||||
- version: "5.10"
|
- version: "5.10"
|
||||||
sub_level: 149
|
sub_level: 189
|
||||||
os_patch_level: 2022-11
|
os_patch_level: 2023-10
|
||||||
- version: "5.15"
|
- version: "5.15"
|
||||||
sub_level: 74
|
sub_level: 123
|
||||||
os_patch_level: 2023-01
|
os_patch_level: 2023-10
|
||||||
uses: ./.github/workflows/gki-kernel.yml
|
uses: ./.github/workflows/gki-kernel.yml
|
||||||
with:
|
with:
|
||||||
version: android13-${{ matrix.version }}
|
version: android13-${{ matrix.version }}
|
||||||
version_name: android13-${{ matrix.version }}.${{ matrix.sub_level }}
|
version_name: android13-${{ matrix.version }}.${{ matrix.sub_level }}
|
||||||
tag: android13-${{ matrix.version }}-${{ matrix.os_patch_level }}
|
tag: android13-${{ matrix.version }}-${{ matrix.os_patch_level }}
|
||||||
patch_path: ${{ matrix.version }}
|
os_patch_level: ${{ matrix.os_patch_level }}
|
||||||
|
patch_path: ${{ matrix.version }}
|
||||||
|
|||||||
132
.github/workflows/build-kernel-a14.yml
vendored
Normal file
132
.github/workflows/build-kernel-a14.yml
vendored
Normal file
@@ -0,0 +1,132 @@
|
|||||||
|
name: Build Kernel - Android 14
|
||||||
|
on:
|
||||||
|
push:
|
||||||
|
branches: ["main", "ci", "checkci"]
|
||||||
|
paths:
|
||||||
|
- ".github/workflows/build-kernel-a14.yml"
|
||||||
|
- ".github/workflows/gki-kernel.yml"
|
||||||
|
- ".github/scripts/build_a13.sh"
|
||||||
|
- "kernel/**"
|
||||||
|
pull_request:
|
||||||
|
branches: ["main"]
|
||||||
|
paths:
|
||||||
|
- ".github/workflows/build-kernel-a14.yml"
|
||||||
|
- ".github/workflows/gki-kernel.yml"
|
||||||
|
- ".github/scripts/build-a13.sh"
|
||||||
|
- "kernel/**"
|
||||||
|
workflow_call:
|
||||||
|
jobs:
|
||||||
|
build-kernel:
|
||||||
|
if: github.event_name != 'pull_request' && github.ref != 'refs/heads/checkci'
|
||||||
|
strategy:
|
||||||
|
matrix:
|
||||||
|
include:
|
||||||
|
- version: "5.15"
|
||||||
|
sub_level: 110
|
||||||
|
os_patch_level: 2023-09
|
||||||
|
- version: "5.15"
|
||||||
|
sub_level: 131
|
||||||
|
os_patch_level: 2023-11
|
||||||
|
- version: "6.1"
|
||||||
|
sub_level: 25
|
||||||
|
os_patch_level: 2023-10
|
||||||
|
- version: "6.1"
|
||||||
|
sub_level: 43
|
||||||
|
os_patch_level: 2023-11
|
||||||
|
- version: "6.1"
|
||||||
|
sub_level: 57
|
||||||
|
os_patch_level: 2023-12
|
||||||
|
uses: ./.github/workflows/gki-kernel.yml
|
||||||
|
secrets: inherit
|
||||||
|
with:
|
||||||
|
version: android14-${{ matrix.version }}
|
||||||
|
version_name: android14-${{ matrix.version }}.${{ matrix.sub_level }}
|
||||||
|
tag: android14-${{ matrix.version }}-${{ matrix.os_patch_level }}
|
||||||
|
os_patch_level: ${{ matrix.os_patch_level }}
|
||||||
|
patch_path: ${{ matrix.version }}
|
||||||
|
|
||||||
|
upload-artifacts:
|
||||||
|
needs: build-kernel
|
||||||
|
runs-on: ubuntu-latest
|
||||||
|
if: ${{ ( github.event_name != 'pull_request' && github.ref == 'refs/heads/main' ) || github.ref_type == 'tag' || github.ref == 'refs/heads/ci' }}
|
||||||
|
env:
|
||||||
|
CHAT_ID: ${{ secrets.CHAT_ID }}
|
||||||
|
BOT_TOKEN: ${{ secrets.BOT_TOKEN }}
|
||||||
|
MESSAGE_THREAD_ID: ${{ secrets.MESSAGE_THREAD_ID }}
|
||||||
|
COMMIT_MESSAGE: ${{ github.event.head_commit.message }}
|
||||||
|
COMMIT_URL: ${{ github.event.head_commit.url }}
|
||||||
|
RUN_URL: ${{ github.server_url }}/${{ github.repository }}/actions/runs/${{ github.run_id }}
|
||||||
|
steps:
|
||||||
|
- name: Download artifacts
|
||||||
|
uses: actions/download-artifact@v4
|
||||||
|
|
||||||
|
- uses: actions/checkout@v4
|
||||||
|
with:
|
||||||
|
path: KernelSU
|
||||||
|
fetch-depth: 0
|
||||||
|
|
||||||
|
- name: List artifacts
|
||||||
|
run: |
|
||||||
|
tree
|
||||||
|
|
||||||
|
- name: Download prebuilt toolchain
|
||||||
|
run: |
|
||||||
|
AOSP_MIRROR=https://android.googlesource.com
|
||||||
|
BRANCH=main-kernel-build-2023
|
||||||
|
git clone $AOSP_MIRROR/platform/prebuilts/build-tools -b $BRANCH --depth 1 build-tools
|
||||||
|
git clone $AOSP_MIRROR/kernel/prebuilts/build-tools -b $BRANCH --depth 1 kernel-build-tools
|
||||||
|
git clone $AOSP_MIRROR/platform/system/tools/mkbootimg -b $BRANCH --depth 1
|
||||||
|
pip3 install telethon==1.31.1
|
||||||
|
|
||||||
|
- name: Set boot sign key
|
||||||
|
env:
|
||||||
|
BOOT_SIGN_KEY: ${{ secrets.BOOT_SIGN_KEY }}
|
||||||
|
run: |
|
||||||
|
if [ ! -z "$BOOT_SIGN_KEY" ]; then
|
||||||
|
echo "$BOOT_SIGN_KEY" > ./kernel-build-tools/linux-x86/share/avb/testkey_rsa2048.pem
|
||||||
|
fi
|
||||||
|
|
||||||
|
- name: Bot session cache
|
||||||
|
id: bot_session_cache
|
||||||
|
uses: actions/cache@v3
|
||||||
|
with:
|
||||||
|
path: scripts/ksubot.session
|
||||||
|
key: ${{ runner.os }}-bot-session
|
||||||
|
|
||||||
|
- name: Build boot images
|
||||||
|
run: |
|
||||||
|
export AVBTOOL=$GITHUB_WORKSPACE/kernel-build-tools/linux-x86/bin/avbtool
|
||||||
|
export GZIP=$GITHUB_WORKSPACE/build-tools/path/linux-x86/gzip
|
||||||
|
export LZ4=$GITHUB_WORKSPACE/build-tools/path/linux-x86/lz4
|
||||||
|
export MKBOOTIMG=$GITHUB_WORKSPACE/mkbootimg/mkbootimg.py
|
||||||
|
export UNPACK_BOOTIMG=$GITHUB_WORKSPACE/mkbootimg/unpack_bootimg.py
|
||||||
|
cd $GITHUB_WORKSPACE/KernelSU
|
||||||
|
export VERSION=$(($(git rev-list --count HEAD) + 10200))
|
||||||
|
echo "VERSION: $VERSION"
|
||||||
|
cd -
|
||||||
|
bash $GITHUB_WORKSPACE/KernelSU/.github/scripts/build_a13.sh
|
||||||
|
|
||||||
|
- name: Display structure of boot files
|
||||||
|
run: ls -R
|
||||||
|
|
||||||
|
- name: Upload images artifact
|
||||||
|
uses: actions/upload-artifact@v4
|
||||||
|
with:
|
||||||
|
name: boot-images-android14
|
||||||
|
path: Image-android14*/*.img.gz
|
||||||
|
|
||||||
|
check-build-kernel:
|
||||||
|
if: (github.event_name == 'pull_request' && !github.event.pull_request.draft) || github.ref == 'refs/heads/checkci'
|
||||||
|
strategy:
|
||||||
|
matrix:
|
||||||
|
include:
|
||||||
|
- version: "5.15"
|
||||||
|
sub_level: 110
|
||||||
|
os_patch_level: 2023-09
|
||||||
|
uses: ./.github/workflows/gki-kernel.yml
|
||||||
|
with:
|
||||||
|
version: android14-${{ matrix.version }}
|
||||||
|
version_name: android14-${{ matrix.version }}.${{ matrix.sub_level }}
|
||||||
|
tag: android14-${{ matrix.version }}-${{ matrix.os_patch_level }}
|
||||||
|
os_patch_level: ${{ matrix.os_patch_level }}
|
||||||
|
patch_path: ${{ matrix.version }}
|
||||||
148
.github/workflows/build-kernel-arcvm.yml
vendored
Normal file
148
.github/workflows/build-kernel-arcvm.yml
vendored
Normal file
@@ -0,0 +1,148 @@
|
|||||||
|
name: Build Kernel - ChromeOS ARCVM
|
||||||
|
on:
|
||||||
|
push:
|
||||||
|
branches: ["main", "ci", "checkci"]
|
||||||
|
paths:
|
||||||
|
- ".github/workflows/build-kernel-arcvm.yml"
|
||||||
|
- "kernel/**"
|
||||||
|
pull_request:
|
||||||
|
branches: ["main"]
|
||||||
|
paths:
|
||||||
|
- ".github/workflows/build-kernel-arcvm.yml"
|
||||||
|
- "kernel/**"
|
||||||
|
workflow_call:
|
||||||
|
workflow_dispatch:
|
||||||
|
|
||||||
|
jobs:
|
||||||
|
build:
|
||||||
|
if: github.event_name != 'pull_request' || (github.event_name == 'pull_request' && !github.event.pull_request.draft)
|
||||||
|
strategy:
|
||||||
|
matrix:
|
||||||
|
arch: [x86_64]
|
||||||
|
version: ["5.10.178"]
|
||||||
|
include:
|
||||||
|
- arch: x86_64
|
||||||
|
git_tag: chromeos-5.10-arcvm
|
||||||
|
file_name: "bzImage"
|
||||||
|
|
||||||
|
name: Build ChromeOS ARCVM kernel
|
||||||
|
runs-on: ubuntu-20.04
|
||||||
|
env:
|
||||||
|
LTO: thin
|
||||||
|
ROOT_DIR: /
|
||||||
|
KERNEL_DIR: ${{ github.workspace }}/kernel
|
||||||
|
|
||||||
|
steps:
|
||||||
|
- name: Install Build Tools
|
||||||
|
run: |
|
||||||
|
sudo apt-get update
|
||||||
|
sudo apt-get install -y --no-install-recommends bc \
|
||||||
|
bison build-essential ca-certificates flex git gnupg \
|
||||||
|
libelf-dev libssl-dev lsb-release software-properties-common wget \
|
||||||
|
libncurses-dev binutils-aarch64-linux-gnu gcc-aarch64-linux-gnu nuget gzip \
|
||||||
|
rsync python3 device-tree-compiler
|
||||||
|
|
||||||
|
sudo ln -s --force python3 /usr/bin/python
|
||||||
|
|
||||||
|
export LLVM_VERSION=12
|
||||||
|
wget https://apt.llvm.org/llvm.sh
|
||||||
|
chmod +x llvm.sh
|
||||||
|
sudo ./llvm.sh $LLVM_VERSION
|
||||||
|
rm ./llvm.sh
|
||||||
|
sudo ln -s --force /usr/bin/clang-$LLVM_VERSION /usr/bin/clang
|
||||||
|
sudo ln -s --force /usr/bin/ld.lld-$LLVM_VERSION /usr/bin/ld.lld
|
||||||
|
sudo ln -s --force /usr/bin/llvm-objdump-$LLVM_VERSION /usr/bin/llvm-objdump
|
||||||
|
sudo ln -s --force /usr/bin/llvm-ar-$LLVM_VERSION /usr/bin/llvm-ar
|
||||||
|
sudo ln -s --force /usr/bin/llvm-nm-$LLVM_VERSION /usr/bin/llvm-nm
|
||||||
|
sudo ln -s --force /usr/bin/llvm-strip-$LLVM_VERSION /usr/bin/llvm-strip
|
||||||
|
sudo ln -s --force /usr/bin/llvm-objcopy-$LLVM_VERSION /usr/bin/llvm-objcopy
|
||||||
|
sudo ln -s --force /usr/bin/llvm-readelf-$LLVM_VERSION /usr/bin/llvm-readelf
|
||||||
|
sudo ln -s --force /usr/bin/clang++-$LLVM_VERSION /usr/bin/clang++
|
||||||
|
|
||||||
|
- name: Checkout KernelSU
|
||||||
|
uses: actions/checkout@v4
|
||||||
|
with:
|
||||||
|
path: KernelSU
|
||||||
|
fetch-depth: 0
|
||||||
|
|
||||||
|
- name: Setup kernel source
|
||||||
|
run: git clone https://chromium.googlesource.com/chromiumos/third_party/kernel.git -b ${{ matrix.git_tag }} --depth=1
|
||||||
|
|
||||||
|
- name: Setup KernelSU
|
||||||
|
working-directory: kernel
|
||||||
|
run: |
|
||||||
|
echo "[+] KernelSU setup"
|
||||||
|
KERNEL_ROOT=$GITHUB_WORKSPACE/kernel
|
||||||
|
echo "[+] KERNEL_ROOT: $KERNEL_ROOT"
|
||||||
|
echo "[+] Copy KernelSU driver to $KERNEL_ROOT/drivers"
|
||||||
|
ln -sf $GITHUB_WORKSPACE/KernelSU/kernel $KERNEL_ROOT/drivers/kernelsu
|
||||||
|
|
||||||
|
echo "[+] Add KernelSU driver to Makefile"
|
||||||
|
DRIVER_MAKEFILE=$KERNEL_ROOT/drivers/Makefile
|
||||||
|
grep -q "kernelsu" $DRIVER_MAKEFILE || echo "obj-y += kernelsu/" >> $DRIVER_MAKEFILE
|
||||||
|
|
||||||
|
echo "[+] Apply KernelSU patches"
|
||||||
|
cd $KERNEL_ROOT && git apply $GITHUB_WORKSPACE/KernelSU/.github/patches/5.10/*.patch || echo "[-] No patch found"
|
||||||
|
|
||||||
|
echo "[+] Patch script/setlocalversion"
|
||||||
|
sed -i 's/-dirty//g' $KERNEL_ROOT/scripts/setlocalversion
|
||||||
|
|
||||||
|
echo "[+] KernelSU setup done."
|
||||||
|
cd $GITHUB_WORKSPACE/KernelSU
|
||||||
|
VERSION=$(($(git rev-list --count HEAD) + 10200))
|
||||||
|
echo "VERSION: $VERSION"
|
||||||
|
echo "kernelsu_version=$VERSION" >> $GITHUB_ENV
|
||||||
|
|
||||||
|
- name: Build Kernel
|
||||||
|
working-directory: kernel
|
||||||
|
run: |
|
||||||
|
set -a && . build.config.gki.x86_64; set +a
|
||||||
|
export DEFCONFIG=x86_64_arcvm_defconfig
|
||||||
|
if [ ! -z ${{ vars.EXPECTED_SIZE }} ] && [ ! -z ${{ vars.EXPECTED_HASH }} ]; then
|
||||||
|
export KSU_EXPECTED_SIZE=${{ vars.EXPECTED_SIZE }}
|
||||||
|
export KSU_EXPECTED_HASH=${{ vars.EXPECTED_HASH }}
|
||||||
|
fi
|
||||||
|
|
||||||
|
make LLVM=1 LLVM_IAS=1 DEPMOD=depmod DTC=dtc O=${PWD} mrproper
|
||||||
|
make LLVM=1 LLVM_IAS=1 DEPMOD=depmod DTC=dtc O=${PWD} ${DEFCONFIG} < /dev/null
|
||||||
|
scripts/config --file .config -e LTO_CLANG -d LTO_NONE -e LTO_CLANG_THIN -d LTO_CLANG_FULL -e THINLTO
|
||||||
|
make LLVM=1 LLVM_IAS=1 DEPMOD=depmod DTC=dtc O=${PWD} -j$(nproc) bzImage modules prepare-objtool
|
||||||
|
|
||||||
|
echo "file_path=${PWD}/arch/x86/boot/bzImage" >> $GITHUB_ENV
|
||||||
|
|
||||||
|
- name: Upload kernel-ARCVM-${{ matrix.arch }}-${{ matrix.version }}
|
||||||
|
uses: actions/upload-artifact@v4
|
||||||
|
with:
|
||||||
|
name: kernel-ARCVM-${{ matrix.arch }}-${{ matrix.version }}
|
||||||
|
path: "${{ env.file_path }}"
|
||||||
|
|
||||||
|
- name: Bot session cache
|
||||||
|
if: ${{ ( github.event_name == 'push' && github.ref == 'refs/heads/main' ) || github.ref_type == 'tag' }}
|
||||||
|
id: bot_session_cache
|
||||||
|
uses: actions/cache@v3
|
||||||
|
with:
|
||||||
|
path: scripts/ksubot.session
|
||||||
|
key: ${{ runner.os }}-bot-session
|
||||||
|
|
||||||
|
- name: Post to Telegram
|
||||||
|
if: ${{ ( github.event_name == 'push' && github.ref == 'refs/heads/main' ) || github.ref_type == 'tag' }}
|
||||||
|
env:
|
||||||
|
CHAT_ID: ${{ secrets.CHAT_ID }}
|
||||||
|
BOT_TOKEN: ${{ secrets.BOT_TOKEN }}
|
||||||
|
MESSAGE_THREAD_ID: ${{ secrets.MESSAGE_THREAD_ID }}
|
||||||
|
COMMIT_MESSAGE: ${{ github.event.head_commit.message }}
|
||||||
|
COMMIT_URL: ${{ github.event.head_commit.url }}
|
||||||
|
RUN_URL: ${{ github.server_url }}/${{ github.repository }}/actions/runs/${{ github.run_id }}
|
||||||
|
run: |
|
||||||
|
TITLE=kernel-ARCVM-${{ matrix.arch }}-${{ matrix.version }}
|
||||||
|
echo "[+] title: $TITLE"
|
||||||
|
export TITLE
|
||||||
|
export VERSION="${{ env.kernelsu_version }}"
|
||||||
|
echo "[+] Compress images"
|
||||||
|
gzip -n -f -9 "${{ env.file_path }}"
|
||||||
|
echo "[+] Image to upload"
|
||||||
|
ls -l "${{ env.file_path }}.gz"
|
||||||
|
if [ -n "${{ secrets.BOT_TOKEN }}" ]; then
|
||||||
|
pip3 install telethon==1.31.1
|
||||||
|
python3 "$GITHUB_WORKSPACE/KernelSU/scripts/ksubot.py" "${{ env.file_path }}.gz"
|
||||||
|
fi
|
||||||
148
.github/workflows/build-kernel-wsa.yml
vendored
148
.github/workflows/build-kernel-wsa.yml
vendored
@@ -1,150 +1,38 @@
|
|||||||
name: Build Kernel - WSA
|
name: Build Kernel - WSA
|
||||||
on:
|
on:
|
||||||
push:
|
push:
|
||||||
branches: ["main"]
|
branches: ["main", "ci", "checkci"]
|
||||||
paths:
|
paths:
|
||||||
- ".github/workflows/build-kernel-wsa.yml"
|
- ".github/workflows/build-kernel-wsa.yml"
|
||||||
|
- ".github/workflows/wsa-kernel.yml"
|
||||||
- "kernel/**"
|
- "kernel/**"
|
||||||
pull_request:
|
pull_request:
|
||||||
branches: ["main"]
|
branches: ["main"]
|
||||||
paths:
|
paths:
|
||||||
- ".github/workflows/build-kernel-wsa.yml"
|
- ".github/workflows/build-kernel-wsa.yml"
|
||||||
|
- ".github/workflows/wsa-kernel.yml"
|
||||||
- "kernel/**"
|
- "kernel/**"
|
||||||
workflow_call:
|
workflow_call:
|
||||||
workflow_dispatch:
|
workflow_dispatch:
|
||||||
|
|
||||||
jobs:
|
jobs:
|
||||||
build:
|
build:
|
||||||
|
if: github.event_name != 'pull_request' && github.ref != 'refs/heads/checkci'
|
||||||
strategy:
|
strategy:
|
||||||
matrix:
|
matrix:
|
||||||
arch: [x86_64, arm64]
|
arch: [x86_64, arm64]
|
||||||
version: ["5.10.117.2", "5.15.78.1"]
|
version: ["5.15.94.2", "5.15.104.1", "5.15.104.2", "5.15.104.3", "5.15.104.4"]
|
||||||
include:
|
uses: ./.github/workflows/wsa-kernel.yml
|
||||||
- arch: x86_64
|
with:
|
||||||
file_name: "bzImage"
|
arch: ${{ matrix.arch }}
|
||||||
- arch: arm64
|
version: ${{ matrix.version }}
|
||||||
file_name: "Image"
|
|
||||||
cross_compile: "aarch64-linux-gnu"
|
|
||||||
- version: "5.10.117.2"
|
|
||||||
arch: x86_64
|
|
||||||
make_config: config-wsa-5.10
|
|
||||||
- version: "5.10.117.2"
|
|
||||||
arch: arm64
|
|
||||||
make_config: config-wsa-arm64-5.10
|
|
||||||
- version: "5.15.78.1"
|
|
||||||
arch: x86_64
|
|
||||||
make_config: config-wsa-x64
|
|
||||||
- version: "5.15.78.1"
|
|
||||||
arch: arm64
|
|
||||||
make_config: config-wsa-arm64
|
|
||||||
- version: "5.10.117.2"
|
|
||||||
device_code: latte
|
|
||||||
kernel_version: "5.10"
|
|
||||||
- version: "5.15.78.1"
|
|
||||||
device_code: latte-2
|
|
||||||
kernel_version: "5.15"
|
|
||||||
|
|
||||||
name: Build WSA-Kernel-${{ matrix.version }}-${{ matrix.arch }}
|
check_build:
|
||||||
runs-on: ubuntu-20.04
|
if: (github.event_name == 'pull_request' && !github.event.pull_request.draft) || github.ref == 'refs/heads/checkci'
|
||||||
env:
|
uses: ./.github/workflows/wsa-kernel.yml
|
||||||
CCACHE_COMPILERCHECK: "%compiler% -dumpmachine; %compiler% -dumpversion"
|
strategy:
|
||||||
CCACHE_NOHASHDIR: "true"
|
matrix:
|
||||||
CCACHE_HARDLINK: "true"
|
arch: [x86_64, arm64]
|
||||||
|
with:
|
||||||
steps:
|
arch: ${{ matrix.arch }}
|
||||||
- name: Install Build Tools
|
version: "5.15.104.4"
|
||||||
run: |
|
|
||||||
sudo apt update
|
|
||||||
sudo apt install -y --no-install-recommends bc bison build-essential ca-certificates flex git gnupg libelf-dev libssl-dev lsb-release software-properties-common wget libncurses-dev binutils-aarch64-linux-gnu gcc-aarch64-linux-gnu nuget gzip
|
|
||||||
export LLVM_VERSION=12
|
|
||||||
wget https://apt.llvm.org/llvm.sh
|
|
||||||
chmod +x llvm.sh
|
|
||||||
sudo ./llvm.sh $LLVM_VERSION
|
|
||||||
rm ./llvm.sh
|
|
||||||
sudo ln -s --force /usr/bin/clang-$LLVM_VERSION /usr/bin/clang
|
|
||||||
sudo ln -s --force /usr/bin/ld.lld-$LLVM_VERSION /usr/bin/ld.lld
|
|
||||||
sudo ln -s --force /usr/bin/llvm-objdump-$LLVM_VERSION /usr/bin/llvm-objdump
|
|
||||||
sudo ln -s --force /usr/bin/llvm-ar-$LLVM_VERSION /usr/bin/llvm-ar
|
|
||||||
sudo ln -s --force /usr/bin/llvm-nm-$LLVM_VERSION /usr/bin/llvm-nm
|
|
||||||
sudo ln -s --force /usr/bin/llvm-strip-$LLVM_VERSION /usr/bin/llvm-strip
|
|
||||||
sudo ln -s --force /usr/bin/llvm-objcopy-$LLVM_VERSION /usr/bin/llvm-objcopy
|
|
||||||
sudo ln -s --force /usr/bin/llvm-readelf-$LLVM_VERSION /usr/bin/llvm-readelf
|
|
||||||
sudo ln -s --force /usr/bin/clang++-$LLVM_VERSION /usr/bin/clang++
|
|
||||||
|
|
||||||
- name: Checkout KernelSU
|
|
||||||
uses: actions/checkout@v3
|
|
||||||
with:
|
|
||||||
path: KernelSU
|
|
||||||
ref: main
|
|
||||||
fetch-depth: 0
|
|
||||||
|
|
||||||
- name: Setup kernel source
|
|
||||||
uses: actions/checkout@v3
|
|
||||||
with:
|
|
||||||
repository: microsoft/WSA-Linux-Kernel
|
|
||||||
ref: android-lts/${{ matrix.device_code }}/${{ matrix.version }}
|
|
||||||
path: WSA-Linux-Kernel
|
|
||||||
|
|
||||||
- name: Setup Ccache
|
|
||||||
uses: hendrikmuhs/ccache-action@v1.2
|
|
||||||
with:
|
|
||||||
key: WSA-Kernel-${{ matrix.version }}-${{ matrix.arch }}
|
|
||||||
save: ${{ github.event_name == 'push' && github.ref == 'refs/heads/main' }}
|
|
||||||
max-size: 2G
|
|
||||||
|
|
||||||
- name: Setup KernelSU
|
|
||||||
working-directory: WSA-Linux-Kernel
|
|
||||||
run: |
|
|
||||||
echo "[+] KernelSU setup"
|
|
||||||
KERNEL_ROOT=$GITHUB_WORKSPACE/WSA-Linux-Kernel
|
|
||||||
echo "[+] KERNEL_ROOT: $KERNEL_ROOT"
|
|
||||||
echo "[+] Copy KernelSU driver to $KERNEL_ROOT/drivers"
|
|
||||||
ln -sf $GITHUB_WORKSPACE/KernelSU/kernel $KERNEL_ROOT/drivers/kernelsu
|
|
||||||
echo "[+] Add KernelSU driver to Makefile"
|
|
||||||
DRIVER_MAKEFILE=$KERNEL_ROOT/drivers/Makefile
|
|
||||||
grep -q "kernelsu" $DRIVER_MAKEFILE || echo "obj-y += kernelsu/" >> $DRIVER_MAKEFILE
|
|
||||||
echo "[+] Apply KernelSU patches"
|
|
||||||
cd $KERNEL_ROOT && git apply $GITHUB_WORKSPACE/KernelSU/.github/patches/${{ matrix.kernel_version }}/*.patch
|
|
||||||
echo "[+] KernelSU setup done."
|
|
||||||
cd $GITHUB_WORKSPACE/KernelSU
|
|
||||||
VERSION=$(($(git rev-list --count HEAD) + 10200))
|
|
||||||
echo "VERSION: $VERSION"
|
|
||||||
echo "kernelsu_version=$VERSION" >> $GITHUB_ENV
|
|
||||||
|
|
||||||
- name: Build Kernel
|
|
||||||
working-directory: WSA-Linux-Kernel
|
|
||||||
run: |
|
|
||||||
cp configs/wsa/${{ matrix.make_config }} .config
|
|
||||||
make olddefconfig
|
|
||||||
make -j`nproc` LLVM=1 ARCH=${{ matrix.arch }} CROSS_COMPILE=${{ matrix.cross_compile }} ${{ matrix.file_name }} CCACHE="/usr/bin/ccache"
|
|
||||||
echo "file_path=WSA-Linux-Kernel/arch/${{ matrix.arch }}/boot/${{ matrix.file_name }}" >> $GITHUB_ENV
|
|
||||||
|
|
||||||
- name: Upload kernel-${{ matrix.arch }}-${{ matrix.version }}
|
|
||||||
uses: actions/upload-artifact@v3
|
|
||||||
with:
|
|
||||||
name: kernel-WSA-${{ matrix.arch }}-${{ matrix.version }}
|
|
||||||
path: "${{ env.file_path }}"
|
|
||||||
|
|
||||||
- name: Post to Telegram
|
|
||||||
if: ${{ ( github.event_name == 'push' && github.ref == 'refs/heads/main' ) || github.ref_type == 'tag' }}
|
|
||||||
env:
|
|
||||||
CHAT_ID: ${{ secrets.CHAT_ID }}
|
|
||||||
CACHE_CHAT_ID: ${{ secrets.CACHE_CHAT_ID }}
|
|
||||||
BOT_TOKEN: ${{ secrets.BOT_TOKEN }}
|
|
||||||
MESSAGE_THREAD_ID: ${{ secrets.MESSAGE_THREAD_ID }}
|
|
||||||
COMMIT_MESSAGE: ${{ github.event.head_commit.message }}
|
|
||||||
COMMIT_URL: ${{ github.event.head_commit.url }}
|
|
||||||
RUN_URL: ${{ github.server_url }}/${{ github.repository }}/actions/runs/${{ github.run_id }}
|
|
||||||
run: |
|
|
||||||
TITLE=kernel-${{ matrix.arch }}-WSA-${{ matrix.version }}
|
|
||||||
echo "[+] title: $TITLE"
|
|
||||||
export TITLE
|
|
||||||
export VERSION="${{ env.kernelsu_version }}"
|
|
||||||
echo "[+] Compress images"
|
|
||||||
gzip -n -f -9 "${{ env.file_path }}"
|
|
||||||
echo "[+] Image to upload"
|
|
||||||
ls -l "${{ env.file_path }}.gz"
|
|
||||||
if [ -n "${{ secrets.BOT_TOKEN }}" ]; then
|
|
||||||
pip3 install python-telegram-bot
|
|
||||||
python3 "$GITHUB_WORKSPACE/KernelSU/scripts/ksubot.py" "${{ env.file_path }}.gz"
|
|
||||||
fi
|
|
||||||
4
.github/workflows/build-ksud.yml
vendored
4
.github/workflows/build-ksud.yml
vendored
@@ -2,13 +2,13 @@ name: Build KSUD
|
|||||||
on:
|
on:
|
||||||
push:
|
push:
|
||||||
branches: [ "main", "ci" ]
|
branches: [ "main", "ci" ]
|
||||||
paths:
|
paths:
|
||||||
- '.github/workflows/build-ksud.yml'
|
- '.github/workflows/build-ksud.yml'
|
||||||
- '.github/workflows/ksud.yml'
|
- '.github/workflows/ksud.yml'
|
||||||
- 'userspace/ksud/**'
|
- 'userspace/ksud/**'
|
||||||
pull_request:
|
pull_request:
|
||||||
branches: [ "main" ]
|
branches: [ "main" ]
|
||||||
paths:
|
paths:
|
||||||
- '.github/workflows/build-ksud.yml'
|
- '.github/workflows/build-ksud.yml'
|
||||||
- '.github/workflows/ksud.yml'
|
- '.github/workflows/ksud.yml'
|
||||||
- 'userspace/ksud/**'
|
- 'userspace/ksud/**'
|
||||||
|
|||||||
190
.github/workflows/build-manager.yml
vendored
190
.github/workflows/build-manager.yml
vendored
@@ -1,16 +1,18 @@
|
|||||||
name: Build Manager
|
name: Build Manager
|
||||||
|
|
||||||
on:
|
on:
|
||||||
push:
|
push:
|
||||||
branches: [ "main" ]
|
branches: [ "main" ]
|
||||||
paths:
|
paths:
|
||||||
- '.github/workflows/build-manager.yml'
|
- '.github/workflows/build-manager.yml'
|
||||||
- 'manager/**'
|
- 'manager/**'
|
||||||
- 'userspace/ksud/**'
|
- 'userspace/ksud/**'
|
||||||
pull_request:
|
pull_request:
|
||||||
branches: [ "main" ]
|
branches: [ "main" ]
|
||||||
paths:
|
paths:
|
||||||
- 'manager/**'
|
- 'manager/**'
|
||||||
workflow_call:
|
workflow_call:
|
||||||
|
|
||||||
jobs:
|
jobs:
|
||||||
build-ksud:
|
build-ksud:
|
||||||
strategy:
|
strategy:
|
||||||
@@ -21,87 +23,117 @@ jobs:
|
|||||||
uses: ./.github/workflows/ksud.yml
|
uses: ./.github/workflows/ksud.yml
|
||||||
with:
|
with:
|
||||||
target: ${{ matrix.target }}
|
target: ${{ matrix.target }}
|
||||||
|
|
||||||
build-manager:
|
build-manager:
|
||||||
needs: build-ksud
|
needs: build-ksud
|
||||||
runs-on: ubuntu-latest
|
runs-on: ubuntu-latest
|
||||||
defaults:
|
defaults:
|
||||||
run:
|
run:
|
||||||
working-directory: ./manager
|
working-directory: ./manager
|
||||||
|
|
||||||
steps:
|
steps:
|
||||||
- uses: actions/checkout@v3
|
- name: Checkout
|
||||||
with:
|
uses: actions/checkout@v4
|
||||||
fetch-depth: 0
|
with:
|
||||||
- name: Setup need_upload
|
fetch-depth: 0
|
||||||
id: need_upload
|
|
||||||
run: |
|
- name: Setup need_upload
|
||||||
if [ ! -z "${{ secrets.BOT_TOKEN }}" ]; then
|
id: need_upload
|
||||||
echo "UPLOAD=true" >> $GITHUB_OUTPUT
|
run: |
|
||||||
else
|
if [ ! -z "${{ secrets.BOT_TOKEN }}" ]; then
|
||||||
echo "UPLOAD=false" >> $GITHUB_OUTPUT
|
echo "UPLOAD=true" >> $GITHUB_OUTPUT
|
||||||
fi
|
else
|
||||||
- name: set up JDK 11
|
echo "UPLOAD=false" >> $GITHUB_OUTPUT
|
||||||
uses: actions/setup-java@v3
|
fi
|
||||||
with:
|
|
||||||
java-version: '11'
|
- name: Write key
|
||||||
distribution: 'temurin'
|
if: ${{ ( github.event_name != 'pull_request' && github.ref == 'refs/heads/main' ) || github.ref_type == 'tag' }}
|
||||||
cache: gradle
|
run: |
|
||||||
- uses: nttld/setup-ndk@v1
|
if [ ! -z "${{ secrets.KEYSTORE }}" ]; then
|
||||||
with:
|
{
|
||||||
ndk-version: r25b
|
echo KEYSTORE_PASSWORD='${{ secrets.KEYSTORE_PASSWORD }}'
|
||||||
local-cache: true
|
echo KEY_ALIAS='${{ secrets.KEY_ALIAS }}'
|
||||||
- name: Extract keystore
|
echo KEY_PASSWORD='${{ secrets.KEY_PASSWORD }}'
|
||||||
if: ${{ ( github.event_name != 'pull_request' && github.ref == 'refs/heads/main' ) || github.ref_type == 'tag' }}
|
echo KEYSTORE_FILE='../key.jks'
|
||||||
run: |
|
} >> gradle.properties
|
||||||
if [ ! -z "${{ secrets.KEYSTORE }}" ]; then
|
echo ${{ secrets.KEYSTORE }} | base64 -d > key.jks
|
||||||
echo KEYSTORE_PASSWORD='${{ secrets.KEYSTORE_PASSWORD }}' >> sign.properties
|
fi
|
||||||
echo KEY_ALIAS='${{ secrets.KEY_ALIAS }}' >> sign.properties
|
|
||||||
echo KEY_PASSWORD='${{ secrets.KEY_PASSWORD }}' >> sign.properties
|
- name: Setup Java
|
||||||
echo KEYSTORE_FILE='../key.jks' >> sign.properties
|
uses: actions/setup-java@v4
|
||||||
echo ${{ secrets.KEYSTORE }} | base64 --decode > key.jks
|
with:
|
||||||
fi
|
distribution: "temurin"
|
||||||
- name: Download arm64 ksud
|
java-version: "17"
|
||||||
uses: actions/download-artifact@v3
|
|
||||||
with:
|
- name: Setup Gradle
|
||||||
name: ksud-aarch64-linux-android
|
uses: gradle/gradle-build-action@v2
|
||||||
path: .
|
with:
|
||||||
- name: Download x86_64 ksud
|
gradle-home-cache-cleanup: true
|
||||||
uses: actions/download-artifact@v3
|
|
||||||
with:
|
- name: Download arm64 ksud
|
||||||
name: ksud-x86_64-linux-android
|
uses: actions/download-artifact@v4
|
||||||
path: .
|
with:
|
||||||
- name: Copy ksud to app jniLibs
|
name: ksud-aarch64-linux-android
|
||||||
run: |
|
path: .
|
||||||
mkdir -p app/src/main/jniLibs/arm64-v8a
|
|
||||||
mkdir -p app/src/main/jniLibs/x86_64
|
- name: Download x86_64 ksud
|
||||||
cp -f ../aarch64-linux-android/release/ksud ../manager/app/src/main/jniLibs/arm64-v8a/libksud.so
|
uses: actions/download-artifact@v4
|
||||||
cp -f ../x86_64-linux-android/release/ksud ../manager/app/src/main/jniLibs/x86_64/libksud.so
|
with:
|
||||||
- name: Grant execute permission for gradlew
|
name: ksud-x86_64-linux-android
|
||||||
run: chmod +x gradlew
|
path: .
|
||||||
- name: Build with Gradle
|
|
||||||
run: ./gradlew clean assembleRelease
|
- name: Copy ksud to app jniLibs
|
||||||
- name: Upload build artifact
|
run: |
|
||||||
uses: actions/upload-artifact@v3
|
mkdir -p app/src/main/jniLibs/arm64-v8a
|
||||||
with:
|
mkdir -p app/src/main/jniLibs/x86_64
|
||||||
name: manager
|
cp -f ../aarch64-linux-android/release/ksud ../manager/app/src/main/jniLibs/arm64-v8a/libksud.so
|
||||||
path: manager/app/build/outputs/apk/release/*.apk
|
cp -f ../x86_64-linux-android/release/ksud ../manager/app/src/main/jniLibs/x86_64/libksud.so
|
||||||
- name: Setup mutex for uploading
|
|
||||||
uses: ben-z/gh-action-mutex@v1.0-alpha-7
|
- name: Build with Gradle
|
||||||
if: github.event_name != 'pull_request' && steps.need_upload.outputs.UPLOAD == 'true'
|
run: |
|
||||||
- name: Upload to telegram
|
{
|
||||||
if: github.event_name != 'pull_request' && steps.need_upload.outputs.UPLOAD == 'true'
|
echo 'org.gradle.parallel=true'
|
||||||
env:
|
echo 'org.gradle.vfs.watch=true'
|
||||||
CHAT_ID: ${{ secrets.CHAT_ID }}
|
echo 'org.gradle.jvmargs=-Xmx2048m'
|
||||||
CACHE_CHAT_ID: ${{ secrets.CACHE_CHAT_ID }}
|
echo 'android.native.buildOutput=verbose'
|
||||||
BOT_TOKEN: ${{ secrets.BOT_TOKEN }}
|
} >> gradle.properties
|
||||||
MESSAGE_THREAD_ID: ${{ secrets.MESSAGE_THREAD_ID }}
|
sed -i 's/org.gradle.configuration-cache=true//g' gradle.properties
|
||||||
COMMIT_MESSAGE: ${{ github.event.head_commit.message }}
|
./gradlew clean assembleRelease
|
||||||
COMMIT_URL: ${{ github.event.head_commit.url }}
|
|
||||||
RUN_URL: ${{ github.server_url }}/${{ github.repository }}/actions/runs/${{ github.run_id }}
|
- name: Upload build artifact
|
||||||
TITLE: Manager
|
uses: actions/upload-artifact@v4
|
||||||
run: |
|
with:
|
||||||
if [ ! -z "${{ secrets.BOT_TOKEN }}" ]; then
|
name: manager
|
||||||
export VERSION=$(git rev-list --count HEAD)
|
path: manager/app/build/outputs/apk/release/*.apk
|
||||||
APK=$(find ./app/build/outputs/apk/release -name "*.apk")
|
|
||||||
pip3 install python-telegram-bot
|
- name: Upload mappings
|
||||||
python3 $GITHUB_WORKSPACE/scripts/ksubot.py $APK
|
uses: actions/upload-artifact@v4
|
||||||
fi
|
with:
|
||||||
|
name: "mappings"
|
||||||
|
path: "manager/app/build/outputs/mapping/release/"
|
||||||
|
|
||||||
|
- name: Bot session cache
|
||||||
|
if: github.event_name != 'pull_request' && steps.need_upload.outputs.UPLOAD == 'true'
|
||||||
|
id: bot_session_cache
|
||||||
|
uses: actions/cache@v4
|
||||||
|
with:
|
||||||
|
path: scripts/ksubot.session
|
||||||
|
key: ${{ runner.os }}-bot-session
|
||||||
|
|
||||||
|
- name: Upload to telegram
|
||||||
|
if: github.event_name != 'pull_request' && steps.need_upload.outputs.UPLOAD == 'true'
|
||||||
|
env:
|
||||||
|
CHAT_ID: ${{ secrets.CHAT_ID }}
|
||||||
|
BOT_TOKEN: ${{ secrets.BOT_TOKEN }}
|
||||||
|
MESSAGE_THREAD_ID: ${{ secrets.MESSAGE_THREAD_ID }}
|
||||||
|
COMMIT_MESSAGE: ${{ github.event.head_commit.message }}
|
||||||
|
COMMIT_URL: ${{ github.event.head_commit.url }}
|
||||||
|
RUN_URL: ${{ github.server_url }}/${{ github.repository }}/actions/runs/${{ github.run_id }}
|
||||||
|
TITLE: Manager
|
||||||
|
run: |
|
||||||
|
if [ ! -z "${{ secrets.BOT_TOKEN }}" ]; then
|
||||||
|
export VERSION=$(git rev-list --count HEAD)
|
||||||
|
APK=$(find ./app/build/outputs/apk/release -name "*.apk")
|
||||||
|
pip3 install telethon==1.31.1
|
||||||
|
python3 $GITHUB_WORKSPACE/scripts/ksubot.py $APK
|
||||||
|
fi
|
||||||
|
|||||||
24
.github/workflows/build-su.yml
vendored
24
.github/workflows/build-su.yml
vendored
@@ -1,21 +1,21 @@
|
|||||||
name: Build SU
|
name: Build SU
|
||||||
on:
|
on:
|
||||||
push:
|
push:
|
||||||
branches: [ "main" ]
|
branches: [ "main", "ci" ]
|
||||||
paths:
|
paths:
|
||||||
- '.github/workflows/build-su.yml'
|
- '.github/workflows/build-su.yml'
|
||||||
- 'userspace/su/**'
|
- 'userspace/su/**'
|
||||||
- 'scripts/ksubot.py'
|
- 'scripts/ksubot.py'
|
||||||
pull_request:
|
pull_request:
|
||||||
branches: [ "main" ]
|
branches: [ "main" ]
|
||||||
paths:
|
paths:
|
||||||
- 'userspace/su/**'
|
- 'userspace/su/**'
|
||||||
jobs:
|
jobs:
|
||||||
build-su:
|
build-su:
|
||||||
name: Build userspace su
|
name: Build userspace su
|
||||||
runs-on: ubuntu-latest
|
runs-on: ubuntu-latest
|
||||||
steps:
|
steps:
|
||||||
- uses: actions/checkout@v3
|
- uses: actions/checkout@v4
|
||||||
with:
|
with:
|
||||||
fetch-depth: 0
|
fetch-depth: 0
|
||||||
- name: Setup need_upload
|
- name: Setup need_upload
|
||||||
@@ -28,24 +28,26 @@ jobs:
|
|||||||
fi
|
fi
|
||||||
- uses: nttld/setup-ndk@v1
|
- uses: nttld/setup-ndk@v1
|
||||||
with:
|
with:
|
||||||
ndk-version: r25b
|
ndk-version: r25c
|
||||||
local-cache: true
|
|
||||||
- name: Build su
|
- name: Build su
|
||||||
working-directory: ./userspace/su
|
working-directory: ./userspace/su
|
||||||
run: ndk-build
|
run: ndk-build
|
||||||
- name: Upload a Build Artifact
|
- name: Upload a Build Artifact
|
||||||
uses: actions/upload-artifact@v3
|
uses: actions/upload-artifact@v4
|
||||||
with:
|
with:
|
||||||
name: su
|
name: su
|
||||||
path: ./userspace/su/libs
|
path: ./userspace/su/libs
|
||||||
- name: Setup mutex for uploading
|
- name: Bot session cache
|
||||||
uses: ben-z/gh-action-mutex@v1.0-alpha-7
|
|
||||||
if: github.event_name != 'pull_request' && steps.need_upload.outputs.UPLOAD == 'true'
|
if: github.event_name != 'pull_request' && steps.need_upload.outputs.UPLOAD == 'true'
|
||||||
|
id: bot_session_cache
|
||||||
|
uses: actions/cache@v3
|
||||||
|
with:
|
||||||
|
path: scripts/ksubot.session
|
||||||
|
key: ${{ runner.os }}-bot-session
|
||||||
- name: Upload to telegram
|
- name: Upload to telegram
|
||||||
if: github.event_name != 'pull_request' && steps.need_upload.outputs.UPLOAD == 'true'
|
if: github.event_name != 'pull_request' && steps.need_upload.outputs.UPLOAD == 'true'
|
||||||
env:
|
env:
|
||||||
CHAT_ID: ${{ secrets.CHAT_ID }}
|
CHAT_ID: ${{ secrets.CHAT_ID }}
|
||||||
CACHE_CHAT_ID: ${{ secrets.CACHE_CHAT_ID }}
|
|
||||||
BOT_TOKEN: ${{ secrets.BOT_TOKEN }}
|
BOT_TOKEN: ${{ secrets.BOT_TOKEN }}
|
||||||
MESSAGE_THREAD_ID: ${{ secrets.MESSAGE_THREAD_ID }}
|
MESSAGE_THREAD_ID: ${{ secrets.MESSAGE_THREAD_ID }}
|
||||||
COMMIT_MESSAGE: ${{ github.event.head_commit.message }}
|
COMMIT_MESSAGE: ${{ github.event.head_commit.message }}
|
||||||
@@ -55,7 +57,7 @@ jobs:
|
|||||||
run: |
|
run: |
|
||||||
if [ ! -z "${{ secrets.BOT_TOKEN }}" ]; then
|
if [ ! -z "${{ secrets.BOT_TOKEN }}" ]; then
|
||||||
export VERSION=$(git rev-list --count HEAD)
|
export VERSION=$(git rev-list --count HEAD)
|
||||||
pip3 install python-telegram-bot
|
pip3 install telethon==1.31.1
|
||||||
mv ./userspace/su/libs/arm64-v8a/su su-arm64
|
mv ./userspace/su/libs/arm64-v8a/su su-arm64
|
||||||
mv ./userspace/su/libs/x86_64/su su-x86_64
|
mv ./userspace/su/libs/x86_64/su su-x86_64
|
||||||
python3 scripts/ksubot.py su-arm64 su-x86_64
|
python3 scripts/ksubot.py su-arm64 su-x86_64
|
||||||
|
|||||||
7
.github/workflows/clippy.yml
vendored
7
.github/workflows/clippy.yml
vendored
@@ -21,14 +21,15 @@ jobs:
|
|||||||
clippy:
|
clippy:
|
||||||
runs-on: ubuntu-latest
|
runs-on: ubuntu-latest
|
||||||
steps:
|
steps:
|
||||||
- uses: actions/checkout@v3
|
- uses: actions/checkout@v4
|
||||||
|
# cross build failed after Rust 1.68, see https://github.com/cross-rs/cross/issues/1222
|
||||||
|
- run: rustup default 1.67.0
|
||||||
- uses: Swatinem/rust-cache@v2
|
- uses: Swatinem/rust-cache@v2
|
||||||
with:
|
with:
|
||||||
workspaces: userspace/ksud
|
workspaces: userspace/ksud
|
||||||
|
|
||||||
- name: Install cross
|
- name: Install cross
|
||||||
run: cargo install cross
|
run: cargo install cross --locked
|
||||||
|
|
||||||
- name: Run clippy
|
- name: Run clippy
|
||||||
run: |
|
run: |
|
||||||
|
|||||||
62
.github/workflows/deploy-website.yml
vendored
62
.github/workflows/deploy-website.yml
vendored
@@ -8,30 +8,60 @@ on:
|
|||||||
paths:
|
paths:
|
||||||
- '.github/workflows/deploy-website.yml'
|
- '.github/workflows/deploy-website.yml'
|
||||||
- 'website/**'
|
- 'website/**'
|
||||||
|
workflow_dispatch:
|
||||||
|
|
||||||
|
# Sets permissions of the GITHUB_TOKEN to allow deployment to GitHub Pages
|
||||||
|
permissions:
|
||||||
|
contents: read
|
||||||
|
pages: write
|
||||||
|
id-token: write
|
||||||
|
|
||||||
|
# Allow only one concurrent deployment, skipping runs queued between the run in-progress and latest queued.
|
||||||
|
# However, do NOT cancel in-progress runs as we want to allow these production deployments to complete.
|
||||||
|
concurrency:
|
||||||
|
group: pages
|
||||||
|
cancel-in-progress: false
|
||||||
|
|
||||||
jobs:
|
jobs:
|
||||||
deploy:
|
# Build job
|
||||||
|
build:
|
||||||
runs-on: ubuntu-latest
|
runs-on: ubuntu-latest
|
||||||
defaults:
|
defaults:
|
||||||
run:
|
run:
|
||||||
working-directory: ./website
|
working-directory: ./website
|
||||||
steps:
|
steps:
|
||||||
- uses: actions/checkout@v3
|
- name: Checkout
|
||||||
|
uses: actions/checkout@v4
|
||||||
with:
|
with:
|
||||||
fetch-depth: 0
|
fetch-depth: 0 # Not needed if lastUpdated is not enabled
|
||||||
- uses: actions/setup-node@v3
|
- name: Setup Node
|
||||||
|
uses: actions/setup-node@v4
|
||||||
with:
|
with:
|
||||||
node-version: 16
|
node-version: 18
|
||||||
cache: yarn
|
cache: yarn # or pnpm / yarn
|
||||||
cache-dependency-path: website/yarn.lock
|
cache-dependency-path: website/yarn.lock
|
||||||
- run: yarn install --frozen-lockfile
|
- name: Setup Pages
|
||||||
|
uses: actions/configure-pages@v4
|
||||||
- name: Build
|
- name: Install dependencies
|
||||||
run: yarn docs:build
|
run: yarn install --frozen-lockfile
|
||||||
|
- name: Build with VitePress
|
||||||
- name: Deploy
|
run: |
|
||||||
uses: peaceiris/actions-gh-pages@v3
|
yarn docs:build
|
||||||
|
touch docs/.vitepress/dist/.nojekyll
|
||||||
|
- name: Upload artifact
|
||||||
|
uses: actions/upload-pages-artifact@v3
|
||||||
with:
|
with:
|
||||||
github_token: ${{ secrets.GITHUB_TOKEN }}
|
path: website/docs/.vitepress/dist
|
||||||
publish_dir: website/docs/.vitepress/dist
|
|
||||||
cname: kernelsu.org # if wanna deploy to custom domain
|
# Deployment job
|
||||||
|
deploy:
|
||||||
|
environment:
|
||||||
|
name: github-pages
|
||||||
|
url: ${{ steps.deployment.outputs.page_url }}
|
||||||
|
needs: build
|
||||||
|
runs-on: ubuntu-latest
|
||||||
|
name: Deploy
|
||||||
|
steps:
|
||||||
|
- name: Deploy to GitHub Pages
|
||||||
|
id: deployment
|
||||||
|
uses: actions/deploy-pages@v4
|
||||||
|
|||||||
71
.github/workflows/gki-kernel.yml
vendored
71
.github/workflows/gki-kernel.yml
vendored
@@ -45,13 +45,15 @@ on:
|
|||||||
description: >
|
description: >
|
||||||
Artifact name of prebuilt ksud to be embedded
|
Artifact name of prebuilt ksud to be embedded
|
||||||
for example: ksud-aarch64-linux-android
|
for example: ksud-aarch64-linux-android
|
||||||
|
debug:
|
||||||
|
required: false
|
||||||
|
type: boolean
|
||||||
|
default: false
|
||||||
secrets:
|
secrets:
|
||||||
BOOT_SIGN_KEY:
|
BOOT_SIGN_KEY:
|
||||||
required: false
|
required: false
|
||||||
CHAT_ID:
|
CHAT_ID:
|
||||||
required: false
|
required: false
|
||||||
CACHE_CHAT_ID:
|
|
||||||
required: false
|
|
||||||
BOT_TOKEN:
|
BOT_TOKEN:
|
||||||
required: false
|
required: false
|
||||||
MESSAGE_THREAD_ID:
|
MESSAGE_THREAD_ID:
|
||||||
@@ -66,7 +68,17 @@ jobs:
|
|||||||
CCACHE_NOHASHDIR: "true"
|
CCACHE_NOHASHDIR: "true"
|
||||||
CCACHE_HARDLINK: "true"
|
CCACHE_HARDLINK: "true"
|
||||||
steps:
|
steps:
|
||||||
- uses: actions/checkout@v3
|
- name: Maximize build space
|
||||||
|
uses: easimon/maximize-build-space@master
|
||||||
|
with:
|
||||||
|
root-reserve-mb: 8192
|
||||||
|
temp-reserve-mb: 2048
|
||||||
|
remove-dotnet: 'true'
|
||||||
|
remove-android: 'true'
|
||||||
|
remove-haskell: 'true'
|
||||||
|
remove-codeql: 'true'
|
||||||
|
|
||||||
|
- uses: actions/checkout@v4
|
||||||
with:
|
with:
|
||||||
path: KernelSU
|
path: KernelSU
|
||||||
fetch-depth: 0
|
fetch-depth: 0
|
||||||
@@ -82,15 +94,27 @@ jobs:
|
|||||||
|
|
||||||
- name: Setup kernel source
|
- name: Setup kernel source
|
||||||
run: |
|
run: |
|
||||||
|
echo "Free space:"
|
||||||
|
df -h
|
||||||
cd $GITHUB_WORKSPACE
|
cd $GITHUB_WORKSPACE
|
||||||
git clone https://gerrit.googlesource.com/git-repo
|
sudo apt-get install repo -y
|
||||||
mkdir android-kernel && cd android-kernel
|
mkdir android-kernel && cd android-kernel
|
||||||
../git-repo/repo init --depth=1 --u https://android.googlesource.com/kernel/manifest -b common-${{ inputs.tag }}
|
repo init --depth=1 --u https://android.googlesource.com/kernel/manifest -b common-${{ inputs.tag }} --repo-rev=v2.16
|
||||||
../git-repo/repo sync -j$(nproc --all)
|
REMOTE_BRANCH=$(git ls-remote https://android.googlesource.com/kernel/common ${{ inputs.tag }})
|
||||||
|
DEFAULT_MANIFEST_PATH=.repo/manifests/default.xml
|
||||||
|
if grep -q deprecated <<< $REMOTE_BRANCH; then
|
||||||
|
echo "Found deprecated branch: ${{ inputs.tag }}"
|
||||||
|
sed -i 's/"${{ inputs.tag }}"/"deprecated\/${{ inputs.tag }}"/g' $DEFAULT_MANIFEST_PATH
|
||||||
|
cat $DEFAULT_MANIFEST_PATH
|
||||||
|
fi
|
||||||
|
repo --version
|
||||||
|
repo --trace sync -c -j$(nproc --all) --no-tags
|
||||||
|
df -h
|
||||||
|
|
||||||
- name: Setup KernelSU
|
- name: Setup KernelSU
|
||||||
env:
|
env:
|
||||||
PATCH_PATH: ${{ inputs.patch_path }}
|
PATCH_PATH: ${{ inputs.patch_path }}
|
||||||
|
IS_DEBUG_KERNEL: ${{ inputs.debug }}
|
||||||
run: |
|
run: |
|
||||||
cd $GITHUB_WORKSPACE/android-kernel
|
cd $GITHUB_WORKSPACE/android-kernel
|
||||||
echo "[+] KernelSU setup"
|
echo "[+] KernelSU setup"
|
||||||
@@ -102,7 +126,13 @@ jobs:
|
|||||||
DRIVER_MAKEFILE=$GKI_ROOT/common/drivers/Makefile
|
DRIVER_MAKEFILE=$GKI_ROOT/common/drivers/Makefile
|
||||||
grep -q "kernelsu" $DRIVER_MAKEFILE || echo "obj-y += kernelsu/" >> $DRIVER_MAKEFILE
|
grep -q "kernelsu" $DRIVER_MAKEFILE || echo "obj-y += kernelsu/" >> $DRIVER_MAKEFILE
|
||||||
echo "[+] Apply KernelSU patches"
|
echo "[+] Apply KernelSU patches"
|
||||||
cd $GKI_ROOT/common/ && git apply $GITHUB_WORKSPACE/KernelSU/.github/patches/$PATCH_PATH/*.patch
|
cd $GKI_ROOT/common/ && git apply $GITHUB_WORKSPACE/KernelSU/.github/patches/$PATCH_PATH/*.patch || echo "[-] No patch found"
|
||||||
|
|
||||||
|
if [ "$IS_DEBUG_KERNEL" = "true" ]; then
|
||||||
|
echo "[+] Enable debug features for kernel"
|
||||||
|
echo "ccflags-y += -DCONFIG_KSU_DEBUG" >> $GITHUB_WORKSPACE/KernelSU/kernel/Makefile
|
||||||
|
fi
|
||||||
|
repo status
|
||||||
echo "[+] KernelSU setup done."
|
echo "[+] KernelSU setup done."
|
||||||
|
|
||||||
- name: Symbol magic
|
- name: Symbol magic
|
||||||
@@ -124,14 +154,35 @@ jobs:
|
|||||||
max-size: 2G
|
max-size: 2G
|
||||||
save: ${{ github.event_name == 'push' && github.ref == 'refs/heads/main' }}
|
save: ${{ github.event_name == 'push' && github.ref == 'refs/heads/main' }}
|
||||||
|
|
||||||
|
- name: Make working directory clean to avoid dirty
|
||||||
|
working-directory: android-kernel
|
||||||
|
run: |
|
||||||
|
rm common/android/abi_gki_protected_exports_* || echo "No protected exports!"
|
||||||
|
git config --global user.email "bot@kernelsu.org"
|
||||||
|
git config --global user.name "KernelSUBot"
|
||||||
|
cd common/ && git add -A && git commit -a -m "Add KernelSU"
|
||||||
|
repo status
|
||||||
|
|
||||||
- name: Build boot.img
|
- name: Build boot.img
|
||||||
working-directory: android-kernel
|
working-directory: android-kernel
|
||||||
run: CCACHE="/usr/bin/ccache" LTO=thin BUILD_CONFIG=common/build.config.gki.aarch64 build/build.sh
|
run: |
|
||||||
|
if [ ! -z ${{ vars.EXPECTED_SIZE }} ] && [ ! -z ${{ vars.EXPECTED_HASH }} ]; then
|
||||||
|
export KSU_EXPECTED_SIZE=${{ vars.EXPECTED_SIZE }}
|
||||||
|
export KSU_EXPECTED_HASH=${{ vars.EXPECTED_HASH }}
|
||||||
|
fi
|
||||||
|
if [ -e build/build.sh ]; then
|
||||||
|
LTO=thin BUILD_CONFIG=common/build.config.gki.aarch64 build/build.sh CC="/usr/bin/ccache clang"
|
||||||
|
else
|
||||||
|
tools/bazel run --disk_cache=/home/runner/.cache/bazel --config=fast --config=stamp --lto=thin //common:kernel_aarch64_dist -- --dist_dir=dist
|
||||||
|
fi
|
||||||
|
|
||||||
- name: Prepare artifacts
|
- name: Prepare artifacts
|
||||||
id: prepareArtifacts
|
id: prepareArtifacts
|
||||||
run: |
|
run: |
|
||||||
OUTDIR=android-kernel/out/${{ inputs.version }}/dist
|
OUTDIR=android-kernel/out/${{ inputs.version }}/dist
|
||||||
|
if [ ! -e $OUTDIR ]; then
|
||||||
|
OUTDIR=android-kernel/dist
|
||||||
|
fi
|
||||||
mkdir output
|
mkdir output
|
||||||
cp $OUTDIR/Image ./output/
|
cp $OUTDIR/Image ./output/
|
||||||
cp $OUTDIR/Image.lz4 ./output/
|
cp $OUTDIR/Image.lz4 ./output/
|
||||||
@@ -140,13 +191,13 @@ jobs:
|
|||||||
cp $OUTDIR/Image ./AnyKernel3/
|
cp $OUTDIR/Image ./AnyKernel3/
|
||||||
|
|
||||||
- name: Upload Image and Image.gz
|
- name: Upload Image and Image.gz
|
||||||
uses: actions/upload-artifact@v3
|
uses: actions/upload-artifact@v4
|
||||||
with:
|
with:
|
||||||
name: Image-${{ inputs.version_name }}_${{ inputs.os_patch_level }}
|
name: Image-${{ inputs.version_name }}_${{ inputs.os_patch_level }}
|
||||||
path: ./output/*
|
path: ./output/*
|
||||||
|
|
||||||
- name: Upload AnyKernel3
|
- name: Upload AnyKernel3
|
||||||
uses: actions/upload-artifact@v3
|
uses: actions/upload-artifact@v4
|
||||||
with:
|
with:
|
||||||
name: AnyKernel3-${{ inputs.version_name }}_${{ inputs.os_patch_level }}
|
name: AnyKernel3-${{ inputs.version_name }}_${{ inputs.os_patch_level }}
|
||||||
path: ./AnyKernel3/*
|
path: ./AnyKernel3/*
|
||||||
|
|||||||
6
.github/workflows/ksud.yml
vendored
6
.github/workflows/ksud.yml
vendored
@@ -13,7 +13,7 @@ jobs:
|
|||||||
build:
|
build:
|
||||||
runs-on: ubuntu-latest
|
runs-on: ubuntu-latest
|
||||||
steps:
|
steps:
|
||||||
- uses: actions/checkout@v3
|
- uses: actions/checkout@v4
|
||||||
with:
|
with:
|
||||||
fetch-depth: 0
|
fetch-depth: 0
|
||||||
# cross build failed after Rust 1.68, see https://github.com/cross-rs/cross/issues/1222
|
# cross build failed after Rust 1.68, see https://github.com/cross-rs/cross/issues/1222
|
||||||
@@ -24,13 +24,13 @@ jobs:
|
|||||||
cache-targets: false
|
cache-targets: false
|
||||||
|
|
||||||
- name: Install cross
|
- name: Install cross
|
||||||
run: cargo install cross
|
run: cargo install cross --locked
|
||||||
|
|
||||||
- name: Build ksud
|
- name: Build ksud
|
||||||
run: cross build --target ${{ inputs.target }} --release --manifest-path ./userspace/ksud/Cargo.toml
|
run: cross build --target ${{ inputs.target }} --release --manifest-path ./userspace/ksud/Cargo.toml
|
||||||
|
|
||||||
- name: Upload ksud artifact
|
- name: Upload ksud artifact
|
||||||
uses: actions/upload-artifact@v3
|
uses: actions/upload-artifact@v4
|
||||||
with:
|
with:
|
||||||
name: ksud-${{ inputs.target }}
|
name: ksud-${{ inputs.target }}
|
||||||
path: userspace/ksud/target/**/release/ksud
|
path: userspace/ksud/target/**/release/ksud
|
||||||
|
|||||||
25
.github/workflows/release.yml
vendored
25
.github/workflows/release.yml
vendored
@@ -11,20 +11,31 @@ jobs:
|
|||||||
secrets: inherit
|
secrets: inherit
|
||||||
build-a12-kernel:
|
build-a12-kernel:
|
||||||
uses: ./.github/workflows/build-kernel-a12.yml
|
uses: ./.github/workflows/build-kernel-a12.yml
|
||||||
|
secrets: inherit
|
||||||
build-a13-kernel:
|
build-a13-kernel:
|
||||||
uses: ./.github/workflows/build-kernel-a13.yml
|
uses: ./.github/workflows/build-kernel-a13.yml
|
||||||
|
secrets: inherit
|
||||||
|
build-a14-kernel:
|
||||||
|
uses: ./.github/workflows/build-kernel-a14.yml
|
||||||
|
secrets: inherit
|
||||||
build-wsa-kernel:
|
build-wsa-kernel:
|
||||||
uses: ./.github/workflows/build-kernel-wsa.yml
|
uses: ./.github/workflows/build-kernel-wsa.yml
|
||||||
|
secrets: inherit
|
||||||
|
build-arcvm-kernel:
|
||||||
|
uses: ./.github/workflows/build-kernel-arcvm.yml
|
||||||
|
secrets: inherit
|
||||||
release:
|
release:
|
||||||
needs:
|
needs:
|
||||||
- build-manager
|
- build-manager
|
||||||
- build-a12-kernel
|
- build-a12-kernel
|
||||||
- build-a13-kernel
|
- build-a13-kernel
|
||||||
|
- build-a14-kernel
|
||||||
- build-wsa-kernel
|
- build-wsa-kernel
|
||||||
|
- build-arcvm-kernel
|
||||||
runs-on: ubuntu-latest
|
runs-on: ubuntu-latest
|
||||||
steps:
|
steps:
|
||||||
- name: Download artifacts
|
- name: Download artifacts
|
||||||
uses: actions/download-artifact@v3
|
uses: actions/download-artifact@v4
|
||||||
- name: Zip AnyKernel3
|
- name: Zip AnyKernel3
|
||||||
run: |
|
run: |
|
||||||
for dir in AnyKernel3-*; do
|
for dir in AnyKernel3-*; do
|
||||||
@@ -43,6 +54,15 @@ jobs:
|
|||||||
fi
|
fi
|
||||||
done
|
done
|
||||||
|
|
||||||
|
- name: Zip ChromeOS ARCVM kernel
|
||||||
|
run: |
|
||||||
|
for dir in kernel-ARCVM-*; do
|
||||||
|
if [ -d "$dir" ]; then
|
||||||
|
echo "------ Zip $dir ----------"
|
||||||
|
(cd $dir && zip -r9 "$dir".zip ./* -x .git .gitignore ./*.zip && mv *.zip ..)
|
||||||
|
fi
|
||||||
|
done
|
||||||
|
|
||||||
- name: Display structure of downloaded files
|
- name: Display structure of downloaded files
|
||||||
run: ls -R
|
run: ls -R
|
||||||
|
|
||||||
@@ -54,3 +74,4 @@ jobs:
|
|||||||
AnyKernel3-*.zip
|
AnyKernel3-*.zip
|
||||||
boot-images-*/Image-*/*.img.gz
|
boot-images-*/Image-*/*.img.gz
|
||||||
kernel-WSA*.zip
|
kernel-WSA*.zip
|
||||||
|
kernel-ARCVM*.zip
|
||||||
|
|||||||
6
.github/workflows/rustfmt.yml
vendored
6
.github/workflows/rustfmt.yml
vendored
@@ -21,13 +21,13 @@ jobs:
|
|||||||
format:
|
format:
|
||||||
runs-on: ubuntu-latest
|
runs-on: ubuntu-latest
|
||||||
steps:
|
steps:
|
||||||
- uses: actions/checkout@v3
|
- uses: actions/checkout@v4
|
||||||
|
|
||||||
- uses: dtolnay/rust-toolchain@nightly
|
- uses: dtolnay/rust-toolchain@nightly
|
||||||
with:
|
with:
|
||||||
components: rustfmt
|
components: rustfmt
|
||||||
|
|
||||||
- uses: LoliGothick/rustfmt-check@v0.3.1
|
- uses: LoliGothick/rustfmt-check@master
|
||||||
with:
|
with:
|
||||||
token: ${{ github.token }}
|
token: ${{ github.token }}
|
||||||
options: --manifest-path userspace/ksud/Cargo.toml
|
working-directory: userspace/ksud
|
||||||
|
|||||||
2
.github/workflows/shellcheck.yml
vendored
2
.github/workflows/shellcheck.yml
vendored
@@ -18,7 +18,7 @@ jobs:
|
|||||||
shellcheck:
|
shellcheck:
|
||||||
runs-on: ubuntu-latest
|
runs-on: ubuntu-latest
|
||||||
steps:
|
steps:
|
||||||
- uses: actions/checkout@v3
|
- uses: actions/checkout@v4
|
||||||
|
|
||||||
- name: Run ShellCheck
|
- name: Run ShellCheck
|
||||||
uses: ludeeus/action-shellcheck@2.0.0
|
uses: ludeeus/action-shellcheck@2.0.0
|
||||||
|
|||||||
135
.github/workflows/wsa-kernel.yml
vendored
Normal file
135
.github/workflows/wsa-kernel.yml
vendored
Normal file
@@ -0,0 +1,135 @@
|
|||||||
|
name: Build Kernel - WSA
|
||||||
|
on:
|
||||||
|
workflow_call:
|
||||||
|
inputs:
|
||||||
|
arch:
|
||||||
|
required: true
|
||||||
|
type: string
|
||||||
|
description: >
|
||||||
|
Build arch: x86_64 / arm64
|
||||||
|
version:
|
||||||
|
required: true
|
||||||
|
type: string
|
||||||
|
description: >
|
||||||
|
Build version
|
||||||
|
jobs:
|
||||||
|
build:
|
||||||
|
name: Build WSA-Kernel-${{ inputs.version }}-${{ inputs.arch }}
|
||||||
|
runs-on: ubuntu-20.04
|
||||||
|
env:
|
||||||
|
CCACHE_COMPILERCHECK: "%compiler% -dumpmachine; %compiler% -dumpversion"
|
||||||
|
CCACHE_NOHASHDIR: "true"
|
||||||
|
CCACHE_HARDLINK: "true"
|
||||||
|
|
||||||
|
steps:
|
||||||
|
- name: Install Build Tools
|
||||||
|
uses: awalsh128/cache-apt-pkgs-action@v1
|
||||||
|
with:
|
||||||
|
packages: bc bison build-essential flex libelf-dev binutils-aarch64-linux-gnu gcc-aarch64-linux-gnu gzip ccache
|
||||||
|
version: 1.0
|
||||||
|
|
||||||
|
- name: Cache LLVM
|
||||||
|
id: cache-llvm
|
||||||
|
uses: actions/cache@v3
|
||||||
|
with:
|
||||||
|
path: ./llvm
|
||||||
|
key: llvm-12.0.1
|
||||||
|
|
||||||
|
- name: Setup LLVM
|
||||||
|
uses: KyleMayes/install-llvm-action@v1
|
||||||
|
with:
|
||||||
|
version: "12.0.1"
|
||||||
|
force-version: true
|
||||||
|
ubuntu-version: "16.04"
|
||||||
|
cached: ${{ steps.cache-llvm.outputs.cache-hit }}
|
||||||
|
|
||||||
|
- name: Checkout KernelSU
|
||||||
|
uses: actions/checkout@v4
|
||||||
|
with:
|
||||||
|
path: KernelSU
|
||||||
|
fetch-depth: 0
|
||||||
|
|
||||||
|
- name: Setup kernel source
|
||||||
|
uses: actions/checkout@v4
|
||||||
|
with:
|
||||||
|
repository: microsoft/WSA-Linux-Kernel
|
||||||
|
ref: android-lts/latte-2/${{ inputs.version }}
|
||||||
|
path: WSA-Linux-Kernel
|
||||||
|
|
||||||
|
- name: Setup Ccache
|
||||||
|
uses: hendrikmuhs/ccache-action@v1.2
|
||||||
|
with:
|
||||||
|
key: WSA-Kernel-${{ inputs.version }}-${{ inputs.arch }}
|
||||||
|
save: ${{ github.event_name == 'push' && github.ref == 'refs/heads/main' }}
|
||||||
|
max-size: 2G
|
||||||
|
|
||||||
|
- name: Setup KernelSU
|
||||||
|
working-directory: WSA-Linux-Kernel
|
||||||
|
run: |
|
||||||
|
echo "[+] KernelSU setup"
|
||||||
|
KERNEL_ROOT=$GITHUB_WORKSPACE/WSA-Linux-Kernel
|
||||||
|
echo "[+] KERNEL_ROOT: $KERNEL_ROOT"
|
||||||
|
echo "[+] Copy KernelSU driver to $KERNEL_ROOT/drivers"
|
||||||
|
ln -sf $GITHUB_WORKSPACE/KernelSU/kernel $KERNEL_ROOT/drivers/kernelsu
|
||||||
|
echo "[+] Add KernelSU driver to Makefile"
|
||||||
|
DRIVER_MAKEFILE=$KERNEL_ROOT/drivers/Makefile
|
||||||
|
grep -q "kernelsu" $DRIVER_MAKEFILE || echo "obj-y += kernelsu/" >> $DRIVER_MAKEFILE
|
||||||
|
echo "[+] Apply KernelSU patches"
|
||||||
|
cd $KERNEL_ROOT && git apply $GITHUB_WORKSPACE/KernelSU/.github/patches/5.15/*.patch || echo "[-] No patch found"
|
||||||
|
echo "[+] KernelSU setup done."
|
||||||
|
cd $GITHUB_WORKSPACE/KernelSU
|
||||||
|
VERSION=$(($(git rev-list --count HEAD) + 10200))
|
||||||
|
echo "VERSION: $VERSION"
|
||||||
|
echo "kernelsu_version=$VERSION" >> $GITHUB_ENV
|
||||||
|
|
||||||
|
- name: Build Kernel
|
||||||
|
working-directory: WSA-Linux-Kernel
|
||||||
|
run: |
|
||||||
|
if [ ! -z ${{ vars.EXPECTED_SIZE }} ] && [ ! -z ${{ vars.EXPECTED_HASH }} ]; then
|
||||||
|
export KSU_EXPECTED_SIZE=${{ vars.EXPECTED_SIZE }}
|
||||||
|
export KSU_EXPECTED_HASH=${{ vars.EXPECTED_HASH }}
|
||||||
|
fi
|
||||||
|
declare -A ARCH_MAP=(["x86_64"]="x64" ["arm64"]="arm64")
|
||||||
|
cp configs/wsa/config-wsa-${ARCH_MAP[${{ inputs.arch }}]} .config
|
||||||
|
make olddefconfig
|
||||||
|
declare -A FILE_NAME=(["x86_64"]="bzImage" ["arm64"]="Image")
|
||||||
|
make -j`nproc` LLVM=1 ARCH=${{ inputs.arch }} $(if [ "${{ inputs.arch }}" == "arm64" ]; then echo CROSS_COMPILE=aarch64-linux-gnu; fi) ${FILE_NAME[${{ inputs.arch }}]} CCACHE="/usr/bin/ccache"
|
||||||
|
declare -A ARCH_MAP_FILE=(["x86_64"]="x86" ["arm64"]="arm64")
|
||||||
|
echo "file_path=WSA-Linux-Kernel/arch/${ARCH_MAP_FILE[${{ inputs.arch }}]}/boot/${FILE_NAME[${{ inputs.arch }}]}" >> $GITHUB_ENV
|
||||||
|
|
||||||
|
- name: Upload kernel-${{ inputs.arch }}-${{ inputs.version }}
|
||||||
|
uses: actions/upload-artifact@v4
|
||||||
|
with:
|
||||||
|
name: kernel-WSA-${{ inputs.arch }}-${{ inputs.version }}
|
||||||
|
path: "${{ env.file_path }}"
|
||||||
|
|
||||||
|
- name: Bot session cache
|
||||||
|
if: github.event_name == 'push' && github.ref == 'refs/heads/main' || github.ref_type == 'tag'
|
||||||
|
id: bot_session_cache
|
||||||
|
uses: actions/cache@v3
|
||||||
|
with:
|
||||||
|
path: scripts/ksubot.session
|
||||||
|
key: ${{ runner.os }}-bot-session
|
||||||
|
|
||||||
|
- name: Post to Telegram
|
||||||
|
if: github.event_name == 'push' && github.ref == 'refs/heads/main' || github.ref_type == 'tag'
|
||||||
|
env:
|
||||||
|
CHAT_ID: ${{ secrets.CHAT_ID }}
|
||||||
|
BOT_TOKEN: ${{ secrets.BOT_TOKEN }}
|
||||||
|
MESSAGE_THREAD_ID: ${{ secrets.MESSAGE_THREAD_ID }}
|
||||||
|
COMMIT_MESSAGE: ${{ github.event.head_commit.message }}
|
||||||
|
COMMIT_URL: ${{ github.event.head_commit.url }}
|
||||||
|
RUN_URL: ${{ github.server_url }}/${{ github.repository }}/actions/runs/${{ github.run_id }}
|
||||||
|
run: |
|
||||||
|
TITLE=kernel-${{ inputs.arch }}-WSA-${{ inputs.version }}
|
||||||
|
echo "[+] title: $TITLE"
|
||||||
|
export TITLE
|
||||||
|
export VERSION="${{ env.kernelsu_version }}"
|
||||||
|
echo "[+] Compress images"
|
||||||
|
gzip -n -f -9 "${{ env.file_path }}"
|
||||||
|
echo "[+] Image to upload"
|
||||||
|
ls -l "${{ env.file_path }}.gz"
|
||||||
|
if [ -n "${{ secrets.BOT_TOKEN }}" ]; then
|
||||||
|
pip3 install telethon==1.31.1
|
||||||
|
python3 "$GITHUB_WORKSPACE/KernelSU/scripts/ksubot.py" "${{ env.file_path }}.gz"
|
||||||
|
fi
|
||||||
3
.gitignore
vendored
3
.gitignore
vendored
@@ -1 +1,2 @@
|
|||||||
.vscode/
|
.idea
|
||||||
|
.vscode
|
||||||
|
|||||||
42
README.md
42
README.md
@@ -1,42 +0,0 @@
|
|||||||
**English** | [中文](README_CN.md)
|
|
||||||
|
|
||||||
# KernelSU
|
|
||||||
|
|
||||||
A Kernel based root solution for Android devices.
|
|
||||||
|
|
||||||
## Features
|
|
||||||
|
|
||||||
1. Kernel-based `su` and root access management.
|
|
||||||
2. Module system based on overlayfs.
|
|
||||||
|
|
||||||
## Compatibility State
|
|
||||||
|
|
||||||
KernelSU officially supports Android GKI 2.0 devices(with kernel 5.10+), old kernels(4.14+) is also compatiable, but you need to build kernel yourself.
|
|
||||||
|
|
||||||
WSA and containter-based Android should also work with KernelSU integrated.
|
|
||||||
|
|
||||||
And the current supported ABIs are : `arm64-v8a` and `x86_64`
|
|
||||||
|
|
||||||
## Usage
|
|
||||||
|
|
||||||
[Installation](https://kernelsu.org/guide/installation.html)
|
|
||||||
|
|
||||||
## Build
|
|
||||||
|
|
||||||
[How to build?](https://kernelsu.org/guide/how-to-build.html)
|
|
||||||
|
|
||||||
### Discussion
|
|
||||||
|
|
||||||
- Telegram: [@KernelSU](https://t.me/KernelSU)
|
|
||||||
|
|
||||||
## License
|
|
||||||
|
|
||||||
- Files under `kernel` directory are [GPL-2](https://www.gnu.org/licenses/old-licenses/gpl-2.0.en.html)
|
|
||||||
- All other parts except `kernel` directory are [GPL-3](https://www.gnu.org/licenses/gpl-3.0.html)
|
|
||||||
|
|
||||||
## Credits
|
|
||||||
|
|
||||||
- [kernel-assisted-superuser](https://git.zx2c4.com/kernel-assisted-superuser/about/): the KernelSU idea.
|
|
||||||
- [genuine](https://github.com/brevent/genuine/): apk v2 signature validation.
|
|
||||||
- [Diamorphine](https://github.com/m0nad/Diamorphine): some rootkit skills.
|
|
||||||
- [Magisk](https://github.com/topjohnwu/Magisk): the sepolicy implementation.
|
|
||||||
42
README_CN.md
42
README_CN.md
@@ -1,42 +0,0 @@
|
|||||||
[English](README.md) | **中文**
|
|
||||||
|
|
||||||
# KernelSU
|
|
||||||
|
|
||||||
一个 Android 上基于内核的 root 方案。
|
|
||||||
|
|
||||||
## 特性
|
|
||||||
|
|
||||||
- 基于内核的 su 和权限管理。
|
|
||||||
- 基于 overlayfs 的模块系统。
|
|
||||||
|
|
||||||
## 兼容状态
|
|
||||||
|
|
||||||
KernelSU 官方支持 GKI 2.0 的设备(内核版本5.10以上);旧内核也是兼容的(最低4.14+),不过需要自己编译内核。
|
|
||||||
|
|
||||||
WSA 和运行在容器上的 Android 也可以与 KernelSU 一起工作。
|
|
||||||
|
|
||||||
目前支持架构 : `arm64-v8a` 和 `x86_64`
|
|
||||||
|
|
||||||
## 使用方法
|
|
||||||
|
|
||||||
[安装教程](https://kernelsu.org/zh_CN/guide/installation.html)
|
|
||||||
|
|
||||||
## 构建
|
|
||||||
|
|
||||||
[如何构建?](https://kernelsu.org/zh_CN/guide/how-to-build.html)
|
|
||||||
|
|
||||||
### 讨论
|
|
||||||
|
|
||||||
- Telegram: [@KernelSU](https://t.me/KernelSU)
|
|
||||||
|
|
||||||
## 许可证
|
|
||||||
|
|
||||||
- 目录 `kernel` 下所有文件为 [GPL-2](https://www.gnu.org/licenses/old-licenses/gpl-2.0.en.html)
|
|
||||||
- 除 `kernel` 目录的其他部分均为 [GPL-3](https://www.gnu.org/licenses/gpl-3.0.html)
|
|
||||||
|
|
||||||
## 鸣谢
|
|
||||||
|
|
||||||
- [kernel-assisted-superuser](https://git.zx2c4.com/kernel-assisted-superuser/about/):KernelSU 的灵感。
|
|
||||||
- [true](https://github.com/brevent/genuine/):apk v2 签名验证。
|
|
||||||
- [Diamorphine](https://github.com/m0nad/Diamorphine):一些 rootkit 技巧。
|
|
||||||
- [Magisk](https://github.com/topjohnwu/Magisk):sepolicy 的实现。
|
|
||||||
7
SECURITY.md
Normal file
7
SECURITY.md
Normal file
@@ -0,0 +1,7 @@
|
|||||||
|
# Reporting Security Issues
|
||||||
|
|
||||||
|
The KernelSU team and community take security bugs in KernelSU seriously. We appreciate your efforts to responsibly disclose your findings, and will make every effort to acknowledge your contributions.
|
||||||
|
|
||||||
|
To report a security issue, please use the GitHub Security Advisory ["Report a Vulnerability"](https://github.com/tiann/KernelSU/security/advisories/new) tab, or you can mailto [weishu](mailto:twsxtd@gmail.com) directly.
|
||||||
|
|
||||||
|
The KernelSU team will send a response indicating the next steps in handling your report. After the initial reply to your report, the security team will keep you informed of the progress towards a fix and full announcement, and may ask for additional information or guidance.
|
||||||
57
docs/README.md
Normal file
57
docs/README.md
Normal file
@@ -0,0 +1,57 @@
|
|||||||
|
**English** | [Español](README_ES.md) | [简体中文](README_CN.md) | [繁體中文](README_TW.md) | [日本語](README_JP.md) | [Polski](README_PL.md) | [Português (Brasil)](README_PT-BR.md) | [Türkçe](README_TR.md) | [Русский](README_RU.md) | [Tiếng Việt](README_VI.md) | [Indonesia](README_ID.md) | [עברית](README_IW.md) | [हिंदी](README_IN.md)
|
||||||
|
|
||||||
|
# KernelSU
|
||||||
|
|
||||||
|
<img src="https://kernelsu.org/logo.png" style="width: 96px;" alt="logo">
|
||||||
|
|
||||||
|
A Kernel-based root solution for Android devices.
|
||||||
|
|
||||||
|
[](https://github.com/tiann/KernelSU/releases/latest)
|
||||||
|
[](https://hosted.weblate.org/engage/kernelsu)
|
||||||
|
[](https://t.me/KernelSU)
|
||||||
|
[](https://www.gnu.org/licenses/old-licenses/gpl-2.0.en.html)
|
||||||
|
[](/LICENSE)
|
||||||
|
|
||||||
|
## Features
|
||||||
|
|
||||||
|
1. Kernel-based `su` and root access management.
|
||||||
|
2. Module system based on [OverlayFS](https://en.wikipedia.org/wiki/OverlayFS).
|
||||||
|
3. [App Profile](https://kernelsu.org/guide/app-profile.html): Lock up the root power in a cage.
|
||||||
|
|
||||||
|
## Compatibility State
|
||||||
|
|
||||||
|
KernelSU officially supports Android GKI 2.0 devices (kernel 5.10+). Older kernels (4.14+) are also compatible, but the kernel will have to be built manually.
|
||||||
|
|
||||||
|
With this, WSA, ChromeOS, and container-based Android are all supported.
|
||||||
|
|
||||||
|
Currently, only `arm64-v8a` and `x86_64` are supported.
|
||||||
|
|
||||||
|
## Usage
|
||||||
|
|
||||||
|
- [Installation Instruction](https://kernelsu.org/guide/installation.html)
|
||||||
|
- [How to build?](https://kernelsu.org/guide/how-to-build.html)
|
||||||
|
- [Official Website](https://kernelsu.org/)
|
||||||
|
|
||||||
|
## Translation
|
||||||
|
|
||||||
|
To help translate KernelSU or improve existing translations, please use [Weblate](https://hosted.weblate.org/engage/kernelsu/). PR of Manager's translation is no longer accepted, because it will conflict with Weblate.
|
||||||
|
|
||||||
|
## Discussion
|
||||||
|
|
||||||
|
- Telegram: [@KernelSU](https://t.me/KernelSU)
|
||||||
|
|
||||||
|
## Security
|
||||||
|
|
||||||
|
For information on reporting security vulnerabilities in KernelSU, see [SECURITY.md](/SECURITY.md).
|
||||||
|
|
||||||
|
## License
|
||||||
|
|
||||||
|
- Files under the `kernel` directory are [GPL-2.0-only](https://www.gnu.org/licenses/old-licenses/gpl-2.0.en.html).
|
||||||
|
- All other parts except the `kernel` directory are [GPL-3.0-or-later](https://www.gnu.org/licenses/gpl-3.0.html).
|
||||||
|
|
||||||
|
## Credits
|
||||||
|
|
||||||
|
- [kernel-assisted-superuser](https://git.zx2c4.com/kernel-assisted-superuser/about/): the KernelSU idea.
|
||||||
|
- [Magisk](https://github.com/topjohnwu/Magisk): the powerful root tool.
|
||||||
|
- [genuine](https://github.com/brevent/genuine/): apk v2 signature validation.
|
||||||
|
- [Diamorphine](https://github.com/m0nad/Diamorphine): some rootkit skills.
|
||||||
57
docs/README_CN.md
Normal file
57
docs/README_CN.md
Normal file
@@ -0,0 +1,57 @@
|
|||||||
|
[English](README.md) | [Español](README_ES.md) | **简体中文** | [繁體中文](README_TW.md) | [日本語](README_JP.md) | [Polski](README_PL.md) | [Português (Brasil)](README_PT-BR.md) | [Türkçe](README_TR.md) | [Русский](README_RU.md) | [Tiếng Việt](README_VI.md) | [Indonesia](README_ID.md) | [עברית](README_IW.md) | [हिंदी](README_IN.md)
|
||||||
|
|
||||||
|
# KernelSU
|
||||||
|
|
||||||
|
<img src="https://kernelsu.org/logo.png" style="width: 96px;" alt="logo">
|
||||||
|
|
||||||
|
一个 Android 上基于内核的 root 方案。
|
||||||
|
|
||||||
|
[](https://github.com/tiann/KernelSU/releases/latest)
|
||||||
|
[](https://hosted.weblate.org/engage/kernelsu)
|
||||||
|
[](https://t.me/KernelSU)
|
||||||
|
[](https://www.gnu.org/licenses/old-licenses/gpl-2.0.en.html)
|
||||||
|
[](/LICENSE)
|
||||||
|
|
||||||
|
## 特性
|
||||||
|
|
||||||
|
- 基于内核的 `su` 和权限管理。
|
||||||
|
- 基于 [OverlayFS](https://en.wikipedia.org/wiki/OverlayFS) 的模块系统。
|
||||||
|
- [App Profile](https://kernelsu.org/zh_CN/guide/app-profile.html): 把 Root 权限关进笼子里。
|
||||||
|
|
||||||
|
## 兼容状态
|
||||||
|
|
||||||
|
KernelSU 官方支持 GKI 2.0 的设备(内核版本5.10以上);旧内核也是兼容的(最低4.14+),不过需要自己编译内核。
|
||||||
|
|
||||||
|
WSA, ChromeOS 和运行在容器上的 Android 也可以与 KernelSU 一起工作。
|
||||||
|
|
||||||
|
目前支持架构 : `arm64-v8a` 和 `x86_64`。
|
||||||
|
|
||||||
|
## 使用方法
|
||||||
|
|
||||||
|
- [安装教程](https://kernelsu.org/zh_CN/guide/installation.html)
|
||||||
|
- [如何构建?](https://kernelsu.org/zh_CN/guide/how-to-build.html)
|
||||||
|
- [官方网站](https://kernelsu.org/zh_CN/)
|
||||||
|
|
||||||
|
## 参与翻译
|
||||||
|
|
||||||
|
要将 KernelSU 翻译成您的语言,或完善现有的翻译,请使用 [Weblate](https://hosted.weblate.org/engage/kernelsu/)。现已不再接受有关管理器翻译的PR,因为这会与Weblate冲突。
|
||||||
|
|
||||||
|
## 讨论
|
||||||
|
|
||||||
|
- Telegram: [@KernelSU](https://t.me/KernelSU)
|
||||||
|
|
||||||
|
## 安全性
|
||||||
|
|
||||||
|
有关报告 KernelSU 安全漏洞的信息,请参阅 [SECURITY.md](/SECURITY.md)。
|
||||||
|
|
||||||
|
## 许可证
|
||||||
|
|
||||||
|
- 目录 `kernel` 下所有文件为 [GPL-2.0-only](https://www.gnu.org/licenses/old-licenses/gpl-2.0.en.html)。
|
||||||
|
- 除 `kernel` 目录的其他部分均为 [GPL-3.0-or-later](https://www.gnu.org/licenses/gpl-3.0.html)。
|
||||||
|
|
||||||
|
## 鸣谢
|
||||||
|
|
||||||
|
- [kernel-assisted-superuser](https://git.zx2c4.com/kernel-assisted-superuser/about/):KernelSU 的灵感。
|
||||||
|
- [Magisk](https://github.com/topjohnwu/Magisk):强大的 root 工具箱。
|
||||||
|
- [genuine](https://github.com/brevent/genuine/):apk v2 签名验证。
|
||||||
|
- [Diamorphine](https://github.com/m0nad/Diamorphine):一些 rootkit 技巧。
|
||||||
56
docs/README_ES.md
Normal file
56
docs/README_ES.md
Normal file
@@ -0,0 +1,56 @@
|
|||||||
|
[English](README.md) | **Español** | [简体中文](README_CN.md) | [繁體中文](README_TW.md) | [日本語](README_JP.md) | [Polski](README_PL.md) | [Português (Brasil)](README_PT-BR.md) | [Türkçe](README_TR.md) | [Русский](README_RU.md) | [Tiếng Việt](README_VI.md) | [Indonesia](README_ID.md) | [עברית](README_IW.md) | [हिंदी](README_IN.md)
|
||||||
|
|
||||||
|
# KernelSU
|
||||||
|
|
||||||
|
<img src="https://kernelsu.org/logo.png" style="width: 96px;" alt="logo">
|
||||||
|
|
||||||
|
Una solución root basada en el kernel para dispositivos Android.
|
||||||
|
|
||||||
|
[](https://github.com/tiann/KernelSU/releases/latest)
|
||||||
|
[](https://hosted.weblate.org/engage/kernelsu)
|
||||||
|
[](https://t.me/KernelSU)
|
||||||
|
[](https://www.gnu.org/licenses/old-licenses/gpl-2.0.en.html)
|
||||||
|
[](/LICENSE)
|
||||||
|
|
||||||
|
## Características
|
||||||
|
|
||||||
|
1. Binario `su` basado en el kernel y gestión de acceso root.
|
||||||
|
2. Sistema de módulos basado en [OverlayFS](https://en.wikipedia.org/wiki/OverlayFS).
|
||||||
|
|
||||||
|
## Estado de compatibilidad
|
||||||
|
|
||||||
|
**KernelSU** soporta de forma oficial dispositivos Android con **GKI 2.0** (a partir de la versión **5.10** del kernel). Los kernels antiguos (a partir de la versión **4.14**) también son compatibles, pero necesitas compilarlos por tu cuenta.
|
||||||
|
|
||||||
|
Con esto, WSA, ChromeOS y Android basado en contenedores están todos compatibles.
|
||||||
|
|
||||||
|
Actualmente, solo se admiten las arquitecturas `arm64-v8a` y `x86_64`.
|
||||||
|
|
||||||
|
## Uso
|
||||||
|
|
||||||
|
- [¿Cómo instalarlo?](https://kernelsu.org/guide/installation.html)
|
||||||
|
- [¿Cómo compilarlo?](https://kernelsu.org/guide/how-to-build.html)
|
||||||
|
- [Site oficial](https://kernelsu.org/)
|
||||||
|
|
||||||
|
## Traducción
|
||||||
|
|
||||||
|
Para ayudar a traducir KernelSU o mejorar las traducciones existentes, utilice [Weblate](https://hosted.weblate.org/engage/kernelsu/). Ya no se aceptan PR de la traducción de Manager porque entrará en conflicto con Weblate.
|
||||||
|
|
||||||
|
## Discusión
|
||||||
|
|
||||||
|
- Telegram: [@KernelSU](https://t.me/KernelSU)
|
||||||
|
|
||||||
|
## Seguridad
|
||||||
|
|
||||||
|
Para obtener información sobre cómo informar vulnerabilidades de seguridad en KernelSU, consulte [SECURITY.md](/SECURITY.md).
|
||||||
|
|
||||||
|
## Licencia
|
||||||
|
|
||||||
|
- Los archivos bajo el directorio `kernel` están licenciados bajo [GPL-2-only](https://www.gnu.org/licenses/old-licenses/gpl-2.0.en.html).
|
||||||
|
- Todas las demás partes, a excepción del directorio `kernel`, están licenciados bajo [GPL-3-or-later](https://www.gnu.org/licenses/gpl-3.0.html).
|
||||||
|
|
||||||
|
## Créditos
|
||||||
|
|
||||||
|
- [kernel-assisted-superuser](https://git.zx2c4.com/kernel-assisted-superuser/about/): la idea de KernelSU.
|
||||||
|
- [Magisk](https://github.com/topjohnwu/Magisk): la poderosa herramienta root.
|
||||||
|
- [genuine](https://github.com/brevent/genuine/): validación de firma apk v2.
|
||||||
|
- [Diamorphine](https://github.com/m0nad/Diamorphine): algunas habilidades de rootkit.
|
||||||
53
docs/README_ID.md
Normal file
53
docs/README_ID.md
Normal file
@@ -0,0 +1,53 @@
|
|||||||
|
[English](README.md) | [Español](README_ES.md) | [简体中文](README_CN.md) | [繁體中文](README_TW.md) | [日本語](README_JP.md) | [Polski](README_PL.md) | [Português (Brasil)](README_PT-BR.md) | [Türkçe](README_TR.md) | [Русский](README_RU.md) | [Tiếng Việt](README_VI.md) | **Indonesia** | [עברית](README_IW.md) | [हिंदी](README_IN.md)
|
||||||
|
|
||||||
|
# KernelSU
|
||||||
|
|
||||||
|
<img src="https://kernelsu.org/logo.png" style="width: 96px;" alt="logo">
|
||||||
|
|
||||||
|
Solusi root berbasis Kernel untuk perangkat Android.
|
||||||
|
|
||||||
|
[](https://github.com/tiann/KernelSU/releases/latest)
|
||||||
|
[](https://hosted.weblate.org/engage/kernelsu)
|
||||||
|
[](https://t.me/KernelSU)
|
||||||
|
[](https://www.gnu.org/licenses/old-licenses/gpl-2.0.en.html)
|
||||||
|
[](/LICENSE)
|
||||||
|
|
||||||
|
## Fitur
|
||||||
|
|
||||||
|
1. Manajemen akses root dan `su` berbasis kernel.
|
||||||
|
2. Sistem modul berdasarkan [OverlayFS](https://en.wikipedia.org/wiki/OverlayFS).
|
||||||
|
3. [Profil Aplikasi](https://kernelsu.org/guide/app-profile.html): Kunci daya root di dalam sangkar.
|
||||||
|
|
||||||
|
## Status Kompatibilitas
|
||||||
|
|
||||||
|
KernelSU secara resmi mendukung perangkat Android GKI 2.0 (dengan kernel 5.10+), kernel lama (4.14+) juga kompatibel, tetapi Anda perlu membuat kernel sendiri.
|
||||||
|
|
||||||
|
WSA, ChromeOS, dan Android berbasis wadah juga dapat bekerja dengan KernelSU terintegrasi.
|
||||||
|
|
||||||
|
Dan ABI yang didukung saat ini adalah: `arm64-v8a` dan `x86_64`
|
||||||
|
|
||||||
|
## Penggunaan
|
||||||
|
|
||||||
|
- [Petunjuk Instalasi](https://kernelsu.org/id_ID/guide/installation.html)
|
||||||
|
- [Bagaimana cara membuat?](https://kernelsu.org/id_ID/guide/how-to-build.html)
|
||||||
|
- [Situs Web Resmi](https://kernelsu.org/id_ID/)
|
||||||
|
|
||||||
|
## Terjemahan
|
||||||
|
|
||||||
|
Untuk menerjemahkan KernelSU ke dalam bahasa Anda atau menyempurnakan terjemahan yang sudah ada, harap gunakan [Weblat](https://hosted.weblate.org/engage/kernelsu/).
|
||||||
|
|
||||||
|
## Diskusi
|
||||||
|
|
||||||
|
- Telegram: [@KernelSU](https://t.me/KernelSU)
|
||||||
|
|
||||||
|
## Lisensi
|
||||||
|
|
||||||
|
- File di bawah direktori `kernel` adalah [GPL-2-only](https://www.gnu.org/licenses/old-licenses/gpl-2.0.en.html).
|
||||||
|
- Semua bagian lain kecuali direktori `kernel` adalah [GPL-3.0-or-later](https://www.gnu.org/licenses/gpl-3.0.html).
|
||||||
|
|
||||||
|
## Kredit
|
||||||
|
|
||||||
|
- [kernel-assisted-superuser](https://git.zx2c4.com/kernel-assisted-superuser/about/): ide KernelSU.
|
||||||
|
- [Magisk](https://github.com/topjohnwu/Magisk): alat root yang ampuh.
|
||||||
|
- [genuine](https://github.com/brevent/genuine/): validasi tanda tangan apk v2.
|
||||||
|
- [Diamorphine](https://github.com/m0nad/Diamorphine): beberapa keterampilan rootkit.
|
||||||
53
docs/README_IN.md
Normal file
53
docs/README_IN.md
Normal file
@@ -0,0 +1,53 @@
|
|||||||
|
[English](README.md) | [Español](README_ES.md) | [简体中文](README_CN.md) | [繁體中文](README_TW.md) | [日本語](README_JP.md) | [Polski](README_PL.md) | [Português (Brasil)](README_PT-BR.md) | [Türkçe](README_TR.md) | [Русский](README_RU.md) | [Tiếng Việt](README_VI.md) | [Indonesia](README_ID.md) | [עברית](README_IW.md) | **हिंदी**
|
||||||
|
|
||||||
|
# KernelSU
|
||||||
|
|
||||||
|
<img src="https://kernelsu.org/logo.png" style="width: 96px;" alt="logo">
|
||||||
|
|
||||||
|
Android उपकरणों के लिए कर्नेल-आधारित रूट समाधान।
|
||||||
|
|
||||||
|
[](https://github.com/tiann/KernelSU/releases/latest)
|
||||||
|
[](https://hosted.weblate.org/engage/kernelsu)
|
||||||
|
[](https://t.me/KernelSU)
|
||||||
|
[](https://www.gnu.org/licenses/old-licenses/gpl-2.0.en.html)
|
||||||
|
[](/LICENSE)
|
||||||
|
|
||||||
|
## विशेषताएँ
|
||||||
|
|
||||||
|
1. कर्नेल-आधारित `su` और रूट एक्सेस प्रबंधन।
|
||||||
|
2. [OverlayFS](https://en.wikipedia.org/wiki/OverlayFS) पर आधारित मॉड्यूल प्रणाली।
|
||||||
|
3. [App Profile](https://kernelsu.org/guide/app-profile.html): Root शक्ति को पिंजरे में बंद कर दो।
|
||||||
|
|
||||||
|
## अनुकूलता अवस्था
|
||||||
|
|
||||||
|
KernelSU आधिकारिक तौर पर Android GKI 2.0 डिवाइस (कर्नेल 5.10+) का समर्थन करता है। पुराने कर्नेल (4.14+) भी संगत हैं, लेकिन कर्नेल को मैन्युअल रूप से बनाना होगा।
|
||||||
|
|
||||||
|
इसके साथ, WSA, ChromeOS और कंटेनर-आधारित Android सभी समर्थित हैं।
|
||||||
|
|
||||||
|
वर्तमान में, केवल `arm64-v8a` और `x86_64` समर्थित हैं।
|
||||||
|
|
||||||
|
## प्रयोग
|
||||||
|
|
||||||
|
- [स्थापना निर्देश](https://kernelsu.org/guide/installation.html)
|
||||||
|
- [कैसे बनाना है ?](https://kernelsu.org/guide/how-to-build.html)
|
||||||
|
- [आधिकारिक वेबसाइट](https://kernelsu.org/)
|
||||||
|
|
||||||
|
## अनुवाद करना
|
||||||
|
|
||||||
|
KernelSU का अनुवाद करने या मौजूदा अनुवादों को बेहतर बनाने में सहायता के लिए, कृपया इसका उपयोग करें [Weblate](https://hosted.weblate.org/engage/kernelsu/).
|
||||||
|
|
||||||
|
## बहस
|
||||||
|
|
||||||
|
- Telegram: [@KernelSU](https://t.me/KernelSU)
|
||||||
|
|
||||||
|
## लाइसेंस
|
||||||
|
|
||||||
|
- `Kernel` निर्देशिका के अंतर्गत फ़ाइलें हैं [GPL-2-only](https://www.gnu.org/licenses/old-licenses/gpl-2.0.en.html)
|
||||||
|
- `Kernel` निर्देशिका को छोड़कर अन्य सभी भाग हैं [GPL-3.0-or-later](https://www.gnu.org/licenses/gpl-3.0.html)
|
||||||
|
|
||||||
|
## आभार सूची
|
||||||
|
|
||||||
|
- [kernel-assisted-superuser](https://git.zx2c4.com/kernel-assisted-superuser/about/): KernelSU विचार।
|
||||||
|
- [Magisk](https://github.com/topjohnwu/Magisk): शक्तिशाली root उपकरण।
|
||||||
|
- [genuine](https://github.com/brevent/genuine/): apk v2 हस्ताक्षर सत्यापन।
|
||||||
|
- [Diamorphine](https://github.com/m0nad/Diamorphine): कुछ रूटकिट कौशल।
|
||||||
53
docs/README_IW.md
Normal file
53
docs/README_IW.md
Normal file
@@ -0,0 +1,53 @@
|
|||||||
|
[English](README.md) | [Español](README_ES.md) | [简体中文](README_CN.md) | [繁體中文](README_TW.md) | [日本語](README_JP.md) | [Polski](README_PL.md) | [Português (Brasil)](README_PT-BR.md) | [Türkçe](README_TR.md) | [Русский](README_RU.md) | [Tiếng Việt](README_VI.md) | [Indonesia](README_ID.md) | **עברית** | [हिंदी](README_IN.md)
|
||||||
|
|
||||||
|
# KernelSU
|
||||||
|
|
||||||
|
<img src="https://kernelsu.org/logo.png" style="width: 96px;" alt="logo">
|
||||||
|
|
||||||
|
פתרון לניהול root מבוסס על Kernel עבור מכשירי Android.
|
||||||
|
|
||||||
|
[](https://github.com/tiann/KernelSU/releases/latest)
|
||||||
|
[](https://hosted.weblate.org/engage/kernelsu)
|
||||||
|
[](https://t.me/KernelSU)
|
||||||
|
[](https://www.gnu.org/licenses/old-licenses/gpl-2.0.en.html)
|
||||||
|
[](/LICENSE)
|
||||||
|
|
||||||
|
## תכונות
|
||||||
|
|
||||||
|
1. ניהול root ו־`su` מבוססים על Kernel.
|
||||||
|
2. מערכת מודולים מבוססת [OverlayFS](https://en.wikipedia.org/wiki/OverlayFS).
|
||||||
|
3. [פרופיל אפליקציה](https://kernelsu.org/guide/app-profile.html): נעילת גישת root בכלוב.
|
||||||
|
|
||||||
|
## מצב תאימות
|
||||||
|
|
||||||
|
KernelSU תומך במכשירי Android GKI 2.0 (kernel 5.10+) באופן רשמי. לליבות ישנות (4.14+) יש גם תאימות, אך יידרש לבנות את הליבה באופן ידני.
|
||||||
|
|
||||||
|
באמצעות זה, תמיכה זמינה גם ל-WSA, ChromeOS ומכשירי Android המבוססים על מיכלים.
|
||||||
|
|
||||||
|
כרגע, רק `arm64-v8a` ו־`x86_64` נתמכים.
|
||||||
|
|
||||||
|
## שימוש
|
||||||
|
|
||||||
|
- [הוראות התקנה](https://kernelsu.org/guide/installation.html)
|
||||||
|
- [איך לבנות?](https://kernelsu.org/guide/how-to-build.html)
|
||||||
|
- [האתר רשמי](https://kernelsu.org/)
|
||||||
|
|
||||||
|
## תרגום
|
||||||
|
|
||||||
|
כדי לעזור בתרגום של KernelSU או לשפר תרגומים קיימים, יש להשתמש ב-[Weblate](https://hosted.weblate.org/engage/kernelsu/).
|
||||||
|
|
||||||
|
## דיון
|
||||||
|
|
||||||
|
- Telegram: [@KernelSU](https://t.me/KernelSU)
|
||||||
|
|
||||||
|
## רשיון
|
||||||
|
|
||||||
|
- קבצים תחת הספרייה `kernel` מוגנים על פי [GPL-2.0-only](https://www.gnu.org/licenses/old-licenses/gpl-2.0.en.html).
|
||||||
|
- כל החלקים האחרים, למעט הספרייה `kernel`, מוגנים על פי [GPL-3.0-or-later](https://www.gnu.org/licenses/gpl-3.0.html).
|
||||||
|
|
||||||
|
## קרדיטים
|
||||||
|
|
||||||
|
- [kernel-assisted-superuser](https://git.zx2c4.com/kernel-assisted-superuser/about/): הרעיון של KernelSU.
|
||||||
|
- [Magisk](https://github.com/topjohnwu/Magisk): הכלי הסופר חזק לניהול root.
|
||||||
|
- [genuine](https://github.com/brevent/genuine/): אימות חתימת apk v2.
|
||||||
|
- [Diamorphine](https://github.com/m0nad/Diamorphine): כמה יכולות רוט.
|
||||||
53
docs/README_JP.md
Normal file
53
docs/README_JP.md
Normal file
@@ -0,0 +1,53 @@
|
|||||||
|
[English](README.md) | [Español](README_ES.md) | [简体中文](README_CN.md) | [繁體中文](README_TW.md) | **日本語** | [Polski](README_PL.md) | [Português (Brasil)](README_PT-BR.md) | [Türkçe](README_TR.md) | [Русский](README_RU.md) | [Tiếng Việt](README_VI.md) | [Indonesia](README_ID.md) | [עברית](README_IW.md) | [हिंदी](README_IN.md)
|
||||||
|
|
||||||
|
# KernelSU
|
||||||
|
|
||||||
|
<img src="https://kernelsu.org/logo.png" style="width: 96px;" alt="logo">
|
||||||
|
|
||||||
|
Android におけるカーネルベースの root ソリューションです。
|
||||||
|
|
||||||
|
[](https://github.com/tiann/KernelSU/releases/latest)
|
||||||
|
[](https://hosted.weblate.org/engage/kernelsu)
|
||||||
|
[](https://t.me/KernelSU)
|
||||||
|
[](https://www.gnu.org/licenses/old-licenses/gpl-2.0.en.html)
|
||||||
|
[](/LICENSE)
|
||||||
|
|
||||||
|
## 特徴
|
||||||
|
|
||||||
|
1. カーネルベースの `su` と権限管理。
|
||||||
|
2. [OverlayFS](https://en.wikipedia.org/wiki/OverlayFS) に基づくモジュールシステム。
|
||||||
|
3. [アプリのプロファイル](https://kernelsu.org/guide/app-profile.html): root の権限をケージ内に閉じ込めます。
|
||||||
|
|
||||||
|
## 対応状況
|
||||||
|
|
||||||
|
KernelSU は GKI 2.0 デバイス(カーネルバージョン 5.10 以上)を公式にサポートしています。古いカーネル(4.14以上)とも互換性がありますが、自分でカーネルをビルドする必要があります。
|
||||||
|
|
||||||
|
WSA 、ChromeOS とコンテナ上で動作する Android でも KernelSU を統合して動かせます。
|
||||||
|
|
||||||
|
現在サポートしているアーキテクチャは `arm64-v8a` および `x86_64` です。
|
||||||
|
|
||||||
|
## 使用方法
|
||||||
|
|
||||||
|
- [インストール方法はこちら](https://kernelsu.org/ja_JP/guide/installation.html)
|
||||||
|
- [ビルド方法はこちら](https://kernelsu.org/guide/how-to-build.html)
|
||||||
|
- [公式サイト](https://kernelsu.org/ja_JP/)
|
||||||
|
|
||||||
|
## 翻訳
|
||||||
|
|
||||||
|
KernelSU をあなたの言語に翻訳するか、既存の翻訳を改善するには、[Weblate](https://hosted.weblate.org/engage/kernelsu/) を使用してください。Manager翻訳した PR は、Weblate と競合するため受け入れられなくなりました。
|
||||||
|
|
||||||
|
## ディスカッション
|
||||||
|
|
||||||
|
- Telegram: [@KernelSU](https://t.me/KernelSU)
|
||||||
|
|
||||||
|
## ライセンス
|
||||||
|
|
||||||
|
- `kernel` ディレクトリの下にあるすべてのファイル: [GPL-2-only](https://www.gnu.org/licenses/old-licenses/gpl-2.0.en.html)。
|
||||||
|
- `kernel` ディレクトリ以外のすべてのファイル: [GPL-3.0-or-later](https://www.gnu.org/licenses/gpl-3.0.html)。
|
||||||
|
|
||||||
|
## クレジット
|
||||||
|
|
||||||
|
- [kernel-assisted-superuser](https://git.zx2c4.com/kernel-assisted-superuser/about/):KernelSU のアイデア元。
|
||||||
|
- [Magisk](https://github.com/topjohnwu/Magisk):強力な root ツール。
|
||||||
|
- [genuine](https://github.com/brevent/genuine/):apk v2 の署名検証。
|
||||||
|
- [Diamorphine](https://github.com/m0nad/Diamorphine): rootkit のスキル。
|
||||||
55
docs/README_PL.md
Normal file
55
docs/README_PL.md
Normal file
@@ -0,0 +1,55 @@
|
|||||||
|
[English](README.md) | [Español](README_ES.md) | [简体中文](README_CN.md) | [繁體中文](README_TW.md) | [日本語](README_JP.md) | **Polski** | [Português (Brasil)](README_PT-BR.md) | [Türkçe](README_TR.md) | [Русский](README_RU.md) | [Tiếng Việt](README_VI.md) | [Indonesia](README_ID.md) | [עברית](README_IW.md) | [हिंदी](README_IN.md)
|
||||||
|
|
||||||
|
# KernelSU
|
||||||
|
|
||||||
|
<img src="https://kernelsu.org/logo.png" style="width: 96px;" alt="logo">
|
||||||
|
|
||||||
|
Rozwiązanie root oparte na jądrze dla urządzeń z systemem Android.
|
||||||
|
|
||||||
|
[](https://github.com/tiann/KernelSU/releases/latest)
|
||||||
|
[](https://hosted.weblate.org/engage/kernelsu)
|
||||||
|
[](https://t.me/KernelSU)
|
||||||
|
[](https://www.gnu.org/licenses/old-licenses/gpl-2.0.en.html)
|
||||||
|
[](/LICENSE)
|
||||||
|
|
||||||
|
## Cechy
|
||||||
|
|
||||||
|
1. Oparte na jądrze `su` i zarządzanie dostępem roota.
|
||||||
|
2. System modułów oparty na [OverlayFS](https://en.wikipedia.org/wiki/OverlayFS).
|
||||||
|
|
||||||
|
## Kompatybilność
|
||||||
|
|
||||||
|
KernelSU oficjalnie obsługuje urządzenia z Androidem GKI 2.0 (z jądrem 5.10+), starsze jądra (4.14+) są również kompatybilne, ale musisz sam skompilować jądro.
|
||||||
|
|
||||||
|
WSA i Android oparty na kontenerach również powinny działać ze zintegrowanym KernelSU.
|
||||||
|
|
||||||
|
Aktualnie obsługiwane ABI to : `arm64-v8a` i `x86_64`.
|
||||||
|
|
||||||
|
## Użycie
|
||||||
|
|
||||||
|
- [Instalacja](https://kernelsu.org/guide/installation.html)
|
||||||
|
- [Jak skompilować?](https://kernelsu.org/guide/how-to-build.html)
|
||||||
|
|
||||||
|
## Tłumaczenie
|
||||||
|
|
||||||
|
Aby pomóc w tłumaczeniu KernelSU lub ulepszyć istniejące tłumaczenia, użyj [Weblate](https://hosted.weblate.org/engage/kernelsu/). PR tłumaczenia Managera nie jest już akceptowany, ponieważ będzie kolidował z Weblate.
|
||||||
|
|
||||||
|
## Dyskusja
|
||||||
|
|
||||||
|
- Telegram: [@KernelSU](https://t.me/KernelSU)
|
||||||
|
|
||||||
|
## Bezpieczeństwo
|
||||||
|
|
||||||
|
Informacje na temat zgłaszania luk w zabezpieczeniach w KernelSU można znaleźć w pliku [SECURITY.md](/SECURITY.md).
|
||||||
|
|
||||||
|
## Licencja
|
||||||
|
|
||||||
|
- Pliki w katalogu `kernel` są na licencji [GPL-2-only](https://www.gnu.org/licenses/old-licenses/gpl-2.0.en.html).
|
||||||
|
- Wszystkie inne części poza katalogiem `kernel` są na licencji [GPL-3-or-later](https://www.gnu.org/licenses/gpl-3.0.html).
|
||||||
|
|
||||||
|
## Podziękowania
|
||||||
|
|
||||||
|
- [kernel-assisted-superuser](https://git.zx2c4.com/kernel-assisted-superuser/about/): pomysłodawca KernelSU.
|
||||||
|
- [Magisk](https://github.com/topjohnwu/Magisk): implementacja sepolicy.
|
||||||
|
- [genuine](https://github.com/brevent/genuine/): walidacja podpisu apk v2.
|
||||||
|
- [Diamorphine](https://github.com/m0nad/Diamorphine): cenna znajomość rootkitów.
|
||||||
57
docs/README_PT-BR.md
Normal file
57
docs/README_PT-BR.md
Normal file
@@ -0,0 +1,57 @@
|
|||||||
|
[English](README.md) | [Español](README_ES.md) | [简体中文](README_CN.md) | [繁體中文](README_TW.md) | [日本語](README_JP.md) | [Polski](README_PL.md) | **Português (Brasil)** | [Türkçe](README_TR.md) | [Русский](README_RU.md) | [Tiếng Việt](README_VI.md) | [Indonesia](README_ID.md) | [עברית](README_IW.md) | [हिंदी](README_IN.md)
|
||||||
|
|
||||||
|
# KernelSU
|
||||||
|
|
||||||
|
<img src="https://kernelsu.org/logo.png" style="width: 96px;" alt="logo">
|
||||||
|
|
||||||
|
Uma solução root baseada em kernel para dispositivos Android.
|
||||||
|
|
||||||
|
[](https://github.com/tiann/KernelSU/releases/latest)
|
||||||
|
[](https://hosted.weblate.org/engage/kernelsu)
|
||||||
|
[](https://t.me/KernelSU)
|
||||||
|
[](https://www.gnu.org/licenses/old-licenses/gpl-2.0.en.html)
|
||||||
|
[](/LICENSE)
|
||||||
|
|
||||||
|
## Características
|
||||||
|
|
||||||
|
1. `su` e gerenciamento de acesso root baseado em kernel.
|
||||||
|
2. Sistema modular baseado em [OverlayFS](https://en.wikipedia.org/wiki/OverlayFS).
|
||||||
|
3. [Perfil do Aplicativo](https://kernelsu.org/pt_BR/guide/app-profile.html): Tranque o poder root em uma gaiola.
|
||||||
|
|
||||||
|
## Estado de compatibilidade
|
||||||
|
|
||||||
|
O KernelSU oferece suporte oficial a dispositivos Android GKI 2.0 (kernel 5.10+). Kernels mais antigos (4.14+) também são compatíveis, mas o kernel terá que ser construído manualmente.
|
||||||
|
|
||||||
|
Com isso, WSA, ChromeOS e Android baseado em contêiner são todos suportados.
|
||||||
|
|
||||||
|
Atualmente, apenas `arm64-v8a` e `x86_64` são suportados.
|
||||||
|
|
||||||
|
## Uso
|
||||||
|
|
||||||
|
- [Instalação](https://kernelsu.org/pt_BR/guide/installation.html)
|
||||||
|
- [Como construir o KernelSU?](https://kernelsu.org/pt_BR/guide/how-to-build.html)
|
||||||
|
- [Site oficial](https://kernelsu.org/pt_BR/)
|
||||||
|
|
||||||
|
## Tradução
|
||||||
|
|
||||||
|
Para contribuir com a tradução do KernelSU ou aprimorar traduções existentes, por favor, utilize o [Weblate](https://hosted.weblate.org/engage/kernelsu/). PR para a tradução do Gerenciador não são mais aceitas, pois podem entrar em conflito com o Weblate.
|
||||||
|
|
||||||
|
## Discussão
|
||||||
|
|
||||||
|
- Telegram: [@KernelSU](https://t.me/KernelSU)
|
||||||
|
|
||||||
|
## Segurança
|
||||||
|
|
||||||
|
Para obter informações sobre como relatar vulnerabilidades de segurança do KernelSU, consulte [SECURITY.md](/SECURITY.md).
|
||||||
|
|
||||||
|
## Licença
|
||||||
|
|
||||||
|
- Os arquivos no diretório `kernel` são [GPL-2.0-only](https://www.gnu.org/licenses/old-licenses/gpl-2.0.en.html).
|
||||||
|
- Todas as outras partes, exceto o diretório `kernel` são [GPL-3.0-or-later](https://www.gnu.org/licenses/gpl-3.0.html).
|
||||||
|
|
||||||
|
## Créditos
|
||||||
|
|
||||||
|
- [kernel-assisted-superuser](https://git.zx2c4.com/kernel-assisted-superuser/about/): a ideia do KernelSU.
|
||||||
|
- [Magisk](https://github.com/topjohnwu/Magisk): a poderosa ferramenta root.
|
||||||
|
- [genuine](https://github.com/brevent/genuine/): validação de assinatura apk v2.
|
||||||
|
- [Diamorphine](https://github.com/m0nad/Diamorphine): algumas habilidades de rootkit.
|
||||||
49
docs/README_RU.md
Normal file
49
docs/README_RU.md
Normal file
@@ -0,0 +1,49 @@
|
|||||||
|
[English](README.md) | [Español](README_ES.md) | [简体中文](README_CN.md) | [繁體中文](README_TW.md) | [日本語](README_JP.md) | [Polski](README_PL.md) | [Português (Brasil)](README_PT-BR.md) | [Türkçe](README_TR.md) | **Русский** | [Tiếng Việt](README_VI.md) | [Indonesia](README_ID.md) | [עברית](README_IW.md) | [हिंदी](README_IN.md)
|
||||||
|
|
||||||
|
# KernelSU
|
||||||
|
|
||||||
|
<img src="https://kernelsu.org/logo.png" style="width: 96px;" alt="logo">
|
||||||
|
|
||||||
|
Решение на основе ядра root для Android-устройств.
|
||||||
|
|
||||||
|
[](https://github.com/tiann/KernelSU/releases/latest)
|
||||||
|
[](https://hosted.weblate.org/engage/kernelsu)
|
||||||
|
[](https://t.me/KernelSU)
|
||||||
|
[](https://www.gnu.org/licenses/old-licenses/gpl-2.0.en.html)
|
||||||
|
[](/LICENSE)
|
||||||
|
|
||||||
|
## Особенности
|
||||||
|
|
||||||
|
1. Управление `su` и root-доступом на основе ядра.
|
||||||
|
2. Система модулей на основе [OverlayFS](https://en.wikipedia.org/wiki/OverlayFS).
|
||||||
|
3. [Профиль приложений](https://kernelsu.org/ru_RU/guide/app-profile.html): Запри корневую силу в клетке.
|
||||||
|
|
||||||
|
## Совместимость
|
||||||
|
|
||||||
|
KernelSU официально поддерживает устройства на базе Android GKI 2.0 (с ядром 5.10+), старые ядра (4.14+) также совместимы, но для этого необходимо собрать ядро самостоятельно.
|
||||||
|
|
||||||
|
WSA и Android на основе контейнеров также должны работать с интегрированным KernelSU.
|
||||||
|
|
||||||
|
В настоящее время поддерживаются следующие ABI: `arm64-v8a` и `x86_64`.
|
||||||
|
|
||||||
|
## Использование
|
||||||
|
|
||||||
|
- [Установка](https://kernelsu.org/ru_RU/guide/installation.html)
|
||||||
|
- [Как собрать?](https://kernelsu.org/ru_RU/guide/how-to-build.html)
|
||||||
|
- [официальный сайт](https://kernelsu.org/ru_RU/)
|
||||||
|
|
||||||
|
## Обсуждение
|
||||||
|
|
||||||
|
- Telegram: [@KernelSU](https://t.me/KernelSU)
|
||||||
|
|
||||||
|
## Лицензия
|
||||||
|
|
||||||
|
- Файлы в директории `kernel` [GPL-2-only](https://www.gnu.org/licenses/old-licenses/gpl-2.0.en.html).
|
||||||
|
- Все остальные части, кроме директории `kernel` [GPL-3-or-later](https://www.gnu.org/licenses/gpl-3.0.html).
|
||||||
|
|
||||||
|
## Благодарности
|
||||||
|
|
||||||
|
- [kernel-assisted-superuser](https://git.zx2c4.com/kernel-assisted-superuser/about/): идея KernelSU.
|
||||||
|
- [Magisk](https://github.com/topjohnwu/Magisk): реализация sepolicy.
|
||||||
|
- [genuine](https://github.com/brevent/genuine/): проверка подписи apk v2.
|
||||||
|
- [Diamorphine](https://github.com/m0nad/Diamorphine): некоторые навыки руткита.
|
||||||
57
docs/README_TR.md
Normal file
57
docs/README_TR.md
Normal file
@@ -0,0 +1,57 @@
|
|||||||
|
[English](README.md) | [Español](README_ES.md) | [简体中文](README_CN.md) | [繁體中文](README_TW.md) | [日本語](README_JP.md) | [Polski](README_PL.md) | [Português (Brasil)](README_PT-BR.md) | **Türkçe** | [Русский](README_RU.md) | [Tiếng Việt](README_VI.md) | [Indonesia](README_ID.md) | [עברית](README_IW.md) | [हिंदी](README_IN.md)
|
||||||
|
|
||||||
|
# KernelSU
|
||||||
|
|
||||||
|
<img src="https://kernelsu.org/logo.png" style="width: 96px;" alt="logo">
|
||||||
|
|
||||||
|
Android cihazlar için kernel tabanlı root çözümü.
|
||||||
|
|
||||||
|
[](https://github.com/tiann/KernelSU/releases/latest)
|
||||||
|
[](https://hosted.weblate.org/engage/kernelsu)
|
||||||
|
[](https://t.me/KernelSU)
|
||||||
|
[](https://www.gnu.org/licenses/old-licenses/gpl-2.0.en.html)
|
||||||
|
[](/LICENSE)
|
||||||
|
|
||||||
|
## Özellikler
|
||||||
|
|
||||||
|
1. Kernel-tabanlı `su` ve root erişimi yönetimi.
|
||||||
|
2. [OverlayFS](https://en.wikipedia.org/wiki/OverlayFS)'ye dayalı modül sistemi.
|
||||||
|
3. [Uygulama profili](https://kernelsu.org/guide/app-profile.html): Root gücünü bir kafese kapatın.
|
||||||
|
|
||||||
|
## Uyumluluk Durumu
|
||||||
|
|
||||||
|
KernelSU resmi olarak Android GKI 2.0 cihazlarını (5.10+ kernelli) destekler, eski kernellerle de (4.14+) uyumludur, ancak kerneli kendinizin derlemeniz gerekir.
|
||||||
|
|
||||||
|
Bununla birlikte; WSA, ChromeOS ve konteyner tabanlı Android'in tamamı desteklenmektedir.
|
||||||
|
|
||||||
|
Şimdilik sadece `arm64-v8a` ve `x86_64` desteklenmektedir.
|
||||||
|
|
||||||
|
## Kullanım
|
||||||
|
|
||||||
|
- [Yükleme yönergeleri](https://kernelsu.org/guide/installation.html)
|
||||||
|
- [Nasıl derlenir?](https://kernelsu.org/guide/how-to-build.html)
|
||||||
|
- [Resmi WEB sitesi](https://kernelsu.org/)
|
||||||
|
|
||||||
|
## Çeviri
|
||||||
|
|
||||||
|
KernelSU'nun çevirisine veya mevcut çevirilerin iyileştirilmesine yardımcı olmak için lütfen [Weblate](https://hosted.weblate.org/engage/kernelsu/) kullanın. Yönetici uygulamasının PR ile çevirisi, Weblate ile çakışacağından artık kabul edilmeyecektir.
|
||||||
|
|
||||||
|
## Tartışma
|
||||||
|
|
||||||
|
- Telegram: [@KernelSU](https://t.me/KernelSU)
|
||||||
|
|
||||||
|
## Güvenlik
|
||||||
|
|
||||||
|
KernelSU'daki güvenlik açıklarını bildirme hakkında bilgi için, bkz [SECURITY.md](/SECURITY.md).
|
||||||
|
|
||||||
|
## Lisans
|
||||||
|
|
||||||
|
- `kernel` klasöründeki dosyalar [GPL-2-only](https://www.gnu.org/licenses/old-licenses/gpl-2.0.en.html) lisansı altındadır.
|
||||||
|
- `kernel` klasörü dışındaki bütün diğer bölümler [GPL-3-veya-sonraki](https://www.gnu.org/licenses/gpl-3.0.html) lisansı altındadır.
|
||||||
|
|
||||||
|
## Krediler
|
||||||
|
|
||||||
|
- [kernel-assisted-superuser](https://git.zx2c4.com/kernel-assisted-superuser/about/): KernelSU fikri.
|
||||||
|
- [Magisk](https://github.com/topjohnwu/Magisk): güçlü root aracı.
|
||||||
|
- [genuine](https://github.com/brevent/genuine/): apk v2 imza doğrulaması.
|
||||||
|
- [Diamorphine](https://github.com/m0nad/Diamorphine): bazı rootkit becerileri.
|
||||||
47
docs/README_TW.md
Normal file
47
docs/README_TW.md
Normal file
@@ -0,0 +1,47 @@
|
|||||||
|
[English](README.md) | [Español](README_ES.md) | [简体中文](README_CN.md) | **繁體中文** | [日本語](README_JP.md) | [Polski](README_PL.md) | [Português (Brasil)](README_PT-BR.md) | [Türkçe](README_TR.md) | [Русский](README_RU.md) | [Tiếng Việt](README_VI.md) | [Indonesia](README_ID.md) | [עברית](README_IW.md) | [हिंदी](README_IN.md)
|
||||||
|
|
||||||
|
# KernelSU
|
||||||
|
|
||||||
|
<img src="https://kernelsu.org/logo.png" style="width: 96px;" alt="logo">
|
||||||
|
|
||||||
|
一個基於核心的 Android 裝置 Root 解決方案
|
||||||
|
|
||||||
|
[](https://github.com/tiann/KernelSU/releases/latest)
|
||||||
|
[](https://hosted.weblate.org/engage/kernelsu)
|
||||||
|
[](https://t.me/KernelSU)
|
||||||
|
[](https://www.gnu.org/licenses/old-licenses/gpl-2.0.en.html)
|
||||||
|
[](/LICENSE)
|
||||||
|
|
||||||
|
## 功能
|
||||||
|
|
||||||
|
- 基於核心的 `su` 和 Root 存取權管理。
|
||||||
|
- 基於 [OverlayFS](https://en.wikipedia.org/wiki/OverlayFS) 的模組系統。
|
||||||
|
|
||||||
|
## 相容性狀態
|
||||||
|
|
||||||
|
KernelSU 官方支援 Android GKI 2.0 的裝置 (核心版本 5.10+);舊版核心同樣相容 (最低 4.14+),但需要自行編譯核心。
|
||||||
|
|
||||||
|
WSA 和執行在容器中的 Android 也可以與 KernelSU 一同運作。
|
||||||
|
|
||||||
|
目前支援架構:`arm64-v8a` 和 `x86_64`。
|
||||||
|
|
||||||
|
## 使用方法
|
||||||
|
|
||||||
|
- [安裝教學](https://kernelsu.org/zh_TW/guide/installation.html)
|
||||||
|
- [如何建置?](https://kernelsu.org/zh_TW/guide/how-to-build.html)
|
||||||
|
|
||||||
|
### 討論
|
||||||
|
|
||||||
|
- Telegram:[@KernelSU](https://t.me/KernelSU)
|
||||||
|
|
||||||
|
## 授權
|
||||||
|
|
||||||
|
- 目錄 `kernel` 下所有檔案為 [GPL-2-only](https://www.gnu.org/licenses/old-licenses/gpl-2.0.en.html)。
|
||||||
|
- 除 `kernel` 目錄的其他部分均為 [GPL-3-or-later](https://www.gnu.org/licenses/gpl-3.0.html)。
|
||||||
|
|
||||||
|
## 致謝
|
||||||
|
|
||||||
|
- [kernel-assisted-superuser](https://git.zx2c4.com/kernel-assisted-superuser/about/):KernelSU 的靈感。
|
||||||
|
- [Magisk](https://github.com/topjohnwu/Magisk):sepolicy 實作。
|
||||||
|
- [genuine](https://github.com/brevent/genuine/):apk v2 簽章驗證。
|
||||||
|
- [Diamorphine](https://github.com/m0nad/Diamorphine):一些 rootkit 技巧。
|
||||||
53
docs/README_VI.md
Normal file
53
docs/README_VI.md
Normal file
@@ -0,0 +1,53 @@
|
|||||||
|
[English](README.md) | [Español](README_ES.md) | [简体中文](README_CN.md) | [繁體中文](README_TW.md) | [日本語](README_JP.md) | [Polski](README_PL.md) | [Português (Brasil)](README_PT-BR.md) | [Türkçe](README_TR.md) | [Русский](README_RU.md) | **Tiếng Việt** | [Indonesia](README_ID.md) | [עברית](README_IW.md) | [हिंदी](README_IN.md)
|
||||||
|
|
||||||
|
# KernelSU
|
||||||
|
|
||||||
|
<img src="https://kernelsu.org/logo.png" style="width: 96px;" alt="logo">
|
||||||
|
|
||||||
|
Giải pháp root thông qua thay đổi trên Kernel hệ điều hành cho các thiết bị Android.
|
||||||
|
|
||||||
|
[](https://github.com/tiann/KernelSU/releases/latest)
|
||||||
|
[](https://hosted.weblate.org/engage/kernelsu)
|
||||||
|
[](https://t.me/KernelSU)
|
||||||
|
[](https://www.gnu.org/licenses/old-licenses/gpl-2.0.en.html)
|
||||||
|
[](/LICENSE)
|
||||||
|
|
||||||
|
## Tính năng
|
||||||
|
|
||||||
|
1. Hỗ trợ gói thực thi `su` và quản lý quyền root.
|
||||||
|
2. Hệ thống mô-đun thông qua [OverlayFS](https://en.wikipedia.org/wiki/OverlayFS).
|
||||||
|
3. [App Profile](https://kernelsu.org/guide/app-profile.html): Hạn chế quyền root của ứng dụng.
|
||||||
|
|
||||||
|
## Tình trạng tương thích
|
||||||
|
|
||||||
|
KernelSU chính thức hỗ trợ các thiết bị Android với kernel GKI 2.0 (phiên bản kernel 5.10+), các phiên bản kernel cũ hơn (4.14+) cũng tương thích, nhưng bạn cần phải tự biên dịch.
|
||||||
|
|
||||||
|
WSA, ChromeOS và Android dựa trên container(container-based) cũng được hỗ trợ bởi KernelSU.
|
||||||
|
|
||||||
|
Hiên tại Giao diện nhị phân của ứng dụng (ABI) được hỗ trợ bao gồm `arm64-v8a` và `x86_64`.
|
||||||
|
|
||||||
|
## Sử dụng
|
||||||
|
|
||||||
|
- [Hướng dẫn cài đặt](https://kernelsu.org/vi_VN/guide/installation.html)
|
||||||
|
- [Cách để build?](https://kernelsu.org/vi_VN/guide/how-to-build.html)
|
||||||
|
- [Website Chính Thức](https://kernelsu.org/vi_VN/)
|
||||||
|
|
||||||
|
## Hỗ trợ dịch
|
||||||
|
|
||||||
|
Nếu bạn muốn hỗ trợ dịch KernelSU sang một ngôn ngữ khác hoặc cải thiện các bản dịch trước, vui lòng sử dụng [Weblate](https://hosted.weblate.org/engage/kernelsu/).
|
||||||
|
|
||||||
|
## Thảo luận
|
||||||
|
|
||||||
|
- Telegram: [@KernelSU](https://t.me/KernelSU)
|
||||||
|
|
||||||
|
## Giấy phép
|
||||||
|
|
||||||
|
- Tất cả các file trong thư mục `kernel` dùng giấy phép [GPL-2-only](https://www.gnu.org/licenses/old-licenses/gpl-2.0.en.html).
|
||||||
|
- Tất cả các thành phần khác ngoại trừ thư mục `kernel` dùng giấy phép [GPL-3-or-later](https://www.gnu.org/licenses/gpl-3.0.html).
|
||||||
|
|
||||||
|
## Lời cảm ơn
|
||||||
|
|
||||||
|
- [kernel-assisted-superuser](https://git.zx2c4.com/kernel-assisted-superuser/about/): ý tưởng cho KernelSU.
|
||||||
|
- [Magisk](https://github.com/topjohnwu/Magisk): công cụ root mạnh mẽ.
|
||||||
|
- [genuine](https://github.com/brevent/genuine/): phương pháp xác thực apk v2.
|
||||||
|
- [Diamorphine](https://github.com/m0nad/Diamorphine): các phương pháp ẩn của rootkit.
|
||||||
111
js/README.md
Normal file
111
js/README.md
Normal file
@@ -0,0 +1,111 @@
|
|||||||
|
# Library for KernelSU's module WebUI
|
||||||
|
|
||||||
|
## Install
|
||||||
|
|
||||||
|
```sh
|
||||||
|
yarn add kernelsu
|
||||||
|
```
|
||||||
|
|
||||||
|
## API
|
||||||
|
|
||||||
|
### exec
|
||||||
|
|
||||||
|
Spawns a **root** shell and runs a command within that shell, passing the `stdout` and `stderr` to a Promise when complete.
|
||||||
|
|
||||||
|
- `command` `<string>` The command to run, with space-separated arguments.
|
||||||
|
- `options` `<Object>`
|
||||||
|
- `cwd` - Current working directory of the child process
|
||||||
|
- `env` - Environment key-value pairs
|
||||||
|
|
||||||
|
```javascript
|
||||||
|
import { exec } from 'kernelsu';
|
||||||
|
|
||||||
|
const { errno, stdout, stderr } = await exec('ls -l', { cwd: '/tmp' });
|
||||||
|
if (errno === 0) {
|
||||||
|
// success
|
||||||
|
console.log(stdout);
|
||||||
|
}
|
||||||
|
```
|
||||||
|
|
||||||
|
### spawn
|
||||||
|
|
||||||
|
Spawns a new process using the given `command` in **root** shell, with command-line arguments in `args`. If omitted, `args` defaults to an empty array.
|
||||||
|
|
||||||
|
Returns a `ChildProcess`, Instances of the ChildProcess represent spawned child processes.
|
||||||
|
|
||||||
|
- `command` `<string>` The command to run.
|
||||||
|
- `args` `<string[]>` List of string arguments.
|
||||||
|
- `options` `<Object>`:
|
||||||
|
- `cwd` `<string>` - Current working directory of the child process
|
||||||
|
- `env` `<Object>` - Environment key-value pairs
|
||||||
|
|
||||||
|
Example of running `ls -lh /data`, capturing `stdout`, `stderr`, and the exit code:
|
||||||
|
|
||||||
|
```javascript
|
||||||
|
import { spawn } from 'kernelsu';
|
||||||
|
|
||||||
|
const ls = spawn('ls', ['-lh', '/data']);
|
||||||
|
|
||||||
|
ls.stdout.on('data', (data) => {
|
||||||
|
console.log(`stdout: ${data}`);
|
||||||
|
});
|
||||||
|
|
||||||
|
ls.stderr.on('data', (data) => {
|
||||||
|
console.log(`stderr: ${data}`);
|
||||||
|
});
|
||||||
|
|
||||||
|
ls.on('exit', (code) => {
|
||||||
|
console.log(`child process exited with code ${code}`);
|
||||||
|
});
|
||||||
|
```
|
||||||
|
|
||||||
|
#### ChildProcess
|
||||||
|
|
||||||
|
##### Event 'exit'
|
||||||
|
|
||||||
|
- `code` `<number>` The exit code if the child exited on its own.
|
||||||
|
|
||||||
|
The `'exit'` event is emitted after the child process ends. If the process exited, `code` is the final exit code of the process, otherwise null
|
||||||
|
|
||||||
|
##### Event 'error'
|
||||||
|
|
||||||
|
- `err` `<Error>` The error.
|
||||||
|
|
||||||
|
The `'error'` event is emitted whenever:
|
||||||
|
|
||||||
|
- The process could not be spawned.
|
||||||
|
- The process could not be killed.
|
||||||
|
|
||||||
|
##### `stdout`
|
||||||
|
|
||||||
|
A `Readable Stream` that represents the child process's `stdout`.
|
||||||
|
|
||||||
|
```javascript
|
||||||
|
const subprocess = spawn('ls');
|
||||||
|
|
||||||
|
subprocess.stdout.on('data', (data) => {
|
||||||
|
console.log(`Received chunk ${data}`);
|
||||||
|
});
|
||||||
|
```
|
||||||
|
|
||||||
|
#### `stderr`
|
||||||
|
|
||||||
|
A `Readable Stream` that represents the child process's `stderr`.
|
||||||
|
|
||||||
|
### fullScreen
|
||||||
|
|
||||||
|
Request the WebView enter/exit full screen.
|
||||||
|
|
||||||
|
```javascript
|
||||||
|
import { fullScreen } from 'kernelsu';
|
||||||
|
fullScreen(true);
|
||||||
|
```
|
||||||
|
|
||||||
|
### toast
|
||||||
|
|
||||||
|
Show a toast message.
|
||||||
|
|
||||||
|
```javascript
|
||||||
|
import { toast } from 'kernelsu';
|
||||||
|
toast('Hello, world!');
|
||||||
|
```
|
||||||
115
js/index.js
Normal file
115
js/index.js
Normal file
@@ -0,0 +1,115 @@
|
|||||||
|
let callbackCounter = 0;
|
||||||
|
function getUniqueCallbackName(prefix) {
|
||||||
|
return `${prefix}_callback_${Date.now()}_${callbackCounter++}`;
|
||||||
|
}
|
||||||
|
|
||||||
|
export function exec(command, options) {
|
||||||
|
if (typeof options === "undefined") {
|
||||||
|
options = {};
|
||||||
|
}
|
||||||
|
|
||||||
|
return new Promise((resolve, reject) => {
|
||||||
|
// Generate a unique callback function name
|
||||||
|
const callbackFuncName = getUniqueCallbackName("exec");
|
||||||
|
|
||||||
|
// Define the success callback function
|
||||||
|
window[callbackFuncName] = (errno, stdout, stderr) => {
|
||||||
|
resolve({ errno, stdout, stderr });
|
||||||
|
cleanup(callbackFuncName);
|
||||||
|
};
|
||||||
|
|
||||||
|
function cleanup(successName) {
|
||||||
|
delete window[successName];
|
||||||
|
}
|
||||||
|
|
||||||
|
try {
|
||||||
|
ksu.exec(command, JSON.stringify(options), callbackFuncName);
|
||||||
|
} catch (error) {
|
||||||
|
reject(error);
|
||||||
|
cleanup(callbackFuncName);
|
||||||
|
}
|
||||||
|
});
|
||||||
|
}
|
||||||
|
|
||||||
|
function Stdio() {
|
||||||
|
this.listeners = {};
|
||||||
|
}
|
||||||
|
|
||||||
|
Stdio.prototype.on = function (event, listener) {
|
||||||
|
if (!this.listeners[event]) {
|
||||||
|
this.listeners[event] = [];
|
||||||
|
}
|
||||||
|
this.listeners[event].push(listener);
|
||||||
|
};
|
||||||
|
|
||||||
|
Stdio.prototype.emit = function (event, ...args) {
|
||||||
|
if (this.listeners[event]) {
|
||||||
|
this.listeners[event].forEach((listener) => listener(...args));
|
||||||
|
}
|
||||||
|
};
|
||||||
|
|
||||||
|
function ChildProcess() {
|
||||||
|
this.listeners = {};
|
||||||
|
this.stdin = new Stdio();
|
||||||
|
this.stdout = new Stdio();
|
||||||
|
this.stderr = new Stdio();
|
||||||
|
}
|
||||||
|
|
||||||
|
ChildProcess.prototype.on = function (event, listener) {
|
||||||
|
if (!this.listeners[event]) {
|
||||||
|
this.listeners[event] = [];
|
||||||
|
}
|
||||||
|
this.listeners[event].push(listener);
|
||||||
|
};
|
||||||
|
|
||||||
|
ChildProcess.prototype.emit = function (event, ...args) {
|
||||||
|
if (this.listeners[event]) {
|
||||||
|
this.listeners[event].forEach((listener) => listener(...args));
|
||||||
|
}
|
||||||
|
};
|
||||||
|
|
||||||
|
export function spawn(command, args, options) {
|
||||||
|
if (typeof args === "undefined") {
|
||||||
|
args = [];
|
||||||
|
} else if (typeof args === "object") {
|
||||||
|
// allow for (command, options) signature
|
||||||
|
options = args;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (typeof options === "undefined") {
|
||||||
|
options = {};
|
||||||
|
}
|
||||||
|
|
||||||
|
const child = new ChildProcess();
|
||||||
|
const childCallbackName = getUniqueCallbackName("spawn");
|
||||||
|
window[childCallbackName] = child;
|
||||||
|
|
||||||
|
function cleanup(name) {
|
||||||
|
delete window[name];
|
||||||
|
}
|
||||||
|
|
||||||
|
child.on("exit", code => {
|
||||||
|
cleanup(childCallbackName);
|
||||||
|
});
|
||||||
|
|
||||||
|
try {
|
||||||
|
ksu.spawn(
|
||||||
|
command,
|
||||||
|
JSON.stringify(args),
|
||||||
|
JSON.stringify(options),
|
||||||
|
childCallbackName
|
||||||
|
);
|
||||||
|
} catch (error) {
|
||||||
|
child.emit("error", error);
|
||||||
|
cleanup(childCallbackName);
|
||||||
|
}
|
||||||
|
return child;
|
||||||
|
}
|
||||||
|
|
||||||
|
export function fullScreen(isFullScreen) {
|
||||||
|
ksu.fullScreen(isFullScreen);
|
||||||
|
}
|
||||||
|
|
||||||
|
export function toast(message) {
|
||||||
|
ksu.toast(message);
|
||||||
|
}
|
||||||
25
js/package.json
Normal file
25
js/package.json
Normal file
@@ -0,0 +1,25 @@
|
|||||||
|
{
|
||||||
|
"name": "kernelsu",
|
||||||
|
"version": "1.0.6",
|
||||||
|
"description": "Library for KernelSU's module WebUI",
|
||||||
|
"main": "index.js",
|
||||||
|
"scripts": {
|
||||||
|
"test": "npm run test"
|
||||||
|
},
|
||||||
|
"repository": {
|
||||||
|
"type": "git",
|
||||||
|
"url": "git+https://github.com/tiann/KernelSU.git"
|
||||||
|
},
|
||||||
|
"keywords": [
|
||||||
|
"su",
|
||||||
|
"kernelsu",
|
||||||
|
"module",
|
||||||
|
"webui"
|
||||||
|
],
|
||||||
|
"author": "weishu",
|
||||||
|
"license": "Apache-2.0",
|
||||||
|
"bugs": {
|
||||||
|
"url": "https://github.com/tiann/KernelSU/issues"
|
||||||
|
},
|
||||||
|
"homepage": "https://github.com/tiann/KernelSU#readme"
|
||||||
|
}
|
||||||
10
justfile
Normal file
10
justfile
Normal file
@@ -0,0 +1,10 @@
|
|||||||
|
alias bk := build_ksud
|
||||||
|
alias bm := build_manager
|
||||||
|
|
||||||
|
build_ksud:
|
||||||
|
cross build --target aarch64-linux-android --release --manifest-path ./userspace/ksud/Cargo.toml
|
||||||
|
|
||||||
|
build_manager: build_ksud
|
||||||
|
cp userspace/ksud/target/aarch64-linux-android/release/ksud manager/app/src/main/jniLibs/arm64-v8a/libksud.so
|
||||||
|
cd manager && ./gradlew aDebug
|
||||||
|
|
||||||
@@ -1,4 +1,4 @@
|
|||||||
Diagnostics:
|
Diagnostics:
|
||||||
UnusedIncludes: Strict
|
UnusedIncludes: Strict
|
||||||
ClangTidy:
|
ClangTidy:
|
||||||
Remove: bugprone-sizeof-expression
|
Remove: bugprone-sizeof-expression
|
||||||
|
|||||||
@@ -1,14 +1,17 @@
|
|||||||
|
menu "KernelSU"
|
||||||
|
|
||||||
config KSU
|
config KSU
|
||||||
tristate "KernelSU module"
|
tristate "KernelSU function support"
|
||||||
default y
|
|
||||||
depends on KPROBES
|
|
||||||
depends on OVERLAY_FS
|
depends on OVERLAY_FS
|
||||||
|
default y
|
||||||
help
|
help
|
||||||
This is the KSU privilege driver for android system.
|
Enable kernel-level root privileges on Android System.
|
||||||
|
|
||||||
config KSU_DEBUG
|
config KSU_DEBUG
|
||||||
tristate "KernelSU module debug mode"
|
bool "KernelSU debug mode"
|
||||||
default n
|
|
||||||
depends on KSU
|
depends on KSU
|
||||||
|
default n
|
||||||
help
|
help
|
||||||
This enables debug mode for KSU
|
Enable KernelSU debug mode
|
||||||
|
|
||||||
|
endmenu
|
||||||
|
|||||||
@@ -15,18 +15,32 @@ obj-y += selinux/
|
|||||||
# .git is a text file while the module is imported by 'git submodule add'.
|
# .git is a text file while the module is imported by 'git submodule add'.
|
||||||
ifeq ($(shell test -e $(srctree)/$(src)/../.git; echo $$?),0)
|
ifeq ($(shell test -e $(srctree)/$(src)/../.git; echo $$?),0)
|
||||||
KSU_GIT_VERSION := $(shell cd $(srctree)/$(src); /usr/bin/env PATH="$$PATH":/usr/bin:/usr/local/bin git rev-list --count HEAD)
|
KSU_GIT_VERSION := $(shell cd $(srctree)/$(src); /usr/bin/env PATH="$$PATH":/usr/bin:/usr/local/bin git rev-list --count HEAD)
|
||||||
ccflags-y += -DKSU_GIT_VERSION=$(KSU_GIT_VERSION)
|
# ksu_version: major * 10000 + git version + 200 for historical reasons
|
||||||
|
$(eval KSU_VERSION=$(shell expr 10000 + $(KSU_GIT_VERSION) + 200))
|
||||||
|
$(info -- KernelSU version: $(KSU_VERSION))
|
||||||
|
ccflags-y += -DKSU_VERSION=$(KSU_VERSION)
|
||||||
|
else # If there is no .git file, the default version will be passed.
|
||||||
|
$(warning "KSU_GIT_VERSION not defined! It is better to make KernelSU a git submodule!")
|
||||||
|
ccflags-y += -DKSU_VERSION=16
|
||||||
endif
|
endif
|
||||||
|
|
||||||
ifndef EXPECTED_SIZE
|
ifndef KSU_EXPECTED_SIZE
|
||||||
EXPECTED_SIZE := 0x033b
|
KSU_EXPECTED_SIZE := 0x033b
|
||||||
endif
|
endif
|
||||||
|
|
||||||
ifndef EXPECTED_HASH
|
ifndef KSU_EXPECTED_HASH
|
||||||
EXPECTED_HASH := 0xb0b91415
|
KSU_EXPECTED_HASH := c371061b19d8c7d7d6133c6a9bafe198fa944e50c1b31c9d8daa8d7f1fc2d2d6
|
||||||
endif
|
endif
|
||||||
|
|
||||||
ccflags-y += -DEXPECTED_SIZE=$(EXPECTED_SIZE)
|
ifdef KSU_MANAGER_PACKAGE
|
||||||
ccflags-y += -DEXPECTED_HASH=$(EXPECTED_HASH)
|
ccflags-y += -DKSU_MANAGER_PACKAGE=\"$(KSU_MANAGER_PACKAGE)\"
|
||||||
|
$(info -- KernelSU Manager package name: $(KSU_MANAGER_PACKAGE))
|
||||||
|
endif
|
||||||
|
|
||||||
|
$(info -- KernelSU Manager signature size: $(KSU_EXPECTED_SIZE))
|
||||||
|
$(info -- KernelSU Manager signature hash: $(KSU_EXPECTED_HASH))
|
||||||
|
|
||||||
|
ccflags-y += -DEXPECTED_SIZE=$(KSU_EXPECTED_SIZE)
|
||||||
|
ccflags-y += -DEXPECTED_HASH=\"$(KSU_EXPECTED_HASH)\"
|
||||||
ccflags-y += -Wno-implicit-function-declaration -Wno-strict-prototypes -Wno-int-conversion -Wno-gcc-compat
|
ccflags-y += -Wno-implicit-function-declaration -Wno-strict-prototypes -Wno-int-conversion -Wno-gcc-compat
|
||||||
ccflags-y += -Wno-macro-redefined -Wno-declaration-after-statement
|
ccflags-y += -Wno-declaration-after-statement
|
||||||
|
|||||||
@@ -1,27 +1,91 @@
|
|||||||
#include "linux/delay.h"
|
#include "ksu.h"
|
||||||
|
#include "linux/compiler.h"
|
||||||
#include "linux/fs.h"
|
#include "linux/fs.h"
|
||||||
|
#include "linux/gfp.h"
|
||||||
#include "linux/kernel.h"
|
#include "linux/kernel.h"
|
||||||
#include "linux/list.h"
|
#include "linux/list.h"
|
||||||
#include "linux/printk.h"
|
#include "linux/printk.h"
|
||||||
#include "linux/slab.h"
|
#include "linux/slab.h"
|
||||||
|
#include "linux/types.h"
|
||||||
#include "linux/version.h"
|
#include "linux/version.h"
|
||||||
|
#if LINUX_VERSION_CODE >= KERNEL_VERSION(4, 14, 0)
|
||||||
|
#include "linux/compiler_types.h"
|
||||||
|
#endif
|
||||||
|
|
||||||
#include "klog.h" // IWYU pragma: keep
|
#include "klog.h" // IWYU pragma: keep
|
||||||
#include "selinux/selinux.h"
|
#include "selinux/selinux.h"
|
||||||
#include "kernel_compat.h"
|
#include "kernel_compat.h"
|
||||||
|
#include "allowlist.h"
|
||||||
|
|
||||||
#define FILE_MAGIC 0x7f4b5355 // ' KSU', u32
|
#define FILE_MAGIC 0x7f4b5355 // ' KSU', u32
|
||||||
#define FILE_FORMAT_VERSION 1 // u32
|
#define FILE_FORMAT_VERSION 3 // u32
|
||||||
|
|
||||||
|
#define KSU_APP_PROFILE_PRESERVE_UID 9999 // NOBODY_UID
|
||||||
|
#define KSU_DEFAULT_SELINUX_DOMAIN "u:r:su:s0"
|
||||||
|
|
||||||
static DEFINE_MUTEX(allowlist_mutex);
|
static DEFINE_MUTEX(allowlist_mutex);
|
||||||
|
|
||||||
|
// default profiles, these may be used frequently, so we cache it
|
||||||
|
static struct root_profile default_root_profile;
|
||||||
|
static struct non_root_profile default_non_root_profile;
|
||||||
|
|
||||||
|
static int allow_list_arr[PAGE_SIZE / sizeof(int)] __read_mostly __aligned(PAGE_SIZE);
|
||||||
|
static int allow_list_pointer __read_mostly = 0;
|
||||||
|
|
||||||
|
static void remove_uid_from_arr(uid_t uid)
|
||||||
|
{
|
||||||
|
int *temp_arr;
|
||||||
|
int i, j;
|
||||||
|
|
||||||
|
if (allow_list_pointer == 0)
|
||||||
|
return;
|
||||||
|
|
||||||
|
temp_arr = kmalloc(sizeof(allow_list_arr), GFP_KERNEL);
|
||||||
|
if (temp_arr == NULL) {
|
||||||
|
pr_err("%s: unable to allocate memory\n", __func__);
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
|
for (i = j = 0; i < allow_list_pointer; i++) {
|
||||||
|
if (allow_list_arr[i] == uid)
|
||||||
|
continue;
|
||||||
|
temp_arr[j++] = allow_list_arr[i];
|
||||||
|
}
|
||||||
|
|
||||||
|
allow_list_pointer = j;
|
||||||
|
|
||||||
|
for (; j < ARRAY_SIZE(allow_list_arr); j++)
|
||||||
|
temp_arr[j] = -1;
|
||||||
|
|
||||||
|
memcpy(&allow_list_arr, temp_arr, PAGE_SIZE);
|
||||||
|
kfree(temp_arr);
|
||||||
|
}
|
||||||
|
|
||||||
|
static void init_default_profiles()
|
||||||
|
{
|
||||||
|
default_root_profile.uid = 0;
|
||||||
|
default_root_profile.gid = 0;
|
||||||
|
default_root_profile.groups_count = 1;
|
||||||
|
default_root_profile.groups[0] = 0;
|
||||||
|
memset(&default_root_profile.capabilities, 0xff,
|
||||||
|
sizeof(default_root_profile.capabilities));
|
||||||
|
default_root_profile.namespaces = 0;
|
||||||
|
strcpy(default_root_profile.selinux_domain, KSU_DEFAULT_SELINUX_DOMAIN);
|
||||||
|
|
||||||
|
// This means that we will umount modules by default!
|
||||||
|
default_non_root_profile.umount_modules = true;
|
||||||
|
}
|
||||||
|
|
||||||
struct perm_data {
|
struct perm_data {
|
||||||
struct list_head list;
|
struct list_head list;
|
||||||
uid_t uid;
|
struct app_profile profile;
|
||||||
bool allow;
|
|
||||||
};
|
};
|
||||||
|
|
||||||
static struct list_head allow_list;
|
static struct list_head allow_list;
|
||||||
|
|
||||||
|
static uint8_t allow_list_bitmap[PAGE_SIZE] __read_mostly __aligned(PAGE_SIZE);
|
||||||
|
#define BITMAP_UID_MAX ((sizeof(allow_list_bitmap) * BITS_PER_BYTE) - 1)
|
||||||
|
|
||||||
#define KERNEL_SU_ALLOWLIST "/data/adb/ksu/.allowlist"
|
#define KERNEL_SU_ALLOWLIST "/data/adb/ksu/.allowlist"
|
||||||
|
|
||||||
static struct work_struct ksu_save_work;
|
static struct work_struct ksu_save_work;
|
||||||
@@ -33,70 +97,234 @@ void ksu_show_allow_list(void)
|
|||||||
{
|
{
|
||||||
struct perm_data *p = NULL;
|
struct perm_data *p = NULL;
|
||||||
struct list_head *pos = NULL;
|
struct list_head *pos = NULL;
|
||||||
pr_info("ksu_show_allow_list");
|
pr_info("ksu_show_allow_list\n");
|
||||||
list_for_each (pos, &allow_list) {
|
list_for_each (pos, &allow_list) {
|
||||||
p = list_entry(pos, struct perm_data, list);
|
p = list_entry(pos, struct perm_data, list);
|
||||||
pr_info("uid :%d, allow: %d\n", p->uid, p->allow);
|
pr_info("uid :%d, allow: %d\n", p->profile.current_uid,
|
||||||
|
p->profile.allow_su);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
bool ksu_allow_uid(uid_t uid, bool allow, bool persist)
|
#ifdef CONFIG_KSU_DEBUG
|
||||||
|
static void ksu_grant_root_to_shell()
|
||||||
|
{
|
||||||
|
struct app_profile profile = {
|
||||||
|
.allow_su = true,
|
||||||
|
.current_uid = 2000,
|
||||||
|
};
|
||||||
|
strcpy(profile.key, "com.android.shell");
|
||||||
|
strcpy(profile.rp_config.profile.selinux_domain, KSU_DEFAULT_SELINUX_DOMAIN);
|
||||||
|
ksu_set_app_profile(&profile, false);
|
||||||
|
}
|
||||||
|
#endif
|
||||||
|
|
||||||
|
bool ksu_get_app_profile(struct app_profile *profile)
|
||||||
|
{
|
||||||
|
struct perm_data *p = NULL;
|
||||||
|
struct list_head *pos = NULL;
|
||||||
|
bool found = false;
|
||||||
|
|
||||||
|
list_for_each (pos, &allow_list) {
|
||||||
|
p = list_entry(pos, struct perm_data, list);
|
||||||
|
bool uid_match = profile->current_uid == p->profile.current_uid;
|
||||||
|
if (uid_match) {
|
||||||
|
// found it, override it with ours
|
||||||
|
memcpy(profile, &p->profile, sizeof(*profile));
|
||||||
|
found = true;
|
||||||
|
goto exit;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
exit:
|
||||||
|
return found;
|
||||||
|
}
|
||||||
|
|
||||||
|
static inline bool forbid_system_uid(uid_t uid) {
|
||||||
|
#define SHELL_UID 2000
|
||||||
|
#define SYSTEM_UID 1000
|
||||||
|
return uid < SHELL_UID && uid != SYSTEM_UID;
|
||||||
|
}
|
||||||
|
|
||||||
|
static bool profile_valid(struct app_profile *profile)
|
||||||
|
{
|
||||||
|
if (!profile) {
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (forbid_system_uid(profile->current_uid)) {
|
||||||
|
pr_err("uid lower than 2000 is unsupported: %d\n", profile->current_uid);
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (profile->version < KSU_APP_PROFILE_VER) {
|
||||||
|
pr_info("Unsupported profile version: %d\n", profile->version);
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (profile->allow_su) {
|
||||||
|
if (profile->rp_config.profile.groups_count > KSU_MAX_GROUPS) {
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (strlen(profile->rp_config.profile.selinux_domain) == 0) {
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
return true;
|
||||||
|
}
|
||||||
|
|
||||||
|
bool ksu_set_app_profile(struct app_profile *profile, bool persist)
|
||||||
{
|
{
|
||||||
// find the node first!
|
|
||||||
struct perm_data *p = NULL;
|
struct perm_data *p = NULL;
|
||||||
struct list_head *pos = NULL;
|
struct list_head *pos = NULL;
|
||||||
bool result = false;
|
bool result = false;
|
||||||
|
|
||||||
|
if (!profile_valid(profile)) {
|
||||||
|
pr_err("Failed to set app profile: invalid profile!\n");
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
|
||||||
list_for_each (pos, &allow_list) {
|
list_for_each (pos, &allow_list) {
|
||||||
p = list_entry(pos, struct perm_data, list);
|
p = list_entry(pos, struct perm_data, list);
|
||||||
if (uid == p->uid) {
|
// both uid and package must match, otherwise it will break multiple package with different user id
|
||||||
p->allow = allow;
|
if (profile->current_uid == p->profile.current_uid &&
|
||||||
|
!strcmp(profile->key, p->profile.key)) {
|
||||||
|
// found it, just override it all!
|
||||||
|
memcpy(&p->profile, profile, sizeof(*profile));
|
||||||
result = true;
|
result = true;
|
||||||
goto exit;
|
goto out;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
// not found, alloc a new node!
|
// not found, alloc a new node!
|
||||||
p = (struct perm_data *)kmalloc(sizeof(struct perm_data), GFP_KERNEL);
|
p = (struct perm_data *)kmalloc(sizeof(struct perm_data), GFP_KERNEL);
|
||||||
if (!p) {
|
if (!p) {
|
||||||
pr_err("alloc allow node failed.\n");
|
pr_err("ksu_set_app_profile alloc failed\n");
|
||||||
return false;
|
return false;
|
||||||
}
|
}
|
||||||
p->uid = uid;
|
|
||||||
p->allow = allow;
|
|
||||||
|
|
||||||
pr_info("allow_uid: %d, allow: %d", uid, allow);
|
|
||||||
|
|
||||||
|
memcpy(&p->profile, profile, sizeof(*profile));
|
||||||
|
if (profile->allow_su) {
|
||||||
|
pr_info("set root profile, key: %s, uid: %d, gid: %d, context: %s\n",
|
||||||
|
profile->key, profile->current_uid,
|
||||||
|
profile->rp_config.profile.gid,
|
||||||
|
profile->rp_config.profile.selinux_domain);
|
||||||
|
} else {
|
||||||
|
pr_info("set app profile, key: %s, uid: %d, umount modules: %d\n",
|
||||||
|
profile->key, profile->current_uid,
|
||||||
|
profile->nrp_config.profile.umount_modules);
|
||||||
|
}
|
||||||
list_add_tail(&p->list, &allow_list);
|
list_add_tail(&p->list, &allow_list);
|
||||||
|
|
||||||
|
out:
|
||||||
|
if (profile->current_uid <= BITMAP_UID_MAX) {
|
||||||
|
if (profile->allow_su)
|
||||||
|
allow_list_bitmap[profile->current_uid / BITS_PER_BYTE] |= 1 << (profile->current_uid % BITS_PER_BYTE);
|
||||||
|
else
|
||||||
|
allow_list_bitmap[profile->current_uid / BITS_PER_BYTE] &= ~(1 << (profile->current_uid % BITS_PER_BYTE));
|
||||||
|
} else {
|
||||||
|
if (profile->allow_su) {
|
||||||
|
/*
|
||||||
|
* 1024 apps with uid higher than BITMAP_UID_MAX
|
||||||
|
* registered to request superuser?
|
||||||
|
*/
|
||||||
|
if (allow_list_pointer >= ARRAY_SIZE(allow_list_arr)) {
|
||||||
|
pr_err("too many apps registered\n");
|
||||||
|
WARN_ON(1);
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
allow_list_arr[allow_list_pointer++] = profile->current_uid;
|
||||||
|
} else {
|
||||||
|
remove_uid_from_arr(profile->current_uid);
|
||||||
|
}
|
||||||
|
}
|
||||||
result = true;
|
result = true;
|
||||||
|
|
||||||
exit:
|
// check if the default profiles is changed, cache it to a single struct to accelerate access.
|
||||||
|
if (unlikely(!strcmp(profile->key, "$"))) {
|
||||||
|
// set default non root profile
|
||||||
|
memcpy(&default_non_root_profile, &profile->nrp_config.profile,
|
||||||
|
sizeof(default_non_root_profile));
|
||||||
|
}
|
||||||
|
|
||||||
|
if (unlikely(!strcmp(profile->key, "#"))) {
|
||||||
|
// set default root profile
|
||||||
|
memcpy(&default_root_profile, &profile->rp_config.profile,
|
||||||
|
sizeof(default_root_profile));
|
||||||
|
}
|
||||||
|
|
||||||
if (persist)
|
if (persist)
|
||||||
persistent_allow_list();
|
persistent_allow_list();
|
||||||
|
|
||||||
return result;
|
return result;
|
||||||
}
|
}
|
||||||
|
|
||||||
bool ksu_is_allow_uid(uid_t uid)
|
bool __ksu_is_allow_uid(uid_t uid)
|
||||||
{
|
{
|
||||||
struct perm_data *p = NULL;
|
int i;
|
||||||
struct list_head *pos = NULL;
|
|
||||||
|
|
||||||
if (uid == 0) {
|
if (unlikely(uid == 0)) {
|
||||||
// already root, but only allow our domain.
|
// already root, but only allow our domain.
|
||||||
return is_ksu_domain();
|
return is_ksu_domain();
|
||||||
}
|
}
|
||||||
|
|
||||||
list_for_each (pos, &allow_list) {
|
if (forbid_system_uid(uid)) {
|
||||||
p = list_entry(pos, struct perm_data, list);
|
// do not bother going through the list if it's system
|
||||||
// pr_info("is_allow_uid uid :%d, allow: %d\n", p->uid, p->allow);
|
return false;
|
||||||
if (uid == p->uid) {
|
}
|
||||||
return p->allow;
|
|
||||||
|
if (likely(uid <= BITMAP_UID_MAX)) {
|
||||||
|
return !!(allow_list_bitmap[uid / BITS_PER_BYTE] & (1 << (uid % BITS_PER_BYTE)));
|
||||||
|
} else {
|
||||||
|
for (i = 0; i < allow_list_pointer; i++) {
|
||||||
|
if (allow_list_arr[i] == uid)
|
||||||
|
return true;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
return false;
|
return false;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
bool ksu_uid_should_umount(uid_t uid)
|
||||||
|
{
|
||||||
|
struct app_profile profile = { .current_uid = uid };
|
||||||
|
bool found = ksu_get_app_profile(&profile);
|
||||||
|
if (!found) {
|
||||||
|
// no app profile found, it must be non root app
|
||||||
|
return default_non_root_profile.umount_modules;
|
||||||
|
}
|
||||||
|
if (profile.allow_su) {
|
||||||
|
// if found and it is granted to su, we shouldn't umount for it
|
||||||
|
return false;
|
||||||
|
} else {
|
||||||
|
// found an app profile
|
||||||
|
if (profile.nrp_config.use_default) {
|
||||||
|
return default_non_root_profile.umount_modules;
|
||||||
|
} else {
|
||||||
|
return profile.nrp_config.profile.umount_modules;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
struct root_profile *ksu_get_root_profile(uid_t uid)
|
||||||
|
{
|
||||||
|
struct perm_data *p = NULL;
|
||||||
|
struct list_head *pos = NULL;
|
||||||
|
|
||||||
|
list_for_each (pos, &allow_list) {
|
||||||
|
p = list_entry(pos, struct perm_data, list);
|
||||||
|
if (uid == p->profile.current_uid && p->profile.allow_su) {
|
||||||
|
if (!p->profile.rp_config.use_default) {
|
||||||
|
return &p->profile.rp_config.profile;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// use default profile
|
||||||
|
return &default_root_profile;
|
||||||
|
}
|
||||||
|
|
||||||
bool ksu_get_allow_list(int *array, int *length, bool allow)
|
bool ksu_get_allow_list(int *array, int *length, bool allow)
|
||||||
{
|
{
|
||||||
struct perm_data *p = NULL;
|
struct perm_data *p = NULL;
|
||||||
@@ -105,8 +333,8 @@ bool ksu_get_allow_list(int *array, int *length, bool allow)
|
|||||||
list_for_each (pos, &allow_list) {
|
list_for_each (pos, &allow_list) {
|
||||||
p = list_entry(pos, struct perm_data, list);
|
p = list_entry(pos, struct perm_data, list);
|
||||||
// pr_info("get_allow_list uid: %d allow: %d\n", p->uid, p->allow);
|
// pr_info("get_allow_list uid: %d allow: %d\n", p->uid, p->allow);
|
||||||
if (p->allow == allow) {
|
if (p->profile.allow_su == allow) {
|
||||||
array[i++] = p->uid;
|
array[i++] = p->profile.current_uid;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
*length = i;
|
*length = i;
|
||||||
@@ -114,24 +342,24 @@ bool ksu_get_allow_list(int *array, int *length, bool allow)
|
|||||||
return true;
|
return true;
|
||||||
}
|
}
|
||||||
|
|
||||||
void do_persistent_allow_list(struct work_struct *work)
|
void do_save_allow_list(struct work_struct *work)
|
||||||
{
|
{
|
||||||
u32 magic = FILE_MAGIC;
|
u32 magic = FILE_MAGIC;
|
||||||
u32 version = FILE_FORMAT_VERSION;
|
u32 version = FILE_FORMAT_VERSION;
|
||||||
struct perm_data *p = NULL;
|
struct perm_data *p = NULL;
|
||||||
struct list_head *pos = NULL;
|
struct list_head *pos = NULL;
|
||||||
loff_t off = 0;
|
loff_t off = 0;
|
||||||
KWORKER_INSTALL_KEYRING();
|
|
||||||
struct file *fp =
|
|
||||||
filp_open(KERNEL_SU_ALLOWLIST, O_WRONLY | O_CREAT, 0644);
|
|
||||||
|
|
||||||
|
struct file *fp =
|
||||||
|
ksu_filp_open_compat(KERNEL_SU_ALLOWLIST, O_WRONLY | O_CREAT | O_TRUNC, 0644);
|
||||||
if (IS_ERR(fp)) {
|
if (IS_ERR(fp)) {
|
||||||
pr_err("save_allow_list creat file failed: %d\n", PTR_ERR(fp));
|
pr_err("save_allow_list create file failed: %ld\n", PTR_ERR(fp));
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
|
|
||||||
// store magic and version
|
// store magic and version
|
||||||
if (ksu_kernel_write_compat(fp, &magic, sizeof(magic), &off) != sizeof(magic)) {
|
if (ksu_kernel_write_compat(fp, &magic, sizeof(magic), &off) !=
|
||||||
|
sizeof(magic)) {
|
||||||
pr_err("save_allow_list write magic failed.\n");
|
pr_err("save_allow_list write magic failed.\n");
|
||||||
goto exit;
|
goto exit;
|
||||||
}
|
}
|
||||||
@@ -144,10 +372,12 @@ void do_persistent_allow_list(struct work_struct *work)
|
|||||||
|
|
||||||
list_for_each (pos, &allow_list) {
|
list_for_each (pos, &allow_list) {
|
||||||
p = list_entry(pos, struct perm_data, list);
|
p = list_entry(pos, struct perm_data, list);
|
||||||
pr_info("save allow list uid :%d, allow: %d\n", p->uid,
|
pr_info("save allow list, name: %s uid :%d, allow: %d\n",
|
||||||
p->allow);
|
p->profile.key, p->profile.current_uid,
|
||||||
ksu_kernel_write_compat(fp, &p->uid, sizeof(p->uid), &off);
|
p->profile.allow_su);
|
||||||
ksu_kernel_write_compat(fp, &p->allow, sizeof(p->allow), &off);
|
|
||||||
|
ksu_kernel_write_compat(fp, &p->profile, sizeof(p->profile),
|
||||||
|
&off);
|
||||||
}
|
}
|
||||||
|
|
||||||
exit:
|
exit:
|
||||||
@@ -161,29 +391,22 @@ void do_load_allow_list(struct work_struct *work)
|
|||||||
struct file *fp = NULL;
|
struct file *fp = NULL;
|
||||||
u32 magic;
|
u32 magic;
|
||||||
u32 version;
|
u32 version;
|
||||||
KWORKER_INSTALL_KEYRING();
|
|
||||||
|
#ifdef CONFIG_KSU_DEBUG
|
||||||
|
// always allow adb shell by default
|
||||||
|
ksu_grant_root_to_shell();
|
||||||
|
#endif
|
||||||
|
|
||||||
// load allowlist now!
|
// load allowlist now!
|
||||||
fp = filp_open(KERNEL_SU_ALLOWLIST, O_RDONLY, 0);
|
fp = ksu_filp_open_compat(KERNEL_SU_ALLOWLIST, O_RDONLY, 0);
|
||||||
|
|
||||||
if (IS_ERR(fp)) {
|
if (IS_ERR(fp)) {
|
||||||
#ifdef CONFIG_KSU_DEBUG
|
pr_err("load_allow_list open file failed: %ld\n", PTR_ERR(fp));
|
||||||
int errno = PTR_ERR(fp);
|
|
||||||
if (errno == -ENOENT) {
|
|
||||||
ksu_allow_uid(2000, true,
|
|
||||||
true); // allow adb shell by default
|
|
||||||
} else {
|
|
||||||
pr_err("load_allow_list open file failed: %d\n",
|
|
||||||
PTR_ERR(fp));
|
|
||||||
}
|
|
||||||
#else
|
|
||||||
pr_err("load_allow_list open file failed: %d\n", PTR_ERR(fp));
|
|
||||||
#endif
|
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
|
|
||||||
// verify magic
|
// verify magic
|
||||||
if (ksu_kernel_read_compat(fp, &magic, sizeof(magic), &off) != sizeof(magic) ||
|
if (ksu_kernel_read_compat(fp, &magic, sizeof(magic), &off) !=
|
||||||
|
sizeof(magic) ||
|
||||||
magic != FILE_MAGIC) {
|
magic != FILE_MAGIC) {
|
||||||
pr_err("allowlist file invalid: %d!\n", magic);
|
pr_err("allowlist file invalid: %d!\n", magic);
|
||||||
goto exit;
|
goto exit;
|
||||||
@@ -198,18 +421,19 @@ void do_load_allow_list(struct work_struct *work)
|
|||||||
pr_info("allowlist version: %d\n", version);
|
pr_info("allowlist version: %d\n", version);
|
||||||
|
|
||||||
while (true) {
|
while (true) {
|
||||||
u32 uid;
|
struct app_profile profile;
|
||||||
bool allow = false;
|
|
||||||
ret = ksu_kernel_read_compat(fp, &uid, sizeof(uid), &off);
|
ret = ksu_kernel_read_compat(fp, &profile, sizeof(profile),
|
||||||
|
&off);
|
||||||
|
|
||||||
if (ret <= 0) {
|
if (ret <= 0) {
|
||||||
pr_info("load_allow_list read err: %d\n", ret);
|
pr_info("load_allow_list read err: %zd\n", ret);
|
||||||
break;
|
break;
|
||||||
}
|
}
|
||||||
ret = ksu_kernel_read_compat(fp, &allow, sizeof(allow), &off);
|
|
||||||
|
|
||||||
pr_info("load_allow_uid: %d, allow: %d\n", uid, allow);
|
pr_info("load_allow_uid, name: %s, uid: %d, allow: %d\n",
|
||||||
|
profile.key, profile.current_uid, profile.allow_su);
|
||||||
ksu_allow_uid(uid, allow, false);
|
ksu_set_app_profile(&profile, false);
|
||||||
}
|
}
|
||||||
|
|
||||||
exit:
|
exit:
|
||||||
@@ -217,7 +441,7 @@ exit:
|
|||||||
filp_close(fp, 0);
|
filp_close(fp, 0);
|
||||||
}
|
}
|
||||||
|
|
||||||
void ksu_prune_allowlist(bool (*is_uid_exist)(uid_t, void *), void *data)
|
void ksu_prune_allowlist(bool (*is_uid_valid)(uid_t, char *, void *), void *data)
|
||||||
{
|
{
|
||||||
struct perm_data *np = NULL;
|
struct perm_data *np = NULL;
|
||||||
struct perm_data *n = NULL;
|
struct perm_data *n = NULL;
|
||||||
@@ -226,11 +450,19 @@ void ksu_prune_allowlist(bool (*is_uid_exist)(uid_t, void *), void *data)
|
|||||||
// TODO: use RCU!
|
// TODO: use RCU!
|
||||||
mutex_lock(&allowlist_mutex);
|
mutex_lock(&allowlist_mutex);
|
||||||
list_for_each_entry_safe (np, n, &allow_list, list) {
|
list_for_each_entry_safe (np, n, &allow_list, list) {
|
||||||
uid_t uid = np->uid;
|
uid_t uid = np->profile.current_uid;
|
||||||
if (!is_uid_exist(uid, data)) {
|
char *package = np->profile.key;
|
||||||
|
// we use this uid for special cases, don't prune it!
|
||||||
|
bool is_preserved_uid = uid == KSU_APP_PROFILE_PRESERVE_UID;
|
||||||
|
if (!is_preserved_uid && !is_uid_valid(uid, package, data)) {
|
||||||
modified = true;
|
modified = true;
|
||||||
pr_info("prune uid: %d\n", uid);
|
pr_info("prune uid: %d, package: %s\n", uid, package);
|
||||||
list_del(&np->list);
|
list_del(&np->list);
|
||||||
|
if (likely(uid <= BITMAP_UID_MAX)) {
|
||||||
|
allow_list_bitmap[uid / BITS_PER_BYTE] &= ~(1 << (uid % BITS_PER_BYTE));
|
||||||
|
}
|
||||||
|
remove_uid_from_arr(uid);
|
||||||
|
smp_mb();
|
||||||
kfree(np);
|
kfree(np);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@@ -254,10 +486,20 @@ bool ksu_load_allow_list(void)
|
|||||||
|
|
||||||
void ksu_allowlist_init(void)
|
void ksu_allowlist_init(void)
|
||||||
{
|
{
|
||||||
|
int i;
|
||||||
|
|
||||||
|
BUILD_BUG_ON(sizeof(allow_list_bitmap) != PAGE_SIZE);
|
||||||
|
BUILD_BUG_ON(sizeof(allow_list_arr) != PAGE_SIZE);
|
||||||
|
|
||||||
|
for (i = 0; i < ARRAY_SIZE(allow_list_arr); i++)
|
||||||
|
allow_list_arr[i] = -1;
|
||||||
|
|
||||||
INIT_LIST_HEAD(&allow_list);
|
INIT_LIST_HEAD(&allow_list);
|
||||||
|
|
||||||
INIT_WORK(&ksu_save_work, do_persistent_allow_list);
|
INIT_WORK(&ksu_save_work, do_save_allow_list);
|
||||||
INIT_WORK(&ksu_load_work, do_load_allow_list);
|
INIT_WORK(&ksu_load_work, do_load_allow_list);
|
||||||
|
|
||||||
|
init_default_profiles();
|
||||||
}
|
}
|
||||||
|
|
||||||
void ksu_allowlist_exit(void)
|
void ksu_allowlist_exit(void)
|
||||||
@@ -265,7 +507,7 @@ void ksu_allowlist_exit(void)
|
|||||||
struct perm_data *np = NULL;
|
struct perm_data *np = NULL;
|
||||||
struct perm_data *n = NULL;
|
struct perm_data *n = NULL;
|
||||||
|
|
||||||
do_persistent_allow_list(NULL);
|
do_save_allow_list(NULL);
|
||||||
|
|
||||||
// free allowlist
|
// free allowlist
|
||||||
mutex_lock(&allowlist_mutex);
|
mutex_lock(&allowlist_mutex);
|
||||||
@@ -274,4 +516,4 @@ void ksu_allowlist_exit(void)
|
|||||||
kfree(np);
|
kfree(np);
|
||||||
}
|
}
|
||||||
mutex_unlock(&allowlist_mutex);
|
mutex_unlock(&allowlist_mutex);
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -2,6 +2,7 @@
|
|||||||
#define __KSU_H_ALLOWLIST
|
#define __KSU_H_ALLOWLIST
|
||||||
|
|
||||||
#include "linux/types.h"
|
#include "linux/types.h"
|
||||||
|
#include "ksu.h"
|
||||||
|
|
||||||
void ksu_allowlist_init(void);
|
void ksu_allowlist_init(void);
|
||||||
|
|
||||||
@@ -11,12 +12,16 @@ bool ksu_load_allow_list(void);
|
|||||||
|
|
||||||
void ksu_show_allow_list(void);
|
void ksu_show_allow_list(void);
|
||||||
|
|
||||||
bool ksu_is_allow_uid(uid_t uid);
|
bool __ksu_is_allow_uid(uid_t uid);
|
||||||
|
#define ksu_is_allow_uid(uid) unlikely(__ksu_is_allow_uid(uid))
|
||||||
bool ksu_allow_uid(uid_t uid, bool allow, bool persist);
|
|
||||||
|
|
||||||
bool ksu_get_allow_list(int *array, int *length, bool allow);
|
bool ksu_get_allow_list(int *array, int *length, bool allow);
|
||||||
|
|
||||||
void ksu_prune_allowlist(bool (*is_uid_exist)(uid_t, void *), void *data);
|
void ksu_prune_allowlist(bool (*is_uid_exist)(uid_t, char *, void *), void *data);
|
||||||
|
|
||||||
#endif
|
bool ksu_get_app_profile(struct app_profile *);
|
||||||
|
bool ksu_set_app_profile(struct app_profile *, bool persist);
|
||||||
|
|
||||||
|
bool ksu_uid_should_umount(uid_t uid);
|
||||||
|
struct root_profile *ksu_get_root_profile(uid_t uid);
|
||||||
|
#endif
|
||||||
|
|||||||
@@ -1,12 +1,177 @@
|
|||||||
|
#include "linux/err.h"
|
||||||
#include "linux/fs.h"
|
#include "linux/fs.h"
|
||||||
|
#include "linux/gfp.h"
|
||||||
|
#include "linux/kernel.h"
|
||||||
#include "linux/moduleparam.h"
|
#include "linux/moduleparam.h"
|
||||||
|
|
||||||
#include "apk_sign.h"
|
#include "apk_sign.h"
|
||||||
#include "klog.h" // IWYU pragma: keep
|
#include "klog.h" // IWYU pragma: keep
|
||||||
#include "kernel_compat.h"
|
#include "kernel_compat.h"
|
||||||
|
#include "crypto/hash.h"
|
||||||
|
#include "linux/slab.h"
|
||||||
|
#include "linux/version.h"
|
||||||
|
|
||||||
static __always_inline int
|
#if LINUX_VERSION_CODE >= KERNEL_VERSION(5, 11, 0)
|
||||||
check_v2_signature(char *path, unsigned expected_size, unsigned expected_hash)
|
#include "crypto/sha2.h"
|
||||||
|
#else
|
||||||
|
#include "crypto/sha.h"
|
||||||
|
#endif
|
||||||
|
|
||||||
|
struct sdesc {
|
||||||
|
struct shash_desc shash;
|
||||||
|
char ctx[];
|
||||||
|
};
|
||||||
|
|
||||||
|
static struct sdesc *init_sdesc(struct crypto_shash *alg)
|
||||||
|
{
|
||||||
|
struct sdesc *sdesc;
|
||||||
|
int size;
|
||||||
|
|
||||||
|
size = sizeof(struct shash_desc) + crypto_shash_descsize(alg);
|
||||||
|
sdesc = kmalloc(size, GFP_KERNEL);
|
||||||
|
if (!sdesc)
|
||||||
|
return ERR_PTR(-ENOMEM);
|
||||||
|
sdesc->shash.tfm = alg;
|
||||||
|
return sdesc;
|
||||||
|
}
|
||||||
|
|
||||||
|
static int calc_hash(struct crypto_shash *alg, const unsigned char *data,
|
||||||
|
unsigned int datalen, unsigned char *digest)
|
||||||
|
{
|
||||||
|
struct sdesc *sdesc;
|
||||||
|
int ret;
|
||||||
|
|
||||||
|
sdesc = init_sdesc(alg);
|
||||||
|
if (IS_ERR(sdesc)) {
|
||||||
|
pr_info("can't alloc sdesc\n");
|
||||||
|
return PTR_ERR(sdesc);
|
||||||
|
}
|
||||||
|
|
||||||
|
ret = crypto_shash_digest(&sdesc->shash, data, datalen, digest);
|
||||||
|
kfree(sdesc);
|
||||||
|
return ret;
|
||||||
|
}
|
||||||
|
|
||||||
|
static int ksu_sha256(const unsigned char *data, unsigned int datalen,
|
||||||
|
unsigned char *digest)
|
||||||
|
{
|
||||||
|
struct crypto_shash *alg;
|
||||||
|
char *hash_alg_name = "sha256";
|
||||||
|
int ret;
|
||||||
|
|
||||||
|
alg = crypto_alloc_shash(hash_alg_name, 0, 0);
|
||||||
|
if (IS_ERR(alg)) {
|
||||||
|
pr_info("can't alloc alg %s\n", hash_alg_name);
|
||||||
|
return PTR_ERR(alg);
|
||||||
|
}
|
||||||
|
ret = calc_hash(alg, data, datalen, digest);
|
||||||
|
crypto_free_shash(alg);
|
||||||
|
return ret;
|
||||||
|
}
|
||||||
|
|
||||||
|
static bool check_block(struct file *fp, u32 *size4, loff_t *pos, u32 *offset,
|
||||||
|
unsigned expected_size, const char *expected_sha256)
|
||||||
|
{
|
||||||
|
ksu_kernel_read_compat(fp, size4, 0x4, pos); // signer-sequence length
|
||||||
|
ksu_kernel_read_compat(fp, size4, 0x4, pos); // signer length
|
||||||
|
ksu_kernel_read_compat(fp, size4, 0x4, pos); // signed data length
|
||||||
|
|
||||||
|
*offset += 0x4 * 3;
|
||||||
|
|
||||||
|
ksu_kernel_read_compat(fp, size4, 0x4, pos); // digests-sequence length
|
||||||
|
|
||||||
|
*pos += *size4;
|
||||||
|
*offset += 0x4 + *size4;
|
||||||
|
|
||||||
|
ksu_kernel_read_compat(fp, size4, 0x4, pos); // certificates length
|
||||||
|
ksu_kernel_read_compat(fp, size4, 0x4, pos); // certificate length
|
||||||
|
*offset += 0x4 * 2;
|
||||||
|
|
||||||
|
if (*size4 == expected_size) {
|
||||||
|
*offset += *size4;
|
||||||
|
|
||||||
|
#define CERT_MAX_LENGTH 1024
|
||||||
|
char cert[CERT_MAX_LENGTH];
|
||||||
|
if (*size4 > CERT_MAX_LENGTH) {
|
||||||
|
pr_info("cert length overlimit\n");
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
ksu_kernel_read_compat(fp, cert, *size4, pos);
|
||||||
|
unsigned char digest[SHA256_DIGEST_SIZE];
|
||||||
|
if (IS_ERR(ksu_sha256(cert, *size4, digest))) {
|
||||||
|
pr_info("sha256 error\n");
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
|
||||||
|
char hash_str[SHA256_DIGEST_SIZE * 2 + 1];
|
||||||
|
hash_str[SHA256_DIGEST_SIZE * 2] = '\0';
|
||||||
|
|
||||||
|
bin2hex(hash_str, digest, SHA256_DIGEST_SIZE);
|
||||||
|
pr_info("sha256: %s, expected: %s\n", hash_str,
|
||||||
|
expected_sha256);
|
||||||
|
if (strcmp(expected_sha256, hash_str) == 0) {
|
||||||
|
return true;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
|
||||||
|
struct zip_entry_header {
|
||||||
|
uint32_t signature;
|
||||||
|
uint16_t version;
|
||||||
|
uint16_t flags;
|
||||||
|
uint16_t compression;
|
||||||
|
uint16_t mod_time;
|
||||||
|
uint16_t mod_date;
|
||||||
|
uint32_t crc32;
|
||||||
|
uint32_t compressed_size;
|
||||||
|
uint32_t uncompressed_size;
|
||||||
|
uint16_t file_name_length;
|
||||||
|
uint16_t extra_field_length;
|
||||||
|
} __attribute__((packed));
|
||||||
|
|
||||||
|
// This is a necessary but not sufficient condition, but it is enough for us
|
||||||
|
static bool has_v1_signature_file(struct file *fp)
|
||||||
|
{
|
||||||
|
struct zip_entry_header header;
|
||||||
|
const char MANIFEST[] = "META-INF/MANIFEST.MF";
|
||||||
|
|
||||||
|
loff_t pos = 0;
|
||||||
|
|
||||||
|
while (ksu_kernel_read_compat(fp, &header,
|
||||||
|
sizeof(struct zip_entry_header), &pos) ==
|
||||||
|
sizeof(struct zip_entry_header)) {
|
||||||
|
if (header.signature != 0x04034b50) {
|
||||||
|
// ZIP magic: 'PK'
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
// Read the entry file name
|
||||||
|
if (header.file_name_length == sizeof(MANIFEST) - 1) {
|
||||||
|
char fileName[sizeof(MANIFEST)];
|
||||||
|
ksu_kernel_read_compat(fp, fileName,
|
||||||
|
header.file_name_length, &pos);
|
||||||
|
fileName[header.file_name_length] = '\0';
|
||||||
|
|
||||||
|
// Check if the entry matches META-INF/MANIFEST.MF
|
||||||
|
if (strncmp(MANIFEST, fileName, sizeof(MANIFEST) - 1) ==
|
||||||
|
0) {
|
||||||
|
return true;
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
// Skip the entry file name
|
||||||
|
pos += header.file_name_length;
|
||||||
|
}
|
||||||
|
|
||||||
|
// Skip to the next entry
|
||||||
|
pos += header.extra_field_length + header.compressed_size;
|
||||||
|
}
|
||||||
|
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
|
||||||
|
static __always_inline bool check_v2_signature(char *path,
|
||||||
|
unsigned expected_size,
|
||||||
|
const char *expected_sha256)
|
||||||
{
|
{
|
||||||
unsigned char buffer[0x11] = { 0 };
|
unsigned char buffer[0x11] = { 0 };
|
||||||
u32 size4;
|
u32 size4;
|
||||||
@@ -14,18 +179,21 @@ check_v2_signature(char *path, unsigned expected_size, unsigned expected_hash)
|
|||||||
|
|
||||||
loff_t pos;
|
loff_t pos;
|
||||||
|
|
||||||
int sign = -1;
|
bool v2_signing_valid = false;
|
||||||
|
int v2_signing_blocks = 0;
|
||||||
|
bool v3_signing_exist = false;
|
||||||
|
bool v3_1_signing_exist = false;
|
||||||
|
|
||||||
int i;
|
int i;
|
||||||
struct file *fp = filp_open(path, O_RDONLY, 0);
|
struct file *fp = ksu_filp_open_compat(path, O_RDONLY, 0);
|
||||||
if (IS_ERR(fp)) {
|
if (IS_ERR(fp)) {
|
||||||
pr_err("open %s error.", path);
|
pr_err("open %s error.\n", path);
|
||||||
return PTR_ERR(fp);
|
return PTR_ERR(fp);
|
||||||
}
|
}
|
||||||
|
|
||||||
// disable inotify for this file
|
// disable inotify for this file
|
||||||
fp->f_mode |= FMODE_NONOTIFY;
|
fp->f_mode |= FMODE_NONOTIFY;
|
||||||
|
|
||||||
sign = 1;
|
|
||||||
// https://en.wikipedia.org/wiki/Zip_(file_format)#End_of_central_directory_record_(EOCD)
|
// https://en.wikipedia.org/wiki/Zip_(file_format)#End_of_central_directory_record_(EOCD)
|
||||||
for (i = 0;; ++i) {
|
for (i = 0;; ++i) {
|
||||||
unsigned short n;
|
unsigned short n;
|
||||||
@@ -64,73 +232,58 @@ check_v2_signature(char *path, unsigned expected_size, unsigned expected_hash)
|
|||||||
for (;;) {
|
for (;;) {
|
||||||
uint32_t id;
|
uint32_t id;
|
||||||
uint32_t offset;
|
uint32_t offset;
|
||||||
ksu_kernel_read_compat(fp, &size8, 0x8, &pos); // sequence length
|
ksu_kernel_read_compat(fp, &size8, 0x8,
|
||||||
|
&pos); // sequence length
|
||||||
if (size8 == size_of_block) {
|
if (size8 == size_of_block) {
|
||||||
break;
|
break;
|
||||||
}
|
}
|
||||||
ksu_kernel_read_compat(fp, &id, 0x4, &pos); // id
|
ksu_kernel_read_compat(fp, &id, 0x4, &pos); // id
|
||||||
offset = 4;
|
offset = 4;
|
||||||
pr_info("id: 0x%08x\n", id);
|
pr_info("id: 0x%08x\n", id);
|
||||||
if ((id ^ 0xdeadbeefu) == 0xafa439f5u ||
|
if (id == 0x7109871au) {
|
||||||
(id ^ 0xdeadbeefu) == 0x2efed62f) {
|
v2_signing_blocks++;
|
||||||
ksu_kernel_read_compat(fp, &size4, 0x4,
|
v2_signing_valid =
|
||||||
&pos); // signer-sequence length
|
check_block(fp, &size4, &pos, &offset,
|
||||||
ksu_kernel_read_compat(fp, &size4, 0x4, &pos); // signer length
|
expected_size, expected_sha256);
|
||||||
ksu_kernel_read_compat(fp, &size4, 0x4,
|
} else if (id == 0xf05368c0u) {
|
||||||
&pos); // signed data length
|
// http://aospxref.com/android-14.0.0_r2/xref/frameworks/base/core/java/android/util/apk/ApkSignatureSchemeV3Verifier.java#73
|
||||||
offset += 0x4 * 3;
|
v3_signing_exist = true;
|
||||||
|
} else if (id == 0x1b93ad61u) {
|
||||||
ksu_kernel_read_compat(fp, &size4, 0x4,
|
// http://aospxref.com/android-14.0.0_r2/xref/frameworks/base/core/java/android/util/apk/ApkSignatureSchemeV3Verifier.java#74
|
||||||
&pos); // digests-sequence length
|
v3_1_signing_exist = true;
|
||||||
pos += size4;
|
|
||||||
offset += 0x4 + size4;
|
|
||||||
|
|
||||||
ksu_kernel_read_compat(fp, &size4, 0x4,
|
|
||||||
&pos); // certificates length
|
|
||||||
ksu_kernel_read_compat(fp, &size4, 0x4,
|
|
||||||
&pos); // certificate length
|
|
||||||
offset += 0x4 * 2;
|
|
||||||
#if 0
|
|
||||||
int hash = 1;
|
|
||||||
signed char c;
|
|
||||||
for (i = 0; i < size4; ++i) {
|
|
||||||
ksu_kernel_read_compat(fp, &c, 0x1, &pos);
|
|
||||||
hash = 31 * hash + c;
|
|
||||||
}
|
|
||||||
offset += size4;
|
|
||||||
pr_info(" size: 0x%04x, hash: 0x%08x\n", size4, ((unsigned) hash) ^ 0x14131211u);
|
|
||||||
#else
|
|
||||||
if (size4 == expected_size) {
|
|
||||||
int hash = 1;
|
|
||||||
signed char c;
|
|
||||||
for (i = 0; i < size4; ++i) {
|
|
||||||
ksu_kernel_read_compat(fp, &c, 0x1, &pos);
|
|
||||||
hash = 31 * hash + c;
|
|
||||||
}
|
|
||||||
offset += size4;
|
|
||||||
if ((((unsigned)hash) ^ 0x14131211u) ==
|
|
||||||
expected_hash) {
|
|
||||||
sign = 0;
|
|
||||||
break;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
// don't try again.
|
|
||||||
break;
|
|
||||||
#endif
|
|
||||||
}
|
}
|
||||||
pos += (size8 - offset);
|
pos += (size8 - offset);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
if (v2_signing_blocks != 1) {
|
||||||
|
pr_err("Unexpected v2 signature count: %d\n",
|
||||||
|
v2_signing_blocks);
|
||||||
|
v2_signing_valid = false;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (v2_signing_valid) {
|
||||||
|
int has_v1_signing = has_v1_signature_file(fp);
|
||||||
|
if (has_v1_signing) {
|
||||||
|
pr_err("Unexpected v1 signature scheme found!\n");
|
||||||
|
filp_close(fp, 0);
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
}
|
||||||
clean:
|
clean:
|
||||||
filp_close(fp, 0);
|
filp_close(fp, 0);
|
||||||
|
|
||||||
return sign;
|
if (v3_signing_exist || v3_1_signing_exist) {
|
||||||
|
pr_err("Unexpected v3 signature scheme found!\n");
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
|
||||||
|
return v2_signing_valid;
|
||||||
}
|
}
|
||||||
|
|
||||||
#ifdef CONFIG_KSU_DEBUG
|
#ifdef CONFIG_KSU_DEBUG
|
||||||
|
|
||||||
unsigned ksu_expected_size = EXPECTED_SIZE;
|
unsigned ksu_expected_size = EXPECTED_SIZE;
|
||||||
unsigned ksu_expected_hash = EXPECTED_HASH;
|
const char *ksu_expected_hash = EXPECTED_HASH;
|
||||||
|
|
||||||
#include "manager.h"
|
#include "manager.h"
|
||||||
|
|
||||||
@@ -138,15 +291,16 @@ static int set_expected_size(const char *val, const struct kernel_param *kp)
|
|||||||
{
|
{
|
||||||
int rv = param_set_uint(val, kp);
|
int rv = param_set_uint(val, kp);
|
||||||
ksu_invalidate_manager_uid();
|
ksu_invalidate_manager_uid();
|
||||||
pr_info("ksu_expected_size set to %x", ksu_expected_size);
|
pr_info("ksu_expected_size set to %x\n", ksu_expected_size);
|
||||||
return rv;
|
return rv;
|
||||||
}
|
}
|
||||||
|
|
||||||
static int set_expected_hash(const char *val, const struct kernel_param *kp)
|
static int set_expected_hash(const char *val, const struct kernel_param *kp)
|
||||||
{
|
{
|
||||||
int rv = param_set_uint(val, kp);
|
pr_info("set_expected_hash: %s\n", val);
|
||||||
|
int rv = param_set_charp(val, kp);
|
||||||
ksu_invalidate_manager_uid();
|
ksu_invalidate_manager_uid();
|
||||||
pr_info("ksu_expected_hash set to %x", ksu_expected_hash);
|
pr_info("ksu_expected_hash set to %s\n", ksu_expected_hash);
|
||||||
return rv;
|
return rv;
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -157,7 +311,8 @@ static struct kernel_param_ops expected_size_ops = {
|
|||||||
|
|
||||||
static struct kernel_param_ops expected_hash_ops = {
|
static struct kernel_param_ops expected_hash_ops = {
|
||||||
.set = set_expected_hash,
|
.set = set_expected_hash,
|
||||||
.get = param_get_uint,
|
.get = param_get_charp,
|
||||||
|
.free = param_free_charp,
|
||||||
};
|
};
|
||||||
|
|
||||||
module_param_cb(ksu_expected_size, &expected_size_ops, &ksu_expected_size,
|
module_param_cb(ksu_expected_size, &expected_size_ops, &ksu_expected_size,
|
||||||
@@ -165,14 +320,14 @@ module_param_cb(ksu_expected_size, &expected_size_ops, &ksu_expected_size,
|
|||||||
module_param_cb(ksu_expected_hash, &expected_hash_ops, &ksu_expected_hash,
|
module_param_cb(ksu_expected_hash, &expected_hash_ops, &ksu_expected_hash,
|
||||||
S_IRUSR | S_IWUSR);
|
S_IRUSR | S_IWUSR);
|
||||||
|
|
||||||
int is_manager_apk(char *path)
|
bool is_manager_apk(char *path)
|
||||||
{
|
{
|
||||||
return check_v2_signature(path, ksu_expected_size, ksu_expected_hash);
|
return check_v2_signature(path, ksu_expected_size, ksu_expected_hash);
|
||||||
}
|
}
|
||||||
|
|
||||||
#else
|
#else
|
||||||
|
|
||||||
int is_manager_apk(char *path)
|
bool is_manager_apk(char *path)
|
||||||
{
|
{
|
||||||
return check_v2_signature(path, EXPECTED_SIZE, EXPECTED_HASH);
|
return check_v2_signature(path, EXPECTED_SIZE, EXPECTED_HASH);
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -1,7 +1,8 @@
|
|||||||
#ifndef __KSU_H_APK_V2_SIGN
|
#ifndef __KSU_H_APK_V2_SIGN
|
||||||
#define __KSU_H_APK_V2_SIGN
|
#define __KSU_H_APK_V2_SIGN
|
||||||
|
|
||||||
// return 0 if signature match
|
#include "linux/types.h"
|
||||||
int is_manager_apk(char *path);
|
|
||||||
|
|
||||||
#endif
|
bool is_manager_apk(char *path);
|
||||||
|
|
||||||
|
#endif
|
||||||
|
|||||||
@@ -8,7 +8,8 @@
|
|||||||
#define __PT_PARM1_REG regs[0]
|
#define __PT_PARM1_REG regs[0]
|
||||||
#define __PT_PARM2_REG regs[1]
|
#define __PT_PARM2_REG regs[1]
|
||||||
#define __PT_PARM3_REG regs[2]
|
#define __PT_PARM3_REG regs[2]
|
||||||
#define __PT_PARM4_REG regs[3]
|
#define __PT_SYSCALL_PARM4_REG regs[3]
|
||||||
|
#define __PT_CCALL_PARM4_REG regs[3]
|
||||||
#define __PT_PARM5_REG regs[4]
|
#define __PT_PARM5_REG regs[4]
|
||||||
#define __PT_PARM6_REG regs[5]
|
#define __PT_PARM6_REG regs[5]
|
||||||
#define __PT_RET_REG regs[30]
|
#define __PT_RET_REG regs[30]
|
||||||
@@ -29,8 +30,8 @@
|
|||||||
#define __PT_PARM2_REG si
|
#define __PT_PARM2_REG si
|
||||||
#define __PT_PARM3_REG dx
|
#define __PT_PARM3_REG dx
|
||||||
/* syscall uses r10 for PARM4 */
|
/* syscall uses r10 for PARM4 */
|
||||||
#define __PT_PARM4_REG r10
|
#define __PT_SYSCALL_PARM4_REG r10
|
||||||
// #define __PT_PARM4_REG cx
|
#define __PT_CCALL_PARM4_REG cx
|
||||||
#define __PT_PARM5_REG r8
|
#define __PT_PARM5_REG r8
|
||||||
#define __PT_PARM6_REG r9
|
#define __PT_PARM6_REG r9
|
||||||
#define __PT_RET_REG sp
|
#define __PT_RET_REG sp
|
||||||
@@ -56,7 +57,8 @@
|
|||||||
#define PT_REGS_PARM1(x) (__PT_REGS_CAST(x)->__PT_PARM1_REG)
|
#define PT_REGS_PARM1(x) (__PT_REGS_CAST(x)->__PT_PARM1_REG)
|
||||||
#define PT_REGS_PARM2(x) (__PT_REGS_CAST(x)->__PT_PARM2_REG)
|
#define PT_REGS_PARM2(x) (__PT_REGS_CAST(x)->__PT_PARM2_REG)
|
||||||
#define PT_REGS_PARM3(x) (__PT_REGS_CAST(x)->__PT_PARM3_REG)
|
#define PT_REGS_PARM3(x) (__PT_REGS_CAST(x)->__PT_PARM3_REG)
|
||||||
#define PT_REGS_PARM4(x) (__PT_REGS_CAST(x)->__PT_PARM4_REG)
|
#define PT_REGS_SYSCALL_PARM4(x) (__PT_REGS_CAST(x)->__PT_SYSCALL_PARM4_REG)
|
||||||
|
#define PT_REGS_CCALL_PARM4(x) (__PT_REGS_CAST(x)->__PT_CCALL_PARM4_REG)
|
||||||
#define PT_REGS_PARM5(x) (__PT_REGS_CAST(x)->__PT_PARM5_REG)
|
#define PT_REGS_PARM5(x) (__PT_REGS_CAST(x)->__PT_PARM5_REG)
|
||||||
#define PT_REGS_PARM6(x) (__PT_REGS_CAST(x)->__PT_PARM6_REG)
|
#define PT_REGS_PARM6(x) (__PT_REGS_CAST(x)->__PT_PARM6_REG)
|
||||||
#define PT_REGS_RET(x) (__PT_REGS_CAST(x)->__PT_RET_REG)
|
#define PT_REGS_RET(x) (__PT_REGS_CAST(x)->__PT_RET_REG)
|
||||||
|
|||||||
@@ -1,10 +1,13 @@
|
|||||||
|
#include "linux/capability.h"
|
||||||
#include "linux/cred.h"
|
#include "linux/cred.h"
|
||||||
#include "linux/dcache.h"
|
#include "linux/dcache.h"
|
||||||
#include "linux/err.h"
|
#include "linux/err.h"
|
||||||
#include "linux/init.h"
|
#include "linux/init.h"
|
||||||
|
#include "linux/init_task.h"
|
||||||
#include "linux/kernel.h"
|
#include "linux/kernel.h"
|
||||||
#include "linux/kprobes.h"
|
#include "linux/kprobes.h"
|
||||||
#include "linux/lsm_hooks.h"
|
#include "linux/lsm_hooks.h"
|
||||||
|
#include "linux/nsproxy.h"
|
||||||
#include "linux/path.h"
|
#include "linux/path.h"
|
||||||
#include "linux/printk.h"
|
#include "linux/printk.h"
|
||||||
#include "linux/uaccess.h"
|
#include "linux/uaccess.h"
|
||||||
@@ -27,6 +30,8 @@
|
|||||||
#include "uid_observer.h"
|
#include "uid_observer.h"
|
||||||
#include "kernel_compat.h"
|
#include "kernel_compat.h"
|
||||||
|
|
||||||
|
static bool ksu_module_mounted = false;
|
||||||
|
|
||||||
extern int handle_sepolicy(unsigned long arg3, void __user *arg4);
|
extern int handle_sepolicy(unsigned long arg3, void __user *arg4);
|
||||||
|
|
||||||
static inline bool is_allow_su()
|
static inline bool is_allow_su()
|
||||||
@@ -52,24 +57,89 @@ static inline bool is_isolated_uid(uid_t uid)
|
|||||||
|
|
||||||
static struct group_info root_groups = { .usage = ATOMIC_INIT(2) };
|
static struct group_info root_groups = { .usage = ATOMIC_INIT(2) };
|
||||||
|
|
||||||
|
static void setup_groups(struct root_profile *profile, struct cred *cred)
|
||||||
|
{
|
||||||
|
if (profile->groups_count > KSU_MAX_GROUPS) {
|
||||||
|
pr_warn("Failed to setgroups, too large group: %d!\n",
|
||||||
|
profile->uid);
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (profile->groups_count == 1 && profile->groups[0] == 0) {
|
||||||
|
// setgroup to root and return early.
|
||||||
|
if (cred->group_info)
|
||||||
|
put_group_info(cred->group_info);
|
||||||
|
cred->group_info = get_group_info(&root_groups);
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
|
u32 ngroups = profile->groups_count;
|
||||||
|
struct group_info *group_info = groups_alloc(ngroups);
|
||||||
|
if (!group_info) {
|
||||||
|
pr_warn("Failed to setgroups, ENOMEM for: %d\n", profile->uid);
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
|
int i;
|
||||||
|
for (i = 0; i < ngroups; i++) {
|
||||||
|
gid_t gid = profile->groups[i];
|
||||||
|
kgid_t kgid = make_kgid(current_user_ns(), gid);
|
||||||
|
if (!gid_valid(kgid)) {
|
||||||
|
pr_warn("Failed to setgroups, invalid gid: %d\n", gid);
|
||||||
|
put_group_info(group_info);
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
#if LINUX_VERSION_CODE >= KERNEL_VERSION(4, 9, 0)
|
||||||
|
group_info->gid[i] = kgid;
|
||||||
|
#else
|
||||||
|
GROUP_AT(group_info, i) = kgid;
|
||||||
|
#endif
|
||||||
|
}
|
||||||
|
|
||||||
|
groups_sort(group_info);
|
||||||
|
set_groups(cred, group_info);
|
||||||
|
}
|
||||||
|
|
||||||
void escape_to_root(void)
|
void escape_to_root(void)
|
||||||
{
|
{
|
||||||
struct cred *cred;
|
struct cred *cred;
|
||||||
|
|
||||||
cred = (struct cred *)__task_cred(current);
|
cred = (struct cred *)__task_cred(current);
|
||||||
|
|
||||||
memset(&cred->uid, 0, sizeof(cred->uid));
|
if (cred->euid.val == 0) {
|
||||||
memset(&cred->gid, 0, sizeof(cred->gid));
|
pr_warn("Already root, don't escape!\n");
|
||||||
memset(&cred->suid, 0, sizeof(cred->suid));
|
return;
|
||||||
memset(&cred->euid, 0, sizeof(cred->euid));
|
}
|
||||||
memset(&cred->egid, 0, sizeof(cred->egid));
|
struct root_profile *profile = ksu_get_root_profile(cred->uid.val);
|
||||||
memset(&cred->fsuid, 0, sizeof(cred->fsuid));
|
|
||||||
memset(&cred->fsgid, 0, sizeof(cred->fsgid));
|
cred->uid.val = profile->uid;
|
||||||
memset(&cred->cap_inheritable, 0xff, sizeof(cred->cap_inheritable));
|
cred->suid.val = profile->uid;
|
||||||
memset(&cred->cap_permitted, 0xff, sizeof(cred->cap_permitted));
|
cred->euid.val = profile->uid;
|
||||||
memset(&cred->cap_effective, 0xff, sizeof(cred->cap_effective));
|
cred->fsuid.val = profile->uid;
|
||||||
memset(&cred->cap_bset, 0xff, sizeof(cred->cap_bset));
|
|
||||||
memset(&cred->cap_ambient, 0xff, sizeof(cred->cap_ambient));
|
cred->gid.val = profile->gid;
|
||||||
|
cred->fsgid.val = profile->gid;
|
||||||
|
cred->sgid.val = profile->gid;
|
||||||
|
cred->egid.val = profile->gid;
|
||||||
|
|
||||||
|
BUILD_BUG_ON(sizeof(profile->capabilities.effective) !=
|
||||||
|
sizeof(kernel_cap_t));
|
||||||
|
|
||||||
|
// setup capabilities
|
||||||
|
// we need CAP_DAC_READ_SEARCH becuase `/data/adb/ksud` is not accessible for non root process
|
||||||
|
// we add it here but don't add it to cap_inhertiable, it would be dropped automaticly after exec!
|
||||||
|
u64 cap_for_ksud =
|
||||||
|
profile->capabilities.effective | CAP_DAC_READ_SEARCH;
|
||||||
|
memcpy(&cred->cap_effective, &cap_for_ksud,
|
||||||
|
sizeof(cred->cap_effective));
|
||||||
|
memcpy(&cred->cap_inheritable, &profile->capabilities.effective,
|
||||||
|
sizeof(cred->cap_inheritable));
|
||||||
|
memcpy(&cred->cap_permitted, &profile->capabilities.effective,
|
||||||
|
sizeof(cred->cap_permitted));
|
||||||
|
memcpy(&cred->cap_bset, &profile->capabilities.effective,
|
||||||
|
sizeof(cred->cap_bset));
|
||||||
|
memcpy(&cred->cap_ambient, &profile->capabilities.effective,
|
||||||
|
sizeof(cred->cap_ambient));
|
||||||
|
|
||||||
// disable seccomp
|
// disable seccomp
|
||||||
#if defined(CONFIG_GENERIC_ENTRY) && \
|
#if defined(CONFIG_GENERIC_ENTRY) && \
|
||||||
@@ -85,12 +155,9 @@ void escape_to_root(void)
|
|||||||
#else
|
#else
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
// setgroup to root
|
setup_groups(profile, cred);
|
||||||
if (cred->group_info)
|
|
||||||
put_group_info(cred->group_info);
|
|
||||||
cred->group_info = get_group_info(&root_groups);
|
|
||||||
|
|
||||||
setup_selinux();
|
setup_selinux(profile->selinux_domain);
|
||||||
}
|
}
|
||||||
|
|
||||||
int ksu_handle_rename(struct dentry *old_dentry, struct dentry *new_dentry)
|
int ksu_handle_rename(struct dentry *old_dentry, struct dentry *new_dentry)
|
||||||
@@ -124,7 +191,7 @@ int ksu_handle_rename(struct dentry *old_dentry, struct dentry *new_dentry)
|
|||||||
if (strcmp(buf, "/system/packages.list")) {
|
if (strcmp(buf, "/system/packages.list")) {
|
||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
pr_info("renameat: %s -> %s, new path: %s", old_dentry->d_iname,
|
pr_info("renameat: %s -> %s, new path: %s\n", old_dentry->d_iname,
|
||||||
new_dentry->d_iname, buf);
|
new_dentry->d_iname, buf);
|
||||||
|
|
||||||
update_uid();
|
update_uid();
|
||||||
@@ -172,9 +239,12 @@ int ksu_handle_prctl(int option, unsigned long arg2, unsigned long arg3,
|
|||||||
// someone wants to be root manager, just check it!
|
// someone wants to be root manager, just check it!
|
||||||
// arg3 should be `/data/user/<userId>/<manager_package_name>`
|
// arg3 should be `/data/user/<userId>/<manager_package_name>`
|
||||||
char param[128];
|
char param[128];
|
||||||
if (copy_from_user(param, arg3, sizeof(param))) {
|
if (ksu_strncpy_from_user_nofault(param, arg3, sizeof(param)) ==
|
||||||
|
-EFAULT) {
|
||||||
|
#ifdef CONFIG_KSU_DEBUG
|
||||||
pr_err("become_manager: copy param err\n");
|
pr_err("become_manager: copy param err\n");
|
||||||
return 0;
|
#endif
|
||||||
|
goto block;
|
||||||
}
|
}
|
||||||
|
|
||||||
// for user 0, it is /data/data
|
// for user 0, it is /data/data
|
||||||
@@ -185,13 +255,14 @@ int ksu_handle_prctl(int option, unsigned long arg2, unsigned long arg3,
|
|||||||
if (userId == 0) {
|
if (userId == 0) {
|
||||||
prefix = "/data/data";
|
prefix = "/data/data";
|
||||||
} else {
|
} else {
|
||||||
snprintf(prefixTmp, sizeof(prefixTmp), "/data/user/%d", userId);
|
snprintf(prefixTmp, sizeof(prefixTmp), "/data/user/%d",
|
||||||
|
userId);
|
||||||
prefix = prefixTmp;
|
prefix = prefixTmp;
|
||||||
}
|
}
|
||||||
|
|
||||||
if (startswith(param, (char *)prefix) != 0) {
|
if (startswith(param, (char *)prefix) != 0) {
|
||||||
pr_info("become_manager: invalid param: %s\n", param);
|
pr_info("become_manager: invalid param: %s\n", param);
|
||||||
return 0;
|
goto block;
|
||||||
}
|
}
|
||||||
|
|
||||||
// stat the param, app must have permission to do this
|
// stat the param, app must have permission to do this
|
||||||
@@ -199,12 +270,13 @@ int ksu_handle_prctl(int option, unsigned long arg2, unsigned long arg3,
|
|||||||
struct path path;
|
struct path path;
|
||||||
if (kern_path(param, LOOKUP_DIRECTORY, &path)) {
|
if (kern_path(param, LOOKUP_DIRECTORY, &path)) {
|
||||||
pr_err("become_manager: kern_path err\n");
|
pr_err("become_manager: kern_path err\n");
|
||||||
return 0;
|
goto block;
|
||||||
}
|
}
|
||||||
if (path.dentry->d_inode->i_uid.val != current_uid().val) {
|
uid_t inode_uid = path.dentry->d_inode->i_uid.val;
|
||||||
|
path_put(&path);
|
||||||
|
if (inode_uid != current_uid().val) {
|
||||||
pr_err("become_manager: path uid != current uid\n");
|
pr_err("become_manager: path uid != current uid\n");
|
||||||
path_put(&path);
|
goto block;
|
||||||
return 0;
|
|
||||||
}
|
}
|
||||||
char *pkg = param + strlen(prefix);
|
char *pkg = param + strlen(prefix);
|
||||||
pr_info("become_manager: param pkg: %s\n", pkg);
|
pr_info("become_manager: param pkg: %s\n", pkg);
|
||||||
@@ -214,22 +286,20 @@ int ksu_handle_prctl(int option, unsigned long arg2, unsigned long arg3,
|
|||||||
if (copy_to_user(result, &reply_ok, sizeof(reply_ok))) {
|
if (copy_to_user(result, &reply_ok, sizeof(reply_ok))) {
|
||||||
pr_err("become_manager: prctl reply error\n");
|
pr_err("become_manager: prctl reply error\n");
|
||||||
}
|
}
|
||||||
|
return 0;
|
||||||
}
|
}
|
||||||
path_put(&path);
|
block:
|
||||||
|
last_failed_uid = current_uid().val;
|
||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
if (arg2 == CMD_GRANT_ROOT) {
|
if (arg2 == CMD_GRANT_ROOT) {
|
||||||
if (is_allow_su()) {
|
if (is_allow_su()) {
|
||||||
pr_info("allow root for: %d\n", current_uid());
|
pr_info("allow root for: %d\n", current_uid().val);
|
||||||
escape_to_root();
|
escape_to_root();
|
||||||
if (copy_to_user(result, &reply_ok, sizeof(reply_ok))) {
|
if (copy_to_user(result, &reply_ok, sizeof(reply_ok))) {
|
||||||
pr_err("grant_root: prctl reply error\n");
|
pr_err("grant_root: prctl reply error\n");
|
||||||
}
|
}
|
||||||
} else {
|
|
||||||
pr_info("deny root for: %d\n", current_uid());
|
|
||||||
// add it to deny list!
|
|
||||||
ksu_allow_uid(current_uid().val, false, true);
|
|
||||||
}
|
}
|
||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
@@ -239,7 +309,7 @@ int ksu_handle_prctl(int option, unsigned long arg2, unsigned long arg3,
|
|||||||
if (is_manager() || 0 == current_uid().val) {
|
if (is_manager() || 0 == current_uid().val) {
|
||||||
u32 version = KERNEL_SU_VERSION;
|
u32 version = KERNEL_SU_VERSION;
|
||||||
if (copy_to_user(arg3, &version, sizeof(version))) {
|
if (copy_to_user(arg3, &version, sizeof(version))) {
|
||||||
pr_err("prctl reply error, cmd: %d\n", arg2);
|
pr_err("prctl reply error, cmd: %lu\n", arg2);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
return 0;
|
return 0;
|
||||||
@@ -254,7 +324,7 @@ int ksu_handle_prctl(int option, unsigned long arg2, unsigned long arg3,
|
|||||||
static bool post_fs_data_lock = false;
|
static bool post_fs_data_lock = false;
|
||||||
if (!post_fs_data_lock) {
|
if (!post_fs_data_lock) {
|
||||||
post_fs_data_lock = true;
|
post_fs_data_lock = true;
|
||||||
pr_info("post-fs-data triggered");
|
pr_info("post-fs-data triggered\n");
|
||||||
on_post_fs_data();
|
on_post_fs_data();
|
||||||
}
|
}
|
||||||
break;
|
break;
|
||||||
@@ -263,10 +333,15 @@ int ksu_handle_prctl(int option, unsigned long arg2, unsigned long arg3,
|
|||||||
static bool boot_complete_lock = false;
|
static bool boot_complete_lock = false;
|
||||||
if (!boot_complete_lock) {
|
if (!boot_complete_lock) {
|
||||||
boot_complete_lock = true;
|
boot_complete_lock = true;
|
||||||
pr_info("boot_complete triggered");
|
pr_info("boot_complete triggered\n");
|
||||||
}
|
}
|
||||||
break;
|
break;
|
||||||
}
|
}
|
||||||
|
case EVENT_MODULE_MOUNTED: {
|
||||||
|
ksu_module_mounted = true;
|
||||||
|
pr_info("module mounted!\n");
|
||||||
|
break;
|
||||||
|
}
|
||||||
default:
|
default:
|
||||||
break;
|
break;
|
||||||
}
|
}
|
||||||
@@ -313,7 +388,7 @@ int ksu_handle_prctl(int option, unsigned long arg2, unsigned long arg3,
|
|||||||
sizeof(u32) * array_length)) {
|
sizeof(u32) * array_length)) {
|
||||||
if (copy_to_user(result, &reply_ok,
|
if (copy_to_user(result, &reply_ok,
|
||||||
sizeof(reply_ok))) {
|
sizeof(reply_ok))) {
|
||||||
pr_err("prctl reply error, cmd: %d\n",
|
pr_err("prctl reply error, cmd: %lu\n",
|
||||||
arg2);
|
arg2);
|
||||||
}
|
}
|
||||||
} else {
|
} else {
|
||||||
@@ -324,6 +399,30 @@ int ksu_handle_prctl(int option, unsigned long arg2, unsigned long arg3,
|
|||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
if (arg2 == CMD_UID_GRANTED_ROOT || arg2 == CMD_UID_SHOULD_UMOUNT) {
|
||||||
|
if (is_manager() || 0 == current_uid().val) {
|
||||||
|
uid_t target_uid = (uid_t)arg3;
|
||||||
|
bool allow = false;
|
||||||
|
if (arg2 == CMD_UID_GRANTED_ROOT) {
|
||||||
|
allow = ksu_is_allow_uid(target_uid);
|
||||||
|
} else if (arg2 == CMD_UID_SHOULD_UMOUNT) {
|
||||||
|
allow = ksu_uid_should_umount(target_uid);
|
||||||
|
} else {
|
||||||
|
pr_err("unknown cmd: %lu\n", arg2);
|
||||||
|
}
|
||||||
|
if (!copy_to_user(arg4, &allow, sizeof(allow))) {
|
||||||
|
if (copy_to_user(result, &reply_ok,
|
||||||
|
sizeof(reply_ok))) {
|
||||||
|
pr_err("prctl reply error, cmd: %lu\n",
|
||||||
|
arg2);
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
pr_err("prctl copy err, cmd: %lu\n", arg2);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
// all other cmds are for 'root manager'
|
// all other cmds are for 'root manager'
|
||||||
if (!is_manager()) {
|
if (!is_manager()) {
|
||||||
last_failed_uid = current_uid().val;
|
last_failed_uid = current_uid().val;
|
||||||
@@ -331,17 +430,39 @@ int ksu_handle_prctl(int option, unsigned long arg2, unsigned long arg3,
|
|||||||
}
|
}
|
||||||
|
|
||||||
// we are already manager
|
// we are already manager
|
||||||
if (arg2 == CMD_ALLOW_SU || arg2 == CMD_DENY_SU) {
|
if (arg2 == CMD_GET_APP_PROFILE) {
|
||||||
bool allow = arg2 == CMD_ALLOW_SU;
|
struct app_profile profile;
|
||||||
bool success = false;
|
if (copy_from_user(&profile, arg3, sizeof(profile))) {
|
||||||
uid_t uid = (uid_t)arg3;
|
pr_err("copy profile failed\n");
|
||||||
success = ksu_allow_uid(uid, allow, true);
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
bool success = ksu_get_app_profile(&profile);
|
||||||
if (success) {
|
if (success) {
|
||||||
|
if (copy_to_user(arg3, &profile, sizeof(profile))) {
|
||||||
|
pr_err("copy profile failed\n");
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
if (copy_to_user(result, &reply_ok, sizeof(reply_ok))) {
|
if (copy_to_user(result, &reply_ok, sizeof(reply_ok))) {
|
||||||
pr_err("prctl reply error, cmd: %d\n", arg2);
|
pr_err("prctl reply error, cmd: %lu\n", arg2);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (arg2 == CMD_SET_APP_PROFILE) {
|
||||||
|
struct app_profile profile;
|
||||||
|
if (copy_from_user(&profile, arg3, sizeof(profile))) {
|
||||||
|
pr_err("copy profile failed\n");
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
// todo: validate the params
|
||||||
|
if (ksu_set_app_profile(&profile, true)) {
|
||||||
|
if (copy_to_user(result, &reply_ok, sizeof(reply_ok))) {
|
||||||
|
pr_err("prctl reply error, cmd: %lu\n", arg2);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
ksu_show_allow_list();
|
|
||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -364,6 +485,12 @@ static bool should_umount(struct path *path)
|
|||||||
return false;
|
return false;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
if (current->nsproxy->mnt_ns == init_nsproxy.mnt_ns) {
|
||||||
|
pr_info("ignore global mnt namespace process: %d\n",
|
||||||
|
current_uid().val);
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
|
||||||
if (path->mnt && path->mnt->mnt_sb && path->mnt->mnt_sb->s_type) {
|
if (path->mnt && path->mnt->mnt_sb && path->mnt->mnt_sb->s_type) {
|
||||||
const char *fstype = path->mnt->mnt_sb->s_type->name;
|
const char *fstype = path->mnt->mnt_sb->s_type->name;
|
||||||
return strcmp(fstype, "overlay") == 0;
|
return strcmp(fstype, "overlay") == 0;
|
||||||
@@ -371,7 +498,19 @@ static bool should_umount(struct path *path)
|
|||||||
return false;
|
return false;
|
||||||
}
|
}
|
||||||
|
|
||||||
static void try_umount(const char *mnt)
|
static void ksu_umount_mnt(struct path *path, int flags)
|
||||||
|
{
|
||||||
|
#if LINUX_VERSION_CODE >= KERNEL_VERSION(5, 9, 0)
|
||||||
|
int err = path_umount(path, flags);
|
||||||
|
if (err) {
|
||||||
|
pr_info("umount %s failed: %d\n", path->dentry->d_iname, err);
|
||||||
|
}
|
||||||
|
#else
|
||||||
|
// TODO: umount for non GKI kernel
|
||||||
|
#endif
|
||||||
|
}
|
||||||
|
|
||||||
|
static void try_umount(const char *mnt, bool check_mnt, int flags)
|
||||||
{
|
{
|
||||||
struct path path;
|
struct path path;
|
||||||
int err = kern_path(mnt, 0, &path);
|
int err = kern_path(mnt, 0, &path);
|
||||||
@@ -379,21 +518,26 @@ static void try_umount(const char *mnt)
|
|||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
|
|
||||||
// we are only interest in some specific mounts
|
if (path.dentry != path.mnt->mnt_root) {
|
||||||
if (!should_umount(&path)) {
|
// it is not root mountpoint, maybe umounted by others already.
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
|
|
||||||
#if LINUX_VERSION_CODE >= KERNEL_VERSION(5, 9, 0)
|
// we are only interest in some specific mounts
|
||||||
err = path_umount(&path, 0);
|
if (check_mnt && !should_umount(&path)) {
|
||||||
if (err) {
|
return;
|
||||||
pr_info("umount %s failed: %d\n", mnt, err);
|
|
||||||
}
|
}
|
||||||
#endif
|
|
||||||
|
ksu_umount_mnt(&path, flags);
|
||||||
}
|
}
|
||||||
|
|
||||||
int ksu_handle_setuid(struct cred *new, const struct cred *old)
|
int ksu_handle_setuid(struct cred *new, const struct cred *old)
|
||||||
{
|
{
|
||||||
|
// this hook is used for umounting overlayfs for some uid, if there isn't any module mounted, just ignore it!
|
||||||
|
if (!ksu_module_mounted) {
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
if (!new || !old) {
|
if (!new || !old) {
|
||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
@@ -406,10 +550,8 @@ int ksu_handle_setuid(struct cred *new, const struct cred *old)
|
|||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
// todo: check old process's selinux context, if it is not zygote, ignore it!
|
if (!is_appuid(new_uid) || is_isolated_uid(new_uid.val)) {
|
||||||
|
// pr_info("handle setuid ignore non application or isolated uid: %d\n", new_uid.val);
|
||||||
if (!is_appuid(new_uid)) {
|
|
||||||
// pr_info("handle setuid ignore non application uid: %d\n", new_uid.val);
|
|
||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -418,14 +560,37 @@ int ksu_handle_setuid(struct cred *new, const struct cred *old)
|
|||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
if (!ksu_uid_should_umount(new_uid.val)) {
|
||||||
|
return 0;
|
||||||
|
} else {
|
||||||
|
#ifdef CONFIG_KSU_DEBUG
|
||||||
|
pr_info("uid: %d should not umount!\n", current_uid().val);
|
||||||
|
#endif
|
||||||
|
}
|
||||||
|
|
||||||
|
// check old process's selinux context, if it is not zygote, ignore it!
|
||||||
|
// because some su apps may setuid to untrusted_app but they are in global mount namespace
|
||||||
|
// when we umount for such process, that is a disaster!
|
||||||
|
bool is_zygote_child = is_zygote(old->security);
|
||||||
|
if (!is_zygote_child) {
|
||||||
|
pr_info("handle umount ignore non zygote child: %d\n",
|
||||||
|
current->pid);
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
// umount the target mnt
|
// umount the target mnt
|
||||||
pr_info("handle umount for uid: %d\n", new_uid.val);
|
pr_info("handle umount for uid: %d, pid: %d\n", new_uid.val,
|
||||||
|
current->pid);
|
||||||
|
|
||||||
// fixme: use `collect_mounts` and `iterate_mount` to iterate all mountpoint and
|
// fixme: use `collect_mounts` and `iterate_mount` to iterate all mountpoint and
|
||||||
// filter the mountpoint whose target is `/data/adb`
|
// filter the mountpoint whose target is `/data/adb`
|
||||||
try_umount("/system");
|
try_umount("/system", true, 0);
|
||||||
try_umount("/vendor");
|
try_umount("/vendor", true, 0);
|
||||||
try_umount("/product");
|
try_umount("/product", true, 0);
|
||||||
|
try_umount("/data/adb/modules", false, MNT_DETACH);
|
||||||
|
|
||||||
|
// try umount ksu temp path
|
||||||
|
try_umount("/debug_ramdisk", false, MNT_DETACH);
|
||||||
|
try_umount("/sbin", false, MNT_DETACH);
|
||||||
|
|
||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
@@ -442,7 +607,14 @@ static int handler_pre(struct kprobe *p, struct pt_regs *regs)
|
|||||||
int option = (int)PT_REGS_PARM1(real_regs);
|
int option = (int)PT_REGS_PARM1(real_regs);
|
||||||
unsigned long arg2 = (unsigned long)PT_REGS_PARM2(real_regs);
|
unsigned long arg2 = (unsigned long)PT_REGS_PARM2(real_regs);
|
||||||
unsigned long arg3 = (unsigned long)PT_REGS_PARM3(real_regs);
|
unsigned long arg3 = (unsigned long)PT_REGS_PARM3(real_regs);
|
||||||
unsigned long arg4 = (unsigned long)PT_REGS_PARM4(real_regs);
|
#if LINUX_VERSION_CODE >= KERNEL_VERSION(4, 16, 0)
|
||||||
|
// PRCTL_SYMBOL is the arch-specificed one, which receive raw pt_regs from syscall
|
||||||
|
unsigned long arg4 = (unsigned long)PT_REGS_SYSCALL_PARM4(real_regs);
|
||||||
|
#else
|
||||||
|
// PRCTL_SYMBOL is the common one, called by C convention in do_syscall_64
|
||||||
|
// https://elixir.bootlin.com/linux/v4.15.18/source/arch/x86/entry/common.c#L287
|
||||||
|
unsigned long arg4 = (unsigned long)PT_REGS_CCALL_PARM4(real_regs);
|
||||||
|
#endif
|
||||||
unsigned long arg5 = (unsigned long)PT_REGS_PARM5(real_regs);
|
unsigned long arg5 = (unsigned long)PT_REGS_PARM5(real_regs);
|
||||||
|
|
||||||
return ksu_handle_prctl(option, arg2, arg3, arg4, arg5);
|
return ksu_handle_prctl(option, arg2, arg3, arg4, arg5);
|
||||||
@@ -462,7 +634,7 @@ static int renameat_handler_pre(struct kprobe *p, struct pt_regs *regs)
|
|||||||
struct dentry *new_entry = rd->new_dentry;
|
struct dentry *new_entry = rd->new_dentry;
|
||||||
#else
|
#else
|
||||||
struct dentry *old_entry = (struct dentry *)PT_REGS_PARM2(regs);
|
struct dentry *old_entry = (struct dentry *)PT_REGS_PARM2(regs);
|
||||||
struct dentry *new_entry = (struct dentry *)PT_REGS_PARM4(regs);
|
struct dentry *new_entry = (struct dentry *)PT_REGS_CCALL_PARM4(regs);
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
return ksu_handle_rename(old_entry, new_entry);
|
return ksu_handle_rename(old_entry, new_entry);
|
||||||
@@ -515,7 +687,7 @@ static int ksu_key_permission(key_ref_t key_ref, const struct cred *cred,
|
|||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
init_session_keyring = cred->session_keyring;
|
init_session_keyring = cred->session_keyring;
|
||||||
pr_info("kernel_compat: got init_session_keyring");
|
pr_info("kernel_compat: got init_session_keyring\n");
|
||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
#endif
|
#endif
|
||||||
|
|||||||
@@ -2,4 +2,4 @@
|
|||||||
// This file will be regenerated by CI
|
// This file will be regenerated by CI
|
||||||
|
|
||||||
unsigned int ksud_size = 0;
|
unsigned int ksud_size = 0;
|
||||||
const char ksud[0] = {};
|
const char ksud[0] = {};
|
||||||
|
|||||||
@@ -1,2 +1,2 @@
|
|||||||
register_kprobe
|
register_kprobe
|
||||||
unregister_kprobe
|
unregister_kprobe
|
||||||
|
|||||||
@@ -1,34 +1,178 @@
|
|||||||
#include "linux/version.h"
|
#include "linux/version.h"
|
||||||
#include "linux/fs.h"
|
#include "linux/fs.h"
|
||||||
|
#include "linux/nsproxy.h"
|
||||||
|
#if LINUX_VERSION_CODE >= KERNEL_VERSION(4, 10, 0)
|
||||||
|
#include "linux/sched/task.h"
|
||||||
|
#include "linux/uaccess.h"
|
||||||
|
#elif LINUX_VERSION_CODE >= KERNEL_VERSION(4, 4, 0)
|
||||||
|
#include "linux/uaccess.h"
|
||||||
|
#include "linux/sched.h"
|
||||||
|
#else
|
||||||
|
#include "linux/sched.h"
|
||||||
|
#endif
|
||||||
|
#include "klog.h" // IWYU pragma: keep
|
||||||
|
|
||||||
#if LINUX_VERSION_CODE < KERNEL_VERSION(4, 10, 0)
|
#if LINUX_VERSION_CODE < KERNEL_VERSION(4, 10, 0)
|
||||||
#include "linux/key.h"
|
#include "linux/key.h"
|
||||||
#include "linux/errno.h"
|
#include "linux/errno.h"
|
||||||
|
#include "linux/cred.h"
|
||||||
struct key *init_session_keyring = NULL;
|
struct key *init_session_keyring = NULL;
|
||||||
|
|
||||||
|
static inline int install_session_keyring(struct key *keyring)
|
||||||
|
{
|
||||||
|
struct cred *new;
|
||||||
|
int ret;
|
||||||
|
|
||||||
|
new = prepare_creds();
|
||||||
|
if (!new)
|
||||||
|
return -ENOMEM;
|
||||||
|
|
||||||
|
ret = install_session_keyring_to_cred(new, keyring);
|
||||||
|
if (ret < 0) {
|
||||||
|
abort_creds(new);
|
||||||
|
return ret;
|
||||||
|
}
|
||||||
|
|
||||||
|
return commit_creds(new);
|
||||||
|
}
|
||||||
#endif
|
#endif
|
||||||
ssize_t ksu_kernel_read_compat(struct file *p, void *buf, size_t count, loff_t *pos){
|
|
||||||
|
extern struct task_struct init_task;
|
||||||
|
|
||||||
|
// mnt_ns context switch for environment that android_init->nsproxy->mnt_ns != init_task.nsproxy->mnt_ns, such as WSA
|
||||||
|
struct ksu_ns_fs_saved {
|
||||||
|
struct nsproxy *ns;
|
||||||
|
struct fs_struct *fs;
|
||||||
|
};
|
||||||
|
|
||||||
|
static void ksu_save_ns_fs(struct ksu_ns_fs_saved *ns_fs_saved)
|
||||||
|
{
|
||||||
|
ns_fs_saved->ns = current->nsproxy;
|
||||||
|
ns_fs_saved->fs = current->fs;
|
||||||
|
}
|
||||||
|
|
||||||
|
static void ksu_load_ns_fs(struct ksu_ns_fs_saved *ns_fs_saved)
|
||||||
|
{
|
||||||
|
current->nsproxy = ns_fs_saved->ns;
|
||||||
|
current->fs = ns_fs_saved->fs;
|
||||||
|
}
|
||||||
|
|
||||||
|
static bool android_context_saved_checked = false;
|
||||||
|
static bool android_context_saved_enabled = false;
|
||||||
|
static struct ksu_ns_fs_saved android_context_saved;
|
||||||
|
|
||||||
|
void ksu_android_ns_fs_check()
|
||||||
|
{
|
||||||
|
if (android_context_saved_checked)
|
||||||
|
return;
|
||||||
|
android_context_saved_checked = true;
|
||||||
|
task_lock(current);
|
||||||
|
if (current->nsproxy && current->fs &&
|
||||||
|
current->nsproxy->mnt_ns != init_task.nsproxy->mnt_ns) {
|
||||||
|
android_context_saved_enabled = true;
|
||||||
|
pr_info("android context saved enabled due to init mnt_ns(%p) != android mnt_ns(%p)\n",
|
||||||
|
current->nsproxy->mnt_ns, init_task.nsproxy->mnt_ns);
|
||||||
|
ksu_save_ns_fs(&android_context_saved);
|
||||||
|
} else {
|
||||||
|
pr_info("android context saved disabled\n");
|
||||||
|
}
|
||||||
|
task_unlock(current);
|
||||||
|
}
|
||||||
|
|
||||||
|
struct file *ksu_filp_open_compat(const char *filename, int flags, umode_t mode)
|
||||||
|
{
|
||||||
|
#if LINUX_VERSION_CODE < KERNEL_VERSION(4, 10, 0)
|
||||||
|
if (init_session_keyring != NULL && !current_cred()->session_keyring &&
|
||||||
|
(current->flags & PF_WQ_WORKER)) {
|
||||||
|
pr_info("installing init session keyring for older kernel\n");
|
||||||
|
install_session_keyring(init_session_keyring);
|
||||||
|
}
|
||||||
|
#endif
|
||||||
|
// switch mnt_ns even if current is not wq_worker, to ensure what we open is the correct file in android mnt_ns, rather than user created mnt_ns
|
||||||
|
struct ksu_ns_fs_saved saved;
|
||||||
|
if (android_context_saved_enabled) {
|
||||||
|
pr_info("start switch current nsproxy and fs to android context\n");
|
||||||
|
task_lock(current);
|
||||||
|
ksu_save_ns_fs(&saved);
|
||||||
|
ksu_load_ns_fs(&android_context_saved);
|
||||||
|
task_unlock(current);
|
||||||
|
}
|
||||||
|
struct file *fp = filp_open(filename, flags, mode);
|
||||||
|
if (android_context_saved_enabled) {
|
||||||
|
task_lock(current);
|
||||||
|
ksu_load_ns_fs(&saved);
|
||||||
|
task_unlock(current);
|
||||||
|
pr_info("switch current nsproxy and fs back to saved successfully\n");
|
||||||
|
}
|
||||||
|
return fp;
|
||||||
|
}
|
||||||
|
|
||||||
|
ssize_t ksu_kernel_read_compat(struct file *p, void *buf, size_t count,
|
||||||
|
loff_t *pos)
|
||||||
|
{
|
||||||
#if LINUX_VERSION_CODE >= KERNEL_VERSION(4, 14, 0)
|
#if LINUX_VERSION_CODE >= KERNEL_VERSION(4, 14, 0)
|
||||||
return kernel_read(p, buf, count, pos);
|
return kernel_read(p, buf, count, pos);
|
||||||
#else
|
#else
|
||||||
loff_t offset = pos ? *pos : 0;
|
loff_t offset = pos ? *pos : 0;
|
||||||
ssize_t result = kernel_read(p, offset, (char *)buf, count);
|
ssize_t result = kernel_read(p, offset, (char *)buf, count);
|
||||||
if (pos && result > 0)
|
if (pos && result > 0) {
|
||||||
{
|
*pos = offset + result;
|
||||||
*pos = offset + result;
|
}
|
||||||
}
|
return result;
|
||||||
return result;
|
|
||||||
#endif
|
#endif
|
||||||
}
|
}
|
||||||
|
|
||||||
ssize_t ksu_kernel_write_compat(struct file *p, const void *buf, size_t count, loff_t *pos){
|
ssize_t ksu_kernel_write_compat(struct file *p, const void *buf, size_t count,
|
||||||
|
loff_t *pos)
|
||||||
|
{
|
||||||
#if LINUX_VERSION_CODE >= KERNEL_VERSION(4, 14, 0)
|
#if LINUX_VERSION_CODE >= KERNEL_VERSION(4, 14, 0)
|
||||||
return kernel_write(p, buf, count, pos);
|
return kernel_write(p, buf, count, pos);
|
||||||
#else
|
#else
|
||||||
loff_t offset = pos ? *pos : 0;
|
loff_t offset = pos ? *pos : 0;
|
||||||
ssize_t result = kernel_write(p, buf, count, offset);
|
ssize_t result = kernel_write(p, buf, count, offset);
|
||||||
if (pos && result > 0)
|
if (pos && result > 0) {
|
||||||
{
|
*pos = offset + result;
|
||||||
*pos = offset + result;
|
}
|
||||||
}
|
return result;
|
||||||
return result;
|
#endif
|
||||||
|
}
|
||||||
|
|
||||||
|
#if LINUX_VERSION_CODE >= KERNEL_VERSION(5, 8, 0)
|
||||||
|
long ksu_strncpy_from_user_nofault(char *dst, const void __user *unsafe_addr,
|
||||||
|
long count)
|
||||||
|
{
|
||||||
|
return strncpy_from_user_nofault(dst, unsafe_addr, count);
|
||||||
|
}
|
||||||
|
#elif LINUX_VERSION_CODE >= KERNEL_VERSION(5, 3, 0)
|
||||||
|
long ksu_strncpy_from_user_nofault(char *dst, const void __user *unsafe_addr,
|
||||||
|
long count)
|
||||||
|
{
|
||||||
|
return strncpy_from_unsafe_user(dst, unsafe_addr, count);
|
||||||
|
}
|
||||||
|
#else
|
||||||
|
// Copied from: https://elixir.bootlin.com/linux/v4.9.337/source/mm/maccess.c#L201
|
||||||
|
long ksu_strncpy_from_user_nofault(char *dst, const void __user *unsafe_addr,
|
||||||
|
long count)
|
||||||
|
{
|
||||||
|
mm_segment_t old_fs = get_fs();
|
||||||
|
long ret;
|
||||||
|
|
||||||
|
if (unlikely(count <= 0))
|
||||||
|
return 0;
|
||||||
|
|
||||||
|
set_fs(USER_DS);
|
||||||
|
pagefault_disable();
|
||||||
|
ret = strncpy_from_user(dst, unsafe_addr, count);
|
||||||
|
pagefault_enable();
|
||||||
|
set_fs(old_fs);
|
||||||
|
|
||||||
|
if (ret >= count) {
|
||||||
|
ret = count;
|
||||||
|
dst[ret - 1] = '\0';
|
||||||
|
} else if (ret > 0) {
|
||||||
|
ret++;
|
||||||
|
}
|
||||||
|
|
||||||
|
return ret;
|
||||||
|
}
|
||||||
#endif
|
#endif
|
||||||
}
|
|
||||||
@@ -5,38 +5,20 @@
|
|||||||
#include "linux/key.h"
|
#include "linux/key.h"
|
||||||
#include "linux/version.h"
|
#include "linux/version.h"
|
||||||
|
|
||||||
extern struct key *init_session_keyring;
|
extern long ksu_strncpy_from_user_nofault(char *dst,
|
||||||
|
const void __user *unsafe_addr,
|
||||||
extern ssize_t ksu_kernel_read_compat(struct file *p, void *buf, size_t count, loff_t *pos);
|
long count);
|
||||||
extern ssize_t ksu_kernel_write_compat(struct file *p, const void *buf, size_t count, loff_t *pos);
|
|
||||||
|
|
||||||
#if LINUX_VERSION_CODE < KERNEL_VERSION(4, 10, 0)
|
#if LINUX_VERSION_CODE < KERNEL_VERSION(4, 10, 0)
|
||||||
static inline int install_session_keyring(struct key *keyring)
|
extern struct key *init_session_keyring;
|
||||||
{
|
|
||||||
struct cred *new;
|
|
||||||
int ret;
|
|
||||||
|
|
||||||
new = prepare_creds();
|
|
||||||
if (!new)
|
|
||||||
return -ENOMEM;
|
|
||||||
|
|
||||||
ret = install_session_keyring_to_cred(new, keyring);
|
|
||||||
if (ret < 0) {
|
|
||||||
abort_creds(new);
|
|
||||||
return ret;
|
|
||||||
}
|
|
||||||
|
|
||||||
return commit_creds(new);
|
|
||||||
}
|
|
||||||
#define KWORKER_INSTALL_KEYRING() \
|
|
||||||
static bool keyring_installed = false; \
|
|
||||||
if (init_session_keyring != NULL && !keyring_installed) \
|
|
||||||
{ \
|
|
||||||
install_session_keyring(init_session_keyring); \
|
|
||||||
keyring_installed = true; \
|
|
||||||
}
|
|
||||||
#else
|
|
||||||
#define KWORKER_INSTALL_KEYRING()
|
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
#endif
|
extern void ksu_android_ns_fs_check();
|
||||||
|
extern struct file *ksu_filp_open_compat(const char *filename, int flags,
|
||||||
|
umode_t mode);
|
||||||
|
extern ssize_t ksu_kernel_read_compat(struct file *p, void *buf, size_t count,
|
||||||
|
loff_t *pos);
|
||||||
|
extern ssize_t ksu_kernel_write_compat(struct file *p, const void *buf,
|
||||||
|
size_t count, loff_t *pos);
|
||||||
|
|
||||||
|
#endif
|
||||||
|
|||||||
@@ -8,4 +8,4 @@
|
|||||||
#define pr_fmt(fmt) "KernelSU: " fmt
|
#define pr_fmt(fmt) "KernelSU: " fmt
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
#endif
|
#endif
|
||||||
|
|||||||
@@ -39,7 +39,7 @@ int __init kernelsu_init(void)
|
|||||||
pr_alert("*************************************************************");
|
pr_alert("*************************************************************");
|
||||||
pr_alert("** NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE **");
|
pr_alert("** NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE **");
|
||||||
pr_alert("** **");
|
pr_alert("** **");
|
||||||
pr_alert("** You are running DEBUG version of KernelSU **");
|
pr_alert("** You are running KernelSU in DEBUG mode **");
|
||||||
pr_alert("** **");
|
pr_alert("** **");
|
||||||
pr_alert("** NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE **");
|
pr_alert("** NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE **");
|
||||||
pr_alert("*************************************************************");
|
pr_alert("*************************************************************");
|
||||||
@@ -47,7 +47,7 @@ int __init kernelsu_init(void)
|
|||||||
|
|
||||||
ksu_core_init();
|
ksu_core_init();
|
||||||
|
|
||||||
ksu_workqueue = alloc_workqueue("kernelsu_work_queue", 0, 0);
|
ksu_workqueue = alloc_ordered_workqueue("kernelsu_work_queue", 0);
|
||||||
|
|
||||||
ksu_allowlist_init();
|
ksu_allowlist_init();
|
||||||
|
|
||||||
@@ -57,7 +57,7 @@ int __init kernelsu_init(void)
|
|||||||
ksu_enable_sucompat();
|
ksu_enable_sucompat();
|
||||||
ksu_enable_ksud();
|
ksu_enable_ksud();
|
||||||
#else
|
#else
|
||||||
#warning("KPROBES is disabled, KernelSU may not work, please check https://kernelsu.org/guide/how-to-integrate-for-non-gki.html")
|
pr_alert("KPROBES is disabled, KernelSU may not work, please check https://kernelsu.org/guide/how-to-integrate-for-non-gki.html");
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
return 0;
|
return 0;
|
||||||
|
|||||||
68
kernel/ksu.h
68
kernel/ksu.h
@@ -1,15 +1,10 @@
|
|||||||
#ifndef __KSU_H_KSU
|
#ifndef __KSU_H_KSU
|
||||||
#define __KSU_H_KSU
|
#define __KSU_H_KSU
|
||||||
|
|
||||||
|
#include "linux/types.h"
|
||||||
#include "linux/workqueue.h"
|
#include "linux/workqueue.h"
|
||||||
|
|
||||||
#ifndef KSU_GIT_VERSION
|
#define KERNEL_SU_VERSION KSU_VERSION
|
||||||
#warning "KSU_GIT_VERSION not defined! It is better to make KernelSU a git submodule!"
|
|
||||||
#define KERNEL_SU_VERSION (16)
|
|
||||||
#else
|
|
||||||
#define KERNEL_SU_VERSION (10000 + KSU_GIT_VERSION + 200) // major * 10000 + git version + 200 for historical reasons
|
|
||||||
#endif
|
|
||||||
|
|
||||||
#define KERNEL_SU_OPTION 0xDEADBEEF
|
#define KERNEL_SU_OPTION 0xDEADBEEF
|
||||||
|
|
||||||
#define CMD_GRANT_ROOT 0
|
#define CMD_GRANT_ROOT 0
|
||||||
@@ -22,9 +17,68 @@
|
|||||||
#define CMD_REPORT_EVENT 7
|
#define CMD_REPORT_EVENT 7
|
||||||
#define CMD_SET_SEPOLICY 8
|
#define CMD_SET_SEPOLICY 8
|
||||||
#define CMD_CHECK_SAFEMODE 9
|
#define CMD_CHECK_SAFEMODE 9
|
||||||
|
#define CMD_GET_APP_PROFILE 10
|
||||||
|
#define CMD_SET_APP_PROFILE 11
|
||||||
|
#define CMD_UID_GRANTED_ROOT 12
|
||||||
|
#define CMD_UID_SHOULD_UMOUNT 13
|
||||||
|
|
||||||
#define EVENT_POST_FS_DATA 1
|
#define EVENT_POST_FS_DATA 1
|
||||||
#define EVENT_BOOT_COMPLETED 2
|
#define EVENT_BOOT_COMPLETED 2
|
||||||
|
#define EVENT_MODULE_MOUNTED 3
|
||||||
|
|
||||||
|
#define KSU_APP_PROFILE_VER 2
|
||||||
|
#define KSU_MAX_PACKAGE_NAME 256
|
||||||
|
// NGROUPS_MAX for Linux is 65535 generally, but we only supports 32 groups.
|
||||||
|
#define KSU_MAX_GROUPS 32
|
||||||
|
#define KSU_SELINUX_DOMAIN 64
|
||||||
|
|
||||||
|
struct root_profile {
|
||||||
|
int32_t uid;
|
||||||
|
int32_t gid;
|
||||||
|
|
||||||
|
int32_t groups_count;
|
||||||
|
int32_t groups[KSU_MAX_GROUPS];
|
||||||
|
|
||||||
|
// kernel_cap_t is u32[2] for capabilities v3
|
||||||
|
struct {
|
||||||
|
u64 effective;
|
||||||
|
u64 permitted;
|
||||||
|
u64 inheritable;
|
||||||
|
} capabilities;
|
||||||
|
|
||||||
|
char selinux_domain[KSU_SELINUX_DOMAIN];
|
||||||
|
|
||||||
|
int32_t namespaces;
|
||||||
|
};
|
||||||
|
|
||||||
|
struct non_root_profile {
|
||||||
|
bool umount_modules;
|
||||||
|
};
|
||||||
|
|
||||||
|
struct app_profile {
|
||||||
|
// It may be utilized for backward compatibility, although we have never explicitly made any promises regarding this.
|
||||||
|
u32 version;
|
||||||
|
|
||||||
|
// this is usually the package of the app, but can be other value for special apps
|
||||||
|
char key[KSU_MAX_PACKAGE_NAME];
|
||||||
|
int32_t current_uid;
|
||||||
|
bool allow_su;
|
||||||
|
|
||||||
|
union {
|
||||||
|
struct {
|
||||||
|
bool use_default;
|
||||||
|
char template_name[KSU_MAX_PACKAGE_NAME];
|
||||||
|
|
||||||
|
struct root_profile profile;
|
||||||
|
} rp_config;
|
||||||
|
|
||||||
|
struct {
|
||||||
|
bool use_default;
|
||||||
|
|
||||||
|
struct non_root_profile profile;
|
||||||
|
} nrp_config;
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
bool ksu_queue_work(struct work_struct *work);
|
bool ksu_queue_work(struct work_struct *work);
|
||||||
|
|
||||||
|
|||||||
152
kernel/ksud.c
152
kernel/ksud.c
@@ -1,6 +1,5 @@
|
|||||||
#include "asm/current.h"
|
#include "asm/current.h"
|
||||||
#include "linux/string.h"
|
#include "linux/compat.h"
|
||||||
#include "linux/cred.h"
|
|
||||||
#include "linux/dcache.h"
|
#include "linux/dcache.h"
|
||||||
#include "linux/err.h"
|
#include "linux/err.h"
|
||||||
#include "linux/fs.h"
|
#include "linux/fs.h"
|
||||||
@@ -11,12 +10,12 @@
|
|||||||
#include "linux/uaccess.h"
|
#include "linux/uaccess.h"
|
||||||
#include "linux/version.h"
|
#include "linux/version.h"
|
||||||
#include "linux/workqueue.h"
|
#include "linux/workqueue.h"
|
||||||
#include "linux/input.h"
|
|
||||||
|
|
||||||
#include "allowlist.h"
|
#include "allowlist.h"
|
||||||
#include "arch.h"
|
#include "arch.h"
|
||||||
#include "klog.h" // IWYU pragma: keep
|
#include "klog.h" // IWYU pragma: keep
|
||||||
#include "ksud.h"
|
#include "ksud.h"
|
||||||
|
#include "kernel_compat.h"
|
||||||
#include "selinux/selinux.h"
|
#include "selinux/selinux.h"
|
||||||
|
|
||||||
static const char KERNEL_SU_RC[] =
|
static const char KERNEL_SU_RC[] =
|
||||||
@@ -51,20 +50,20 @@ static struct work_struct stop_vfs_read_work;
|
|||||||
static struct work_struct stop_execve_hook_work;
|
static struct work_struct stop_execve_hook_work;
|
||||||
static struct work_struct stop_input_hook_work;
|
static struct work_struct stop_input_hook_work;
|
||||||
#else
|
#else
|
||||||
static bool vfs_read_hook = true;
|
bool ksu_vfs_read_hook __read_mostly = true;
|
||||||
static bool execveat_hook = true;
|
bool ksu_execveat_hook __read_mostly = true;
|
||||||
static bool input_hook = true;
|
bool ksu_input_hook __read_mostly = true;
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
void on_post_fs_data(void)
|
void on_post_fs_data(void)
|
||||||
{
|
{
|
||||||
static bool done = false;
|
static bool done = false;
|
||||||
if (done) {
|
if (done) {
|
||||||
pr_info("on_post_fs_data already done");
|
pr_info("on_post_fs_data already done\n");
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
done = true;
|
done = true;
|
||||||
pr_info("on_post_fs_data!");
|
pr_info("on_post_fs_data!\n");
|
||||||
ksu_load_allow_list();
|
ksu_load_allow_list();
|
||||||
// sanity check, this may influence the performance
|
// sanity check, this may influence the performance
|
||||||
stop_input_hook();
|
stop_input_hook();
|
||||||
@@ -107,7 +106,13 @@ static const char __user *get_user_arg_ptr(struct user_arg_ptr argv, int nr)
|
|||||||
/*
|
/*
|
||||||
* count() counts the number of strings in array ARGV.
|
* count() counts the number of strings in array ARGV.
|
||||||
*/
|
*/
|
||||||
static int count(struct user_arg_ptr argv, int max)
|
|
||||||
|
/*
|
||||||
|
* Make sure old GCC compiler can use __maybe_unused,
|
||||||
|
* Test passed in 4.4.x ~ 4.9.x when use GCC.
|
||||||
|
*/
|
||||||
|
|
||||||
|
static int __maybe_unused count(struct user_arg_ptr argv, int max)
|
||||||
{
|
{
|
||||||
int i = 0;
|
int i = 0;
|
||||||
|
|
||||||
@@ -133,11 +138,12 @@ static int count(struct user_arg_ptr argv, int max)
|
|||||||
return i;
|
return i;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// IMPORTANT NOTE: the call from execve_handler_pre WON'T provided correct value for envp and flags in GKI version
|
||||||
int ksu_handle_execveat_ksud(int *fd, struct filename **filename_ptr,
|
int ksu_handle_execveat_ksud(int *fd, struct filename **filename_ptr,
|
||||||
void *argv, void *envp, int *flags)
|
struct user_arg_ptr *argv, struct user_arg_ptr *envp, int *flags)
|
||||||
{
|
{
|
||||||
#ifndef CONFIG_KPROBES
|
#ifndef CONFIG_KPROBES
|
||||||
if (!execveat_hook) {
|
if (!ksu_execveat_hook) {
|
||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
#endif
|
#endif
|
||||||
@@ -145,7 +151,11 @@ int ksu_handle_execveat_ksud(int *fd, struct filename **filename_ptr,
|
|||||||
|
|
||||||
static const char app_process[] = "/system/bin/app_process";
|
static const char app_process[] = "/system/bin/app_process";
|
||||||
static bool first_app_process = true;
|
static bool first_app_process = true;
|
||||||
|
|
||||||
|
/* This applies to versions Android 10+ */
|
||||||
static const char system_bin_init[] = "/system/bin/init";
|
static const char system_bin_init[] = "/system/bin/init";
|
||||||
|
/* This applies to versions between Android 6 ~ 9 */
|
||||||
|
static const char old_system_init[] = "/init";
|
||||||
static bool init_second_stage_executed = false;
|
static bool init_second_stage_executed = false;
|
||||||
|
|
||||||
if (!filename_ptr)
|
if (!filename_ptr)
|
||||||
@@ -156,37 +166,84 @@ int ksu_handle_execveat_ksud(int *fd, struct filename **filename_ptr,
|
|||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
if (!memcmp(filename->name, system_bin_init,
|
if (unlikely(!memcmp(filename->name, system_bin_init,
|
||||||
sizeof(system_bin_init) - 1)) {
|
sizeof(system_bin_init) - 1) && argv)) {
|
||||||
// /system/bin/init executed
|
// /system/bin/init executed
|
||||||
struct user_arg_ptr *ptr = (struct user_arg_ptr*) argv;
|
int argc = count(*argv, MAX_ARG_STRINGS);
|
||||||
int argc = count(*ptr, MAX_ARG_STRINGS);
|
|
||||||
pr_info("/system/bin/init argc: %d\n", argc);
|
pr_info("/system/bin/init argc: %d\n", argc);
|
||||||
if (argc > 1 && !init_second_stage_executed) {
|
if (argc > 1 && !init_second_stage_executed) {
|
||||||
const char __user *p = get_user_arg_ptr(*ptr, 1);
|
const char __user *p = get_user_arg_ptr(*argv, 1);
|
||||||
if (p && !IS_ERR(p)) {
|
if (p && !IS_ERR(p)) {
|
||||||
char first_arg[16];
|
char first_arg[16];
|
||||||
#if LINUX_VERSION_CODE >= KERNEL_VERSION(5, 8, 0)
|
ksu_strncpy_from_user_nofault(first_arg, p, sizeof(first_arg));
|
||||||
strncpy_from_user_nofault(first_arg, p, sizeof(first_arg));
|
pr_info("/system/bin/init first arg: %s\n", first_arg);
|
||||||
#elif LINUX_VERSION_CODE >= KERNEL_VERSION(5, 3, 0)
|
|
||||||
strncpy_from_unsafe_user(first_arg, p, sizeof(first_arg));
|
|
||||||
#else
|
|
||||||
strncpy_from_user(first_arg, p, sizeof(first_arg));
|
|
||||||
#endif
|
|
||||||
pr_info("first arg: %s\n", first_arg);
|
|
||||||
if (!strcmp(first_arg, "second_stage")) {
|
if (!strcmp(first_arg, "second_stage")) {
|
||||||
pr_info("/system/bin/init second_stage executed\n");
|
pr_info("/system/bin/init second_stage executed\n");
|
||||||
apply_kernelsu_rules();
|
apply_kernelsu_rules();
|
||||||
init_second_stage_executed = true;
|
init_second_stage_executed = true;
|
||||||
|
ksu_android_ns_fs_check();
|
||||||
}
|
}
|
||||||
} else {
|
} else {
|
||||||
pr_err("/system/bin/init parse args err!\n");
|
pr_err("/system/bin/init parse args err!\n");
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
} else if (unlikely(!memcmp(filename->name, old_system_init,
|
||||||
|
sizeof(old_system_init) - 1) && argv)) {
|
||||||
|
// /init executed
|
||||||
|
int argc = count(*argv, MAX_ARG_STRINGS);
|
||||||
|
pr_info("/init argc: %d\n", argc);
|
||||||
|
if (argc > 1 && !init_second_stage_executed) {
|
||||||
|
/* This applies to versions between Android 6 ~ 7 */
|
||||||
|
const char __user *p = get_user_arg_ptr(*argv, 1);
|
||||||
|
if (p && !IS_ERR(p)) {
|
||||||
|
char first_arg[16];
|
||||||
|
ksu_strncpy_from_user_nofault(first_arg, p, sizeof(first_arg));
|
||||||
|
pr_info("/init first arg: %s\n", first_arg);
|
||||||
|
if (!strcmp(first_arg, "--second-stage")) {
|
||||||
|
pr_info("/init second_stage executed\n");
|
||||||
|
apply_kernelsu_rules();
|
||||||
|
init_second_stage_executed = true;
|
||||||
|
ksu_android_ns_fs_check();
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
pr_err("/init parse args err!\n");
|
||||||
|
}
|
||||||
|
} else if (argc == 1 && !init_second_stage_executed && envp) {
|
||||||
|
/* This applies to versions between Android 8 ~ 9 */
|
||||||
|
int envc = count(*envp, MAX_ARG_STRINGS);
|
||||||
|
if (envc > 0) {
|
||||||
|
int n;
|
||||||
|
for (n = 1; n <= envc; n++) {
|
||||||
|
const char __user *p = get_user_arg_ptr(*envp, n);
|
||||||
|
if (!p || IS_ERR(p)) {
|
||||||
|
continue;
|
||||||
|
}
|
||||||
|
char env[256];
|
||||||
|
// Reading environment variable strings from user space
|
||||||
|
if (ksu_strncpy_from_user_nofault(env, p, sizeof(env)) < 0)
|
||||||
|
continue;
|
||||||
|
// Parsing environment variable names and values
|
||||||
|
char *env_name = env;
|
||||||
|
char *env_value = strchr(env, '=');
|
||||||
|
if (env_value == NULL)
|
||||||
|
continue;
|
||||||
|
// Replace equal sign with string terminator
|
||||||
|
*env_value = '\0';
|
||||||
|
env_value++;
|
||||||
|
// Check if the environment variable name and value are matching
|
||||||
|
if (!strcmp(env_name, "INIT_SECOND_STAGE") && (!strcmp(env_value, "1") || !strcmp(env_value, "true"))) {
|
||||||
|
pr_info("/init second_stage executed\n");
|
||||||
|
apply_kernelsu_rules();
|
||||||
|
init_second_stage_executed = true;
|
||||||
|
ksu_android_ns_fs_check();
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
if (first_app_process &&
|
if (unlikely(first_app_process &&
|
||||||
!memcmp(filename->name, app_process, sizeof(app_process) - 1)) {
|
!memcmp(filename->name, app_process, sizeof(app_process) - 1))) {
|
||||||
first_app_process = false;
|
first_app_process = false;
|
||||||
pr_info("exec app_process, /data prepared, second_stage: %d\n", init_second_stage_executed);
|
pr_info("exec app_process, /data prepared, second_stage: %d\n", init_second_stage_executed);
|
||||||
on_post_fs_data(); // we keep this for old ksud
|
on_post_fs_data(); // we keep this for old ksud
|
||||||
@@ -207,7 +264,7 @@ static ssize_t read_proxy(struct file *file, char __user *buf, size_t count,
|
|||||||
bool first_read = file->f_pos == 0;
|
bool first_read = file->f_pos == 0;
|
||||||
ssize_t ret = orig_read(file, buf, count, pos);
|
ssize_t ret = orig_read(file, buf, count, pos);
|
||||||
if (first_read) {
|
if (first_read) {
|
||||||
pr_info("read_proxy append %ld + %ld", ret, read_count_append);
|
pr_info("read_proxy append %ld + %ld\n", ret, read_count_append);
|
||||||
ret += read_count_append;
|
ret += read_count_append;
|
||||||
}
|
}
|
||||||
return ret;
|
return ret;
|
||||||
@@ -218,7 +275,7 @@ static ssize_t read_iter_proxy(struct kiocb *iocb, struct iov_iter *to)
|
|||||||
bool first_read = iocb->ki_pos == 0;
|
bool first_read = iocb->ki_pos == 0;
|
||||||
ssize_t ret = orig_read_iter(iocb, to);
|
ssize_t ret = orig_read_iter(iocb, to);
|
||||||
if (first_read) {
|
if (first_read) {
|
||||||
pr_info("read_iter_proxy append %ld + %ld", ret,
|
pr_info("read_iter_proxy append %ld + %ld\n", ret,
|
||||||
read_count_append);
|
read_count_append);
|
||||||
ret += read_count_append;
|
ret += read_count_append;
|
||||||
}
|
}
|
||||||
@@ -229,7 +286,7 @@ int ksu_handle_vfs_read(struct file **file_ptr, char __user **buf_ptr,
|
|||||||
size_t *count_ptr, loff_t **pos)
|
size_t *count_ptr, loff_t **pos)
|
||||||
{
|
{
|
||||||
#ifndef CONFIG_KPROBES
|
#ifndef CONFIG_KPROBES
|
||||||
if (!vfs_read_hook) {
|
if (!ksu_vfs_read_hook) {
|
||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
#endif
|
#endif
|
||||||
@@ -283,17 +340,17 @@ int ksu_handle_vfs_read(struct file **file_ptr, char __user **buf_ptr,
|
|||||||
|
|
||||||
size_t rc_count = strlen(KERNEL_SU_RC);
|
size_t rc_count = strlen(KERNEL_SU_RC);
|
||||||
|
|
||||||
pr_info("vfs_read: %s, comm: %s, count: %d, rc_count: %d\n", dpath,
|
pr_info("vfs_read: %s, comm: %s, count: %zu, rc_count: %zu\n", dpath,
|
||||||
current->comm, count, rc_count);
|
current->comm, count, rc_count);
|
||||||
|
|
||||||
if (count < rc_count) {
|
if (count < rc_count) {
|
||||||
pr_err("count: %d < rc_count: %d", count, rc_count);
|
pr_err("count: %zu < rc_count: %zu\n", count, rc_count);
|
||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
size_t ret = copy_to_user(buf, KERNEL_SU_RC, rc_count);
|
size_t ret = copy_to_user(buf, KERNEL_SU_RC, rc_count);
|
||||||
if (ret) {
|
if (ret) {
|
||||||
pr_err("copy ksud.rc failed: %d\n", ret);
|
pr_err("copy ksud.rc failed: %zu\n", ret);
|
||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -330,7 +387,7 @@ int ksu_handle_input_handle_event(unsigned int *type, unsigned int *code,
|
|||||||
int *value)
|
int *value)
|
||||||
{
|
{
|
||||||
#ifndef CONFIG_KPROBES
|
#ifndef CONFIG_KPROBES
|
||||||
if (!input_hook) {
|
if (!ksu_input_hook) {
|
||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
#endif
|
#endif
|
||||||
@@ -379,11 +436,19 @@ static int execve_handler_pre(struct kprobe *p, struct pt_regs *regs)
|
|||||||
int *fd = (int *)&PT_REGS_PARM1(regs);
|
int *fd = (int *)&PT_REGS_PARM1(regs);
|
||||||
struct filename **filename_ptr =
|
struct filename **filename_ptr =
|
||||||
(struct filename **)&PT_REGS_PARM2(regs);
|
(struct filename **)&PT_REGS_PARM2(regs);
|
||||||
void *argv = (void *)&PT_REGS_PARM3(regs);
|
struct user_arg_ptr argv;
|
||||||
void *envp = (void *)&PT_REGS_PARM4(regs);
|
#ifdef CONFIG_COMPAT
|
||||||
int *flags = (int *)&PT_REGS_PARM5(regs);
|
argv.is_compat = PT_REGS_PARM3(regs);
|
||||||
|
if (unlikely(argv.is_compat)) {
|
||||||
|
argv.ptr.compat = PT_REGS_CCALL_PARM4(regs);
|
||||||
|
} else {
|
||||||
|
argv.ptr.native = PT_REGS_CCALL_PARM4(regs);
|
||||||
|
}
|
||||||
|
#else
|
||||||
|
argv.ptr.native = PT_REGS_PARM3(regs);
|
||||||
|
#endif
|
||||||
|
|
||||||
return ksu_handle_execveat_ksud(fd, filename_ptr, argv, envp, flags);
|
return ksu_handle_execveat_ksud(fd, filename_ptr, &argv, NULL, NULL);
|
||||||
}
|
}
|
||||||
|
|
||||||
static int read_handler_pre(struct kprobe *p, struct pt_regs *regs)
|
static int read_handler_pre(struct kprobe *p, struct pt_regs *regs)
|
||||||
@@ -391,7 +456,7 @@ static int read_handler_pre(struct kprobe *p, struct pt_regs *regs)
|
|||||||
struct file **file_ptr = (struct file **)&PT_REGS_PARM1(regs);
|
struct file **file_ptr = (struct file **)&PT_REGS_PARM1(regs);
|
||||||
char __user **buf_ptr = (char **)&PT_REGS_PARM2(regs);
|
char __user **buf_ptr = (char **)&PT_REGS_PARM2(regs);
|
||||||
size_t *count_ptr = (size_t *)&PT_REGS_PARM3(regs);
|
size_t *count_ptr = (size_t *)&PT_REGS_PARM3(regs);
|
||||||
loff_t **pos_ptr = (loff_t **)&PT_REGS_PARM4(regs);
|
loff_t **pos_ptr = (loff_t **)&PT_REGS_CCALL_PARM4(regs);
|
||||||
|
|
||||||
return ksu_handle_vfs_read(file_ptr, buf_ptr, count_ptr, pos_ptr);
|
return ksu_handle_vfs_read(file_ptr, buf_ptr, count_ptr, pos_ptr);
|
||||||
}
|
}
|
||||||
@@ -401,7 +466,7 @@ static int input_handle_event_handler_pre(struct kprobe *p,
|
|||||||
{
|
{
|
||||||
unsigned int *type = (unsigned int *)&PT_REGS_PARM2(regs);
|
unsigned int *type = (unsigned int *)&PT_REGS_PARM2(regs);
|
||||||
unsigned int *code = (unsigned int *)&PT_REGS_PARM3(regs);
|
unsigned int *code = (unsigned int *)&PT_REGS_PARM3(regs);
|
||||||
int *value = (int *)&PT_REGS_PARM4(regs);
|
int *value = (int *)&PT_REGS_CCALL_PARM4(regs);
|
||||||
return ksu_handle_input_handle_event(type, code, value);
|
return ksu_handle_input_handle_event(type, code, value);
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -448,7 +513,8 @@ static void stop_vfs_read_hook()
|
|||||||
bool ret = schedule_work(&stop_vfs_read_work);
|
bool ret = schedule_work(&stop_vfs_read_work);
|
||||||
pr_info("unregister vfs_read kprobe: %d!\n", ret);
|
pr_info("unregister vfs_read kprobe: %d!\n", ret);
|
||||||
#else
|
#else
|
||||||
vfs_read_hook = false;
|
ksu_vfs_read_hook = false;
|
||||||
|
pr_info("stop vfs_read_hook\n");
|
||||||
#endif
|
#endif
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -458,7 +524,8 @@ static void stop_execve_hook()
|
|||||||
bool ret = schedule_work(&stop_execve_hook_work);
|
bool ret = schedule_work(&stop_execve_hook_work);
|
||||||
pr_info("unregister execve kprobe: %d!\n", ret);
|
pr_info("unregister execve kprobe: %d!\n", ret);
|
||||||
#else
|
#else
|
||||||
execveat_hook = false;
|
ksu_execveat_hook = false;
|
||||||
|
pr_info("stop execve_hook\n");
|
||||||
#endif
|
#endif
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -473,7 +540,8 @@ static void stop_input_hook()
|
|||||||
bool ret = schedule_work(&stop_input_hook_work);
|
bool ret = schedule_work(&stop_input_hook_work);
|
||||||
pr_info("unregister input kprobe: %d!\n", ret);
|
pr_info("unregister input kprobe: %d!\n", ret);
|
||||||
#else
|
#else
|
||||||
input_hook = false;
|
ksu_input_hook = false;
|
||||||
|
pr_info("stop input_hook\n");
|
||||||
#endif
|
#endif
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|||||||
@@ -7,4 +7,4 @@ void on_post_fs_data(void);
|
|||||||
|
|
||||||
bool ksu_is_safe_mode(void);
|
bool ksu_is_safe_mode(void);
|
||||||
|
|
||||||
#endif
|
#endif
|
||||||
|
|||||||
@@ -13,7 +13,7 @@
|
|||||||
#include "ksu.h"
|
#include "ksu.h"
|
||||||
#include "manager.h"
|
#include "manager.h"
|
||||||
|
|
||||||
uid_t ksu_manager_uid = INVALID_UID;
|
uid_t ksu_manager_uid = KSU_INVALID_UID;
|
||||||
|
|
||||||
bool become_manager(char *pkg)
|
bool become_manager(char *pkg)
|
||||||
{
|
{
|
||||||
@@ -24,6 +24,15 @@ bool become_manager(char *pkg)
|
|||||||
char *buf;
|
char *buf;
|
||||||
bool result = false;
|
bool result = false;
|
||||||
|
|
||||||
|
#ifdef KSU_MANAGER_PACKAGE
|
||||||
|
// pkg is `/<real package>`
|
||||||
|
if (strncmp(pkg + 1, KSU_MANAGER_PACKAGE,
|
||||||
|
sizeof(KSU_MANAGER_PACKAGE)) != 0) {
|
||||||
|
pr_info("manager package is inconsistent with kernel build: %s\n",
|
||||||
|
KSU_MANAGER_PACKAGE);
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
#endif
|
||||||
// must be zygote's direct child, otherwise any app can fork a new process and
|
// must be zygote's direct child, otherwise any app can fork a new process and
|
||||||
// open manager's apk
|
// open manager's apk
|
||||||
if (task_uid(current->real_parent).val != 0) {
|
if (task_uid(current->real_parent).val != 0) {
|
||||||
@@ -39,39 +48,52 @@ bool become_manager(char *pkg)
|
|||||||
|
|
||||||
files_table = files_fdtable(current->files);
|
files_table = files_fdtable(current->files);
|
||||||
|
|
||||||
|
int pkg_len = strlen(pkg);
|
||||||
// todo: use iterate_fd
|
// todo: use iterate_fd
|
||||||
while (files_table->fd[i] != NULL) {
|
for (i = 0; files_table->fd[i] != NULL; i++) {
|
||||||
files_path = files_table->fd[i]->f_path;
|
files_path = files_table->fd[i]->f_path;
|
||||||
if (!d_is_reg(files_path.dentry)) {
|
if (!d_is_reg(files_path.dentry)) {
|
||||||
i++;
|
|
||||||
continue;
|
continue;
|
||||||
}
|
}
|
||||||
cwd = d_path(&files_path, buf, PATH_MAX);
|
cwd = d_path(&files_path, buf, PATH_MAX);
|
||||||
if (startswith(cwd, "/data/app/") == 0 &&
|
if (startswith(cwd, "/data/app/") != 0 ||
|
||||||
endswith(cwd, "/base.apk") == 0) {
|
endswith(cwd, "==/base.apk") != 0) {
|
||||||
// we have found the apk!
|
// AOSP generate ramdom base64 with 16bit, without NO_PADDING, so it must have two "="
|
||||||
pr_info("found apk: %s", cwd);
|
continue;
|
||||||
if (!strstr(cwd, pkg)) {
|
|
||||||
pr_info("apk path not match package name!\n");
|
|
||||||
i++;
|
|
||||||
continue;
|
|
||||||
}
|
|
||||||
if (is_manager_apk(cwd) == 0) {
|
|
||||||
// check passed
|
|
||||||
uid_t uid = current_uid().val;
|
|
||||||
pr_info("manager uid: %d\n", uid);
|
|
||||||
|
|
||||||
ksu_set_manager_uid(uid);
|
|
||||||
|
|
||||||
result = true;
|
|
||||||
goto clean;
|
|
||||||
} else {
|
|
||||||
pr_info("manager signature invalid!");
|
|
||||||
}
|
|
||||||
|
|
||||||
break;
|
|
||||||
}
|
}
|
||||||
i++;
|
// we have found the apk!
|
||||||
|
pr_info("found apk: %s\n", cwd);
|
||||||
|
char *pkg_index = strstr(cwd, pkg);
|
||||||
|
if (!pkg_index) {
|
||||||
|
pr_info("apk path not match package name!\n");
|
||||||
|
continue;
|
||||||
|
}
|
||||||
|
char *next_char = pkg_index + pkg_len;
|
||||||
|
// because we ensure the cwd must startswith `/data/app` and endswith `base.apk`
|
||||||
|
// we don't need to check if the pointer is out of bounds
|
||||||
|
if (*next_char != '-') {
|
||||||
|
// from android 8.1: http://aospxref.com/android-8.1.0_r81/xref/frameworks/base/services/core/java/com/android/server/pm/PackageManagerService.java#17612
|
||||||
|
// to android 13: http://aospxref.com/android-13.0.0_r3/xref/frameworks/base/services/core/java/com/android/server/pm/PackageManagerServiceUtils.java#1208
|
||||||
|
// /data/app/~~[randomStringA]/[packageName]-[randomStringB]
|
||||||
|
// the previous char must be `/` and the next char must be `-`
|
||||||
|
// because we use strstr instead of equals, this is a strong verfication.
|
||||||
|
pr_info("invalid pkg: %s\n", pkg);
|
||||||
|
continue;
|
||||||
|
}
|
||||||
|
if (is_manager_apk(cwd)) {
|
||||||
|
// check passed
|
||||||
|
uid_t uid = current_uid().val;
|
||||||
|
pr_info("manager uid: %d\n", uid);
|
||||||
|
|
||||||
|
ksu_set_manager_uid(uid);
|
||||||
|
|
||||||
|
result = true;
|
||||||
|
goto clean;
|
||||||
|
} else {
|
||||||
|
pr_info("manager signature invalid!\n");
|
||||||
|
}
|
||||||
|
|
||||||
|
break;
|
||||||
}
|
}
|
||||||
|
|
||||||
clean:
|
clean:
|
||||||
|
|||||||
@@ -4,18 +4,18 @@
|
|||||||
#include "linux/cred.h"
|
#include "linux/cred.h"
|
||||||
#include "linux/types.h"
|
#include "linux/types.h"
|
||||||
|
|
||||||
#define INVALID_UID -1
|
#define KSU_INVALID_UID -1
|
||||||
|
|
||||||
extern uid_t ksu_manager_uid; // DO NOT DIRECT USE
|
extern uid_t ksu_manager_uid; // DO NOT DIRECT USE
|
||||||
|
|
||||||
static inline bool ksu_is_manager_uid_valid()
|
static inline bool ksu_is_manager_uid_valid()
|
||||||
{
|
{
|
||||||
return ksu_manager_uid != INVALID_UID;
|
return ksu_manager_uid != KSU_INVALID_UID;
|
||||||
}
|
}
|
||||||
|
|
||||||
static inline bool is_manager()
|
static inline bool is_manager()
|
||||||
{
|
{
|
||||||
return ksu_manager_uid == current_uid().val;
|
return unlikely(ksu_manager_uid == current_uid().val);
|
||||||
}
|
}
|
||||||
|
|
||||||
static inline uid_t ksu_get_manager_uid()
|
static inline uid_t ksu_get_manager_uid()
|
||||||
@@ -30,7 +30,7 @@ static inline void ksu_set_manager_uid(uid_t uid)
|
|||||||
|
|
||||||
static inline void ksu_invalidate_manager_uid()
|
static inline void ksu_invalidate_manager_uid()
|
||||||
{
|
{
|
||||||
ksu_manager_uid = INVALID_UID;
|
ksu_manager_uid = KSU_INVALID_UID;
|
||||||
}
|
}
|
||||||
|
|
||||||
bool become_manager(char *pkg);
|
bool become_manager(char *pkg);
|
||||||
|
|||||||
@@ -30,4 +30,4 @@ RE_EXPORT_SYMBOL1(unsigned long, kallsyms_lookup_name, const char *, name)
|
|||||||
// int ksu_register_kretprobe(struct kretprobe *rp);
|
// int ksu_register_kretprobe(struct kretprobe *rp);
|
||||||
// void unregister_kretprobe(struct kretprobe *rp);
|
// void unregister_kretprobe(struct kretprobe *rp);
|
||||||
// int register_kretprobes(struct kretprobe **rps, int num);
|
// int register_kretprobes(struct kretprobe **rps, int num);
|
||||||
// void unregister_kretprobes(struct kretprobe **rps, int num);
|
// void unregister_kretprobes(struct kretprobe **rps, int num);
|
||||||
|
|||||||
@@ -11,6 +11,6 @@ ccflags-y += -DKSU_COMPAT_HAS_SELINUX_STATE
|
|||||||
endif
|
endif
|
||||||
|
|
||||||
ccflags-y += -Wno-implicit-function-declaration -Wno-strict-prototypes -Wno-int-conversion
|
ccflags-y += -Wno-implicit-function-declaration -Wno-strict-prototypes -Wno-int-conversion
|
||||||
ccflags-y += -Wno-macro-redefined -Wno-declaration-after-statement -Wno-unused-function
|
ccflags-y += -Wno-declaration-after-statement -Wno-unused-function
|
||||||
ccflags-y += -I$(srctree)/security/selinux -I$(srctree)/security/selinux/include
|
ccflags-y += -I$(srctree)/security/selinux -I$(srctree)/security/selinux/include
|
||||||
ccflags-y += -I$(objtree)/security/selinux
|
ccflags-y += -I$(objtree)/security/selinux -include $(srctree)/include/uapi/asm-generic/errno.h
|
||||||
|
|||||||
@@ -39,7 +39,7 @@ static struct policydb *get_policydb(void)
|
|||||||
void apply_kernelsu_rules()
|
void apply_kernelsu_rules()
|
||||||
{
|
{
|
||||||
if (!getenforce()) {
|
if (!getenforce()) {
|
||||||
pr_info("SELinux permissive or disabled, apply rules!");
|
pr_info("SELinux permissive or disabled, apply rules!\n");
|
||||||
}
|
}
|
||||||
|
|
||||||
rcu_read_lock();
|
rcu_read_lock();
|
||||||
@@ -63,6 +63,7 @@ void apply_kernelsu_rules()
|
|||||||
ksu_allowxperm(db, KERNEL_SU_DOMAIN, ALL, "blk_file", ALL);
|
ksu_allowxperm(db, KERNEL_SU_DOMAIN, ALL, "blk_file", ALL);
|
||||||
ksu_allowxperm(db, KERNEL_SU_DOMAIN, ALL, "fifo_file", ALL);
|
ksu_allowxperm(db, KERNEL_SU_DOMAIN, ALL, "fifo_file", ALL);
|
||||||
ksu_allowxperm(db, KERNEL_SU_DOMAIN, ALL, "chr_file", ALL);
|
ksu_allowxperm(db, KERNEL_SU_DOMAIN, ALL, "chr_file", ALL);
|
||||||
|
ksu_allowxperm(db, KERNEL_SU_DOMAIN, ALL, "file", ALL);
|
||||||
}
|
}
|
||||||
|
|
||||||
// we need to save allowlist in /data/adb/ksu
|
// we need to save allowlist in /data/adb/ksu
|
||||||
@@ -83,7 +84,10 @@ void apply_kernelsu_rules()
|
|||||||
ksu_allow(db, "kernel", "system_data_file", "dir", ALL);
|
ksu_allow(db, "kernel", "system_data_file", "dir", ALL);
|
||||||
// our ksud triggered by init
|
// our ksud triggered by init
|
||||||
ksu_allow(db, "init", "adb_data_file", "file", ALL);
|
ksu_allow(db, "init", "adb_data_file", "file", ALL);
|
||||||
|
ksu_allow(db, "init", "adb_data_file", "dir", ALL); // #1289
|
||||||
ksu_allow(db, "init", KERNEL_SU_DOMAIN, ALL, ALL);
|
ksu_allow(db, "init", KERNEL_SU_DOMAIN, ALL, ALL);
|
||||||
|
// we need to umount modules in zygote
|
||||||
|
ksu_allow(db, "zygote", "adb_data_file", "dir", "search");
|
||||||
|
|
||||||
// copied from Magisk rules
|
// copied from Magisk rules
|
||||||
// suRights
|
// suRights
|
||||||
@@ -114,6 +118,10 @@ void apply_kernelsu_rules()
|
|||||||
ksu_allow(db, "hwservicemanager", KERNEL_SU_DOMAIN, "process",
|
ksu_allow(db, "hwservicemanager", KERNEL_SU_DOMAIN, "process",
|
||||||
"getattr");
|
"getattr");
|
||||||
|
|
||||||
|
// For mounting loop devices, mirrors, tmpfs
|
||||||
|
ksu_allow(db, "kernel", ALL, "file", "read");
|
||||||
|
ksu_allow(db, "kernel", ALL, "file", "write");
|
||||||
|
|
||||||
// Allow all binder transactions
|
// Allow all binder transactions
|
||||||
ksu_allow(db, ALL, KERNEL_SU_DOMAIN, "binder", ALL);
|
ksu_allow(db, ALL, KERNEL_SU_DOMAIN, "binder", ALL);
|
||||||
|
|
||||||
@@ -123,6 +131,10 @@ void apply_kernelsu_rules()
|
|||||||
ksu_allow(db, "system_server", "untrusted_app_all_devpts", "chr_file",
|
ksu_allow(db, "system_server", "untrusted_app_all_devpts", "chr_file",
|
||||||
"write");
|
"write");
|
||||||
|
|
||||||
|
// Allow system server kill su process
|
||||||
|
ksu_allow(db, "system_server", KERNEL_SU_DOMAIN, "process", "getpgid");
|
||||||
|
ksu_allow(db, "system_server", KERNEL_SU_DOMAIN, "process", "sigkill");
|
||||||
|
|
||||||
rcu_read_unlock();
|
rcu_read_unlock();
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -170,7 +182,8 @@ static int get_object(char *buf, char __user *user_object, size_t buf_sz,
|
|||||||
// reset avc cache table, otherwise the new rules will not take effect if already denied
|
// reset avc cache table, otherwise the new rules will not take effect if already denied
|
||||||
static void reset_avc_cache()
|
static void reset_avc_cache()
|
||||||
{
|
{
|
||||||
#ifndef KSU_COMPAT_USE_SELINUX_STATE
|
#if ((!defined(KSU_COMPAT_USE_SELINUX_STATE)) || \
|
||||||
|
LINUX_VERSION_CODE >= KERNEL_VERSION(6, 4, 0))
|
||||||
avc_ss_reset(0);
|
avc_ss_reset(0);
|
||||||
selnl_notify_policyload(0);
|
selnl_notify_policyload(0);
|
||||||
selinux_status_update_policyload(0);
|
selinux_status_update_policyload(0);
|
||||||
@@ -245,7 +258,7 @@ int handle_sepolicy(unsigned long arg3, void __user *arg4)
|
|||||||
} else if (subcmd == 4) {
|
} else if (subcmd == 4) {
|
||||||
success = ksu_dontaudit(db, s, t, c, p);
|
success = ksu_dontaudit(db, s, t, c, p);
|
||||||
} else {
|
} else {
|
||||||
pr_err("sepol: unknown subcmd: %d", subcmd);
|
pr_err("sepol: unknown subcmd: %d\n", subcmd);
|
||||||
}
|
}
|
||||||
ret = success ? 0 : -1;
|
ret = success ? 0 : -1;
|
||||||
|
|
||||||
@@ -290,7 +303,7 @@ int handle_sepolicy(unsigned long arg3, void __user *arg4)
|
|||||||
} else if (subcmd == 3) {
|
} else if (subcmd == 3) {
|
||||||
success = ksu_dontauditxperm(db, s, t, c, perm_set);
|
success = ksu_dontauditxperm(db, s, t, c, perm_set);
|
||||||
} else {
|
} else {
|
||||||
pr_err("sepol: unknown subcmd: %d", subcmd);
|
pr_err("sepol: unknown subcmd: %d\n", subcmd);
|
||||||
}
|
}
|
||||||
ret = success ? 0 : -1;
|
ret = success ? 0 : -1;
|
||||||
} else if (cmd == CMD_TYPE_STATE) {
|
} else if (cmd == CMD_TYPE_STATE) {
|
||||||
@@ -307,7 +320,7 @@ int handle_sepolicy(unsigned long arg3, void __user *arg4)
|
|||||||
} else if (subcmd == 2) {
|
} else if (subcmd == 2) {
|
||||||
success = ksu_enforce(db, src);
|
success = ksu_enforce(db, src);
|
||||||
} else {
|
} else {
|
||||||
pr_err("sepol: unknown subcmd: %d", subcmd);
|
pr_err("sepol: unknown subcmd: %d\n", subcmd);
|
||||||
}
|
}
|
||||||
if (success)
|
if (success)
|
||||||
ret = 0;
|
ret = 0;
|
||||||
@@ -422,7 +435,7 @@ int handle_sepolicy(unsigned long arg3, void __user *arg4)
|
|||||||
success = ksu_type_member(db, src, tgt, cls,
|
success = ksu_type_member(db, src, tgt, cls,
|
||||||
default_type);
|
default_type);
|
||||||
} else {
|
} else {
|
||||||
pr_err("sepol: unknown subcmd: %d", subcmd);
|
pr_err("sepol: unknown subcmd: %d\n", subcmd);
|
||||||
}
|
}
|
||||||
if (success)
|
if (success)
|
||||||
ret = 0;
|
ret = 0;
|
||||||
|
|||||||
@@ -8,8 +8,6 @@
|
|||||||
|
|
||||||
#define KERNEL_SU_DOMAIN "u:r:su:s0"
|
#define KERNEL_SU_DOMAIN "u:r:su:s0"
|
||||||
|
|
||||||
static u32 ksu_sid;
|
|
||||||
|
|
||||||
static int transive_to_domain(const char *domain)
|
static int transive_to_domain(const char *domain)
|
||||||
{
|
{
|
||||||
struct cred *cred;
|
struct cred *cred;
|
||||||
@@ -26,11 +24,11 @@ static int transive_to_domain(const char *domain)
|
|||||||
}
|
}
|
||||||
|
|
||||||
error = security_secctx_to_secid(domain, strlen(domain), &sid);
|
error = security_secctx_to_secid(domain, strlen(domain), &sid);
|
||||||
pr_info("error: %d, sid: %d\n", error, sid);
|
if (error) {
|
||||||
|
pr_info("security_secctx_to_secid %s -> sid: %d, error: %d\n",
|
||||||
|
domain, sid, error);
|
||||||
|
}
|
||||||
if (!error) {
|
if (!error) {
|
||||||
if (!ksu_sid)
|
|
||||||
ksu_sid = sid;
|
|
||||||
|
|
||||||
tsec->sid = sid;
|
tsec->sid = sid;
|
||||||
tsec->create_sid = 0;
|
tsec->create_sid = 0;
|
||||||
tsec->keycreate_sid = 0;
|
tsec->keycreate_sid = 0;
|
||||||
@@ -39,10 +37,10 @@ static int transive_to_domain(const char *domain)
|
|||||||
return error;
|
return error;
|
||||||
}
|
}
|
||||||
|
|
||||||
void setup_selinux()
|
void setup_selinux(const char *domain)
|
||||||
{
|
{
|
||||||
if (transive_to_domain(KERNEL_SU_DOMAIN)) {
|
if (transive_to_domain(domain)) {
|
||||||
pr_err("transive domain failed.");
|
pr_err("transive domain failed.\n");
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -88,7 +86,8 @@ bool getenforce()
|
|||||||
#endif
|
#endif
|
||||||
}
|
}
|
||||||
|
|
||||||
#if (LINUX_VERSION_CODE < KERNEL_VERSION(5, 10, 0)) && !defined(KSU_COMPAT_HAS_CURRENT_SID)
|
#if (LINUX_VERSION_CODE < KERNEL_VERSION(5, 10, 0)) && \
|
||||||
|
!defined(KSU_COMPAT_HAS_CURRENT_SID)
|
||||||
/*
|
/*
|
||||||
* get the subjective security ID of the current task
|
* get the subjective security ID of the current task
|
||||||
*/
|
*/
|
||||||
@@ -102,5 +101,32 @@ static inline u32 current_sid(void)
|
|||||||
|
|
||||||
bool is_ksu_domain()
|
bool is_ksu_domain()
|
||||||
{
|
{
|
||||||
return ksu_sid && current_sid() == ksu_sid;
|
char *domain;
|
||||||
|
u32 seclen;
|
||||||
|
bool result;
|
||||||
|
int err = security_secid_to_secctx(current_sid(), &domain, &seclen);
|
||||||
|
if (err) {
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
result = strncmp(KERNEL_SU_DOMAIN, domain, seclen) == 0;
|
||||||
|
security_release_secctx(domain, seclen);
|
||||||
|
return result;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
bool is_zygote(void *sec)
|
||||||
|
{
|
||||||
|
struct task_security_struct *tsec = (struct task_security_struct *)sec;
|
||||||
|
if (!tsec) {
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
char *domain;
|
||||||
|
u32 seclen;
|
||||||
|
bool result;
|
||||||
|
int err = security_secid_to_secctx(tsec->sid, &domain, &seclen);
|
||||||
|
if (err) {
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
result = strncmp("u:r:zygote:s0", domain, seclen) == 0;
|
||||||
|
security_release_secctx(domain, seclen);
|
||||||
|
return result;
|
||||||
|
}
|
||||||
@@ -8,7 +8,7 @@
|
|||||||
#define KSU_COMPAT_USE_SELINUX_STATE
|
#define KSU_COMPAT_USE_SELINUX_STATE
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
void setup_selinux();
|
void setup_selinux(const char *);
|
||||||
|
|
||||||
void setenforce(bool);
|
void setenforce(bool);
|
||||||
|
|
||||||
@@ -16,6 +16,8 @@ bool getenforce();
|
|||||||
|
|
||||||
bool is_ksu_domain();
|
bool is_ksu_domain();
|
||||||
|
|
||||||
|
bool is_zygote(void *cred);
|
||||||
|
|
||||||
void apply_kernelsu_rules();
|
void apply_kernelsu_rules();
|
||||||
|
|
||||||
#endif
|
#endif
|
||||||
|
|||||||
@@ -15,7 +15,7 @@
|
|||||||
* From ss/ebitmap.h
|
* From ss/ebitmap.h
|
||||||
*/
|
*/
|
||||||
#if LINUX_VERSION_CODE >= KERNEL_VERSION(4, 9, 0) && \
|
#if LINUX_VERSION_CODE >= KERNEL_VERSION(4, 9, 0) && \
|
||||||
LINUX_VERSION_CODE <= KERNEL_VERSION(4, 9, 250)
|
LINUX_VERSION_CODE < KERNEL_VERSION(4, 10, 0)
|
||||||
#ifdef HISI_SELINUX_EBITMAP_RO
|
#ifdef HISI_SELINUX_EBITMAP_RO
|
||||||
#define CONFIG_IS_HW_HISI
|
#define CONFIG_IS_HW_HISI
|
||||||
#endif
|
#endif
|
||||||
@@ -73,7 +73,7 @@ static bool add_typeattribute(struct policydb *db, const char *type,
|
|||||||
// rules
|
// rules
|
||||||
#define strip_av(effect, invert) ((effect == AVTAB_AUDITDENY) == !invert)
|
#define strip_av(effect, invert) ((effect == AVTAB_AUDITDENY) == !invert)
|
||||||
|
|
||||||
#define hash_for_each(node_ptr, n_slot, cur) \
|
#define ksu_hash_for_each(node_ptr, n_slot, cur) \
|
||||||
int i; \
|
int i; \
|
||||||
for (i = 0; i < n_slot; ++i) \
|
for (i = 0; i < n_slot; ++i) \
|
||||||
for (cur = node_ptr[i]; cur; cur = cur->next)
|
for (cur = node_ptr[i]; cur; cur = cur->next)
|
||||||
@@ -81,10 +81,11 @@ static bool add_typeattribute(struct policydb *db, const char *type,
|
|||||||
// htable is a struct instead of pointer above 5.8.0:
|
// htable is a struct instead of pointer above 5.8.0:
|
||||||
// https://elixir.bootlin.com/linux/v5.8-rc1/source/security/selinux/ss/symtab.h
|
// https://elixir.bootlin.com/linux/v5.8-rc1/source/security/selinux/ss/symtab.h
|
||||||
#if LINUX_VERSION_CODE >= KERNEL_VERSION(5, 8, 0)
|
#if LINUX_VERSION_CODE >= KERNEL_VERSION(5, 8, 0)
|
||||||
#define hashtab_for_each(htab, cur) hash_for_each (htab.htable, htab.size, cur)
|
#define ksu_hashtab_for_each(htab, cur) \
|
||||||
|
ksu_hash_for_each(htab.htable, htab.size, cur)
|
||||||
#else
|
#else
|
||||||
#define hashtab_for_each(htab, cur) \
|
#define ksu_hashtab_for_each(htab, cur) \
|
||||||
hash_for_each (htab->htable, htab->size, cur)
|
ksu_hash_for_each(htab->htable, htab->size, cur)
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
// symtab_search is introduced on 5.9.0:
|
// symtab_search is introduced on 5.9.0:
|
||||||
@@ -95,8 +96,7 @@ static bool add_typeattribute(struct policydb *db, const char *type,
|
|||||||
#endif
|
#endif
|
||||||
|
|
||||||
#define avtab_for_each(avtab, cur) \
|
#define avtab_for_each(avtab, cur) \
|
||||||
hash_for_each (avtab.htable, avtab.nslot, cur) \
|
ksu_hash_for_each(avtab.htable, avtab.nslot, cur);
|
||||||
;
|
|
||||||
|
|
||||||
static struct avtab_node *get_avtab_node(struct policydb *db,
|
static struct avtab_node *get_avtab_node(struct policydb *db,
|
||||||
struct avtab_key *key,
|
struct avtab_key *key,
|
||||||
@@ -210,14 +210,14 @@ static void add_rule_raw(struct policydb *db, struct type_datum *src,
|
|||||||
if (src == NULL) {
|
if (src == NULL) {
|
||||||
struct hashtab_node *node;
|
struct hashtab_node *node;
|
||||||
if (strip_av(effect, invert)) {
|
if (strip_av(effect, invert)) {
|
||||||
hashtab_for_each(db->p_types.table, node)
|
ksu_hashtab_for_each(db->p_types.table, node)
|
||||||
{
|
{
|
||||||
add_rule_raw(db,
|
add_rule_raw(db,
|
||||||
(struct type_datum *)node->datum,
|
(struct type_datum *)node->datum,
|
||||||
tgt, cls, perm, effect, invert);
|
tgt, cls, perm, effect, invert);
|
||||||
};
|
};
|
||||||
} else {
|
} else {
|
||||||
hashtab_for_each(db->p_types.table, node)
|
ksu_hashtab_for_each(db->p_types.table, node)
|
||||||
{
|
{
|
||||||
struct type_datum *type =
|
struct type_datum *type =
|
||||||
(struct type_datum *)(node->datum);
|
(struct type_datum *)(node->datum);
|
||||||
@@ -230,14 +230,14 @@ static void add_rule_raw(struct policydb *db, struct type_datum *src,
|
|||||||
} else if (tgt == NULL) {
|
} else if (tgt == NULL) {
|
||||||
struct hashtab_node *node;
|
struct hashtab_node *node;
|
||||||
if (strip_av(effect, invert)) {
|
if (strip_av(effect, invert)) {
|
||||||
hashtab_for_each(db->p_types.table, node)
|
ksu_hashtab_for_each(db->p_types.table, node)
|
||||||
{
|
{
|
||||||
add_rule_raw(db, src,
|
add_rule_raw(db, src,
|
||||||
(struct type_datum *)node->datum,
|
(struct type_datum *)node->datum,
|
||||||
cls, perm, effect, invert);
|
cls, perm, effect, invert);
|
||||||
};
|
};
|
||||||
} else {
|
} else {
|
||||||
hashtab_for_each(db->p_types.table, node)
|
ksu_hashtab_for_each(db->p_types.table, node)
|
||||||
{
|
{
|
||||||
struct type_datum *type =
|
struct type_datum *type =
|
||||||
(struct type_datum *)(node->datum);
|
(struct type_datum *)(node->datum);
|
||||||
@@ -249,7 +249,7 @@ static void add_rule_raw(struct policydb *db, struct type_datum *src,
|
|||||||
}
|
}
|
||||||
} else if (cls == NULL) {
|
} else if (cls == NULL) {
|
||||||
struct hashtab_node *node;
|
struct hashtab_node *node;
|
||||||
hashtab_for_each(db->p_classes.table, node)
|
ksu_hashtab_for_each(db->p_classes.table, node)
|
||||||
{
|
{
|
||||||
add_rule_raw(db, src, tgt,
|
add_rule_raw(db, src, tgt,
|
||||||
(struct class_datum *)node->datum, perm,
|
(struct class_datum *)node->datum, perm,
|
||||||
@@ -292,7 +292,7 @@ static void add_xperm_rule_raw(struct policydb *db, struct type_datum *src,
|
|||||||
{
|
{
|
||||||
if (src == NULL) {
|
if (src == NULL) {
|
||||||
struct hashtab_node *node;
|
struct hashtab_node *node;
|
||||||
hashtab_for_each(db->p_types.table, node)
|
ksu_hashtab_for_each(db->p_types.table, node)
|
||||||
{
|
{
|
||||||
struct type_datum *type =
|
struct type_datum *type =
|
||||||
(struct type_datum *)(node->datum);
|
(struct type_datum *)(node->datum);
|
||||||
@@ -303,7 +303,7 @@ static void add_xperm_rule_raw(struct policydb *db, struct type_datum *src,
|
|||||||
};
|
};
|
||||||
} else if (tgt == NULL) {
|
} else if (tgt == NULL) {
|
||||||
struct hashtab_node *node;
|
struct hashtab_node *node;
|
||||||
hashtab_for_each(db->p_types.table, node)
|
ksu_hashtab_for_each(db->p_types.table, node)
|
||||||
{
|
{
|
||||||
struct type_datum *type =
|
struct type_datum *type =
|
||||||
(struct type_datum *)(node->datum);
|
(struct type_datum *)(node->datum);
|
||||||
@@ -314,7 +314,7 @@ static void add_xperm_rule_raw(struct policydb *db, struct type_datum *src,
|
|||||||
};
|
};
|
||||||
} else if (cls == NULL) {
|
} else if (cls == NULL) {
|
||||||
struct hashtab_node *node;
|
struct hashtab_node *node;
|
||||||
hashtab_for_each(db->p_classes.table, node)
|
ksu_hashtab_for_each(db->p_classes.table, node)
|
||||||
{
|
{
|
||||||
add_xperm_rule_raw(db, src, tgt,
|
add_xperm_rule_raw(db, src, tgt,
|
||||||
(struct class_datum *)(node->datum),
|
(struct class_datum *)(node->datum),
|
||||||
@@ -592,14 +592,14 @@ static bool add_filename_trans(struct policydb *db, const char *s,
|
|||||||
trans = (struct filename_trans_datum *)kcalloc(sizeof(*trans),
|
trans = (struct filename_trans_datum *)kcalloc(sizeof(*trans),
|
||||||
1, GFP_ATOMIC);
|
1, GFP_ATOMIC);
|
||||||
if (!trans) {
|
if (!trans) {
|
||||||
pr_err("add_filename_trans: Failed to alloc datum");
|
pr_err("add_filename_trans: Failed to alloc datum\n");
|
||||||
return false;
|
return false;
|
||||||
}
|
}
|
||||||
struct filename_trans *new_key =
|
struct filename_trans *new_key =
|
||||||
(struct filename_trans *)kmalloc(sizeof(*new_key),
|
(struct filename_trans *)kmalloc(sizeof(*new_key),
|
||||||
GFP_ATOMIC);
|
GFP_ATOMIC);
|
||||||
if (!new_key) {
|
if (!new_key) {
|
||||||
pr_err("add_filename_trans: Failed to alloc new_key");
|
pr_err("add_filename_trans: Failed to alloc new_key\n");
|
||||||
return false;
|
return false;
|
||||||
}
|
}
|
||||||
*new_key = key;
|
*new_key = key;
|
||||||
@@ -693,7 +693,7 @@ static bool add_type(struct policydb *db, const char *type_name, bool attr)
|
|||||||
int i;
|
int i;
|
||||||
for (i = 0; i < db->p_roles.nprim; ++i) {
|
for (i = 0; i < db->p_roles.nprim; ++i) {
|
||||||
ebitmap_set_bit(&db->role_val_to_struct[i]->types, value - 1,
|
ebitmap_set_bit(&db->role_val_to_struct[i]->types, value - 1,
|
||||||
0);
|
1);
|
||||||
}
|
}
|
||||||
|
|
||||||
return true;
|
return true;
|
||||||
@@ -743,7 +743,7 @@ static bool add_type(struct policydb *db, const char *type_name, bool attr)
|
|||||||
int i;
|
int i;
|
||||||
for (i = 0; i < db->p_roles.nprim; ++i) {
|
for (i = 0; i < db->p_roles.nprim; ++i) {
|
||||||
ebitmap_set_bit(&db->role_val_to_struct[i]->types, value - 1,
|
ebitmap_set_bit(&db->role_val_to_struct[i]->types, value - 1,
|
||||||
0);
|
1);
|
||||||
}
|
}
|
||||||
|
|
||||||
return true;
|
return true;
|
||||||
@@ -854,7 +854,7 @@ static bool add_type(struct policydb *db, const char *type_name, bool attr)
|
|||||||
int i;
|
int i;
|
||||||
for (i = 0; i < db->p_roles.nprim; ++i) {
|
for (i = 0; i < db->p_roles.nprim; ++i) {
|
||||||
ebitmap_set_bit(&db->role_val_to_struct[i]->types, value - 1,
|
ebitmap_set_bit(&db->role_val_to_struct[i]->types, value - 1,
|
||||||
0);
|
1);
|
||||||
}
|
}
|
||||||
return true;
|
return true;
|
||||||
#endif
|
#endif
|
||||||
@@ -870,7 +870,7 @@ static bool set_type_state(struct policydb *db, const char *type_name,
|
|||||||
struct type_datum *type;
|
struct type_datum *type;
|
||||||
if (type_name == NULL) {
|
if (type_name == NULL) {
|
||||||
struct hashtab_node *node;
|
struct hashtab_node *node;
|
||||||
hashtab_for_each(db->p_types.table, node)
|
ksu_hashtab_for_each(db->p_types.table, node)
|
||||||
{
|
{
|
||||||
type = (struct type_datum *)(node->datum);
|
type = (struct type_datum *)(node->datum);
|
||||||
if (ebitmap_set_bit(&db->permissive_map, type->value,
|
if (ebitmap_set_bit(&db->permissive_map, type->value,
|
||||||
@@ -913,7 +913,7 @@ static void add_typeattribute_raw(struct policydb *db, struct type_datum *type,
|
|||||||
struct hashtab_node *node;
|
struct hashtab_node *node;
|
||||||
struct constraint_node *n;
|
struct constraint_node *n;
|
||||||
struct constraint_expr *e;
|
struct constraint_expr *e;
|
||||||
hashtab_for_each(db->p_classes.table, node)
|
ksu_hashtab_for_each(db->p_classes.table, node)
|
||||||
{
|
{
|
||||||
struct class_datum *cls = (struct class_datum *)(node->datum);
|
struct class_datum *cls = (struct class_datum *)(node->datum);
|
||||||
for (n = cls->constraints; n; n = n->next) {
|
for (n = cls->constraints; n; n = n->next) {
|
||||||
|
|||||||
@@ -11,7 +11,7 @@ elif test -d "$GKI_ROOT/drivers"; then
|
|||||||
DRIVER_DIR="$GKI_ROOT/drivers"
|
DRIVER_DIR="$GKI_ROOT/drivers"
|
||||||
else
|
else
|
||||||
echo '[ERROR] "drivers/" directory is not found.'
|
echo '[ERROR] "drivers/" directory is not found.'
|
||||||
echo '[+] You should modify this scrpit by yourself.'
|
echo '[+] You should modify this script by yourself.'
|
||||||
exit 127
|
exit 127
|
||||||
fi
|
fi
|
||||||
|
|
||||||
@@ -32,11 +32,19 @@ cd "$GKI_ROOT"
|
|||||||
echo "[+] GKI_ROOT: $GKI_ROOT"
|
echo "[+] GKI_ROOT: $GKI_ROOT"
|
||||||
echo "[+] Copy kernel su driver to $DRIVER_DIR"
|
echo "[+] Copy kernel su driver to $DRIVER_DIR"
|
||||||
|
|
||||||
test -e "$DRIVER_DIR/kernelsu" || ln -sf "$GKI_ROOT/KernelSU/kernel" "$DRIVER_DIR/kernelsu"
|
cd "$DRIVER_DIR"
|
||||||
|
if test -d "$GKI_ROOT/common/drivers"; then
|
||||||
|
ln -sf "../../KernelSU/kernel" "kernelsu"
|
||||||
|
elif test -d "$GKI_ROOT/drivers"; then
|
||||||
|
ln -sf "../KernelSU/kernel" "kernelsu"
|
||||||
|
fi
|
||||||
|
cd "$GKI_ROOT"
|
||||||
|
|
||||||
echo '[+] Add kernel su driver to Makefile'
|
echo '[+] Add kernel su driver to Makefile'
|
||||||
|
|
||||||
DRIVER_MAKEFILE=$DRIVER_DIR/Makefile
|
DRIVER_MAKEFILE=$DRIVER_DIR/Makefile
|
||||||
grep -q "kernelsu" "$DRIVER_MAKEFILE" || printf "\nobj-y += kernelsu/\n" >> "$DRIVER_MAKEFILE"
|
DRIVER_KCONFIG=$DRIVER_DIR/Kconfig
|
||||||
|
grep -q "kernelsu" "$DRIVER_MAKEFILE" || printf "\nobj-\$(CONFIG_KSU) += kernelsu/\n" >> "$DRIVER_MAKEFILE"
|
||||||
|
grep -q "kernelsu" "$DRIVER_KCONFIG" || sed -i "/endmenu/i\\source \"drivers/kernelsu/Kconfig\"" "$DRIVER_KCONFIG"
|
||||||
|
|
||||||
echo '[+] Done.'
|
echo '[+] Done.'
|
||||||
|
|||||||
@@ -16,6 +16,7 @@
|
|||||||
#include "arch.h"
|
#include "arch.h"
|
||||||
#include "klog.h" // IWYU pragma: keep
|
#include "klog.h" // IWYU pragma: keep
|
||||||
#include "ksud.h"
|
#include "ksud.h"
|
||||||
|
#include "kernel_compat.h"
|
||||||
|
|
||||||
#define SU_PATH "/system/bin/su"
|
#define SU_PATH "/system/bin/su"
|
||||||
#define SH_PATH "/system/bin/sh"
|
#define SH_PATH "/system/bin/sh"
|
||||||
@@ -41,65 +42,72 @@ static char __user *sh_user_path(void)
|
|||||||
int ksu_handle_faccessat(int *dfd, const char __user **filename_user, int *mode,
|
int ksu_handle_faccessat(int *dfd, const char __user **filename_user, int *mode,
|
||||||
int *flags)
|
int *flags)
|
||||||
{
|
{
|
||||||
struct filename *filename;
|
|
||||||
const char su[] = SU_PATH;
|
const char su[] = SU_PATH;
|
||||||
|
|
||||||
if (!ksu_is_allow_uid(current_uid().val)) {
|
if (!ksu_is_allow_uid(current_uid().val)) {
|
||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
filename = getname(*filename_user);
|
char path[sizeof(su) + 1];
|
||||||
|
memset(path, 0, sizeof(path));
|
||||||
|
ksu_strncpy_from_user_nofault(path, *filename_user, sizeof(path));
|
||||||
|
|
||||||
if (IS_ERR(filename)) {
|
if (unlikely(!memcmp(path, su, sizeof(su)))) {
|
||||||
return 0;
|
|
||||||
}
|
|
||||||
if (!memcmp(filename->name, su, sizeof(su))) {
|
|
||||||
pr_info("faccessat su->sh!\n");
|
pr_info("faccessat su->sh!\n");
|
||||||
*filename_user = sh_user_path();
|
*filename_user = sh_user_path();
|
||||||
}
|
}
|
||||||
|
|
||||||
putname(filename);
|
|
||||||
|
|
||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
int ksu_handle_stat(int *dfd, const char __user **filename_user, int *flags)
|
int ksu_handle_stat(int *dfd, const char __user **filename_user, int *flags)
|
||||||
{
|
{
|
||||||
// const char sh[] = SH_PATH;
|
// const char sh[] = SH_PATH;
|
||||||
struct filename *filename;
|
|
||||||
const char su[] = SU_PATH;
|
const char su[] = SU_PATH;
|
||||||
|
|
||||||
if (!ksu_is_allow_uid(current_uid().val)) {
|
if (!ksu_is_allow_uid(current_uid().val)) {
|
||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
if (!filename_user) {
|
if (unlikely(!filename_user)) {
|
||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
filename = getname(*filename_user);
|
char path[sizeof(su) + 1];
|
||||||
|
memset(path, 0, sizeof(path));
|
||||||
|
#if LINUX_VERSION_CODE >= KERNEL_VERSION(5, 18, 0)
|
||||||
|
// it becomes a `struct filename *` after 5.18
|
||||||
|
// https://elixir.bootlin.com/linux/v5.18/source/fs/stat.c#L216
|
||||||
|
const char sh[] = SH_PATH;
|
||||||
|
struct filename *filename = * ((struct filename **) filename_user);
|
||||||
if (IS_ERR(filename)) {
|
if (IS_ERR(filename)) {
|
||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
if (!memcmp(filename->name, su, sizeof(su))) {
|
if (likely(memcmp(filename->name, su, sizeof(su))))
|
||||||
|
return 0;
|
||||||
|
pr_info("vfs_statx su->sh!\n");
|
||||||
|
memcpy((void *)filename->name, sh, sizeof(sh));
|
||||||
|
#else
|
||||||
|
ksu_strncpy_from_user_nofault(path, *filename_user, sizeof(path));
|
||||||
|
|
||||||
|
if (unlikely(!memcmp(path, su, sizeof(su)))) {
|
||||||
pr_info("newfstatat su->sh!\n");
|
pr_info("newfstatat su->sh!\n");
|
||||||
*filename_user = sh_user_path();
|
*filename_user = sh_user_path();
|
||||||
}
|
}
|
||||||
|
#endif
|
||||||
putname(filename);
|
|
||||||
|
|
||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// the call from execve_handler_pre won't provided correct value for __never_use_argument, use them after fix execve_handler_pre, keeping them for consistence for manually patched code
|
||||||
int ksu_handle_execveat_sucompat(int *fd, struct filename **filename_ptr,
|
int ksu_handle_execveat_sucompat(int *fd, struct filename **filename_ptr,
|
||||||
void *argv, void *envp, int *flags)
|
void *__never_use_argv, void *__never_use_envp, int *__never_use_flags)
|
||||||
{
|
{
|
||||||
struct filename *filename;
|
struct filename *filename;
|
||||||
const char sh[] = KSUD_PATH;
|
const char sh[] = KSUD_PATH;
|
||||||
const char su[] = SU_PATH;
|
const char su[] = SU_PATH;
|
||||||
|
|
||||||
if (!filename_ptr)
|
if (unlikely(!filename_ptr))
|
||||||
return 0;
|
return 0;
|
||||||
|
|
||||||
filename = *filename_ptr;
|
filename = *filename_ptr;
|
||||||
@@ -107,16 +115,16 @@ int ksu_handle_execveat_sucompat(int *fd, struct filename **filename_ptr,
|
|||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
if (!ksu_is_allow_uid(current_uid().val)) {
|
if (likely(memcmp(filename->name, su, sizeof(su))))
|
||||||
return 0;
|
return 0;
|
||||||
}
|
|
||||||
|
|
||||||
if (!memcmp(filename->name, su, sizeof(su))) {
|
if (!ksu_is_allow_uid(current_uid().val))
|
||||||
pr_info("do_execveat_common su found\n");
|
return 0;
|
||||||
memcpy((void *)filename->name, sh, sizeof(sh));
|
|
||||||
|
|
||||||
escape_to_root();
|
pr_info("do_execveat_common su found\n");
|
||||||
}
|
memcpy((void *)filename->name, sh, sizeof(sh));
|
||||||
|
|
||||||
|
escape_to_root();
|
||||||
|
|
||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
@@ -128,7 +136,8 @@ static int faccessat_handler_pre(struct kprobe *p, struct pt_regs *regs)
|
|||||||
int *dfd = (int *)PT_REGS_PARM1(regs);
|
int *dfd = (int *)PT_REGS_PARM1(regs);
|
||||||
const char __user **filename_user = (const char **)&PT_REGS_PARM2(regs);
|
const char __user **filename_user = (const char **)&PT_REGS_PARM2(regs);
|
||||||
int *mode = (int *)&PT_REGS_PARM3(regs);
|
int *mode = (int *)&PT_REGS_PARM3(regs);
|
||||||
int *flags = (int *)&PT_REGS_PARM4(regs);
|
// Both sys_ and do_ is C function
|
||||||
|
int *flags = (int *)&PT_REGS_CCALL_PARM4(regs);
|
||||||
|
|
||||||
return ksu_handle_faccessat(dfd, filename_user, mode, flags);
|
return ksu_handle_faccessat(dfd, filename_user, mode, flags);
|
||||||
}
|
}
|
||||||
@@ -142,7 +151,7 @@ static int newfstatat_handler_pre(struct kprobe *p, struct pt_regs *regs)
|
|||||||
int *flags = (int *)&PT_REGS_PARM3(regs);
|
int *flags = (int *)&PT_REGS_PARM3(regs);
|
||||||
#else
|
#else
|
||||||
// int vfs_fstatat(int dfd, const char __user *filename, struct kstat *stat,int flag)
|
// int vfs_fstatat(int dfd, const char __user *filename, struct kstat *stat,int flag)
|
||||||
int *flags = (int *)&PT_REGS_PARM4(regs);
|
int *flags = (int *)&PT_REGS_CCALL_PARM4(regs);
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
return ksu_handle_stat(dfd, filename_user, flags);
|
return ksu_handle_stat(dfd, filename_user, flags);
|
||||||
@@ -154,12 +163,8 @@ static int execve_handler_pre(struct kprobe *p, struct pt_regs *regs)
|
|||||||
int *fd = (int *)&PT_REGS_PARM1(regs);
|
int *fd = (int *)&PT_REGS_PARM1(regs);
|
||||||
struct filename **filename_ptr =
|
struct filename **filename_ptr =
|
||||||
(struct filename **)&PT_REGS_PARM2(regs);
|
(struct filename **)&PT_REGS_PARM2(regs);
|
||||||
void *argv = (void *)&PT_REGS_PARM3(regs);
|
|
||||||
void *envp = (void *)&PT_REGS_PARM4(regs);
|
|
||||||
int *flags = (int *)&PT_REGS_PARM5(regs);
|
|
||||||
|
|
||||||
return ksu_handle_execveat_sucompat(fd, filename_ptr, argv, envp,
|
return ksu_handle_execveat_sucompat(fd, filename_ptr, NULL, NULL, NULL);
|
||||||
flags);
|
|
||||||
}
|
}
|
||||||
|
|
||||||
static struct kprobe faccessat_kp = {
|
static struct kprobe faccessat_kp = {
|
||||||
|
|||||||
@@ -20,16 +20,18 @@ static struct work_struct ksu_update_uid_work;
|
|||||||
struct uid_data {
|
struct uid_data {
|
||||||
struct list_head list;
|
struct list_head list;
|
||||||
u32 uid;
|
u32 uid;
|
||||||
|
char package[KSU_MAX_PACKAGE_NAME];
|
||||||
};
|
};
|
||||||
|
|
||||||
static bool is_uid_exist(uid_t uid, void *data)
|
static bool is_uid_exist(uid_t uid, char *package, void *data)
|
||||||
{
|
{
|
||||||
struct list_head *list = (struct list_head *)data;
|
struct list_head *list = (struct list_head *)data;
|
||||||
struct uid_data *np;
|
struct uid_data *np;
|
||||||
|
|
||||||
bool exist = false;
|
bool exist = false;
|
||||||
list_for_each_entry (np, list, list) {
|
list_for_each_entry (np, list, list) {
|
||||||
if (np->uid == uid) {
|
if (np->uid == uid % 100000 &&
|
||||||
|
strncmp(np->package, package, KSU_MAX_PACKAGE_NAME) == 0) {
|
||||||
exist = true;
|
exist = true;
|
||||||
break;
|
break;
|
||||||
}
|
}
|
||||||
@@ -39,12 +41,12 @@ static bool is_uid_exist(uid_t uid, void *data)
|
|||||||
|
|
||||||
static void do_update_uid(struct work_struct *work)
|
static void do_update_uid(struct work_struct *work)
|
||||||
{
|
{
|
||||||
KWORKER_INSTALL_KEYRING();
|
struct file *fp =
|
||||||
struct file *fp = filp_open(SYSTEM_PACKAGES_LIST_PATH, O_RDONLY, 0);
|
ksu_filp_open_compat(SYSTEM_PACKAGES_LIST_PATH, O_RDONLY, 0);
|
||||||
if (IS_ERR(fp)) {
|
if (IS_ERR(fp)) {
|
||||||
pr_err("do_update_uid, open " SYSTEM_PACKAGES_LIST_PATH
|
pr_err("do_update_uid, open " SYSTEM_PACKAGES_LIST_PATH
|
||||||
" failed: %d\n",
|
" failed: %ld\n",
|
||||||
ERR_PTR(fp));
|
PTR_ERR(fp));
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -54,37 +56,40 @@ static void do_update_uid(struct work_struct *work)
|
|||||||
char chr = 0;
|
char chr = 0;
|
||||||
loff_t pos = 0;
|
loff_t pos = 0;
|
||||||
loff_t line_start = 0;
|
loff_t line_start = 0;
|
||||||
char buf[128];
|
char buf[KSU_MAX_PACKAGE_NAME];
|
||||||
for (;;) {
|
for (;;) {
|
||||||
ssize_t count = ksu_kernel_read_compat(fp, &chr, sizeof(chr), &pos);
|
ssize_t count =
|
||||||
|
ksu_kernel_read_compat(fp, &chr, sizeof(chr), &pos);
|
||||||
if (count != sizeof(chr))
|
if (count != sizeof(chr))
|
||||||
break;
|
break;
|
||||||
if (chr != '\n')
|
if (chr != '\n')
|
||||||
continue;
|
continue;
|
||||||
|
|
||||||
count = ksu_kernel_read_compat(fp, buf, sizeof(buf), &line_start);
|
count = ksu_kernel_read_compat(fp, buf, sizeof(buf),
|
||||||
|
&line_start);
|
||||||
|
|
||||||
struct uid_data *data =
|
struct uid_data *data =
|
||||||
kmalloc(sizeof(struct uid_data), GFP_ATOMIC);
|
kzalloc(sizeof(struct uid_data), GFP_ATOMIC);
|
||||||
if (!data) {
|
if (!data) {
|
||||||
goto out;
|
goto out;
|
||||||
}
|
}
|
||||||
|
|
||||||
char *tmp = buf;
|
char *tmp = buf;
|
||||||
const char *delim = " ";
|
const char *delim = " ";
|
||||||
strsep(&tmp, delim); // skip package
|
char *package = strsep(&tmp, delim);
|
||||||
char *uid = strsep(&tmp, delim);
|
char *uid = strsep(&tmp, delim);
|
||||||
if (!uid) {
|
if (!uid || !package) {
|
||||||
pr_err("update_uid: uid is NULL!\n");
|
pr_err("update_uid: package or uid is NULL!\n");
|
||||||
continue;
|
break;
|
||||||
}
|
}
|
||||||
|
|
||||||
u32 res;
|
u32 res;
|
||||||
if (kstrtou32(uid, 10, &res)) {
|
if (kstrtou32(uid, 10, &res)) {
|
||||||
pr_err("update_uid: uid parse err\n");
|
pr_err("update_uid: uid parse err\n");
|
||||||
continue;
|
break;
|
||||||
}
|
}
|
||||||
data->uid = res;
|
data->uid = res;
|
||||||
|
strncpy(data->package, package, KSU_MAX_PACKAGE_NAME);
|
||||||
list_add_tail(&data->list, &uid_list);
|
list_add_tail(&data->list, &uid_list);
|
||||||
// reset line start
|
// reset line start
|
||||||
line_start = pos;
|
line_start = pos;
|
||||||
@@ -136,4 +141,4 @@ int ksu_uid_observer_init()
|
|||||||
int ksu_uid_observer_exit()
|
int ksu_uid_observer_exit()
|
||||||
{
|
{
|
||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -7,4 +7,4 @@ int ksu_uid_observer_exit();
|
|||||||
|
|
||||||
void update_uid();
|
void update_uid();
|
||||||
|
|
||||||
#endif
|
#endif
|
||||||
|
|||||||
18
manager/.gitignore
vendored
18
manager/.gitignore
vendored
@@ -1,17 +1,9 @@
|
|||||||
*.iml
|
*.iml
|
||||||
.gradle
|
.gradle
|
||||||
/local.properties
|
|
||||||
/.idea/caches
|
|
||||||
/.idea/libraries
|
|
||||||
/.idea/modules.xml
|
|
||||||
/.idea/workspace.xml
|
|
||||||
/.idea/navEditor.xml
|
|
||||||
/.idea/assetWizardSettings.xml
|
|
||||||
.DS_Store
|
|
||||||
/build
|
|
||||||
/captures
|
|
||||||
.externalNativeBuild
|
|
||||||
.cxx
|
|
||||||
local.properties
|
local.properties
|
||||||
sign.properties
|
.idea
|
||||||
|
.DS_Store
|
||||||
|
build
|
||||||
|
captures
|
||||||
|
.cxx
|
||||||
key.jks
|
key.jks
|
||||||
|
|||||||
3
manager/.idea/.gitignore
generated
vendored
3
manager/.idea/.gitignore
generated
vendored
@@ -1,3 +0,0 @@
|
|||||||
# Default ignored files
|
|
||||||
/shelf/
|
|
||||||
/workspace.xml
|
|
||||||
1
manager/.idea/.name
generated
1
manager/.idea/.name
generated
@@ -1 +0,0 @@
|
|||||||
KernelSU
|
|
||||||
6
manager/.idea/compiler.xml
generated
6
manager/.idea/compiler.xml
generated
@@ -1,6 +0,0 @@
|
|||||||
<?xml version="1.0" encoding="UTF-8"?>
|
|
||||||
<project version="4">
|
|
||||||
<component name="CompilerConfiguration">
|
|
||||||
<bytecodeTargetLevel target="11" />
|
|
||||||
</component>
|
|
||||||
</project>
|
|
||||||
20
manager/.idea/gradle.xml
generated
20
manager/.idea/gradle.xml
generated
@@ -1,20 +0,0 @@
|
|||||||
<?xml version="1.0" encoding="UTF-8"?>
|
|
||||||
<project version="4">
|
|
||||||
<component name="GradleMigrationSettings" migrationVersion="1" />
|
|
||||||
<component name="GradleSettings">
|
|
||||||
<option name="linkedExternalProjectsSettings">
|
|
||||||
<GradleProjectSettings>
|
|
||||||
<option name="testRunner" value="GRADLE" />
|
|
||||||
<option name="distributionType" value="DEFAULT_WRAPPED" />
|
|
||||||
<option name="externalProjectPath" value="$PROJECT_DIR$" />
|
|
||||||
<option name="gradleJvm" value="Embedded JDK" />
|
|
||||||
<option name="modules">
|
|
||||||
<set>
|
|
||||||
<option value="$PROJECT_DIR$" />
|
|
||||||
<option value="$PROJECT_DIR$/app" />
|
|
||||||
</set>
|
|
||||||
</option>
|
|
||||||
</GradleProjectSettings>
|
|
||||||
</option>
|
|
||||||
</component>
|
|
||||||
</project>
|
|
||||||
37
manager/.idea/inspectionProfiles/Project_Default.xml
generated
37
manager/.idea/inspectionProfiles/Project_Default.xml
generated
@@ -1,37 +0,0 @@
|
|||||||
<component name="InspectionProjectProfileManager">
|
|
||||||
<profile version="1.0">
|
|
||||||
<option name="myName" value="Project Default" />
|
|
||||||
<inspection_tool class="PreviewAnnotationInFunctionWithParameters" enabled="true" level="ERROR" enabled_by_default="true">
|
|
||||||
<option name="composableFile" value="true" />
|
|
||||||
<option name="previewFile" value="true" />
|
|
||||||
</inspection_tool>
|
|
||||||
<inspection_tool class="PreviewDimensionRespectsLimit" enabled="true" level="WARNING" enabled_by_default="true">
|
|
||||||
<option name="composableFile" value="true" />
|
|
||||||
<option name="previewFile" value="true" />
|
|
||||||
</inspection_tool>
|
|
||||||
<inspection_tool class="PreviewFontScaleMustBeGreaterThanZero" enabled="true" level="ERROR" enabled_by_default="true">
|
|
||||||
<option name="composableFile" value="true" />
|
|
||||||
<option name="previewFile" value="true" />
|
|
||||||
</inspection_tool>
|
|
||||||
<inspection_tool class="PreviewMultipleParameterProviders" enabled="true" level="ERROR" enabled_by_default="true">
|
|
||||||
<option name="composableFile" value="true" />
|
|
||||||
<option name="previewFile" value="true" />
|
|
||||||
</inspection_tool>
|
|
||||||
<inspection_tool class="PreviewMustBeTopLevelFunction" enabled="true" level="ERROR" enabled_by_default="true">
|
|
||||||
<option name="composableFile" value="true" />
|
|
||||||
<option name="previewFile" value="true" />
|
|
||||||
</inspection_tool>
|
|
||||||
<inspection_tool class="PreviewNeedsComposableAnnotation" enabled="true" level="ERROR" enabled_by_default="true">
|
|
||||||
<option name="composableFile" value="true" />
|
|
||||||
<option name="previewFile" value="true" />
|
|
||||||
</inspection_tool>
|
|
||||||
<inspection_tool class="PreviewNotSupportedInUnitTestFiles" enabled="true" level="ERROR" enabled_by_default="true">
|
|
||||||
<option name="composableFile" value="true" />
|
|
||||||
<option name="previewFile" value="true" />
|
|
||||||
</inspection_tool>
|
|
||||||
<inspection_tool class="PreviewPickerAnnotation" enabled="true" level="ERROR" enabled_by_default="true">
|
|
||||||
<option name="composableFile" value="true" />
|
|
||||||
<option name="previewFile" value="true" />
|
|
||||||
</inspection_tool>
|
|
||||||
</profile>
|
|
||||||
</component>
|
|
||||||
10
manager/.idea/misc.xml
generated
10
manager/.idea/misc.xml
generated
@@ -1,10 +0,0 @@
|
|||||||
<?xml version="1.0" encoding="UTF-8"?>
|
|
||||||
<project version="4">
|
|
||||||
<component name="ExternalStorageConfigurationManager" enabled="true" />
|
|
||||||
<component name="ProjectRootManager" version="2" languageLevel="JDK_11" project-jdk-name="1.8" project-jdk-type="JavaSDK">
|
|
||||||
<output url="file://$PROJECT_DIR$/build/classes" />
|
|
||||||
</component>
|
|
||||||
<component name="ProjectType">
|
|
||||||
<option name="id" value="Android" />
|
|
||||||
</component>
|
|
||||||
</project>
|
|
||||||
6
manager/.idea/vcs.xml
generated
6
manager/.idea/vcs.xml
generated
@@ -1,6 +0,0 @@
|
|||||||
<?xml version="1.0" encoding="UTF-8"?>
|
|
||||||
<project version="4">
|
|
||||||
<component name="VcsDirectoryMappings">
|
|
||||||
<mapping directory="$PROJECT_DIR$/.." vcs="Git" />
|
|
||||||
</component>
|
|
||||||
</project>
|
|
||||||
@@ -1,37 +1,52 @@
|
|||||||
import com.android.build.gradle.internal.api.BaseVariantOutputImpl
|
import com.android.build.gradle.internal.api.BaseVariantOutputImpl
|
||||||
|
|
||||||
plugins {
|
plugins {
|
||||||
id("com.android.application")
|
alias(libs.plugins.agp.app)
|
||||||
id("com.google.devtools.ksp")
|
alias(libs.plugins.kotlin)
|
||||||
kotlin("android")
|
alias(libs.plugins.ksp)
|
||||||
|
alias(libs.plugins.lsplugin.apksign)
|
||||||
|
id("kotlin-parcelize")
|
||||||
|
}
|
||||||
|
|
||||||
|
val managerVersionCode: Int by rootProject.extra
|
||||||
|
val managerVersionName: String by rootProject.extra
|
||||||
|
|
||||||
|
apksign {
|
||||||
|
storeFileProperty = "KEYSTORE_FILE"
|
||||||
|
storePasswordProperty = "KEYSTORE_PASSWORD"
|
||||||
|
keyAliasProperty = "KEY_ALIAS"
|
||||||
|
keyPasswordProperty = "KEY_PASSWORD"
|
||||||
}
|
}
|
||||||
|
|
||||||
android {
|
android {
|
||||||
namespace = "me.weishu.kernelsu"
|
namespace = "me.weishu.kernelsu"
|
||||||
|
|
||||||
ndkVersion = "25.1.8937393"
|
buildTypes {
|
||||||
|
release {
|
||||||
defaultConfig {
|
isMinifyEnabled = true
|
||||||
testInstrumentationRunner = "androidx.test.runner.AndroidJUnitRunner"
|
isShrinkResources = true
|
||||||
|
proguardFiles(getDefaultProguardFile("proguard-android-optimize.txt"), "proguard-rules.pro")
|
||||||
ndk {
|
|
||||||
abiFilters += listOf("arm64-v8a", "x86_64")
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
lint {
|
|
||||||
checkReleaseBuilds = false
|
|
||||||
}
|
|
||||||
|
|
||||||
buildFeatures {
|
buildFeatures {
|
||||||
|
aidl = true
|
||||||
|
buildConfig = true
|
||||||
compose = true
|
compose = true
|
||||||
}
|
}
|
||||||
|
|
||||||
composeOptions {
|
kotlinOptions {
|
||||||
kotlinCompilerExtensionVersion = "1.3.2"
|
jvmTarget = "17"
|
||||||
}
|
}
|
||||||
|
|
||||||
packagingOptions {
|
composeOptions {
|
||||||
|
kotlinCompilerExtensionVersion = "1.4.3"
|
||||||
|
}
|
||||||
|
|
||||||
|
packaging {
|
||||||
|
jniLibs {
|
||||||
|
useLegacyPackaging = true
|
||||||
|
}
|
||||||
resources {
|
resources {
|
||||||
excludes += "/META-INF/{AL2.0,LGPL2.1}"
|
excludes += "/META-INF/{AL2.0,LGPL2.1}"
|
||||||
}
|
}
|
||||||
@@ -39,15 +54,14 @@ android {
|
|||||||
|
|
||||||
externalNativeBuild {
|
externalNativeBuild {
|
||||||
cmake {
|
cmake {
|
||||||
path(file("src/main/cpp/CMakeLists.txt"))
|
path("src/main/cpp/CMakeLists.txt")
|
||||||
version = "3.18.1"
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
applicationVariants.all {
|
applicationVariants.all {
|
||||||
outputs.forEach {
|
outputs.forEach {
|
||||||
val output = it as BaseVariantOutputImpl
|
val output = it as BaseVariantOutputImpl
|
||||||
output.outputFileName = "KernelSU_$versionName-${buildType.name}.apk"
|
output.outputFileName = "KernelSU_${managerVersionName}_${managerVersionCode}-$name.apk"
|
||||||
}
|
}
|
||||||
|
|
||||||
kotlin.sourceSets {
|
kotlin.sourceSets {
|
||||||
@@ -59,40 +73,47 @@ android {
|
|||||||
}
|
}
|
||||||
|
|
||||||
dependencies {
|
dependencies {
|
||||||
val accompanistVersion = "0.28.0"
|
implementation(libs.androidx.activity.compose)
|
||||||
val composeDestinationsVersion = "1.7.27-beta"
|
implementation(libs.androidx.navigation.compose)
|
||||||
implementation(platform("androidx.compose:compose-bom:2023.04.00"))
|
|
||||||
debugImplementation("androidx.compose.ui:ui-test-manifest")
|
|
||||||
debugImplementation("androidx.compose.ui:ui-tooling")
|
|
||||||
implementation("androidx.activity:activity-compose:1.7.0")
|
|
||||||
implementation("androidx.compose.material:material:1.5.0-alpha01")
|
|
||||||
implementation("androidx.compose.material:material-icons-extended")
|
|
||||||
implementation("androidx.compose.material3:material3")
|
|
||||||
implementation("androidx.compose.ui:ui")
|
|
||||||
implementation("androidx.compose.ui:ui-tooling-preview")
|
|
||||||
implementation("androidx.core:core-ktx:1.9.0")
|
|
||||||
implementation("androidx.lifecycle:lifecycle-viewmodel-compose:2.6.1")
|
|
||||||
implementation("androidx.navigation:navigation-compose:2.5.3")
|
|
||||||
implementation("com.google.accompanist:accompanist-drawablepainter:$accompanistVersion")
|
|
||||||
implementation("com.google.accompanist:accompanist-navigation-animation:$accompanistVersion")
|
|
||||||
implementation("com.google.accompanist:accompanist-systemuicontroller:$accompanistVersion")
|
|
||||||
implementation("io.github.raamcosta.compose-destinations:animations-core:$composeDestinationsVersion")
|
|
||||||
|
|
||||||
implementation("io.coil-kt:coil-compose:2.3.0")
|
implementation(platform(libs.androidx.compose.bom))
|
||||||
implementation("me.zhanghai.android.appiconloader:appiconloader-coil:1.5.0")
|
implementation(libs.androidx.compose.material.icons.extended)
|
||||||
|
implementation(libs.androidx.compose.material)
|
||||||
|
implementation(libs.androidx.compose.material3)
|
||||||
|
implementation(libs.androidx.compose.ui)
|
||||||
|
implementation(libs.androidx.compose.ui.tooling.preview)
|
||||||
|
|
||||||
val libsuVersion = "5.0.5"
|
debugImplementation(libs.androidx.compose.ui.test.manifest)
|
||||||
// change to official build(com.github.topjohnwu.libsu) when this pr is merged:
|
debugImplementation(libs.androidx.compose.ui.tooling)
|
||||||
// https://github.com/topjohnwu/libsu/pull/151
|
|
||||||
implementation("com.github.tiann.libsu:core:$libsuVersion")
|
|
||||||
implementation("com.github.tiann.libsu:service:$libsuVersion")
|
|
||||||
implementation("dev.rikka.rikkax.parcelablelist:parcelablelist:2.0.0")
|
|
||||||
|
|
||||||
implementation("com.github.alorma:compose-settings-ui-m3:0.22.0")
|
implementation(libs.androidx.lifecycle.runtime.compose)
|
||||||
|
implementation(libs.androidx.lifecycle.runtime.ktx)
|
||||||
|
implementation(libs.androidx.lifecycle.viewmodel.compose)
|
||||||
|
|
||||||
ksp("io.github.raamcosta.compose-destinations:ksp:$composeDestinationsVersion")
|
implementation(libs.com.google.accompanist.drawablepainter)
|
||||||
|
implementation(libs.com.google.accompanist.navigation.animation)
|
||||||
|
implementation(libs.com.google.accompanist.systemuicontroller)
|
||||||
|
implementation(libs.com.google.accompanist.webview)
|
||||||
|
|
||||||
testImplementation("junit:junit:4.13.2")
|
implementation(libs.compose.destinations.animations.core)
|
||||||
androidTestImplementation("androidx.test.ext:junit:1.1.4")
|
ksp(libs.compose.destinations.ksp)
|
||||||
androidTestImplementation("androidx.test.espresso:espresso-core:3.5.0")
|
|
||||||
|
implementation(libs.com.github.topjohnwu.libsu.core)
|
||||||
|
implementation(libs.com.github.topjohnwu.libsu.service)
|
||||||
|
implementation(libs.com.github.topjohnwu.libsu.io)
|
||||||
|
|
||||||
|
implementation(libs.dev.rikka.rikkax.parcelablelist)
|
||||||
|
|
||||||
|
implementation(libs.io.coil.kt.coil.compose)
|
||||||
|
|
||||||
|
implementation(libs.kotlinx.coroutines.core)
|
||||||
|
|
||||||
|
implementation(libs.me.zhanghai.android.appiconloader.coil)
|
||||||
|
|
||||||
|
implementation(libs.sheet.compose.dialogs.core)
|
||||||
|
implementation(libs.sheet.compose.dialogs.list)
|
||||||
|
implementation(libs.sheet.compose.dialogs.input)
|
||||||
|
|
||||||
|
implementation(libs.markdown)
|
||||||
|
implementation(libs.androidx.webkit)
|
||||||
}
|
}
|
||||||
|
|||||||
30
manager/app/proguard-rules.pro
vendored
30
manager/app/proguard-rules.pro
vendored
@@ -1,21 +1,9 @@
|
|||||||
# Add project specific ProGuard rules here.
|
-dontwarn org.bouncycastle.jsse.BCSSLParameters
|
||||||
# You can control the set of applied configuration files using the
|
-dontwarn org.bouncycastle.jsse.BCSSLSocket
|
||||||
# proguardFiles setting in build.gradle.
|
-dontwarn org.bouncycastle.jsse.provider.BouncyCastleJsseProvider
|
||||||
#
|
-dontwarn org.conscrypt.Conscrypt$Version
|
||||||
# For more details, see
|
-dontwarn org.conscrypt.Conscrypt
|
||||||
# http://developer.android.com/guide/developing/tools/proguard.html
|
-dontwarn org.conscrypt.ConscryptHostnameVerifier
|
||||||
|
-dontwarn org.openjsse.javax.net.ssl.SSLParameters
|
||||||
# If your project uses WebView with JS, uncomment the following
|
-dontwarn org.openjsse.javax.net.ssl.SSLSocket
|
||||||
# and specify the fully qualified class name to the JavaScript interface
|
-dontwarn org.openjsse.net.ssl.OpenJSSE
|
||||||
# class:
|
|
||||||
#-keepclassmembers class fqcn.of.javascript.interface.for.webview {
|
|
||||||
# public *;
|
|
||||||
#}
|
|
||||||
|
|
||||||
# Uncomment this to preserve the line number information for
|
|
||||||
# debugging stack traces.
|
|
||||||
#-keepattributes SourceFile,LineNumberTable
|
|
||||||
|
|
||||||
# If you keep the line number information, uncomment this to
|
|
||||||
# hide the original source file name.
|
|
||||||
#-renamesourcefileattribute SourceFile
|
|
||||||
|
|||||||
@@ -1,24 +0,0 @@
|
|||||||
package me.weishu.kernelsu
|
|
||||||
|
|
||||||
import androidx.test.platform.app.InstrumentationRegistry
|
|
||||||
import androidx.test.ext.junit.runners.AndroidJUnit4
|
|
||||||
|
|
||||||
import org.junit.Test
|
|
||||||
import org.junit.runner.RunWith
|
|
||||||
|
|
||||||
import org.junit.Assert.*
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Instrumented test, which will execute on an Android device.
|
|
||||||
*
|
|
||||||
* See [testing documentation](http://d.android.com/tools/testing).
|
|
||||||
*/
|
|
||||||
@RunWith(AndroidJUnit4::class)
|
|
||||||
class ExampleInstrumentedTest {
|
|
||||||
@Test
|
|
||||||
fun useAppContext() {
|
|
||||||
// Context of the app under test.
|
|
||||||
val appContext = InstrumentationRegistry.getInstrumentation().targetContext
|
|
||||||
assertEquals("me.weishu.kernelsu", appContext.packageName)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
@@ -2,18 +2,19 @@
|
|||||||
<manifest xmlns:android="http://schemas.android.com/apk/res/android"
|
<manifest xmlns:android="http://schemas.android.com/apk/res/android"
|
||||||
xmlns:tools="http://schemas.android.com/tools">
|
xmlns:tools="http://schemas.android.com/tools">
|
||||||
|
|
||||||
|
<uses-permission android:name="android.permission.INTERNET" />
|
||||||
|
|
||||||
<application
|
<application
|
||||||
android:name=".KernelSUApplication"
|
android:name=".KernelSUApplication"
|
||||||
android:allowBackup="true"
|
android:allowBackup="true"
|
||||||
android:dataExtractionRules="@xml/data_extraction_rules"
|
android:dataExtractionRules="@xml/data_extraction_rules"
|
||||||
android:fullBackupContent="@xml/backup_rules"
|
|
||||||
android:enableOnBackInvokedCallback="true"
|
android:enableOnBackInvokedCallback="true"
|
||||||
android:extractNativeLibs="true"
|
android:fullBackupContent="@xml/backup_rules"
|
||||||
android:icon="@mipmap/ic_launcher"
|
android:icon="@mipmap/ic_launcher"
|
||||||
android:label="@string/app_name"
|
android:label="@string/app_name"
|
||||||
android:supportsRtl="true"
|
android:supportsRtl="true"
|
||||||
android:theme="@style/Theme.KernelSU"
|
android:theme="@style/Theme.KernelSU"
|
||||||
tools:targetApi="31">
|
tools:targetApi="33">
|
||||||
<activity
|
<activity
|
||||||
android:name=".ui.MainActivity"
|
android:name=".ui.MainActivity"
|
||||||
android:exported="true"
|
android:exported="true"
|
||||||
|
|||||||
@@ -3,15 +3,16 @@
|
|||||||
#include <sys/prctl.h>
|
#include <sys/prctl.h>
|
||||||
|
|
||||||
#include <android/log.h>
|
#include <android/log.h>
|
||||||
|
#include <cstring>
|
||||||
|
|
||||||
#include "ksu.h"
|
#include "ksu.h"
|
||||||
|
|
||||||
#define LOG_TAG "KernelSu"
|
#define LOG_TAG "KernelSU"
|
||||||
#define LOGD(...) __android_log_print(ANDROID_LOG_DEBUG, LOG_TAG, __VA_ARGS__)
|
#define LOGD(...) __android_log_print(ANDROID_LOG_DEBUG, LOG_TAG, __VA_ARGS__)
|
||||||
|
|
||||||
extern "C"
|
extern "C"
|
||||||
JNIEXPORT jboolean JNICALL
|
JNIEXPORT jboolean JNICALL
|
||||||
Java_me_weishu_kernelsu_Natives_becomeManager(JNIEnv *env, jclass clazz, jstring pkg) {
|
Java_me_weishu_kernelsu_Natives_becomeManager(JNIEnv *env, jobject, jstring pkg) {
|
||||||
auto cpkg = env->GetStringUTFChars(pkg, nullptr);
|
auto cpkg = env->GetStringUTFChars(pkg, nullptr);
|
||||||
auto result = become_manager(cpkg);
|
auto result = become_manager(cpkg);
|
||||||
env->ReleaseStringUTFChars(pkg, cpkg);
|
env->ReleaseStringUTFChars(pkg, cpkg);
|
||||||
@@ -20,13 +21,13 @@ Java_me_weishu_kernelsu_Natives_becomeManager(JNIEnv *env, jclass clazz, jstring
|
|||||||
|
|
||||||
extern "C"
|
extern "C"
|
||||||
JNIEXPORT jint JNICALL
|
JNIEXPORT jint JNICALL
|
||||||
Java_me_weishu_kernelsu_Natives_getVersion(JNIEnv *env, jclass clazz) {
|
Java_me_weishu_kernelsu_Natives_getVersion(JNIEnv *env, jobject) {
|
||||||
return get_version();
|
return get_version();
|
||||||
}
|
}
|
||||||
|
|
||||||
extern "C"
|
extern "C"
|
||||||
JNIEXPORT jintArray JNICALL
|
JNIEXPORT jintArray JNICALL
|
||||||
Java_me_weishu_kernelsu_Natives_getAllowList(JNIEnv *env, jclass clazz) {
|
Java_me_weishu_kernelsu_Natives_getAllowList(JNIEnv *env, jobject) {
|
||||||
int uids[1024];
|
int uids[1024];
|
||||||
int size = 0;
|
int size = 0;
|
||||||
bool result = get_allow_list(uids, &size);
|
bool result = get_allow_list(uids, &size);
|
||||||
@@ -39,31 +40,253 @@ Java_me_weishu_kernelsu_Natives_getAllowList(JNIEnv *env, jclass clazz) {
|
|||||||
return env->NewIntArray(0);
|
return env->NewIntArray(0);
|
||||||
}
|
}
|
||||||
|
|
||||||
extern "C"
|
|
||||||
JNIEXPORT jintArray JNICALL
|
|
||||||
Java_me_weishu_kernelsu_Natives_getDenyList(JNIEnv *env, jclass clazz) {
|
|
||||||
int uids[1024];
|
|
||||||
int size = 0;
|
|
||||||
bool result = get_deny_list(uids, &size);
|
|
||||||
if (result) {
|
|
||||||
// success!
|
|
||||||
auto array = env->NewIntArray(size);
|
|
||||||
env->SetIntArrayRegion(array, 0, size, uids);
|
|
||||||
return array;
|
|
||||||
}
|
|
||||||
return env->NewIntArray(0);
|
|
||||||
}
|
|
||||||
|
|
||||||
extern "C"
|
|
||||||
JNIEXPORT jboolean JNICALL
|
|
||||||
Java_me_weishu_kernelsu_Natives_allowRoot(JNIEnv *env, jclass clazz, jint uid, jboolean allow) {
|
|
||||||
return allow_su(uid, allow);
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
extern "C"
|
extern "C"
|
||||||
JNIEXPORT jboolean JNICALL
|
JNIEXPORT jboolean JNICALL
|
||||||
Java_me_weishu_kernelsu_Natives_isSafeMode(JNIEnv *env, jclass clazz) {
|
Java_me_weishu_kernelsu_Natives_isSafeMode(JNIEnv *env, jclass clazz) {
|
||||||
return is_safe_mode();
|
return is_safe_mode();
|
||||||
|
}
|
||||||
|
|
||||||
|
static void fillIntArray(JNIEnv *env, jobject list, int *data, int count) {
|
||||||
|
auto cls = env->GetObjectClass(list);
|
||||||
|
auto add = env->GetMethodID(cls, "add", "(Ljava/lang/Object;)Z");
|
||||||
|
auto integerCls = env->FindClass("java/lang/Integer");
|
||||||
|
auto constructor = env->GetMethodID(integerCls, "<init>", "(I)V");
|
||||||
|
for (int i = 0; i < count; ++i) {
|
||||||
|
auto integer = env->NewObject(integerCls, constructor, data[i]);
|
||||||
|
env->CallBooleanMethod(list, add, integer);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
static void addIntToList(JNIEnv *env, jobject list, int ele) {
|
||||||
|
auto cls = env->GetObjectClass(list);
|
||||||
|
auto add = env->GetMethodID(cls, "add", "(Ljava/lang/Object;)Z");
|
||||||
|
auto integerCls = env->FindClass("java/lang/Integer");
|
||||||
|
auto constructor = env->GetMethodID(integerCls, "<init>", "(I)V");
|
||||||
|
auto integer = env->NewObject(integerCls, constructor, ele);
|
||||||
|
env->CallBooleanMethod(list, add, integer);
|
||||||
|
}
|
||||||
|
|
||||||
|
static uint64_t capListToBits(JNIEnv *env, jobject list) {
|
||||||
|
auto cls = env->GetObjectClass(list);
|
||||||
|
auto get = env->GetMethodID(cls, "get", "(I)Ljava/lang/Object;");
|
||||||
|
auto size = env->GetMethodID(cls, "size", "()I");
|
||||||
|
auto listSize = env->CallIntMethod(list, size);
|
||||||
|
auto integerCls = env->FindClass("java/lang/Integer");
|
||||||
|
auto intValue = env->GetMethodID(integerCls, "intValue", "()I");
|
||||||
|
uint64_t result = 0;
|
||||||
|
for (int i = 0; i < listSize; ++i) {
|
||||||
|
auto integer = env->CallObjectMethod(list, get, i);
|
||||||
|
int data = env->CallIntMethod(integer, intValue);
|
||||||
|
|
||||||
|
if (cap_valid(data)) {
|
||||||
|
result |= (1ULL << data);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
return result;
|
||||||
|
}
|
||||||
|
|
||||||
|
static int getListSize(JNIEnv *env, jobject list) {
|
||||||
|
auto cls = env->GetObjectClass(list);
|
||||||
|
auto size = env->GetMethodID(cls, "size", "()I");
|
||||||
|
return env->CallIntMethod(list, size);
|
||||||
|
}
|
||||||
|
|
||||||
|
static void fillArrayWithList(JNIEnv *env, jobject list, int *data, int count) {
|
||||||
|
auto cls = env->GetObjectClass(list);
|
||||||
|
auto get = env->GetMethodID(cls, "get", "(I)Ljava/lang/Object;");
|
||||||
|
auto integerCls = env->FindClass("java/lang/Integer");
|
||||||
|
auto intValue = env->GetMethodID(integerCls, "intValue", "()I");
|
||||||
|
for (int i = 0; i < count; ++i) {
|
||||||
|
auto integer = env->CallObjectMethod(list, get, i);
|
||||||
|
data[i] = env->CallIntMethod(integer, intValue);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
extern "C"
|
||||||
|
JNIEXPORT jobject JNICALL
|
||||||
|
Java_me_weishu_kernelsu_Natives_getAppProfile(JNIEnv *env, jobject, jstring pkg, jint uid) {
|
||||||
|
if (env->GetStringLength(pkg) > KSU_MAX_PACKAGE_NAME) {
|
||||||
|
return nullptr;
|
||||||
|
}
|
||||||
|
|
||||||
|
p_key_t key = {};
|
||||||
|
auto cpkg = env->GetStringUTFChars(pkg, nullptr);
|
||||||
|
strcpy(key, cpkg);
|
||||||
|
env->ReleaseStringUTFChars(pkg, cpkg);
|
||||||
|
|
||||||
|
app_profile profile = {};
|
||||||
|
profile.version = KSU_APP_PROFILE_VER;
|
||||||
|
|
||||||
|
strcpy(profile.key, key);
|
||||||
|
profile.current_uid = uid;
|
||||||
|
|
||||||
|
bool useDefaultProfile = !get_app_profile(key, &profile);
|
||||||
|
|
||||||
|
auto cls = env->FindClass("me/weishu/kernelsu/Natives$Profile");
|
||||||
|
auto constructor = env->GetMethodID(cls, "<init>", "()V");
|
||||||
|
auto obj = env->NewObject(cls, constructor);
|
||||||
|
auto keyField = env->GetFieldID(cls, "name", "Ljava/lang/String;");
|
||||||
|
auto currentUidField = env->GetFieldID(cls, "currentUid", "I");
|
||||||
|
auto allowSuField = env->GetFieldID(cls, "allowSu", "Z");
|
||||||
|
|
||||||
|
auto rootUseDefaultField = env->GetFieldID(cls, "rootUseDefault", "Z");
|
||||||
|
auto rootTemplateField = env->GetFieldID(cls, "rootTemplate", "Ljava/lang/String;");
|
||||||
|
|
||||||
|
auto uidField = env->GetFieldID(cls, "uid", "I");
|
||||||
|
auto gidField = env->GetFieldID(cls, "gid", "I");
|
||||||
|
auto groupsField = env->GetFieldID(cls, "groups", "Ljava/util/List;");
|
||||||
|
auto capabilitiesField = env->GetFieldID(cls, "capabilities", "Ljava/util/List;");
|
||||||
|
auto domainField = env->GetFieldID(cls, "context", "Ljava/lang/String;");
|
||||||
|
auto namespacesField = env->GetFieldID(cls, "namespace", "I");
|
||||||
|
|
||||||
|
auto nonRootUseDefaultField = env->GetFieldID(cls, "nonRootUseDefault", "Z");
|
||||||
|
auto umountModulesField = env->GetFieldID(cls, "umountModules", "Z");
|
||||||
|
|
||||||
|
env->SetObjectField(obj, keyField, env->NewStringUTF(profile.key));
|
||||||
|
env->SetIntField(obj, currentUidField, profile.current_uid);
|
||||||
|
|
||||||
|
if (useDefaultProfile) {
|
||||||
|
// no profile found, so just use default profile:
|
||||||
|
// don't allow root and use default profile!
|
||||||
|
LOGD("use default profile for: %s, %d", key, uid);
|
||||||
|
|
||||||
|
// allow_su = false
|
||||||
|
// non root use default = true
|
||||||
|
env->SetBooleanField(obj, allowSuField, false);
|
||||||
|
env->SetBooleanField(obj, nonRootUseDefaultField, true);
|
||||||
|
|
||||||
|
return obj;
|
||||||
|
}
|
||||||
|
|
||||||
|
auto allowSu = profile.allow_su;
|
||||||
|
|
||||||
|
if (allowSu) {
|
||||||
|
env->SetBooleanField(obj, rootUseDefaultField, (jboolean) profile.rp_config.use_default);
|
||||||
|
if (strlen(profile.rp_config.template_name) > 0) {
|
||||||
|
env->SetObjectField(obj, rootTemplateField,
|
||||||
|
env->NewStringUTF(profile.rp_config.template_name));
|
||||||
|
}
|
||||||
|
|
||||||
|
env->SetIntField(obj, uidField, profile.rp_config.profile.uid);
|
||||||
|
env->SetIntField(obj, gidField, profile.rp_config.profile.gid);
|
||||||
|
|
||||||
|
jobject groupList = env->GetObjectField(obj, groupsField);
|
||||||
|
int groupCount = profile.rp_config.profile.groups_count;
|
||||||
|
if (groupCount > KSU_MAX_GROUPS) {
|
||||||
|
LOGD("kernel group count too large: %d???", groupCount);
|
||||||
|
groupCount = KSU_MAX_GROUPS;
|
||||||
|
}
|
||||||
|
fillIntArray(env, groupList, profile.rp_config.profile.groups, groupCount);
|
||||||
|
|
||||||
|
jobject capList = env->GetObjectField(obj, capabilitiesField);
|
||||||
|
for (int i = 0; i <= CAP_LAST_CAP; i++) {
|
||||||
|
if (profile.rp_config.profile.capabilities.effective & (1ULL << i)) {
|
||||||
|
addIntToList(env, capList, i);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
env->SetObjectField(obj, domainField,
|
||||||
|
env->NewStringUTF(profile.rp_config.profile.selinux_domain));
|
||||||
|
env->SetIntField(obj, namespacesField, profile.rp_config.profile.namespaces);
|
||||||
|
env->SetBooleanField(obj, allowSuField, profile.allow_su);
|
||||||
|
} else {
|
||||||
|
env->SetBooleanField(obj, nonRootUseDefaultField,
|
||||||
|
(jboolean) profile.nrp_config.use_default);
|
||||||
|
env->SetBooleanField(obj, umountModulesField, profile.nrp_config.profile.umount_modules);
|
||||||
|
}
|
||||||
|
|
||||||
|
return obj;
|
||||||
|
}
|
||||||
|
|
||||||
|
extern "C"
|
||||||
|
JNIEXPORT jboolean JNICALL
|
||||||
|
Java_me_weishu_kernelsu_Natives_setAppProfile(JNIEnv *env, jobject clazz, jobject profile) {
|
||||||
|
auto cls = env->FindClass("me/weishu/kernelsu/Natives$Profile");
|
||||||
|
|
||||||
|
auto keyField = env->GetFieldID(cls, "name", "Ljava/lang/String;");
|
||||||
|
auto currentUidField = env->GetFieldID(cls, "currentUid", "I");
|
||||||
|
auto allowSuField = env->GetFieldID(cls, "allowSu", "Z");
|
||||||
|
|
||||||
|
auto rootUseDefaultField = env->GetFieldID(cls, "rootUseDefault", "Z");
|
||||||
|
auto rootTemplateField = env->GetFieldID(cls, "rootTemplate", "Ljava/lang/String;");
|
||||||
|
|
||||||
|
auto uidField = env->GetFieldID(cls, "uid", "I");
|
||||||
|
auto gidField = env->GetFieldID(cls, "gid", "I");
|
||||||
|
auto groupsField = env->GetFieldID(cls, "groups", "Ljava/util/List;");
|
||||||
|
auto capabilitiesField = env->GetFieldID(cls, "capabilities", "Ljava/util/List;");
|
||||||
|
auto domainField = env->GetFieldID(cls, "context", "Ljava/lang/String;");
|
||||||
|
auto namespacesField = env->GetFieldID(cls, "namespace", "I");
|
||||||
|
|
||||||
|
auto nonRootUseDefaultField = env->GetFieldID(cls, "nonRootUseDefault", "Z");
|
||||||
|
auto umountModulesField = env->GetFieldID(cls, "umountModules", "Z");
|
||||||
|
|
||||||
|
auto key = env->GetObjectField(profile, keyField);
|
||||||
|
if (!key) {
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
if (env->GetStringLength((jstring) key) > KSU_MAX_PACKAGE_NAME) {
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
|
||||||
|
auto cpkg = env->GetStringUTFChars((jstring) key, nullptr);
|
||||||
|
p_key_t p_key = {};
|
||||||
|
strcpy(p_key, cpkg);
|
||||||
|
env->ReleaseStringUTFChars((jstring) key, cpkg);
|
||||||
|
|
||||||
|
auto currentUid = env->GetIntField(profile, currentUidField);
|
||||||
|
|
||||||
|
auto uid = env->GetIntField(profile, uidField);
|
||||||
|
auto gid = env->GetIntField(profile, gidField);
|
||||||
|
auto groups = env->GetObjectField(profile, groupsField);
|
||||||
|
auto capabilities = env->GetObjectField(profile, capabilitiesField);
|
||||||
|
auto domain = env->GetObjectField(profile, domainField);
|
||||||
|
auto allowSu = env->GetBooleanField(profile, allowSuField);
|
||||||
|
auto umountModules = env->GetBooleanField(profile, umountModulesField);
|
||||||
|
|
||||||
|
app_profile p = {};
|
||||||
|
p.version = KSU_APP_PROFILE_VER;
|
||||||
|
|
||||||
|
strcpy(p.key, p_key);
|
||||||
|
p.allow_su = allowSu;
|
||||||
|
p.current_uid = currentUid;
|
||||||
|
|
||||||
|
if (allowSu) {
|
||||||
|
p.rp_config.use_default = env->GetBooleanField(profile, rootUseDefaultField);
|
||||||
|
auto templateName = env->GetObjectField(profile, rootTemplateField);
|
||||||
|
if (templateName) {
|
||||||
|
auto ctemplateName = env->GetStringUTFChars((jstring) templateName, nullptr);
|
||||||
|
strcpy(p.rp_config.template_name, ctemplateName);
|
||||||
|
env->ReleaseStringUTFChars((jstring) templateName, ctemplateName);
|
||||||
|
}
|
||||||
|
|
||||||
|
p.rp_config.profile.uid = uid;
|
||||||
|
p.rp_config.profile.gid = gid;
|
||||||
|
|
||||||
|
int groups_count = getListSize(env, groups);
|
||||||
|
if (groups_count > KSU_MAX_GROUPS) {
|
||||||
|
LOGD("groups count too large: %d", groups_count);
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
p.rp_config.profile.groups_count = groups_count;
|
||||||
|
fillArrayWithList(env, groups, p.rp_config.profile.groups, groups_count);
|
||||||
|
|
||||||
|
p.rp_config.profile.capabilities.effective = capListToBits(env, capabilities);
|
||||||
|
|
||||||
|
auto cdomain = env->GetStringUTFChars((jstring) domain, nullptr);
|
||||||
|
strcpy(p.rp_config.profile.selinux_domain, cdomain);
|
||||||
|
env->ReleaseStringUTFChars((jstring) domain, cdomain);
|
||||||
|
|
||||||
|
p.rp_config.profile.namespaces = env->GetIntField(profile, namespacesField);
|
||||||
|
} else {
|
||||||
|
p.nrp_config.use_default = env->GetBooleanField(profile, nonRootUseDefaultField);
|
||||||
|
p.nrp_config.profile.umount_modules = umountModules;
|
||||||
|
}
|
||||||
|
|
||||||
|
return set_app_profile(&p);
|
||||||
|
}
|
||||||
|
extern "C"
|
||||||
|
JNIEXPORT jboolean JNICALL
|
||||||
|
Java_me_weishu_kernelsu_Natives_uidShouldUmount(JNIEnv *env, jobject thiz, jint uid) {
|
||||||
|
return uid_should_umount(uid);
|
||||||
}
|
}
|
||||||
@@ -18,10 +18,16 @@
|
|||||||
#define CMD_GET_VERSION 2
|
#define CMD_GET_VERSION 2
|
||||||
#define CMD_ALLOW_SU 3
|
#define CMD_ALLOW_SU 3
|
||||||
#define CMD_DENY_SU 4
|
#define CMD_DENY_SU 4
|
||||||
#define CMD_GET_ALLOW_LIST 5
|
#define CMD_GET_SU_LIST 5
|
||||||
#define CMD_GET_DENY_LIST 6
|
#define CMD_GET_DENY_LIST 6
|
||||||
#define CMD_CHECK_SAFEMODE 9
|
#define CMD_CHECK_SAFEMODE 9
|
||||||
|
|
||||||
|
#define CMD_GET_APP_PROFILE 10
|
||||||
|
#define CMD_SET_APP_PROFILE 11
|
||||||
|
|
||||||
|
#define CMD_IS_UID_GRANTED_ROOT 12
|
||||||
|
#define CMD_IS_UID_SHOULD_UMOUNT 13
|
||||||
|
|
||||||
static bool ksuctl(int cmd, void* arg1, void* arg2) {
|
static bool ksuctl(int cmd, void* arg1, void* arg2) {
|
||||||
int32_t result = 0;
|
int32_t result = 0;
|
||||||
prctl(KERNEL_SU_OPTION, cmd, arg1, arg2, &result);
|
prctl(KERNEL_SU_OPTION, cmd, arg1, arg2, &result);
|
||||||
@@ -49,19 +55,23 @@ int get_version() {
|
|||||||
return version;
|
return version;
|
||||||
}
|
}
|
||||||
|
|
||||||
bool allow_su(int uid, bool allow) {
|
|
||||||
int cmd = allow ? CMD_ALLOW_SU : CMD_DENY_SU;
|
|
||||||
return ksuctl(cmd, (void*) uid, nullptr);
|
|
||||||
}
|
|
||||||
|
|
||||||
bool get_allow_list(int *uids, int *size) {
|
bool get_allow_list(int *uids, int *size) {
|
||||||
return ksuctl(CMD_GET_ALLOW_LIST, uids, size);
|
return ksuctl(CMD_GET_SU_LIST, uids, size);
|
||||||
}
|
|
||||||
|
|
||||||
bool get_deny_list(int *uids, int *size) {
|
|
||||||
return ksuctl(CMD_GET_DENY_LIST, uids, size);
|
|
||||||
}
|
}
|
||||||
|
|
||||||
bool is_safe_mode() {
|
bool is_safe_mode() {
|
||||||
return ksuctl(CMD_CHECK_SAFEMODE, nullptr, nullptr);
|
return ksuctl(CMD_CHECK_SAFEMODE, nullptr, nullptr);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
bool uid_should_umount(int uid) {
|
||||||
|
bool should;
|
||||||
|
return ksuctl(CMD_IS_UID_SHOULD_UMOUNT, reinterpret_cast<void*>(uid), &should) && should;
|
||||||
|
}
|
||||||
|
|
||||||
|
bool set_app_profile(const app_profile *profile) {
|
||||||
|
return ksuctl(CMD_SET_APP_PROFILE, (void*) profile, nullptr);
|
||||||
|
}
|
||||||
|
|
||||||
|
bool get_app_profile(p_key_t key, app_profile *profile) {
|
||||||
|
return ksuctl(CMD_GET_APP_PROFILE, (void*) profile, nullptr);
|
||||||
|
}
|
||||||
|
|||||||
@@ -5,16 +5,76 @@
|
|||||||
#ifndef KERNELSU_KSU_H
|
#ifndef KERNELSU_KSU_H
|
||||||
#define KERNELSU_KSU_H
|
#define KERNELSU_KSU_H
|
||||||
|
|
||||||
bool become_manager(const char*);
|
#include <linux/capability.h>
|
||||||
|
|
||||||
|
bool become_manager(const char *);
|
||||||
|
|
||||||
int get_version();
|
int get_version();
|
||||||
|
|
||||||
bool allow_su(int uid, bool allow);
|
|
||||||
|
|
||||||
bool get_allow_list(int *uids, int *size);
|
bool get_allow_list(int *uids, int *size);
|
||||||
|
|
||||||
bool get_deny_list(int *uids, int *size);
|
bool uid_should_umount(int uid);
|
||||||
|
|
||||||
bool is_safe_mode();
|
bool is_safe_mode();
|
||||||
|
|
||||||
|
#define KSU_APP_PROFILE_VER 2
|
||||||
|
#define KSU_MAX_PACKAGE_NAME 256
|
||||||
|
// NGROUPS_MAX for Linux is 65535 generally, but we only supports 32 groups.
|
||||||
|
#define KSU_MAX_GROUPS 32
|
||||||
|
#define KSU_SELINUX_DOMAIN 64
|
||||||
|
|
||||||
|
using p_key_t = char[KSU_MAX_PACKAGE_NAME];
|
||||||
|
|
||||||
|
struct root_profile {
|
||||||
|
int32_t uid;
|
||||||
|
int32_t gid;
|
||||||
|
|
||||||
|
int32_t groups_count;
|
||||||
|
int32_t groups[KSU_MAX_GROUPS];
|
||||||
|
|
||||||
|
// kernel_cap_t is u32[2] for capabilities v3
|
||||||
|
struct {
|
||||||
|
uint64_t effective;
|
||||||
|
uint64_t permitted;
|
||||||
|
uint64_t inheritable;
|
||||||
|
} capabilities;
|
||||||
|
|
||||||
|
char selinux_domain[KSU_SELINUX_DOMAIN];
|
||||||
|
|
||||||
|
int32_t namespaces;
|
||||||
|
};
|
||||||
|
|
||||||
|
struct non_root_profile {
|
||||||
|
bool umount_modules;
|
||||||
|
};
|
||||||
|
|
||||||
|
struct app_profile {
|
||||||
|
// It may be utilized for backward compatibility, although we have never explicitly made any promises regarding this.
|
||||||
|
uint32_t version;
|
||||||
|
|
||||||
|
// this is usually the package of the app, but can be other value for special apps
|
||||||
|
char key[KSU_MAX_PACKAGE_NAME];
|
||||||
|
int32_t current_uid;
|
||||||
|
bool allow_su;
|
||||||
|
|
||||||
|
union {
|
||||||
|
struct {
|
||||||
|
bool use_default;
|
||||||
|
char template_name[KSU_MAX_PACKAGE_NAME];
|
||||||
|
|
||||||
|
struct root_profile profile;
|
||||||
|
} rp_config;
|
||||||
|
|
||||||
|
struct {
|
||||||
|
bool use_default;
|
||||||
|
|
||||||
|
struct non_root_profile profile;
|
||||||
|
} nrp_config;
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
bool set_app_profile(const app_profile *profile);
|
||||||
|
|
||||||
|
bool get_app_profile(p_key_t key, app_profile *profile);
|
||||||
|
|
||||||
#endif //KERNELSU_KSU_H
|
#endif //KERNELSU_KSU_H
|
||||||
|
|||||||
@@ -5,6 +5,7 @@ import coil.Coil
|
|||||||
import coil.ImageLoader
|
import coil.ImageLoader
|
||||||
import me.zhanghai.android.appiconloader.coil.AppIconFetcher
|
import me.zhanghai.android.appiconloader.coil.AppIconFetcher
|
||||||
import me.zhanghai.android.appiconloader.coil.AppIconKeyer
|
import me.zhanghai.android.appiconloader.coil.AppIconKeyer
|
||||||
|
import java.io.File
|
||||||
|
|
||||||
lateinit var ksuApp: KernelSUApplication
|
lateinit var ksuApp: KernelSUApplication
|
||||||
|
|
||||||
@@ -24,6 +25,11 @@ class KernelSUApplication : Application() {
|
|||||||
}
|
}
|
||||||
.build()
|
.build()
|
||||||
)
|
)
|
||||||
|
|
||||||
|
val webroot = File(dataDir, "webroot")
|
||||||
|
if (!webroot.exists()) {
|
||||||
|
webroot.mkdir()
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
|
|||||||
@@ -1,26 +0,0 @@
|
|||||||
package me.weishu.kernelsu;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* @author weishu
|
|
||||||
* @date 2022/12/8.
|
|
||||||
*/
|
|
||||||
public final class Natives {
|
|
||||||
|
|
||||||
static {
|
|
||||||
System.loadLibrary("kernelsu");
|
|
||||||
}
|
|
||||||
|
|
||||||
// become root manager, return true if success.
|
|
||||||
public static native boolean becomeManager(String pkg);
|
|
||||||
|
|
||||||
public static native int getVersion();
|
|
||||||
|
|
||||||
// get the uid list of allowed su processes.
|
|
||||||
public static native int[] getAllowList();
|
|
||||||
|
|
||||||
public static native int[] getDenyList();
|
|
||||||
|
|
||||||
public static native boolean allowRoot(int uid, boolean allow);
|
|
||||||
|
|
||||||
public static native boolean isSafeMode();
|
|
||||||
}
|
|
||||||
111
manager/app/src/main/java/me/weishu/kernelsu/Natives.kt
Normal file
111
manager/app/src/main/java/me/weishu/kernelsu/Natives.kt
Normal file
@@ -0,0 +1,111 @@
|
|||||||
|
package me.weishu.kernelsu
|
||||||
|
|
||||||
|
import android.os.Parcelable
|
||||||
|
import androidx.annotation.Keep
|
||||||
|
import androidx.compose.runtime.Immutable
|
||||||
|
import kotlinx.parcelize.Parcelize
|
||||||
|
|
||||||
|
/**
|
||||||
|
* @author weishu
|
||||||
|
* @date 2022/12/8.
|
||||||
|
*/
|
||||||
|
object Natives {
|
||||||
|
// minimal supported kernel version
|
||||||
|
// 10915: allowlist breaking change, add app profile
|
||||||
|
// 10931: app profile struct add 'version' field
|
||||||
|
// 10946: add capabilities
|
||||||
|
// 10977: change groups_count and groups to avoid overflow write
|
||||||
|
// 11071: Fix the issue of failing to set a custom SELinux type.
|
||||||
|
const val MINIMAL_SUPPORTED_KERNEL = 11071
|
||||||
|
|
||||||
|
const val KERNEL_SU_DOMAIN = "u:r:su:s0"
|
||||||
|
|
||||||
|
const val ROOT_UID = 0
|
||||||
|
const val ROOT_GID = 0
|
||||||
|
|
||||||
|
init {
|
||||||
|
System.loadLibrary("kernelsu")
|
||||||
|
}
|
||||||
|
|
||||||
|
// become root manager, return true if success.
|
||||||
|
external fun becomeManager(pkg: String?): Boolean
|
||||||
|
val version: Int
|
||||||
|
external get
|
||||||
|
|
||||||
|
// get the uid list of allowed su processes.
|
||||||
|
val allowList: IntArray
|
||||||
|
external get
|
||||||
|
|
||||||
|
val isSafeMode: Boolean
|
||||||
|
external get
|
||||||
|
|
||||||
|
external fun uidShouldUmount(uid: Int): Boolean
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Get the profile of the given package.
|
||||||
|
* @param key usually the package name
|
||||||
|
* @return return null if failed.
|
||||||
|
*/
|
||||||
|
external fun getAppProfile(key: String?, uid: Int): Profile
|
||||||
|
external fun setAppProfile(profile: Profile?): Boolean
|
||||||
|
|
||||||
|
private const val NON_ROOT_DEFAULT_PROFILE_KEY = "$"
|
||||||
|
private const val NOBODY_UID = 9999
|
||||||
|
|
||||||
|
fun setDefaultUmountModules(umountModules: Boolean): Boolean {
|
||||||
|
Profile(
|
||||||
|
NON_ROOT_DEFAULT_PROFILE_KEY,
|
||||||
|
NOBODY_UID,
|
||||||
|
false,
|
||||||
|
umountModules = umountModules
|
||||||
|
).let {
|
||||||
|
return setAppProfile(it)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
fun isDefaultUmountModules(): Boolean {
|
||||||
|
getAppProfile(NON_ROOT_DEFAULT_PROFILE_KEY, NOBODY_UID).let {
|
||||||
|
return it.umountModules
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
fun requireNewKernel(): Boolean {
|
||||||
|
return version < MINIMAL_SUPPORTED_KERNEL
|
||||||
|
}
|
||||||
|
|
||||||
|
@Immutable
|
||||||
|
@Parcelize
|
||||||
|
@Keep
|
||||||
|
data class Profile(
|
||||||
|
// and there is a default profile for root and non-root
|
||||||
|
val name: String,
|
||||||
|
// current uid for the package, this is convivent for kernel to check
|
||||||
|
// if the package name doesn't match uid, then it should be invalidated.
|
||||||
|
val currentUid: Int = 0,
|
||||||
|
|
||||||
|
// if this is true, kernel will grant root permission to this package
|
||||||
|
val allowSu: Boolean = false,
|
||||||
|
|
||||||
|
// these are used for root profile
|
||||||
|
val rootUseDefault: Boolean = true,
|
||||||
|
val rootTemplate: String? = null,
|
||||||
|
val uid: Int = ROOT_UID,
|
||||||
|
val gid: Int = ROOT_GID,
|
||||||
|
val groups: List<Int> = mutableListOf(),
|
||||||
|
val capabilities: List<Int> = mutableListOf(),
|
||||||
|
val context: String = KERNEL_SU_DOMAIN,
|
||||||
|
val namespace: Int = Namespace.INHERITED.ordinal,
|
||||||
|
|
||||||
|
val nonRootUseDefault: Boolean = true,
|
||||||
|
val umountModules: Boolean = true,
|
||||||
|
var rules: String = "", // this field is save in ksud!!
|
||||||
|
) : Parcelable {
|
||||||
|
enum class Namespace {
|
||||||
|
INHERITED,
|
||||||
|
GLOBAL,
|
||||||
|
INDIVIDUAL,
|
||||||
|
}
|
||||||
|
|
||||||
|
constructor() : this("")
|
||||||
|
}
|
||||||
|
}
|
||||||
Some files were not shown because too many files have changed in this diff Show More
Reference in New Issue
Block a user