website: update how to integrate for non gki (#1282)

This commit is contained in:
igor
2024-01-08 22:16:45 -03:00
committed by GitHub
parent 144b0cc8e9
commit e95e87a7a4
2 changed files with 51 additions and 22 deletions

View File

@@ -62,7 +62,14 @@ curl -LSs "https://raw.githubusercontent.com/tiann/KernelSU/main/kernel/setup.sh
::: :::
Em seguida, adicione chamadas KernelSU à fonte do kernel. Aqui está um patch para referência: Tenha em mente que em alguns dispositivos, seu defconfig pode estar em `arch/arm64/configs` ou em outros casos `arch/arm64/configs/vendor/your_defconfig`. Por exemplo, em seu defconfig, habilite `CONFIG_KSU` com y para habilitar ou n para desabilitar. Seu caminho será algo como:
`arch/arm64/configs/...`
```sh
+# KernelSU
+CONFIG_KSU=y
```
Em seguida, adicione chamadas KernelSU à fonte do kernel. Aqui estão alguns patches para referência:
::: code-group ::: code-group
@@ -75,20 +82,24 @@ index ac59664eaecf..bdd585e1d2cc 100644
return retval; return retval;
} }
+#ifdef CONFIG_KSU
+extern bool ksu_execveat_hook __read_mostly; +extern bool ksu_execveat_hook __read_mostly;
+extern int ksu_handle_execveat(int *fd, struct filename **filename_ptr, void *argv, +extern int ksu_handle_execveat(int *fd, struct filename **filename_ptr, void *argv,
+ void *envp, int *flags); + void *envp, int *flags);
+extern int ksu_handle_execveat_sucompat(int *fd, struct filename **filename_ptr, +extern int ksu_handle_execveat_sucompat(int *fd, struct filename **filename_ptr,
+ void *argv, void *envp, int *flags); + void *argv, void *envp, int *flags);
+#endif
static int do_execveat_common(int fd, struct filename *filename, static int do_execveat_common(int fd, struct filename *filename,
struct user_arg_ptr argv, struct user_arg_ptr argv,
struct user_arg_ptr envp, struct user_arg_ptr envp,
int flags) int flags)
{ {
+ #ifdef CONFIG_KSU
+ if (unlikely(ksu_execveat_hook)) + if (unlikely(ksu_execveat_hook))
+ ksu_handle_execveat(&fd, &filename, &argv, &envp, &flags); + ksu_handle_execveat(&fd, &filename, &argv, &envp, &flags);
+ else + else
+ ksu_handle_execveat_sucompat(&fd, &filename, &argv, &envp, &flags); + ksu_handle_execveat_sucompat(&fd, &filename, &argv, &envp, &flags);
+ #endif
return __do_execve_file(fd, filename, argv, envp, flags, NULL); return __do_execve_file(fd, filename, argv, envp, flags, NULL);
} }
``` ```
@@ -101,11 +112,13 @@ index 05036d819197..965b84d486b8 100644
return ksys_fallocate(fd, mode, offset, len); return ksys_fallocate(fd, mode, offset, len);
} }
+#ifdef CONFIG_KSU
+extern int ksu_handle_faccessat(int *dfd, const char __user **filename_user, int *mode, +extern int ksu_handle_faccessat(int *dfd, const char __user **filename_user, int *mode,
+ int *flags); + int *flags);
+#endif
/* /*
* access() precisa usar o uid/gid real, não o uid/gid efetivo. * access() needs to use the real uid/gid, not the effective uid/gid.
* Fazemos isso limpando temporariamente todos os recursos relacionados ao FS e * We do this by temporarily clearing all FS-related capabilities and
@@ -355,6 +357,7 @@ SYSCALL_DEFINE4(fallocate, int, fd, int, mode, loff_t, offset, loff_t, len) @@ -355,6 +357,7 @@ SYSCALL_DEFINE4(fallocate, int, fd, int, mode, loff_t, offset, loff_t, len)
*/ */
long do_faccessat(int dfd, const char __user *filename, int mode) long do_faccessat(int dfd, const char __user *filename, int mode)
@@ -117,8 +130,9 @@ index 05036d819197..965b84d486b8 100644
struct vfsmount *mnt; struct vfsmount *mnt;
int res; int res;
unsigned int lookup_flags = LOOKUP_FOLLOW; unsigned int lookup_flags = LOOKUP_FOLLOW;
+ #ifdef CONFIG_KSU
+ ksu_handle_faccessat(&dfd, &filename, &mode, NULL); + ksu_handle_faccessat(&dfd, &filename, &mode, NULL);
+ #endif
if (mode & ~S_IRWXO) /* where's F_OK, X_OK, W_OK, R_OK? */ if (mode & ~S_IRWXO) /* where's F_OK, X_OK, W_OK, R_OK? */
return -EINVAL; return -EINVAL;
@@ -132,15 +146,18 @@ index 650fc7e0f3a6..55be193913b6 100644
} }
EXPORT_SYMBOL(kernel_read); EXPORT_SYMBOL(kernel_read);
+#ifdef CONFIG_KSU
+extern bool ksu_vfs_read_hook __read_mostly; +extern bool ksu_vfs_read_hook __read_mostly;
+extern int ksu_handle_vfs_read(struct file **file_ptr, char __user **buf_ptr, +extern int ksu_handle_vfs_read(struct file **file_ptr, char __user **buf_ptr,
+ size_t *count_ptr, loff_t **pos); + size_t *count_ptr, loff_t **pos);
+#endif
ssize_t vfs_read(struct file *file, char __user *buf, size_t count, loff_t *pos) ssize_t vfs_read(struct file *file, char __user *buf, size_t count, loff_t *pos)
{ {
ssize_t ret; ssize_t ret;
+ #ifdef CONFIG_KSU
+ if (unlikely(ksu_vfs_read_hook)) + if (unlikely(ksu_vfs_read_hook))
+ ksu_handle_vfs_read(&file, &buf, &count, &pos); + ksu_handle_vfs_read(&file, &buf, &count, &pos);
+ #endif
+ +
if (!(file->f_mode & FMODE_READ)) if (!(file->f_mode & FMODE_READ))
return -EBADF; return -EBADF;
@@ -155,16 +172,20 @@ index 376543199b5a..82adcef03ecc 100644
} }
EXPORT_SYMBOL(vfs_statx_fd); EXPORT_SYMBOL(vfs_statx_fd);
+#ifdef CONFIG_KSU
+extern int ksu_handle_stat(int *dfd, const char __user **filename_user, int *flags); +extern int ksu_handle_stat(int *dfd, const char __user **filename_user, int *flags);
+#endif
+ +
/** /**
* vfs_statx - Obtenha atributos básicos e extras por filename * vfs_statx - Get basic and extra attributes by filename
* @dfd: Um descritor de arquivo que representa o diretório base para um filename relativo * @dfd: A file descriptor representing the base dir for a relative filename
@@ -170,6 +172,7 @@ int vfs_statx(int dfd, const char __user *filename, int flags, @@ -170,6 +172,7 @@ int vfs_statx(int dfd, const char __user *filename, int flags,
int error = -EINVAL; int error = -EINVAL;
unsigned int lookup_flags = LOOKUP_FOLLOW | LOOKUP_AUTOMOUNT; unsigned int lookup_flags = LOOKUP_FOLLOW | LOOKUP_AUTOMOUNT;
+ #ifdef CONFIG_KSU
+ ksu_handle_stat(&dfd, &filename, &flags); + ksu_handle_stat(&dfd, &filename, &flags);
+ #endif
if ((flags & ~(AT_SYMLINK_NOFOLLOW | AT_NO_AUTOMOUNT | if ((flags & ~(AT_SYMLINK_NOFOLLOW | AT_NO_AUTOMOUNT |
AT_EMPTY_PATH | KSTAT_QUERY_FLAGS)) != 0) AT_EMPTY_PATH | KSTAT_QUERY_FLAGS)) != 0)
return -EINVAL; return -EINVAL;
@@ -190,16 +211,18 @@ index 068fdbcc9e26..5348b7bb9db2 100644
} }
EXPORT_SYMBOL(vfs_fstat); EXPORT_SYMBOL(vfs_fstat);
+#ifdef CONFIG_KSU
+extern int ksu_handle_stat(int *dfd, const char __user **filename_user, int *flags); +extern int ksu_handle_stat(int *dfd, const char __user **filename_user, int *flags);
+ +#endif
int vfs_fstatat(int dfd, const char __user *filename, struct kstat *stat, int vfs_fstatat(int dfd, const char __user *filename, struct kstat *stat,
int flag) int flag)
{ {
@@ -94,6 +96,8 @@ int vfs_fstatat(int dfd, const char __user *filename, struct kstat *stat, @@ -94,6 +96,8 @@ int vfs_fstatat(int dfd, const char __user *filename, struct kstat *stat,
int error = -EINVAL; int error = -EINVAL;
unsigned int lookup_flags = 0; unsigned int lookup_flags = 0;
+ #ifdef CONFIG_KSU
+ ksu_handle_stat(&dfd, &filename, &flag); + ksu_handle_stat(&dfd, &filename, &flag);
+ #endif
+ +
if ((flag & ~(AT_SYMLINK_NOFOLLOW | AT_NO_AUTOMOUNT | if ((flag & ~(AT_SYMLINK_NOFOLLOW | AT_NO_AUTOMOUNT |
AT_EMPTY_PATH)) != 0) AT_EMPTY_PATH)) != 0)
@@ -217,17 +240,20 @@ index 2ff887661237..e758d7db7663 100644
return error; return error;
} }
+#ifdef CONFIG_KSU
+extern int ksu_handle_faccessat(int *dfd, const char __user **filename_user, int *mode, +extern int ksu_handle_faccessat(int *dfd, const char __user **filename_user, int *mode,
+ int *flags); + int *flags);
+#endif
+ +
/* /*
* access() precisa usar o uid/gid real, não o uid/gid efetivo. * access() needs to use the real uid/gid, not the effective uid/gid.
* Fazemos isso limpando temporariamente todos os recursos relacionados ao FS e * We do this by temporarily clearing all FS-related capabilities and
@@ -370,6 +373,8 @@ SYSCALL_DEFINE3(faccessat, int, dfd, const char __user *, filename, int, mode) @@ -370,6 +373,8 @@ SYSCALL_DEFINE3(faccessat, int, dfd, const char __user *, filename, int, mode)
int res; int res;
unsigned int lookup_flags = LOOKUP_FOLLOW; unsigned int lookup_flags = LOOKUP_FOLLOW;
+ #ifdef CONFIG_KSU
+ ksu_handle_faccessat(&dfd, &filename, &mode, NULL); + ksu_handle_faccessat(&dfd, &filename, &mode, NULL);
+ #endif
+ +
if (mode & ~S_IRWXO) /* where's F_OK, X_OK, W_OK, R_OK? */ if (mode & ~S_IRWXO) /* where's F_OK, X_OK, W_OK, R_OK? */
return -EINVAL; return -EINVAL;
@@ -248,16 +274,19 @@ index 45306f9ef247..815091ebfca4 100755
return disposition; return disposition;
} }
+#ifdef CONFIG_KSU
+extern bool ksu_input_hook __read_mostly; +extern bool ksu_input_hook __read_mostly;
+extern int ksu_handle_input_handle_event(unsigned int *type, unsigned int *code, int *value); +extern int ksu_handle_input_handle_event(unsigned int *type, unsigned int *code, int *value);
+#endif
+ +
static void input_handle_event(struct input_dev *dev, static void input_handle_event(struct input_dev *dev,
unsigned int type, unsigned int code, int value) unsigned int type, unsigned int code, int value)
{ {
int disposition = input_get_disposition(dev, type, code, &value); int disposition = input_get_disposition(dev, type, code, &value);
+ + #ifdef CONFIG_KSU
+ if (unlikely(ksu_input_hook)) + if (unlikely(ksu_input_hook))
+ ksu_handle_input_handle_event(&type, &code, &value); + ksu_handle_input_handle_event(&type, &code, &value);
+ #endif
if (disposition != INPUT_IGNORE_EVENT && type != EV_SYN) if (disposition != INPUT_IGNORE_EVENT && type != EV_SYN)
add_input_randomness(type, code, value); add_input_randomness(type, code, value);

View File

@@ -165,7 +165,7 @@ Android-Image-Kitchen não é recomendado agora, porque ele não lida corretamen
O `magiskboot` oficial pode executar o dispositivo `Linux` normalmente. Se você for um usuário Linux, você pode usar a versão oficial. O `magiskboot` oficial pode executar o dispositivo `Linux` normalmente. Se você for um usuário Linux, você pode usar a versão oficial.
::: :::
## Instalar com Recovery personalizado ## Instalar com Recovery personalizado {#install-with-custom-recovery}
Pré-requisito: Seu dispositivo deve ter um Recovery personalizado, como TWRP. Se apenas o Recovery oficial estiver disponível, use outro método. Pré-requisito: Seu dispositivo deve ter um Recovery personalizado, como TWRP. Se apenas o Recovery oficial estiver disponível, use outro método.