356 lines
12 KiB
Markdown
356 lines
12 KiB
Markdown
# 如何為非 GKI 核心整合 KernelSU {#how-to-integrate-kernelsu-for-non-gki-kernels}
|
||
|
||
KernelSU 可以被整合到非 GKI 核心中,現在它最低支援到核心 4.14 版本;理論上也可以支援更低的版本。
|
||
|
||
由於非 GKI 核心的片段化極其嚴重,因此通常沒有統一的方法來建置它,所以我們也無法為非 GKI 裝置提供 Boot 映像。但您完全可以自行整合 KernelSU 並建置核心以繼續使用。
|
||
|
||
首先,您必須有能力從您裝置的核心原始碼建置出一個可以開機並且能夠正常使用的核心,如果核心並非開放原始碼,這通常難以做到。
|
||
|
||
如果您已經做好了上述準備,那有兩個方法來將 KernelSU 整合至您的核心之中。
|
||
|
||
1. 藉助 `kprobe` 自動整合
|
||
2. 手動修改核心原始碼
|
||
|
||
## 使用 kprobe 整合 {#integrate-with-kprobe}
|
||
|
||
KernelSU 使用 kprobe 機制來處理核心的相關 hook,如果 *kprobe* 可以在您建置的核心中正常運作,那麼建議使用這個方法進行整合。
|
||
|
||
首先,把 KernelSU 新增至您的核心來源樹狀結構,再核心的根目錄執行以下命令:
|
||
|
||
```sh
|
||
curl -LSs "https://raw.githubusercontent.com/tiann/KernelSU/main/kernel/setup.sh" | bash -s v0.9.5
|
||
```
|
||
|
||
:::info 公告
|
||
[KernelSU 1.0 及更新版本不再支援非 GKI 核心](https://github.com/tiann/KernelSU/issues/1705)。最後一個支援的版本為 `v0.9.5`,請確保使用的版本正確。
|
||
:::
|
||
|
||
然後,您需要檢查您的核心是否啟用 *kprobe*,如果未啟用,則需要新增以下設定:
|
||
|
||
```
|
||
CONFIG_KPROBES=y
|
||
CONFIG_HAVE_KPROBES=y
|
||
CONFIG_KPROBE_EVENTS=y
|
||
```
|
||
|
||
最後,重新建置您的核心即可。
|
||
|
||
如果您發現 KPROBES 仍未生效,很有可能是因為它依賴的 `CONFIG_MODULES` 並未被啟用,如果還是未生效請輸入 `make menuconfig` 搜尋 KPROBES 的其他相依性並啟用。
|
||
|
||
如果您在整合 KernelSU 之後手機無法啟動,那麼很可能您的核心中 **kprobe 無法正常運作**,您需要修正這個錯誤,或者使用第二種方法。
|
||
|
||
:::tip 如何檢查 kprobe 是否損毀?
|
||
|
||
將 `KernelSU/kernel/ksu.c` 中的 `ksu_enable_sucompat()` 和 `ksu_enable_ksud()` 註解掉,如果正常開機,即 kprobe 已損毀;或者您可以手動嘗試使用 kprobe 功能,如果不正常,手機會直接重新啟動。
|
||
:::
|
||
|
||
:::info 如何為非 GKI 核心啟用卸載模組功能
|
||
|
||
如果你的內核版本小於 5.10,你應該將 `path_umount` 向後移植至 `fs/namespace.c`。卸載模組功能依賴於這個函數。如果你沒有向後移植 `path_umount`,卸載模組功能將無法工作。你可以在[這裡查看更多關於 `path_unmount` 的資料](#how-to-backport-path_unpount)。
|
||
:::
|
||
|
||
## 手動修改核心原始碼 {#manually-modify-the-kernel-source}
|
||
|
||
如果 kprobe 無法正常運作 (在4.8之前可能是上游或核心的錯誤),那您可以嘗試這種方法:
|
||
|
||
首先,將 KernelSU 新增至您的原始碼樹狀結構,在核心的根目錄執行以下命令:
|
||
|
||
```sh
|
||
curl -LSs "https://raw.githubusercontent.com/tiann/KernelSU/main/kernel/setup.sh" | bash -s v0.9.5
|
||
```
|
||
請記住,在某些裝置上,您的 `defconfig` 可能位於 `arch/arm64/configs` 中,或在其他情況下位於 `arch/arm64/configs/vendor/你的defconfig` 中。無論您使用哪個 `defconfig`,請確保使用 `CONFIG_KSU=y` 啟用KernelSU,或使用 `n` 停用它。例如,如果您選擇啟用它,則 `defconfig` 應包含以下字串:
|
||
```conf
|
||
# KernelSU
|
||
CONFIG_KSU=y
|
||
```
|
||
|
||
然後,手動修改核心原始碼,您可以參閱下方的 patch:
|
||
|
||
::: code-group
|
||
|
||
```diff[exec.c]
|
||
diff --git a/fs/exec.c b/fs/exec.c
|
||
index ac59664eaecf..bdd585e1d2cc 100644
|
||
--- a/fs/exec.c
|
||
+++ b/fs/exec.c
|
||
@@ -1890,11 +1890,14 @@ static int __do_execve_file(int fd, struct filename *filename,
|
||
return retval;
|
||
}
|
||
|
||
+extern bool ksu_execveat_hook __read_mostly;
|
||
+extern int ksu_handle_execveat(int *fd, struct filename **filename_ptr, void *argv,
|
||
+ void *envp, int *flags);
|
||
+extern int ksu_handle_execveat_sucompat(int *fd, struct filename **filename_ptr,
|
||
+ void *argv, void *envp, int *flags);
|
||
static int do_execveat_common(int fd, struct filename *filename,
|
||
struct user_arg_ptr argv,
|
||
struct user_arg_ptr envp,
|
||
int flags)
|
||
{
|
||
+ if (unlikely(ksu_execveat_hook))
|
||
+ ksu_handle_execveat(&fd, &filename, &argv, &envp, &flags);
|
||
+ else
|
||
+ ksu_handle_execveat_sucompat(&fd, &filename, &argv, &envp, &flags);
|
||
return __do_execve_file(fd, filename, argv, envp, flags, NULL);
|
||
}
|
||
```
|
||
```diff[open.c]
|
||
diff --git a/fs/open.c b/fs/open.c
|
||
index 05036d819197..965b84d486b8 100644
|
||
--- a/fs/open.c
|
||
+++ b/fs/open.c
|
||
@@ -348,6 +348,8 @@ SYSCALL_DEFINE4(fallocate, int, fd, int, mode, loff_t, offset, loff_t, len)
|
||
return ksys_fallocate(fd, mode, offset, len);
|
||
}
|
||
|
||
+extern int ksu_handle_faccessat(int *dfd, const char __user **filename_user, int *mode,
|
||
+ int *flags);
|
||
/*
|
||
* access() needs to use the real uid/gid, not the effective uid/gid.
|
||
* We do this by temporarily clearing all FS-related capabilities and
|
||
@@ -355,6 +357,7 @@ SYSCALL_DEFINE4(fallocate, int, fd, int, mode, loff_t, offset, loff_t, len)
|
||
*/
|
||
long do_faccessat(int dfd, const char __user *filename, int mode)
|
||
{
|
||
const struct cred *old_cred;
|
||
struct cred *override_cred;
|
||
struct path path;
|
||
struct inode *inode;
|
||
struct vfsmount *mnt;
|
||
int res;
|
||
unsigned int lookup_flags = LOOKUP_FOLLOW;
|
||
|
||
+ ksu_handle_faccessat(&dfd, &filename, &mode, NULL);
|
||
|
||
if (mode & ~S_IRWXO) /* where's F_OK, X_OK, W_OK, R_OK? */
|
||
return -EINVAL;
|
||
```
|
||
```diff[read_write.c]
|
||
diff --git a/fs/read_write.c b/fs/read_write.c
|
||
index 650fc7e0f3a6..55be193913b6 100644
|
||
--- a/fs/read_write.c
|
||
+++ b/fs/read_write.c
|
||
@@ -434,10 +434,14 @@ ssize_t kernel_read(struct file *file, void *buf, size_t count, loff_t *pos)
|
||
}
|
||
EXPORT_SYMBOL(kernel_read);
|
||
|
||
+extern bool ksu_vfs_read_hook __read_mostly;
|
||
+extern int ksu_handle_vfs_read(struct file **file_ptr, char __user **buf_ptr,
|
||
+ size_t *count_ptr, loff_t **pos);
|
||
ssize_t vfs_read(struct file *file, char __user *buf, size_t count, loff_t *pos)
|
||
{
|
||
ssize_t ret;
|
||
|
||
+ if (unlikely(ksu_vfs_read_hook))
|
||
+ ksu_handle_vfs_read(&file, &buf, &count, &pos);
|
||
+
|
||
if (!(file->f_mode & FMODE_READ))
|
||
return -EBADF;
|
||
if (!(file->f_mode & FMODE_CAN_READ))
|
||
```
|
||
```diff[stat.c]
|
||
diff --git a/fs/stat.c b/fs/stat.c
|
||
index 376543199b5a..82adcef03ecc 100644
|
||
--- a/fs/stat.c
|
||
+++ b/fs/stat.c
|
||
@@ -148,6 +148,8 @@ int vfs_statx_fd(unsigned int fd, struct kstat *stat,
|
||
}
|
||
EXPORT_SYMBOL(vfs_statx_fd);
|
||
|
||
+extern int ksu_handle_stat(int *dfd, const char __user **filename_user, int *flags);
|
||
+
|
||
/**
|
||
* vfs_statx - Get basic and extra attributes by filename
|
||
* @dfd: A file descriptor representing the base dir for a relative filename
|
||
@@ -170,6 +172,7 @@ int vfs_statx(int dfd, const char __user *filename, int flags,
|
||
int error = -EINVAL;
|
||
unsigned int lookup_flags = LOOKUP_FOLLOW | LOOKUP_AUTOMOUNT;
|
||
|
||
+ ksu_handle_stat(&dfd, &filename, &flags);
|
||
if ((flags & ~(AT_SYMLINK_NOFOLLOW | AT_NO_AUTOMOUNT |
|
||
AT_EMPTY_PATH | KSTAT_QUERY_FLAGS)) != 0)
|
||
return -EINVAL;
|
||
```
|
||
|
||
:::
|
||
|
||
主要修改四個項目:
|
||
|
||
1. do_faccessat,通常位於 `fs/open.c`
|
||
2. do_execveat_common,通常位於 `fs/exec.c`
|
||
3. vfs_read,通常位於 `fs/read_write.c`
|
||
4. vfs_statx,通常位於 `fs/stat.c`
|
||
|
||
如果您的核心沒有 `vfs_statx`,使用 `vfs_fstatat` 將其取代:
|
||
|
||
```diff
|
||
diff --git a/fs/stat.c b/fs/stat.c
|
||
index 068fdbcc9e26..5348b7bb9db2 100644
|
||
--- a/fs/stat.c
|
||
+++ b/fs/stat.c
|
||
@@ -87,6 +87,8 @@ int vfs_fstat(unsigned int fd, struct kstat *stat)
|
||
}
|
||
EXPORT_SYMBOL(vfs_fstat);
|
||
|
||
+extern int ksu_handle_stat(int *dfd, const char __user **filename_user, int *flags);
|
||
+
|
||
int vfs_fstatat(int dfd, const char __user *filename, struct kstat *stat,
|
||
int flag)
|
||
{
|
||
@@ -94,6 +96,8 @@ int vfs_fstatat(int dfd, const char __user *filename, struct kstat *stat,
|
||
int error = -EINVAL;
|
||
unsigned int lookup_flags = 0;
|
||
|
||
+ ksu_handle_stat(&dfd, &filename, &flag);
|
||
+
|
||
if ((flag & ~(AT_SYMLINK_NOFOLLOW | AT_NO_AUTOMOUNT |
|
||
AT_EMPTY_PATH)) != 0)
|
||
goto out;
|
||
```
|
||
|
||
對於早於 4.17 的核心,如果沒有 `do_faccessat`,可以直接找到 `faccessat` 系統呼叫的定義並進行修改:
|
||
|
||
```diff
|
||
diff --git a/fs/open.c b/fs/open.c
|
||
index 2ff887661237..e758d7db7663 100644
|
||
--- a/fs/open.c
|
||
+++ b/fs/open.c
|
||
@@ -355,6 +355,9 @@ SYSCALL_DEFINE4(fallocate, int, fd, int, mode, loff_t, offset, loff_t, len)
|
||
return error;
|
||
}
|
||
|
||
+extern int ksu_handle_faccessat(int *dfd, const char __user **filename_user, int *mode,
|
||
+ int *flags);
|
||
+
|
||
/*
|
||
* access() needs to use the real uid/gid, not the effective uid/gid.
|
||
* We do this by temporarily clearing all FS-related capabilities and
|
||
@@ -370,6 +373,8 @@ SYSCALL_DEFINE3(faccessat, int, dfd, const char __user *, filename, int, mode)
|
||
int res;
|
||
unsigned int lookup_flags = LOOKUP_FOLLOW;
|
||
|
||
+ ksu_handle_faccessat(&dfd, &filename, &mode, NULL);
|
||
+
|
||
if (mode & ~S_IRWXO) /* where's F_OK, X_OK, W_OK, R_OK? */
|
||
return -EINVAL;
|
||
```
|
||
|
||
### 安全模式 {#safe-mode}
|
||
|
||
若要啟用 KernelSU 內建的安全模式,您還需要修改 `drivers/input/input.c` 中的 `input_handle_event` 方法:
|
||
|
||
:::tip 小建議
|
||
強烈建議啟用此功能,如果遇到開機迴圈,這將會非常有用!
|
||
:::
|
||
|
||
```diff
|
||
diff --git a/drivers/input/input.c b/drivers/input/input.c
|
||
index 45306f9ef247..815091ebfca4 100755
|
||
--- a/drivers/input/input.c
|
||
+++ b/drivers/input/input.c
|
||
@@ -367,10 +367,13 @@ static int input_get_disposition(struct input_dev *dev,
|
||
return disposition;
|
||
}
|
||
|
||
+extern bool ksu_input_hook __read_mostly;
|
||
+extern int ksu_handle_input_handle_event(unsigned int *type, unsigned int *code, int *value);
|
||
+
|
||
static void input_handle_event(struct input_dev *dev,
|
||
unsigned int type, unsigned int code, int value)
|
||
{
|
||
int disposition = input_get_disposition(dev, type, code, &value);
|
||
+
|
||
+ if (unlikely(ksu_input_hook))
|
||
+ ksu_handle_input_handle_event(&type, &code, &value);
|
||
|
||
if (disposition != INPUT_IGNORE_EVENT && type != EV_SYN)
|
||
add_input_randomness(type, code, value);
|
||
```
|
||
|
||
:::info 不小心進入安全模式?
|
||
如果您使用手動整合且不停用 `CONFIG_KPROBES`,那麼您將可能會在啟動後透過按下音量來減少按鈕來觸發安全模式!因此,如果使用手動集成,您需要停用 `CONFIG_KPROBES` !
|
||
:::
|
||
|
||
### 無法在終端中執行 `pm` ? {#failed-to-execute-pm-in-terminal}
|
||
|
||
你應該修改 `fs/devpts/inode.c`,參考:
|
||
|
||
```diff
|
||
diff --git a/fs/devpts/inode.c b/fs/devpts/inode.c
|
||
index 32f6f1c68..d69d8eca2 100644
|
||
--- a/fs/devpts/inode.c
|
||
+++ b/fs/devpts/inode.c
|
||
@@ -602,6 +602,8 @@ struct dentry *devpts_pty_new(struct pts_fs_info *fsi, int index, void *priv)
|
||
return dentry;
|
||
}
|
||
|
||
+#ifdef CONFIG_KSU
|
||
+extern int ksu_handle_devpts(struct inode*);
|
||
+#endif
|
||
+
|
||
/**
|
||
* devpts_get_priv -- get private data for a slave
|
||
* @pts_inode: inode of the slave
|
||
@@ -610,6 +612,7 @@ struct dentry *devpts_pty_new(struct pts_fs_info *fsi, int index, void *priv)
|
||
*/
|
||
void *devpts_get_priv(struct dentry *dentry)
|
||
{
|
||
+ #ifdef CONFIG_KSU
|
||
+ ksu_handle_devpts(dentry->d_inode);
|
||
+ #endif
|
||
if (dentry->d_sb->s_magic != DEVPTS_SUPER_MAGIC)
|
||
return NULL;
|
||
return dentry->d_fsdata;
|
||
```
|
||
|
||
### 如何向後移植 path_umount {#how-to-backport-path_unpount}
|
||
|
||
你可以透過向後移植 `path_umount` 來讓卸載模組功能在低於 5.10 的非 GKI 核心上運作。你可以參考這個修改:
|
||
|
||
```diff
|
||
--- a/fs/namespace.c
|
||
+++ b/fs/namespace.c
|
||
@@ -1739,6 +1739,39 @@ static inline bool may_mandlock(void)
|
||
}
|
||
#endif
|
||
|
||
+static int can_umount(const struct path *path, int flags)
|
||
+{
|
||
+ struct mount *mnt = real_mount(path->mnt);
|
||
+
|
||
+ if (flags & ~(MNT_FORCE | MNT_DETACH | MNT_EXPIRE | UMOUNT_NOFOLLOW))
|
||
+ return -EINVAL;
|
||
+ if (!may_mount())
|
||
+ return -EPERM;
|
||
+ if (path->dentry != path->mnt->mnt_root)
|
||
+ return -EINVAL;
|
||
+ if (!check_mnt(mnt))
|
||
+ return -EINVAL;
|
||
+ if (mnt->mnt.mnt_flags & MNT_LOCKED) /* Check optimistically */
|
||
+ return -EINVAL;
|
||
+ if (flags & MNT_FORCE && !capable(CAP_SYS_ADMIN))
|
||
+ return -EPERM;
|
||
+ return 0;
|
||
+}
|
||
+
|
||
+int path_umount(struct path *path, int flags)
|
||
+{
|
||
+ struct mount *mnt = real_mount(path->mnt);
|
||
+ int ret;
|
||
+
|
||
+ ret = can_umount(path, flags);
|
||
+ if (!ret)
|
||
+ ret = do_umount(mnt, flags);
|
||
+
|
||
+ /* we mustn't call path_put() as that would clear mnt_expiry_mark */
|
||
+ dput(path->dentry);
|
||
+ mntput_no_expire(mnt);
|
||
+ return ret;
|
||
+}
|
||
/*
|
||
* Now umount can handle mount points as well as block devices.
|
||
* This is important for filesystems which use unnamed block devices.
|
||
```
|
||
|
||
最後,再次建置您的核心,KernelSU 將會如期運作。
|