Browse Source
use faster submodule urls (github etc) (#143)
use faster submodule urls (github etc) (#143)
Signed-off-by: swurl <swurl@swurl.xyz> Reviewed-on: https://git.eden-emu.dev/eden-emu/eden/pulls/143 Co-authored-by: swurl <swurl@swurl.xyz> Co-committed-by: swurl <swurl@swurl.xyz>pull/125/head
committed by
crueter
8 changed files with 426 additions and 13 deletions
-
26.gitmodules
-
19externals/libadrenotools/lib/linkernsbypass/CMakeLists.txt
-
24externals/libadrenotools/lib/linkernsbypass/LICENSE
-
9externals/libadrenotools/lib/linkernsbypass/README.md
-
192externals/libadrenotools/lib/linkernsbypass/android_linker_ns.cpp
-
81externals/libadrenotools/lib/linkernsbypass/android_linker_ns.h
-
67externals/libadrenotools/lib/linkernsbypass/elf_soname_patcher.cpp
-
21externals/libadrenotools/lib/linkernsbypass/elf_soname_patcher.h
@ -0,0 +1,19 @@ |
|||
cmake_minimum_required(VERSION 3.14) |
|||
|
|||
if(NOT ${CMAKE_ANDROID_ARCH_ABI} STREQUAL arm64-v8a) |
|||
message(FATAL_ERROR "Unsupported target architecture: ${CMAKE_ANDROID_ARCH_ABI}. Please make an issue on the repo!") |
|||
endif() |
|||
|
|||
project(linkernsbypass LANGUAGES CXX) |
|||
|
|||
set(SOURCES android_linker_ns.cpp |
|||
android_linker_ns.h |
|||
elf_soname_patcher.cpp |
|||
elf_soname_patcher.h) |
|||
|
|||
add_library(linkernsbypass STATIC ${SOURCES}) |
|||
|
|||
|
|||
target_compile_options(linkernsbypass PRIVATE -Wall -Wextra) |
|||
target_link_libraries(linkernsbypass android dl) |
|||
target_include_directories(linkernsbypass PUBLIC .) |
|||
@ -0,0 +1,24 @@ |
|||
BSD 2-Clause License |
|||
|
|||
Copyright (c) 2021, Billy Laws |
|||
|
|||
Redistribution and use in source and binary forms, with or without |
|||
modification, are permitted provided that the following conditions are met: |
|||
|
|||
1. Redistributions of source code must retain the above copyright notice, this |
|||
list of conditions and the following disclaimer. |
|||
|
|||
2. Redistributions in binary form must reproduce the above copyright notice, |
|||
this list of conditions and the following disclaimer in the documentation |
|||
and/or other materials provided with the distribution. |
|||
|
|||
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" |
|||
AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE |
|||
IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE |
|||
DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE |
|||
FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL |
|||
DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR |
|||
SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER |
|||
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, |
|||
OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE |
|||
OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. |
|||
@ -0,0 +1,9 @@ |
|||
### Android Linker Namespace Bypass Library |
|||
Provides access to the hidden linker namespace functionality in Android 9+ and exposes an interface for hooking libraries similar to a runtime equivalent of `LD_PRELOAD`. |
|||
See the `android_linker_ns.h` header for an API reference. |
|||
|
|||
#### Support |
|||
Android 9+ |
|||
Arm64 |
|||
|
|||
Android 8 and arm32 could be supported with some trivial changes, feel free to open an issue if you have a use for this library on either of them. |
|||
@ -0,0 +1,192 @@ |
|||
// SPDX-License-Identifier: BSD-2-Clause
|
|||
// Copyright © 2021 Billy Laws
|
|||
|
|||
#include <array>
|
|||
#include <cstdio>
|
|||
#include <cstdlib>
|
|||
#include <errno.h>
|
|||
#include <dlfcn.h>
|
|||
#include <unistd.h>
|
|||
#include <fcntl.h>
|
|||
#include <android/dlext.h>
|
|||
#include <android/log.h>
|
|||
#include <android/api-level.h>
|
|||
#include <sys/mman.h>
|
|||
#include "elf_soname_patcher.h"
|
|||
#include "android_linker_ns.h"
|
|||
|
|||
using loader_android_create_namespace_t = android_namespace_t *(*)(const char *, const char *, const char *, uint64_t, const char *, android_namespace_t *, const void *); |
|||
static loader_android_create_namespace_t loader_android_create_namespace; |
|||
|
|||
static bool lib_loaded; |
|||
|
|||
|
|||
/* Public API */ |
|||
bool linkernsbypass_load_status() { |
|||
return lib_loaded; |
|||
} |
|||
|
|||
struct android_namespace_t *android_create_namespace(const char *name, |
|||
const char *ld_library_path, |
|||
const char *default_library_path, |
|||
uint64_t type, |
|||
const char *permitted_when_isolated_path, |
|||
android_namespace_t *parent_namespace) { |
|||
auto caller{__builtin_return_address(0)}; |
|||
return loader_android_create_namespace(name, ld_library_path, default_library_path, type, |
|||
permitted_when_isolated_path, parent_namespace, caller); |
|||
} |
|||
|
|||
struct android_namespace_t *android_create_namespace_escape(const char *name, |
|||
const char *ld_library_path, |
|||
const char *default_library_path, |
|||
uint64_t type, |
|||
const char *permitted_when_isolated_path, |
|||
android_namespace_t *parent_namespace) { |
|||
auto caller{reinterpret_cast<void *>(&dlopen)}; |
|||
return loader_android_create_namespace(name, ld_library_path, default_library_path, type, |
|||
permitted_when_isolated_path, parent_namespace, caller); |
|||
} |
|||
|
|||
android_get_exported_namespace_t android_get_exported_namespace; |
|||
|
|||
android_link_namespaces_all_libs_t android_link_namespaces_all_libs; |
|||
|
|||
android_link_namespaces_t android_link_namespaces; |
|||
|
|||
bool linkernsbypass_link_namespace_to_default_all_libs(android_namespace_t *to) { |
|||
// Creating a shared namespace with the default parent will give a copy of the default namespace that we can actually access
|
|||
// This is needed since there is no way to access a direct handle to the default namespace as it's not exported
|
|||
static auto defaultNs{android_create_namespace_escape("default_copy", nullptr, nullptr, ANDROID_NAMESPACE_TYPE_SHARED, nullptr, nullptr)}; |
|||
return android_link_namespaces_all_libs(to, defaultNs); |
|||
} |
|||
|
|||
void *linkernsbypass_namespace_dlopen(const char *filename, int flags, android_namespace_t *ns) { |
|||
android_dlextinfo extInfo{ |
|||
.flags = ANDROID_DLEXT_USE_NAMESPACE, |
|||
.library_namespace = ns |
|||
}; |
|||
|
|||
return android_dlopen_ext(filename, flags, &extInfo); |
|||
} |
|||
|
|||
#ifndef __NR_memfd_create
|
|||
#if defined(__aarch64__)
|
|||
#define __NR_memfd_create 279
|
|||
#else
|
|||
#error Unsupported target architecture!
|
|||
#endif
|
|||
#endif
|
|||
|
|||
void *linkernsbypass_namespace_dlopen_unique(const char *libPath, const char *libTargetDir, int flags, android_namespace_t *ns) { |
|||
static std::array<char, PATH_MAX> PathBuf{}; |
|||
|
|||
// Used as a unique ID for overwriting soname and creating target lib files
|
|||
static uint16_t TargetId{}; |
|||
|
|||
int libTargetFd{[&] () { |
|||
if (libTargetDir) { |
|||
snprintf(PathBuf.data(), PathBuf.size(), "%s/%d_patched.so", libTargetDir, TargetId); |
|||
return open(PathBuf.data(), O_CREAT | O_RDWR, S_IRUSR | S_IWUSR); |
|||
} else { |
|||
// If memfd isn't supported errno will contain ENOSYS after calling
|
|||
errno = 0; |
|||
int fd{static_cast<int>(syscall(__NR_memfd_create, libPath, 0))}; |
|||
if (errno == ENOSYS || fd < 0) |
|||
return -1; |
|||
else |
|||
return fd; |
|||
} |
|||
}()}; |
|||
if (libTargetFd == -1) |
|||
return nullptr; |
|||
|
|||
// Partially overwrite soname with 3 digits (replacing lib...) with to make sure a cached so isn't loaded
|
|||
std::array<char, 3> sonameOverwrite{}; |
|||
snprintf(sonameOverwrite.data(), sonameOverwrite.size(), "%03u", TargetId++); |
|||
|
|||
if (!elf_soname_patch(libPath, libTargetFd, sonameOverwrite.data())) |
|||
return nullptr; |
|||
|
|||
// Load our patched library into the hook namespace
|
|||
android_dlextinfo hookExtInfo{ |
|||
.flags = ANDROID_DLEXT_USE_NAMESPACE | ANDROID_DLEXT_USE_LIBRARY_FD, |
|||
.library_fd = libTargetFd, |
|||
.library_namespace = ns |
|||
}; |
|||
|
|||
// Make a path that looks about right
|
|||
snprintf(PathBuf.data(), PathBuf.size(), "/proc/self/fd/%d", libTargetFd); |
|||
|
|||
return android_dlopen_ext(PathBuf.data(), flags, &hookExtInfo); |
|||
} |
|||
|
|||
static void *align_ptr(void *ptr) { |
|||
return reinterpret_cast<void *>(reinterpret_cast<uintptr_t>(ptr) & ~(getpagesize() - 1)); |
|||
} |
|||
|
|||
/* Private */ |
|||
__attribute__((constructor)) static void resolve_linker_symbols() { |
|||
using loader_dlopen_t = void *(*)(const char *, int, const void *); |
|||
|
|||
if (android_get_device_api_level() < 28) |
|||
return; |
|||
|
|||
// ARM64 specific function walking to locate the internal dlopen handler
|
|||
auto loader_dlopen{[]() { |
|||
union BranchLinked { |
|||
uint32_t raw; |
|||
|
|||
struct { |
|||
int32_t offset : 26; //!< 26-bit branch offset
|
|||
uint8_t sig : 6; //!< 6-bit signature
|
|||
}; |
|||
|
|||
bool Verify() { |
|||
return sig == 0x25; |
|||
} |
|||
}; |
|||
static_assert(sizeof(BranchLinked) == 4, "BranchLinked is wrong size"); |
|||
|
|||
// Some devices ship with --X mapping for exexecutables so work around that
|
|||
mprotect(align_ptr(reinterpret_cast<void *>(&dlopen)), getpagesize(), PROT_WRITE | PROT_READ | PROT_EXEC); |
|||
|
|||
// dlopen is just a wrapper for __loader_dlopen that passes the return address as the third arg hence we can just walk it to find __loader_dlopen
|
|||
auto blInstr{reinterpret_cast<BranchLinked *>(&dlopen)}; |
|||
while (!blInstr->Verify()) |
|||
blInstr++; |
|||
|
|||
return reinterpret_cast<loader_dlopen_t>(blInstr + blInstr->offset); |
|||
}()}; |
|||
|
|||
// Protect the loader_dlopen function to remove the BTI attribute (since this is an internal function that isn't intended to be jumped indirectly to)
|
|||
mprotect(align_ptr(reinterpret_cast<void *>(&loader_dlopen)), getpagesize(), PROT_WRITE | PROT_READ | PROT_EXEC); |
|||
|
|||
// Passing dlopen as a caller address tricks the linker into using the internal unrestricted namespace letting us access libraries that are normally forbidden in the classloader namespace imposed on apps
|
|||
auto ldHandle{loader_dlopen("ld-android.so", RTLD_LAZY, reinterpret_cast<void *>(&dlopen))}; |
|||
if (!ldHandle) |
|||
return; |
|||
|
|||
android_link_namespaces_all_libs = reinterpret_cast<android_link_namespaces_all_libs_t>(dlsym(ldHandle, "__loader_android_link_namespaces_all_libs")); |
|||
if (!android_link_namespaces_all_libs) |
|||
return; |
|||
|
|||
android_link_namespaces = reinterpret_cast<android_link_namespaces_t>(dlsym(ldHandle, "__loader_android_link_namespaces")); |
|||
if (!android_link_namespaces) |
|||
return; |
|||
|
|||
auto libdlAndroidHandle{loader_dlopen("libdl_android.so", RTLD_LAZY, reinterpret_cast<void *>(&dlopen))}; |
|||
if (!libdlAndroidHandle) |
|||
return; |
|||
|
|||
loader_android_create_namespace = reinterpret_cast<loader_android_create_namespace_t>(dlsym(libdlAndroidHandle, "__loader_android_create_namespace")); |
|||
if (!loader_android_create_namespace) |
|||
return; |
|||
|
|||
android_get_exported_namespace = reinterpret_cast<android_get_exported_namespace_t>(dlsym(libdlAndroidHandle, "__loader_android_get_exported_namespace")); |
|||
if (!android_get_exported_namespace) |
|||
return; |
|||
|
|||
// Lib is now safe to use
|
|||
lib_loaded = true; |
|||
} |
|||
@ -0,0 +1,81 @@ |
|||
// SPDX-License-Identifier: BSD-2-Clause |
|||
// Copyright © 2021 Billy Laws |
|||
|
|||
#pragma once |
|||
|
|||
#ifdef __cplusplus |
|||
extern "C" { |
|||
#endif |
|||
|
|||
#include <stdint.h> |
|||
|
|||
// https://cs.android.com/android/platform/superproject/+/0a492a4685377d41fef2b12e9af4ebfa6feef9c2:art/libnativeloader/include/nativeloader/dlext_namespaces.h;l=25;bpv=1;bpt=1 |
|||
enum { |
|||
ANDROID_NAMESPACE_TYPE_REGULAR = 0, |
|||
ANDROID_NAMESPACE_TYPE_ISOLATED = 1, |
|||
ANDROID_NAMESPACE_TYPE_SHARED = 2, |
|||
ANDROID_NAMESPACE_TYPE_EXEMPT_LIST_ENABLED = 0x08000000, |
|||
ANDROID_NAMESPACE_TYPE_ALSO_USED_AS_ANONYMOUS = 0x10000000, |
|||
ANDROID_NAMESPACE_TYPE_SHARED_ISOLATED = ANDROID_NAMESPACE_TYPE_SHARED | ANDROID_NAMESPACE_TYPE_ISOLATED, |
|||
}; |
|||
|
|||
/** |
|||
* @brief Checks if linkernsbypass loaded successfully and is safe to use |
|||
* @note IMPORTANT: This should be called before any calls to the rest of the library are made |
|||
* @return true if loading succeeded |
|||
*/ |
|||
bool linkernsbypass_load_status(); |
|||
|
|||
// https://cs.android.com/android/platform/superproject/+/0a492a4685377d41fef2b12e9af4ebfa6feef9c2:art/libnativeloader/include/nativeloader/dlext_namespaces.h;l=86;bpv=1;bpt=1 |
|||
struct android_namespace_t *android_create_namespace(const char *name, |
|||
const char *ld_library_path, |
|||
const char *default_library_path, |
|||
uint64_t type, |
|||
const char *permitted_when_isolated_path, |
|||
struct android_namespace_t *parent_namespace); |
|||
|
|||
struct android_namespace_t *android_create_namespace_escape(const char *name, |
|||
const char *ld_library_path, |
|||
const char *default_library_path, |
|||
uint64_t type, |
|||
const char *permitted_when_isolated_path, |
|||
struct android_namespace_t *parent_namespace); |
|||
|
|||
// https://cs.android.com/android/platform/superproject/+/dcb01ef31026b3b8aeb72dada3370af63fe66bbd:bionic/linker/linker.cpp;l=3554 |
|||
typedef struct android_namespace_t *(*android_get_exported_namespace_t)(const char *); |
|||
extern android_get_exported_namespace_t android_get_exported_namespace; |
|||
|
|||
// https://cs.android.com/android/platform/superproject/+/dcb01ef31026b3b8aeb72dada3370af63fe66bbd:bionic/linker/linker.cpp;l=2499 |
|||
typedef bool (*android_link_namespaces_all_libs_t)(struct android_namespace_t *, struct android_namespace_t *); |
|||
extern android_link_namespaces_all_libs_t android_link_namespaces_all_libs; |
|||
|
|||
// https://cs.android.com/android/platform/superproject/+/dcb01ef31026b3b8aeb72dada3370af63fe66bbd:bionic/linker/linker.cpp;l=2473 |
|||
typedef bool (*android_link_namespaces_t)(struct android_namespace_t *, struct android_namespace_t *, const char *); |
|||
extern android_link_namespaces_t android_link_namespaces; |
|||
|
|||
/** |
|||
* @brief Like android_link_namespaces_all_libs but links from the default namespace |
|||
*/ |
|||
bool linkernsbypass_link_namespace_to_default_all_libs(struct android_namespace_t *to); |
|||
|
|||
/** |
|||
* @brief Loads a library into a namespace |
|||
* @note IMPORTANT: If `filename` is compiled with the '-z global' linker flag and RTLD_GLOBAL is supplied in `flags` the library will be added to the namespace's LD_PRELOAD list |
|||
* @param filename The name of the library to load |
|||
* @param flags The rtld flags for `filename` |
|||
* @param ns The namespace to dlopen into |
|||
*/ |
|||
void *linkernsbypass_namespace_dlopen(const char *filename, int flags, struct android_namespace_t *ns); |
|||
|
|||
/** |
|||
* @brief Force loads a unique instance of a library into a namespace |
|||
* @param libPath The path to the library to load with hooks applied |
|||
* @param libTargetDir A temporary directory to hold the soname patched library at `libPath`, will attempt to use memfd if nullptr |
|||
* @param flags The rtld flags for `libName` |
|||
* @param ns The namespace to dlopen into |
|||
*/ |
|||
void *linkernsbypass_namespace_dlopen_unique(const char *libPath, const char *libTargetDir, int flags, struct android_namespace_t *ns); |
|||
|
|||
#ifdef __cplusplus |
|||
} |
|||
#endif |
|||
@ -0,0 +1,67 @@ |
|||
// SPDX-License-Identifier: BSD-2-Clause
|
|||
// Copyright © 2021 Billy Laws
|
|||
|
|||
#include <initializer_list>
|
|||
#include <cstdint>
|
|||
#include <errno.h>
|
|||
#include <sys/stat.h>
|
|||
#include <sys/mman.h>
|
|||
#include <fcntl.h>
|
|||
#include <unistd.h>
|
|||
#include <link.h>
|
|||
#include <elf.h>
|
|||
#include "elf_soname_patcher.h"
|
|||
|
|||
bool elf_soname_patch(const char *libPath, int targetFd, const char *sonamePatch) { |
|||
struct stat libStat{}; |
|||
if (stat(libPath, &libStat)) |
|||
return false; |
|||
|
|||
if (ftruncate(targetFd, libStat.st_size) == -1) |
|||
return false; |
|||
|
|||
// Map the memory so we can read our elf into it
|
|||
auto mappedLib{reinterpret_cast<uint8_t *>(mmap(nullptr, libStat.st_size, PROT_READ | PROT_WRITE, MAP_SHARED, targetFd, 0))}; |
|||
if (!mappedLib) |
|||
return false; |
|||
|
|||
int libFd{open(libPath, O_RDONLY)}; |
|||
if (libFd == false) |
|||
return false; |
|||
|
|||
// Read lib elf into target file
|
|||
if (read(libFd, mappedLib, libStat.st_size) != libStat.st_size) |
|||
return false; |
|||
|
|||
// No longer needed
|
|||
close(libFd); |
|||
|
|||
auto eHdr{reinterpret_cast<ElfW(Ehdr) *>(mappedLib)}; |
|||
auto sHdrEntries{reinterpret_cast<ElfW(Shdr) *>(mappedLib + eHdr->e_shoff)}; |
|||
|
|||
// Iterate over section headers to find the .dynamic section
|
|||
for (ElfW(Half) i{}; i < eHdr->e_shnum; i++) { |
|||
auto &sHdr{sHdrEntries[i]}; |
|||
if (sHdr.sh_type == SHT_DYNAMIC) { |
|||
auto strTab{reinterpret_cast<char *>(mappedLib + sHdrEntries[sHdr.sh_link].sh_offset)}; |
|||
auto dynHdrEntries{reinterpret_cast<ElfW(Dyn) *>(mappedLib + sHdr.sh_offset)}; |
|||
|
|||
// Iterate over .dynamic entries to find DT_SONAME
|
|||
for (ElfW(Xword) k{}; k < (sHdr.sh_size / sHdr.sh_entsize); k++) { |
|||
auto &dynHdrEntry{dynHdrEntries[k]}; |
|||
if (dynHdrEntry.d_tag == DT_SONAME) { |
|||
char *soname{strTab + dynHdrEntry.d_un.d_val}; |
|||
|
|||
// Partially replace the old soname with the soname patch
|
|||
size_t charIdx{}; |
|||
for (; soname[charIdx] != 0 && sonamePatch[charIdx] != 0; charIdx++) |
|||
soname[charIdx] = sonamePatch[charIdx]; |
|||
|
|||
return true; |
|||
} |
|||
} |
|||
} |
|||
} |
|||
|
|||
return false; |
|||
} |
|||
@ -0,0 +1,21 @@ |
|||
// SPDX-License-Identifier: BSD-2-Clause |
|||
// Copyright © 2021 Billy Laws |
|||
|
|||
#pragma once |
|||
|
|||
#ifdef __cplusplus |
|||
extern "C" { |
|||
#endif |
|||
|
|||
/** |
|||
* @brief Overwrites a portion of the soname in an elf by loading it into shared memory and modifying .dynstr |
|||
* @note IMPORTANT: The supplied soname patch will overwrite the first strlen(sonamePatch) chars of the soname |
|||
* @param elfPath Full path to the elf to patch |
|||
* @param targetFd FD to use for storing the patched library |
|||
* @return True on success |
|||
*/ |
|||
bool elf_soname_patch(const char *elfPath, int targetFd, const char *newSoname); |
|||
|
|||
#ifdef __cplusplus |
|||
} |
|||
#endif |
|||
Write
Preview
Loading…
Cancel
Save
Reference in new issue