Skip to content

Commit c7ce08c

Browse files
committed
Fix DSC locker not working on iOS 16, use ChOma for it instead
1 parent 55fa1d2 commit c7ce08c

File tree

9 files changed

+79
-137
lines changed

9 files changed

+79
-137
lines changed

BaseBin/launchdhook/src/main.m

+16-13
Original file line numberDiff line numberDiff line change
@@ -2,6 +2,7 @@
22
#import <libjailbreak/libjailbreak.h>
33
#import <libjailbreak/util.h>
44
#import <libjailbreak/kernel.h>
5+
#import <libjailbreak/dsc_mlock.h>
56
#import <mach-o/dyld.h>
67
#import <spawn.h>
78
#import <substrate.h>
@@ -79,22 +80,24 @@
7980
initDSCHooks();
8081
initJetsamHook();
8182

82-
// If enabled, reenable oldabi support
83-
jb_set_oldabi_support_enabled(gSystemInfo.jailbreakSettings.oldAbiSupportEnabled);
83+
if (!firstLoad) {
84+
// If enabled, reenable oldabi support
85+
jb_set_oldabi_support_enabled(gSystemInfo.jailbreakSettings.oldAbiSupportEnabled);
8486

8587
#ifdef __arm64e__
86-
if (__builtin_available(iOS 16.0, *)) { /* fall through */ }
87-
else {
88-
// Spinlock panics happen when a lot of processes try to fault in the same TEXT page at the same time
89-
// For some reason, in all panics I personally looked at, the page is inside one of these 5 libraries
90-
// If we mlock all of them (to prevent them from ever being paged out), we can reduce spinlock panics by a significant amount
91-
mlock_library("/System/Library/PrivateFrameworks/BackBoardServices.framework/BackBoardServices");
92-
mlock_library("/System/Library/PrivateFrameworks/HMFoundation.framework/HMFoundation");
93-
mlock_library("/System/Library/PrivateFrameworks/GeoServices.framework/GeoServices");
94-
mlock_library("/System/Library/PrivateFrameworks/BluetoothManager.framework/BluetoothManager");
95-
mlock_library("/System/Library/Frameworks/SystemConfiguration.framework/SystemConfiguration");
96-
}
88+
if (__builtin_available(iOS 16.0, *)) { /* fall through */ }
89+
else {
90+
// Spinlock panics happen when a lot of processes try to fault in the same TEXT page at the same time
91+
// For some reason, in all panics I personally looked at, the page is inside one of these 5 libraries
92+
// If we mlock all of them (to prevent them from ever being paged out), we can reduce spinlock panics by a significant amount
93+
dsc_mlock_library_exec("/System/Library/PrivateFrameworks/BackBoardServices.framework/BackBoardServices");
94+
dsc_mlock_library_exec("/System/Library/PrivateFrameworks/HMFoundation.framework/HMFoundation");
95+
dsc_mlock_library_exec("/System/Library/PrivateFrameworks/GeoServices.framework/GeoServices");
96+
dsc_mlock_library_exec("/System/Library/PrivateFrameworks/BluetoothManager.framework/BluetoothManager");
97+
dsc_mlock_library_exec("/System/Library/Frameworks/SystemConfiguration.framework/SystemConfiguration");
98+
}
9799
#endif
100+
}
98101

99102
// This will ensure launchdhook is always reinjected after userspace reboots
100103
// As this launchd will pass environ to the next launchd...

BaseBin/launchdhook/src/oldabi.c

+2-1
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,5 @@
11
#include "oldabi.h"
2+
#include <libjailbreak/dsc_mlock.h>
23
#include <libjailbreak/util.h>
34
#include <libjailbreak/primitives.h>
45
#include <mach-o/getsect.h>
@@ -17,7 +18,7 @@ int oldabi_patch_library(const char *name, void **backupdata, size_t *backupsize
1718
memcpy(*backupdata, instructions, sectionSize);
1819
}
1920

20-
mlock_dsc(instructions, sectionSize);
21+
dsc_mlock(instructions, sectionSize);
2122

2223
for (int i = 0; i < (sectionSize / sizeof(uint32_t)); i++) {
2324
if ((instructions[i] & 0xfffffc00) == 0xdac11800) {

BaseBin/launchdhook/src/oldabi.h

+1-1
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
#import <stdbool.h>
1+
#include <stdbool.h>
22

33
int jb_set_oldabi_support_enabled(bool enabled);
44
bool jb_is_oldabi_fix_enabled(void);

BaseBin/libjailbreak/Makefile

+2-2
Original file line numberDiff line numberDiff line change
@@ -7,13 +7,13 @@ ADDITIONAL_FLAGS = -g
77

88
CC = clang
99

10-
CFLAGS = -framework Foundation -framework CoreServices -framework Security -framework IOKit -framework IOSurface -I../.include -isysroot $(shell xcrun --sdk iphoneos --show-sdk-path) -arch arm64 -arch arm64e -miphoneos-version-min=15.0 -fobjc-arc -dynamiclib -install_name @loader_path/$(TARGET) -I$(shell brew --prefix)/opt/libarchive/include $(ADDITIONAL_FLAGS)
10+
CFLAGS = -framework Foundation -framework CoreServices -framework Security -framework IOKit -framework IOSurface -I../.include -I../_external/modules/litehook/src -isysroot $(shell xcrun --sdk iphoneos --show-sdk-path) -arch arm64 -arch arm64e -miphoneos-version-min=15.0 -fobjc-arc -dynamiclib -install_name @loader_path/$(TARGET) -I$(shell brew --prefix)/opt/libarchive/include $(ADDITIONAL_FLAGS)
1111
LDFLAGS = -larchive -lbsm -L../.build -lchoma
1212

1313
sign: $(TARGET)
1414
@ldid -S $<
1515

16-
$(TARGET): $(wildcard src/*.c src/*.m src/*.S)
16+
$(TARGET): $(wildcard src/*.c src/*.m src/*.S ../_external/modules/litehook/src/*.c)
1717
$(CC) $(CFLAGS) $(LDFLAGS) -o $@ $^
1818

1919
clean:

BaseBin/libjailbreak/src/dsc_mlock.c

+52
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,52 @@
1+
#include "dsc_mlock.h"
2+
#include <mach-o/dyld_images.h>
3+
#include <sys/mman.h>
4+
#include <dispatch/dispatch.h>
5+
#include <choma/MachO.h>
6+
#include <litehook.h>
7+
8+
DyldSharedCache *_get_live_dsc(void)
9+
{
10+
static DyldSharedCache *liveDSC = NULL;
11+
static dispatch_once_t ot;
12+
dispatch_once(&ot, ^{
13+
liveDSC = dsc_init_from_path(litehook_locate_dsc());
14+
});
15+
return liveDSC;
16+
}
17+
18+
int dsc_mlock_unslid(uint64_t unslid_addr, size_t size)
19+
{
20+
void *ptr = dsc_find_buffer(_get_live_dsc(), unslid_addr, size);
21+
if (!ptr) return -1;
22+
return mlock(ptr, size);
23+
}
24+
25+
int dsc_mlock(void *addr, size_t size)
26+
{
27+
static uint64_t dscSlide = 0;
28+
static dispatch_once_t ot;
29+
dispatch_once(&ot, ^{
30+
task_dyld_info_data_t dyldInfo;
31+
uint32_t count = TASK_DYLD_INFO_COUNT;
32+
task_info(mach_task_self_, TASK_DYLD_INFO, (task_info_t)&dyldInfo, &count);
33+
struct dyld_all_image_infos *infos = (struct dyld_all_image_infos *)dyldInfo.all_image_info_addr;
34+
dscSlide = infos->sharedCacheSlide;
35+
});
36+
return dsc_mlock_unslid((uint64_t)addr - dscSlide, size);
37+
}
38+
39+
int dsc_mlock_library_exec(const char *name)
40+
{
41+
MachO *macho = dsc_lookup_macho_by_path(_get_live_dsc(), name, NULL);
42+
if (!macho) return -1;
43+
44+
__block int r = 0;
45+
macho_enumerate_segments(macho, ^(struct segment_command_64 *segment, bool *stop) {
46+
if (segment->initprot & PROT_EXEC) {
47+
r = dsc_mlock_unslid(segment->vmaddr, segment->vmsize);
48+
if (r != 0) *stop = true;
49+
}
50+
});
51+
return r;
52+
}

BaseBin/libjailbreak/src/dsc_mlock.h

+5
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,5 @@
1+
#include <choma/DyldSharedCache.h>
2+
3+
int dsc_mlock_unslid(uint64_t unslid_addr, size_t size);
4+
int dsc_mlock(void *addr, size_t size);
5+
int dsc_mlock_library_exec(const char *name);

BaseBin/libjailbreak/src/util.c

-116
Original file line numberDiff line numberDiff line change
@@ -540,122 +540,6 @@ void proc_allow_all_syscalls(uint64_t proc)
540540
}
541541
}
542542

543-
struct dsc_text_segment {
544-
void *mapping;
545-
uint64_t offset;
546-
uint64_t address;
547-
uint64_t size;
548-
};
549-
550-
int mlock_dsc_unslid(uint64_t unslid_addr, size_t size)
551-
{
552-
static struct dsc_text_segment *segments = NULL;
553-
static int segmentCount = 0;
554-
static dispatch_once_t ot;
555-
dispatch_once(&ot, ^{
556-
const char *dscPath = "/System/Library/Caches/com.apple.dyld";
557-
DIR *dir = opendir(dscPath);
558-
if (!dir) {
559-
return;
560-
}
561-
562-
struct dirent *entry;
563-
564-
while ((entry = readdir(dir)) != NULL) {
565-
if (entry->d_name[0] == '.') {
566-
continue; // Skip "." and ".." entries
567-
}
568-
569-
const char *ext = strrchr(entry->d_name, '.');
570-
if (ext && strcmp(ext, ".symbols") == 0) {
571-
continue; // Skip files with ".symbols" extension
572-
}
573-
574-
char filePath[PATH_MAX];
575-
snprintf(filePath, sizeof(filePath), "%s/%s", dscPath, entry->d_name);
576-
577-
int fd = open(filePath, O_RDONLY);
578-
if (fd < 0) {
579-
continue;
580-
}
581-
582-
struct stat sb;
583-
if (fstat(fd, &sb) != 0) {
584-
continue;
585-
}
586-
587-
void *localMap = mmap(NULL, sb.st_size, PROT_READ, MAP_SHARED, fd, 0);
588-
if (localMap == MAP_FAILED) {
589-
continue;
590-
}
591-
592-
struct dyld_cache_header *header = (struct dyld_cache_header *)localMap;
593-
for (uint32_t i = 0; i < header->mappingCount; i++) {
594-
uint32_t curMappingOff = header->mappingOffset + (i * sizeof(struct dyld_cache_mapping_info));
595-
struct dyld_cache_mapping_info *curMapping = (struct dyld_cache_mapping_info *)((uint8_t *)localMap + curMappingOff);
596-
597-
if (curMapping->initProt & PROT_EXEC) {
598-
void *textMap = mmap(NULL, curMapping->size, PROT_READ, MAP_SHARED, fd, curMapping->fileOffset);
599-
if (textMap != MAP_FAILED) {
600-
segmentCount++;
601-
segments = realloc(segments, segmentCount * sizeof(struct dsc_text_segment));
602-
if (!segments) {
603-
munmap(textMap, curMapping->size);
604-
break;
605-
}
606-
segments[segmentCount - 1] = (struct dsc_text_segment){
607-
.mapping = textMap,
608-
.offset = curMapping->fileOffset,
609-
.address = curMapping->address,
610-
.size = curMapping->size,
611-
};
612-
}
613-
}
614-
}
615-
616-
munmap(localMap, sb.st_size);
617-
close(fd);
618-
}
619-
});
620-
621-
for (int i = 0; i < segmentCount; i++) {
622-
struct dsc_text_segment *curSegment = &segments[i];
623-
if (unslid_addr >= curSegment->address && (unslid_addr + size) < (curSegment->address + curSegment->size)) {
624-
uint64_t rel = unslid_addr - curSegment->address;
625-
void *start = (void *)((uint64_t)curSegment->mapping + rel);
626-
return mlock(start, size);
627-
}
628-
}
629-
630-
return -1;
631-
}
632-
633-
int mlock_dsc(void *addr, size_t size)
634-
{
635-
static uint64_t dscSlide = 0;
636-
static dispatch_once_t ot;
637-
dispatch_once(&ot, ^{
638-
task_dyld_info_data_t dyldInfo;
639-
uint32_t count = TASK_DYLD_INFO_COUNT;
640-
task_info(mach_task_self_, TASK_DYLD_INFO, (task_info_t)&dyldInfo, &count);
641-
struct dyld_all_image_infos *infos = (struct dyld_all_image_infos *)dyldInfo.all_image_info_addr;
642-
dscSlide = infos->sharedCacheSlide;
643-
});
644-
return mlock_dsc_unslid((uint64_t)addr - dscSlide, size);
645-
}
646-
647-
int mlock_library(const char *name)
648-
{
649-
dlopen(name, RTLD_NOW);
650-
const struct mach_header *mh = get_mach_header(name);
651-
if (!mh) return -1;
652-
653-
unsigned long sectionSize = 0;
654-
uint32_t *instructions = (uint32_t *)getsectiondata((const struct mach_header_64 *)mh, "__TEXT", "__text", &sectionSize);
655-
656-
return mlock_dsc(instructions, sectionSize);
657-
}
658-
659543
int cmd_wait_for_exit(pid_t pid)
660544
{
661545
int status = 0;

BaseBin/libjailbreak/src/util.h

-3
Original file line numberDiff line numberDiff line change
@@ -39,9 +39,6 @@ uint64_t kptr_sign(uint64_t kaddr, uint64_t pointer, uint16_t salt);
3939

4040
void proc_allow_all_syscalls(uint64_t proc);
4141

42-
int mlock_dsc(void *addr, size_t size);
43-
int mlock_library(const char *name);
44-
4542
void killall(const char *executablePathToKill, bool softly);
4643
int libarchive_unarchive(const char *fileToExtract, const char *extractionPath);
4744

0 commit comments

Comments
 (0)