From 194ba5820a89d68912d57c41e546e95daad78f54 Mon Sep 17 00:00:00 2001 From: Rifat Azad Date: Mon, 21 Jul 2025 02:10:36 +0600 Subject: [PATCH] kernel: guard syscall hook types - for kernel syscall hooks we need to pass additional guards for ksun (#ifdef CONFIG_KSU -> #if defined(CONFIG_KSU) && !defined(CONFIG_KSU_KPROBES_HOOK)) or else it will fail to build because of undefined symbol - reference https://github.com/KernelSU-Next/kernel_patches/blob/main/syscall_hook/min_scope_syscall_hooks_v1.4.patch --- kernel/ksud.c | 6 ++++-- 1 file changed, 4 insertions(+), 2 deletions(-) diff --git a/kernel/ksud.c b/kernel/ksud.c index adb2e0d4..b8c4f1fb 100644 --- a/kernel/ksud.c +++ b/kernel/ksud.c @@ -58,11 +58,11 @@ static void stop_input_hook(); static struct work_struct stop_vfs_read_work; static struct work_struct stop_execve_hook_work; static struct work_struct stop_input_hook_work; -#endif - +#else bool ksu_vfs_read_hook __read_mostly = true; bool ksu_execveat_hook __read_mostly = true; bool ksu_input_hook __read_mostly = true; +#endif #ifdef CONFIG_KSU_SUSFS_SUS_SU bool susfs_is_sus_su_ready = false; @@ -491,10 +491,12 @@ __maybe_unused int ksu_handle_execve_ksud(const char __user *filename_user, struct filename filename_in, *filename_p; char path[32]; +#ifndef CONFIG_KSU_KPROBES_HOOK // return early if disabled. if (!ksu_execveat_hook) { return 0; } +#endif if (!filename_user) return 0;