Commit Graph

389 Commits

Author SHA1 Message Date
Rifat Azad
14624ea966 kernel: dynamic get_cred_rcu patch for appropriate atomic function and apply patch accordingly 2025-01-17 15:34:34 +06:00
Rifat Azad
6f6dd29306 kernel: auto backport get_cred_rcu 2025-01-16 19:42:38 +06:00
rsuntk
0ada4ee5d4 kernel: improve get_cred_rcu guard
Signed-off-by: rsuntk <rissu.ntk@gmail.com>
2025-01-16 14:32:04 +06:00
rsuntk
3b045f6c16 kernel: Add entries
Signed-off-by: rsuntk <rissu.ntk@gmail.com>
2025-01-16 14:31:31 +06:00
rsuntk
95584df023 kernel: Add fallback if user didn't implement 'get_cred_rcu'
https://github.com/tiann/KernelSU/pull/2320

Signed-off-by: rsuntk <rissu.ntk@gmail.com>
2025-01-16 14:26:52 +06:00
SsageParuders
b18c39e911 Improve seccomp disable && Add locking to protect cred modifications in escape_to_root (#2320)
- When disabling Seccomp, ensure that current->sighand->siglock is held
during the operation.
- Locking to ensure safe access and modification of the `cred` structure
within the `escape_to_root` function.

---

I think this issue described in #2236 may have been caused by concurrent
read-write access without proper locking.

---------

Signed-off-by: SsageParuders<qinqingqing1025@gmail.com>
Signed-off-by: SsageParuders <qinqingqing1025@gmail.com>"
2025-01-16 14:18:26 +06:00
ExtremeXT
72739facc8 kernel: expose allowlist workaround as Kconfig option
Useful for situations where the SU allowlist is not kept after a reboot.
As per upstream this is only used for < 4.10 and Huawei HiSilicon devices.
but theres user reports having issues even on 4.14/4.19 samsung kernels.
Expose this option so users affected can opt-in.

Discussion:
	tiann#1249
	tiann#1346

References:
	tiann@f57d351
	tiann@b61cb30

Credits to respective authors:
	rhjdvsgsgks
	ExtremeXT
2025-01-07 04:59:09 +06:00
rifsxd
5982cdb61d source: minor cleanup 2025-01-01 21:19:50 +06:00
rifsxd
7ea1579bce kernel: try umount /system/etc/hosts & /system_ext 2024-12-31 11:14:39 +06:00
rifsxd
4a07ce7d0b kernel: removed KSU (official) v2 signature size/hash 2024-12-31 11:02:34 +06:00
Loukious
a5f12ffe96 fix: reset ambient capabilities to resolve D-Bus permission issues 2024-12-27 22:39:38 +06:00
Rifat Azad
79d4f99cf4 kernel: small adjustment 2024-12-24 23:31:25 +06:00
Rifat Azad
af5496de80 kernel: auto backport path_umount and can_umount 2024-12-24 08:25:46 +06:00
Rifat Azad
8fbddc959a Revert "kernel: added susfs v1.5.3"
This reverts commit bdf81c0880.
2024-12-24 08:21:10 +06:00
Rifat Azad
bdf81c0880 kernel: added susfs v1.5.3 2024-12-24 07:34:30 +06:00
Rifat Azad
1f58c7bf12 kernel: KSU_NEXT v2 signature size/hash added 2024-12-24 06:59:24 +06:00
Rifat Azad
1a84f69f5c Revert "[1.0] Drop Non-GKI Support (#1483)"
This reverts commit 97d70b40fc.
2024-12-24 06:54:08 +06:00
Rifat Azad
8d2b017c96 kernel: sync with upstream 2024-12-24 06:53:54 +06:00
Rifat Azad
3fd1cf6329 kernel: rename KernelSU -> KernelSU-Next 2024-12-21 02:12:29 +06:00
Rifat Azad
a17ef5634f setup: rename KernelSU -> KernelSU-Next 2024-12-21 02:07:51 +06:00
Rifat Azad
9911795aa3 setup: fixed set-up script 2024-12-18 22:55:30 +06:00
Rifat Azad
868db22b8d setup: changed repo link 2024-12-18 21:55:25 +06:00
Rifat Azad
fd1f829db6 kernel: auto backport path_umount to fs/namespace.c at build time 2024-12-18 21:34:04 +06:00
Rifat Azad
629d878558 kernel: New KSU_NEXT size/hash 2024-12-18 18:03:25 +06:00
rifsxd
57bffb5e7c kernel: fix missing endif in Makefile 2024-12-18 02:26:09 +06:00
backslashxx
36fb6085ef kernel: require path_umount backporting
Most kernel builders have to touch their kernel source code anyway so
we might as well tell them to backport path_umount to achieve some sort
of feature parity.

This enforces a path_umount backport, not a suggestion.
Its a requirement from now on.

You will backport path_umount and you will like it.
2024-12-17 22:45:23 +06:00
ExtremeXT
5f2c1eef9c kernel: expose allowlist workaround as Kconfig option
Useful for situations where the SU allowlist is not kept after a reboot.
As per upstream this is only used for < 4.10 and Huawei HiSilicon devices.
but theres user reports having issues even on 4.14/4.19 samsung kernels.
Expose this option so users affected can opt-in.

Discussion:
	tiann#1249
	tiann#1346

References:
	tiann@f57d351
	tiann@b61cb30

Credits to respective authors:
	rhjdvsgsgks
	ExtremeXT
2024-12-17 20:33:55 +06:00
Rifat Azad
a545a3e81c kernel: slightly polish up code 2024-12-16 02:42:33 +06:00
Rifat Azad
f2fcb3687b kernel: cleaned up remaining susfs code 2024-12-16 00:14:07 +06:00
Rifat Azad
c5847b480c kernel: KSU_VERSION fallback version bumped -> 11998 2024-12-15 06:09:31 +06:00
Rifat Azad
f57d52437c kernel: delete unknown file error 2024-12-13 06:21:41 +06:00
Rifat Azad
98a692370f kernel: Removed SuSFS Patch 2024-12-13 06:21:40 +06:00
Rifat Azad
c1d4f38c19 kernel: added SuSFS version 2024-12-13 06:21:38 +06:00
Rifat Azad
e15516040d Revert "kernel: susfs: CONFIG_KSU_SUSFS_INFO syscall to get susfs version & variant"
This reverts commit b78c9adf49.
2024-12-13 06:21:38 +06:00
Rifat Azad
b78c9adf49 kernel: susfs: CONFIG_KSU_SUSFS_INFO syscall to get susfs version & variant 2024-12-06 22:48:14 +06:00
Rifat Azad
68c9317885 kernel: additional custom v2_signature size/hash 2024-12-04 16:52:55 +06:00
Rifat Azad
a84b3af65d kernel: setup next branch 2024-12-04 16:47:58 +06:00
Rifat Azad
e1d30d55af kernel: implement SuSFS v1.5.2 2024-12-04 16:30:28 +06:00
Huy Minh
3acb13df65 kernel: Relax dentry_path_raw compare in core_hook (#2041)
On Android-x86 (or BlissOS) it initialize Android by using switch_root
or chroot, when checking a path with dentry_path_raw() it will show the
whole real path instead of the path that we want.

Relax the checking requirement by using strstr to look for
"/system/packages.list" in the string instead of requiring the path to
be "/system/packages.list"

This fixes #1783

Signed-off-by: hmtheboy154 <buingoc67@gmail.com>
2024-09-07 10:59:06 +08:00
LoveSy
d9fda971cd Revert "ksud: [Fix] grant root to the shell in debug mode" (#1860)
Reverts tiann/KernelSU#1853
2024-07-06 19:36:37 +08:00
RobinChen
894115e49d ksud: [Fix] grant root to the shell in debug mode (#1853)
Failed to check app_profile version
2024-07-06 13:37:00 +08:00
5ec1cff
77b252a487 throne_tracker: skip iterate if failed to open dir (#1832)
fix https://github.com/tiann/KernelSU/issues/1800
2024-06-19 09:19:04 +08:00
Wang Han
f881eca862 Convert devpts domain to ksu_file (#1801)
AOSP sepolicy does not allow appdomain to open pts. Hence, convert
devpts domain to ksu_file to allow any access.
2024-06-03 21:21:39 +08:00
Ylarod
97d70b40fc [1.0] Drop Non-GKI Support (#1483)
Co-authored-by: weishu <twsxtd@gmail.com>
2024-06-01 14:50:46 +08:00
Rissu
9fc68e2de6 kernel: fix throne_tracker uncompile-able on 4.4 kernel (issue #1771) (#1773)
in kernel v4.7.10:
extern unsigned int __pure full_name_hash(const char *, unsigned int);

in kernel v4.8.0:
extern unsigned int __pure full_name_hash(const void *salt, const char
*, unsigned int);
2024-05-27 10:35:08 +08:00
Juhyung Park
fb1965ea09 Deadlock fixes (#1758)
Hi,

This PR fixes deadlocks that I've noticed within my kernel, with some
minor optimizations around it.

Thanks.

---------

Signed-off-by: Juhyung Park <qkrwngud825@gmail.com>
2024-05-26 17:03:33 +08:00
weishu
8e973bcbd5 kernel: replace devpts kprobe 2024-05-16 17:16:00 +08:00
weishu
5d6ef355ae kernel: Allow to use in Private Space 2024-05-16 12:03:58 +08:00
weishu
81033bcc48 kernel: fix devpts permission. close #1727 2024-05-16 10:32:48 +08:00
weishu
0e656dd339 kernel: Fix compile error on 4.4. close #1720 2024-05-10 15:01:05 +08:00