weishu
bb6c20339c
kernel: add support for disable sucompat
2025-02-23 20:05:55 +06:00
rifsxd
42896dfab1
kernel: add umount calls for pixelify gphotos spoof configs and lsposed dex2oat bin
2025-02-22 04:40:28 +06:00
weishu
74171a2930
kernel: unregister sysfs for module's ext4 image
2025-02-21 17:02:33 +06:00
5ec1cff
87fc6b2784
kernel: clear securebits
...
fix adb shell cannot escape to root after https://github.com/tiann/KernelSU/pull/2381
2025-01-27 20:05:54 +06:00
Wang Han
a05b790da6
Avoid unnecessarily overriding capabilities ( #2381 )
...
Previously all capabilities were overridden with 0xffffffffffffffff,
which is
not what normal processes have. This causes PR_CAPBSET_DROP prctl
fail because it is dropping invalid caps. Fix it.
This fixes
https://gitlab.com/kalilinux/nethunter/apps/kali-nethunter-app/-/issues/378 .
Co-Authored-By: 5ec1cff <56485584+5ec1cff@users.noreply.github.com >
Co-authored-by: 5ec1cff <56485584+5ec1cff@users.noreply.github.com >
2025-01-25 20:54:06 +06:00
rsuntk
0ada4ee5d4
kernel: improve get_cred_rcu guard
...
Signed-off-by: rsuntk <rissu.ntk@gmail.com >
2025-01-16 14:32:04 +06:00
rsuntk
95584df023
kernel: Add fallback if user didn't implement 'get_cred_rcu'
...
https://github.com/tiann/KernelSU/pull/2320
Signed-off-by: rsuntk <rissu.ntk@gmail.com >
2025-01-16 14:26:52 +06:00
SsageParuders
b18c39e911
Improve seccomp disable && Add locking to protect cred modifications in escape_to_root ( #2320 )
...
- When disabling Seccomp, ensure that current->sighand->siglock is held
during the operation.
- Locking to ensure safe access and modification of the `cred` structure
within the `escape_to_root` function.
---
I think this issue described in #2236 may have been caused by concurrent
read-write access without proper locking.
---------
Signed-off-by: SsageParuders<qinqingqing1025@gmail.com >
Signed-off-by: SsageParuders <qinqingqing1025@gmail.com >"
2025-01-16 14:18:26 +06:00
ExtremeXT
72739facc8
kernel: expose allowlist workaround as Kconfig option
...
Useful for situations where the SU allowlist is not kept after a reboot.
As per upstream this is only used for < 4.10 and Huawei HiSilicon devices.
but theres user reports having issues even on 4.14/4.19 samsung kernels.
Expose this option so users affected can opt-in.
Discussion:
tiann#1249
tiann#1346
References:
tiann@f57d351
tiann@b61cb30
Credits to respective authors:
rhjdvsgsgks
ExtremeXT
2025-01-07 04:59:09 +06:00
rifsxd
7ea1579bce
kernel: try umount /system/etc/hosts & /system_ext
2024-12-31 11:14:39 +06:00
Loukious
a5f12ffe96
fix: reset ambient capabilities to resolve D-Bus permission issues
2024-12-27 22:39:38 +06:00
Rifat Azad
8fbddc959a
Revert "kernel: added susfs v1.5.3"
...
This reverts commit bdf81c0880 .
2024-12-24 08:21:10 +06:00
Rifat Azad
bdf81c0880
kernel: added susfs v1.5.3
2024-12-24 07:34:30 +06:00
Rifat Azad
1a84f69f5c
Revert "[1.0] Drop Non-GKI Support ( #1483 )"
...
This reverts commit 97d70b40fc .
2024-12-24 06:54:08 +06:00
Rifat Azad
8d2b017c96
kernel: sync with upstream
2024-12-24 06:53:54 +06:00
backslashxx
36fb6085ef
kernel: require path_umount backporting
...
Most kernel builders have to touch their kernel source code anyway so
we might as well tell them to backport path_umount to achieve some sort
of feature parity.
This enforces a path_umount backport, not a suggestion.
Its a requirement from now on.
You will backport path_umount and you will like it.
2024-12-17 22:45:23 +06:00
ExtremeXT
5f2c1eef9c
kernel: expose allowlist workaround as Kconfig option
...
Useful for situations where the SU allowlist is not kept after a reboot.
As per upstream this is only used for < 4.10 and Huawei HiSilicon devices.
but theres user reports having issues even on 4.14/4.19 samsung kernels.
Expose this option so users affected can opt-in.
Discussion:
tiann#1249
tiann#1346
References:
tiann@f57d351
tiann@b61cb30
Credits to respective authors:
rhjdvsgsgks
ExtremeXT
2024-12-17 20:33:55 +06:00
Rifat Azad
a545a3e81c
kernel: slightly polish up code
2024-12-16 02:42:33 +06:00
Rifat Azad
98a692370f
kernel: Removed SuSFS Patch
2024-12-13 06:21:40 +06:00
Rifat Azad
e15516040d
Revert "kernel: susfs: CONFIG_KSU_SUSFS_INFO syscall to get susfs version & variant"
...
This reverts commit b78c9adf49 .
2024-12-13 06:21:38 +06:00
Rifat Azad
b78c9adf49
kernel: susfs: CONFIG_KSU_SUSFS_INFO syscall to get susfs version & variant
2024-12-06 22:48:14 +06:00
Rifat Azad
e1d30d55af
kernel: implement SuSFS v1.5.2
2024-12-04 16:30:28 +06:00
Huy Minh
3acb13df65
kernel: Relax dentry_path_raw compare in core_hook ( #2041 )
...
On Android-x86 (or BlissOS) it initialize Android by using switch_root
or chroot, when checking a path with dentry_path_raw() it will show the
whole real path instead of the path that we want.
Relax the checking requirement by using strstr to look for
"/system/packages.list" in the string instead of requiring the path to
be "/system/packages.list"
This fixes #1783
Signed-off-by: hmtheboy154 <buingoc67@gmail.com >
2024-09-07 10:59:06 +08:00
Ylarod
97d70b40fc
[1.0] Drop Non-GKI Support ( #1483 )
...
Co-authored-by: weishu <twsxtd@gmail.com >
2024-06-01 14:50:46 +08:00
weishu
5d6ef355ae
kernel: Allow to use in Private Space
2024-05-16 12:03:58 +08:00
weishu
2efefcea72
kernel: use library import
2024-04-27 09:55:24 +08:00
weishu
cd73307cd4
kernel: refactor PR_REAL_REGS
2024-04-26 13:25:29 +08:00
D8G Official
ae8ffe2c10
Fix missing semicolon ( #1551 )
...
Fix build non gki kernel
2024-03-28 20:22:00 +08:00
Coconut
4584aa7f4e
kernel:Add Huawei hisi check ( #1545 )
...
Use huawei_hisi_check.h to determine whether it is an old Huawei
HiSilicon device.
Solve:
1. Compatible with non-GKI Huawei HiSilicon devices
2. Solve different bugs in EMUI of different system versions
3. Does not affect other devices
2024-03-28 14:20:00 +08:00
weishu
ea0ee0563a
kernel: Fix misleading log
2024-03-27 17:29:03 +08:00
Jprimero15
37410f85a4
kernel: guard "umount for uid" logprint with CONFIG_KSU_DEBUG ( #1519 )
...
Its too spammy to be on non-debug mode.
2024-03-24 21:42:23 +08:00
weishu
d8671b14d1
kernel: clean memory when exit
2024-03-24 16:41:53 +08:00
weishu
478fda6712
kernel: remove become_manager and minor refactors
2024-03-24 11:20:43 +08:00
weishu
a91690eabe
kernel: simplify prctl
2024-03-23 23:11:47 +08:00
weishu
a9b310876f
kernel: Let the kernel choose who is qualified to be the manager.
2024-03-23 21:48:03 +08:00
weishu
c0254fdb18
kernel: Fix the incorrect judgment condition.
2024-03-21 11:48:02 +08:00
weishu
91204e713e
kernel: ignore all non application uid
2024-03-21 11:45:44 +08:00
weishu
7713b7ce41
kernel: Fix compile warning
2024-03-21 11:32:30 +08:00
weishu
4c9f201c21
kernel: minor fixes
2024-03-21 11:24:56 +08:00
backslashxx
65bda4b5a8
fixup! Suggest non-gki kernel users to backport path_umount ( #1477 )
...
My bad.
as reported by @AzusaHana on tg

2024-03-19 15:39:54 +08:00
weishu
ae049019d6
kernel: support query working mode
2024-03-19 11:52:17 +08:00
backslashxx
cbb215ea81
Suggest non-gki kernel users to backport path_umount ( #1464 )
...
Most kernel builders have to touch their kernel source code anyway, why
not also tell them to backport path_umount so even non-gki users can
benefit from this?
I know this might be a bit controversial as this will raise the barrier
of entry, but the benefits are just so high.
Idea was from OnlyTomInSecond on KernelSU group chat way back, and it
has been on the discussions for some time
references:
https://t.me/KernelSU_group/27237/176515
https://t.me/KernelSU_group/3249/184908
https://github.com/tiann/KernelSU/discussions/955#discussioncomment-7617166
03d233db8b
https://github.com/tiann/KernelSU/pull/1060
https://elixir.bootlin.com/linux/v5.9.1/source/fs/namespace.c#L1728
https://elixir.bootlin.com/linux/v5.10.9/source/fs/namespace.c#L1730
https://elixir.bootlin.com/linux/v6.5/source/fs/namespace.c#L1887
https://github.com/tiann/KernelSU/pull/1464#issuecomment-2002492107
Kernel side change examples
5.4
961d978862
4.19
164917f56d
4.14
c07c70a0c5
4.9
195f07593a
4.4
21ea33fe41
https://github.com/tiann/KernelSU/pull/1464#issuecomment-2002424069
ofcourse having someone on 3.18 confirm this will be nice.
**PROS**: umount modules for everyone
**CONS**: barrier of entry +1
---------
Co-authored-by: Christoph Hellwig <hch@lst.de >
Co-authored-by: Fede2782 <78815152+Fede2782@users.noreply.github.com >
Co-authored-by: Tom <31297720+onlytominsecond@users.noreply.github.com >
2024-03-18 10:27:31 +08:00
Ylarod
3f5d6ca54a
Build KernelSU as LKM ( #1254 )
...
Co-authored-by: weishu <twsxtd@gmail.com >
2024-03-15 18:53:24 +08:00
Wang Han
9b254e8628
Guard a few logprint in prctl path with KSU_DEBUG ( #1402 )
2024-02-29 13:47:22 +08:00
weishu
8e06088f96
kernel: prevent become manager when failed. close #1328
2024-02-03 20:03:26 +08:00
weishu
802549d8cd
kernel: avoding umount when there isn't any module. close #556
2024-01-08 12:55:08 +08:00
Ylarod
cbf8f0aa2a
Try umount /sbin in kernel ( #1257 )
2024-01-06 08:59:30 +08:00
Nullptr
c07b7d38a0
Mount temp dir at /debug_ramdisk ( #1226 )
2023-12-23 21:05:26 +08:00
weishu
86dcb02f72
kernel: make compiler happy
2023-10-21 22:43:58 +08:00
weishu
5c495a7e83
kernel: make su without any capabilities possible
2023-10-21 20:32:28 +08:00