diff --git a/kernel/Kconfig b/kernel/Kconfig index 4caffc05..c1623c3a 100644 --- a/kernel/Kconfig +++ b/kernel/Kconfig @@ -85,24 +85,6 @@ config KSU_SUSFS_SUS_MOUNT - Mounts mounted by process with ksu domain will be forced to be assigned the dev name "KSU". - mnt_id and mnt_group_id of the sus mount will be assigned to a much bigger number to solve the issue of id not being contiguous. -config KSU_SUSFS_AUTO_ADD_SUS_KSU_DEFAULT_MOUNT - bool "Enable to hide KSU's default mounts automatically (experimental)" - depends on KSU_SUSFS_SUS_MOUNT - default y - help - - Automatically add KSU's default mounts to sus_mount. - - No susfs command is needed in userspace. - - Only mount operation from process with ksu domain will be checked. - -config KSU_SUSFS_AUTO_ADD_SUS_BIND_MOUNT - bool "Enable to hide suspicious bind mounts automatically (experimental)" - depends on KSU_SUSFS_SUS_MOUNT - default y - help - - Automatically add binded mounts to sus_mount. - - No susfs command is needed in userspace. - - Only mount operation from process with ksu domain will be checked. - config KSU_SUSFS_SUS_KSTAT bool "Enable to spoof suspicious kstat" depends on KSU_SUSFS diff --git a/kernel/supercalls.c b/kernel/supercalls.c index 985e6ae8..d3b642f1 100644 --- a/kernel/supercalls.c +++ b/kernel/supercalls.c @@ -42,12 +42,6 @@ bool susfs_is_boot_completed_triggered = false; extern bool susfs_is_umount_for_zygote_system_process_enabled; -#ifdef CONFIG_KSU_SUSFS_AUTO_ADD_SUS_BIND_MOUNT -extern bool susfs_is_auto_add_sus_bind_mount_enabled; -#endif // #ifdef CONFIG_KSU_SUSFS_AUTO_ADD_SUS_BIND_MOUNT -#ifdef CONFIG_KSU_SUSFS_AUTO_ADD_SUS_KSU_DEFAULT_MOUNT -extern bool susfs_is_auto_add_sus_ksu_default_mount_enabled; -#endif // #ifdef CONFIG_KSU_SUSFS_AUTO_ADD_SUS_KSU_DEFAULT_MOUNT #ifdef CONFIG_KSU_SUSFS_AUTO_ADD_TRY_UMOUNT_FOR_BIND_MOUNT extern bool susfs_is_auto_add_try_umount_for_bind_mount_enabled; #endif // #ifdef CONFIG_KSU_SUSFS_AUTO_ADD_TRY_UMOUNT_FOR_BIND_MOUNT @@ -61,20 +55,6 @@ static void susfs_on_post_fs_data(void) { } pr_info("susfs_is_umount_for_zygote_system_process_enabled: %d\n", susfs_is_umount_for_zygote_system_process_enabled); #endif // #ifdef CONFIG_KSU_SUSFS_SUS_MOUNT -#ifdef CONFIG_KSU_SUSFS_AUTO_ADD_SUS_BIND_MOUNT - if (!kern_path(DATA_ADB_NO_AUTO_ADD_SUS_BIND_MOUNT, 0, &path)) { - susfs_is_auto_add_sus_bind_mount_enabled = false; - path_put(&path); - } - pr_info("susfs_is_auto_add_sus_bind_mount_enabled: %d\n", susfs_is_auto_add_sus_bind_mount_enabled); -#endif // #ifdef CONFIG_KSU_SUSFS_AUTO_ADD_SUS_BIND_MOUNT -#ifdef CONFIG_KSU_SUSFS_AUTO_ADD_SUS_KSU_DEFAULT_MOUNT - if (!kern_path(DATA_ADB_NO_AUTO_ADD_SUS_KSU_DEFAULT_MOUNT, 0, &path)) { - susfs_is_auto_add_sus_ksu_default_mount_enabled = false; - path_put(&path); - } - pr_info("susfs_is_auto_add_sus_ksu_default_mount_enabled: %d\n", susfs_is_auto_add_sus_ksu_default_mount_enabled); -#endif // #ifdef CONFIG_KSU_SUSFS_AUTO_ADD_SUS_KSU_DEFAULT_MOUNT #ifdef CONFIG_KSU_SUSFS_AUTO_ADD_TRY_UMOUNT_FOR_BIND_MOUNT if (!kern_path(DATA_ADB_NO_AUTO_ADD_TRY_UMOUNT_FOR_BIND_MOUNT, 0, &path)) { susfs_is_auto_add_try_umount_for_bind_mount_enabled = false; @@ -1046,10 +1026,6 @@ int ksu_handle_sys_reboot(int magic1, int magic2, unsigned int cmd, void __user } #endif //#ifdef CONFIG_KSU_SUSFS_SUS_PATH #ifdef CONFIG_KSU_SUSFS_SUS_MOUNT - if (cmd == CMD_SUSFS_ADD_SUS_MOUNT) { - susfs_add_sus_mount(arg); - return 0; - } if (cmd == CMD_SUSFS_HIDE_SUS_MNTS_FOR_ALL_PROCS) { susfs_set_hide_sus_mnts_for_all_procs(arg); return 0;