From 5a1ff92d0ac3a7f403dccb0fb921d9625ca3b790 Mon Sep 17 00:00:00 2001 From: ShirkNeko <109797057+ShirkNeko@users.noreply.github.com> Date: Thu, 6 Nov 2025 14:45:42 +0800 Subject: [PATCH] fix --- kernel/core_hook.c | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/kernel/core_hook.c b/kernel/core_hook.c index 61d7ebeb..c651e3fd 100644 --- a/kernel/core_hook.c +++ b/kernel/core_hook.c @@ -1084,7 +1084,7 @@ int ksu_handle_setuid(struct cred *new, const struct cred *old) if (new_uid.val == 2000) { if (ksu_su_compat_enabled) { - set_tsk_thread_flag(current, TIF_SYSCALL_TRACEPOINT); + ksu_set_task_tracepoint_flag(current); } } @@ -1100,7 +1100,7 @@ int ksu_handle_setuid(struct cred *new, const struct cred *old) spin_lock_irq(¤t->sighand->siglock); ksu_seccomp_allow_cache(current->seccomp.filter, __NR_reboot); if (ksu_su_compat_enabled) { - set_tsk_thread_flag(current, TIF_SYSCALL_TRACEPOINT); + ksu_set_task_tracepoint_flag(current); } spin_unlock_irq(¤t->sighand->siglock); return 0; @@ -1114,7 +1114,7 @@ int ksu_handle_setuid(struct cred *new, const struct cred *old) spin_unlock_irq(¤t->sighand->siglock); } if (ksu_su_compat_enabled) { - set_tsk_thread_flag(current, TIF_SYSCALL_TRACEPOINT); + ksu_set_task_tracepoint_flag(current); } } else { // Disable syscall tracepoint sucompat for non-allowed processes