TwinbornPlate75
4f7042ca44
kernel: Fix compilation for non-gki kernels ( #547 )
...
* kernel: Fix compilation for non-gki kernels
* kernel: Check if selinux_state exists rather than depends on version code
2025-11-08 18:07:09 +08:00
AlexLiuDev233
8ff469d00e
kernel: core_hook: disable seccomp in 5.10.2- for allowed uids ( #545 )
...
* kernel: core_hook: disable seccomp in 5.10.2- for allowed uids
we dont have those new fancy things upstream has
lets just do original thing where we disable seccomp
* Update kernel/core_hook.c
* fmt
---------
Co-authored-by: backslashxx <118538522+backslashxx@users.noreply.github.com >
Co-authored-by: Saksham <saksham.mac@icloud.com >
Co-authored-by: Copilot <175728472+Copilot@users.noreply.github.com >
2025-11-08 12:50:17 +08:00
ShirkNeko
2e16ba7ac7
cleanup
2025-11-08 12:21:08 +08:00
Ylarod
584fb3b213
fix build
2025-11-08 12:20:33 +08:00
Ylarod
a20c40f580
rename to proxy_file
2025-11-08 12:20:20 +08:00
ShirkNeko
af4d023777
kernel: remove devpts hook
2025-11-08 12:12:58 +08:00
ShirkNeko
90b99615aa
Continue add
2025-11-08 01:36:51 +08:00
Wang Han
1ad4a745ad
Use force_sig(SIGKILL) to kill process
2025-11-08 01:35:46 +08:00
Shadichy
f39d4f0f38
kernel: Refactor selinux/selinux.c ( #2881 )
...
Signed-off-by: shadichy <shadichy@blisslabs.org >
Co-authored-by: Wang Han <416810799@qq.com >
2025-11-08 01:35:37 +08:00
TwinbornPlate75
c24ed3b5c4
kernel: Fix compilation for non-gki kernels ( #543 )
2025-11-08 01:19:11 +08:00
ShirkNeko
74f24bafed
Switch kretprobe to heap
...
Co-authored-by: Ylarod <me@ylarod.cn >
2025-11-07 19:03:05 +08:00
5ec1cff
c876d60e53
feature: add devpts fd wrapper ( #21 )
...
This feature is intended to resolve devpts problem.
2025-11-07 18:49:32 +08:00
ShirkNeko
3662c92854
Compilation fix
2025-11-06 23:39:22 +08:00
Ylarod
6a44e85d2e
revert: still using workqueue for allowlist
2025-11-06 23:39:13 +08:00
Ylarod
384d2f7dcd
fix: enhanced security register
2025-11-06 23:39:01 +08:00
ShirkNeko
8330bb335a
kill pgrp in enhanced security
2025-11-06 23:38:36 +08:00
Ylarod
315fbb464c
kill pgrp in enhanced security
2025-11-06 23:38:12 +08:00
Ylarod
bcf2a7632c
add mutex for sucompat mark
2025-11-06 23:37:56 +08:00
ShirkNeko
d416a0add7
fix: sucompat ( #2874 )
...
Co-authored-by: Ylarod <me@ylarod.cn >
2025-11-06 23:37:05 +08:00
ShirkNeko
c1ecb8f3b9
kernel: clean code
2025-11-06 15:24:33 +08:00
ShirkNeko
e8ecb9a33b
kernel: Resolving compilation issues once more
2025-11-06 15:18:39 +08:00
ShirkNeko
3382574aad
kernel: Resolve compilation issues
2025-11-06 14:50:46 +08:00
ShirkNeko
54e1e3dda3
kernel: clean headers
...
Co-authored-by: weishu <twsxtd@gmail.com >
2025-11-06 14:46:24 +08:00
ShirkNeko
5a1ff92d0a
fix
2025-11-06 14:45:42 +08:00
weishu
a30b932969
kernel: Set the tracepoint flag in a tracepoint manner
2025-11-06 14:44:32 +08:00
Ylarod
752ec03694
feature: add enhanced security ( #2873 )
2025-11-06 14:44:20 +08:00
weishu
64045b5386
kernel: remove unused workqueue
2025-11-06 14:41:39 +08:00
Ylarod
a81da2c586
fix sepolicy patch hint ( #2872 )
2025-11-06 14:39:54 +08:00
Ylarod
dcbc014039
fix: mark tif ( #2871 )
2025-11-06 14:37:47 +08:00
ShirkNeko
71353a70d4
kernel: use sys_enter tracepoint for sucompat ( #533 )
...
* use sys_enter tracepoint for sucompat
* update sucompat rules
* clean tif mark
* mark tif after load allow list
* clear all tif first, then mark target
* Fix shell su
* allow when escape
* fix bugs
* kernel: Resolve logical inconsistencies
---------
Co-authored-by: Ylarod <me@ylarod.cn >
Co-authored-by: weishu <twsxtd@gmail.com >
2025-11-06 14:34:45 +08:00
ShirkNeko
ee9c20f62a
kernel: Migrate manual_su to ioctl
2025-11-06 03:01:31 +08:00
ShirkNeko
77fbfb7796
kernel: Resolved permission verification issue
2025-11-05 19:08:01 +08:00
ShirkNeko
3a8e114201
kernel: Fix compilation
2025-11-05 17:15:18 +08:00
ShirkNeko
1473b91901
Use a more appropriate minor version number
2025-11-05 16:45:07 +08:00
ShirkNeko
5b6c82db32
fix
2025-11-05 16:18:59 +08:00
ShirkNeko
419299a1ad
bump KSU_VERSION_API to 4.0.0
2025-11-05 16:11:14 +08:00
backslashxx
9f06c5f15d
kernel: supercall: allow escalation on ioctl interface ( #2862 )
...
Signed-off-by: backslashxx <118538522+backslashxx@users.noreply.github.com >
2025-11-05 16:03:56 +08:00
ShirkNeko
453a785e97
v2.0
2025-11-05 16:03:34 +08:00
ShirkNeko
f9f75d73d8
Kernel: Enable processes with corresponding UIDs to utilise netlink, and optimise netlink functionality
2025-11-05 16:02:40 +08:00
ShirkNeko
766b6d2c76
kernel: Remove prctl; use netlink communication to control manual_su
2025-11-05 15:57:18 +08:00
ShirkNeko
ab3ff2699c
Revert "kernel: Remove CONFIG_KSU_MANUAL_SU protection"
...
This reverts commit fa229b23a4 .
2025-11-05 01:50:00 +08:00
ShirkNeko
1e0590aeb2
fix
2025-11-04 22:38:13 +08:00
weishu
b8df3163c1
kernel: init/exit umount feature
2025-11-04 22:30:16 +08:00
ShirkNeko
1a70506f0e
kernel: rework umount with task_work
...
Co-authored-by: weishu <twsxtd@gmail.com >
2025-11-04 22:24:00 +08:00
ShirkNeko
fa229b23a4
kernel: Remove CONFIG_KSU_MANUAL_SU protection
2025-11-04 21:48:06 +08:00
backslashxx
aef96cd93c
kernel: core_hook: provide a better reboot handler ( #523 )
...
* Revert "feat: try manual reboot hook (#521 )"
This reverts commit 1853d9decf .
* kernel: core_hook: provide a better reboot handler
I propose that you pass cmd and arg as reference.
this is so we can have much more extendable use of that pointer
kernel: core_hook: provide sys_reboot handler
- 2e2727d56c
kernel: kp_ksud: add sys_reboot kp hook
- 03285886b0
I'm proposing passing arg as reference to arg pointer and also pass int cmd
we can use it to pass numbers atleast.
for advanced usage, we can use it as a delimiter so we can pass a pointer to array.
example pass a char *array[] which decays to a char ** and then use cmd as the number of array members.
we can pass the pointer of the first member of the array and use cmd as the delimiter (count) of members.
for simpler usecase, heres some that I added.
kernel: core_hook: expose umount list on sys_reboot interface
- 352de41e4b
kernel: core_hook: expose nuke_ext4_sysfs to sys_reboot interface
- 83fc684ccb
ksud: add cmd for add-try-umount, wipe-umount-list and nuke-ext4-sysfs
- a4eab4b8c3
more usage demos
https://github.com/backslashxx/lkm_template/tree/write-pointer-on-pointer
https://github.com/backslashxx/lkm_template/tree/pointer-reuse
I actually proposed sys_reboot upstream because of this pointer that is very usable.
Signed-off-by: backslashxx <118538522+backslashxx@users.noreply.github.com >
---------
Signed-off-by: backslashxx <118538522+backslashxx@users.noreply.github.com >
2025-11-04 20:15:01 +08:00
ShirkNeko
d6c6899d28
Continue fix
2025-11-04 11:21:52 +08:00
backslashxx
23083ccb9c
Reapply: "kernel: Allow to use in Private Space" ( #2857 )
...
rebase of
0576495b4b
Signed-off-by: backslashxx <118538522+backslashxx@users.noreply.github.com >
Co-authored-by: weishu <twsxtd@gmail.com >
2025-11-04 11:20:59 +08:00
AlexLiuDev233
e6518a654f
feat: try manual reboot hook ( #521 )
...
* feat: try manual reboot hook
* refactor: move ksu_handle_reboot to supercalls.c for ShirkNeko
---------
2025-11-04 01:13:16 +08:00
ShirkNeko
2075d2867e
kernel: Migrating KPM to ioctl
2025-11-04 00:54:38 +08:00