Commit Graph

536 Commits

Author SHA1 Message Date
liankong
3bbf8c0d5a 修复R_AARCH64_NONE报错 2025-03-30 01:03:55 +08:00
liankong
634c9b3c04 1 2025-03-30 00:51:13 +08:00
liankong
97c19b07ae 修复部分函数 2025-03-30 00:36:12 +08:00
liankong
bd8f051c73 2 2025-03-29 23:51:49 +08:00
liankong
17a2efb135 2 2025-03-29 23:28:27 +08:00
liankong
032bc68154 1 2025-03-29 23:20:48 +08:00
liankong
0ff2aedd65 按照AI给出建议修复 2025-03-29 23:09:16 +08:00
liankong
7b30b6636c 尝试修复 2025-03-29 22:46:18 +08:00
liankong
3a058d394c Merge branch 'dev' of https://github.com/ShirkNeko/SukiSU-Ultra into dev 2025-03-29 22:33:06 +08:00
liankong
f11d57d2bd 尝试修复 2025-03-29 22:32:39 +08:00
ShirkNeko
f5cd410954 更新setup.sh以克隆并重命名SukiSU-Ultra为KernelSU 2025-03-29 21:37:22 +08:00
liankong
72b205fa5e 修复 2025-03-29 21:28:06 +08:00
liankong
f7c5b511cc 修改setup.sh 2025-03-29 21:26:11 +08:00
liankong
a36916c741 迁移setup.sh到SukiSU-Ultra 2025-03-29 21:25:19 +08:00
liankong
a79558de69 兼容函数 2025-03-29 21:19:55 +08:00
ShirkNeko
277d927fe1 Update setup.sh 2025-03-29 21:08:53 +08:00
ShirkNeko
8972327faa manager: add KPM module with control codes and compact symbol handling 2025-03-29 21:04:54 +08:00
5ec1cff
0c57ea10f2 Fix off-by-one when iterating dir (#2530)
Fix https://github.com/tiann/KernelSU/issues/2528
2025-03-26 15:00:53 +08:00
ShirkNeko
ff99ab8e62 Changing the custom background expand more options logic
Co-authored-by:ShirkNeko <ShirkNeko@alone2832165@gmail.com>
2025-03-22 16:37:30 +08:00
ShirkNeko
ba26677cfc Merge some files and rewrite the update history 2025-03-22 14:09:21 +08:00
米凛
301390faca script: change repo (#9) 2025-03-09 00:05:27 +08:00
5ec1cff
ef037b86a5 setup my sign key 2025-03-08 23:47:55 +08:00
5ec1cff
a034dbbe6e remove devpts hook 2025-03-08 23:47:50 +08:00
Wang Han
4d37b8735c Set KSU_APP_PROFILE_VER for shell (#2481)
This reverts commit bd24044ec3.
2025-03-01 15:59:44 +08:00
AlexLiuDev233
931ababd14 kernel: fix sometimes sucompat can not toggle by manager (#2484)
When the manager is already running, if other programs / kernel toggle
the sucompat enable status,
The manager "Disable SU Compat" toggle button can not work, kmesg print
"cmd enable su but no need to change."

I think we should still return reply_ok when the syscall value is
consistent with the kernel, which would fix the issue.
2025-03-01 15:59:18 +08:00
Wang Han
1feac4c621 Fix reference count leak in nuke_ext4_sysfs() (#2467)
We need to call path_put() to decrease the refcount.
2025-02-23 10:42:24 +08:00
Wang Han
eeffecbd1b Allow toggling unmount setting for all apps (#2450)
This fixes https://github.com/tiann/KernelSU/issues/2416.
2025-02-18 11:07:52 +08:00
weishu
de291151f1 kernel: unregister sysfs for module's ext4 image 2025-02-17 21:06:21 +08:00
weishu
500ff9bcbc kernel: remove unused CONFIG guard becuase GKI kernel enable kprobe by default 2025-02-16 21:38:59 +08:00
weishu
4593ae81c7 kernel: Allow to re-enable sucompat 2025-02-16 21:33:26 +08:00
weishu
2096bd7304 kernel: add support for disable sucompat 2025-02-16 19:29:58 +08:00
5ec1cff
62ef18b560 kernel: clear securebits (#2387)
fix adb shell cannot escape to root after #2381
2025-01-28 19:02:14 +08:00
Wang Han
7a71da057e Clean up umount targets (#2386) 2025-01-27 19:35:33 +08:00
Wang Han
38640ee4a6 Avoid unnecessarily overriding capabilities (#2381)
Previously all capabilities were overridden with 0xffffffffffffffff,
which is
not what normal processes have. This causes PR_CAPBSET_DROP prctl
fail because it is dropping invalid caps. Fix it.

This fixes
https://gitlab.com/kalilinux/nethunter/apps/kali-nethunter-app/-/issues/378.

Co-Authored-By: 5ec1cff <56485584+5ec1cff@users.noreply.github.com>

Co-authored-by: 5ec1cff <56485584+5ec1cff@users.noreply.github.com>
2025-01-25 17:29:08 +08:00
SsageParuders
58ed786c43 Improve seccomp disable && Add locking to protect cred modifications in escape_to_root (#2320)
- When disabling Seccomp, ensure that current->sighand->siglock is held
during the operation.
- Locking to ensure safe access and modification of the `cred` structure
within the `escape_to_root` function.

---

I think this issue described in #2236 may have been caused by concurrent
read-write access without proper locking.

---------

Signed-off-by: SsageParuders<qinqingqing1025@gmail.com>
Signed-off-by: SsageParuders <qinqingqing1025@gmail.com>"
2024-12-28 13:33:21 +08:00
Huy Minh
27bb2491c2 kernel: Relax dentry_path_raw compare in core_hook (#2041)
On Android-x86 (or BlissOS) it initialize Android by using switch_root
or chroot, when checking a path with dentry_path_raw() it will show the
whole real path instead of the path that we want.

Relax the checking requirement by using strstr to look for
"/system/packages.list" in the string instead of requiring the path to
be "/system/packages.list"

This fixes #1783

Signed-off-by: hmtheboy154 <buingoc67@gmail.com>
2024-09-07 10:59:06 +08:00
LoveSy
bd24044ec3 Revert "ksud: [Fix] grant root to the shell in debug mode" (#1860)
Reverts tiann/KernelSU#1853
2024-07-06 19:36:37 +08:00
RobinChen
56c3954524 ksud: [Fix] grant root to the shell in debug mode (#1853)
Failed to check app_profile version
2024-07-06 13:37:00 +08:00
5ec1cff
f52beb9f75 throne_tracker: skip iterate if failed to open dir (#1832)
fix https://github.com/tiann/KernelSU/issues/1800
2024-06-19 09:19:04 +08:00
Wang Han
78bf2493bf Convert devpts domain to ksu_file (#1801)
AOSP sepolicy does not allow appdomain to open pts. Hence, convert
devpts domain to ksu_file to allow any access.
2024-06-03 21:21:39 +08:00
Ylarod
898e9d4f8c [1.0] Drop Non-GKI Support (#1483)
Co-authored-by: weishu <twsxtd@gmail.com>
2024-06-01 14:50:46 +08:00
Rissu
bd5100d698 kernel: fix throne_tracker uncompile-able on 4.4 kernel (issue #1771) (#1773)
in kernel v4.7.10:
extern unsigned int __pure full_name_hash(const char *, unsigned int);

in kernel v4.8.0:
extern unsigned int __pure full_name_hash(const void *salt, const char
*, unsigned int);
2024-05-27 10:35:08 +08:00
Juhyung Park
038dae1d6f Deadlock fixes (#1758)
Hi,

This PR fixes deadlocks that I've noticed within my kernel, with some
minor optimizations around it.

Thanks.

---------

Signed-off-by: Juhyung Park <qkrwngud825@gmail.com>
2024-05-26 17:03:33 +08:00
weishu
31653b11f1 kernel: replace devpts kprobe 2024-05-16 17:16:00 +08:00
weishu
0576495b4b kernel: Allow to use in Private Space 2024-05-16 12:03:58 +08:00
weishu
123b66e84b kernel: fix devpts permission. close #1727 2024-05-16 10:32:48 +08:00
weishu
7af4f338e5 kernel: Fix compile error on 4.4. close #1720 2024-05-10 15:01:05 +08:00
weishu
109442f8c4 docs: Add devpts description for non gki 2024-05-09 12:05:10 +08:00
weishu
98757bcdb3 kernel: transition devpts in kernel 2024-05-08 21:15:49 +08:00
5ec1cff
935dc18faa su: allocate new pty (#1693) 2024-05-07 19:02:59 +08:00