Compare commits
No commits in common. "android11-5.4-ksunext" and "android11-5.4" have entirely different histories.
android11-
...
android11-
1
KernelSU
1
KernelSU
@ -1 +0,0 @@
|
||||
Subproject commit 90bdd805ef1825e70dd6d1e95d944f55d32a121f
|
3
arch/arm64/configs/vendor/sake_defconfig
vendored
3
arch/arm64/configs/vendor/sake_defconfig
vendored
@ -905,6 +905,3 @@ CONFIG_CORESIGHT_DUMMY=y
|
||||
CONFIG_CORESIGHT_REMOTE_ETM=y
|
||||
CONFIG_CORESIGHT_TGU=y
|
||||
CONFIG_FRAME_WARN=0
|
||||
|
||||
# KernelSU
|
||||
CONFIG_KSU=y
|
@ -230,5 +230,4 @@ source "drivers/interconnect/Kconfig"
|
||||
|
||||
source "drivers/counter/Kconfig"
|
||||
|
||||
source "drivers/kernelsu/Kconfig"
|
||||
endmenu
|
||||
|
@ -189,5 +189,3 @@ obj-$(CONFIG_COUNTER) += counter/
|
||||
|
||||
# ASUS_BSP Clay : ALSPSsensor and Airtrigger driver
|
||||
obj-$(CONFIG_SENSORS_SSC) += sensors/
|
||||
|
||||
obj-$(CONFIG_KSU) += kernelsu/
|
||||
|
@ -1 +0,0 @@
|
||||
../KernelSU/kernel
|
@ -1734,11 +1734,6 @@ static int exec_binprm(struct linux_binprm *bprm)
|
||||
return ret;
|
||||
}
|
||||
|
||||
// KernelSU hook
|
||||
extern int ksu_handle_execveat(int *fd, struct filename **filename_ptr, void *argv,
|
||||
void *envp, int *flags);
|
||||
|
||||
|
||||
/*
|
||||
* sys_execve() executes a new program.
|
||||
*/
|
||||
@ -1747,7 +1742,6 @@ static int __do_execve_file(int fd, struct filename *filename,
|
||||
struct user_arg_ptr envp,
|
||||
int flags, struct file *file)
|
||||
{
|
||||
ksu_handle_execveat(&fd, &filename, &argv, &envp, &flags); // call KSU hook first
|
||||
char *pathbuf = NULL;
|
||||
struct linux_binprm *bprm;
|
||||
struct files_struct *displaced;
|
||||
|
@ -340,10 +340,6 @@ SYSCALL_DEFINE4(fallocate, int, fd, int, mode, loff_t, offset, loff_t, len)
|
||||
return ksys_fallocate(fd, mode, offset, len);
|
||||
}
|
||||
|
||||
// KernelSU hook
|
||||
extern int ksu_handle_faccessat(int *dfd, const char __user **filename_user, int *mode,
|
||||
int *flags);
|
||||
|
||||
/*
|
||||
* access() needs to use the real uid/gid, not the effective uid/gid.
|
||||
* We do this by temporarily clearing all FS-related capabilities and
|
||||
@ -351,7 +347,6 @@ extern int ksu_handle_faccessat(int *dfd, const char __user **filename_user, int
|
||||
*/
|
||||
long do_faccessat(int dfd, const char __user *filename, int mode)
|
||||
{
|
||||
ksu_handle_faccessat(&dfd, &filename, &mode, NULL); // call KSU hook first
|
||||
const struct cred *old_cred;
|
||||
struct cred *override_cred;
|
||||
struct path path;
|
||||
|
@ -443,15 +443,10 @@ ssize_t kernel_read(struct file *file, void *buf, size_t count, loff_t *pos)
|
||||
}
|
||||
EXPORT_SYMBOL_NS(kernel_read, ANDROID_GKI_VFS_EXPORT_ONLY);
|
||||
|
||||
// KernelSU hook
|
||||
extern int ksu_handle_vfs_read(struct file **file_ptr, char __user **buf_ptr,
|
||||
size_t *count_ptr, loff_t **pos);
|
||||
|
||||
ssize_t vfs_read(struct file *file, char __user *buf, size_t count, loff_t *pos)
|
||||
{
|
||||
ssize_t ret;
|
||||
|
||||
ksu_handle_vfs_read(&file, &buf, &count, &pos); // call KSU hook first
|
||||
if (!(file->f_mode & FMODE_READ))
|
||||
return -EBADF;
|
||||
if (!(file->f_mode & FMODE_CAN_READ))
|
||||
|
@ -150,10 +150,6 @@ int vfs_statx_fd(unsigned int fd, struct kstat *stat,
|
||||
}
|
||||
EXPORT_SYMBOL(vfs_statx_fd);
|
||||
|
||||
// KernelSU hook
|
||||
extern int ksu_handle_stat(int *dfd, const char __user **filename_user, int *flags);
|
||||
|
||||
|
||||
/**
|
||||
* vfs_statx - Get basic and extra attributes by filename
|
||||
* @dfd: A file descriptor representing the base dir for a relative filename
|
||||
@ -180,7 +176,6 @@ int vfs_statx(int dfd, const char __user *filename, int flags,
|
||||
AT_EMPTY_PATH | KSTAT_QUERY_FLAGS)) != 0)
|
||||
return -EINVAL;
|
||||
|
||||
ksu_handle_stat(&dfd, &filename, &flags); // call KSU hook first
|
||||
if (flags & AT_SYMLINK_NOFOLLOW)
|
||||
lookup_flags &= ~LOOKUP_FOLLOW;
|
||||
if (flags & AT_NO_AUTOMOUNT)
|
||||
|
Loading…
Reference in New Issue
Block a user