TG Telegram Group & Channel
BlissOS Updates | United States America (US)
Create: Update:

Ok maybe one more update, then we will stop for transitional phase

The new builds addressed 2 bugs:
- For esdfs bind mounting, we added SDCARDFS_DISABLE=1 to allow disable it. And on Live boot, by default esdfs bind mounting will be disabled.
- For KernelSU, we've found out why it broken on recent kernel version on both stable & LTS. On recent kernel, they've implemented a syscall hardening solution that prevented others from hooking up syscall, thus blocking KernelSU from being able to hookup syscall like faccessat().
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=v6.11.3&id=1e3ad78334a69b36e107232e337f9d693dcc9df2

We can revert this and can continue to be able to use KSU without any issue, however we don't know how risky it is to revert in term of security (we literally revert a hardening solution). So instead we decided to add a cmdline to the kernel. Users can set syscall_hardening=off to the kernel to be able to continue using KernelSU, but please be aware of that you are stripping away a security measure !

For discussion about this bug & future solution, you can check out this Github Issue on KernelSU repo:
https://github.com/tiann/KernelSU/issues/2113

BlissOS Updates
Also also, while we made a video a couple of days ago saying that we will remove ARM translators & Widevine DRM, we actually not remove them in these new builds..... yet. Not only that, these Official Stable builds will be the actual last builds that include…
Ok maybe one more update, then we will stop for transitional phase

The new builds addressed 2 bugs:
- For esdfs bind mounting, we added SDCARDFS_DISABLE=1 to allow disable it. And on Live boot, by default esdfs bind mounting will be disabled.
- For KernelSU, we've found out why it broken on recent kernel version on both stable & LTS. On recent kernel, they've implemented a syscall hardening solution that prevented others from hooking up syscall, thus blocking KernelSU from being able to hookup syscall like faccessat().
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=v6.11.3&id=1e3ad78334a69b36e107232e337f9d693dcc9df2

We can revert this and can continue to be able to use KSU without any issue, however we don't know how risky it is to revert in term of security (we literally revert a hardening solution). So instead we decided to add a cmdline to the kernel. Users can set syscall_hardening=off to the kernel to be able to continue using KernelSU, but please be aware of that you are stripping away a security measure !

For discussion about this bug & future solution, you can check out this Github Issue on KernelSU repo:
https://github.com/tiann/KernelSU/issues/2113


>>Click here to continue<<

BlissOS Updates




Share with your best friend
VIEW MORE

United States America Popular Telegram Group (US)