Skip to content

Comments

kernel: use selinux_cred() method instead of directly use cred->security#3111

Merged
aviraxp merged 1 commit intotiann:mainfrom
AlexLiuDev233:patch-1
Dec 28, 2025
Merged

kernel: use selinux_cred() method instead of directly use cred->security#3111
aviraxp merged 1 commit intotiann:mainfrom
AlexLiuDev233:patch-1

Conversation

@AlexLiuDev233
Copy link
Contributor

@AlexLiuDev233 AlexLiuDev233 commented Dec 27, 2025

directly use cred->security will get the first registered security cred blob, if newer kernel add a new lsm register a security cred too and load before selinux, we will get that, and do undefined behavior

enfore use selinux_cred(cred) would fix this issue

See: https://cs.android.com/android/_/android/kernel/common/+/bbd3662a834813730912a58efb44dd6df6d952e6

directly use cred->security will get the first registered security cred blob,
if newer kernel add a new lsm register a security cred too and load before selinux, we will get that, and do undefined action

enfore use selinux_cred(cred); will fixed this issue
@aviraxp aviraxp merged commit f71d011 into tiann:main Dec 28, 2025
17 checks passed
KOWX712 pushed a commit to KOWX712/KernelSU that referenced this pull request Dec 28, 2025
…ity (tiann#3111)

directly use cred->security will get the first registered security cred
blob, if newer kernel add a new lsm register a security cred too and
load before selinux, we will get that, and do undefined behavior

enfore use selinux_cred(cred) would fix this issue

See:
https://cs.android.com/android/_/android/kernel/common/+/bbd3662a834813730912a58efb44dd6df6d952e6
u9521 pushed a commit to u9521/KernelSU that referenced this pull request Jan 5, 2026
…ity (tiann#3111)

directly use cred->security will get the first registered security cred
blob, if newer kernel add a new lsm register a security cred too and
load before selinux, we will get that, and do undefined behavior

enfore use selinux_cred(cred) would fix this issue

See:
https://cs.android.com/android/_/android/kernel/common/+/bbd3662a834813730912a58efb44dd6df6d952e6
u9521 pushed a commit to u9521/KernelSU that referenced this pull request Jan 5, 2026
…ity (tiann#3111)

directly use cred->security will get the first registered security cred
blob, if newer kernel add a new lsm register a security cred too and
load before selinux, we will get that, and do undefined behavior

enfore use selinux_cred(cred) would fix this issue

See:
https://cs.android.com/android/_/android/kernel/common/+/bbd3662a834813730912a58efb44dd6df6d952e6
u9521 pushed a commit to u9521/KernelSU that referenced this pull request Jan 8, 2026
…ity (tiann#3111)

directly use cred->security will get the first registered security cred
blob, if newer kernel add a new lsm register a security cred too and
load before selinux, we will get that, and do undefined behavior

enfore use selinux_cred(cred) would fix this issue

See:
https://cs.android.com/android/_/android/kernel/common/+/bbd3662a834813730912a58efb44dd6df6d952e6
u9521 pushed a commit to u9521/KernelSU that referenced this pull request Jan 13, 2026
…ity (tiann#3111)

directly use cred->security will get the first registered security cred
blob, if newer kernel add a new lsm register a security cred too and
load before selinux, we will get that, and do undefined behavior

enfore use selinux_cred(cred) would fix this issue

See:
https://cs.android.com/android/_/android/kernel/common/+/bbd3662a834813730912a58efb44dd6df6d952e6
LeCmnGend pushed a commit to LeCmnGend/KernelSU that referenced this pull request Feb 23, 2026
…ity (tiann#3111)

directly use cred->security will get the first registered security cred
blob, if newer kernel add a new lsm register a security cred too and
load before selinux, we will get that, and do undefined behavior

enfore use selinux_cred(cred) would fix this issue

See:
https://cs.android.com/android/_/android/kernel/common/+/bbd3662a834813730912a58efb44dd6df6d952e6
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants