From 031f41e6beae7994bf7aa0413488f279777ba311 Mon Sep 17 00:00:00 2001 From: Wang Han <416810799@qq.com> Date: Tue, 5 Aug 2025 01:08:06 +0800 Subject: [PATCH] Fix jump label collusion --- kernel/core_hook.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/kernel/core_hook.c b/kernel/core_hook.c index ba91c87e..e76262b4 100644 --- a/kernel/core_hook.c +++ b/kernel/core_hook.c @@ -595,7 +595,7 @@ int ksu_handle_setuid(struct cred *new, const struct cred *old) #ifdef CONFIG_KSU_DEBUG pr_info("handle umount for unsupported application uid: %d\n", new_uid.val); #endif - goto umount; + goto do_umount; } if (ksu_is_allow_uid(new_uid.val)) { @@ -613,7 +613,7 @@ int ksu_handle_setuid(struct cred *new, const struct cred *old) #endif } -umount: +do_umount: // check old process's selinux context, if it is not zygote, ignore it! // because some su apps may setuid to untrusted_app but they are in global mount namespace // when we umount for such process, that is a disaster!