u32 secid;
                size_t added_size;
 
-               /*
-                * Arguably this should be the task's subjective LSM secid but
-                * we can't reliably access the subjective creds of a task
-                * other than our own so we must use the objective creds, which
-                * are safe to access.  The downside is that if a task is
-                * temporarily overriding it's creds it will not be reflected
-                * here; however, it isn't clear that binder would handle that
-                * case well anyway.
-                */
-               security_task_getsecid_obj(proc->tsk, &secid);
+               security_cred_getsecid(proc->cred, &secid);
                ret = security_secid_to_secctx(secid, &secctx, &secctx_sz);
                if (ret) {
                        return_error = BR_FAILED_REPLY;
 
 {
 }
 
+static inline void security_cred_getsecid(const struct cred *c, u32 *secid)
+{
+       *secid = 0;
+}
+
 static inline int security_kernel_act_as(struct cred *cred, u32 secid)
 {
        return 0;