summaryrefslogtreecommitdiff
path: root/libc/malloc_hooks/malloc_hooks.cpp
diff options
context:
space:
mode:
authorGeorge Burgess IV <gbiv@google.com>2019-06-06 17:54:00 -0700
committerGeorge Burgess IV <gbiv@google.com>2019-06-13 23:26:02 -0700
commit74519e7aa58a19c0ed352b660f2e732148ae2f8a (patch)
tree453ed154af17c6a52f33c86f4835c02cbc8bc437 /libc/malloc_hooks/malloc_hooks.cpp
parent26d25a22e27fff4c23669d0dd66e3a09d869857d (diff)
fortify: fix overflow checks in unistd
We should only be calling _real versions of the functions that use this if the input size is verifiably <= SSIZE_MAX. Otherwise, just fall through to _chk and let that handle it. Bug: 131861088 Test: mma && bionic-unit-tests Change-Id: Iba04e486ef91ea1b3539ab6df6260429264e66b4
Diffstat (limited to 'libc/malloc_hooks/malloc_hooks.cpp')
0 files changed, 0 insertions, 0 deletions