summaryrefslogtreecommitdiff
path: root/libc/malloc_hooks/tests/malloc_hooks_tests.cpp
diff options
context:
space:
mode:
authorNick Kralevich <nnk@google.com>2019-04-26 12:53:40 -0700
committerNick Kralevich <nnk@google.com>2019-04-26 12:58:00 -0700
commit560de5f5c766b7fc9fad83a3bc0ef2e1441e9b29 (patch)
tree14f2a372039ab6a19f5d13559d5d1dafb620e0ae /libc/malloc_hooks/tests/malloc_hooks_tests.cpp
parent99cec1892d62f1fc089540636e9806a66e371ebc (diff)
Don't honor LIBC_HOOKS_ENABLE across a security boundary
Similar to the way we handle LIBC_DEBUG_MALLOC_OPTIONS (bug 68003719), filter LIBC_HOOKS_ENABLE when we cross a security boundary. This prevents modifying the allocation behavior of a privileged program. Introduced in https://android.googlesource.com/platform/bionic/+/db478a627482c73c52df9e3929fe7a39f03e4eeb%5E%21/#F0 (bug 30561479) Test: compiles and boots Change-Id: I59a7c224734b0991fd62efb45ab599dab8570723
Diffstat (limited to 'libc/malloc_hooks/tests/malloc_hooks_tests.cpp')
0 files changed, 0 insertions, 0 deletions