diff options
author | Nick Kralevich <nnk@google.com> | 2013-04-25 13:15:24 -0700 |
---|---|---|
committer | Nick Kralevich <nnk@google.com> | 2013-04-25 13:15:24 -0700 |
commit | 8d3e91d4f842911366155845afb3cfbdad0b4cad (patch) | |
tree | 61d332169251cde7d11a6687668f8b4a724e372e /tests/string_test.cpp | |
parent | 87efcd2e63c9f218f476ef88f21e660f9bce633f (diff) |
linker: only re-open std* for setuid programs.
get_AT_SECURE() was getting called before linker_env_init() had
been called, and returning the default value ("true"). This was
causing us to reopen closed stdin, stdout, and stderr for ALL
processes, not just privileged (setuid) processes.
Calling path:
- __linker_init
- soinfo_link_image
- get_AT_SECURE
- __linker_init_post_relocation
- linker_env_init
This change restores the intended behavior of only re-opening
stdin, stdout, and stderr for privileged processes.
Change-Id: I8b085ea6597710ac4c1a3c93f1bf8b81eecb08c0
Diffstat (limited to 'tests/string_test.cpp')
0 files changed, 0 insertions, 0 deletions