crash_dump: fix overflow.
`1 << 32` overflows, resulting in bogus PR_CAP_AMBIENT_RAISE attempts, and breaking dumping for processes with capabilities in the top 32 bits. Bug: http://b/35241370 Test: debuggerd -b `pidof com.android.bluetooth` Change-Id: I29c45a8bd36bdeb3492c9f74599993c139821088
This commit is contained in:
parent
2a18b822d5
commit
5ad965bf41
1 changed files with 1 additions and 1 deletions
|
@ -202,7 +202,7 @@ static void raise_caps() {
|
|||
uint64_t capmask = capdata[0].inheritable;
|
||||
capmask |= static_cast<uint64_t>(capdata[1].inheritable) << 32;
|
||||
for (unsigned long i = 0; i < 64; ++i) {
|
||||
if (capmask & (1 << i)) {
|
||||
if (capmask & (1ULL << i)) {
|
||||
if (prctl(PR_CAP_AMBIENT, PR_CAP_AMBIENT_RAISE, i, 0, 0) != 0) {
|
||||
__libc_format_log(ANDROID_LOG_ERROR, "libc", "failed to raise ambient capability %lu: %s",
|
||||
i, strerror(errno));
|
||||
|
|
Loading…
Reference in a new issue