Revert "Disable pointer authentication in app processes."

Revert "Disable pointer authentication in app processes."

Revert submission 1954983-master-I3030c47be9d02a27505bd4775c1982a20755758c

Reason for revert: PAC has shipped with S, and we're going with app compat outreach rather than regressing security.
Reverted Changes:
I3030c47be:Disable pointer authentication in app processes.
I3030c47be:Disable pointer authentication in app processes.

Change-Id: I75c4d2d3cf59aecf99d9c9d37c6750f999e74de8
This commit is contained in:
Elliott Hughes 2022-03-10 18:01:04 +00:00
parent 69538cf7f3
commit 90d4d6040c
2 changed files with 0 additions and 7 deletions

View File

@ -64,8 +64,6 @@ cc_binary {
"libwilhelm",
],
header_libs: ["bionic_libc_platform_headers"],
compile_multilib: "both",
cflags: [

View File

@ -15,7 +15,6 @@
#include <android-base/macros.h>
#include <binder/IPCThreadState.h>
#include <bionic/pac.h>
#include <hwbinder/IPCThreadState.h>
#include <utils/Log.h>
#include <cutils/memory.h>
@ -183,10 +182,6 @@ int main(int argc, char* const argv[])
ALOGV("app_process main with argv: %s", argv_String.string());
}
// Because of applications that are using PAC instructions incorrectly, PAC
// is disabled in application processes for now.
ScopedDisablePAC x;
AppRuntime runtime(argv[0], computeArgBlockSize(argc, argv));
// Process command line arguments
// ignore argv[0]