- 01 Feb, 2013 4 commits
-
-
Elliott Hughes authored
-
Elliott Hughes authored
Used by <linux/audit.h>. Change-Id: Ica4ebb7f52a7fce13c52fdff35e187ded3939382
-
Elliott Hughes authored
-
Elliott Hughes authored
This brings us up to date with FreeBSD HEAD, fixes various bugs, unifies the set of functions we support on ARM, MIPS, and x86, fixes "long double", adds ISO C99 support, and adds basic unit tests. It turns out that our "long double" functions have always been broken for non-normal numbers. This patch fixes that by not using the upstream implementations and just forwarding to the regular "double" implementation instead (since "long double" on Android is just "double" anyway, which is what BSD doesn't support). All the tests pass on ARM, MIPS, and x86, plus glibc on x86-64. Bug: 3169850 Bug: 8012787 Bug: https://code.google.com/p/android/issues/detail?id=6697 Change-Id: If0c343030959c24bfc50d4d21c9530052c581837
-
- 30 Jan, 2013 4 commits
-
-
Elliott Hughes authored
-
Elliott Hughes authored
Otherwise people trying to use this are left wondering "did I not leak, or did the leak checking code not get called when I exited?". Change-Id: If79b225f8a2e24dd69aba1fb836bf9e81bb00efe
-
Elliott Hughes authored
-
Elliott Hughes authored
And fix the scripts so they stop letting trailing whitespace through. Change-Id: Ie109fbe1f63321e565ba0fa60fee8e9cf3a61cfc
-
- 29 Jan, 2013 10 commits
-
-
Elliott Hughes authored
-
Elliott Hughes authored
Change-Id: Ie375d32565d10f4c0c56da5422f52b68cb069654
-
Elliott Hughes authored
-
Elliott Hughes authored
Change-Id: I7b697d5eae69dc08eb31471a42cb8bbe5360be76
-
Elliott Hughes authored
-
Elliott Hughes authored
Change-Id: I978275cf6604b90595ee79d897c0460eeadc7dc8
-
Elliott Hughes authored
-
Elliott Hughes authored
Replace a kernel header file dependency with files from NetBSD. They're more complete, and ELF is ELF, whether you're on Linux or a BSD. Bug: 7973611 Change-Id: I83ee719e7efdf432ec2ddbe8be271d05b2f558d7
-
Elliott Hughes authored
-
Elliott Hughes authored
Previously, we'd collect every stack frame and then throw some away when we came to log them. This meant that stack traces were effectively shorter than the buffers that had been allocated for them. This patch only stores frames we'll actually output. Also dynamically call the C++ demangler so we don't have to try to read mangled names. Because no one knows the mangling of operator new[] for int arrays off the top of their head. Bug: 7291287 Change-Id: I42b022fd7cd61675d05171de4c3b2704d058ef2a
-
- 28 Jan, 2013 2 commits
-
-
Elliott Hughes authored
-
Elliott Hughes authored
Also fix <signal.h> and <stdio.h> so they don't cause compiler warnings. Change-Id: Ib1a746bf01de22d47dbd964de0e6af80a7c96303
-
- 25 Jan, 2013 5 commits
-
-
Elliott Hughes authored
-
Elliott Hughes authored
Include the leaky executable's name in the log output. Fix the "sh" test. Use uintptr_t instead of intptr_t. Also fix debug formatting of NULL with %s. Bug: 7291287 Change-Id: I015bf341cd48d43a247173612e6ccb1bf1243d53
-
Elliott Hughes authored
-
Nick Kralevich authored
-
Nick Kralevich authored
Check that the permissions on the properties file are exactly as we expect them to be. Make sure we close the fd if fstat fails. Refactor the code slightly. Change-Id: I5503fd58c3b8093ce7e6d05920748ed70eaf8e2c
-
- 24 Jan, 2013 1 commit
-
-
Nick Kralevich authored
-
- 23 Jan, 2013 5 commits
-
-
Nick Kralevich authored
prctl.h uses __BEGIN_DECLS but fails to include sys/cdefs.h (where it's defined). Code which includes prctl.h without previously including sys/cdefs.h will fail to compile. Fixed. Change-Id: If4c9f3308f08b93596dcd00e351ae786807e9320
-
Nick Kralevich authored
-
Nick Kralevich authored
Currently, system properties are passed via the environment variable ANDROID_PROPERTY_WORKSPACE and a file descriptor passed from parent to child. This is insecure for setuid executables, as the environment variable can be changed by the caller. Modify system property handling so that we get the properties from a root owned properties file, rather than using an environment variable. Fall back to the environment variable if the file doesn't exist. Bug: 8045561 Change-Id: I54f3efa98cf7d63d88788da5ce0d19e34fd7851a
-
Elliott Hughes authored
-
Elliott Hughes authored
-
- 22 Jan, 2013 9 commits
-
-
Elliott Hughes authored
We don't know that they're not going to be cleaned up by a C++ global destructor that runs after us. This is the case with bootanimation, for example. Bug: 7291287 Change-Id: Iba402514d1735fdc2ae4bc95b65396d816be46c0
-
Elliott Hughes authored
When each shell leaks ~240 allocations, you can't see the leaks from the program you ran with "adb shell". Bug: 7291287 Change-Id: Ib8780db72ba0114ebdb24768537da74bbb61f354
-
Elliott Hughes authored
-
Elliott Hughes authored
-
Elliott Hughes authored
Change-Id: I45251047202a229f9175735ecc23c0ebcda71e8d
-
Elliott Hughes authored
-
Elliott Hughes authored
Just take the upstream NetBSD code. Bug: http://code.google.com/p/android/issues/detail?id=43078 Change-Id: Ibbbde9d00e8bc6a09c9503aab2b04b4e3d1f98b0
-
Elliott Hughes authored
-
Elliott Hughes authored
-