- 12 Jun, 2012 1 commit
-
-
Robert Greenwalt authored
-
- 11 Jun, 2012 4 commits
-
-
Elliott Hughes authored
-
Elliott Hughes authored
-
Elliott Hughes authored
Was bionic ever built with jam? Weird! Change-Id: Iea9a7af8bf46ee8319963e642da48e3bb49f6c60
-
Elliott Hughes authored
This was misleading 'configure' into thinking we actually support AF_LINK, but we're Linux, so we don't, and we never implemented the functions we declared here either. Reported to AOSP by Jun-ya Kato. (cherry-pick of 5056f1fa.) Change-Id: Ic67f674d2221497c8166994812bb5fc7f0831066
-
- 06 Jun, 2012 4 commits
-
-
Elliott Hughes authored
-
Elliott Hughes authored
Bug: http://code.google.com/p/enh/issues/detail?id=33 Change-Id: I679b4cd888d362031042284e8edf01c5273a92aa
-
Elliott Hughes authored
-
Elliott Hughes authored
Bug: 6609676 Change-Id: I286b197c75beee4d9930b0973f2d7dd47c14e91c
-
- 17 May, 2012 1 commit
-
-
Jean-Baptiste Queru authored
-
- 16 May, 2012 1 commit
-
-
Elliott Hughes authored
-
- 15 May, 2012 9 commits
-
-
Elliott Hughes authored
Change-Id: Icb44c1f94cb178d90b4c2b1e8f6d175586aec4e1
-
Nick Kralevich authored
-
Nick Kralevich authored
-
Nick Kralevich authored
-
Nick Kralevich authored
-
Nick Kralevich authored
Previously, the linker always loaded itself into the same location in memory, which inhibited the effectiveness of Android's ASLR implementation. Modify the linker code so it can be relocatable and link itself at runtime. Change-Id: Ia80273d7a00ff648b4da545f4b69debee6343968
-
Nick Kralevich authored
Use LOCAL_NO_CRT to prevent linking against crtbegin.o, rather than messing with build rules. This also prevents linking against crtend.o, which isn't needed for the linker. Change-Id: I0c5b9999be7e8676560fe145c1c033ffce8db4d1
-
David 'Digit' Turner authored
The computation of si->base assumed that the first entry in the program header table is a PT_PHDR. This results in the dynamic linker crashing with a SIGSEGV/MAPERR when trying to load some of the NDK unit test programs, which happen to have an EXIDX header first, followed byu a PHDR one. This patch fixes the computation by parsing the program header table, looking explicitely for the PHDR entry. This fixes the load of the NDK unit test programs, and doesn't affect system libraries. Change-Id: Id18ea6037dbe950b5abbbce816c2960321f0b81d
-
Nick Kralevich authored
Modify the dynamic linker so that executables can be loaded at locations other than 0x00000000. Modify crtbegin* so that non-PIC compilant "thumb interwork veneers" are not created by the linker. Bug: 5323301 Change-Id: Iece0272e2b708c79034f302c20160e1fe9029588
-
- 13 May, 2012 1 commit
-
-
Kito Cheng authored
Change-Id: I34fd0b0147fa33fd74c13480bc11827634233a41
-
- 10 May, 2012 1 commit
-
-
Elliott Hughes authored
-
- 09 May, 2012 7 commits
-
-
Elliott Hughes authored
-
Elliott Hughes authored
Spotted while merging a MIPS change. Change-Id: I36fb5a07d0bba0c117e9fe9733957bd37ca4b4c0
-
Elliott Hughes authored
-
Raghu Gandham authored
Change-Id: I4deba67e15c865c4c2db03064c04098a09828ea6 Signed-off-by:
Raghu Gandham <raghu@mips.com> Signed-off-by:
Chris Dearman <chris@mips.com>
-
Elliott Hughes authored
-
Jack Ren authored
Currently the dlmalloc allocates the memory with 8-byte alignment. According to the com.aurorasoftworks.quadrant.ui.professional benchmark data: We can get much better memory performance if we change it to be 16-byte aligned. For example, On Nexus-S: 8-byte aligned : 1378 1070 1142 1665 1765 1163 1179 1263 1404 avg: 1336.555555556 16-byte aligned: 1691 1731 1780 1691 1671 1678 1802 1758 1780 avg: 1731.333333333 gain: 29.53% That patch provides flexibity to customize the MALLOC_ALIGNMENT from the board config.The macro MALLOC_ALIGNMENT defaults to 8. To change it, please define BOARD_MALLOC_ALIGNMENT in the BoardConfig.mk: BOARD_MALLOC_ALIGNMENT := <whatever> Change-Id: I8da0376944a0bbcef1d0fc026bfb6d9125db9739 Signed-off-by:
Jin Wei <wei.a.jin@intel.com> Signed-off-by:
Jack Ren <jack.ren@intel.com> Signed-off-by:
Beare, Bruce J <bruce.j.beare@intel.com>
-
Elliott Hughes authored
-
- 08 May, 2012 8 commits
-
-
Bjorn Andersson authored
A call to pthread_key_delete() after pthread_exit() have unmapped the stack of a thread but before the ongoing pthread_join() have finished executing will result in an access to unmapped memory. Avoid this by invalidating the stack_base and tls pointers during pthread_exit(). This is based on the investigation and proprosed solution by Srinavasa Nagaraju <srinavasa.x.nagaraju@sonyericsson.com> Change-Id: I145fb5d57930e91b00f1609d7b2cd16a55d5b3a9
-
Elliott Hughes authored
-
Ben Cheng authored
So that we can always get the full stack trace regardless of gcc's handling of the "noreturn" attribute associated with abort(). (Cherry pick of Id264a5167e7cabbf11515fbc48f5469c527e34d4.) Bug: 6455193 Conflicts: libc/Android.mk Change-Id: I568fc5303fd1d747075ca933355f914122f94dac
-
Jack Ren authored
Signed-off-by:
Liubov Dmitrieva <liubov.dmitrieva@intel.com> Signed-off-by:
H.J. Lu <hongjiu.lu@intel.com> Signed-off-by:
Wei A Jin <wei.a.jin@intel.com> Signed-off-by:
Jack Ren <jack.ren@intel.com> Signed-off-by:
Bruce Beare <bruce.j.beare@intel.com> Conflicts: libc/arch-x86/string/ssse3-memcpy5.S Change-Id: I41e70d1d19d5457e65c89b64da452fbdaf3a00a7
-
Elliott Hughes authored
-
Nick Kralevich authored
Change-Id: I7d5f2e5663df263493f65e364c959e663fc4d13a
-
Elliott Hughes authored
-
Pierre Peiffer authored
The creation of a thread succeeds even if the requested scheduling parameters can not be set. This is not POSIX compliant, and even worse, it leads to a wrong behavior. Let pthread_create() fail in this case. Change-Id: Ice66e2a720975c6bde9fe86c2cf8f649533a169c Signed-off-by:
Christian Bejram <christian.bejram@stericsson.com>
-
- 07 May, 2012 3 commits
-
-
Mattias Falk authored
If two or more rapid dns requests for the same server are done from different threads it turns into separate dns reques, if the response of the request isn't found in the cache. This patch avoid multiple request for the same server by letting subsequents request wait until the first request has finished. Change-Id: Ic72ea0e7d3964a4164eddf866feb4357ec4dfe54
-
Elliott Hughes authored
-
Xi Wang authored
The allocation size in chk_malloc(), leak_malloc(), and leak_memalign() functions may be rounded up to a small value, leading to buffer overflows. The code only runs in debugging mode. This patch complements commit 6f04a0f4 (CVE-2009-0607). Change-Id: Id899bcd2bcd2ea2205e5753c433390710032dc83 Signed-off-by:
Xi Wang <xi.wang@gmail.com>
-