1. 15 Jul, 2022 1 commit
    • Olaf Czerwinski's avatar
      Enable init in purecap · 009f0406
      Olaf Czerwinski authored
      There is a commit fixing capability misalignment in PCRE2 (dependency)
      Change-Id: Ia4f4124c16ddd503745fb3d0b07b6617ed33588e
  2. 13 Jul, 2022 1 commit
  3. 30 Jun, 2022 1 commit
    • Ruben's avatar
      RefBase: add return value for decWeak/decStrong · aeea3f4c
      Ruben authored
      Update RefBase::decStrong and RefBase::weakref_type::decWeak
      to indicate whether the RefBase::weakref_type object has been
      destructed during the call, via the return value.
      Change-Id: Iacf302373b1f9df58f18bbafb976a5e1720b369d
  4. 01 Jun, 2022 1 commit
    • Ruben's avatar
      Set sys.use_memfd to true · 82b69cc1
      Ruben authored
      Apps or vendor processes which use ashmem IOCTLs directly are not supported.
      This removes dependency on ashmem support in the kernel.
      Change-Id: I6aa2d50d8358fb5c9e1a386081bc194e6f5b1ddd
  5. 04 Dec, 2021 1 commit
    • Ruben's avatar
      Update checks for nano profile and FVP hardware · 1fbdcdbc
      Ruben authored
      Following the device profile change splitting the profile name and
      the hardware configuration identifier, updating the related checks.
      Change-Id: Ie790db167d835412e216328dc363aabcb30caf4b
  6. 05 Nov, 2021 1 commit
    • Kevin Brodsky's avatar
      debuggerd: Always use the fallback handler in Pure-cap · a53a70fb
      Kevin Brodsky authored
      We do not have a Pure-cap crash_dump yet, and at the moment the
      debuggerd crash handler attempts to use crash_dump64, which does not
      work at all since the size of CrashInfoData* depends on the ABI.
      Until Pure-cap crash dumping is supported, we can force the fallback
      handler to be used in Pure-cap, creating the dump in-process. This
      is sufficient to get a basic 64-bit dump (X registers and top stack
      Change-Id: I6e162908aad94c28df8e280194f84c988eca7358
  7. 28 Sep, 2021 1 commit
  8. 13 Sep, 2021 2 commits
    • Pirama Arumuga Nainar's avatar
      [fs_mgr] Use shared libutils for remount · f6576c8c
      Pirama Arumuga Nainar authored and Ruben's avatar Ruben committed
      Bug: http://b/197965342
      remount depends on libbinder.so which already depends on libutils.so.
      When linking remount with libutils.a, the linker tries to fetch objects
      from libutils.a to redefine undefined symbols in libbinder.so.  This
      causes linker failure with upstream LLD.  Switching to shared
      libutils.so instead doesn't increase the dependency closure for remount.
      Test: build with aosp/1809741 which has lld with the above behavior.
      Change-Id: I858042a08babe2c2db1fc8c7eeb5de62dda5f328
    • Ruben's avatar
      Fix implicit fallthrough switch case in debuggerd · eb26f200
      Ruben authored
      Change-Id: Id7ab9d4404979ec43e0a743dd5c6947dcf428c83
  9. 18 Aug, 2021 1 commit
  10. 23 Jul, 2021 2 commits
    • Tom Cherry's avatar
      liblog: use unique log tags for is_loggable tests · a2ea4a9e
      Tom Cherry authored and Ruben's avatar Ruben committed
      Apparently these tests are run in parallel, which causes errors since
      they use the same log tag.  Use unique log tags based on pid to fix
      Also re-enable the previously disabled tests.
      Bug: 162669552
      Test: run these tests 100x+ and see that they no longer fail
      Change-Id: Ib20d638e5e559bca23adec479a5dcf64075e376e
    • Tom Cherry's avatar
      liblog: disable property tag tests · 0b2a6cb7
      Tom Cherry authored and Ruben's avatar Ruben committed
      Bug: 162633089
      Bug: 162669552
      Test: these tests don't run
      Change-Id: I82b8e6685a321ae03374e86ffbe845608aec93b5
  11. 01 Jul, 2021 17 commits
  12. 25 Jun, 2021 1 commit
  13. 02 Oct, 2020 2 commits
  14. 25 Sep, 2020 3 commits
  15. 21 Sep, 2020 1 commit
  16. 18 Sep, 2020 2 commits
    • Mayank Rana's avatar
      adbd: Fix check against valid payload size · f7451e67
      Mayank Rana authored
      block->payload and its size are not valid when it is used to check
      against bytes_left due to std::move() performed on its just prior
      to the check. Hence check will always fail to detect the case where
      received data is more than expected. To detect this condition and
      allow error handling with std::move(), remove extra payload variable
      and directly use block->payload.
      Bug: http://b/168917244
      Change-Id: I992bbba9d9a9861a195834f69d62e69b90658210
      (cherry picked from commit 71a33cfa678ddc7704693b45244f3190af1da65d)
    • Martijn Coenen's avatar
      Allow shell to write to /sdcard/Android/data and /sdcard/Android/obb. · c3f71bc4
      Martijn Coenen authored
      On devices without sdcardfs, these are only writable by the owning UID,
      and/or the ext_data_rw/ext_obb_rw groups respectively.
      Bug: 161134565
      Bug: 162810387
      Test: try to write to /sdcard/Android/data/ from shell uid
      Change-Id: I19a9980bcff7b6fd0554dd2a4c8d59abe6ad540b
      (cherry picked from commit 4da604ba4e99619e4318f2aee952cffbd6c25ace)
  17. 29 Aug, 2020 2 commits