f64d31c875dc27054b25023a2b5069ddfeff8da7 |
|
10-May-2018 |
Tom Cherry <tomcherry@google.com> |
Require vendor users and groups to start with vendor_ Require that users and groups found in /vendor/etc/{passwd,group} start with vendor_. This is needed to compliance with Treble as without this prefix, it is possible for a new system image to create a user/group name that a vendor has already used, causing a collision. Bug: 79528966 Test: new unit test Merged-In: I07500641e165f41526a8101592d83fa174e7a711 Change-Id: I07500641e165f41526a8101592d83fa174e7a711 (cherry picked from commit c2b9fec50b4bc33de60aef764798a2aca3c35873)
|
6034ef85d86675d063d6b1920e85e4c471b95904 |
|
03-Feb-2018 |
Tom Cherry <tomcherry@google.com> |
Add ability to read /etc/passwd and /etc/group Add the capability to read /etc/passwd and /etc/group for getpw* and getgr* functions. Bug: 27999086 Test: pwd, grp, grp_pwd_file unit tests Test: Read in custom users/groups from /etc/{passwd,group} Change-Id: Idc1f054af8a7ca34743a90493495f0ccc775a0d8
|
4362f897f73f95b5b9e48f2b758b5800f1cc83a2 |
|
14-Nov-2017 |
Tom Cherry <tomcherry@google.com> |
Only use uids and gids for which we've allocated AIDs Currently, getpwnam, getpwent, etc return successfully for any uid from AID_APP_START (10000) to AID_USER_OFFSET (100000) for each user. This is not correct however, as only specific ranges above AID_APP_START are reserved as valid ranges. This change corrects this. This is particularly important as the newly added AID_OVERFLOWUID is 65534, which is above AID_APP_START but not in any reserved range, collided with the faulty returned values. Bug: 69119022 Bug: 69128408 Test: pwd/grp bionic unit tests Change-Id: I3dae97a90597915fa30a88fe27cda88b107e9c35
|
a613d0df5c682617380728a7d151483de05a4f92 |
|
06-Oct-2017 |
Dan Albert <danalbert@google.com> |
Add a legacy inline for mmap64. While this was never an inline, this function alone has caused most of the bug reports related to _FILE_OFFSET_BITS=64. Providing an inline for it should allow a lot more code to build with _FILE_OFFSET_BITS=64 when targeting pre-L. Test: make checkbuild Test: built trivial cc_binary for LP32 against API 14 with _FILE_OFFSET_BITS=64 set Bug: lots Change-Id: I8479d34af4da358c11423bee43d45b59e9d4143e
|
06bd5862b18e0b750a709f7f8a1d277f1f6d0c99 |
|
29-Jul-2017 |
Elliott Hughes <enh@google.com> |
POSIX getlogin_r/LOGIN_NAME_MAX/TTY_NAME_MAX. Bug: N/A Test: ran tests Change-Id: I97c8ecc82fb09c3fa4bb5e6f000d46f04f3d1702
|
7a3681e5b6c39bc2b3b62031ca5941dbf7bc4e63 |
|
25-Apr-2017 |
Christopher Ferris <cferris@google.com> |
Move libc_log code into libasync_safe. This library is used by a number of different libraries in the system. Make it easy for platform libraries to use this library and create an actual exported include file. Change the names of the functions to reflect the new name of the library. Run clang_format on the async_safe_log.cpp file since the formatting is all over the place. Bug: 31919199 Test: Compiled for angler/bullhead, and booted. Test: Ran bionic unit tests. Test: Ran the malloc debug tests. Change-Id: I8071bf690c17b0ea3bc8dc5749cdd5b6ad58478a
|
5e2285d3ccdbb64a49ad2e5e521f50c897a3954d |
|
22-Feb-2017 |
Josh Gao <jmgao@google.com> |
Allocate thread local buffers in __init_tls. Thread local buffers were using pthread_setspecific for storage with lazy initialization. pthread_setspecific shares TLS slots between the linker and libc.so, so thread local buffers being initialized in a different order between libc.so and the linker meant that bad things would happen (manifesting as snprintf not working because the locale was mangled) Bug: http://b/20464031 Test: /data/nativetest64/bionic-unit-tests/bionic-unit-tests everything passes Test: /data/nativetest/bionic-unit-tests/bionic-unit-tests thread_local tests are failing both before and after (KUSER_HELPERS?) Test: /data/nativetest64/bionic-unit-tests-static/bionic-unit-tests-static no additional failures Change-Id: I9f445a77c6e86979f3fa49c4a5feecf6ec2b0c3f
|
3f6eee9793e4c41c7f4b15a723c777ae67fb1e51 |
|
14-Dec-2016 |
Elliott Hughes <enh@google.com> |
Revert "Revert "move android_ids into bionic"" This reverts commit 77cb68d9f2621639ec7f4e1b124ceeee5c80a66a. Change-Id: Ibc9f775c4cd418be90fd8a6f192dd72ca5dff09a
|
934bc86df3e9593551e1a09e242c72f0ee1afb3e |
|
13-Dec-2016 |
Jeff Sharkey <jsharkey@android.com> |
Define range of GIDs for cached app data. To support upcoming disk usage calculation optimizations, this change creates a new GID for each app that will be used to mark its cached data. We're allocating these unique GIDs so that we can use quotactl() to track cached data on a per-app basis. Test: builds, boots, tests pass Bug: 27948817 Change-Id: Ic00c39ccedc23d5d43988029e9921679126f8f2d
|
77cb68d9f2621639ec7f4e1b124ceeee5c80a66a |
|
12-Dec-2016 |
Elliott Hughes <enh@google.com> |
Revert "move android_ids into bionic" This reverts commit 1a13db5b2675759316a8529873c5d29831a9ba32. Change-Id: I7f571b3a9d542694d16fb9cf1131ef9e59d330ea
|
1a13db5b2675759316a8529873c5d29831a9ba32 |
|
08-Apr-2016 |
William Roberts <william.c.roberts@intel.com> |
move android_ids into bionic Generate the android_ids array and include into the build. Test: The bionic is built and that core AIDs work as expected with commands like chown, mkdir and init services and builtins. Bug: 27999086 Change-Id: Ib575bf85326c91801c5674db475dcb9cf44c00dc Signed-off-by: William Roberts <william.c.roberts@intel.com>
|
722ab05b255070e6c8add450c94eeb790618c98e |
|
06-Apr-2016 |
Mark Salyzyn <salyzyn@google.com> |
bionic: Implement getpwent and getgrent Not efficient to iterate through given the large number of Android ids (AID). Compile warning will result if you use these functions, telling you as much. Not for general consumption, however for example, some filesystem tests would like to see these to perform all corners. About 1/4 second for getpwent, and 1/8 second for getgrent to iterate through all reserved Android aids. Bug: 27999086 Change-Id: I7784273b7875c38e4954ae21d314f35e4bf8c2fc
|
8d387ee1ecbcde6d7435a909476e50afc9bed464 |
|
05-Apr-2016 |
Mark Salyzyn <salyzyn@google.com> |
fix oem_XXXX ids to incorporate both ranges The XXXX now lines up to the underlying uid and has no offset. Work with AID_OEM_RESERVED uids. Test uses hard coded values to catch changes in the API expectations that may occur in private/android_filesystem_config.h. SideEffects: names change, some product dependencies. Bug: 27999086 Change-Id: Ic2b4c36de74ae009a44e14711c75834293828207
|
b38347ad8bee0e35ab45f1658c780e25033c28b1 |
|
05-Apr-2016 |
Mark Salyzyn <salyzyn@google.com> |
bionic: split out getpwnam and friends - added grp_pwd.cpp containing POSIX passwd and group functions, colocated because they share with the Android ID (AID) roots. - stubs.cpp contains all the truly empty functions (network and protocol accessors) Bug: 27999086 Change-Id: I036f9e2dd246f48302cb7c97d23176fa24d19c33
|