1. 11 Jul, 2018 1 commit
  2. 09 Jul, 2018 1 commit
  3. 07 Jul, 2018 3 commits
  4. 06 Jul, 2018 3 commits
  5. 05 Jul, 2018 4 commits
  6. 04 Jul, 2018 2 commits
  7. 03 Jul, 2018 3 commits
  8. 02 Jul, 2018 4 commits
  9. 01 Jul, 2018 2 commits
  10. 27 Jun, 2018 1 commit
  11. 26 Jun, 2018 4 commits
  12. 25 Jun, 2018 2 commits
    • Jat's avatar
      fix a bug when $ABILONG is arm64-v8a · d1a7372b
      Jat authored
      d1a7372b
    • topjohnwu's avatar
      Update BusyBox · e837bdc8
      topjohnwu authored
      BusyBox is unable to run properly on non-root applications due to seccomp introduced in Android 8.0.
      The SDK-21 libc.a has system call wrappers that uses the system calls on the whitelist, so binaries compiled with the updated libc can work properly.
      e837bdc8
  13. 21 Jun, 2018 5 commits
  14. 20 Jun, 2018 2 commits
  15. 19 Jun, 2018 3 commits
    • Sheryl Hohman's avatar
      fix typos · fbf3588f
      Sheryl Hohman authored
      fbf3588f
    • osm0sis's avatar
      a82ef6bd
    • npes87184's avatar
      Prevent setting zero over than bound · 312466aa
      npes87184 authored
      The &cmd will return a pointer which point to a pointer of cmdline.
      It is a memory address which is usually 8 bytes in 64 bits machine.
      
      However, the struct cmdline is 4 bytes. This will cause setting zero
      beyond the bound.
      
      Below is a simple example to show the differentiation:
      
      struct cmdline {
              char skip_initramfs;
              char slot[3];
      };
      
      static void parse_cmdline(struct cmdline *cmd)
      {
              printf("%lu\n", sizeof(*cmd)); /* 4 */
              printf("%lu\n", sizeof(&cmd)); /* 8 */
      }
      
      int main()
      {
              struct cmdline cmd;
              parse_cmdline(&cmd);
              return 0;
      }
      
      This patch prevents this.
      Signed-off-by: 's avatarnpes87184 <npes87184@gmail.com>
      312466aa