1. 17 Apr, 2016 1 commit
  2. 24 Mar, 2016 1 commit
    • Daniel Micay's avatar
      enable secure_delete by default · 97ef26ef
      Daniel Micay authored
      This sanitizes deleted data by overwriting it with zeroes, rather than
      having it persist within SQLite's free list. In some cases, the data may
      end up persisting on the underlying storage due to wear levelling but
      only a process with direct access to block devices would be able to
      access it.
      
      This can be disabled via `PRAGMA SECURE_DELETE = 0;` for niches where
      deletion throughput is more important than enhanced privacy. The
      performance impact is very small unless large strings and blobs are
      being deleted. Android itself doesn't have any uses where disabling it
      would make sense, and very few apps will be negatively impacted. As a
      data point, Chromium and Firefox already use this for their own
      databases.
      
      Change-Id: I07f0e1584f0b2405f080198ad7b1f4e7ed7f68fb
      97ef26ef
  3. 08 Jan, 2016 1 commit
  4. 28 Aug, 2015 1 commit
  5. 11 Jun, 2015 2 commits
  6. 08 Apr, 2015 1 commit
    • Nick Kralevich's avatar
      sqlite: upgrade to SQLite 3.8.9 · 3fcd43a0
      Nick Kralevich authored
      Downloaded from http://www.sqlite.org/2015/sqlite-amalgamation-3080900.zip
      
        $ sha256sum sqlite-amalgamation-3080900.zip
        40a9f51a250fc41f6b5053a778681c622d82dec592c85de21edd3640eeb5f093  sqlite-amalgamation-3080900.zip
      
      dist/orig contains the stock sqlite3 code, as packaged in the ZIP file above.
      
      dist contains a copy of dist/orig, but with the Android.patch file applied.
      Please see Android.patch for a list of differences between stock and
      Android.
      
      No new patches are introduced.
      
      Bug: 20099586
      Change-Id: Ic7be6d920698984dee67458678086e88db9a06d3
      3fcd43a0
  7. 05 Jan, 2015 1 commit
  8. 10 Jul, 2014 1 commit
  9. 23 May, 2014 1 commit
  10. 07 May, 2014 1 commit
  11. 25 Feb, 2014 1 commit
    • Jeff Brown's avatar
      Enable ICU support in SQLite. · 399dce67
      Jeff Brown authored
      This makes the "icu" tokenizer available for applications to use
      with full text search.
      
      Bug: 5465099
      Change-Id: I5ad9790ee126d69b68eb3d8907320e74fb89219d
      399dce67
  12. 05 Sep, 2013 2 commits
  13. 02 May, 2013 2 commits
  14. 10 Apr, 2013 1 commit
    • Ying Wang's avatar
      Add liblog · 75d44639
      Ying Wang authored
      Bug: 8580410
      Change-Id: Icc11edb1f7f684c8a72d0c0ef3d696b7a0883947
      75d44639
  15. 11 May, 2012 1 commit
    • Jeff Brown's avatar
      Enable the powersafe overwrite assumption. · 2d758ba4
      Jeff Brown authored
      This change improves performance on certain kinds of transactions
      such as UPDATEs by allowing SQLite to make stronger assumptions
      about data integrity on the disk.
      
      The powersafe overwrite assumption demands that when a byte is
      written to a file and a power event occurs then the only bytes
      that may have been modified are the ones that were being written.
      
      In absense of the powersafe overwrite assumption, SQLite assumes
      that a write of any range of bytes within a disk sector may
      potentially cause the rest of the sector to be corrupted.  SQLite
      needs to do extra work to compensate for this problem, which adds
      overhead to certain transactions.
      
      On flash devices, writing a byte causes the sector to be rewritten
      somewhere else on the device.  Eventually the old sector may be
      erased and reused.  The powersafe overwrite assumption therefore
      holds as long as the flash device never leaves behind (observable)
      half-written sectors in case of a power event.  This is a fairly
      safe assumption to make.  Some flash devices apparently include
      measures to ensure that the last write fully completes when
      power is interrupted.  In any case, the window of opportunity
      for corruption to occur is very small.
      
      Bug: 6484633
      Change-Id: I0b0ef664b3a2a0e85c6099f0130d0affc5562be5
      2d758ba4
  16. 26 Mar, 2012 2 commits
  17. 01 Mar, 2012 1 commit
    • Jeff Brown's avatar
      Use fdatasync() to improve performance. · 3ab5bec5
      Jeff Brown authored
      Linux has a working fdatasync() so we should use it!
      This change alone improves performance by around 20% by reducing
      the number of synchronous I/O writes of irrelevant metadata
      changes.
      
      Change-Id: Iebe0c32a7e018ec0ced2347b7d62b2b7dc5aa376
      3ab5bec5
  18. 26 Jan, 2012 1 commit
  19. 20 Jan, 2012 2 commits
    • Jeff Brown's avatar
      Tweak SQLite configuration options. · 9e7798db
      Jeff Brown authored
      Turn off stuff we don't need.
      Enable FTS4.
      Enable ICU tokenizer.
      
      Bug: 5530406
      Bug: 5465099
      Change-Id: Idcc52050a4d048a64bfe8484e419dc8d2b27d6ed
      9e7798db
    • Jeff Brown's avatar
      Upgrade SQLite to 3.7.10. · 90ed05d9
      Jeff Brown authored
      Ported all original Android-specific patches.
      
      Change-Id: I2c5801a92d783e2c5cba72147d9fb777ad7c8443
      90ed05d9
  20. 26 Aug, 2011 1 commit
    • Kenny Root's avatar
      Use pread64 instead of lseek/read · 488d7836
      Kenny Root authored
      Using pread64 instead of lseek/read makes half the syscalls. Would you
      like some free performance?
      
      Change-Id: I2942adc18878ae80b41862aba945cd50e285bb95
      488d7836
  21. 12 Jul, 2011 1 commit
  22. 03 Mar, 2011 1 commit
  23. 02 Mar, 2011 1 commit
  24. 21 Feb, 2011 1 commit
  25. 12 Jan, 2011 1 commit
  26. 05 Oct, 2010 1 commit
  27. 14 Sep, 2010 1 commit
  28. 16 Jul, 2010 1 commit
  29. 10 Jun, 2010 1 commit
  30. 04 May, 2010 1 commit
    • Vasu Nori's avatar
      add FTS3 _backward_compatibility mode to let apps use FTS1 or 2. · 904607b8
      Vasu Nori authored
      bug:2651952
      this mode was previously available in Eclair and below. this mode was removed
      by me for no particular reason in Froyo.
      this change doesn't bring in any new modules into sqlite. just
      allows FTS1 or 2 apps be used with FTS3 running in backward compatibility mode
      
      Change-Id: Id5d72b440a378dd6d6703ce99b5d3d70ffd0c80f
      904607b8
  31. 23 Apr, 2010 1 commit
  32. 15 Apr, 2010 1 commit
  33. 02 Feb, 2010 1 commit
  34. 20 Jan, 2010 1 commit
    • Vasu Nori's avatar
      upgrade sqlite from 3.5.9 to 3.6.22 · a4356a0e
      Vasu Nori authored
      you should notice the following from the Android changes in 3.5.9
      1. Android Changes are grouped wherever possible.
      
      To Do
      1. sqlite3_get_pager_stats() needs to be completed
      2. Android change lines 63480-63482 on master branch in sqlite3.c is
      not ported yet. can't see where it goes in 3.6.22 code.
      a4356a0e
  35. 07 Jan, 2010 1 commit
    • Vasu Nori's avatar
      remove usage of poison_patch from sqlite. · 2ea3148c
      Vasu Nori authored
      Google gears team implemented a patch to sqlite called "poison the header".
      It got included in sqlite android shipped.
      
      This patch is meant to corrupt the database header if some sqlite process
      concludes that the database is corrupt. Thereafter, any other sqlite process
      opening the same database file would quickly see the corruption and exit.
      
      I am not convinced that this is a useful patch for Android.
      And, it patch didn't make it to the open source version of sqlite.
      
      could it be causing previously nonexisting
      database corruption, by incorrectly poisoning the database header? thats
      what I am suspecting.
      2ea3148c