- 27 Feb, 2016 1 commit
-
- 16 Sep, 2015 4 commits
-
- 12 Sep, 2015 1 commit
-
-
Narayan Kamath authored
am 710b6bb9: am ec4b58ad: (-s ours) am ec63d564: Track usage of Vector / SortedVector from libutils DO NOT MERGE * commit '710b6bb9': Track usage of Vector / SortedVector from libutils DO NOT MERGE
-
- 10 Sep, 2015 2 commits
-
-
Narayan Kamath authored
* commit 'ec4b58ad': Track usage of Vector / SortedVector from libutils DO NOT MERGE
-
Narayan Kamath authored
* commit 'ec63d564': Track usage of Vector / SortedVector from libutils DO NOT MERGE
-
- 09 Sep, 2015 1 commit
-
-
Narayan Kamath authored
bug: 22953624 Change-Id: Ifcc17e39433ac91ca41da5d336fb3006dfbb65a8
-
- 04 Aug, 2015 2 commits
-
- 17 Jul, 2015 1 commit
-
-
Tao Bao authored
Bug: 22534003 Change-Id: Iaf42a6e5b40cfef904de66e212ae8b77b2953ef7
-
- 07 Jul, 2015 3 commits
-
-
Paul Lawrence authored
File level encryption must get the key between mounting userdata and calling post_fs_data when the directories are created. This requires access to keymaster, which in turn is found from a system property. Split property loaded into system and data, and load in right order. Bug: 22233063 Change-Id: I409c12e3f4a8cef474eb48818e96760fe292cc49
-
Paul Lawrence authored
-
Paul Lawrence authored
This reverts commit 98c1a3de. Change-Id: I524060418de18f97c3865ebc4435f501015e92ee
-
- 06 Jul, 2015 2 commits
-
-
Paul Lawrence authored
-
Paul Lawrence authored
File level encryption must get the key between mounting userdata and calling post_fs_data when the directories are created. This requires access to keymaster, which in turn is found from a system property. Split property loaded into system and data, and load in right order. Bug: 22233063 Change-Id: I409c12e3f4a8cef474eb48818e96760fe292cc49
-
- 02 Jul, 2015 2 commits
-
-
Mohamad Ayyash authored
* commit 'b4b41daa': Allow mounting squashfs partitions
-
Mohamad Ayyash authored
* commit '0ddfa329': Allow mounting squashfs partitions
-
- 01 Jul, 2015 4 commits
-
-
Vincent Palatin authored
-
Stéphane Marchesin authored
Bug: 22231636 Change-Id: I103c8e906b7dd9862b7bb89d8642268e9a3006b4 Signed-off-by:
Stéphane Marchesin <marcheu@chromium.org>
-
Mohamad Ayyash authored
Change-Id: Ic023eb7d8a11e2a65172a23ff39fa902ef566183 Signed-off-by:
Mohamad Ayyash <mkayyash@google.com>
-
- 26 Jun, 2015 2 commits
-
-
caozhiyuan authored
Failures are seen on devices with Linux 3.10. And they are mainly due to this change: https://lwn.net/Articles/546473/ The blocks reserved in this change is not the same thing as what we think are reserved for common usage of root user. And this part is included in free blocks but not in available blocks. Bug: 22118089 Change-Id: I81c9531703298019a4fc11839f28d2cc8b9df34e (cherry picked from commit 3b497763)
- 23 Jun, 2015 1 commit
-
-
Elliott Hughes authored
Bug: http://b/22025550 Change-Id: I20f09ae442536f924f19ede0abf6a2bcc0a5cedf (cherry picked from commit 9813f5ba)
-
- 10 Jun, 2015 4 commits
-
-
Sami Tolvanen authored
-
Elliott Hughes authored
Bug: http://b/21760064 Change-Id: Idde268fe4d7e27586ca4469de16783f1ffdc5069 (cherry picked from commit 945548ef)
-
Sami Tolvanen authored
Due to observed BLKDISCARD flakiness, overwrite blocks that we want to discard with zeros first to avoid later issues with dm-verity if BLKDISCARD is not successful. Bug: 20614277 Bug: 20881595 Change-Id: I4f6f2db39db990879ff10468c9db41606497bd6f (cherry picked from commit a3c75e3e)
-
Sami Tolvanen authored
This reverts commit 604c583c. Change-Id: I2b0b283dc3f44bae55c5e9f7231d7c712630c2b5
-
- 09 Jun, 2015 1 commit
-
-
Sami Tolvanen authored
Due to observed BLKDISCARD flakiness, overwrite blocks that we want to discard with zeros first to avoid later issues with dm-verity if BLKDISCARD is not successful. Bug: 20614277 Bug: 20881595 Change-Id: I0280fe115b020dcab35f49041fb55b7f8e793da3 (cherry picked from commit 96392b97)
-
- 29 May, 2015 4 commits
-
-
Tao Bao authored
-
Tao Bao authored
When it reboots into recovery for a factory reset, it still needs to write the uncrypt status (-1) to the pipe. Bug: 21511893 Change-Id: I1a725820f1e1875146e49b5a6f28af2fbf284fc7
-
Elliott Hughes authored
I missed one last time. Bug: http://b/20501816 Change-Id: I9896ee2704237d61ee169f898680761e946e0a56 (cherry picked from commit b3ac6761)
-
Sami Tolvanen authored
In the block updater, if BLKDISCARD fails, the error is silently ignored and some of the blocks may not be erased. This means the target partition will have inconsistent contents. If the ioctl fails, return an error and abort the update. Bug: 20614277 Change-Id: I33867ba9337c514de8ffae59f28584b285324067 (cherry picked from commit cc2428c8)
-
- 28 May, 2015 1 commit
-
-
Tao Bao authored
uncrypt needs to be triggered to prepare the OTA package before rebooting into the recovery. Separate uncrypt into two modes. In mode 1, it uncrypts the OTA package, but will not reboot the device. In mode 2, it wipes the /misc partition and reboots. Needs matching changes in frameworks/base, system/core and external/sepolicy to work properly. Bug: 20012567 Bug: 20949086 Change-Id: I14d25cb62770dd405cb56824d05d649c3a94f315
-
- 16 May, 2015 1 commit
-
-
Elliott Hughes authored
Bug: http://b/20501816 Change-Id: I35efcd8dcec7a6492ba70602d380d9980cdda31f (cherry picked from commit b47afedb)
-
- 07 May, 2015 1 commit
-
-
Elliott Hughes authored
This makes it easier to go back and forth without losing current output. Also make the display more like regular more(1). Bug: http://b/20834540 Change-Id: Icc5703e9c8a378cc7072d8ebb79e34451267ee1b (cherry picked from commit c0491632)
-
- 06 May, 2015 2 commits