- 10 Jul, 2015 1 commit
-
-
Andres Morales authored
Bug: 22403703 Change-Id: I65da3b3b3f85db035d79277344beb5460cb025f2
-
- 07 Jul, 2015 2 commits
-
-
Paul Lawrence authored
-
Paul Lawrence authored
This reverts commit d815178b. Change-Id: I7e3f55d3092fcd04ea9f62f1971c9d42570f096c
-
- 06 Jul, 2015 6 commits
-
-
Andres Morales authored
-
Mark Salyzyn authored
reorder to handle errno correctly and remove log stutter Bug: 22197797 Bug: 22241640 Change-Id: I81e6b2ff15b6ea6e5e780bd3599bf1019ff36f26
-
Paul Lawrence authored
-
Andres Morales authored
gatekeeperd depends on having /data to determine whether to call setup routines for qcom HALs. Bug: 22298552 Change-Id: I6c552016dc863bbb04bd5a949a2317a720c8263f
-
Jeff Sharkey authored
Typical apps are restricted so they can only view shared storage belonging to the user they're running as. However, a handful of system components need access to shared storage across all users, such as DefaultContainerService and SystemUI. Since WRITE_MEDIA_STORAGE already offers this functionality by bypassing any FUSE emulation, reuse it to grant the "sdcard_rw" GID which is no longer handed out to third-party apps. Then we change the FUSE daemon to allow the "sdcard_rw" GID to see shared storage of all users. Bug: 19995822 Change-Id: Id2fe846aefbf13fc050e9b00ddef120021e817f4
-
Paul Lawrence authored
File level encryption must get the key between mounting userdata and calling post_fs_data when the directories are created. This requires access to keymaster, which in turn is found from a system property. Split property loaded into system and data, and load in right order. Bug: 22233063 Change-Id: I8a6c40d44e17de386417a443c9dfc3b4e7fe59a5
-
- 30 Jun, 2015 2 commits
-
-
Sasha Levitskiy authored
-
Jeff Sharkey authored
When someone force-unmounts our target endpoint, gracefully handle by terminating, instead of looping on the same errno forever. Bug: 22197797 Change-Id: I7e71632f69d47152ea78a94431c23ae69aba9b93
-
- 29 Jun, 2015 1 commit
-
-
Todd Kjos authored
-
- 27 Jun, 2015 1 commit
-
-
Adam Lesinski authored
Merge "Adds a parameter to the wakeup_callback to report sucessful wakeup or suspend aborts." into mnc-dev
-
- 26 Jun, 2015 2 commits
-
-
Jeff Sharkey authored
Change-Id: I6e1f85a7cc3428d558460737da3b3193d035b73e
-
Jeff Sharkey authored
Now that we're treating storage as a runtime permission, we need to grant read/write access without killing the app. This is really tricky, since we had been using GIDs for access control, and they're set in stone once Zygote drops privileges. The only thing left that can change dynamically is the filesystem itself, so let's do that. This means changing the FUSE daemon to present itself as three different views: /mnt/runtime_default/foo - view for apps with no access /mnt/runtime_read/foo - view for apps with read access /mnt/runtime_write/foo - view for apps with write access There is still a single location for all the backing files, and filesystem permissions are derived the same way for each view, but the file modes are masked off differently for each mountpoint. During Zygote fork, it wires up the appropriate storage access into an isolated mount namespace based on the current app permissions. When the app is granted permissions dynamically at runtime, the system asks vold to jump into the existing mount namespace and bind mount the newly granted access model into place. Bug: 21858077 Change-Id: I5a016f0958a92fd390c02b5ae159f8008bd4f4b7
-
- 25 Jun, 2015 8 commits
-
-
Sasha Levitskiy authored
Change-Id: Ia50460c4fa7a5b9112f411970ab96af070863f6f Signed-off-by:
Sasha Levitskiy <sanek@google.com>
-
Todd Kjos authored
If a thread is created while the parent thread is "Background", then the default timerslack value gets set to the current timerslack value of the parent (40ms). The default value is used when transitioning to "Foreground" -- so the effect is that the timerslack value becomes 40ms regardless of foreground/background. This does occur intermittently for systemui when creating its render thread (pretty often on hammerhead and has been seen on shamu). If this occurs, then some systemui animations like navbar ripples can wait for up to 40ms to draw a frame when they intended to wait 3ms -- jank. This fix is to explicitly set the foreground timerslack to 50us. A consequence of setting timerslack behind the process' back is that any custom values for timerslack get lost whenever the thread has transition between fg/bg. See Bug: 19398120 Change-Id: Idc259717f62fa2255f8bafbbf88b68c0043f29cf
-
Ruchi Kandoi authored
Adds the call to wakeup_callback when the write to the /sys/power/state fails. This will help userspace account for the suspend aborts. Bug: 17478088 Bug: 18179405 Change-Id: Icd1194cfbaf61044ca0b2fe63a10a4c52e1535bc
-
Andres Morales authored
-
Mark Salyzyn authored
-
Mark Salyzyn authored
(cherry pick from commit ed777e9e) Quick low-risk to resolve possible hash table corruption. Resolved an unlikely path memory leak. ToDo: replace lock with nested lock so no lock helpers are required. Bug: 22068332 Change-Id: I303ab06608502c7d61d42f111a9c43366f184d0c
-
Yusuke Sato authored
-
Andres Morales authored
If the handle version is 0, there's no hardware_backed flag meaning hardware backed handles will be attempted against the soft impl. Ensure we don't try to read from hardware_backed unless the version is > 0. Bug: 21090356 Change-Id: I65f009c55538ea3c20eb486b580eb11ce93934fc
-
- 24 Jun, 2015 3 commits
-
-
Dan Albert authored
-
Andres Morales authored
required to initialize state by certain HAL impls Bug: 22011857 Change-Id: Ibb01a799da983e1a930aae946c331b23f571861d
-
Yusuke Sato authored
so that PackageManagerService can iterate over files with a specific file extension like ".so". Bug: 21957428 Change-Id: I76ed9560d4d1e00d297a97d518ec357166be1981
-
- 23 Jun, 2015 3 commits
-
-
Andres Morales authored
-
Andres Morales authored
password may change offline, invalidate the cache if it is stale Bug: 22019187 Change-Id: I2aaae978c8bd4629a0f93df3778d8679ae9b53d5
-
Sasha Levitskiy authored
-
- 22 Jun, 2015 7 commits
-
-
Pavlin Radoslavov authored
-
Tim Murray authored
-
Tim Murray authored
bug 21782794 Change-Id: I3b2cf8ae4f3ed0c14f206584ae7fa2b1a1d11ad0
-
Sasha Levitskiy authored
Bug 21930029 Change-Id: I116f4ec333d25406ba811fec7331cbf9ff1a4027 Signed-off-by:
Sasha Levitskiy <sanek@google.com>
-
Andres Morales authored
Certain devices, like Shamu, are currently running an interim software-only gatekeeper. When the HAL for those devices is merged, we need to handle upgrading to the HAL smoothly. Bug: 21090356 Change-Id: I5352bc547a43671a08249eae532e8b3ce6b90087
-
Andres Morales authored
Bug: 21445004 Change-Id: I5e36ddbefaf1fa8de8623858fd785ac8fb651a4f
-
Pavlin Radoslavov authored
Fix the file access permissions and group ownership of "/data/misc/bluedroid/bt_config.conf" so the file can be reused when switching users on the device. For that purpose, we need to do the following: 1. Set the set-group-ID (bit 02000) flag for directory "/data/misc/bluedroid" so the files created in that directory will have group-id of "net_bt_stack" . 2. Change the file's permissions of file "/data/misc/bluedroid/bt_config.conf" to Read/Write by User and Group. Bug: 21493919 Change-Id: Ie00ab4695198ef2aa299b484ef9d4f17bd41b98a
-
- 19 Jun, 2015 1 commit
-
-
Elliott Hughes authored
Require authorization by default, and remove the ability to override that in user builds. (userdebug and eng are still free to do whatever they want.) Bug: http://b/21862859 Change-Id: Ibf8af375be5bf1141c1ad481eee7a59fb10a7adb (cherry picked from commit 5cba5042)
-
- 18 Jun, 2015 3 commits
-
-
Mike Lockwood authored
-
Mike Lockwood authored
Some devices fail to send USB string descriptors if you attempt to read more than 255 bytes Bug: 21871761 Change-Id: Id5b8865179f80523f0ad5b6028d49dd99db2b36b
-
Erik Kline authored
-