1. 27 Jan, 2017 1 commit
  2. 10 Apr, 2015 1 commit
    • Chris Fries's avatar
      fs_mgr: introduce fs_mgr_format to format wiped partitions · 79f33846
      Chris Fries authored
      Move fastboot's format logic into fs_mgr, to consolidate the knowledge
      about how to do this (and when to wipe metadata).
      
      Try to format these formattable paritions if they are wiped.
      
      If formatting fails, we will fall out to let recovery mode handle it.
      
      Bug: 20082763
      Change-Id: I397cc197550e78d932e8a154fd234695c46dbe7b
      79f33846
  3. 01 Apr, 2015 1 commit
  4. 31 Mar, 2015 1 commit
  5. 26 Mar, 2015 1 commit
  6. 23 Mar, 2015 1 commit
  7. 06 Mar, 2015 1 commit
  8. 27 Feb, 2015 1 commit
    • Sami Tolvanen's avatar
      Set underlying block device RO when enabling verity · 214f33b8
      Sami Tolvanen authored
      Currently, when verity is set up on a block device, the underlying
      device is still accessible directly. Change the existing function
      fs_set_blk_ro visible to other fs_mgr modules, change the behavior
      to match the comment above the function definition, and call it to
      disable write access to the block device when setting up verity.
      
      Bug: 18609347
      Change-Id: I7884175df15f9161174788d74d20a08e4cd472ca
      214f33b8
  9. 06 Feb, 2015 1 commit
    • Nick Kralevich's avatar
      fs_mgr: error check umount calls / add retry logic · 7294eb6c
      Nick Kralevich authored
      Don't silently ignore umount errors. At a minimum, log them.
      
      Add strerror(errno) to another umount call, to make sure we get
      some actionable data.
      
      check_fs: try 5 times umounting the filesystem. It appears that
      the umount is failing, perhaps because some service is opening
      the file on the device or other error. Try unmounting it multiple
      times in case it's a transient problem and we can recover.
      
      Bug: 19199624
      Bug: 19156134
      Change-Id: I7213eb52d55116fb2419a36494d26d5e159981a7
      7294eb6c
  10. 02 Jul, 2014 1 commit
    • Todd Poynor's avatar
      fs_mgr: fix crash on "noemulatedsd" in fstab · 22f63e39
      Todd Poynor authored
      MF_FORCECRYPT claimed same flag value as existing MF_NOEMULATEDSD.
      MF_FORCECRYPT also crashes if no "=" in the option.
      
      Modify MF_NOEMULATEDSD flag value to unique, and reformat comment to keep
      the definition near the other defines.
      
      Change-Id: Iec86f40ff43eea14b791d3d19c0ae11fd4b5f784
      22f63e39
  11. 27 Jun, 2014 1 commit
  12. 04 Apr, 2014 1 commit
  13. 21 Sep, 2013 1 commit
  14. 07 Aug, 2013 1 commit
    • Geremy Condra's avatar
      Add basic verity support to fs_mgr. · 3ad3d1c4
      Geremy Condra authored
      This change adds a "verify" fs_mgr flag specifying that
      the device in question should be verified.
      
      Devices marked with this flag are expected to have a
      footer immediately after their data containing all
      the information needed to set up a verity instance.
      
      Change-Id: I10101f2c3240228ee0932e3767fe35e673d2e720
      3ad3d1c4
  15. 12 Jul, 2013 2 commits
  16. 09 Jul, 2013 1 commit
    • Ken Sumrall's avatar
      Add support for swap entries in fstab · 5bc31a26
      Ken Sumrall authored
      Swap entries can optionally specify a swapprio= or zramsize= flag
      in the fs_mgr flags field.
      
      Change-Id: I30530501efd4112af4e158898a9f65f6443c4fdb
      5bc31a26
  17. 23 Feb, 2013 1 commit
    • Ken Sumrall's avatar
      fs_mgr: add support for new recoveryonly flag · 6c2c1213
      Ken Sumrall authored
      If a device has an ext4 partition that contains the radio
      firmware, and that filesystem is not mounted in normal
      operation, we need a flag to prevent mount_all from
      mounting it, so the new flag recoveryonly was added.
      
      Change-Id: I361800c494e751b04c4faf956870f15fd0d8fe20
      6c2c1213
  18. 19 Feb, 2013 1 commit
  19. 04 Jan, 2013 1 commit
  20. 01 May, 2012 2 commits
    • Ken Sumrall's avatar
      A filesystem manager library to mount filesystems for init. · c1bf8966
      Ken Sumrall authored
      Instead of specifying in init what to mount, and having various hacks in init
      itself to deal with encryption, use a filesystem manager library to do the
      work, that can also be invoked by vold when mounting an encrypted volume.
      Keep all the magic filesystem info an a device specific fstab file.
      
      Change-Id: Ib988f1e4fb0638ba1d5fd98407fa6d8cf862aaca
      c1bf8966
    • Ken Sumrall's avatar
      A filesystem manager library to mount filesystems for init. · 7574c035
      Ken Sumrall authored
      Instead of specifying in init what to mount, and having various hacks in init
      itself to deal with encryption, use a filesystem manager library to do the
      work, that can also be invoked by vold when mounting an encrypted volume.
      Keep all the magic filesystem info an a device specific fstab file.
      
      Change-Id: Ib988f1e4fb0638ba1d5fd98407fa6d8cf862aaca
      7574c035