- 27 Jan, 2017 1 commit
-
-
Mark Stevens authored
-
- 10 Apr, 2015 1 commit
-
-
Chris Fries authored
Move fastboot's format logic into fs_mgr, to consolidate the knowledge about how to do this (and when to wipe metadata). Try to format these formattable paritions if they are wiped. If formatting fails, we will fall out to let recovery mode handle it. Bug: 20082763 Change-Id: I397cc197550e78d932e8a154fd234695c46dbe7b
-
- 01 Apr, 2015 1 commit
-
-
Paul Lawrence authored
Fix build break caused by original change This reverts commit 84b0bab5. (cherry picked from commit bbb4c85bdcc9a1bce315ed9d61a228bb1b992a1c) Change-Id: If0ead0f2656b69f33f72c64b03a05784455a4143
-
- 31 Mar, 2015 1 commit
-
-
Paul Lawrence authored
Fix build break caused by original change This reverts commit 84b0bab5. Change-Id: I99fbd7c3d1ed92db1f546033c8493bb71a327924
-
- 26 Mar, 2015 1 commit
-
-
Paul Lawrence authored
This reverts commit 6095afc1. Change-Id: Icedfe0036223d7f42eaaefc4a35ad0f2efb14e4e
-
- 23 Mar, 2015 1 commit
-
-
Paul Lawrence authored
Add file encryption flag to fstab. If file encryption flag set in fstab, handle identically to block encrypted volumes. Requires matching change: https://googleplex-android-review.git.corp.google.com/#/c/642778/ Change-Id: I28c236959f2d7d5f0dccc8ea45c325ea0cf871fc
-
- 06 Mar, 2015 1 commit
-
-
JP Abgrall authored
Some partitions don't need trimming. Needs a vold:fstrim change Bug: 19624276 Change-Id: I8df715bd18688d7921afa2f3743f7d2a68760699
-
- 27 Feb, 2015 1 commit
-
-
Sami Tolvanen authored
Currently, when verity is set up on a block device, the underlying device is still accessible directly. Change the existing function fs_set_blk_ro visible to other fs_mgr modules, change the behavior to match the comment above the function definition, and call it to disable write access to the block device when setting up verity. Bug: 18609347 Change-Id: I7884175df15f9161174788d74d20a08e4cd472ca
-
- 06 Feb, 2015 1 commit
-
-
Nick Kralevich authored
Don't silently ignore umount errors. At a minimum, log them. Add strerror(errno) to another umount call, to make sure we get some actionable data. check_fs: try 5 times umounting the filesystem. It appears that the umount is failing, perhaps because some service is opening the file on the device or other error. Try unmounting it multiple times in case it's a transient problem and we can recover. Bug: 19199624 Bug: 19156134 Change-Id: I7213eb52d55116fb2419a36494d26d5e159981a7
-
- 02 Jul, 2014 1 commit
-
-
Todd Poynor authored
MF_FORCECRYPT claimed same flag value as existing MF_NOEMULATEDSD. MF_FORCECRYPT also crashes if no "=" in the option. Modify MF_NOEMULATEDSD flag value to unique, and reformat comment to keep the definition near the other defines. Change-Id: Iec86f40ff43eea14b791d3d19c0ae11fd4b5f784
-
- 27 Jun, 2014 1 commit
-
-
JP Abgrall authored
During encryption and decryption, art is pumping out data via dex2oat into the /data that is actually a tmpfs. It currently needs ~195MB. So we increase the tmpfs from 128MB to 256MB. Bug: 15909689 Change-Id: I5d518a87d7b4eccf32fcd77f61980646ee8a3d35 Signed-off-by:
JP Abgrall <jpa@google.com>
-
- 04 Apr, 2014 1 commit
-
-
Paul Lawrence authored
forceencrypt= will encrypt the drive at boot if it is not encrypted. This change will not have an impact until we set this flag in appropirate fstabs. Bug: 11985952 Change-Id: I6c65eda7f109e4936aa160da50f871703aefb351
-
- 21 Sep, 2013 1 commit
-
-
Ken Sumrall authored
Bug: 10330128 Change-Id: I41fb178b839487b604762fbc1ccba097d25c7aa0
-
- 07 Aug, 2013 1 commit
-
-
Geremy Condra authored
This change adds a "verify" fs_mgr flag specifying that the device in question should be verified. Devices marked with this flag are expected to have a footer immediately after their data containing all the information needed to set up a verity instance. Change-Id: I10101f2c3240228ee0932e3767fe35e673d2e720
-
- 12 Jul, 2013 2 commits
-
-
Elliott Hughes authored
Change-Id: I3f8bc955f035b49407540053462e53b3f262d381
-
Elliott Hughes authored
The conflict was the actual intended change. Change-Id: Icc9493e4b24b7b53a18e2c7406ef24a81e4d4a7b
-
- 09 Jul, 2013 1 commit
-
-
Ken Sumrall authored
Swap entries can optionally specify a swapprio= or zramsize= flag in the fs_mgr flags field. Change-Id: I30530501efd4112af4e158898a9f65f6443c4fdb
-
- 23 Feb, 2013 1 commit
-
-
Ken Sumrall authored
If a device has an ext4 partition that contains the radio firmware, and that filesystem is not mounted in normal operation, we need a flag to prevent mount_all from mounting it, so the new flag recoveryonly was added. Change-Id: I361800c494e751b04c4faf956870f15fd0d8fe20
-
- 19 Feb, 2013 1 commit
-
-
Ken Sumrall authored
Update fs_mgr to support more flags needed to unify the 3 fstabs currently in android into one. Change-Id: Ie46cea61a5b19882c55098bdd70f39e78fb603be
-
- 04 Jan, 2013 1 commit
-
-
Andrew Boie authored
In practice 5 seconds is too short to wait for a disk device node to show up if the disk is USB; 20 seconds is a much more comfortable window. Change-Id: Iaf2c1f46b41a44fc1240d52d8498ca9cb639ea80 Signed-off-by:
Andrew Boie <andrew.p.boie@intel.com>
-
- 01 May, 2012 2 commits
-
-
Ken Sumrall authored
Instead of specifying in init what to mount, and having various hacks in init itself to deal with encryption, use a filesystem manager library to do the work, that can also be invoked by vold when mounting an encrypted volume. Keep all the magic filesystem info an a device specific fstab file. Change-Id: Ib988f1e4fb0638ba1d5fd98407fa6d8cf862aaca
-
Ken Sumrall authored
Instead of specifying in init what to mount, and having various hacks in init itself to deal with encryption, use a filesystem manager library to do the work, that can also be invoked by vold when mounting an encrypted volume. Keep all the magic filesystem info an a device specific fstab file. Change-Id: Ib988f1e4fb0638ba1d5fd98407fa6d8cf862aaca
-