- 14 Jul, 2011 2 commits
-
-
David 'Digit' Turner authored
* commit '137858b4': Avoid array overrun. We can now mount the /sdcard partition on our boot sdcards
-
David 'Digit' Turner authored
Change-Id: I108a0c32efb5add1fec41bfe76f041971801d48d
-
- 08 Jul, 2011 1 commit
-
-
David 'Digit' Turner authored
-
- 29 Jun, 2011 2 commits
-
-
Mike Lockwood authored
* commit '2c9d8de7': Prevent buffer overflows.
-
Mike Lockwood authored
-
- 27 Jun, 2011 1 commit
-
-
Peter Bohm authored
To eliminate possible buffer overflows some strcpy, sprintf and strcat have been changed to strlcpy, snprintf and strlcat. Change-Id: Ieb9d4b600c894946a6492f8629ff39f2fcc106d3 Signed-off-by:
Oskar Andero <oskar.andero@sonyericsson.com>
-
- 09 Jun, 2011 1 commit
-
-
Bruce Beare authored
Orig-Change-Id: I6e9db8c55db49b4aa61dd40cd59495f55e5b3368 Signed-off-by:
Bruce Beare <brucex.j.beare@intel.com>
-
- 07 Jun, 2011 2 commits
-
-
Nick Kralevich authored
* commit 'b20d54b2': fix double closing file descriptors
-
Nick Kralevich authored
-
- 06 Jun, 2011 1 commit
-
-
Robert CH Chou authored
Change-Id: I243628b77a0b7b138785167ccb5520e1a9374a78
-
- 09 May, 2011 2 commits
-
-
The Android Automerger authored
* commit '4e00f1fa': DO NOT MERGE Only create android_secure mountpoint on the primary external storage volume. DO NOT MERGE Mount secondary external storage writable by AID_MEDIA_RW rather than AID_SDCARD_RW
-
The Android Automerger authored
-
- 04 May, 2011 6 commits
-
-
Mike Lockwood authored
am 745ddcb2: DO NOT MERGE Only create android_secure mountpoint on the primary external storage volume. * commit '745ddcb2': DO NOT MERGE Only create android_secure mountpoint on the primary external storage volume.
-
Mike Lockwood authored
am f4cd1c6b: DO NOT MERGE Mount secondary external storage writable by AID_MEDIA_RW rather than AID_SDCARD_RW * commit 'f4cd1c6b': DO NOT MERGE Mount secondary external storage writable by AID_MEDIA_RW rather than AID_SDCARD_RW
-
Mike Lockwood authored
Change-Id: If2532ce8ca7d584f2442d830450313198234bd23 Signed-off-by:
Mike Lockwood <lockwood@android.com>
-
Mike Lockwood authored
Change-Id: Id9a6fa6705cf97b94d419e85b5d74413e79fc748 Signed-off-by:
Mike Lockwood <lockwood@android.com>
-
Mike Lockwood authored
Change-Id: If21d134e7d8333b8214603a2d43a3153ab8760cc Signed-off-by:
Mike Lockwood <lockwood@android.com>
-
Mike Lockwood authored
Change-Id: Id65f76eacaec1787aa557f96447c5bc19b7b127f Signed-off-by:
Mike Lockwood <lockwood@android.com>
-
- 26 Apr, 2011 3 commits
-
-
Conley Owens authored
am 9cb6e501: Ignore change "Set SO_PASSCRED on the uevent socket." in favor of change in internal tree. * commit '9cb6e501': Set SO_PASSCRED on the uevent socket. (needed for change I393c21da)
-
Conley Owens authored
in internal tree. Change-Id: Ibdf7cf1e1d0ba177d9de813baa6481ddd31d5d9c
-
Conley Owens authored
-
- 25 Apr, 2011 1 commit
-
-
Vernon Tang authored
Change-Id: I09a8a6d7c654869a40339adce181e6b981f10369
-
- 19 Apr, 2011 3 commits
-
-
Nick Kralevich authored
* commit '77992e71': vold: Enable the SO_PASSCRED socket option
-
Nick Kralevich authored
Ensure that sender credentials are available when we receive a netlink message. This is a manual cherry-pick of c51920c8 Change-Id: I98aff8733449617d35d20bff2fe77e9d3f22f57e
-
Nick Kralevich authored
* commit 'b9aa1459': vold: Enable the SO_PASSCRED socket option
-
- 18 Apr, 2011 5 commits
-
-
Nick Kralevich authored
* commit 'c51920c8': vold: Enable the SO_PASSCRED socket option
-
Nick Kralevich authored
Ensure that sender credentials are available when we receive a netlink message. Change-Id: I48411205a8fbc1ebd29834f64028662d80f15995
-
Nick Kralevich authored
* commit 'aecf0e2a': add bounds checking for mPartMinors[]
-
Nick Kralevich authored
* commit 'f3d3ce5e': add bounds checking for mPartMinors[]
-
Nick Kralevich authored
Change-Id: I6d5b26756c8434d6396f3535252608ce61eabfd8
-
- 10 Mar, 2011 2 commits
-
-
Ken Sumrall authored
Fix for bug 3415286. Trigger an action in init.rc to load the persistent properties after /data has been decrypted and mounted. Change-Id: I5fe3b481bcc6963113e830728c204b22ffc3b722
-
Ken Sumrall authored
The new android_reboot() function is a nicer way to reboot. It can optionally sync(2) and remount as read-only writable filesystems. This fixes bug 3350709. Change-Id: I4618bd5e8cccdce08494a7ca3f40ef72b2875e68
-
- 15 Feb, 2011 1 commit
-
-
Ken Sumrall authored
Need to detect if the encryption process didn't finish successfully, and if so, provide a way for the UI to detect that and give the user an option to wipe the system clean. Otherwise, the user is stuck in a reboot loop, and they will need to do magic button presses to enter recovery and wipe the device to get out of it. Change-Id: I58253e1e523ee42bdd1a59aa7d8a9d20071bd18b
-
- 02 Feb, 2011 4 commits
-
-
Kenny Root authored
* commit '18ed5640': Use LOOP_GET_STATUS64 for checking loop devices
-
Kenny Root authored
-
Ken Sumrall authored
* commit '7f7dbaa2': Improve detection of incomplete encryption
-
Kenny Root authored
To determine whether a loop device was available, we use an ioctl call to LOOP_GET_STATUS, but this fails on devices with large storage partitions with errno = EOVERFLOW. Instead use LOOP_GET_STATUS64 which succeeds. Bug: 3412121 Change-Id: Ica3cb48885d3555f2d27073c00e31fc51a08c730
-
- 01 Feb, 2011 3 commits
-
-
Ken Sumrall authored
Bug 3384231 is punted to MR1, but the code to set the flag is already in the tree, so this CL does 3 things: 1. Comments out the lines that set the flag 2. Removes the change to the checkpw that was added in the last change. 3. Implements a new command to check the flag (which no one is calling yet and the flag won't be set anyhow). When MR1 comes, it will be a simple matter to enable the flag setting code and start testing it. The fear is a false positive detection of incomplete encryption could cause people to be prompted to wipe their data when MR1 comes out and the flag is checked. Not setting this for first release, and testing this more before MR1, will give us confidence that the code will not detect false positives of encryption failure. Change-Id: I6dfba11646e291fe5867e8375b71a53c815f3968
-
Ken Sumrall authored
* commit 'd33d417e': Detect when encryption failed to complete
-
Ken Sumrall authored
For the case there encryption failes to complete because of a kernel crash or the user power cycling the device, define a flag in the crypto footer that says encryption is in progress. Set it when starting the actual encryption, and clear it when it successfully completes. When the user is asked for the disk password, if the flag is set, return a special error to the caller so the UI can know to tell the user there is no valid data on the disk, and present a button to wipe and reset the device. Change-Id: I3723ec77f33437d94b3ac9ad5db0a5c950d11648
-