1. 11 Mar, 2013 1 commit
  2. 18 Oct, 2012 2 commits
    • The Android Automerger's avatar
    • Ken Sumrall's avatar
      Another fix for encryption · 92736efa
      Ken Sumrall authored
      The previous problem of the framework not properly restarting after accepting
      the password to decrypt the storage is also a problem when restarting the
      framework to display the encryption progress screen.  So like the previous
      hacky fix, add a sleep to wait a few moments before proceeding.  Also,
      increase the sleep of the previous fix from 1 second to 2, as the problem
      was seen once more in testing.  A proper fix has been designed and hopefully
      will work and be checked-in RSN.
      
      Change-Id: Icc2c072ce7f7ebcdea22cd7ff8cb2b87a627c578
      92736efa
  3. 09 Oct, 2012 2 commits
    • Ken Sumrall's avatar
      Fix encryption on certain devices · f1a6123f
      Ken Sumrall authored
      There is a race in the encryption code that after it accepts the
      decryption password, it tells init to kill all the processes in
      class "main", then it mounts the decrypted filesystem, preps it,
      and restarts the framework.  For an unknown reason on some devices,
      the new framework sometimes starts up before init has killed and
      reaped all the old processes.  The proper fix is to make the killing
      of the old framework synchronous, so vold waits till all the
      processes have died.  But with factory rom a few days away, the
      much more pragmatic solution of adding a sleep of 1 second after
      telling init to kill the old framework will suffice.
      
      Bug: 7271212
      Change-Id: Ie971cd04abbc6f3f6500b4acd79d3b3b26d9561c
      f1a6123f
    • Ken Sumrall's avatar
      Fix encryption on certain devices · 9dedfd47
      Ken Sumrall authored
      There is a race in the encryption code that after it accepts the
      decryption password, it tells init to kill all the processes in
      class "main", then it mounts the decrypted filesystem, preps it,
      and restarts the framework.  For an unknown reason on some devices,
      the new framework sometimes starts up before init has killed and
      reaped all the old processes.  The proper fix is to make the killing
      of the old framework synchronous, so vold waits till all the
      processes have died.  But with factory rom a few days away, the
      much more pragmatic solution of adding a sleep of 1 second after
      telling init to kill the old framework will suffice.
      
      Bug: 7271212
      Change-Id: Ie971cd04abbc6f3f6500b4acd79d3b3b26d9561c
      9dedfd47
  4. 07 Oct, 2012 1 commit
  5. 04 Oct, 2012 1 commit
    • Jeff Sharkey's avatar
      Unmount in-place instead of using MS_MOVE. · 7a3c3d46
      Jeff Sharkey authored
      To support multi-user emulated storage, we mount rootfs as MS_SHARED,
      which means we can't MS_MOVE existing mount points rooted in the
      shared subtree.  Initial staging is still able to MS_MOVE, since it's
      rooted in a MS_PRIVATE tmpfs rooted at /mnt/secure.
      
      This change fixes unmounting by operating in-place instead of trying
      (and failing) to MS_MOVE back to staging.
      
      Bug: 7127564
      Change-Id: I4783db4319b61c0915da39361cbc7e8f4943d094
      7a3c3d46
  6. 01 Oct, 2012 3 commits
  7. 30 Sep, 2012 1 commit
    • Ken Sumrall's avatar
      Workaround a kernel race when loading dmcrypt table · e919efea
      Ken Sumrall authored
      The kernel seems to return from umount(2) sometimes before it has
      released the underlying block device.  So until the kernel is fixed,
      try up to 10 times to load the crypto mapping table, waiting 500 ms
      between tries.
      
      bug: 7220345
      
      Change-Id: Iad3bbef37cbe2e01613bb8a8c4886babdecb8328
      e919efea
  8. 26 Sep, 2012 1 commit
  9. 25 Sep, 2012 1 commit
    • Jeff Sharkey's avatar
      Handle multi-user mountObb() requests. · 6947904a
      Jeff Sharkey authored
      Mount OBB containers using shared app GID, so that an app can read
      the mount point across users.
      
      Bug: 7212801
      Change-Id: Ia1be52df9854c259b20728111f3a2c9facf4beaa
      6947904a
  10. 23 Aug, 2012 2 commits
  11. 17 Aug, 2012 3 commits
  12. 13 Aug, 2012 3 commits
  13. 09 Aug, 2012 1 commit
    • Kenny Root's avatar
      Only cleanup ASECs in external storage · 93ecb38d
      Kenny Root authored
      Any ASEC or OBB files were unmounted when USB storage was set to UMS
      mode. This changes it so only ASEC files on external storage and OBB
      files mounted from external storage are unmounted.
      
      Bug: 6948035
      Change-Id: I91bc09ee5b792970b0eef895f6886f3ffad00e8f
      93ecb38d
  14. 29 Jun, 2012 1 commit
  15. 27 Jun, 2012 1 commit
  16. 26 Jun, 2012 1 commit
    • Nick Kralevich's avatar
      Add mode when open(O_CREAT) is used. · 4684e58a
      Nick Kralevich authored
      When creating a new file using open(..., O_CREAT), it is an error
      to fail to specify a creation mode. If a mode is not specified, a
      random stack provided value is used as the "mode".
      
      This will become a compile error in a future Android change.
      
      Change-Id: I761708c001247d7a2faac2e286288b45bfecc6f7
      4684e58a
  17. 19 Jun, 2012 2 commits
  18. 18 Jun, 2012 2 commits
  19. 15 Jun, 2012 2 commits
    • Ken Sumrall's avatar
      Unmount all asec apps before encrypting · 4053aaef
      Ken Sumrall authored
      Now that forward locked apps are stored on /data as asec image files
      that are mounted, they need to be unmounted before /data can be unmounted
      so it can be encrypted.
      
      Change-Id: I7c87deb52aaed21c8ad8ce8aceb7c15c2338620a
      4053aaef
    • Ken Sumrall's avatar
      Unmount all asec apps before encrypting · 425524db
      Ken Sumrall authored
      Now that forward locked apps are stored on /data as asec image files
      that are mounted, they need to be unmounted before /data can be unmounted
      so it can be encrypted.
      
      Change-Id: I7c87deb52aaed21c8ad8ce8aceb7c15c2338620a
      425524db
  20. 22 May, 2012 3 commits
  21. 16 May, 2012 2 commits
  22. 14 May, 2012 1 commit
  23. 11 May, 2012 3 commits