- 11 Mar, 2013 1 commit
-
-
Jean-Baptiste Queru authored
-
- 18 Oct, 2012 2 commits
-
-
The Android Automerger authored
-
Ken Sumrall authored
The previous problem of the framework not properly restarting after accepting the password to decrypt the storage is also a problem when restarting the framework to display the encryption progress screen. So like the previous hacky fix, add a sleep to wait a few moments before proceeding. Also, increase the sleep of the previous fix from 1 second to 2, as the problem was seen once more in testing. A proper fix has been designed and hopefully will work and be checked-in RSN. Change-Id: Icc2c072ce7f7ebcdea22cd7ff8cb2b87a627c578
-
- 09 Oct, 2012 2 commits
-
-
Ken Sumrall authored
There is a race in the encryption code that after it accepts the decryption password, it tells init to kill all the processes in class "main", then it mounts the decrypted filesystem, preps it, and restarts the framework. For an unknown reason on some devices, the new framework sometimes starts up before init has killed and reaped all the old processes. The proper fix is to make the killing of the old framework synchronous, so vold waits till all the processes have died. But with factory rom a few days away, the much more pragmatic solution of adding a sleep of 1 second after telling init to kill the old framework will suffice. Bug: 7271212 Change-Id: Ie971cd04abbc6f3f6500b4acd79d3b3b26d9561c
-
Ken Sumrall authored
There is a race in the encryption code that after it accepts the decryption password, it tells init to kill all the processes in class "main", then it mounts the decrypted filesystem, preps it, and restarts the framework. For an unknown reason on some devices, the new framework sometimes starts up before init has killed and reaped all the old processes. The proper fix is to make the killing of the old framework synchronous, so vold waits till all the processes have died. But with factory rom a few days away, the much more pragmatic solution of adding a sleep of 1 second after telling init to kill the old framework will suffice. Bug: 7271212 Change-Id: Ie971cd04abbc6f3f6500b4acd79d3b3b26d9561c
-
- 07 Oct, 2012 1 commit
-
-
The Android Automerger authored
-
- 04 Oct, 2012 1 commit
-
-
Jeff Sharkey authored
To support multi-user emulated storage, we mount rootfs as MS_SHARED, which means we can't MS_MOVE existing mount points rooted in the shared subtree. Initial staging is still able to MS_MOVE, since it's rooted in a MS_PRIVATE tmpfs rooted at /mnt/secure. This change fixes unmounting by operating in-place instead of trying (and failing) to MS_MOVE back to staging. Bug: 7127564 Change-Id: I4783db4319b61c0915da39361cbc7e8f4943d094
-
- 01 Oct, 2012 3 commits
-
-
Jeff Sharkey authored
Bug: 7260040 Change-Id: I96d821e11a3f0be32bfe92a4151f00f2b15d100e
-
Jeff Sharkey authored
Bug: 7260040 Change-Id: I96d821e11a3f0be32bfe92a4151f00f2b15d100e
-
The Android Automerger authored
-
- 30 Sep, 2012 1 commit
-
-
Ken Sumrall authored
The kernel seems to return from umount(2) sometimes before it has released the underlying block device. So until the kernel is fixed, try up to 10 times to load the crypto mapping table, waiting 500 ms between tries. bug: 7220345 Change-Id: Iad3bbef37cbe2e01613bb8a8c4886babdecb8328
-
- 26 Sep, 2012 1 commit
-
-
The Android Automerger authored
-
- 25 Sep, 2012 1 commit
-
-
Jeff Sharkey authored
Mount OBB containers using shared app GID, so that an app can read the mount point across users. Bug: 7212801 Change-Id: Ia1be52df9854c259b20728111f3a2c9facf4beaa
-
- 23 Aug, 2012 2 commits
-
-
Jeff Sharkey authored
Bug: 7044670 Change-Id: If1f99968b0392cae9420d067c75bfc18d1067b2c
-
Jeff Sharkey authored
Bug: 7044670 Change-Id: If1f99968b0392cae9420d067c75bfc18d1067b2c
-
- 17 Aug, 2012 3 commits
-
-
The Android Open Source Project authored
* commit '7c5109be':
-
The Android Open Source Project authored
Change-Id: I3ec7be5d1d08566f120f18b68d2f691f92f006c8
-
The Android Automerger authored
-
- 13 Aug, 2012 3 commits
-
-
Kenny Root authored
* commit '62224a32': Only cleanup ASECs in external storage DO NOT MERGE
-
Kenny Root authored
* commit 'eacf7e03': Only cleanup ASECs in external storage DO NOT MERGE
-
Kenny Root authored
Any ASEC or OBB files were unmounted when USB storage was set to UMS mode. This changes it so only ASEC files on external storage and OBB files mounted from external storage are unmounted. (Cherry-pick of 93ecb38d) Bug: 6948035 Change-Id: Ib60727bd360caa32173797ff5b4e1e21fcf20054
-
- 09 Aug, 2012 1 commit
-
-
Kenny Root authored
Any ASEC or OBB files were unmounted when USB storage was set to UMS mode. This changes it so only ASEC files on external storage and OBB files mounted from external storage are unmounted. Bug: 6948035 Change-Id: I91bc09ee5b792970b0eef895f6886f3ffad00e8f
-
- 29 Jun, 2012 1 commit
-
-
Ken Sumrall authored
-
- 27 Jun, 2012 1 commit
-
-
Ken Sumrall authored
Change-Id: If629fa996b135e432bc89da7518b0c1f02750b45
-
- 26 Jun, 2012 1 commit
-
-
Nick Kralevich authored
When creating a new file using open(..., O_CREAT), it is an error to fail to specify a creation mode. If a mode is not specified, a random stack provided value is used as the "mode". This will become a compile error in a future Android change. Change-Id: I761708c001247d7a2faac2e286288b45bfecc6f7
-
- 19 Jun, 2012 2 commits
-
-
The Android Open Source Project authored
* commit '9ee8a315': Unmount all asec apps before encrypting
-
The Android Open Source Project authored
Change-Id: I60294fb5c41ef34eccc322889168497d9449c6ea
-
- 18 Jun, 2012 2 commits
-
-
Ken Sumrall authored
* commit 'a7926050': Unmount all asec apps before encrypting
-
Ken Sumrall authored
* commit '425524db': Unmount all asec apps before encrypting
-
- 15 Jun, 2012 2 commits
-
-
Ken Sumrall authored
Now that forward locked apps are stored on /data as asec image files that are mounted, they need to be unmounted before /data can be unmounted so it can be encrypted. Change-Id: I7c87deb52aaed21c8ad8ce8aceb7c15c2338620a
-
Ken Sumrall authored
Now that forward locked apps are stored on /data as asec image files that are mounted, they need to be unmounted before /data can be unmounted so it can be encrypted. Change-Id: I7c87deb52aaed21c8ad8ce8aceb7c15c2338620a
-
- 22 May, 2012 3 commits
-
-
Jean-Baptiste Queru authored
* commit 'e925ff66': Delay disk inserted broadcast until disk is ready
-
Jean-Baptiste Queru authored
* commit 'bac5eb96': Delay disk inserted broadcast until disk is ready
-
Jean-Baptiste Queru authored
-
- 16 May, 2012 2 commits
-
-
The Android Open Source Project authored
* commit '2fdea0aa': Native library loading needs to read directory Only set permissions on dirs or files Fix truncation of ASEC ids
-
The Android Open Source Project authored
Change-Id: I2bc2763dc285edb9aa8bd9bedd068ee4483a3ce5
-
- 14 May, 2012 1 commit
-
-
The Android Automerger authored
-
- 11 May, 2012 3 commits
-
-
Kenny Root authored
* commit '760cec44': Sleep to wait for dm to create node
-
Kenny Root authored
* commit '41836711': Sleep to wait for dm to create node
-
Kenny Root authored
-