- Jul 23, 2020
-
-
Linux Build Service Account authored
Change-Id: I966988cb86718bd1cc2932c2eb8e168babca9ccd
-
- Jul 09, 2020
-
-
Change-Id: Ia8ca46575dcda2da23462074442b2e944c7a068c
-
- Jun 10, 2020
-
-
Eric Arseneau authored
Change-Id: I0cc3c292dc5daad9c749b22c78eb1d3b7a3f9bce
-
- Mar 30, 2020
-
-
android-build-team Robot authored
Change-Id: Iedec906e4510248a5946cb3a8f2ca79e68c5e042
-
- Mar 27, 2020
-
-
David Anderson authored
Bug: 134711825 Bug: 149462396 Test: StorageManagerTest Change-Id: Id8616804bba622226ca21b8eff0d3eb577b4b7e0 Merged-In: Id8616804bba622226ca21b8eff0d3eb577b4b7e0
-
- Jan 18, 2020
-
-
Linux Build Service Account authored
Change-Id: Ic87319db87233aa6f3b00c4b036c9117ef5587fd
-
- Dec 25, 2019
-
-
Change-Id: I89451dabd6942e9f34eff151c11d3cd9a18c3a63
-
- Dec 18, 2019
-
-
Eric Arseneau authored
Change-Id: I703697595a918fea1d00be3c46f8bc201bf94160
-
- Oct 25, 2019
-
-
Linux Build Service Account authored
Change-Id: I90109324d0523a45badc63264367d2745fe63eb5
-
- Oct 02, 2019
-
-
Change-Id: Ife10e8038c1cfdf99cfbe2dde820f207dad89a54
-
- Sep 21, 2019
-
-
android-build-team Robot authored
Change-Id: Ibb3cf7ec9163d5870c6b51d8d14bdf4985b63feb
-
- Sep 19, 2019
-
-
android-build-team Robot authored
Change-Id: I0f78ab10be71bca6f4230d4ac0e43a91b71d0c28
-
- Sep 18, 2019
-
-
Paul Lawrence authored
Current behavior: Assume not checkpointing cp_startCheckpoint creates the file in metadata cp_needsCheckpoint will now set isCheckpointing to true cp_commitCheckpoint will now think there is a checkpoint, and try to commit it. This will fail on ext4 and it will return false, leading to bad things. cp_startCheckpoint is called when staging an apex module for update. After this point, several things could go wrong: If a keystore key is deleted, it calls cp_needsCheckpoint to see if the delete should be deferred until cp_commitCheckpoint. The delete will now be deferred, meaning that this key will never be deleted, using up the key sots in trustzone If a trim is scheduled through idle maintenance, this also calls cp_needsCheckpoint, so the trims will not occur. If either of these happens before a system crash, the device will not recover since the system calls commitCheckpoint which will now crash. When the system then goes on to reboot, the checkpoint will not be triggered, since the commitCheckpoint call will have deleted the checkpoint flag file before crashing. Bug: 138952436 Test: vdc checkpoint startCheckpoint 5 vdc checkpoint needsCheckpoint vdc checkpoint commitChanges stop;start commitChanges fails, then device loops After applying this test, commitChanges succeeds and device does not loop Change-Id: I135099625f77344d1f8d2e8688735871c44ef2f5 Merged-In: I135099625f77344d1f8d2e8688735871c44ef2f5
-
- Sep 17, 2019
-
-
Paul Crowley authored
Bug: 140882488 Test: Booted twice, checked logs to ensure encryption is different each time, adb created files in directory. Cherry-Picked-From: c8a3ef3f3c501c7bc14a2078dde513765cdb56d7 Merged-In: I74077bf8f727dab726c25f512ed7406a74cbe0bf Change-Id: I74077bf8f727dab726c25f512ed7406a74cbe0bf
-
- Sep 11, 2019
-
-
Gaurav Kashyap authored
Fix to open the correct block dev path during doCreate(). CRs-Fixed: 2516452 Change-Id: Ice29f9a5a8b2d3c7c4554448a69c6f091ae4ac22
-
- Aug 13, 2019
-
-
android-build-team Robot authored
Change-Id: I75ee6568ee6a69aaf4501dd7f0deee1f9160ac4f
-
- Aug 12, 2019
-
-
Jaegeuk Kim authored
am: 6c5e453f Change-Id: I5710fcce302d040a29ff798df85bf71ef6e3fbb5
-
Jaegeuk Kim authored
Don't make stale zero'ing IO in block device after unlink, since filesystem can reuse the block addresses and issue some IOs. If block layer reordered two IOs, filesystem will see zero data, which crashes filesystem consistency. Bug: 136964285 Test: run cts -m CtsDevicePolicyManagerTestCases -t com.android.cts.devicepolicy.CrossProfileAppsHostSideTest Change-Id: I43c13622d094cecda1c53468adc240002111d605 Signed-off-by:
Jaegeuk Kim <jaegeuk@google.com>
-
- Aug 08, 2019
-
-
Linux Build Service Account authored
Change-Id: If495e7f640efe33dcc335419adee3293f9c73705
-
- Jul 20, 2019
-
-
Change-Id: I38047ca3d414e86324129cecc519e313308be6da
-
- Jul 19, 2019
-
-
Change-Id: Ida54f5beee5cb08967e85d80e5840cd398fb61cf
-
Change-Id: I5c5a22ca5473c66132c3c8bfedb96a7ef21f8de8
-
Treehugger Robot authored
-
- Jul 18, 2019
-
-
Gaurav Kashyap authored
Identify UFS Card while mounting during adoptable storage, and use ICE for encryption/decryption if it is the case as compared to software encryption being used for SD card. CRs-Fixed: 2491182 Change-Id: Iea7e34b06e3ceab8e292ac14d5115566382609ab
-
- Jul 17, 2019
-
-
Change-Id: Idea59360dfecdd1ecdc72f5db68fcdb4fe256578
-
Linux Build Service Account authored
Change-Id: Iba80865d3fc7d7596e3a69d38f95918d9b23c350
-
- Jul 16, 2019
-
-
Eric Arseneau authored
Change-Id: I3ab8598f630215f0f295b91526b8668dfec585e6
-
- Jul 11, 2019
-
-
Eric Arseneau authored
Change-Id: Icc533b4f247cd891cf73471865058b1e42fa42c3
-
- Jul 08, 2019
-
-
android-build-team Robot authored
Change-Id: I402d144258df8eefe4c87766616ba32221bfbb67
-
- Jul 05, 2019
-
-
Change-Id: I7875ed8e7c6442fefe2a6677030be16f7dd66b2f
-
Treehugger Robot authored
-
Ramesh Garimella authored
Change-Id: I903e9af2287adc18ef8ef73d9dea7f63baefb87d
-
Ramesh Garimella authored
Merge "[automerger] vold: resolve crypto device creation failure with dm-crypt skipped: 4b5c1b2db2" into q-keystone-qcom-dev
-
- Jul 03, 2019
-
-
Change-Id: Ie5146212a1e51d24013bc80caed1edf1456feec8
-
- Jul 01, 2019
-
-
Scott Lobdell authored
Change-Id: I0902ecd93980c920691b102cc96569aebeff5e32
-
Change-Id: Idcd712067d770c66d5a3111a0efcabf170623ab5
-
Ramesh Garimella authored
-
- Jun 29, 2019
-
-
android-build-team Robot authored
Change-Id: Id5f0961e1f5bf706b3a0ce30bc470ff5062be7d3
-
android-build-team Robot authored
Change-Id: Ic934f150452f38c6671c217505f90be13ff4d2a1
-
- Jun 28, 2019
-
-
Change-Id: I91e860575fcf5e472e0dce8ed9c8dbdf5f53c079
-