89f74fbf2529d708534c041d2b711af0f1feff9f |
|
21-Oct-2015 |
Jeff Sharkey <jsharkey@android.com> |
Kill apps using storage through bind mounts. When unmounting an emulated volume, look for apps with open files using the final published volume path. Without this change, we were only looking at the internal paths used for runtime permissions, which apps never use directly. This meant we'd always fail to unmount the volume if apps didn't respect the EJECTING broadcast, and volume migration would end up wedged until the device rebooted. Bug: 24863778 Change-Id: Ibda484e66ab95744c304c344b226caa5b10b7e2e
/system/vold/Process.cpp
|
ce6a913aeac7db94a41362c63bab74092767bb3e |
|
09-Apr-2015 |
Jeff Sharkey <jsharkey@android.com> |
Exclusive exec() path, format after partition. Sadly setexeccon() is process global, so we need to carefully ensure that all exec() are mutually exclusive to avoid transitioning into unwanted domains. Also, because we have several threads floating around, we need to guard all our FDs with O_CLOEXEC. Format all newly created volumes immediately after partitioning, but silence all events emitted from those volumes to prevent the framework from getting all excited. Unify all notify events under a single codepath to make them easy to silence. Sent SIGINT before escalating to SIGTERM when unmounting. Bug: 19993667 Change-Id: Idc6c806afc7919a004a93e2240b42884f6b52d6b
/system/vold/Process.cpp
|
36801cccf27152c9eca5aab6ba3527221525110f |
|
14-Mar-2015 |
Jeff Sharkey <jsharkey@android.com> |
Progress towards dynamic storage support. Wire up new Disk and VolumeBase objects and events to start replacing older DirectVolume code. Use filesystem UUID as visible PublicVolume name to be more deterministic. When starting, create DiskSource instances based on fstab, and watch for kernel devices to appear. Turn matching devices into Disk objects, scan for partitions, and create any relevant VolumeBase objects. Broadcast all of these events towards userspace so the framework can decide what to mount. Keep track of the primary VolumeBase, and update the new per-user /storage/self/primary symlink for all started users. Provide a reset command that framework uses to start from a known state when runtime is restarted. When vold is unexpectedly killed, try recovering by unmounting everything under /mnt and /storage before moving forward. Remove UMS sharing support for now, since no current devices support it; MTP is the recommended solution going forward because it offers better multi-user support. Switch killProcessesWithOpenFiles() to directly take signal. Fix one SOCK_CLOEXEC bug, but SELinux says there are more lurking. Bug: 19993667 Change-Id: I2dad1303aa4667ec14c52f774e2a28b3c1c1ff6d
/system/vold/Process.cpp
|
2152266deb82f96ef5a22d3a56a76bf6177e1e04 |
|
06-Feb-2015 |
Henrik Baard <henrik.baard@sonymobile.com> |
Change strncpy to strlcpy Change all function calls to strncpy to strlcpy. Change-Id: I2bbefb7829d715847c5b26f4b9f0faddbd4c89d0
/system/vold/Process.cpp
|
8439dc9fd569794b1a31f67cf43d9212de33eecc |
|
15-Dec-2014 |
Tim Murray <timmurray@google.com> |
Make vold compile with -Werror -Wall. -Wno-missing-field-initializers is used as well, but that is an overzealous warning from initializing structs with {0} and not a real warning. bug 18736778 and 16868177 Change-Id: Iffde89cd7200d9a11193e1614f1819f9fcace30a
/system/vold/Process.cpp
|
3f14fe45a3e7bc0d12ba26d20a36d355a10f623e |
|
22-Sep-2014 |
jessica_yu <jessica_yu@htc.com> |
print information about opened files when failed unmount Change-Id: I88ae719cdae490433390d624f75612a9f4f96677 Cryptfs : Enabling support for allow_discards in dmcrypt. Cryptfs : Password matches Cryptfs : test_mount_encrypted_fs(): Master key saved TrustyKeymaster: Creating device TrustyKeymaster: Device address: 0x7f8f416100 Cryptfs : keymaster version is 3 Cryptfs : Just asked init to shut down class main ServiceManager: service 'drm.drmManager' died ServiceManager: service 'media.audio_flinger' died ServiceManager: service 'media.player' died ServiceManager: service 'media.camera' died ServiceManager: service 'android.security.keystore' died Cryptfs : unmounting /data failed Bug: 17576594
/system/vold/Process.cpp
|
97ac40e4e6f3ed0bd5d6878d7d8d4a54fcaecb76 |
|
24-Mar-2010 |
San Mehat <san@google.com> |
vold: Switch from LOG -> SLOG Change-Id: I48ee8bd90b47f5845f069cdf4d1b8ba6ecdb1b39 Signed-off-by: San Mehat <san@google.com>
/system/vold/Process.cpp
|
b3b4318ab8e2908f7b3c75fb68a5cbfc48fe6ab2 |
|
18-Feb-2010 |
Kenny Root <kroot@google.com> |
Check length of filenames before strcat Just in case someone tries to set up a series of links to trick us, do a quick sanity check on the total length of the strings we're about to concatenate. Change-Id: Iba9617008dbc1e93e1907393052caf1e52fbe312
/system/vold/Process.cpp
|
586536c60b773e3517531ad8a6cb0de6722c67fc |
|
17-Feb-2010 |
San Mehat <san@google.com> |
vold: Refactor Processkiller and add command to return users of a mount point Signed-off-by: San Mehat <san@google.com>
/system/vold/Process.cpp
|