--
unsubscribe: android-kerne...@googlegroups.com
website: http://groups.google.com/group/android-kernel
One more thing, I use froyo because I don't have a 64 bit computer.
when I try to compile a newer version than froyo, it writes that I
need a 64-bit computer.
Thanks
Andria
On 10 mai, 03:34, Arindam Roy <rarin...@gmail.com> wrote:
> Also, in Froyo, it might not be a good idea to enable ext4.
> Because the framework code may not be handling the buffering issue for ext4,
> as being done in GB.http://android-developers.blogspot.com/2010/12/saving-data-safely.html
>
> <http://android-developers.blogspot.com/2010/12/saving-data-safely.html>
> Thanks,
> Arindam
>
>
>
>
>
>
>
you can't mount ext4 on top of a mtd device. It requires to have a
block device mtd is a flash devices. Becuase ext4 don't know about
wearleaving and other flash specefic things you can not use it
directly on top of a flash device.
cheers Kolja
Then I modify the init.rc in the froyo folder.
I launch make to get new system.img ramdisk.img and userdata.img.
mount yaffs2 mtd@userdata /data nosuid nodev -> mount ext4
mtd@userdata /data nosuid nodev
Just FYI, upstream yaffs2 supports extended attributes; I have it
working with SELinux (with a couple of small changes that I posted to
the yaffs mailing list).
Name Less, the Jedi > What do you mean by f.ex? I downloaded the
unyaffs tool but it doesn't work. But you give me a first clue so I'm
gonna find an unyaffs-like tool.
I thought about an other way: instead of yaffs2 image how about
building an ext4 img directly? It seems like the yaffs2 img are built
by the mkyaffs2image command. So maybe I can replace it with
make_ext4fs.
No, upstream yaffs2 added native support for extended attributes last
year. You can just clone the upstream yaffs2 repository and patch it
into your kernel. If you want new files to automatically have security
attributes set upon creation, you also need the patch I posted to the
yaffs mailing list.
Git repo:
git clone git://www.aleph1.co.uk/yaffs2
Mailing list:
http://lists.aleph1.co.uk/cgi-bin/mailman/listinfo/yaffs
> What you were working on seems interesting.
> What I intend to do is information flow control. Does the version of
> SELinux that you use depends on LSM hooks?
Truly enforcing information flow control requires mandatory access
controls in the kernel.
Yes, it depends on LSM hooks (but both LSM and SELinux are part of the
mainline kernel, so it just requires enabling the requisite kernel
configuration options and rebuilding).
> Is there a link to your
> project or its wiki?
Not yet; it is still in the early stages.