History log of /system/vold/
Revision Date Author Comments (<<< Hide modified files) (Show modified files >>>)
3ad9072a5d6f6bda32123b367545649364e3c11d 05-Oct-2011 Ken Sumrall <ksumrall@android.com> Add the new verifypw command to vold/cryptfs

This vold command returns 0 if the given password matches the password
used to decrypt the device on boot. It returns 1 if they don't match,
and it returns -1 on an internal error, and -2 if the device is not encrypted.

Also check the uid of the sender of the command and only allow the root and
system users to issue cryptfs commands.

Change-Id: I5e5ae3b72a2d7814ae68c2d49aa9deb90fb1dac5
ommandListener.cpp
esponseCode.h
ryptfs.c
ryptfs.h
3be890f59c04f94537f2f66f1d2841ed591f1a6e 15-Sep-2011 Ken Sumrall <ksumrall@android.com> Fix cryptfs to work with a raw block device for key storage

If a raw block is specified for key storage, do not try to force the size
of the file to 16 Kbytes when writing the keys, and do not complain if
the size is not 16 Kbytes when reading the keys. Only do them if the
keyfile is a regular file.

Change-Id: I4de1cb7c3614479d93289d4f2767ca6ce1bbbc73
ryptfs.c
0b8b59719357fb80c330442787f7d5b1e332263b 01-Sep-2011 Ken Sumrall <ksumrall@android.com> Add the ability to revert a crypto mapping when unmounting a volume

Add the force_and_revert option to the unmount command which will force
the unmount, and revert a crypto mapping. This is used during factory
reset so that when the internal sdcard volume is formatted, it formats
the raw device, not the encrypted mapping.

Change-Id: I36b6ff9bb54863b121de635472a303bf4a2334a9
ommandListener.cpp
irectVolume.cpp
irectVolume.h
olume.cpp
olume.h
olumeManager.cpp
olumeManager.h
ryptfs.c
ryptfs.h
e14fcf99b59954f3b2eb07a3724c078b80d58ffd 18-Jul-2011 The Android Open Source Project <initial-contribution@android.com> Reconcile with gingerbread-release

Change-Id: Ia9383258bc25f7a82628a1c7238140b810e2f3d3
5bf00e62a2995473140f4277f08ee8918a7fba26 14-Jul-2011 David 'Digit' Turner <digit@google.com> am 6c190fd3: am 137858b4: resolved conflicts for merge of 5284bcff to gingerbread-plus-aosp

* commit '6c190fd326099d8315e194b0ad0a173e21146e14':
Avoid array overrun. We can now mount the /sdcard partition on our boot sdcards
6c190fd326099d8315e194b0ad0a173e21146e14 14-Jul-2011 David 'Digit' Turner <digit@google.com> am 137858b4: resolved conflicts for merge of 5284bcff to gingerbread-plus-aosp

* commit '137858b43b7e0ed46fb8ebce9230eb40f0a62432':
Avoid array overrun. We can now mount the /sdcard partition on our boot sdcards
137858b43b7e0ed46fb8ebce9230eb40f0a62432 14-Jul-2011 David 'Digit' Turner <digit@google.com> resolved conflicts for merge of 5284bcff to gingerbread-plus-aosp

Change-Id: I108a0c32efb5add1fec41bfe76f041971801d48d
81893259c97a0a5efb804387088f257ac4eb6296 12-Jul-2011 Jeff Brown <jeffbrown@google.com> Merge "Remove the simulator target from all makefiles. Bug: 5010576"
ea89f53387dc6451f6e2afc82b4c4bede5be6dc6 12-Jul-2011 Jeff Brown <jeffbrown@google.com> Remove the simulator target from all makefiles.
Bug: 5010576

Change-Id: I7e531101ae057fb059d7d56c99433c4d66e866dc
ndroid.mk
6f0b430815e282214b6a4f1cc534114a0765480c 12-Jul-2011 Ken Sumrall <ksumrall@android.com> Merge "Prevent sharing or formatting of a vold managed volumes during encryption."
3b17005083be230509480ea65ae67c237142fada 12-Jul-2011 Ken Sumrall <ksumrall@android.com> Prevent sharing or formatting of a vold managed volumes during encryption.

Mounting was already not allowed, but also unshare before starting
encryption, and don't allow sharing or formatting to be initiated
during encrytion.

Change-Id: Ida188d81f025739ba4dd90492b3e66088735991e
olumeManager.cpp
olumeManager.h
ryptfs.c
396844d17ad81d326bbe60ce1fca98c3a45d33ba 12-Jul-2011 Ken Sumrall <ksumrall@android.com> Merge "Fix to display the proper percentage complete during encryption."
128626fc5aa3bf12d1ae5981c7f84f63625e8972 29-Jun-2011 Ken Sumrall <ksumrall@android.com> Fix to display the proper percentage complete during encryption.

Forgot to include the size of the userdata partition when computing
the total size of vold managed volumes to encrypt.

Change-Id: I237548439d4380b4225ffbc603fa972c3b1c5bae
ryptfs.c
a0272d2c18ff992f78d99d97ec9e9985b93d3b78 08-Jul-2011 android-merger <android-build@android.com> reset, and keep history
5284bcffed2788b26399bec7150831eb8d9da74f 08-Jul-2011 David 'Digit' Turner <digit@google.com> merge intel x86 patches into gingerbread branch
52830522720525fb588201c5f309a6195785143b 08-Jul-2011 The Android Open Source Project <initial-contribution@android.com> Reconcile with gingerbread-release

Change-Id: I3cb3d915837ebe59c2d7007d71ef3a1f334e9b8b
1c55ddb75833b6bb6b7ebafd0fdf4f47596a4505 07-Jul-2011 android-merger <android-build@android.com> Revert "add bounds checking for mPartMinors[]"

This reverts commit f3d3ce5e53ab7928f4c292c183c417a1bd051151.
irectVolume.cpp
cf7369a45845466dffba252d62364f49dfc3b30d 07-Jul-2011 android-merger <android-build@android.com> Revert "vold: Enable the SO_PASSCRED socket option"

This reverts commit c51920c82463b240e2be0430849837d6fdc5352e.
etlinkManager.cpp
507d31b86b38dffe7c60ca5c54b5e631f5a7cab3 12-Apr-2011 Joseph Lehrer <jlehrer@nvidia.com> vold: retry mounting partition

Works around a race condition between the vold and MountService uevent handlers

Change-Id: I71c92f2e9b92e1fefc192da166a91d81bc60e242
Signed-off-by: Mike Lockwood <lockwood@android.com>
irectVolume.cpp
olume.cpp
olume.h
9322b103a39ec370c077152faccb60c6b3e94b2c 29-Jun-2011 Mike Lockwood <lockwood%android.com@gtempaccount.com> am 273d3549: am 2c9d8de7: Merge "Prevent buffer overflows."

* commit '273d3549198d144331f3e502eeb1215417d72b16':
Prevent buffer overflows.
273d3549198d144331f3e502eeb1215417d72b16 29-Jun-2011 Mike Lockwood <lockwood%android.com@gtempaccount.com> am 2c9d8de7: Merge "Prevent buffer overflows."

* commit '2c9d8de79a0dd7f894c65777a197c86486aff96c':
Prevent buffer overflows.
2c9d8de79a0dd7f894c65777a197c86486aff96c 29-Jun-2011 Mike Lockwood <lockwood%android.com@gtempaccount.com> Merge "Prevent buffer overflows."
736910ca99a40b9add4353bf619e778c40938948 27-Jun-2011 Dianne Hackborn <hackbod@google.com> Add new vold call to get the path to an asec fs.

Change-Id: Ife15628ed6e2493c9e85a2ade6d59a194fdddde5
ommandListener.cpp
olumeManager.cpp
olumeManager.h
092aa1c585fedd9e169eece41b8a471f1739908a 01-Apr-2011 Peter Bohm <peter.m.bohm@sonyericsson.com> Prevent buffer overflows.

To eliminate possible buffer overflows some strcpy,
sprintf and strcat have been changed to strlcpy,
snprintf and strlcat.

Change-Id: Ieb9d4b600c894946a6492f8629ff39f2fcc106d3
Signed-off-by: Oskar Andero <oskar.andero@sonyericsson.com>
evmapper.cpp
oop.cpp
dc.c
97f2fc110b2ace7914671c2f5852379bd78922e4 07-Jun-2011 Mike Lockwood <lockwood@android.com> Update path for seting USB mass storage backing store

Change-Id: I0e5fab1624e5ef5d2f55e2584d8adc1b6bab91b0
Signed-off-by: Mike Lockwood <lockwood@android.com>
olumeManager.cpp
6b715592ec94f9d75ca8119ace824ff729c104c2 18-Jun-2011 Mike Lockwood <lockwood@android.com> Merge "Remove obsolete code for monitoring USB status"
86bccb14d6db2435e0115b20e8e30f8200d06ef1 15-Jun-2011 Ken Sumrall <ksumrall@android.com> Merge "Don't abort the encryption process if an internal volume is present but unmounted."
319b1043bbbd410aa2d572d88b5936f26072d026 14-Jun-2011 Ken Sumrall <ksumrall@android.com> Don't abort the encryption process if an internal volume is present but unmounted.

It is not a failure if the SD card is not mounted.

Change-Id: If954f77c55ac124b9b7b39c89ffbafb4e5ea9e98
olume.cpp
olumeManager.cpp
olumeManager.h
ryptfs.c
5864fabc8bd407938835c18cefe059d45ca492af 09-Jun-2011 Nick Kralevich <nnk@google.com> am 598e833d: am b20d54b2: Merge "fix double closing file descriptors"

* commit '598e833d42a687259bc3c9a5a39ad9ba8b105cbb':
fix double closing file descriptors
d11b833201ae72265d52d606fa084841b44e9a65 22-Jul-2010 Bruce Beare <brucex.j.beare@intel.com> Avoid array overrun. We can now mount the /sdcard partition on our boot sdcards

Orig-Change-Id: I6e9db8c55db49b4aa61dd40cd59495f55e5b3368
Signed-off-by: Bruce Beare <brucex.j.beare@intel.com>
irectVolume.cpp
598e833d42a687259bc3c9a5a39ad9ba8b105cbb 08-Jun-2011 Nick Kralevich <nnk@google.com> am b20d54b2: Merge "fix double closing file descriptors"

* commit 'b20d54b2309adee8d192942015740735ded975d3':
fix double closing file descriptors
b20d54b2309adee8d192942015740735ded975d3 08-Jun-2011 Nick Kralevich <nnk@google.com> Merge "fix double closing file descriptors"
a976656ff90291b9437a4d37b48e82abcd48195e 07-Jun-2011 Mike Lockwood <lockwood@android.com> Remove obsolete code for monitoring USB status

Change-Id: I8ac8900b3135f03b7717540b825ff6df76f31c0b
Signed-off-by: Mike Lockwood <lockwood@android.com>
ommandListener.cpp
ommandListener.h
etlinkHandler.cpp
olumeManager.cpp
olumeManager.h
06aaa410962ec14cddcc8a6efed203a48cbd3653 06-Jun-2011 Robert CH Chou <Robert_CH_Chou@acer.com.tw> fix double closing file descriptors

Change-Id: I243628b77a0b7b138785167ccb5520e1a9374a78
ogwrapper.c
29d8da8cefa99e436c13295d4c9bad060ca18a6d 19-May-2011 Ken Sumrall <ksumrall@android.com> vold: allow to store key in a file on another partition

Add support for keeping the keys in a separate file on another partition,
for devices with no space reserved for a footer after the userdata filesystem.

Add support for encrypting the volumes managed by vold, if they meet certain
criteria, namely being marked as nonremovable and encryptable in vold.fstab.
A bit of trickiness is required to keep vold happy.

Change-Id: Idf0611f74b56c1026c45742ca82e0c26e58828fe
irectVolume.cpp
irectVolume.h
olume.cpp
olume.h
olumeManager.cpp
olumeManager.h
ryptfs.c
ryptfs.h
ain.cpp
10a9e42835e7a241e796fe1b9c159dbfb312a69d 20-May-2011 The Android Open Source Project <initial-contribution@android.com> Reconcile with gingerbread-release honeycomb-release

Change-Id: I70f4170b78ed5412a4addd3c603c8ff52c8cfa0d
93f032122f0d45d565f899cc4c8f229e4ee27e89 13-May-2011 The Android Automerger <android-build@android.com> merge in gingerbread-release history after reset to gingerbread
311e06bc72c3f8f1ee13c74f3be8c2126c8e0d27 09-May-2011 The Android Automerger <android-build@android.com> am 9496945d: (-s ours) am 4e00f1fa: Merge remote branch \'goog/honeycomb-mr2\' into honeycomb-LTE

* commit '9496945d0ded76031cb129de65be425cfa971673':
DO NOT MERGE Only create android_secure mountpoint on the primary external storage volume.
DO NOT MERGE Mount secondary external storage writable by AID_MEDIA_RW rather than AID_SDCARD_RW
9496945d0ded76031cb129de65be425cfa971673 09-May-2011 The Android Automerger <android-build@android.com> am 4e00f1fa: Merge remote branch \'goog/honeycomb-mr2\' into honeycomb-LTE

* commit '4e00f1fa4d4e82bba4afe1c2a21bf0a56b3a4c8f':
DO NOT MERGE Only create android_secure mountpoint on the primary external storage volume.
DO NOT MERGE Mount secondary external storage writable by AID_MEDIA_RW rather than AID_SDCARD_RW
4e00f1fa4d4e82bba4afe1c2a21bf0a56b3a4c8f 09-May-2011 The Android Automerger <android-build@android.com> Merge remote branch 'goog/honeycomb-mr2' into honeycomb-LTE
31ab84f6a91cfbe216cbacbc2c137c1202d44c18 04-May-2011 Mike Lockwood <lockwood@android.com> am c13e0967: (-s ours) am 745ddcb2: DO NOT MERGE Only create android_secure mountpoint on the primary external storage volume.

* commit 'c13e0967debb6b5a817004e9184e6d3466c42813':
DO NOT MERGE Only create android_secure mountpoint on the primary external storage volume.
71bde5e706164d238b9d4346d59aab9bd675a108 04-May-2011 Mike Lockwood <lockwood@android.com> am 7877388b: (-s ours) am f4cd1c6b: DO NOT MERGE Mount secondary external storage writable by AID_MEDIA_RW rather than AID_SDCARD_RW

* commit '7877388b6c65c4819e436141ccc519161b719bec':
DO NOT MERGE Mount secondary external storage writable by AID_MEDIA_RW rather than AID_SDCARD_RW
c13e0967debb6b5a817004e9184e6d3466c42813 04-May-2011 Mike Lockwood <lockwood@android.com> am 745ddcb2: DO NOT MERGE Only create android_secure mountpoint on the primary external storage volume.

* commit '745ddcb2a6247817dde0790be4c74a81e7b324d4':
DO NOT MERGE Only create android_secure mountpoint on the primary external storage volume.
7877388b6c65c4819e436141ccc519161b719bec 04-May-2011 Mike Lockwood <lockwood@android.com> am f4cd1c6b: DO NOT MERGE Mount secondary external storage writable by AID_MEDIA_RW rather than AID_SDCARD_RW

* commit 'f4cd1c6b1912d2481334152f7dec50067960a90c':
DO NOT MERGE Mount secondary external storage writable by AID_MEDIA_RW rather than AID_SDCARD_RW
745ddcb2a6247817dde0790be4c74a81e7b324d4 25-Mar-2011 Mike Lockwood <lockwood@android.com> DO NOT MERGE Only create android_secure mountpoint on the primary external storage volume.

Change-Id: If2532ce8ca7d584f2442d830450313198234bd23
Signed-off-by: Mike Lockwood <lockwood@android.com>
olume.cpp
f4cd1c6b1912d2481334152f7dec50067960a90c 23-Mar-2011 Mike Lockwood <lockwood@android.com> DO NOT MERGE Mount secondary external storage writable by AID_MEDIA_RW rather than AID_SDCARD_RW

Change-Id: Id9a6fa6705cf97b94d419e85b5d74413e79fc748
Signed-off-by: Mike Lockwood <lockwood@android.com>
olume.cpp
3bcc2410f572691620647d79f0b4e96bba08c899 25-Mar-2011 Mike Lockwood <lockwood@android.com> DO NOT MERGE Only create android_secure mountpoint on the primary external storage volume.

Change-Id: If21d134e7d8333b8214603a2d43a3153ab8760cc
Signed-off-by: Mike Lockwood <lockwood@android.com>
olume.cpp
11a3922ec6d81d8e0c61f9edd243e145dc60b599 23-Mar-2011 Mike Lockwood <lockwood@android.com> DO NOT MERGE Mount secondary external storage writable by AID_MEDIA_RW rather than AID_SDCARD_RW

Change-Id: Id65f76eacaec1787aa557f96447c5bc19b7b127f
Signed-off-by: Mike Lockwood <lockwood@android.com>
olume.cpp
cc8e96c8dccea1e8041db3146d389175582d3890 30-Apr-2011 Nick Kralevich <nnk@google.com> DirectVolume: don't continue on invalid PARTN value

Change-Id: I1e434c5b47b40fabaf1e702d7f2e43a88c0497dc
irectVolume.cpp
8bd9b3fcc65b50155b793495a6debf2263ed7d70 27-Apr-2011 Conley Owens <cco3@android.com> am 3368f167: am 9cb6e501: Ignore change "Set SO_PASSCRED on the uevent socket." in favor of change in internal tree.

* commit '3368f167578fcd2ef024e6d8da723f349089fa7c':
Set SO_PASSCRED on the uevent socket. (needed for change I393c21da)
3368f167578fcd2ef024e6d8da723f349089fa7c 27-Apr-2011 Conley Owens <cco3@android.com> am 9cb6e501: Ignore change "Set SO_PASSCRED on the uevent socket." in favor of change in internal tree.

* commit '9cb6e501f17ec2a511d942c833ea51a53bcd7249':
Set SO_PASSCRED on the uevent socket. (needed for change I393c21da)
9cb6e501f17ec2a511d942c833ea51a53bcd7249 27-Apr-2011 Conley Owens <cco3@android.com> Ignore change "Set SO_PASSCRED on the uevent socket." in favor of change
in internal tree.

Change-Id: Ibdf7cf1e1d0ba177d9de813baa6481ddd31d5d9c
c840b382c560829938dd4f6b39d0a34c7961eaa5 27-Apr-2011 Conley Owens <cco3@android.com> Merge "Set SO_PASSCRED on the uevent socket. (needed for change I393c21da)"
5f6ae96bab32bcb2871359e2381498a9c0e52af9 25-Apr-2011 Vernon Tang <vt@foilhead.net> Set SO_PASSCRED on the uevent socket. (needed for change I393c21da)

Change-Id: I09a8a6d7c654869a40339adce181e6b981f10369
etlinkManager.cpp
cf5af171190c26f62f23d45d0c653a4137b1b291 20-Apr-2011 Nick Kralevich <nnk@google.com> am b510cd4e: am 77992e71: vold: Enable the SO_PASSCRED socket option

* commit 'b510cd4e8a480cbb01ff3175f2e99b11328ff88a':
vold: Enable the SO_PASSCRED socket option
b510cd4e8a480cbb01ff3175f2e99b11328ff88a 20-Apr-2011 Nick Kralevich <nnk@google.com> am 77992e71: vold: Enable the SO_PASSCRED socket option

* commit '77992e713ceac377ed226b555685f99fcfeb2c14':
vold: Enable the SO_PASSCRED socket option
77992e713ceac377ed226b555685f99fcfeb2c14 19-Apr-2011 Nick Kralevich <nnk@google.com> vold: Enable the SO_PASSCRED socket option

Ensure that sender credentials are available when we
receive a netlink message.

This is a manual cherry-pick of
c51920c82463b240e2be0430849837d6fdc5352e

Change-Id: I98aff8733449617d35d20bff2fe77e9d3f22f57e
etlinkManager.cpp
a6456005885220d5b774ca384920578a47bd9728 19-Apr-2011 Nick Kralevich <nnk@google.com> am 46770e6e: am b9aa1459: am c51920c8: vold: Enable the SO_PASSCRED socket option

* commit '46770e6ea0876797b9f6d93e838f3d73dc91917d':
vold: Enable the SO_PASSCRED socket option
46770e6ea0876797b9f6d93e838f3d73dc91917d 19-Apr-2011 Nick Kralevich <nnk@google.com> am b9aa1459: am c51920c8: vold: Enable the SO_PASSCRED socket option

* commit 'b9aa145910e22ed97cb51545bf399e6289bca643':
vold: Enable the SO_PASSCRED socket option
82baf904c6adc9ec2adad9d5acf76e053a50eb99 19-Apr-2011 Nick Kralevich <nnk@google.com> vold: Enable the SO_PASSCRED socket option

Ensure that sender credentials are available when we
receive a netlink message.

Change-Id: I48411205a8fbc1ebd29834f64028662d80f15995
etlinkManager.cpp
b9aa145910e22ed97cb51545bf399e6289bca643 19-Apr-2011 Nick Kralevich <nnk@google.com> am c51920c8: vold: Enable the SO_PASSCRED socket option

* commit 'c51920c82463b240e2be0430849837d6fdc5352e':
vold: Enable the SO_PASSCRED socket option
c51920c82463b240e2be0430849837d6fdc5352e 19-Apr-2011 Nick Kralevich <nnk@google.com> vold: Enable the SO_PASSCRED socket option

Ensure that sender credentials are available when we
receive a netlink message.

Change-Id: I48411205a8fbc1ebd29834f64028662d80f15995
etlinkManager.cpp
f07eeb92fd2d0a4584f70a54e3a7efdccf85ac09 18-Apr-2011 Nick Kralevich <nnk@google.com> am 19df18af: am aecf0e2a: am f3d3ce5e: add bounds checking for mPartMinors[]

* commit '19df18af24490f17e82758c38157750c67da245b':
add bounds checking for mPartMinors[]
19df18af24490f17e82758c38157750c67da245b 18-Apr-2011 Nick Kralevich <nnk@google.com> am aecf0e2a: am f3d3ce5e: add bounds checking for mPartMinors[]

* commit 'aecf0e2a3dd1a72e448d9df7ed69533578dda12c':
add bounds checking for mPartMinors[]
aecf0e2a3dd1a72e448d9df7ed69533578dda12c 18-Apr-2011 Nick Kralevich <nnk@google.com> am f3d3ce5e: add bounds checking for mPartMinors[]

* commit 'f3d3ce5e53ab7928f4c292c183c417a1bd051151':
add bounds checking for mPartMinors[]
f3d3ce5e53ab7928f4c292c183c417a1bd051151 18-Apr-2011 Nick Kralevich <nnk@google.com> add bounds checking for mPartMinors[]

Change-Id: I6d5b26756c8434d6396f3535252608ce61eabfd8
irectVolume.cpp
850949485b390c0928ea2f4a7db47be73bebb718 25-Mar-2011 Mike Lockwood <lockwood@android.com> Only create android_secure mountpoint on the primary external storage volume.

Change-Id: I4069297a799260b8ecf355e91a1594b4f03126af
Signed-off-by: Mike Lockwood <lockwood@android.com>
olume.cpp
9092b1dbd31406f6939045fbef70a297b8dbeb62 23-Mar-2011 Mike Lockwood <lockwood@android.com> Mount secondary external storage writable by AID_MEDIA_RW rather than AID_SDCARD_RW

Change-Id: I8bb658bb2ab66026f0a54f9c1f80fc5c6e8d918a
Signed-off-by: Mike Lockwood <lockwood@android.com>
olume.cpp
ad2ac33460d6ee1436b68bab1f820e3b6d3efeb4 09-Mar-2011 Ken Sumrall <ksumrall@android.com> Load persistent properties after mounting an encrypted /data partition.

Fix for bug 3415286. Trigger an action in init.rc to load the persistent
properties after /data has been decrypted and mounted.

Change-Id: I5fe3b481bcc6963113e830728c204b22ffc3b722
ryptfs.c
c290eaf6852c6318584926c5e39b27672638891f 08-Mar-2011 Ken Sumrall <ksumrall@android.com> Teach vold to use the new android_reboot() function.

The new android_reboot() function is a nicer way to reboot.
It can optionally sync(2) and remount as read-only writable
filesystems. This fixes bug 3350709.

Change-Id: I4618bd5e8cccdce08494a7ca3f40ef72b2875e68
ryptfs.c
cd235da6fb36a5c7c90faf91e7d65a587f146f92 15-Feb-2011 Ken Sumrall <ksumrall@android.com> Enable detection of failed encryption process, for bug 3384231.

Need to detect if the encryption process didn't finish successfully, and if
so, provide a way for the UI to detect that and give the user an option to
wipe the system clean. Otherwise, the user is stuck in a reboot loop, and
they will need to do magic button presses to enter recovery and wipe the
device to get out of it.

Change-Id: I58253e1e523ee42bdd1a59aa7d8a9d20071bd18b
ryptfs.c
4dd1cbf09b3cfc0f60fbd73a834dd581f16a084d 05-Feb-2011 The Android Automerger <android-build@android.com> merge in honeycomb-release history after reset to honeycomb
906b81d74c366717cd6896d8076116878784cb3e 05-Feb-2011 The Android Automerger <android-build@android.com> merge in honeycomb-release history after reset to honeycomb
124a0d262edb6354b71306eb130f240231fb3901 05-Feb-2011 The Android Automerger <android-build@android.com> merge in honeycomb-release history after reset to honeycomb
bc1a67d54bf5dafd5a36cf7f70059dd3ceb02361 04-Feb-2011 The Android Automerger <android-build@android.com> merge in honeycomb-release history after reset to honeycomb
49f0e57ecc6168fc82ec45a11b752f971b7c6e3a 04-Feb-2011 The Android Automerger <android-build@android.com> merge in honeycomb-release history after reset to honeycomb
946666311f10863d99cf19b0250e16ff3eba893d 04-Feb-2011 The Android Automerger <android-build@android.com> merge in honeycomb-release history after reset to honeycomb
ad8ed7376893fb7451f4d70a41e434898f03f896 04-Feb-2011 The Android Automerger <android-build@android.com> merge in honeycomb-release history after reset to honeycomb
faad095abc2ff258a053bba637523794fdf0ddb1 03-Feb-2011 The Android Automerger <android-build@android.com> merge in honeycomb-release history after reset to honeycomb
07ecb8d797c82212e58bbeda49e4793fcbc5bb3f 03-Feb-2011 The Android Automerger <android-build@android.com> merge in honeycomb-release history after reset to honeycomb
9726aabbde8ff52819c6f6f1b6e27cd084f28e50 03-Feb-2011 The Android Automerger <android-build@android.com> merge in honeycomb-release history after reset to honeycomb
057424a224b3efcfcf3066419f33254c6b7e1e14 02-Feb-2011 The Android Automerger <android-build@android.com> merge in honeycomb-release history after reset to honeycomb
352d3f9a0987a75ddddb7b3ded1ed41dfa0b572a 02-Feb-2011 Kenny Root <kroot@google.com> am 18ed5640: Merge "Use LOOP_GET_STATUS64 for checking loop devices" into honeycomb

* commit '18ed56400bb6ae999712ba70af385100d0cd6e55':
Use LOOP_GET_STATUS64 for checking loop devices
18ed56400bb6ae999712ba70af385100d0cd6e55 02-Feb-2011 Kenny Root <kroot@google.com> Merge "Use LOOP_GET_STATUS64 for checking loop devices" into honeycomb
06c6baf3afaa3d40cbab21d22b91f0aa99778b52 02-Feb-2011 Ken Sumrall <ksumrall@android.com> am 7f7dbaa2: Improve detection of incomplete encryption

* commit '7f7dbaa2784c10fd2989fb303e5edfb8136d53dc':
Improve detection of incomplete encryption
7c16502dbc16658c45165edb1c54df6b8b02d9ca 02-Feb-2011 Kenny Root <kroot@google.com> Use LOOP_GET_STATUS64 for checking loop devices

To determine whether a loop device was available, we use an ioctl call
to LOOP_GET_STATUS, but this fails on devices with large storage
partitions with errno = EOVERFLOW. Instead use LOOP_GET_STATUS64 which
succeeds.

Bug: 3412121
Change-Id: Ica3cb48885d3555f2d27073c00e31fc51a08c730
oop.cpp
7f7dbaa2784c10fd2989fb303e5edfb8136d53dc 02-Feb-2011 Ken Sumrall <ksumrall@android.com> Improve detection of incomplete encryption

Bug 3384231 is punted to MR1, but the code to set the flag is already
in the tree, so this CL does 3 things:

1. Comments out the lines that set the flag
2. Removes the change to the checkpw that was added in the last change.
3. Implements a new command to check the flag (which no one is calling
yet and the flag won't be set anyhow).

When MR1 comes, it will be a simple matter to enable the flag setting
code and start testing it.

The fear is a false positive detection of incomplete encryption could
cause people to be prompted to wipe their data when MR1 comes out and
the flag is checked. Not setting this for first release, and testing
this more before MR1, will give us confidence that the code will not
detect false positives of encryption failure.

Change-Id: I6dfba11646e291fe5867e8375b71a53c815f3968
ommandListener.cpp
ryptfs.c
ryptfs.h
71fac1e011f54018144a511cfae182f28ca57940 01-Feb-2011 Ken Sumrall <ksumrall@android.com> am d33d417e: Detect when encryption failed to complete

* commit 'd33d417e3a057fffad22c23f5f002177531db2a5':
Detect when encryption failed to complete
999ff5ca6168ba6560dc75f88da1dc24bc4d9713 01-Feb-2011 The Android Automerger <android-build@android.com> merge in honeycomb-release history after reset to honeycomb
d33d417e3a057fffad22c23f5f002177531db2a5 01-Feb-2011 Ken Sumrall <ksumrall@android.com> Detect when encryption failed to complete

For the case there encryption failes to complete because of a kernel
crash or the user power cycling the device, define a flag in the
crypto footer that says encryption is in progress. Set it when starting
the actual encryption, and clear it when it successfully completes.

When the user is asked for the disk password, if the flag is set,
return a special error to the caller so the UI can know to tell the
user there is no valid data on the disk, and present a button to
wipe and reset the device.

Change-Id: I3723ec77f33437d94b3ac9ad5db0a5c950d11648
ryptfs.c
ryptfs.h
e16044bf34e72d858624a062555b88c38f29be05 01-Feb-2011 The Android Automerger <android-build@android.com> merge in honeycomb-release history after reset to honeycomb
3f0c0a28f3a1212a2cfdb4268f3f39492aad1a78 31-Jan-2011 Ken Sumrall <ksumrall@android.com> am 5d4c68e4: Have vold grab a partial wakelock when encrypting

* commit '5d4c68e40700424b65a4331be75620706a0dd49c':
Have vold grab a partial wakelock when encrypting
5d4c68e40700424b65a4331be75620706a0dd49c 31-Jan-2011 Ken Sumrall <ksumrall@android.com> Have vold grab a partial wakelock when encrypting

The Progress bar UI grabs a full wakelock when encrypting, but we've seen
a case where it looks like the progress bar UI crashes, and the wakelock is
lost, and then all hell breaks loose. The enablecrypto command has a lot of
work to do, and it will take some time, so it should grab a wakelock to
ensure it can finish without being interrupted and put to sleep.

It grabs a partial wake lock, as it doesn't need the screen to be on to do
its work. If the UI wants to keep it on, it should also grab a full wakelock,
which it does. If the UI crashes, the screen may turn off, but the encryption
will keep going, and vold will reboot the device when it's done.

Change-Id: I51d3a72b8c77383044a3facb1604c1ee510733ae
ndroid.mk
ryptfs.c
1d3c186f88e1bbc8d3fdda8a9001d36e3e145339 30-Jan-2011 The Android Automerger <android-build@android.com> merge in honeycomb-release history after reset to honeycomb
e30abd4fb27002e6c27226fc373050a22378ef78 30-Jan-2011 The Android Automerger <android-build@android.com> merge in honeycomb-release history after reset to honeycomb
7cb0f59b2090b847204ad1af7cbe68c187d796bc 30-Jan-2011 Ken Sumrall <ksumrall@android.com> am 3f476690: Merge "Don\'t try to encrypt in place a filesystem that is too large and return proper errors" into honeycomb

* commit '3f476690eaef3b824255813ed335284ef9a90e91':
Don't try to encrypt in place a filesystem that is too large and return proper errors
3f476690eaef3b824255813ed335284ef9a90e91 30-Jan-2011 Ken Sumrall <ksumrall@android.com> Merge "Don't try to encrypt in place a filesystem that is too large and return proper errors" into honeycomb
939ec42d3c538fb34d1186ed456381a2287e16ca 29-Jan-2011 Jason parks <jparks@google.com> am 70a4b3fd: Change cryptfs changepw to only require a new password.

* commit '70a4b3fd7a84a84bbe6e9d6d4ca3ee2098259fd9':
Change cryptfs changepw to only require a new password.
3ed8236de11a1be8b45d4c37b2208682f5e97c72 29-Jan-2011 Ken Sumrall <ksumrall@android.com> Don't try to encrypt in place a filesystem that is too large and return proper errors

If the already existing filesystem encompasses the entire /data partition
and does not leave the last 16 Kbytes for the crypto footer, refuse to
do encrypt in place and return an error. This is only an issue for folks
with early development systems trying to encrypt an old /data. This should
not be seen in released devices.

Also, if there is an error, try to report back to the UI what the error was
so it can deal with it.

Change-Id: If66781a4fe03034c96c3dd12075240deb8663db0
ndroid.mk
ryptfs.c
ca279296da47287ccd5ae8e0bc1d21ffb9714abe 29-Jan-2011 The Android Automerger <android-build@android.com> merge in honeycomb-release history after reset to honeycomb
70a4b3fd7a84a84bbe6e9d6d4ca3ee2098259fd9 28-Jan-2011 Jason parks <jparks@google.com> Change cryptfs changepw to only require a new password.

The master key is now stored unhashed in memory. This
is needed because certain operation like remote reseting
of passwords the old password is not avaliable.
The changepw interface has been changed to only take
the new password as the only argument. When this is
called we reencrypt the master key with the new password
and old salt.

Bug: 3382129
Change-Id: I9a596b89013194605d6d7790067691aa0dc75e72
ommandListener.cpp
ryptfs.c
ryptfs.h
959a21c78d171d36bb906dcceaa8ed9ee339d393 28-Jan-2011 The Android Automerger <android-build@android.com> merge in honeycomb-release history after reset to honeycomb
de9d2237be7590a4ca10bd909734a68cc4996e48 27-Jan-2011 The Android Automerger <android-build@android.com> merge in honeycomb-release history after reset to honeycomb
b16f6ab0f940c491d535247367eccfddd4a0d43a 26-Jan-2011 The Android Automerger <android-build@android.com> merge in honeycomb-release history after reset to honeycomb
ce99c90b541f30abecd4e6ca3fca66b9feefc0b4 25-Jan-2011 The Android Automerger <android-build@android.com> merge in honeycomb-release history after reset to honeycomb
bb9acd5783de6d31a97632d38740d009ef71c71e 24-Jan-2011 The Android Automerger <android-build@android.com> merge in honeycomb-release history after reset to honeycomb
d805ede34e192e7a520d493e975b3b3c282baa76 23-Jan-2011 The Android Automerger <android-build@android.com> merge in honeycomb-release history after reset to honeycomb
7c536b7d8b1580e502f2fa80c2ca5685e3dcf159 22-Jan-2011 The Android Automerger <android-build@android.com> merge in honeycomb-release history after reset to honeycomb
ab593e8e504876d513f5981a77695f02533ff4f7 21-Jan-2011 Jason parks <jparks@google.com> Always return success if the command was run.

The caller will check the result code for success. This prevents a exception from being thrown when the result code needs to be propagated to the caller.

Change-Id: I471e8d6eb6f339c6f4e40f47adf60d20f6a70974
ommandListener.cpp
bc281ee9312d01e654b2176ac6e747a3c3ca2829 21-Jan-2011 Jason parks <jparks@google.com> am 0167cb15: Always return success if the command was run.

* commit '0167cb15935592deea9abbd6a8bbe904e27bd101':
Always return success if the command was run.
0167cb15935592deea9abbd6a8bbe904e27bd101 21-Jan-2011 Jason parks <jparks@google.com> Always return success if the command was run.

The caller will check the result code for success. This prevents a exception from being thrown when the result code needs to be propagated to the caller.

Change-Id: I471e8d6eb6f339c6f4e40f47adf60d20f6a70974
ommandListener.cpp
2137c849a00c98130d9ac6ca5b9572bc66b56c5e 19-Jan-2011 Ken Sumrall <ksumrall@android.com> am e8744070: Create and use a salt when calling pbkdf2 to encrypt/decrypt the master key.

* commit 'e87440703663f5ee326326f6438f3b00ea315623':
Create and use a salt when calling pbkdf2 to encrypt/decrypt the master key.
e11337370855cb21d77537ee8281a0e9d151eb7c 19-Jan-2011 Ken Sumrall <ksumrall@android.com> am 0cc16638: Verify that it\'s OK to run the various cryptfs commands

* commit '0cc166385a7e1d3026bbcb62f094e419f779e872':
Verify that it's OK to run the various cryptfs commands
e87440703663f5ee326326f6438f3b00ea315623 19-Jan-2011 Ken Sumrall <ksumrall@android.com> Create and use a salt when calling pbkdf2 to encrypt/decrypt the master key.

In order to prevent rainbow table attacks on decrypting the master key,
create a 16 byte "salt" by reading /dev/urandom. This is done right after
reading urandom to get the master key for the filesystem. The salt is
stored 32 bytes after the end of the key (a padding added to help prevent
accidental overwriting of the salt) and the salt is fixed at 16 bytes long.

This change will make existing encrypted filesystems unusable.

Change-Id: I420549d064c61d38aea78eef4d86c88acb265ca3
ryptfs.c
ryptfs.h
694bc70d4237ffd62680d463f93425c48138ac60 19-Jan-2011 Ken Sumrall <ksumrall@android.com> am 7df84120: Don\'t wait for the framework to come up before starting to encrypt in place.

* commit '7df84120b25dca713f623528801385b00208c2aa':
Don't wait for the framework to come up before starting to encrypt in place.
0cc166385a7e1d3026bbcb62f094e419f779e872 19-Jan-2011 Ken Sumrall <ksumrall@android.com> Verify that it's OK to run the various cryptfs commands

Maintain and query some internal state to know if it's OK to run
the various cryptfs commands. Do not allow enablecrypto to run if
the device is already encrypted. Do no allow restart to run if
we have already run it before or if the password has not been
validated. Do not allow checkpw to run if not encrypted, or it
has already validated the password.

This is an extra layer of safety on top of the checks up in the
UI code agains possible DoS attacks on the device.

Change-Id: I9afc8d42773020e82a512e6b637feede101d1362
ryptfs.c
7df84120b25dca713f623528801385b00208c2aa 18-Jan-2011 Ken Sumrall <ksumrall@android.com> Don't wait for the framework to come up before starting to encrypt in place.

Also, change the value that triggers the progress bar framework from
"startup" to "0" in the property vold.encrypt_progress.

Change-Id: I3890e66a95283ce2ceeca82f516859b083919b9e
ryptfs.c
e23667fa00892c874ee0a57550a3869b1ecd6f5a 18-Jan-2011 Ken Sumrall <ksumrall@android.com> am 57b63e61: Minor tweaks to logging for the cryptfs changepw command.

* commit '57b63e61cb41e377708a4fdf18ecc80eb1b2b521':
Minor tweaks to logging for the cryptfs changepw command.
57b63e61cb41e377708a4fdf18ecc80eb1b2b521 18-Jan-2011 Ken Sumrall <ksumrall@android.com> Minor tweaks to logging for the cryptfs changepw command.

Change-Id: I87ff9788a56de6d461002407bf6c3cd4c6f900ee
ommandListener.cpp
ryptfs.c
934dfed05d9a840103834a54636b250c9b7ec3cb 18-Jan-2011 Ken Sumrall <ksumrall@android.com> am 8ddbe40a: Updates to cryptfs framework.

* commit '8ddbe40a8a8708dac7c472fa8c098c8f7b24534c':
Updates to cryptfs framework.
8ddbe40a8a8708dac7c472fa8c098c8f7b24534c 18-Jan-2011 Ken Sumrall <ksumrall@android.com> Updates to cryptfs framework.

Update the enable inplace API to allow the UI to show a progress bar.
Add new command changepw (whichis currently not working)
Internal restructuring of code to support these two features.
Some minor cleanup of the code as well.

Change-Id: I11461fc9ce66965bea6cd0b6bb2ff48bcf607b97
ommandListener.cpp
ryptfs.c
ryptfs.h
3b3b89e07c328c9b3b5de870ac5f4836dc468758 17-Jan-2011 Ken Sumrall <ksumrall@android.com> am 6864b7ec: Change the cryptfs command to separate out checking the password and restarting

* commit '6864b7ec94a57b73c300457955d86dc604aeddf5':
Change the cryptfs command to separate out checking the password and restarting
6864b7ec94a57b73c300457955d86dc604aeddf5 15-Jan-2011 Ken Sumrall <ksumrall@android.com> Change the cryptfs command to separate out checking the password and restarting

In order to make the animations and the UI look right, we need to change
the cryptfs checkpw command to return a status if the password was
correct or not, and not have it automatically restart if it's correct.

There is a new command restart that will restart the framework with the
encrypted filesystem.

Change-Id: Ia8ae00d7ed8667699aa58d05ad8ba953cca9316e
ommandListener.cpp
ryptfs.c
ryptfs.h
eed82c368b270446006e962ab83ba7f97fd3a57f 14-Jan-2011 Ken Sumrall <ksumrall@android.com> am 2eaf7138: Cleanup a few issues with the cryptfs code.

* commit '2eaf7138528d30c331d83ab8346a97e66b5499e2':
Cleanup a few issues with the cryptfs code.
2eaf7138528d30c331d83ab8346a97e66b5499e2 14-Jan-2011 Ken Sumrall <ksumrall@android.com> Cleanup a few issues with the cryptfs code.

Now that the framework shuts down quickly, remove the 30
second sleep when enabling crypto. Also, stop spewing
the secret master key to the disk in the system log!

Change-Id: Icb3f9456ababe3dff8de52cbbae92da0e9e5dd2f
ryptfs.c
5fb760a63ca3b8a2b282b8c642508d998706bbd0 09-Jan-2011 Wink Saville <wink@google.com> Revert "Change constructor to match new definition of the superclass"

This reverts commit 499806cd60cd45b8cc9ae669b3d49507e04ffc0f.
etlinkHandler.cpp
499806cd60cd45b8cc9ae669b3d49507e04ffc0f 27-Dec-2010 Stan Chesnutt <chesnutt@google.com> Change constructor to match new definition of the superclass

Change-Id: I3526b1920817c2a28ac3e84c1ea278932a9ec895
etlinkHandler.cpp
8f869aa1bc685b505c58e97b4e11a9c7491a16f9 03-Dec-2010 Ken Sumrall <ksumrall@android.com> Support for encrypting /data on Stingray.

There are still a few hacks and performance issues related
to shutting down the framework in this code, but it is
functional and tested. Without the UI changes, it requires
cryptic adb shell commands to enable, which I shall not
utter here.

Change-Id: I0b8f90afd707e17fbdb0373d156236946633cf8b
ndroid.mk
ommandListener.cpp
ommandListener.h
ryptfs.c
ryptfs.h
3c9a73f643f7c782bdd326f628eeea97bec42ae8 11-Dec-2010 Mike Lockwood <lockwood@android.com> Stifle "Ignoring unknown switch" logging

Change-Id: I9770ab880f379e2f7f6a93d3c84990edec60a116
Signed-off-by: Mike Lockwood <lockwood@android.com>
olumeManager.cpp
905ed1fbd34ecb537c8c89affa6fae7c592029dc 20-Nov-2010 Jean-Baptiste Queru <jbq@google.com> am c1d80272: am 08da5c1f: Merge "vold: replace strsep by strtok_r"

* commit 'c1d80272b117cf837de93fadd8d456d89a203e2f':
vold: replace strsep by strtok_r
c1d80272b117cf837de93fadd8d456d89a203e2f 20-Nov-2010 Jean-Baptiste Queru <jbq@google.com> am 08da5c1f: Merge "vold: replace strsep by strtok_r"

* commit '08da5c1f17afefe3c9f4f4d4456c5757dede62e1':
vold: replace strsep by strtok_r
08da5c1f17afefe3c9f4f4d4456c5757dede62e1 20-Nov-2010 Jean-Baptiste Queru <jbq@google.com> Merge "vold: replace strsep by strtok_r"
74ca25a716a060b4f676277262d112b569c5fbd2 15-Nov-2010 Jinho You <l04f3rs@gmail.com> vold: replace strsep by strtok_r

It permits more white spaces between words in vold.fstab.

Change-Id: I38250c3dcc860643e4f102e980fe844693a1451a
ain.cpp
2996451f777bd8fb00eeb45ccbb1dd57fc0fbe06 19-Nov-2010 Jean-Baptiste Queru <jbq@google.com> am 1206e872: resolved conflicts for merge of 09f774b7 to gingerbread-plus-aosp

* commit '1206e872ce74aab253c39c3547bfaadc5e1f6011':
vold: fix an offset one bug that makes partition 4 unusable
vold: set state back to idle on formatting error
1206e872ce74aab253c39c3547bfaadc5e1f6011 19-Nov-2010 Jean-Baptiste Queru <jbq@google.com> resolved conflicts for merge of 09f774b7 to gingerbread-plus-aosp

Change-Id: I103db47198ad09783aa6539cde271df0fdb9c594
09f774b7d3ad4e4205485b6997d44f7edd084598 18-Nov-2010 Jean-Baptiste Queru <jbq@google.com> Merge changes Ic8e18e61,I62c78eb8

* changes:
vold: fix an offset one bug that makes partition 4 unusable
vold: set state back to idle on formatting error
def8f3168305cc57803f1e9aafd8ed6d8e93067d 17-Nov-2010 Chih-Wei Huang <cwhuang@linux.org.tw> vold: fix an offset one bug that makes partition 4 unusable

Change-Id: Ic8e18e6191ad7ee33162e36060b57a6802cf0883
irectVolume.cpp
37dcda68d334f70e1f7f69a9817def65fe3ee717 16-Nov-2010 Olivier Bailly <olivier@google.com> Add missing include headers for compilation on Intel target for Google TV.

Change-Id: I9f71b5e871671d1d64ad37f78a8944653409b8e1
ommandListener.cpp
evmapper.cpp
at.cpp
oop.cpp
etlinkHandler.cpp
olume.cpp
64382de1f93b84ca59f607da4b4fdbd77f1af67d 16-Nov-2010 Chih-Wei Huang <cwhuang@linux.org.tw> vold: set state back to idle on formatting error

On formatting error due to some reasons, the state is left at
Formatting, therefore the user is unable to mount the sdcard
again. The patch sets the state to Idle no matter formatting
error or not.

Change-Id: I62c78eb8299cc397ee5cc442890f8b3dbf09425c
olume.cpp
92c243afae15567f166d0059db5aff13b8849596 29-Oct-2010 Mike Lockwood <lockwood@google.com> am a28056b3: Set VM dirty ratio to zero when UMS is active

* commit 'a28056b38275003895ff5d9576681aca01544822':
Set VM dirty ratio to zero when UMS is active
a28056b38275003895ff5d9576681aca01544822 28-Oct-2010 Mike Lockwood <lockwood@google.com> Set VM dirty ratio to zero when UMS is active

Improves UI responsiveness when copying large amount of data to the device.

BUG: 3131847

Change-Id: I4aa5ade7e2cd7e5110c8f0f7ee43bdc57577e11d
Signed-off-by: Mike Lockwood <lockwood@google.com>
olumeManager.cpp
olumeManager.h
456b7e6a99b105ee5d58e592930536598713f390 01-Oct-2010 Kenny Root <kroot@google.com> am 918e5f9f: Better error code for unmounting not-mounted volumes

Merge commit '918e5f9f10b9c1ff929683743ffbf229027ce240' into gingerbread-plus-aosp

* commit '918e5f9f10b9c1ff929683743ffbf229027ce240':
Better error code for unmounting not-mounted volumes
918e5f9f10b9c1ff929683743ffbf229027ce240 01-Oct-2010 Kenny Root <kroot@google.com> Better error code for unmounting not-mounted volumes

ENOENT is more descriptive than the generic error that EINVAL gets
turned into. Then we can actually treat it how we want on the other
side.

Change-Id: I9b4f3be6308e13f680eae368d2167ab9ee6aae5f
olumeManager.cpp
45f22ad121117cf2acf9a7b8f5e4a5e6c80fdd59 26-Sep-2010 Kenny Root <kroot@google.com> am cbacf78e: Track type of container mounted

Merge commit 'cbacf78eff70bd43bb899e164ec2ab409bc0904c' into gingerbread-plus-aosp

* commit 'cbacf78eff70bd43bb899e164ec2ab409bc0904c':
Track type of container mounted
cbacf78eff70bd43bb899e164ec2ab409bc0904c 25-Sep-2010 Kenny Root <kroot@google.com> Track type of container mounted

OBB and ASEC are tracked in the same active container list, but when it
comes time to unmount everything, it was trying to unmount the OBBs
according to ASEC rules. This led to the OBB not being unmounted and the
volume unmount failing.

Change-Id: I12c1d4d387b8022185d552b63edd61a50b9c0fc3
olumeManager.cpp
olumeManager.h
9b46bebd2c7011ff24e999e509f1e137ce6d52ec 21-Sep-2010 Mike Lockwood <lockwood@android.com> am a4886f1f: More fixes for internal FAT partitions:

Merge commit 'a4886f1f8ed72e24a302a91a0ab18bc54b6f585e' into gingerbread-plus-aosp

* commit 'a4886f1f8ed72e24a302a91a0ab18bc54b6f585e':
More fixes for internal FAT partitions:
a4886f1f8ed72e24a302a91a0ab18bc54b6f585e 21-Sep-2010 Mike Lockwood <lockwood@android.com> More fixes for internal FAT partitions:

Fix formatting partitions beyond the first partition.
Do not try to initialize the MBR when formatting only a single partition.

Change-Id: Ifbbd279b1c288b7b1b884a1a89248e3086ed735f
Signed-off-by: Mike Lockwood <lockwood@android.com>
irectVolume.h
olume.cpp
olume.h
08cd8f76bfa9c01a73e2e2f2e003cf866938c60c 20-Sep-2010 Brad Fitzpatrick <bradfitz@android.com> am 1b15d463: Add some missing closes on error conditions.

Merge commit '1b15d463d4816fc084767cbeda3ee69ff5527545' into gingerbread-plus-aosp

* commit '1b15d463d4816fc084767cbeda3ee69ff5527545':
Add some missing closes on error conditions.
1b15d463d4816fc084767cbeda3ee69ff5527545 20-Sep-2010 Brad Fitzpatrick <bradfitz@android.com> Add some missing closes on error conditions.

Also, some formatting fixes to get back into line with netd's copy of
logwrapper.c.

Change-Id: Id471b99e9c3c8c9bb0890ca0d5e1567125e35bd7
ogwrapper.c
3374b41f1fea95dab455f565e6fc6db456bddc8b 18-Sep-2010 Mike Lockwood <lockwood@android.com> am 2dfe297e: Fixes for devices with internal FAT file system:

Merge commit '2dfe297ec47559dbe2297a72bea71cf515c03797' into gingerbread-plus-aosp

* commit '2dfe297ec47559dbe2297a72bea71cf515c03797':
Fixes for devices with internal FAT file system:
2dfe297ec47559dbe2297a72bea71cf515c03797 18-Sep-2010 Mike Lockwood <lockwood@android.com> Fixes for devices with internal FAT file system:

Only share a single partition via UMS if a specific partition
is specified in vold.fstab (rather than "auto")

Do not fail to reformat if MBR cannot be found.

Change-Id: I544ca2ee325c308af656ab9f4732c788a964c156
Signed-off-by: Mike Lockwood <lockwood@android.com>
irectVolume.cpp
irectVolume.h
olume.cpp
olume.h
olumeManager.cpp
90d92f11ab27d1748d13ea3e48fee114e218833c 02-Sep-2010 Kenny Root <kroot@google.com> am a3e06084: Allow execute on mounted ASEC and OBB containers

Merge commit 'a3e06084564c86ff618c40f185f3676b8b629b94' into gingerbread-plus-aosp

* commit 'a3e06084564c86ff618c40f185f3676b8b629b94':
Allow execute on mounted ASEC and OBB containers
a3e06084564c86ff618c40f185f3676b8b629b94 27-Aug-2010 Kenny Root <kroot@google.com> Allow execute on mounted ASEC and OBB containers

This allows us to place shared libraries in these containers which may
only be loaded if they are executable.

Change-Id: I78fa9ab6d5c58ec8b98c40004da72aebc0aade2a
at.cpp
at.h
olume.cpp
olumeManager.cpp
2c7d5761d28c39c8e40bf06874f2f5ca92f726d0 30-Aug-2010 Ethan <ethan.too@gmail.com> am 75a3e1a9: VOLD - make volume daemon to handle state change from shared to no_media

Merge commit '75a3e1a95af0a2790de1b12aeca0008bfdc61649' into gingerbread-plus-aosp

* commit '75a3e1a95af0a2790de1b12aeca0008bfdc61649':
VOLD - make volume daemon to handle state change from shared to no_media
75a3e1a95af0a2790de1b12aeca0008bfdc61649 21-Jul-2010 Ethan <ethan.too@gmail.com> VOLD - make volume daemon to handle state change from shared to no_media

When volume state changed from shared to no_media,
volume is not properly unshared.

Change-Id: I0117d67da95440d982275746a166ef6f4ac1c0e2
Signed-off-by: Ethan <ethan.too@gmail.com>
irectVolume.cpp
582677b50c012f2683e706d26fc69e0c02b634c7 29-Jul-2010 Jean-Baptiste Queru <jbq@google.com> am 826bec79: Merge "vold: remove unnecessary code from VolumeManager::unshareVolume()"

Merge commit '826bec79ea253505813d125700a12816e2c3bc0f' into gingerbread-plus-aosp

* commit '826bec79ea253505813d125700a12816e2c3bc0f':
vold: remove unnecessary code from VolumeManager::unshareVolume()
826bec79ea253505813d125700a12816e2c3bc0f 29-Jul-2010 Jean-Baptiste Queru <jbq@google.com> Merge "vold: remove unnecessary code from VolumeManager::unshareVolume()"
8f295e9deef5db5a7853e3048b595deca0b54248 29-Jul-2010 Bruce Beare <brucex.j.beare@intel.com> am d766090b: Avoid array overrun. We can now mount the /sdcard partition on our boot sdcards

Merge commit 'd766090b7a72562be9e64700e13882663004650e' into gingerbread-plus-aosp

* commit 'd766090b7a72562be9e64700e13882663004650e':
Avoid array overrun. We can now mount the /sdcard partition on our boot sdcards
b2b3d2cd34d52d288b42b7d30cd7db7fd53bfd1d 10-Jul-2010 Seth Forshee <seth.forshee@garmin.com> vold: remove unnecessary code from VolumeManager::unshareVolume()

Signed-off-by: Seth Forshee <seth.forshee@garmin.com>
olumeManager.cpp
d766090b7a72562be9e64700e13882663004650e 22-Jul-2010 Bruce Beare <brucex.j.beare@intel.com> Avoid array overrun. We can now mount the /sdcard partition on our boot sdcards

Change-Id: I6e9db8c55db49b4aa61dd40cd59495f55e5b3368
Signed-off-by: Bruce Beare <brucex.j.beare@intel.com>
irectVolume.cpp
e17e91f63b3cceb2ef670947fd7f9ff3c40ee1a7 17-Jul-2010 Kenny Root <kroot@google.com> Fix loop_info/loop_info64 impedance mismatch

LOOP_GET_STATUS64 isn't useful here since the data contained within
isn't actually checked, so stick with the regular LOOP_GET_STATUS here
to match the struct loop_info we're using.

Change-Id: I4f9ff06fa44d4ae3aed046d423054554f9cf450b
oop.cpp
508c0e1605b795bbb51cb47d955b89f3df26ca94 12-Jul-2010 Kenny Root <kroot@google.com> Additional Obb functionality

* Rename all functions dealing with OBB files to mention Obb

* Add 'path' and 'list' functionality to OBB commands

* Store hashed filename in loop's lo_crypt_name and keep lo_file_name
for the real source filename. That way we can recover it later with an
ioctl call.

Change-Id: I29e468265988bfb931d981532d86d7be7b3adfc8
ommandListener.cpp
ommandListener.h
oop.cpp
olume.cpp
olumeManager.cpp
olumeManager.h
fb7c4d5a8a1031cf0e493ff182dcf458e5fe8c77 01-Jul-2010 Kenny Root <kroot@google.com> Add image mounting commands for OBB files

Allow the mounting of OBB filesystem images if they're encrypted with
twofish and in FAT filesystem format.

Change-Id: I54804e598f46b1f3a784ffe517ebd9d7626de7aa
ommandListener.cpp
ommandListener.h
olume.cpp
olume.h
olumeManager.cpp
olumeManager.h
99635f6c289fe2528c226403ea215c917ce86037 26-Jun-2010 Mike Lockwood <lockwood@android.com> Use new kernel notifications to determine if USB mass storage is available.

The usb_mass_storage switch no longer exists in our 2.6.35 kernel.
Instead we will consider mass storage to be available if both USB is connected
and the USB mass storage function is enable.

Change-Id: I730d1b3cb3cac664fc2abcdc36cd39856a08404a
Signed-off-by: Mike Lockwood <lockwood@android.com>
etlinkHandler.cpp
olumeManager.cpp
olumeManager.h
ain.cpp
acc9e7dcca8978fc809fa5b4d9b819c515a980ff 19-Jun-2010 Kenny Root <kroot@google.com> Change ASCII conversion for hash and add tests

Hash was printed using snprintf(), but we can just write yet another hex
conversion utility!

Change-Id: I04f1992deaf5bf1b3e2751c8f07072f8ed6660e9
ndroid.mk
olumeManager.cpp
olumeManager.h
ests/Android.mk
ests/VolumeManager_test.cpp
f69b3b9af78c94b5ce56a73e086b22b585ea5c85 14-May-2010 Nick Kralevich <nnk@google.com> Get rid of warnings when compiled with -Wformat-security

Change-Id: I27e0819aba347e26051ad771c594b69700da1721
ogwrapper.c
1a06edaf4db4e9c520624bcc06e0e13ee470d90e 15-Apr-2010 San Mehat <san@google.com> vold: Ensure we cleanup secure containers on card removal.

Fixes bug: http://b/issue?id=2567572

Note: The framework will still likely restart since the system_server
is holding references to assets on the card which are mmaped, but
at least now storage will be available when a new card is re-inserted.

Change-Id: I4e195c0c666426b93da47198fa826a6f58d855a9
Signed-off-by: San Mehat <san@google.com>
irectVolume.cpp
olumeManager.cpp
olumeManager.h
97ac40e4e6f3ed0bd5d6878d7d8d4a54fcaecb76 24-Mar-2010 San Mehat <san@google.com> vold: Switch from LOG -> SLOG

Change-Id: I48ee8bd90b47f5845f069cdf4d1b8ba6ecdb1b39
Signed-off-by: San Mehat <san@google.com>
ommandListener.cpp
evmapper.cpp
irectVolume.cpp
at.cpp
oop.cpp
etlinkHandler.cpp
etlinkManager.cpp
rocess.cpp
esponseCode.cpp
olume.cpp
olumeManager.cpp
warp.cpp
ain.cpp
da62e7c00259f6b98696cedb7d031f04951caef0 25-Mar-2010 Kenny Root <kroot@google.com> Revert "Prevent null pointer deref in DirectVolume"

This reverts commit a9f423dd7e313854ce7c103e1bb4661b05efc9a4.
irectVolume.cpp
irectVolume.h
a9f423dd7e313854ce7c103e1bb4661b05efc9a4 24-Mar-2010 Kenny Root <kroot@google.com> Prevent null pointer deref in DirectVolume

There's a possibility that if something were messed up a call to
NetlinkEvent::findParam could return a NULL. Passing NULL as the
argument into atoi() would cause a null pointer dereference.

Change-Id: Ib071afbbe2adc341108c245ffa596cc8730bd8fd
irectVolume.cpp
irectVolume.h
88ac2c06539485942bf414efda2d39647fa1a415 23-Mar-2010 San Mehat <san@google.com> vold: asec path cmd now returns OpFailedStorageNotFound if id doesn't exist

Change-Id: Icbe3de7c28505f7496c8f8edea126c7b616de475
Signed-off-by: San Mehat <san@google.com>
ommandListener.cpp
esponseCode.cpp
esponseCode.h
olumeManager.cpp
96597e8b840ef671fe5279f8bd64fb09a8b38d4c 17-Mar-2010 San Mehat <san@google.com> vold: Add mounted filesystems to dump cmd

Change-Id: If025e7ee10a79ff089920a6d0c1a52358b2d2c22
Signed-off-by: San Mehat <san@google.com>
ommandListener.cpp
olumeManager.cpp
7b18a7b36f61574c0f0bdde0a7409dc36676fa12 15-Mar-2010 Kenny Root <kroot@google.com> vold: Convert to use OpenSSL MD5 API

Change-Id: I9b84370fa9a98464c211ebe8983be8dbe9dd7ccd
ndroid.mk
olumeManager.cpp
d5.c
d5.h
befd59c152835b815665ec3c5e453b55e70d5f0b 15-Mar-2010 San Mehat <san@google.com> vold: remove some dead code

Change-Id: Iaeb5d3334ec22ed31da9734bb8d7cd17e6a40eaf
Signed-off-by: San Mehat <san@google.com>
ndroid.mk
lockDevice.cpp
lockDevice.h
olumeManager.cpp
olumeManager.h
cb4dac8a5243f6673b0590019b5b28a01bd3e343 14-Mar-2010 San Mehat <san@google.com> vold: Remove autorun.inf at mount/unmount time if it exists

Change-Id: Ia57da8ee177453a601a23d965c2b4f16b6de46e5
Signed-off-by: San Mehat <san@google.com>
olume.cpp
olume.h
57df7bf33968d65c23f3d0dc9f30a8ce2625b1d0 14-Mar-2010 San Mehat <san@google.com> vold: Fix argument validation for volume commands

Change-Id: I74aa63ff9f9bc32bd871e6c53ab50b6baf79e650
Signed-off-by: San Mehat <san@google.com>
ommandListener.cpp
d9a4e358614a0c5f60cc76c0636ee4bb02004a32 12-Mar-2010 San Mehat <san@google.com> vold: Bugfixes & cleanups

- Fix issue where container-names > 64 bytes were getting truncated in the
kernel. lo_name is only 64 bytes in length, so we now hash the container
id via md5
- Add 'dump' command to dump loop and devicemapper status
- Add 'debug' command to enable more detailed logging at runtime
- Log vold IPC arguments (minus encryption keys)
- Fix premature return from Loop::lookupActive() and friends

Change-Id: I0e833261a445ce9dc1a8187e5501d27daba1ca76
Signed-off-by: San Mehat <san@google.com>
ndroid.mk
ommandListener.cpp
ommandListener.h
evmapper.cpp
evmapper.h
oop.cpp
oop.h
olume.cpp
olume.h
olumeManager.cpp
olumeManager.h
ash.h
d5.c
d5.h
2a5b8ce09b8836a8463ef9beaaff865c36ca5e6a 10-Mar-2010 San Mehat <san@google.com> vold: Switch to using libdiskconfig for partition setup.
Also handles an issue where NPARTS=0 on a disk change uevent

Change-Id: I77c56f177dc65df91468bbd7d5fe1889db414d7a
Signed-off-by: San Mehat <san@google.com>
ndroid.mk
irectVolume.cpp
olume.cpp
iskmbr.h
eom_mbr_enc.c
d071596fd998f4d2bc58a7580f61c15a87a92fd5 09-Mar-2010 Jean-Baptiste Queru <jbq@google.com> Add an empty CleanSpec.mk

Change-Id: Ied5f7eddd18adb38699c8a034a78ff9de4aab8de
leanSpec.mk
fcf24fe62f98c5d44431aa575555569c2c7a29b0 03-Mar-2010 San Mehat <san@google.com> vold: Add a versioned superblock to secure containers.

Add an un-encrypted superblock to the end of a secure container to
help identify the crypto cipher used. This is required in order to
provide some semblence of versioning, in case we have cause to
change the crypto type on an update - say for example switching
from software to hardware encryption, or from 128 -> a zillion
bit keys.

NOTE: This format is incompatible with previous secure containers.
After this change they will no longer be mountable.

Signed-off-by: San Mehat <san@google.com>
sec.h
evmapper.cpp
at.cpp
at.h
olume.cpp
olumeManager.cpp
2350c44ff39b4cb2940893964a05f778fc80a436 02-Mar-2010 San Mehat <san@google.com> vold: Add support for xwarp

Signed-off-by: San Mehat <san@google.com>
ndroid.mk
ommandListener.cpp
ommandListener.h
esponseCode.h
warp.cpp
warp.h
f1b07fb5e30667833d7a2a5b7e95eada881a2802 02-Mar-2010 San Mehat <san@google.com> vold: Don't bail out on init failure & bump version number

Signed-off-by: San Mehat <san@google.com>
ain.cpp
a1091cb0c448a933068f9120fe6946c09812bfb6 01-Mar-2010 San Mehat <san@google.com> vold: Allow creation of a container with no filesystem

Signed-off-by: San Mehat <san@google.com>
olumeManager.cpp
55013f7131ffe094e1c7d929cfc32b3b25096a9b 24-Feb-2010 San Mehat <san@google.com> vold: Fix uninitialized mountpoint bug

Signed-off-by: San Mehat <san@google.com>
olumeManager.cpp
12f4b89046b54de1bdc188b7057ba77d7566e573 24-Feb-2010 San Mehat <san@google.com> vold: Retry rmdir of asec mount point

Signed-off-by: San Mehat <san@google.com>
olumeManager.cpp
96956ed0e220cb62a4a96136976ded0d8c2d9075 24-Feb-2010 San Mehat <san@google.com> vold: Prohibit container rename when dst container is mounted

Signed-off-by: San Mehat <san@google.com>
olumeManager.cpp
0e382532f32e97f90056250f2b13c59840d2c6b4 24-Feb-2010 San Mehat <san@google.com> vold: fix infinite loop when failing to unmount a busy container in unmountVolume()

Signed-off-by: San Mehat <san@google.com>
olumeManager.cpp
52c2ccb6d25b94b96685efd4803226727710fbae 24-Feb-2010 San Mehat <san@google.com> vold: Make asec sdcard dir a hidden dir

Signed-off-by: San Mehat <san@google.com>
olume.cpp
3bb6020e461e8872e8df0775cba6eb32e06b93ec 20-Feb-2010 San Mehat <san@google.com> vold: Stage the mounting of media to hide the ASEC imagefile directory

In order to protect the '/android_secure' directory on VFAT removable media
from being mucked with by 3rd party applications on the device, we hide the
directory with a read-only, zero-sized tmpfs mounted on-top. A reference to the
hidden directory is kept by a bind-mount which is mounted at a location which
only root can access.

Staging consists of:
1. Mount checked media at a secure location (/mnt/secure/staging)
2. Ensure /android_secure exists on the media, (creating if it doesnt)
3. Bind-mount /mnt/secure/staging/android_secure -> /mnt/secure/asec
(where only root can access it)
4. Mount an RDONLY zero-sized tmpfs over /mnt/secure/staging/android_secure
5. Atomically move /mnt/secure/staging to the publicly accessable storage
directory (/mnt/sdcard)

Signed-off-by: San Mehat <san@google.com>
ommandListener.cpp
olume.cpp
olume.h
olumeManager.cpp
8f2875b29780312f4edda3d831cc8a99e1648dd5 18-Feb-2010 San Mehat <san@google.com> vold: Clean up asec command response and add support for 'StorageBusy'

Signed-off-by: San Mehat <san@google.com>
ndroid.mk
ommandListener.cpp
esponseCode.cpp
esponseCode.h
4ba8948dc16463053e21cda5744f519a555080d0 18-Feb-2010 San Mehat <san@google.com> vold: Add 'force' option to anything that can cause an unmount

Signed-off-by: San Mehat <san@google.com>
ommandListener.cpp
irectVolume.cpp
olume.cpp
olume.h
olumeManager.cpp
olumeManager.h
d31e380bd9689dd9629b510ffe324707e261b439 18-Feb-2010 San Mehat <san@google.com> vold2: Don't allow containers < 1mb, and clean up some logging

Signed-off-by: San Mehat <san@google.com>
evmapper.cpp
oop.cpp
olumeManager.cpp
b3b4318ab8e2908f7b3c75fb68a5cbfc48fe6ab2 18-Feb-2010 Kenny Root <kroot@google.com> Check length of filenames before strcat

Just in case someone tries to set up a series of links to trick us, do a
quick sanity check on the total length of the strings we're about to
concatenate.

Change-Id: Iba9617008dbc1e93e1907393052caf1e52fbe312
rocess.cpp
586536c60b773e3517531ad8a6cb0de6722c67fc 17-Feb-2010 San Mehat <san@google.com> vold: Refactor Processkiller and add command to return users of a mount point

Signed-off-by: San Mehat <san@google.com>
ndroid.mk
ommandListener.cpp
ommandListener.h
rocess.cpp
rocess.h
rocessKiller.c
esponseCode.h
olume.cpp
olumeManager.cpp
8c940ef7dbd423cadc92982b44a65ed1014389e2 13-Feb-2010 San Mehat <san@google.com> vold: Fix devmapper/ptmx fd leak, and give asec unmount more time

Signed-off-by: San Mehat <san@google.com>
evmapper.cpp
rocessKiller.c
olume.cpp
olumeManager.cpp
ogwrapper.c
c6fc646af4f957dc7a586a448e63c458480d8355 11-Feb-2010 Jean-Baptiste Queru <jbq@google.com> am 4468682c: Merge from open-source master

Merge commit '4468682c7035d431c6154ab298c5ce0f9e2350f8'

* commit '4468682c7035d431c6154ab298c5ce0f9e2350f8':
new project, first commit
4468682c7035d431c6154ab298c5ce0f9e2350f8 11-Feb-2010 Jean-Baptiste Queru <jbq@google.com> Merge from open-source master
3b9b8e830859aa9338b78a7b05ddbe566f5bbb70 09-Feb-2010 San Mehat <san@google.com> vold: Fix format argument bug

Signed-off-by: San Mehat <san@google.com>
at.cpp
62e5dd245bd508eabcba56b5680e2b28bfc2caf6 06-Feb-2010 San Mehat <san@google.com> vold: Reduce logspam and add 250ms delay before first unmount attempt

Signed-off-by: San Mehat <san@google.com>
olume.cpp
b9aed74b146beb7499ebc5775e8ae179d16900ef 05-Feb-2010 San Mehat <san@google.com> vold: Fix a few bugs

- share command was taking wrong arguments
- shared command was returning two termination codes
- Force FAT32 cluster size to 4k when formatting
Signed-off-by: San Mehat <san@google.com>
ommandListener.cpp
at.cpp
olumeManager.cpp
f5c61980969a0b49bda37b5dc94ffe675ebd5a5a 03-Feb-2010 San Mehat <san@google.com> vold: Silly rabbit, don't use unlink() when you mean't rmdir()

Signed-off-by: San Mehat <san@google.com>
olumeManager.cpp
2b22552f9a3b077f9d0a3624ac6f9b8b332f8a7a 03-Feb-2010 San Mehat <san@google.com> vold: Fix share status argument off by one

Signed-off-by: San Mehat <san@google.com>
ommandListener.cpp
fbe33b4a407b7ec20da1c11459784aa57890eaee 03-Feb-2010 San Mehat <san@google.com> vold2: Don't print error on unknown Netlink event

Signed-off-by: San Mehat <san@google.com>
etlinkHandler.cpp
eba65e9d438a05f1c5dfd0f8d31bc463a5d08eee 29-Jan-2010 San Mehat <san@google.com> vold: Bloat reduction
Signed-off-by: San Mehat <san@google.com>
ommandListener.cpp
ommandListener.h
esponseCode.h
olume.cpp
olumeManager.cpp
olumeManager.h
048b0801fcd6fcfbb8fa812284c751181e4821b8 23-Jan-2010 San Mehat <san@google.com> vold: Add support for renaming secure containers

Signed-off-by: San Mehat <san@google.com>
ommandListener.cpp
ommandListener.h
olumeManager.cpp
olumeManager.h
68f8ebdb24dfe1fe94de2c8fc11084ebfab9fa5d 23-Jan-2010 San Mehat <san@google.com> vold2: update some debugging

Signed-off-by: San Mehat <san@google.com>
olumeManager.cpp
a4dc3b15b7886f661675ab5243800c80831e549b 22-Jan-2010 San Mehat <san@google.com> vold: Don't fail to return path if volume isn't mounted

Signed-off-by: San Mehat <san@google.com>
olumeManager.cpp
5817821cf10b5f7d13eb693ffbc3f80f13bc681b 18-Jan-2010 San Mehat <san@google.com> vold: Add command to unmount secure containers

Signed-off-by: San Mehat <san@google.com>
ommandListener.cpp
ommandListener.h
88705166ab82057090a070c6d4200c3d9db76f11 15-Jan-2010 San Mehat <san@google.com> vold: Unmount secure containers when the underlying media is removed.

Signed-off-by: San Mehat <san@google.com>
olumeManager.cpp
olumeManager.h
0586d54053ee00e6d6523d4f125282ccb9a24aab 13-Jan-2010 San Mehat <san@google.com> vold2: Fix issue with destroying / unmounting asec

Signed-off-by: San Mehat <san@google.com>
evmapper.cpp
olumeManager.cpp
dfe79492a4f5280e9de2db6fa749a7781c59f2a6 11-Jan-2010 San Mehat <san@google.com> vold2: Fix a mb -> sector conversion refactor bug

Signed-off-by: San Mehat <san@google.com>
ommandListener.cpp
c66770f4c0497430a78e982cabe65b31828055c6 11-Jan-2010 San Mehat <san@google.com> vold: Rename the C in ASEC to Container

Signed-off-by: San Mehat <san@google.com>
ommandListener.cpp
8b8f71b1d760411279f3b07a5c97709f052c689e 11-Jan-2010 San Mehat <san@google.com> vold: Internally use sector counts for asec lengths

Signed-off-by: San Mehat <san@google.com>
ommandListener.cpp
evmapper.cpp
evmapper.h
oop.cpp
oop.h
olumeManager.cpp
olumeManager.h
b78a32c1d5eeb243bdac0eaf18effb1897f1ee67 10-Jan-2010 San Mehat <san@google.com> vold: Add encrypted ASEC support via devmapper

- Supports up to 4096 containers
- Keys are now implemented - specifying a key of 'none' means no encryption.
Otherwise, the key must be a string of 32 characters

Signed-off-by: San Mehat <san@google.com>
ndroid.mk
evmapper.cpp
evmapper.h
oop.cpp
oop.h
olumeManager.cpp
olumeManager.h
8da6bcb006f4e4257cdd685e35e910a6334f6cea 09-Jan-2010 San Mehat <san@google.com> vold: Increase max supported loop devices to 255

Signed-off-by: San Mehat <san@google.com>
oop.cpp
oop.h
olumeManager.cpp
8d934caeae971d7d08ca33e98dae294eb57c402d 09-Jan-2010 San Mehat <san@google.com> vold: Always format FAT32

Signed-off-by: San Mehat <san@google.com>
at.cpp
23969931fad6e993832208f099f6eea0f6f76eb5 09-Jan-2010 San Mehat <san@google.com> vold: Use process-killer when unmounting asec containers

Signed-off-by: San Mehat <san@google.com>
olumeManager.cpp
cff5ec3d360b699ad13df05670efe0d0a7386fbe 08-Jan-2010 San Mehat <san@google.com> vold: Temporarily disable asec mountpoint permissions

Signed-off-by: San Mehat <san@google.com>
olumeManager.cpp
1bc9558895dbb38b2103345ab90016f318c37bff 07-Jan-2010 Doug Kwan <dougkwan@google.com> Add missing library used by the main executable in linker options. Currently
the library is implicit added via inter-library dependency.
ndroid.mk
eb13a90bb96b329d8e24a6c3d4720ae88451d301 07-Jan-2010 San Mehat <san@google.com> vold: Don't freak out if an asec mountpoint already exists

Signed-off-by: San Mehat <san@google.com>
olumeManager.cpp
fff0b47998a722d57eea6a07350bbd7a6032b3cc 07-Jan-2010 San Mehat <san@google.com> vold2: Enable support for custom mount perm masks and wire to asec

Signed-off-by: San Mehat <san@google.com>
at.cpp
at.h
olume.cpp
olumeManager.cpp
a19b250bd273455933ca3502cf2c2e0a803aff77 06-Jan-2010 San Mehat <san@google.com> vold2: Initial support for Android Secure External Caches

Signed-off-by: San Mehat <san@google.com>
ndroid.mk
ommandListener.cpp
ommandListener.h
at.cpp
at.h
oop.cpp
oop.h
esponseCode.h
olume.cpp
olumeManager.cpp
olumeManager.h
7b8f2db4b07deaaa2f6f5ffbee0386a394032b08 04-Jan-2010 San Mehat <san@google.com> vold2: Don't crap out if the kernel is missing the NPART/PARTN blkdev uevent patches

Signed-off-by: San Mehat <san@google.com>
irectVolume.cpp
bf04185c88161f13118b9975cdff7967d49a4fa0 04-Jan-2010 San Mehat <san@google.com> vold2: Refactor FAT support into a separate class

Signed-off-by: San Mehat <san@google.com>
ndroid.mk
at.cpp
at.h
olume.cpp
olume.h
79e31bedcaabcca55aaf40a9de61abed11c9a2e0 04-Jan-2010 San Mehat <san@google.com> vold2: Don't bail out if the UMS switch isn't there

Signed-off-by: San Mehat <san@google.com>
ain.cpp
11f78c181e6afe024427be2b7a530280cd4b64e1 03-Jan-2010 San Mehat <san@google.com> vold2: Don't build for simulator

Signed-off-by: San Mehat <san@google.com>
ndroid.mk
0cde53ce7b44ce189d0bc6fa81c0036e096deb51 22-Dec-2009 San Mehat <san@google.com> vold2: Manually bootstrap the ums switch since switch kernel uevents are broken

Signed-off-by: San Mehat <san@google.com>
olumeManager.cpp
olumeManager.h
ain.cpp
a1c2ca1c70e52cccb7e63f4be8d7127b22afc0e5 21-Dec-2009 San Mehat <san@google.com> vold2: Enable in build

Signed-off-by: San Mehat <san@google.com>
ndroid.mk
a2677e4ad01f250b0765f04adf0acfa6627efc98 13-Dec-2009 San Mehat <san@google.com> vold2: Get mounting/unmounting/formatting/sharing working

Signed-off-by: San Mehat <san@google.com>
ndroid.mk
ommandListener.cpp
ommandListener.h
irectVolume.cpp
irectVolume.h
rrorCode.h
etlinkHandler.cpp
rocessKiller.c
esponseCode.h
olume.cpp
olume.h
olumeManager.cpp
olumeManager.h
iskmbr.h
eom_mbr_enc.c
ain.cpp
dd9b8e92aaf330b48ddb40a7380588ef92b53de6 21-Oct-2009 San Mehat <san@google.com> vold2: Some more work on partitioning support

Signed-off-by: San Mehat <san@google.com>
irectVolume.cpp
irectVolume.h
olume.cpp
olume.h
49e2bce5b74129c26a35e25d4693cbfe98c4688e 13-Oct-2009 San Mehat <san@android.com> vold2: Wire up more of the mount function

Signed-off-by: San Mehat <san@android.com>
ndroid.mk
ommandListener.cpp
irectVolume.cpp
irectVolume.h
olume.cpp
olume.h
olumeManager.cpp
olumeManager.h
ogwrapper.c
8d5ad9a7cd5f8dd0233f7c30d4f926a201f4263b 13-Oct-2009 android-build SharedAccount <android-build@sekiwake.mtv.corp.google.com> new project, first commit
ae10b91044bf76b40b77d81c169e48e0bbdf6d75 12-Oct-2009 San Mehat <san@android.com> vold2: Rename DeviceVolume -> DirectVolume

Signed-off-by: San Mehat <san@android.com>
ndroid.mk
eviceVolume.cpp
eviceVolume.h
irectVolume.cpp
irectVolume.h
olumeManager.cpp
ain.cpp
3578c41ef138cb3edf38bb488cb9864921f55c79 12-Oct-2009 San Mehat <san@android.com> vold2: Add block device udev bootstrapping

Signed-off-by: San Mehat <san@android.com>
ain.cpp
59abc3c56b432089abfe868c04cdbc3b6d28aee2 12-Oct-2009 San Mehat <san@android.com> vold2: DeviceVolume: Add pending partition support

Signed-off-by: San Mehat <san@android.com>
eviceVolume.cpp
fd7f5875129adfe2845f4f3fffb17db3a89eea25 12-Oct-2009 San Mehat <san@android.com> vold2: Refactor the netlink event handling and better define how partitions/disks are handled

Signed-off-by: San Mehat <san@android.com>
eviceVolume.cpp
eviceVolume.h
etlinkHandler.cpp
olume.cpp
olume.h
olumeManager.cpp
olumeManager.h
f1b736bc5605e92e917ab27f5abf3ba839be2270 11-Oct-2009 San Mehat <san@android.com> system: vold2: Initial skeleton for vold2.

Let there be light.

Signed-off-by: San Mehat <san@android.com>
ndroid.mk
lockDevice.cpp
lockDevice.h
ommandListener.cpp
ommandListener.h
eviceVolume.cpp
eviceVolume.h
rrorCode.h
etlinkHandler.cpp
etlinkHandler.h
etlinkManager.cpp
etlinkManager.h
oldCommand.cpp
oldCommand.h
olume.cpp
olume.h
olumeManager.cpp
olumeManager.h
ain.cpp
dc.c
8f8ba4d0c0a8bcfed22628928843f943638769db 09-Oct-2009 Jean-Baptiste Queru <jbq@google.com> Empty starting point