e2e2d308df2da26838de32852318bc2cb690d052 |
|
01-Aug-2017 |
Pavel Grafov <pgrafov@google.com> |
Zero memory used for encryuption keys. std::vector with custom zeroing allocator is used instead of std::string for data that can contain encryption keys. Bug: 64201177 Test: manually created a managed profile, changed it's credentials Test: manually upgraded a phone with profile from O to MR1. Change-Id: Ic31877049f69eba9f8ea64fd99acaaca5a01d3dd
/system/vold/Android.mk
|
d794526962c385af307597f27d26aeb43703e6a1 |
|
27-Jun-2017 |
Jeff Sharkey <jsharkey@android.com> |
Fully switch to mke2fs; set policies everywhere. Older make_ext4fs doesn't support enabling quotas, so switch everyone over to using mke2fs for adoptable storage. Remove UUID check so that we start setting ext4-crypto policies on adoptable storage devices; a future change will handle the actual key management. Bug: 30230655, 36757864 Test: cts-tradefed run commandAndExit cts-dev --abi armeabi-v7a -m CtsAppSecurityHostTestCases -t android.appsecurity.cts.AdoptableHostTest Change-Id: I021f85b1be8431044c239521c37be96534682746
/system/vold/Android.mk
|
03f89d3d9540c7f5fbc609d5bbcd99e444a06503 |
|
16-Jun-2017 |
Paul Crowley <paulcrowley@google.com> |
Move functions useful for crypto test into their own file More refactoring in advance of work on bug. Bug: 36029169 Test: compiles. Change-Id: Ic4cdd4761e4c2b11a3ddca5c3bbc4d5e42fac9d4
/system/vold/Android.mk
|
c3bda18bda525ff8d43be0d38747350f7991e247 |
|
10-May-2017 |
Elliott Hughes <enh@google.com> |
Switch to libkeyutils. Bug: http://b/37991155 Test: builds+boots Change-Id: I33a3ba0d59ffd504093dc94517815c1196e95e2b
/system/vold/Android.mk
|
d5759811ffe0eef50612dbd32166a08f0b32cfdc |
|
02-Jun-2016 |
Paul Crowley <paulcrowley@google.com> |
Add support for metadata encryption Support encrypting metadata in /userdata using the dm-default-key driver with a key in the /metadata partition. Bug: 29189559 Test: Angler & Marlin build and boot Change-Id: I716b117508d4bb4f6a4039293acb848cbc60f67b
/system/vold/Android.mk
|
f71ace310eec3e39f0efefd51f62c9ccf4180f48 |
|
02-Jun-2016 |
Paul Crowley <paulcrowley@google.com> |
Refactor to lay the groundwork for metadata encryption Bug: 26778031 Test: Angler, Marlin build and boot Change-Id: Ic136dfe6195a650f7db76d3489f36da6a1929dc5
/system/vold/Android.mk
|
32ebb739cb6c27a122d98b1bdfe1c1a5814b2ed3 |
|
28-Mar-2017 |
Jeff Sharkey <jsharkey@android.com> |
Enable clang-tidy for security sensitive domain. Start with clang-analyzer-security* and cert-*, but disable two specific errors: -- cert-err34-c, which checks for atoi(); heavily triggered by CommandListener, but will disappear when we move to Binder. -- cert-err58-cpp, which checks for exceptions before main(); it's a "Low" severity issue, and filed 36656327 to track cleanup. Fix all other triggered errors along the way. Test: builds, boots Bug: 36655947 Change-Id: I1391693fb521ed39700e25ab6b16bc741293bb79
/system/vold/Android.mk
|
4375f1be4ccdbf78ef4c5ab926d3316503a7b146 |
|
25-Feb-2017 |
Wei Wang <wvw@google.com> |
Change to use new WaitForProperty API Change to use WaitForProperty API to wait for vold.post_fs_data_done Also change cryptfs to C++ Bug: 35425974 Test: mma, marlin/angler boot Change-Id: Id821f2035788fcc91909f296c83c871c67571de3
/system/vold/Android.mk
|
fec6ba5c8cc3369b43ad38b98ac1fd030f0e2e73 |
|
15-Feb-2017 |
Isaac Chen <ycchen@google.com> |
Merge "Removed HW encryption build flags and related code." am: bf8518056d am: 95dc636942 am: 730c6196a2 am: 2f88e97172 Change-Id: I2decffa399cbc941b93ba251957f2a9168945d29
|
dff70b4e3ed895d8af3ab0192fe3cb4a2f740cdb |
|
14-Feb-2017 |
Isaac Chen <ycchen@google.com> |
Removed HW encryption build flags and related code. TARGET_HW_DISK_ENCRYPTION and TARGET_CRYPTFS_HW_PATH build flags and related code in cryptfs.c are removed since it doesn't match the driver in current tree. To enable HW encryption, the driver needs to be hidlized. Bug: 34268168 Test: compile Change-Id: I507a0e2908b3c407c565e44873b82c94a8305de6
/system/vold/Android.mk
|
7c289b44cdb4a29267a83db741e21c782bb657cb |
|
23-Jan-2017 |
TreeHugger Robot <treehugger-gerrit@google.com> |
Merge "Port to binder based keymaster hal"
|
a4792eb2298a1865a4744ac3ecfa7b70c657a182 |
|
21-Jan-2017 |
bowgotsai <bowgotsai@google.com> |
Merge "Include libavb in static libraries" am: d65506217d am: 967f9715c3 am: ab9218c64f am: efb59f9971 Change-Id: Ia64f945476f38bbe5047c5a62d4e2ff08e84eaec
|
8e537b80028d11ac1f3810e959636028e77b2025 |
|
26-Oct-2016 |
Janis Danisevskis <jdanis@google.com> |
Port to binder based keymaster hal Bug: 32020919 Change-Id: If45ece76fdaf4d2c80eddc537e429633e4d42f9d
/system/vold/Android.mk
|
58bdac8d250ba85c859d34ce249ad472bcb64c7b |
|
06-Jan-2017 |
bowgotsai <bowgotsai@google.com> |
Include libavb in static libraries Bug: 31264231 Test: compile Change-Id: I1d84f7aa67a0ed31f2b6400cf1c9567bf503295a
/system/vold/Android.mk
|
4315c6a0c34cb0200def12a05ad5c8c9d4a37d44 |
|
06-Dec-2016 |
Paul Crowley <paulcrowley@google.com> |
Enable building and running the vold_tests module as part of a standard build; make it use only static libraries as per documented limitations of APCT. Bug: 33384925 Test: This is a test. Change-Id: I794adbfa3376795120cfbca1e9322093960009b5
/system/vold/Android.mk
|
6218c51e4b4b31814159b7156fb37a93637529c3 |
|
03-Dec-2016 |
Adrien Schildknecht <adriens@google.com> |
Manually merge commit 'b406ffa' into stage-aosp-master am: 04c55e6ed7 am: 93722ead06 am: 43100e580f Change-Id: I8a74fd730f0aa5a1f94c04c12286e96ac299b463
|
e0f409ca32b4bb434c30557a2ed28cf1957098c0 |
|
22-Nov-2016 |
Adrien Schildknecht <adriens@google.com> |
Add support for creating ext4 images with mke2fs We are investigating replacing make_ext4fs with the upstream tool mke2fs. See b/23686092 for more informations. To mitigate the trouble that may arise if the new tool behave differently compared to the old one, there will be a transition period where both mke2fs and make_ext4fs will be supported. This patch does 3 things: - add the necessary code to use mke2fs to format an ext4 partition; - add a dependency to the binary used by vold. Test: m -j32 with TARGET_USES_MKE2FS={,false,true} TARGET_USERIMAGES_USE_EXT4={,true} Change-Id: I89222642fe1d11a035155c8224b84b2e3719938b
/system/vold/Android.mk
|
889ed48e5f062b8bce85fcec2b01ee0bff77c02e |
|
24-Jun-2016 |
Yabin Cui <yabinc@google.com> |
Use libbootloader_message. Bug: 29582118 Change-Id: I8de2cfbc62908011dba2ab86d17f977ebcfadac0 (cherry picked from commit 1fb5966fbb4e05d15cb10ff371137b4ef9dff584)
/system/vold/Android.mk
|
5a95ddbacfe4ec74b6b90dd7a9bc76d27b173758 |
|
06-Oct-2016 |
Tao Bao <tbao@google.com> |
Update the header path for ext4_utils. Test: mmma system/vold Change-Id: I805b8874b05b8043390c2cd3c143cc469913c067 (cherry picked from commit 989fec27690758ad1e6c521713f1a88c50c9c857)
/system/vold/Android.mk
|
989fec27690758ad1e6c521713f1a88c50c9c857 |
|
06-Oct-2016 |
Tao Bao <tbao@google.com> |
Update the header path for ext4_utils. Test: mmma system/vold Change-Id: I805b8874b05b8043390c2cd3c143cc469913c067
/system/vold/Android.mk
|
dff8c727c15cbe795e518e9116dfa271e67755b5 |
|
16-May-2016 |
Paul Crowley <paulcrowley@google.com> |
Support Keymaster 2 configuration and key upgrading Bug: 27212248 Change-Id: I96bd9a442f4f535ba6ea44c9e81bcc1fee0ec471
/system/vold/Android.mk
|
951de915a3e402a54713ab37a4f709dfceebd45b |
|
01-Jul-2016 |
Yabin Cui <yabinc@google.com> |
Use libbootloader_message. am: 1fb5966fbb Change-Id: Ib97b3be116b704188082a81626a9b5ecdde56726
|
1fb5966fbb4e05d15cb10ff371137b4ef9dff584 |
|
24-Jun-2016 |
Yabin Cui <yabinc@google.com> |
Use libbootloader_message. Bug: 29582118 Change-Id: I8de2cfbc62908011dba2ab86d17f977ebcfadac0
/system/vold/Android.mk
|
ccd9dd53f8a55b296eb0671acefc9f0163fd83b4 |
|
13-Apr-2016 |
Elliott Hughes <enh@google.com> |
resolve merge conflicts of 81fd991 to nyc-dev-plus-aosp Change-Id: Iabda2c9ad05ed4aa0a078c5da40b887f36dd9328
|
ffa2e0992118c6a2dbafc5d69bb0da6bd5e2f5c7 |
|
07-Apr-2016 |
Yabin Cui <yabinc@google.com> |
vold: write bootloader message directly. Bug: 27176738 Change-Id: I09bfe777e383325809d7ecc2dcb9129fe234053f
/system/vold/Android.mk
|
dc8032396916db58a136d73bf5e587419507db4e |
|
31-Mar-2016 |
Mattias Nissler <mnissler@google.com> |
Switch to BoringSSL crypto. This replaces the libmincrypt dependency with libcrypto_utils, which is needed due to libfec and fs_mgr switching to BoringSSL. Change-Id: I4f6f4d8cc5e200679331a9bcdf2cc3bad1082dd6
/system/vold/Android.mk
|
01f86a521dcec084fe8b2810367c9ecc55d92185 |
|
13-Feb-2016 |
Dimitry Ivanov <dimitry@google.com> |
Add missing liblog dependency Bug: http://b/27171986 Change-Id: I03c5f9375ca46a81250ac00493a4f3f1eebf3156
/system/vold/Android.mk
|
63c18d3ba9179ee0e678564e12aa845d9a6c3ec8 |
|
10-Feb-2016 |
Paul Crowley <paulcrowley@google.com> |
Add scrypt-based password stretching. Bug: 27056334 Change-Id: Ifa7f776c21c439f89dad7836175fbd045e1c603e
/system/vold/Android.mk
|
47695b29af0467dd8e18f5534e3b62e39326d7e1 |
|
02-Feb-2016 |
Jeff Sharkey <jsharkey@android.com> |
Allow callers to prepare CE/DE user storage. Give callers the option of preparing CE and/or DE storage. The framework will only prepare CE storage after the CE keys have been unlocked for that user. When init is calling enablecrypto, kick off the work in a thread so that we can make other calls back into vold without causing deadlock. Leaves blocking call intact for framework callers. Clean up 'vdc' tool to send useful transaction numbers, and actually watch for the matching result to come back. This fixes race conditions when there are multiple 'vdc' callers. Also add other system and misc directories to match spec. Bug: 25796509 Change-Id: Ie4f853db6e387916b845d2b5fb92925d743b063d
/system/vold/Android.mk
|
75fc83bac8ad3aba3bbb65092974ab3a16822210 |
|
02-Feb-2016 |
Jeff Vander Stoep <jeffv@google.com> |
resolve merge conflicts of 2b6f9ce823 to master. Change-Id: I69f36f560334b11b099f2eb15999603dd2469d4f
|
df725758628a0a250c82a9071af6a06a89e474fd |
|
30-Jan-2016 |
Jeff Vander Stoep <jeffv@google.com> |
cryptfs: run e2fsck/fsck.f2fs in fsck domain e2fsck and fsck.f2fs must run in the fsck domain. Add call to setexeccon() to tell selinux to run in the fsck domain on exec. Addresses: avc: denied { execute_no_trans } for path="/system/bin/e2fsck" dev="mmcblk0p41" ino=241 scontext=u:r:vold:s0 tcontext=u:object_r:fsck_exec:s0 tclass=file Bug: 26872236 Change-Id: Ib2a583aeefc667f8aa67532e0ac0ff9619b65461
/system/vold/Android.mk
|
13ffd8ef7a02a1b4b4d9a74f45d4a5bb6b814313 |
|
27-Jan-2016 |
Paul Crowley <paulcrowley@google.com> |
Improvements to the key storage module The key storage module didn't comply with Android coding standards and had room for improvemnet in a few other ways, so have cleaned up. Change-Id: I260ccff316423169cf887e538113b5ea400892f2
/system/vold/Android.mk
|
1ef255816c50e462acc23383a9ff747c5f55c4ff |
|
21-Jan-2016 |
Paul Crowley <paulcrowley@google.com> |
Use a keymaster-based key storage module Instead of writing raw keys, encrypt the keys with keymaster. This paves the way to protecting them with auth tokens and passwords later. In addition, fold in the hash of a 16k file into their encryption, to ensure secure deletion works properly. Now even C++ier! Bug: 22502684 Bug: 22950892 Change-Id: If70f139e342373533c42d5a298444b8438428322
/system/vold/Android.mk
|
8bb8fcfb4f502ba0ed68d8169dfaca89ff85bab9 |
|
11-Jan-2016 |
Paul Crowley <paulcrowley@google.com> |
Use android-base logging not cutils in secdiscard Much nicer C++ style logging, but the main reason is to clean up AutoCloseFD.h so I don't have to use cutils to use it. Change-Id: I7a7f227508418046eecce6c89f813bd8854f448a
/system/vold/Android.mk
|
f0500a08230f068a1cf55e4de3cfc389d51f8669 |
|
02-Oct-2015 |
Sami Tolvanen <samitolvanen@google.com> |
am 0331d4ae: am 685dfdd3: Merge "Error correction: Add libfec dependencies for vold" * commit '0331d4ae3843f682e98bfa1aba0f8da7fbd9beb0': Error correction: Add libfec dependencies for vold
|
0331d4ae3843f682e98bfa1aba0f8da7fbd9beb0 |
|
02-Oct-2015 |
Sami Tolvanen <samitolvanen@google.com> |
am 685dfdd3: Merge "Error correction: Add libfec dependencies for vold" * commit '685dfdd33590ef8a93627015c434fea54b8f1b4d': Error correction: Add libfec dependencies for vold
|
efe67cd25d3a2627f28d62bd9134e8853149d6ef |
|
01-Jun-2015 |
Sami Tolvanen <samitolvanen@google.com> |
Error correction: Add libfec dependencies for vold Vold requires libfec and related dependencies due to fs_mgr_mount_all. Bug: 21893453 Change-Id: If59df0c5fd3395d4aac97dd8119b7c70c0fa5d4d
/system/vold/Android.mk
|
10b02df820ece261b621a1f46838995249a1082c |
|
21-Aug-2015 |
Tom Cherry <tomcherry@google.com> |
am 218f48d6: Merge "bundle init.rc contents with its service" * commit '218f48d6c55a7ee5115a7a8fc4248d33ea01811f': bundle init.rc contents with its service
|
685439bbc7ef958a3472465ebdabf2b997889e76 |
|
21-Aug-2015 |
Tom Cherry <tomcherry@google.com> |
am 218f48d6: Merge "bundle init.rc contents with its service" * commit '218f48d6c55a7ee5115a7a8fc4248d33ea01811f': bundle init.rc contents with its service
|
a285984ae404b89e87a1f97486bf8f9c8a0fab0f |
|
14-Aug-2015 |
Tom Cherry <tomcherry@google.com> |
bundle init.rc contents with its service Bug: 23186545 Change-Id: I82d8b6dc54ebe32ceb1ed997aaab3701ee7b6c4a
/system/vold/Android.mk
|
f4000e480d5da9df8c0205b28160e60a0b47c77d |
|
14-Jul-2015 |
Paul Crowley <paulcrowley@google.com> |
am 5bd0daf9: Add tool for scrubbing files with BLKSECDISCARD. * commit '5bd0daf926ea8096dc091d7b99ff9e56cc5746aa': Add tool for scrubbing files with BLKSECDISCARD.
|
5bd0daf926ea8096dc091d7b99ff9e56cc5746aa |
|
19-May-2015 |
Paul Crowley <paulcrowley@google.com> |
Add tool for scrubbing files with BLKSECDISCARD. Bug: 19706593 (based on work in commit 8d0cd7ffd903a753c6bb5c6f33987a7a66621cef) Change-Id: I9699275a63f2d0a110435bd4a725d7dfcce4ed90
/system/vold/Android.mk
|
3ff337db56fbe4ac84eb9f3907ac4a1029beecb9 |
|
02-Jul-2015 |
Jeff Sharkey <jsharkey@android.com> |
am c86ab6f5: Trim both internal and adopted private storage. * commit 'c86ab6f538bec63638c168d6c843fe7cf73add3b': Trim both internal and adopted private storage.
|
c86ab6f538bec63638c168d6c843fe7cf73add3b |
|
26-Jun-2015 |
Jeff Sharkey <jsharkey@android.com> |
Trim both internal and adopted private storage. Refactor fstrim code to be encapsulated in unique task object, and give it option of benchmarking when finished. Trimming now includes both storage from fstab and adopted private volumes. Cleaner timing stats are logged for each unique volume. Add wakelock during ongoing async move tasks. Push disk sysfs path to framework so it can parse any SD card registers as desired. Bug: 21831325 Change-Id: I76577685f5cae4929c251ad314ffdaeb5eb1c8bf
/system/vold/Android.mk
|
d6a77b518ca951d8b527f97d3e3732756c641a74 |
|
09-Jun-2015 |
Jeff Sharkey <jsharkey@android.com> |
am d0640f63: Add f2fs support for private volumes. * commit 'd0640f6358041f7e2657167560b357078db73526': Add f2fs support for private volumes.
|
d0640f6358041f7e2657167560b357078db73526 |
|
22-May-2015 |
Jeff Sharkey <jsharkey@android.com> |
Add f2fs support for private volumes. When formatting volumes, pass along fsType string which can be "auto" to let the volume select the best choice. For now, private volumes assume that MMC devices (like SD cards) are best off using f2fs when both kernel support and tools are present, otherwise fall back to ext4. Use blkid when mounting to pick the right set of tools. Move filesystem utility methods into namespaces and place in separate directory to be more organized. Bug: 20275581 Change-Id: Id5f82d8672dda2e9f68c35b075f28232b0b55ed4
/system/vold/Android.mk
|
5c18a6757910d0f2689e99f51b2dc283881178b3 |
|
05-Jun-2015 |
Paul Lawrence <paullawrence@google.com> |
Merge commit 'd0b4295c' into manualmerge Change-Id: I6d7178edebf50663fa9622b539c8101627a84385
|
d0b4295ccc07d0cd715ade415c8c0d7d6945880e |
|
03-Jun-2015 |
Paul Lawrence <paullawrence@google.com> |
Move crypt commands to a different listener in vold In order to prevent this bug from happening, we must allow vold cryptfs commands to complete while a long running mount is underway. While waiting for vold to be changed to a binder interface, we will simply create two listeners, one for cryptfs and one for everything else. Bug: 19197175 Change-Id: If74142aa81abd58f718a9de6c9e387f6ea442754
/system/vold/Android.mk
|
731a7a242df6cc3441ac82b4f9521546fac5ac2d |
|
29-Apr-2015 |
Paul Lawrence <paullawrence@google.com> |
DO NOT MERGE Securely encrypt the master key (cherry-picked from commit 707fd6c7cccc31c0ab0ec1a6ac8b6077c632fc35) Move all key management into vold Reuse vold's existing key management through the crypto footer to manage the device wide keys. Use ro.crypto.type flag to determine crypto type, which prevents any issues when running in block encrypted mode, as well as speeding up boot in block or no encryption. This is one of four changes to enable this functionality: https://android-review.googlesource.com/#/c/148586/ https://android-review.googlesource.com/#/c/148604/ https://android-review.googlesource.com/#/c/148606/ https://android-review.googlesource.com/#/c/148607/ Bug: 18151196 Change-Id: I3c68691717a61b5e1df76423ca0c02baff0dab98
/system/vold/Android.mk
|
ddd4da1af61d8f31b58eb2480dde5f6f30c869b8 |
|
16-May-2015 |
Jeff Sharkey <jsharkey@android.com> |
am 5a6bfca1: Initial pass at storage benchmarks. * commit '5a6bfca1638760b87cf64c5ffb48ff3557cc0563': Initial pass at storage benchmarks.
|
5a6bfca1638760b87cf64c5ffb48ff3557cc0563 |
|
15-May-2015 |
Jeff Sharkey <jsharkey@android.com> |
Initial pass at storage benchmarks. Now that we're offering to store private app data on adopted storage devices, the performance of those devices is much more important to overall user experience. To help set user expectations, this change offers to execute a real-world benchmark on a storage device, returning a metric that can be used to compare internal and external storage. The benchmark is generated from the strace-instrumented storage access patterns of typical apps. A typical device completes the benchmark in under two seconds on internal storage, a UHS-3 SD card is even faster (!), but a very slow Class 4 SD card takes about 30 seconds to complete, giving us a clear signal. The measured benchmark numbers are logged along with information about the storage device, such as manufacturer, model, etc. Card serial numbers are scrubbed from output. Bug: 21172095 Change-Id: I9b2713dafdfdfcf5d97bf1bc21841f39409a7e54
/system/vold/Android.mk
|
e05aacfec62c6535731347fe75223f953513cc5f |
|
13-May-2015 |
Kenny Root <kroot@google.com> |
resolved conflicts for merge of 9df68a13 to mnc-dev-plus-aosp Change-Id: I5c72c27ec055195d84c58d0699b46d3942c29dde
|
75a5202d9f65747edabb1dd0ebd50a779d4142c2 |
|
06-May-2015 |
Paul Crowley <paulcrowley@google.com> |
Add vold commands for setting up per-user encrypted user directories Bug: 19704432 Change-Id: I15980eed8e4960ca270cf0f8db4e480a8c2ca832
/system/vold/Android.mk
|
4f817d1bd2c6e09bb6362f771c26526e8c1971c3 |
|
07-May-2015 |
Paul Crowley <paulcrowley@google.com> |
am 42696d97: Merge "Make vdc a C++ file as a base for further improvement." * commit '42696d97ce138fa5e7a1380b3841250549acb615': Make vdc a C++ file as a base for further improvement.
|
fde9cd8c82f2557f9c8c9ac34a2a8f666d43cf0d |
|
06-May-2015 |
Paul Crowley <paulcrowley@google.com> |
Make vdc a C++ file as a base for further improvement. Bug: 19704432 Change-Id: I784e8a91d3b0f4d6cd0dc668e9e55d0290f768e8
/system/vold/Android.mk
|
e225260184b999c54878b1e254f7fe774429fd12 |
|
29-Apr-2015 |
Paul Lawrence <paullawrence@google.com> |
Merge commit 'c3e4cc29' into manualmerge Change-Id: I1f6feaf743e0b9a62fe212af3cd9dd16abefeb00
|
707fd6c7cccc31c0ab0ec1a6ac8b6077c632fc35 |
|
29-Apr-2015 |
Paul Lawrence <paullawrence@google.com> |
Securely encrypt the master key Move all key management into vold Reuse vold's existing key management through the crypto footer to manage the device wide keys. Use ro.crypto.type flag to determine crypto type, which prevents any issues when running in block encrypted mode, as well as speeding up boot in block or no encryption. This is one of four changes to enable this functionality: https://android-review.googlesource.com/#/c/148586/ https://android-review.googlesource.com/#/c/148604/ https://android-review.googlesource.com/#/c/148606/ https://android-review.googlesource.com/#/c/148607/ Bug: 18151196 Change-Id: I3c68691717a61b5e1df76423ca0c02baff0dab98
/system/vold/Android.mk
|
f7de12b2640f7433d22220e187c02007026fc4e4 |
|
28-Apr-2015 |
Paul Lawrence <paullawrence@google.com> |
resolved conflicts for merge of bf9dcad7 to mnc-dev-plus-aosp Change-Id: Ic0d4ed7e6c83ad857e2a4a198d069b73fcf399e6
|
beadcb6ec038b8e3b96cfa3b3b3e05005785b282 |
|
28-Apr-2015 |
Paul Lawrence <paullawrence@google.com> |
Revert "Securely encrypt the master key" This reverts commit 7053e9cd5ebbbb783bf4140381090e6bd0caa740. Change-Id: I77ed4dbdff8643c80629d2126cb29f85c24c7b43
/system/vold/Android.mk
|
74e85f18722ae6b6cf562352a3c30e49ae388e9d |
|
27-Apr-2015 |
Paul Lawrence <paullawrence@google.com> |
resolved conflicts for merge of 86138731 to mnc-dev-plus-aosp Change-Id: I89203aa1665bb42f9a98fd8b94b933e8406dde02
|
7053e9cd5ebbbb783bf4140381090e6bd0caa740 |
|
26-Mar-2015 |
Paul Lawrence <paullawrence@google.com> |
Securely encrypt the master key Move all key management into vold Reuse vold's existing key management through the crypto footer to manage the device wide keys This is one of four changes to enable this functionality: https://android-review.googlesource.com/#/c/144586/ https://android-review.googlesource.com/#/c/144663/ https://android-review.googlesource.com/#/c/144672/ https://android-review.googlesource.com/#/c/144673/ Bug: 18151196 Change-Id: I9a162b90afe5f46a4ff15b3878e2ab503795425e
/system/vold/Android.mk
|
1d6fbcc389ecb9f418076e8ab5f4c93a5d911de9 |
|
25-Apr-2015 |
Jeff Sharkey <jsharkey@android.com> |
Migrate primary external storage. When requested, kick off a thread that will migrate storage contents between two locations. This is performed in several steps that also interact with the framework: 1. Take old and new volumes offline during migration 2. Wipe new location clean (10% of progress) 3. Copy files from old to new (60% of progress) 4. Inform framework that move was successful so it can persist 5. Wipe old location clean (15% of progress) Derives a hacky progress estimate by using a rough proxy of free disk space changes while a cp/rm is taking place. Add new internal path for direct access to volumes to bypass any FUSE emulation overhead, and send it to framework. Remove mutex around various exec calls since setexeccon() is already per-thread. Bug: 19993667 Change-Id: Ibcb4f6fe0126d05b2365f316f53e71dc3e79a2b8
/system/vold/Android.mk
|
389672737673f9c695ac70464a0f8656908d20fd |
|
07-Apr-2015 |
Mohamad Ayyash <mkayyash@google.com> |
am 959de99a: am f8c905e0: Merge "Add dependency on libsquashfs_utils due to fs_mgr dependency" * commit '959de99af47dec9ed7a3499ce57e4097be399d7d': Add dependency on libsquashfs_utils due to fs_mgr dependency
|
c489d7f4e706bafbe13e430ec807ab12ce7e7803 |
|
07-Apr-2015 |
Mohamad Ayyash <mkayyash@google.com> |
Add dependency on libsquashfs_utils due to fs_mgr dependency Change-Id: I894d18c2086a6532194f478853a9837eb4b6fc09 Signed-off-by: Mohamad Ayyash <mkayyash@google.com>
/system/vold/Android.mk
|
9f18fe7807a4e4089778243dbbd08d154ec15540 |
|
02-Apr-2015 |
Jeff Sharkey <jsharkey@android.com> |
Remove unused code. Bug: 19993667 Change-Id: I1f6519655c5a366eca25e2329e1bf95d81b3bf8c
/system/vold/Android.mk
|
9c48498f4529f623650c56d03e63324c8d813032 |
|
31-Mar-2015 |
Jeff Sharkey <jsharkey@android.com> |
Support for private (adopted) volumes. This adds support for private volumes which is just a filesystem wrapped in a dm-crypt layer. For now we're using the exact same configuration as internal encryption (aes-cbc-essiv:sha256), but we don't store any key material on the removable media. Instead, we store the key on internal storage, and use the GPT partition GUID to identify which key should be used. This means that private external storage is effectively as secure as the internal storage of the device. That is, if the internal storage is encrypted, then our external storage key is also encrypted. When partitioning disks, we now support a "private" mode which has a PrivateVolume partition, and a currently unused 16MB metadata partition reserved for future use. It also supports a "mixed" mode which creates both a PublicVolume and PrivateVolume on the same disk. Mixed mode is currently experimental. For now, just add ext4 support to PrivateVolume; we'll look at f2fs in a future change. Add VolumeBase lifecycle for setting up crypto mappings, and extract blkid logic into shared method. Sprinkle some more "static" around the cryptfs code to improve invariants. Bug: 19993667 Change-Id: Ibd1df6250735b706959a1eb9d9f7219ea85912a0
/system/vold/Android.mk
|
ae9e8903375e13028b140e86fcc68c6e152b6f43 |
|
16-Mar-2015 |
Dan Albert <danalbert@google.com> |
Update for libbase. Change-Id: I23b1281a63031a7481ea7b33c9ddbdbe7d3d6174
/system/vold/Android.mk
|
deb240573754daf36fa8ea10a05240f9f31e7b2c |
|
03-Mar-2015 |
Jeff Sharkey <jsharkey@android.com> |
Checkpoint of better dynamic device support. This is the first in a series of changes that are designed to introduce better support for dynamic block devices. It starts by defining a new Volume object which represents a storage endpoint that knows how to mount, unmount, and format itself. This could be a filesystem directly on a partition, or it could be an emulated FUSE filesystem, an ASEC, or an OBB. These new volumes can be "stacked" so that unmounting a volume will also unmount any volumes stacked above it. Volumes that provide shared storage can also be asked to present themselves (through bind mounts) into user-specific mount areas. This change also adds a Disk class which is created based on block kernel netlink events. Instead of waiting for partition events from the kernel, it uses gptfdisk to read partition details and creates the relevant Volume objects. Change-Id: I0e8bc1f8f9dcb24405f5e795c0658998e22ae2f7
/system/vold/Android.mk
|
ba5834dcea382a71326289c8d1293e0e95f1dfec |
|
23-Jan-2015 |
Kenny Root <kroot@google.com> |
am 26970299: Merge "Remove superfluous OpenSSL include paths." * commit '269702997153cdf92c65cfee277c76afed44e9e5': Remove superfluous OpenSSL include paths.
|
41405bb3e5cdde0782bfcf7065b88ce1bb253c3c |
|
23-Jan-2015 |
Adam Langley <agl@google.com> |
Remove superfluous OpenSSL include paths. The libcrypto and libssl modules (and their respective static and host versions) use LOCAL_EXPORT_C_INCLUDE_DIRS thus just including the module is sufficient. Additionally, cryptfs.h was including an OpenSSL header just to get the length of a SHA-256 hash. Rather than force all users of this header to also depend on libcrypto, it's easier just to define that value in the header file. Change-Id: I3e3e0db906a212e1093944b298e4a8ff2e2fb07d
/system/vold/Android.mk
|
210caabdb51943ec46532fb13bd3df8b983897e7 |
|
18-Dec-2014 |
Dan Albert <danalbert@google.com> |
resolved conflicts for merge of 88aba541 to lmp-mr1-dev-plus-aosp Change-Id: Ie5ef819dd8168cb6a73f84a881a92c116705fffc
|
c07fa3fa5ada60b5f0b13d84f7a9893e2c331549 |
|
18-Dec-2014 |
Dan Albert <danalbert@google.com> |
Fix alignment of buffer used for dm_ioctl. Since the dm_ioctl struct was being allocated on the stack as a large character array, it was getting character alignment rather than the proper alignment for the struct. GCC had been getting away with this so far, but it's undefined behavior that clang managed to expose. Bug: 18736778 Change-Id: Ied275dfad7fcc41d712b2d02c8a185f499221f57
/system/vold/Android.mk
|
6c78e7d7724a431dbdb2b0a5bb8cd2b07424cbe5 |
|
18-Dec-2014 |
Tim Murray <timmurray@google.com> |
resolved conflicts for merge of 4be36106 to lmp-mr1-dev-plus-aosp Change-Id: If504710a618d8c3adf85297d5fd2909558ed57a3
|
8439dc9fd569794b1a31f67cf43d9212de33eecc |
|
15-Dec-2014 |
Tim Murray <timmurray@google.com> |
Make vold compile with -Werror -Wall. -Wno-missing-field-initializers is used as well, but that is an overzealous warning from initializing structs with {0} and not a real warning. bug 18736778 and 16868177 Change-Id: Iffde89cd7200d9a11193e1614f1819f9fcace30a
/system/vold/Android.mk
|
97f3d073ac8cfb8043fcf6ee0b80d5f515ad36c4 |
|
13-Dec-2014 |
Dan Albert <danalbert@google.com> |
am a20bb17e: Merge "Move vold to GCC." * commit 'a20bb17e4c6095a77425418d7eb0c1ceb50d05f7': Move vold to GCC.
|
084f0b3dd58e128bcd855b8f98d458a334b6a54a |
|
13-Dec-2014 |
Dan Albert <danalbert@google.com> |
Move vold to GCC. It looks like clang might have a miscompile that is causing SIGBUS in `ioctl_init` when the device is encrypted. Move back to GCC until we can sort this out. Bug: 18736778 Change-Id: I21ae3b9d7d9ebff8679ecc1a828b7c59f27d0903
/system/vold/Android.mk
|
b7d35115dccc49275c48cc4665c146997b0168eb |
|
21-Nov-2014 |
Iliyan Malchev <malchev@google.com> |
resolved conflicts for merge of 87701e27 to lmp-mr1-dev-plus-aosp Change-Id: Ie873baff626fe786515497f2e81aa9db2329168d
|
87701e2755f039d6ea8c1510dcddf468ee947a62 |
|
18-Sep-2014 |
Ajay Dudani <adudani@codeaurora.org> |
Adding support of dm-req-crypt Currently Android provides disk encryption support using dm-crypt which is based on bios. dm-crypt uses 512 bytes packet size for crypto operations. While 512 bytes size packet is ok for SW based disk encryption, it is inefficient for HW based crypto engines. dm-req-crypt is similar to dm-crypt except it uses block requests rathe bios for crypto operations. block requests when unpacked carries data upto 512KB. Hence, HW based crypto engine can be used more efficiently. Also move create disk encryption key before framework start as HW based disk encryption creates key in secure side. Key creation can take sometime to create the key securely. If framework is started before creating the key, it is possible that framework requests service from secure side. Secure side can serve mostly one request at a time. Secure side may reject framework request if key creation request is still going on. This may cause problem in the system b/17475056 Enable hardware crypto for userdata encryption Change-Id: I5480ab72a37c02532218a18faaba598a824589fd Signed-off-by: Iliyan Malchev <malchev@google.com>
/system/vold/Android.mk
|
89bcc638ab24af7bee0ff3ccfa190a08b721f0a4 |
|
06-Nov-2014 |
Dan Albert <danalbert@google.com> |
am 36859212: Merge "Move vold to libc++." * commit '36859212614fd112e08dcf92065ee6db910769bb': Move vold to libc++.
|
a05cb41300b652e6125c6df42d4aa756101e6e72 |
|
06-Nov-2014 |
Dan Albert <danalbert@google.com> |
am 460a93a6: Merge "Move vold to clang so ASAN_ALL works." * commit '460a93a6d4d01bf0efa83acea0c84b4d43ab23c9': Move vold to clang so ASAN_ALL works.
|
66d84da21464b4490d7a45704e3ac3e0bb6eb313 |
|
05-Nov-2014 |
Dan Albert <danalbert@google.com> |
Move vold to libc++. Bug: 15193147 Change-Id: Ib868f1ed8145ca5cbfdb4cd60ed0c47a6182ac62
/system/vold/Android.mk
|
5325f569213ec3b04a7eebf2b02cc7ba46ea6e84 |
|
21-Oct-2014 |
Dan Albert <danalbert@google.com> |
Move vold to clang so ASAN_ALL works. ASAN_ALL uses ASAN for anything built with clang. Since some of vold's dependencies use clang, they will have unresolved ASAN symbols unless vold is also built with clang. There's no harm in just moving this project to clang. Change-Id: Ia6f412beb7bf092121bff2a5a980531636adcdb9
/system/vold/Android.mk
|
b4ef84d704cf099585b113db533548be415367c5 |
|
12-Sep-2014 |
Dan Albert <danalbert@google.com> |
resolved conflicts for merge of 2b2a0bec to lmp-dev-plus-aosp Change-Id: I224499833777ef80d85c1199f475f5ed1568d053
|
b2aaf3afa1dc48f28e87a30db3a741318a1f0024 |
|
12-Sep-2014 |
Dan Albert <danalbert@google.com> |
Remove makefile cruft. Don't manually include stlport, and don't use private bionic headers. Change-Id: I44dd212fdd5874e625890c548e9d7bf3a9c27912
/system/vold/Android.mk
|
e82df164e8128ec9df0072c4a4f3d92e79a0f5f4 |
|
16-Aug-2014 |
Daniel Rosenberg <drosen@google.com> |
Revert "Revert "cryptfs: Added support for f2fs fast encryption"" This reverts commit a70abc60091aed3c3eaf8bc8e1766e233c1c3a2f. Change-Id: Ic41d1924638586cf9b2297f91ed5417f3b0303c6
/system/vold/Android.mk
|
a70abc60091aed3c3eaf8bc8e1766e233c1c3a2f |
|
15-Aug-2014 |
Jim Miller <jaggies@google.com> |
Revert "cryptfs: Added support for f2fs fast encryption" This reverts commit 74c01201dec12b5de43ba0f20a2f38e835cd00af. Change-Id: Ib397a2b5812179ee2e2b68de5d718077563adc1c
/system/vold/Android.mk
|
74c01201dec12b5de43ba0f20a2f38e835cd00af |
|
13-Aug-2014 |
Daniel Rosenberg <drosen@google.com> |
cryptfs: Added support for f2fs fast encryption Bug: 15749466 Change-Id: I25452a05e1cbe90ac6603a89db9b720c7ab17e55 Signed-off-by: Daniel Rosenberg <drosen@google.com>
/system/vold/Android.mk
|
69f4ebd81e22f91a4571763842b5960d95d2758d |
|
14-Apr-2014 |
Paul Lawrence <paullawrence@google.com> |
Add keymaster support to cryptfs Use keymaster to wrap the cryptfs keys. Requires selinux change https://googleplex-android-review.git.corp.google.com/#/c/449411 Bug: 9467042 Change-Id: If25a01cb85ed193a271d61382de0560d85553b7e
/system/vold/Android.mk
|
87999173dd79dbcbd8cb97f5476007e867aaeeba |
|
20-Feb-2014 |
Paul Lawrence <paullawrence@google.com> |
Don't corrupt ssd when encrypting and power fails Stop encryption when battery is low, mark position, and continue on reboot. Note - support for multiple encrypted volumes removed as no devices seem to exist with an fstab that uses this feature. If you want support for such a device, contact me and we will re-add it with appropriate testing. Bug: 13284213 Change-Id: I1f7178e4f7dd8ea816cbc03ab5c4f6543e98acaa
/system/vold/Android.mk
|
4ff7225154ad14a01065b04c49d3ee179ffb6c10 |
|
11-Feb-2014 |
Nick Kralevich <nnk@google.com> |
am ca3593df: am 311edc8c: Merge "Add SELinux restorecon calls on ASEC containers." * commit 'ca3593df3d48cb4b51acf89e6df4872b922fd51d': Add SELinux restorecon calls on ASEC containers.
|
b9e3ba56cb4075f894a73b02ee70571456494ac1 |
|
04-Feb-2014 |
Robert Craig <rpcraig@tycho.ncsc.mil> |
Add SELinux restorecon calls on ASEC containers. This will allow fine-grained labeling of the contents of ASEC containers. Some of the contents need to be world readable and thus should be distinguishable in policy. Change-Id: Iefee74214d664acd262edecbb4f981d633ff96ce Signed-off-by: rpcraig <rpcraig@tycho.ncsc.mil>
/system/vold/Android.mk
|
699bfa411e089aafb697d1ed834f9b4d30c20b09 |
|
24-Jan-2014 |
Colin Cross <ccross@android.com> |
am 8328e815: Merge "vold: remove from include path" * commit '8328e8150f4e7b785785754f2d44794e7bab3577': vold: remove $(KERNEL_HEADERS) from include path
|
23b571bb5704b054d3f27b827246c5399942011e |
|
23-Jan-2014 |
Colin Cross <ccross@android.com> |
vold: remove $(KERNEL_HEADERS) from include path The kernel headers are already in the include path, and manually adding them again will break on a multiarch build, where the kernel headers may be different for each arch. Change-Id: Ifb11fa7bdff6b317c44258968244313b7039a9e1
/system/vold/Android.mk
|
0368cd4355466e4c9d6f502fed8a830cad36e25e |
|
18-Oct-2013 |
Jeff Sharkey <jsharkey@android.com> |
am f4a8c0b9: am 10939ac7: Merge "Extract UUID and label from inserted volumes." into klp-dev * commit 'f4a8c0b9f646cd9fa51fe3746bc8a00bb987124b': Extract UUID and label from inserted volumes.
|
0de365fc0af30ae48c2037e1057f2a813029a618 |
|
17-Oct-2013 |
Jeff Sharkey <jsharkey@android.com> |
Extract UUID and label from inserted volumes. Uses "blkid" tool to extract metadata from an inserted volume, and reports it up to the framework. This needs to happen in vold, since only the FUSE-wrapped volume is visible to userspace. Remove autorun sanitization, since FUSE takes care of this now. Bug: 11175082 Change-Id: Ie69b38011ad6011bfb50e40d4f35a29e02150c19
/system/vold/Android.mk
|
20bab9ffdcfd2b22c2d1ba897df98750ef195e7d |
|
17-Sep-2013 |
Nick Kralevich <nnk@google.com> |
vold: Remove obsolete xwarp support. This code appears to be unused. Delete it. This is essentially a revert of 2350c44ff39b4cb2940893964a05f778fc80a436. Change-Id: I20a525bb49f6ee8fec8c1ec22e01ad47d0c72960
/system/vold/Android.mk
|
5cf759a9c5281d4345c16902171201c07875e555 |
|
15-Aug-2013 |
Ken Sumrall <ksumrall@android.com> |
Use a shared library when building vold A quick fix to a broken build resulted in using a static library to build vold when a shared library was available. This fixes that. Bug: 10332978 Change-Id: I31c2b4a87c7b37647e71f7f3c93b0d64dd52da44
/system/vold/Android.mk
|
c49f0f2f9098bb2c6c43570868b4e090c14a7d23 |
|
07-Aug-2013 |
Geremy Condra <gcondra@google.com> |
Add libext4 and libmincrypt to vold. This accomodates verity changes, which now utilize these libraries. Change-Id: I1ff8c012e972e245cf3e4bc3a02bef0989165d75
/system/vold/Android.mk
|
c4c70f15bb8845b02f9ec1d624794757badd6933 |
|
14-Jun-2013 |
Kenny Root <kroot@google.com> |
Change key derivation to scrypt scrypt is a sequential memory-hard key derivation algorithm that makes it more difficult for adversaries to brute force passwords using specialized equipment. See http://www.tarsnap.com/scrypt/scrypt.pdf for more details of the algorithm. This adds support for initializing disk encryption using scrypt and upgrading from the previous PBKDF2 algorithm. Change-Id: I1d26db4eb9d27fea7310be3e49c8e6219e6d2c3b
/system/vold/Android.mk
|
9caab76c6b5aefdeeb1715a3695491ca793b8c18 |
|
12-Jun-2013 |
Ken Sumrall <ksumrall@android.com> |
vold: Add an optional wipe paramter to the volume format command The new wipe option to the vold format command will invoke BLKDISCARD on the partition before invoking newfs_msdos. This will be used whenever a full wipe of the device is wanted, as this is more secure than just doing newfs_msdos. Bug: 9392982 Change-Id: Ie106f1b9cc70abc61206006d1821641c27c7ccae
/system/vold/Android.mk
|
741a1699b15c628e36e5c26457bd703b11f1e515 |
|
10-Apr-2013 |
Ying Wang <wangying@google.com> |
Add liblog Bug: 8580410 Change-Id: I1a59b45c87cd901b3de52540ad7b670c42ffcbd5
/system/vold/Android.mk
|
b87937cdea689594a293979b30b13054e7455dee |
|
20-Mar-2013 |
Ken Sumrall <ksumrall@android.com> |
Vold: Add the fstrim subsystem to vold The fstrim subsystem implements the dotrim command, which goes through all the writable filesystems on the device, and invokes the FITRIM ioctl() on them. This marks all the unused blocks on the underlying flash device as unused, so the device performs better. Change-Id: I5fc8c2f60e0bc823f162d0f89580fb288ecb2160
/system/vold/Android.mk
|
2ba45aafc22ff2fed91f8cd191beb85578b7b9bc |
|
16-Jan-2013 |
Rom Lemarchand <romlem@google.com> |
Replace custom logwrapper implementation with liblogwrap Use liblogwrap to provide logwrapper functionality instead of using vold's own implementation. Change-Id: I76aac5aa72a1fdca043a63b86c6a9b54e7abec16
/system/vold/Android.mk
|
f0679f0da4970f04e1cb03f4cb0fcde29e3e7098 |
|
02-Apr-2012 |
Ken Sumrall <ksumrall@android.com> |
Changes to encryption to work with the new filesystem manager The new filesystem manager is in charge of mounting the block devices now, removing much of the knowledge from init.<device>.rc. This also let us clean up some init code dealing with encryption, so this change updates vold to work with that. More cleanup is possible, but the main goal of the filesystem manager was to enable e2fsck, not a full cleanup of encryption. Change-Id: I00ea80a923d14770ed8fdd190e8840be195f8514
/system/vold/Android.mk
|
344ca10856f3d3087a3288ce8f91ad83665d93fb |
|
04-Apr-2012 |
Kenny Root <kroot@google.com> |
Add in ext4 support for ASEC containers Now forward locked applications will be in ASEC containers both internal to the system and externally. This change adds support for putting applications in ext4-based ASECs. Change-Id: I8d6765b72dd2606e429c067b47a2dbcaa8bef37d
/system/vold/Android.mk
|
9713ed463917f193823c7c6ecf1c7cb2a1ae9fcc |
|
23-Feb-2012 |
Nick Kralevich <nnk@google.com> |
vold: add -Werror=format Stop format string bugs from creeping into root level processes. Change-Id: Ifa19ac0cacba76392040ab16cebe557b5b016706
/system/vold/Android.mk
|
ea89f53387dc6451f6e2afc82b4c4bede5be6dc6 |
|
12-Jul-2011 |
Jeff Brown <jeffbrown@google.com> |
Remove the simulator target from all makefiles. Bug: 5010576 Change-Id: I7e531101ae057fb059d7d56c99433c4d66e866dc
/system/vold/Android.mk
|
5d4c68e40700424b65a4331be75620706a0dd49c |
|
31-Jan-2011 |
Ken Sumrall <ksumrall@android.com> |
Have vold grab a partial wakelock when encrypting The Progress bar UI grabs a full wakelock when encrypting, but we've seen a case where it looks like the progress bar UI crashes, and the wakelock is lost, and then all hell breaks loose. The enablecrypto command has a lot of work to do, and it will take some time, so it should grab a wakelock to ensure it can finish without being interrupted and put to sleep. It grabs a partial wake lock, as it doesn't need the screen to be on to do its work. If the UI wants to keep it on, it should also grab a full wakelock, which it does. If the UI crashes, the screen may turn off, but the encryption will keep going, and vold will reboot the device when it's done. Change-Id: I51d3a72b8c77383044a3facb1604c1ee510733ae
/system/vold/Android.mk
|
3ed8236de11a1be8b45d4c37b2208682f5e97c72 |
|
29-Jan-2011 |
Ken Sumrall <ksumrall@android.com> |
Don't try to encrypt in place a filesystem that is too large and return proper errors If the already existing filesystem encompasses the entire /data partition and does not leave the last 16 Kbytes for the crypto footer, refuse to do encrypt in place and return an error. This is only an issue for folks with early development systems trying to encrypt an old /data. This should not be seen in released devices. Also, if there is an error, try to report back to the UI what the error was so it can deal with it. Change-Id: If66781a4fe03034c96c3dd12075240deb8663db0
/system/vold/Android.mk
|
8f869aa1bc685b505c58e97b4e11a9c7491a16f9 |
|
03-Dec-2010 |
Ken Sumrall <ksumrall@android.com> |
Support for encrypting /data on Stingray. There are still a few hacks and performance issues related to shutting down the framework in this code, but it is functional and tested. Without the UI changes, it requires cryptic adb shell commands to enable, which I shall not utter here. Change-Id: I0b8f90afd707e17fbdb0373d156236946633cf8b
/system/vold/Android.mk
|
acc9e7dcca8978fc809fa5b4d9b819c515a980ff |
|
19-Jun-2010 |
Kenny Root <kroot@google.com> |
Change ASCII conversion for hash and add tests Hash was printed using snprintf(), but we can just write yet another hex conversion utility! Change-Id: I04f1992deaf5bf1b3e2751c8f07072f8ed6660e9
/system/vold/Android.mk
|
7b18a7b36f61574c0f0bdde0a7409dc36676fa12 |
|
15-Mar-2010 |
Kenny Root <kroot@google.com> |
vold: Convert to use OpenSSL MD5 API Change-Id: I9b84370fa9a98464c211ebe8983be8dbe9dd7ccd
/system/vold/Android.mk
|
befd59c152835b815665ec3c5e453b55e70d5f0b |
|
15-Mar-2010 |
San Mehat <san@google.com> |
vold: remove some dead code Change-Id: Iaeb5d3334ec22ed31da9734bb8d7cd17e6a40eaf Signed-off-by: San Mehat <san@google.com>
/system/vold/Android.mk
|
d9a4e358614a0c5f60cc76c0636ee4bb02004a32 |
|
12-Mar-2010 |
San Mehat <san@google.com> |
vold: Bugfixes & cleanups - Fix issue where container-names > 64 bytes were getting truncated in the kernel. lo_name is only 64 bytes in length, so we now hash the container id via md5 - Add 'dump' command to dump loop and devicemapper status - Add 'debug' command to enable more detailed logging at runtime - Log vold IPC arguments (minus encryption keys) - Fix premature return from Loop::lookupActive() and friends Change-Id: I0e833261a445ce9dc1a8187e5501d27daba1ca76 Signed-off-by: San Mehat <san@google.com>
/system/vold/Android.mk
|
2a5b8ce09b8836a8463ef9beaaff865c36ca5e6a |
|
10-Mar-2010 |
San Mehat <san@google.com> |
vold: Switch to using libdiskconfig for partition setup. Also handles an issue where NPARTS=0 on a disk change uevent Change-Id: I77c56f177dc65df91468bbd7d5fe1889db414d7a Signed-off-by: San Mehat <san@google.com>
/system/vold/Android.mk
|
2350c44ff39b4cb2940893964a05f778fc80a436 |
|
02-Mar-2010 |
San Mehat <san@google.com> |
vold: Add support for xwarp Signed-off-by: San Mehat <san@google.com>
/system/vold/Android.mk
|
8f2875b29780312f4edda3d831cc8a99e1648dd5 |
|
18-Feb-2010 |
San Mehat <san@google.com> |
vold: Clean up asec command response and add support for 'StorageBusy' Signed-off-by: San Mehat <san@google.com>
/system/vold/Android.mk
|
586536c60b773e3517531ad8a6cb0de6722c67fc |
|
17-Feb-2010 |
San Mehat <san@google.com> |
vold: Refactor Processkiller and add command to return users of a mount point Signed-off-by: San Mehat <san@google.com>
/system/vold/Android.mk
|
b78a32c1d5eeb243bdac0eaf18effb1897f1ee67 |
|
10-Jan-2010 |
San Mehat <san@google.com> |
vold: Add encrypted ASEC support via devmapper - Supports up to 4096 containers - Keys are now implemented - specifying a key of 'none' means no encryption. Otherwise, the key must be a string of 32 characters Signed-off-by: San Mehat <san@google.com>
/system/vold/Android.mk
|
1bc9558895dbb38b2103345ab90016f318c37bff |
|
07-Jan-2010 |
Doug Kwan <dougkwan@google.com> |
Add missing library used by the main executable in linker options. Currently the library is implicit added via inter-library dependency.
/system/vold/Android.mk
|
a19b250bd273455933ca3502cf2c2e0a803aff77 |
|
06-Jan-2010 |
San Mehat <san@google.com> |
vold2: Initial support for Android Secure External Caches Signed-off-by: San Mehat <san@google.com>
/system/vold/Android.mk
|
bf04185c88161f13118b9975cdff7967d49a4fa0 |
|
04-Jan-2010 |
San Mehat <san@google.com> |
vold2: Refactor FAT support into a separate class Signed-off-by: San Mehat <san@google.com>
/system/vold/Android.mk
|
11f78c181e6afe024427be2b7a530280cd4b64e1 |
|
03-Jan-2010 |
San Mehat <san@google.com> |
vold2: Don't build for simulator Signed-off-by: San Mehat <san@google.com>
/system/vold/Android.mk
|
a1c2ca1c70e52cccb7e63f4be8d7127b22afc0e5 |
|
21-Dec-2009 |
San Mehat <san@google.com> |
vold2: Enable in build Signed-off-by: San Mehat <san@google.com>
/system/vold/Android.mk
|
a2677e4ad01f250b0765f04adf0acfa6627efc98 |
|
13-Dec-2009 |
San Mehat <san@google.com> |
vold2: Get mounting/unmounting/formatting/sharing working Signed-off-by: San Mehat <san@google.com>
/system/vold/Android.mk
|
49e2bce5b74129c26a35e25d4693cbfe98c4688e |
|
13-Oct-2009 |
San Mehat <san@android.com> |
vold2: Wire up more of the mount function Signed-off-by: San Mehat <san@android.com>
/system/vold/Android.mk
|
ae10b91044bf76b40b77d81c169e48e0bbdf6d75 |
|
12-Oct-2009 |
San Mehat <san@android.com> |
vold2: Rename DeviceVolume -> DirectVolume Signed-off-by: San Mehat <san@android.com>
/system/vold/Android.mk
|
f1b736bc5605e92e917ab27f5abf3ba839be2270 |
|
11-Oct-2009 |
San Mehat <san@android.com> |
system: vold2: Initial skeleton for vold2. Let there be light. Signed-off-by: San Mehat <san@android.com>
/system/vold/Android.mk
|