History log of /system/vold/Android.mk
Revision Date Author Comments (<<< Hide modified files) (Show modified files >>>)
e2e2d308df2da26838de32852318bc2cb690d052 01-Aug-2017 Pavel Grafov <pgrafov@google.com> Zero memory used for encryuption keys.

std::vector with custom zeroing allocator is used instead of
std::string for data that can contain encryption keys.

Bug: 64201177
Test: manually created a managed profile, changed it's credentials
Test: manually upgraded a phone with profile from O to MR1.
Change-Id: Ic31877049f69eba9f8ea64fd99acaaca5a01d3dd
/system/vold/Android.mk
d794526962c385af307597f27d26aeb43703e6a1 27-Jun-2017 Jeff Sharkey <jsharkey@android.com> Fully switch to mke2fs; set policies everywhere.

Older make_ext4fs doesn't support enabling quotas, so switch everyone
over to using mke2fs for adoptable storage.

Remove UUID check so that we start setting ext4-crypto policies on
adoptable storage devices; a future change will handle the actual
key management.

Bug: 30230655, 36757864
Test: cts-tradefed run commandAndExit cts-dev --abi armeabi-v7a -m CtsAppSecurityHostTestCases -t android.appsecurity.cts.AdoptableHostTest
Change-Id: I021f85b1be8431044c239521c37be96534682746
/system/vold/Android.mk
03f89d3d9540c7f5fbc609d5bbcd99e444a06503 16-Jun-2017 Paul Crowley <paulcrowley@google.com> Move functions useful for crypto test into their own file

More refactoring in advance of work on bug.

Bug: 36029169
Test: compiles.
Change-Id: Ic4cdd4761e4c2b11a3ddca5c3bbc4d5e42fac9d4
/system/vold/Android.mk
c3bda18bda525ff8d43be0d38747350f7991e247 10-May-2017 Elliott Hughes <enh@google.com> Switch to libkeyutils.

Bug: http://b/37991155
Test: builds+boots
Change-Id: I33a3ba0d59ffd504093dc94517815c1196e95e2b
/system/vold/Android.mk
d5759811ffe0eef50612dbd32166a08f0b32cfdc 02-Jun-2016 Paul Crowley <paulcrowley@google.com> Add support for metadata encryption

Support encrypting metadata in /userdata using the dm-default-key
driver with a key in the /metadata partition.

Bug: 29189559
Test: Angler & Marlin build and boot
Change-Id: I716b117508d4bb4f6a4039293acb848cbc60f67b
/system/vold/Android.mk
f71ace310eec3e39f0efefd51f62c9ccf4180f48 02-Jun-2016 Paul Crowley <paulcrowley@google.com> Refactor to lay the groundwork for metadata encryption

Bug: 26778031
Test: Angler, Marlin build and boot
Change-Id: Ic136dfe6195a650f7db76d3489f36da6a1929dc5
/system/vold/Android.mk
32ebb739cb6c27a122d98b1bdfe1c1a5814b2ed3 28-Mar-2017 Jeff Sharkey <jsharkey@android.com> Enable clang-tidy for security sensitive domain.

Start with clang-analyzer-security* and cert-*, but disable two
specific errors:

-- cert-err34-c, which checks for atoi(); heavily triggered by
CommandListener, but will disappear when we move to Binder.
-- cert-err58-cpp, which checks for exceptions before main(); it's
a "Low" severity issue, and filed 36656327 to track cleanup.

Fix all other triggered errors along the way.

Test: builds, boots
Bug: 36655947
Change-Id: I1391693fb521ed39700e25ab6b16bc741293bb79
/system/vold/Android.mk
4375f1be4ccdbf78ef4c5ab926d3316503a7b146 25-Feb-2017 Wei Wang <wvw@google.com> Change to use new WaitForProperty API

Change to use WaitForProperty API to wait for vold.post_fs_data_done
Also change cryptfs to C++

Bug: 35425974
Test: mma, marlin/angler boot

Change-Id: Id821f2035788fcc91909f296c83c871c67571de3
/system/vold/Android.mk
fec6ba5c8cc3369b43ad38b98ac1fd030f0e2e73 15-Feb-2017 Isaac Chen <ycchen@google.com> Merge "Removed HW encryption build flags and related code." am: bf8518056d am: 95dc636942 am: 730c6196a2
am: 2f88e97172

Change-Id: I2decffa399cbc941b93ba251957f2a9168945d29
dff70b4e3ed895d8af3ab0192fe3cb4a2f740cdb 14-Feb-2017 Isaac Chen <ycchen@google.com> Removed HW encryption build flags and related code.

TARGET_HW_DISK_ENCRYPTION and TARGET_CRYPTFS_HW_PATH build flags
and related code in cryptfs.c are removed since it doesn't match
the driver in current tree.

To enable HW encryption, the driver needs to be hidlized.

Bug: 34268168

Test: compile
Change-Id: I507a0e2908b3c407c565e44873b82c94a8305de6
/system/vold/Android.mk
7c289b44cdb4a29267a83db741e21c782bb657cb 23-Jan-2017 TreeHugger Robot <treehugger-gerrit@google.com> Merge "Port to binder based keymaster hal"
a4792eb2298a1865a4744ac3ecfa7b70c657a182 21-Jan-2017 bowgotsai <bowgotsai@google.com> Merge "Include libavb in static libraries" am: d65506217d am: 967f9715c3 am: ab9218c64f
am: efb59f9971

Change-Id: Ia64f945476f38bbe5047c5a62d4e2ff08e84eaec
8e537b80028d11ac1f3810e959636028e77b2025 26-Oct-2016 Janis Danisevskis <jdanis@google.com> Port to binder based keymaster hal

Bug: 32020919
Change-Id: If45ece76fdaf4d2c80eddc537e429633e4d42f9d
/system/vold/Android.mk
58bdac8d250ba85c859d34ce249ad472bcb64c7b 06-Jan-2017 bowgotsai <bowgotsai@google.com> Include libavb in static libraries

Bug: 31264231
Test: compile
Change-Id: I1d84f7aa67a0ed31f2b6400cf1c9567bf503295a
/system/vold/Android.mk
4315c6a0c34cb0200def12a05ad5c8c9d4a37d44 06-Dec-2016 Paul Crowley <paulcrowley@google.com> Enable building and running the vold_tests module as part of a
standard build; make it use only static libraries as per documented
limitations of APCT.

Bug: 33384925
Test: This is a test.
Change-Id: I794adbfa3376795120cfbca1e9322093960009b5
/system/vold/Android.mk
6218c51e4b4b31814159b7156fb37a93637529c3 03-Dec-2016 Adrien Schildknecht <adriens@google.com> Manually merge commit 'b406ffa' into stage-aosp-master am: 04c55e6ed7 am: 93722ead06
am: 43100e580f

Change-Id: I8a74fd730f0aa5a1f94c04c12286e96ac299b463
e0f409ca32b4bb434c30557a2ed28cf1957098c0 22-Nov-2016 Adrien Schildknecht <adriens@google.com> Add support for creating ext4 images with mke2fs

We are investigating replacing make_ext4fs with the upstream tool mke2fs.
See b/23686092 for more informations.

To mitigate the trouble that may arise if the new tool behave differently
compared to the old one, there will be a transition period where both mke2fs
and make_ext4fs will be supported.

This patch does 3 things:
- add the necessary code to use mke2fs to format an ext4 partition;
- add a dependency to the binary used by vold.

Test: m -j32 with TARGET_USES_MKE2FS={,false,true}
TARGET_USERIMAGES_USE_EXT4={,true}

Change-Id: I89222642fe1d11a035155c8224b84b2e3719938b
/system/vold/Android.mk
889ed48e5f062b8bce85fcec2b01ee0bff77c02e 24-Jun-2016 Yabin Cui <yabinc@google.com> Use libbootloader_message.

Bug: 29582118

Change-Id: I8de2cfbc62908011dba2ab86d17f977ebcfadac0
(cherry picked from commit 1fb5966fbb4e05d15cb10ff371137b4ef9dff584)
/system/vold/Android.mk
5a95ddbacfe4ec74b6b90dd7a9bc76d27b173758 06-Oct-2016 Tao Bao <tbao@google.com> Update the header path for ext4_utils.

Test: mmma system/vold

Change-Id: I805b8874b05b8043390c2cd3c143cc469913c067
(cherry picked from commit 989fec27690758ad1e6c521713f1a88c50c9c857)
/system/vold/Android.mk
989fec27690758ad1e6c521713f1a88c50c9c857 06-Oct-2016 Tao Bao <tbao@google.com> Update the header path for ext4_utils.

Test: mmma system/vold

Change-Id: I805b8874b05b8043390c2cd3c143cc469913c067
/system/vold/Android.mk
dff8c727c15cbe795e518e9116dfa271e67755b5 16-May-2016 Paul Crowley <paulcrowley@google.com> Support Keymaster 2 configuration and key upgrading

Bug: 27212248
Change-Id: I96bd9a442f4f535ba6ea44c9e81bcc1fee0ec471
/system/vold/Android.mk
951de915a3e402a54713ab37a4f709dfceebd45b 01-Jul-2016 Yabin Cui <yabinc@google.com> Use libbootloader_message.
am: 1fb5966fbb

Change-Id: Ib97b3be116b704188082a81626a9b5ecdde56726
1fb5966fbb4e05d15cb10ff371137b4ef9dff584 24-Jun-2016 Yabin Cui <yabinc@google.com> Use libbootloader_message.

Bug: 29582118

Change-Id: I8de2cfbc62908011dba2ab86d17f977ebcfadac0
/system/vold/Android.mk
ccd9dd53f8a55b296eb0671acefc9f0163fd83b4 13-Apr-2016 Elliott Hughes <enh@google.com> resolve merge conflicts of 81fd991 to nyc-dev-plus-aosp

Change-Id: Iabda2c9ad05ed4aa0a078c5da40b887f36dd9328
ffa2e0992118c6a2dbafc5d69bb0da6bd5e2f5c7 07-Apr-2016 Yabin Cui <yabinc@google.com> vold: write bootloader message directly.

Bug: 27176738
Change-Id: I09bfe777e383325809d7ecc2dcb9129fe234053f
/system/vold/Android.mk
dc8032396916db58a136d73bf5e587419507db4e 31-Mar-2016 Mattias Nissler <mnissler@google.com> Switch to BoringSSL crypto.

This replaces the libmincrypt dependency with libcrypto_utils, which
is needed due to libfec and fs_mgr switching to BoringSSL.

Change-Id: I4f6f4d8cc5e200679331a9bcdf2cc3bad1082dd6
/system/vold/Android.mk
01f86a521dcec084fe8b2810367c9ecc55d92185 13-Feb-2016 Dimitry Ivanov <dimitry@google.com> Add missing liblog dependency

Bug: http://b/27171986
Change-Id: I03c5f9375ca46a81250ac00493a4f3f1eebf3156
/system/vold/Android.mk
63c18d3ba9179ee0e678564e12aa845d9a6c3ec8 10-Feb-2016 Paul Crowley <paulcrowley@google.com> Add scrypt-based password stretching.

Bug: 27056334
Change-Id: Ifa7f776c21c439f89dad7836175fbd045e1c603e
/system/vold/Android.mk
47695b29af0467dd8e18f5534e3b62e39326d7e1 02-Feb-2016 Jeff Sharkey <jsharkey@android.com> Allow callers to prepare CE/DE user storage.

Give callers the option of preparing CE and/or DE storage. The
framework will only prepare CE storage after the CE keys have been
unlocked for that user.

When init is calling enablecrypto, kick off the work in a thread so
that we can make other calls back into vold without causing
deadlock. Leaves blocking call intact for framework callers.

Clean up 'vdc' tool to send useful transaction numbers, and
actually watch for the matching result to come back. This fixes
race conditions when there are multiple 'vdc' callers.

Also add other system and misc directories to match spec.

Bug: 25796509
Change-Id: Ie4f853db6e387916b845d2b5fb92925d743b063d
/system/vold/Android.mk
75fc83bac8ad3aba3bbb65092974ab3a16822210 02-Feb-2016 Jeff Vander Stoep <jeffv@google.com> resolve merge conflicts of 2b6f9ce823 to master.

Change-Id: I69f36f560334b11b099f2eb15999603dd2469d4f
df725758628a0a250c82a9071af6a06a89e474fd 30-Jan-2016 Jeff Vander Stoep <jeffv@google.com> cryptfs: run e2fsck/fsck.f2fs in fsck domain

e2fsck and fsck.f2fs must run in the fsck domain. Add call to
setexeccon() to tell selinux to run in the fsck domain on exec.

Addresses:
avc: denied { execute_no_trans } for path="/system/bin/e2fsck" dev="mmcblk0p41" ino=241 scontext=u:r:vold:s0 tcontext=u:object_r:fsck_exec:s0 tclass=file

Bug: 26872236
Change-Id: Ib2a583aeefc667f8aa67532e0ac0ff9619b65461
/system/vold/Android.mk
13ffd8ef7a02a1b4b4d9a74f45d4a5bb6b814313 27-Jan-2016 Paul Crowley <paulcrowley@google.com> Improvements to the key storage module

The key storage module didn't comply with Android coding standards
and had room for improvemnet in a few other ways, so have cleaned up.

Change-Id: I260ccff316423169cf887e538113b5ea400892f2
/system/vold/Android.mk
1ef255816c50e462acc23383a9ff747c5f55c4ff 21-Jan-2016 Paul Crowley <paulcrowley@google.com> Use a keymaster-based key storage module

Instead of writing raw keys, encrypt the keys with keymaster. This
paves the way to protecting them with auth tokens and passwords later.
In addition, fold in the hash of a 16k file into their encryption, to
ensure secure deletion works properly.

Now even C++ier!

Bug: 22502684
Bug: 22950892
Change-Id: If70f139e342373533c42d5a298444b8438428322
/system/vold/Android.mk
8bb8fcfb4f502ba0ed68d8169dfaca89ff85bab9 11-Jan-2016 Paul Crowley <paulcrowley@google.com> Use android-base logging not cutils in secdiscard

Much nicer C++ style logging, but the main reason is to clean up
AutoCloseFD.h so I don't have to use cutils to use it.

Change-Id: I7a7f227508418046eecce6c89f813bd8854f448a
/system/vold/Android.mk
f0500a08230f068a1cf55e4de3cfc389d51f8669 02-Oct-2015 Sami Tolvanen <samitolvanen@google.com> am 0331d4ae: am 685dfdd3: Merge "Error correction: Add libfec dependencies for vold"

* commit '0331d4ae3843f682e98bfa1aba0f8da7fbd9beb0':
Error correction: Add libfec dependencies for vold
0331d4ae3843f682e98bfa1aba0f8da7fbd9beb0 02-Oct-2015 Sami Tolvanen <samitolvanen@google.com> am 685dfdd3: Merge "Error correction: Add libfec dependencies for vold"

* commit '685dfdd33590ef8a93627015c434fea54b8f1b4d':
Error correction: Add libfec dependencies for vold
efe67cd25d3a2627f28d62bd9134e8853149d6ef 01-Jun-2015 Sami Tolvanen <samitolvanen@google.com> Error correction: Add libfec dependencies for vold

Vold requires libfec and related dependencies due to fs_mgr_mount_all.

Bug: 21893453
Change-Id: If59df0c5fd3395d4aac97dd8119b7c70c0fa5d4d
/system/vold/Android.mk
10b02df820ece261b621a1f46838995249a1082c 21-Aug-2015 Tom Cherry <tomcherry@google.com> am 218f48d6: Merge "bundle init.rc contents with its service"

* commit '218f48d6c55a7ee5115a7a8fc4248d33ea01811f':
bundle init.rc contents with its service
685439bbc7ef958a3472465ebdabf2b997889e76 21-Aug-2015 Tom Cherry <tomcherry@google.com> am 218f48d6: Merge "bundle init.rc contents with its service"

* commit '218f48d6c55a7ee5115a7a8fc4248d33ea01811f':
bundle init.rc contents with its service
a285984ae404b89e87a1f97486bf8f9c8a0fab0f 14-Aug-2015 Tom Cherry <tomcherry@google.com> bundle init.rc contents with its service

Bug: 23186545
Change-Id: I82d8b6dc54ebe32ceb1ed997aaab3701ee7b6c4a
/system/vold/Android.mk
f4000e480d5da9df8c0205b28160e60a0b47c77d 14-Jul-2015 Paul Crowley <paulcrowley@google.com> am 5bd0daf9: Add tool for scrubbing files with BLKSECDISCARD.

* commit '5bd0daf926ea8096dc091d7b99ff9e56cc5746aa':
Add tool for scrubbing files with BLKSECDISCARD.
5bd0daf926ea8096dc091d7b99ff9e56cc5746aa 19-May-2015 Paul Crowley <paulcrowley@google.com> Add tool for scrubbing files with BLKSECDISCARD.

Bug: 19706593

(based on work in commit 8d0cd7ffd903a753c6bb5c6f33987a7a66621cef)

Change-Id: I9699275a63f2d0a110435bd4a725d7dfcce4ed90
/system/vold/Android.mk
3ff337db56fbe4ac84eb9f3907ac4a1029beecb9 02-Jul-2015 Jeff Sharkey <jsharkey@android.com> am c86ab6f5: Trim both internal and adopted private storage.

* commit 'c86ab6f538bec63638c168d6c843fe7cf73add3b':
Trim both internal and adopted private storage.
c86ab6f538bec63638c168d6c843fe7cf73add3b 26-Jun-2015 Jeff Sharkey <jsharkey@android.com> Trim both internal and adopted private storage.

Refactor fstrim code to be encapsulated in unique task object, and
give it option of benchmarking when finished. Trimming now includes
both storage from fstab and adopted private volumes. Cleaner timing
stats are logged for each unique volume.

Add wakelock during ongoing async move tasks. Push disk sysfs path
to framework so it can parse any SD card registers as desired.

Bug: 21831325
Change-Id: I76577685f5cae4929c251ad314ffdaeb5eb1c8bf
/system/vold/Android.mk
d6a77b518ca951d8b527f97d3e3732756c641a74 09-Jun-2015 Jeff Sharkey <jsharkey@android.com> am d0640f63: Add f2fs support for private volumes.

* commit 'd0640f6358041f7e2657167560b357078db73526':
Add f2fs support for private volumes.
d0640f6358041f7e2657167560b357078db73526 22-May-2015 Jeff Sharkey <jsharkey@android.com> Add f2fs support for private volumes.

When formatting volumes, pass along fsType string which can be "auto"
to let the volume select the best choice. For now, private volumes
assume that MMC devices (like SD cards) are best off using f2fs when
both kernel support and tools are present, otherwise fall back to
ext4. Use blkid when mounting to pick the right set of tools.

Move filesystem utility methods into namespaces and place in separate
directory to be more organized.

Bug: 20275581
Change-Id: Id5f82d8672dda2e9f68c35b075f28232b0b55ed4
/system/vold/Android.mk
5c18a6757910d0f2689e99f51b2dc283881178b3 05-Jun-2015 Paul Lawrence <paullawrence@google.com> Merge commit 'd0b4295c' into manualmerge

Change-Id: I6d7178edebf50663fa9622b539c8101627a84385
d0b4295ccc07d0cd715ade415c8c0d7d6945880e 03-Jun-2015 Paul Lawrence <paullawrence@google.com> Move crypt commands to a different listener in vold

In order to prevent this bug from happening, we must allow vold cryptfs
commands to complete while a long running mount is underway.

While waiting for vold to be changed to a binder interface, we will simply
create two listeners, one for cryptfs and one for everything else.

Bug: 19197175
Change-Id: If74142aa81abd58f718a9de6c9e387f6ea442754
/system/vold/Android.mk
731a7a242df6cc3441ac82b4f9521546fac5ac2d 29-Apr-2015 Paul Lawrence <paullawrence@google.com> DO NOT MERGE Securely encrypt the master key

(cherry-picked from commit 707fd6c7cccc31c0ab0ec1a6ac8b6077c632fc35)

Move all key management into vold
Reuse vold's existing key management through the crypto footer
to manage the device wide keys.

Use ro.crypto.type flag to determine crypto type, which prevents
any issues when running in block encrypted mode, as well as speeding
up boot in block or no encryption.

This is one of four changes to enable this functionality:
https://android-review.googlesource.com/#/c/148586/
https://android-review.googlesource.com/#/c/148604/
https://android-review.googlesource.com/#/c/148606/
https://android-review.googlesource.com/#/c/148607/

Bug: 18151196

Change-Id: I3c68691717a61b5e1df76423ca0c02baff0dab98
/system/vold/Android.mk
ddd4da1af61d8f31b58eb2480dde5f6f30c869b8 16-May-2015 Jeff Sharkey <jsharkey@android.com> am 5a6bfca1: Initial pass at storage benchmarks.

* commit '5a6bfca1638760b87cf64c5ffb48ff3557cc0563':
Initial pass at storage benchmarks.
5a6bfca1638760b87cf64c5ffb48ff3557cc0563 15-May-2015 Jeff Sharkey <jsharkey@android.com> Initial pass at storage benchmarks.

Now that we're offering to store private app data on adopted storage
devices, the performance of those devices is much more important to
overall user experience.

To help set user expectations, this change offers to execute a
real-world benchmark on a storage device, returning a metric that can
be used to compare internal and external storage. The benchmark is
generated from the strace-instrumented storage access patterns of
typical apps.

A typical device completes the benchmark in under two seconds on
internal storage, a UHS-3 SD card is even faster (!), but a very slow
Class 4 SD card takes about 30 seconds to complete, giving us a clear
signal.

The measured benchmark numbers are logged along with information
about the storage device, such as manufacturer, model, etc. Card
serial numbers are scrubbed from output.

Bug: 21172095
Change-Id: I9b2713dafdfdfcf5d97bf1bc21841f39409a7e54
/system/vold/Android.mk
e05aacfec62c6535731347fe75223f953513cc5f 13-May-2015 Kenny Root <kroot@google.com> resolved conflicts for merge of 9df68a13 to mnc-dev-plus-aosp

Change-Id: I5c72c27ec055195d84c58d0699b46d3942c29dde
75a5202d9f65747edabb1dd0ebd50a779d4142c2 06-May-2015 Paul Crowley <paulcrowley@google.com> Add vold commands for setting up per-user encrypted user
directories

Bug: 19704432
Change-Id: I15980eed8e4960ca270cf0f8db4e480a8c2ca832
/system/vold/Android.mk
4f817d1bd2c6e09bb6362f771c26526e8c1971c3 07-May-2015 Paul Crowley <paulcrowley@google.com> am 42696d97: Merge "Make vdc a C++ file as a base for further improvement."

* commit '42696d97ce138fa5e7a1380b3841250549acb615':
Make vdc a C++ file as a base for further improvement.
fde9cd8c82f2557f9c8c9ac34a2a8f666d43cf0d 06-May-2015 Paul Crowley <paulcrowley@google.com> Make vdc a C++ file as a base for further improvement.

Bug: 19704432
Change-Id: I784e8a91d3b0f4d6cd0dc668e9e55d0290f768e8
/system/vold/Android.mk
e225260184b999c54878b1e254f7fe774429fd12 29-Apr-2015 Paul Lawrence <paullawrence@google.com> Merge commit 'c3e4cc29' into manualmerge

Change-Id: I1f6feaf743e0b9a62fe212af3cd9dd16abefeb00
707fd6c7cccc31c0ab0ec1a6ac8b6077c632fc35 29-Apr-2015 Paul Lawrence <paullawrence@google.com> Securely encrypt the master key

Move all key management into vold
Reuse vold's existing key management through the crypto footer
to manage the device wide keys.

Use ro.crypto.type flag to determine crypto type, which prevents
any issues when running in block encrypted mode, as well as speeding
up boot in block or no encryption.

This is one of four changes to enable this functionality:
https://android-review.googlesource.com/#/c/148586/
https://android-review.googlesource.com/#/c/148604/
https://android-review.googlesource.com/#/c/148606/
https://android-review.googlesource.com/#/c/148607/

Bug: 18151196

Change-Id: I3c68691717a61b5e1df76423ca0c02baff0dab98
/system/vold/Android.mk
f7de12b2640f7433d22220e187c02007026fc4e4 28-Apr-2015 Paul Lawrence <paullawrence@google.com> resolved conflicts for merge of bf9dcad7 to mnc-dev-plus-aosp

Change-Id: Ic0d4ed7e6c83ad857e2a4a198d069b73fcf399e6
beadcb6ec038b8e3b96cfa3b3b3e05005785b282 28-Apr-2015 Paul Lawrence <paullawrence@google.com> Revert "Securely encrypt the master key"

This reverts commit 7053e9cd5ebbbb783bf4140381090e6bd0caa740.

Change-Id: I77ed4dbdff8643c80629d2126cb29f85c24c7b43
/system/vold/Android.mk
74e85f18722ae6b6cf562352a3c30e49ae388e9d 27-Apr-2015 Paul Lawrence <paullawrence@google.com> resolved conflicts for merge of 86138731 to mnc-dev-plus-aosp

Change-Id: I89203aa1665bb42f9a98fd8b94b933e8406dde02
7053e9cd5ebbbb783bf4140381090e6bd0caa740 26-Mar-2015 Paul Lawrence <paullawrence@google.com> Securely encrypt the master key

Move all key management into vold
Reuse vold's existing key management through the crypto footer
to manage the device wide keys

This is one of four changes to enable this functionality:
https://android-review.googlesource.com/#/c/144586/
https://android-review.googlesource.com/#/c/144663/
https://android-review.googlesource.com/#/c/144672/
https://android-review.googlesource.com/#/c/144673/

Bug: 18151196
Change-Id: I9a162b90afe5f46a4ff15b3878e2ab503795425e
/system/vold/Android.mk
1d6fbcc389ecb9f418076e8ab5f4c93a5d911de9 25-Apr-2015 Jeff Sharkey <jsharkey@android.com> Migrate primary external storage.

When requested, kick off a thread that will migrate storage contents
between two locations. This is performed in several steps that
also interact with the framework:

1. Take old and new volumes offline during migration
2. Wipe new location clean (10% of progress)
3. Copy files from old to new (60% of progress)
4. Inform framework that move was successful so it can persist
5. Wipe old location clean (15% of progress)

Derives a hacky progress estimate by using a rough proxy of free
disk space changes while a cp/rm is taking place.

Add new internal path for direct access to volumes to bypass any
FUSE emulation overhead, and send it to framework. Remove mutex
around various exec calls since setexeccon() is already per-thread.

Bug: 19993667
Change-Id: Ibcb4f6fe0126d05b2365f316f53e71dc3e79a2b8
/system/vold/Android.mk
389672737673f9c695ac70464a0f8656908d20fd 07-Apr-2015 Mohamad Ayyash <mkayyash@google.com> am 959de99a: am f8c905e0: Merge "Add dependency on libsquashfs_utils due to fs_mgr dependency"

* commit '959de99af47dec9ed7a3499ce57e4097be399d7d':
Add dependency on libsquashfs_utils due to fs_mgr dependency
c489d7f4e706bafbe13e430ec807ab12ce7e7803 07-Apr-2015 Mohamad Ayyash <mkayyash@google.com> Add dependency on libsquashfs_utils due to fs_mgr dependency

Change-Id: I894d18c2086a6532194f478853a9837eb4b6fc09
Signed-off-by: Mohamad Ayyash <mkayyash@google.com>
/system/vold/Android.mk
9f18fe7807a4e4089778243dbbd08d154ec15540 02-Apr-2015 Jeff Sharkey <jsharkey@android.com> Remove unused code.

Bug: 19993667
Change-Id: I1f6519655c5a366eca25e2329e1bf95d81b3bf8c
/system/vold/Android.mk
9c48498f4529f623650c56d03e63324c8d813032 31-Mar-2015 Jeff Sharkey <jsharkey@android.com> Support for private (adopted) volumes.

This adds support for private volumes which is just a filesystem
wrapped in a dm-crypt layer. For now we're using the exact same
configuration as internal encryption (aes-cbc-essiv:sha256), but we
don't store any key material on the removable media. Instead, we
store the key on internal storage, and use the GPT partition GUID
to identify which key should be used.

This means that private external storage is effectively as secure as
the internal storage of the device. That is, if the internal storage
is encrypted, then our external storage key is also encrypted.

When partitioning disks, we now support a "private" mode which has
a PrivateVolume partition, and a currently unused 16MB metadata
partition reserved for future use. It also supports a "mixed" mode
which creates both a PublicVolume and PrivateVolume on the same
disk. Mixed mode is currently experimental.

For now, just add ext4 support to PrivateVolume; we'll look at f2fs
in a future change. Add VolumeBase lifecycle for setting up crypto
mappings, and extract blkid logic into shared method. Sprinkle some
more "static" around the cryptfs code to improve invariants.

Bug: 19993667
Change-Id: Ibd1df6250735b706959a1eb9d9f7219ea85912a0
/system/vold/Android.mk
ae9e8903375e13028b140e86fcc68c6e152b6f43 16-Mar-2015 Dan Albert <danalbert@google.com> Update for libbase.

Change-Id: I23b1281a63031a7481ea7b33c9ddbdbe7d3d6174
/system/vold/Android.mk
deb240573754daf36fa8ea10a05240f9f31e7b2c 03-Mar-2015 Jeff Sharkey <jsharkey@android.com> Checkpoint of better dynamic device support.

This is the first in a series of changes that are designed to
introduce better support for dynamic block devices.

It starts by defining a new Volume object which represents a storage
endpoint that knows how to mount, unmount, and format itself. This
could be a filesystem directly on a partition, or it could be an
emulated FUSE filesystem, an ASEC, or an OBB.

These new volumes can be "stacked" so that unmounting a volume will
also unmount any volumes stacked above it. Volumes that provide
shared storage can also be asked to present themselves (through bind
mounts) into user-specific mount areas.

This change also adds a Disk class which is created based on block
kernel netlink events. Instead of waiting for partition events from
the kernel, it uses gptfdisk to read partition details and creates
the relevant Volume objects.

Change-Id: I0e8bc1f8f9dcb24405f5e795c0658998e22ae2f7
/system/vold/Android.mk
ba5834dcea382a71326289c8d1293e0e95f1dfec 23-Jan-2015 Kenny Root <kroot@google.com> am 26970299: Merge "Remove superfluous OpenSSL include paths."

* commit '269702997153cdf92c65cfee277c76afed44e9e5':
Remove superfluous OpenSSL include paths.
41405bb3e5cdde0782bfcf7065b88ce1bb253c3c 23-Jan-2015 Adam Langley <agl@google.com> Remove superfluous OpenSSL include paths.

The libcrypto and libssl modules (and their respective static and host
versions) use LOCAL_EXPORT_C_INCLUDE_DIRS thus just including the module
is sufficient.

Additionally, cryptfs.h was including an OpenSSL header just to get the
length of a SHA-256 hash. Rather than force all users of this header to
also depend on libcrypto, it's easier just to define that value in the
header file.

Change-Id: I3e3e0db906a212e1093944b298e4a8ff2e2fb07d
/system/vold/Android.mk
210caabdb51943ec46532fb13bd3df8b983897e7 18-Dec-2014 Dan Albert <danalbert@google.com> resolved conflicts for merge of 88aba541 to lmp-mr1-dev-plus-aosp

Change-Id: Ie5ef819dd8168cb6a73f84a881a92c116705fffc
c07fa3fa5ada60b5f0b13d84f7a9893e2c331549 18-Dec-2014 Dan Albert <danalbert@google.com> Fix alignment of buffer used for dm_ioctl.

Since the dm_ioctl struct was being allocated on the stack as a large
character array, it was getting character alignment rather than the
proper alignment for the struct. GCC had been getting away with this
so far, but it's undefined behavior that clang managed to expose.

Bug: 18736778
Change-Id: Ied275dfad7fcc41d712b2d02c8a185f499221f57
/system/vold/Android.mk
6c78e7d7724a431dbdb2b0a5bb8cd2b07424cbe5 18-Dec-2014 Tim Murray <timmurray@google.com> resolved conflicts for merge of 4be36106 to lmp-mr1-dev-plus-aosp

Change-Id: If504710a618d8c3adf85297d5fd2909558ed57a3
8439dc9fd569794b1a31f67cf43d9212de33eecc 15-Dec-2014 Tim Murray <timmurray@google.com> Make vold compile with -Werror -Wall.

-Wno-missing-field-initializers is used as well, but that is an
overzealous warning from initializing structs with {0} and not a
real warning.

bug 18736778 and 16868177

Change-Id: Iffde89cd7200d9a11193e1614f1819f9fcace30a
/system/vold/Android.mk
97f3d073ac8cfb8043fcf6ee0b80d5f515ad36c4 13-Dec-2014 Dan Albert <danalbert@google.com> am a20bb17e: Merge "Move vold to GCC."

* commit 'a20bb17e4c6095a77425418d7eb0c1ceb50d05f7':
Move vold to GCC.
084f0b3dd58e128bcd855b8f98d458a334b6a54a 13-Dec-2014 Dan Albert <danalbert@google.com> Move vold to GCC.

It looks like clang might have a miscompile that is causing SIGBUS in
`ioctl_init` when the device is encrypted. Move back to GCC until we
can sort this out.

Bug: 18736778
Change-Id: I21ae3b9d7d9ebff8679ecc1a828b7c59f27d0903
/system/vold/Android.mk
b7d35115dccc49275c48cc4665c146997b0168eb 21-Nov-2014 Iliyan Malchev <malchev@google.com> resolved conflicts for merge of 87701e27 to lmp-mr1-dev-plus-aosp

Change-Id: Ie873baff626fe786515497f2e81aa9db2329168d
87701e2755f039d6ea8c1510dcddf468ee947a62 18-Sep-2014 Ajay Dudani <adudani@codeaurora.org> Adding support of dm-req-crypt

Currently Android provides disk encryption support using dm-crypt
which is based on bios. dm-crypt uses 512 bytes packet size for
crypto operations. While 512 bytes size packet is ok for SW based
disk encryption, it is inefficient for HW based crypto engines.
dm-req-crypt is similar to dm-crypt except it uses block requests
rathe bios for crypto operations. block requests when unpacked
carries data upto 512KB. Hence, HW based crypto engine can be used
more efficiently.

Also move create disk encryption key before framework start as
HW based disk encryption creates key in secure side. Key creation
can take sometime to create the key securely. If framework is
started before creating the key, it is possible that framework
requests service from secure side. Secure side can serve mostly one
request at a time. Secure side may reject framework request if key
creation request is still going on. This may cause problem in the
system

b/17475056 Enable hardware crypto for userdata encryption

Change-Id: I5480ab72a37c02532218a18faaba598a824589fd
Signed-off-by: Iliyan Malchev <malchev@google.com>
/system/vold/Android.mk
89bcc638ab24af7bee0ff3ccfa190a08b721f0a4 06-Nov-2014 Dan Albert <danalbert@google.com> am 36859212: Merge "Move vold to libc++."

* commit '36859212614fd112e08dcf92065ee6db910769bb':
Move vold to libc++.
a05cb41300b652e6125c6df42d4aa756101e6e72 06-Nov-2014 Dan Albert <danalbert@google.com> am 460a93a6: Merge "Move vold to clang so ASAN_ALL works."

* commit '460a93a6d4d01bf0efa83acea0c84b4d43ab23c9':
Move vold to clang so ASAN_ALL works.
66d84da21464b4490d7a45704e3ac3e0bb6eb313 05-Nov-2014 Dan Albert <danalbert@google.com> Move vold to libc++.

Bug: 15193147
Change-Id: Ib868f1ed8145ca5cbfdb4cd60ed0c47a6182ac62
/system/vold/Android.mk
5325f569213ec3b04a7eebf2b02cc7ba46ea6e84 21-Oct-2014 Dan Albert <danalbert@google.com> Move vold to clang so ASAN_ALL works.

ASAN_ALL uses ASAN for anything built with clang. Since some of vold's
dependencies use clang, they will have unresolved ASAN symbols unless
vold is also built with clang. There's no harm in just moving this
project to clang.

Change-Id: Ia6f412beb7bf092121bff2a5a980531636adcdb9
/system/vold/Android.mk
b4ef84d704cf099585b113db533548be415367c5 12-Sep-2014 Dan Albert <danalbert@google.com> resolved conflicts for merge of 2b2a0bec to lmp-dev-plus-aosp

Change-Id: I224499833777ef80d85c1199f475f5ed1568d053
b2aaf3afa1dc48f28e87a30db3a741318a1f0024 12-Sep-2014 Dan Albert <danalbert@google.com> Remove makefile cruft.

Don't manually include stlport, and don't use private bionic headers.

Change-Id: I44dd212fdd5874e625890c548e9d7bf3a9c27912
/system/vold/Android.mk
e82df164e8128ec9df0072c4a4f3d92e79a0f5f4 16-Aug-2014 Daniel Rosenberg <drosen@google.com> Revert "Revert "cryptfs: Added support for f2fs fast encryption""

This reverts commit a70abc60091aed3c3eaf8bc8e1766e233c1c3a2f.

Change-Id: Ic41d1924638586cf9b2297f91ed5417f3b0303c6
/system/vold/Android.mk
a70abc60091aed3c3eaf8bc8e1766e233c1c3a2f 15-Aug-2014 Jim Miller <jaggies@google.com> Revert "cryptfs: Added support for f2fs fast encryption"

This reverts commit 74c01201dec12b5de43ba0f20a2f38e835cd00af.

Change-Id: Ib397a2b5812179ee2e2b68de5d718077563adc1c
/system/vold/Android.mk
74c01201dec12b5de43ba0f20a2f38e835cd00af 13-Aug-2014 Daniel Rosenberg <drosen@google.com> cryptfs: Added support for f2fs fast encryption

Bug: 15749466
Change-Id: I25452a05e1cbe90ac6603a89db9b720c7ab17e55
Signed-off-by: Daniel Rosenberg <drosen@google.com>
/system/vold/Android.mk
69f4ebd81e22f91a4571763842b5960d95d2758d 14-Apr-2014 Paul Lawrence <paullawrence@google.com> Add keymaster support to cryptfs

Use keymaster to wrap the cryptfs keys.

Requires selinux change
https://googleplex-android-review.git.corp.google.com/#/c/449411

Bug: 9467042
Change-Id: If25a01cb85ed193a271d61382de0560d85553b7e
/system/vold/Android.mk
87999173dd79dbcbd8cb97f5476007e867aaeeba 20-Feb-2014 Paul Lawrence <paullawrence@google.com> Don't corrupt ssd when encrypting and power fails

Stop encryption when battery is low, mark position, and continue on reboot.

Note - support for multiple encrypted volumes removed as no devices seem
to exist with an fstab that uses this feature. If you want support for such
a device, contact me and we will re-add it with appropriate testing.

Bug: 13284213
Change-Id: I1f7178e4f7dd8ea816cbc03ab5c4f6543e98acaa
/system/vold/Android.mk
4ff7225154ad14a01065b04c49d3ee179ffb6c10 11-Feb-2014 Nick Kralevich <nnk@google.com> am ca3593df: am 311edc8c: Merge "Add SELinux restorecon calls on ASEC containers."

* commit 'ca3593df3d48cb4b51acf89e6df4872b922fd51d':
Add SELinux restorecon calls on ASEC containers.
b9e3ba56cb4075f894a73b02ee70571456494ac1 04-Feb-2014 Robert Craig <rpcraig@tycho.ncsc.mil> Add SELinux restorecon calls on ASEC containers.

This will allow fine-grained labeling of the
contents of ASEC containers. Some of the contents
need to be world readable and thus should be
distinguishable in policy.

Change-Id: Iefee74214d664acd262edecbb4f981d633ff96ce
Signed-off-by: rpcraig <rpcraig@tycho.ncsc.mil>
/system/vold/Android.mk
699bfa411e089aafb697d1ed834f9b4d30c20b09 24-Jan-2014 Colin Cross <ccross@android.com> am 8328e815: Merge "vold: remove from include path"

* commit '8328e8150f4e7b785785754f2d44794e7bab3577':
vold: remove $(KERNEL_HEADERS) from include path
23b571bb5704b054d3f27b827246c5399942011e 23-Jan-2014 Colin Cross <ccross@android.com> vold: remove $(KERNEL_HEADERS) from include path

The kernel headers are already in the include path, and manually
adding them again will break on a multiarch build, where the
kernel headers may be different for each arch.

Change-Id: Ifb11fa7bdff6b317c44258968244313b7039a9e1
/system/vold/Android.mk
0368cd4355466e4c9d6f502fed8a830cad36e25e 18-Oct-2013 Jeff Sharkey <jsharkey@android.com> am f4a8c0b9: am 10939ac7: Merge "Extract UUID and label from inserted volumes." into klp-dev

* commit 'f4a8c0b9f646cd9fa51fe3746bc8a00bb987124b':
Extract UUID and label from inserted volumes.
0de365fc0af30ae48c2037e1057f2a813029a618 17-Oct-2013 Jeff Sharkey <jsharkey@android.com> Extract UUID and label from inserted volumes.

Uses "blkid" tool to extract metadata from an inserted volume, and
reports it up to the framework. This needs to happen in vold, since
only the FUSE-wrapped volume is visible to userspace.

Remove autorun sanitization, since FUSE takes care of this now.

Bug: 11175082
Change-Id: Ie69b38011ad6011bfb50e40d4f35a29e02150c19
/system/vold/Android.mk
20bab9ffdcfd2b22c2d1ba897df98750ef195e7d 17-Sep-2013 Nick Kralevich <nnk@google.com> vold: Remove obsolete xwarp support.

This code appears to be unused. Delete it.

This is essentially a revert of 2350c44ff39b4cb2940893964a05f778fc80a436.

Change-Id: I20a525bb49f6ee8fec8c1ec22e01ad47d0c72960
/system/vold/Android.mk
5cf759a9c5281d4345c16902171201c07875e555 15-Aug-2013 Ken Sumrall <ksumrall@android.com> Use a shared library when building vold

A quick fix to a broken build resulted in using a static library
to build vold when a shared library was available. This fixes
that.

Bug: 10332978
Change-Id: I31c2b4a87c7b37647e71f7f3c93b0d64dd52da44
/system/vold/Android.mk
c49f0f2f9098bb2c6c43570868b4e090c14a7d23 07-Aug-2013 Geremy Condra <gcondra@google.com> Add libext4 and libmincrypt to vold.

This accomodates verity changes, which now utilize these libraries.

Change-Id: I1ff8c012e972e245cf3e4bc3a02bef0989165d75
/system/vold/Android.mk
c4c70f15bb8845b02f9ec1d624794757badd6933 14-Jun-2013 Kenny Root <kroot@google.com> Change key derivation to scrypt

scrypt is a sequential memory-hard key derivation algorithm that makes
it more difficult for adversaries to brute force passwords using
specialized equipment. See http://www.tarsnap.com/scrypt/scrypt.pdf for
more details of the algorithm.

This adds support for initializing disk encryption using scrypt and
upgrading from the previous PBKDF2 algorithm.

Change-Id: I1d26db4eb9d27fea7310be3e49c8e6219e6d2c3b
/system/vold/Android.mk
9caab76c6b5aefdeeb1715a3695491ca793b8c18 12-Jun-2013 Ken Sumrall <ksumrall@android.com> vold: Add an optional wipe paramter to the volume format command

The new wipe option to the vold format command will invoke BLKDISCARD
on the partition before invoking newfs_msdos. This will be used whenever
a full wipe of the device is wanted, as this is more secure than just
doing newfs_msdos.

Bug: 9392982
Change-Id: Ie106f1b9cc70abc61206006d1821641c27c7ccae
/system/vold/Android.mk
741a1699b15c628e36e5c26457bd703b11f1e515 10-Apr-2013 Ying Wang <wangying@google.com> Add liblog

Bug: 8580410
Change-Id: I1a59b45c87cd901b3de52540ad7b670c42ffcbd5
/system/vold/Android.mk
b87937cdea689594a293979b30b13054e7455dee 20-Mar-2013 Ken Sumrall <ksumrall@android.com> Vold: Add the fstrim subsystem to vold

The fstrim subsystem implements the dotrim command, which goes
through all the writable filesystems on the device, and invokes
the FITRIM ioctl() on them. This marks all the unused blocks on
the underlying flash device as unused, so the device performs better.

Change-Id: I5fc8c2f60e0bc823f162d0f89580fb288ecb2160
/system/vold/Android.mk
2ba45aafc22ff2fed91f8cd191beb85578b7b9bc 16-Jan-2013 Rom Lemarchand <romlem@google.com> Replace custom logwrapper implementation with liblogwrap

Use liblogwrap to provide logwrapper functionality instead of
using vold's own implementation.

Change-Id: I76aac5aa72a1fdca043a63b86c6a9b54e7abec16
/system/vold/Android.mk
f0679f0da4970f04e1cb03f4cb0fcde29e3e7098 02-Apr-2012 Ken Sumrall <ksumrall@android.com> Changes to encryption to work with the new filesystem manager

The new filesystem manager is in charge of mounting the block devices now,
removing much of the knowledge from init.<device>.rc. This also let us
clean up some init code dealing with encryption, so this change updates
vold to work with that. More cleanup is possible, but the main goal of the
filesystem manager was to enable e2fsck, not a full cleanup of encryption.

Change-Id: I00ea80a923d14770ed8fdd190e8840be195f8514
/system/vold/Android.mk
344ca10856f3d3087a3288ce8f91ad83665d93fb 04-Apr-2012 Kenny Root <kroot@google.com> Add in ext4 support for ASEC containers

Now forward locked applications will be in ASEC containers both internal
to the system and externally.

This change adds support for putting applications in ext4-based ASECs.

Change-Id: I8d6765b72dd2606e429c067b47a2dbcaa8bef37d
/system/vold/Android.mk
9713ed463917f193823c7c6ecf1c7cb2a1ae9fcc 23-Feb-2012 Nick Kralevich <nnk@google.com> vold: add -Werror=format

Stop format string bugs from creeping into root level processes.

Change-Id: Ifa19ac0cacba76392040ab16cebe557b5b016706
/system/vold/Android.mk
ea89f53387dc6451f6e2afc82b4c4bede5be6dc6 12-Jul-2011 Jeff Brown <jeffbrown@google.com> Remove the simulator target from all makefiles.
Bug: 5010576

Change-Id: I7e531101ae057fb059d7d56c99433c4d66e866dc
/system/vold/Android.mk
5d4c68e40700424b65a4331be75620706a0dd49c 31-Jan-2011 Ken Sumrall <ksumrall@android.com> Have vold grab a partial wakelock when encrypting

The Progress bar UI grabs a full wakelock when encrypting, but we've seen
a case where it looks like the progress bar UI crashes, and the wakelock is
lost, and then all hell breaks loose. The enablecrypto command has a lot of
work to do, and it will take some time, so it should grab a wakelock to
ensure it can finish without being interrupted and put to sleep.

It grabs a partial wake lock, as it doesn't need the screen to be on to do
its work. If the UI wants to keep it on, it should also grab a full wakelock,
which it does. If the UI crashes, the screen may turn off, but the encryption
will keep going, and vold will reboot the device when it's done.

Change-Id: I51d3a72b8c77383044a3facb1604c1ee510733ae
/system/vold/Android.mk
3ed8236de11a1be8b45d4c37b2208682f5e97c72 29-Jan-2011 Ken Sumrall <ksumrall@android.com> Don't try to encrypt in place a filesystem that is too large and return proper errors

If the already existing filesystem encompasses the entire /data partition
and does not leave the last 16 Kbytes for the crypto footer, refuse to
do encrypt in place and return an error. This is only an issue for folks
with early development systems trying to encrypt an old /data. This should
not be seen in released devices.

Also, if there is an error, try to report back to the UI what the error was
so it can deal with it.

Change-Id: If66781a4fe03034c96c3dd12075240deb8663db0
/system/vold/Android.mk
8f869aa1bc685b505c58e97b4e11a9c7491a16f9 03-Dec-2010 Ken Sumrall <ksumrall@android.com> Support for encrypting /data on Stingray.

There are still a few hacks and performance issues related
to shutting down the framework in this code, but it is
functional and tested. Without the UI changes, it requires
cryptic adb shell commands to enable, which I shall not
utter here.

Change-Id: I0b8f90afd707e17fbdb0373d156236946633cf8b
/system/vold/Android.mk
acc9e7dcca8978fc809fa5b4d9b819c515a980ff 19-Jun-2010 Kenny Root <kroot@google.com> Change ASCII conversion for hash and add tests

Hash was printed using snprintf(), but we can just write yet another hex
conversion utility!

Change-Id: I04f1992deaf5bf1b3e2751c8f07072f8ed6660e9
/system/vold/Android.mk
7b18a7b36f61574c0f0bdde0a7409dc36676fa12 15-Mar-2010 Kenny Root <kroot@google.com> vold: Convert to use OpenSSL MD5 API

Change-Id: I9b84370fa9a98464c211ebe8983be8dbe9dd7ccd
/system/vold/Android.mk
befd59c152835b815665ec3c5e453b55e70d5f0b 15-Mar-2010 San Mehat <san@google.com> vold: remove some dead code

Change-Id: Iaeb5d3334ec22ed31da9734bb8d7cd17e6a40eaf
Signed-off-by: San Mehat <san@google.com>
/system/vold/Android.mk
d9a4e358614a0c5f60cc76c0636ee4bb02004a32 12-Mar-2010 San Mehat <san@google.com> vold: Bugfixes & cleanups

- Fix issue where container-names > 64 bytes were getting truncated in the
kernel. lo_name is only 64 bytes in length, so we now hash the container
id via md5
- Add 'dump' command to dump loop and devicemapper status
- Add 'debug' command to enable more detailed logging at runtime
- Log vold IPC arguments (minus encryption keys)
- Fix premature return from Loop::lookupActive() and friends

Change-Id: I0e833261a445ce9dc1a8187e5501d27daba1ca76
Signed-off-by: San Mehat <san@google.com>
/system/vold/Android.mk
2a5b8ce09b8836a8463ef9beaaff865c36ca5e6a 10-Mar-2010 San Mehat <san@google.com> vold: Switch to using libdiskconfig for partition setup.
Also handles an issue where NPARTS=0 on a disk change uevent

Change-Id: I77c56f177dc65df91468bbd7d5fe1889db414d7a
Signed-off-by: San Mehat <san@google.com>
/system/vold/Android.mk
2350c44ff39b4cb2940893964a05f778fc80a436 02-Mar-2010 San Mehat <san@google.com> vold: Add support for xwarp

Signed-off-by: San Mehat <san@google.com>
/system/vold/Android.mk
8f2875b29780312f4edda3d831cc8a99e1648dd5 18-Feb-2010 San Mehat <san@google.com> vold: Clean up asec command response and add support for 'StorageBusy'

Signed-off-by: San Mehat <san@google.com>
/system/vold/Android.mk
586536c60b773e3517531ad8a6cb0de6722c67fc 17-Feb-2010 San Mehat <san@google.com> vold: Refactor Processkiller and add command to return users of a mount point

Signed-off-by: San Mehat <san@google.com>
/system/vold/Android.mk
b78a32c1d5eeb243bdac0eaf18effb1897f1ee67 10-Jan-2010 San Mehat <san@google.com> vold: Add encrypted ASEC support via devmapper

- Supports up to 4096 containers
- Keys are now implemented - specifying a key of 'none' means no encryption.
Otherwise, the key must be a string of 32 characters

Signed-off-by: San Mehat <san@google.com>
/system/vold/Android.mk
1bc9558895dbb38b2103345ab90016f318c37bff 07-Jan-2010 Doug Kwan <dougkwan@google.com> Add missing library used by the main executable in linker options. Currently
the library is implicit added via inter-library dependency.
/system/vold/Android.mk
a19b250bd273455933ca3502cf2c2e0a803aff77 06-Jan-2010 San Mehat <san@google.com> vold2: Initial support for Android Secure External Caches

Signed-off-by: San Mehat <san@google.com>
/system/vold/Android.mk
bf04185c88161f13118b9975cdff7967d49a4fa0 04-Jan-2010 San Mehat <san@google.com> vold2: Refactor FAT support into a separate class

Signed-off-by: San Mehat <san@google.com>
/system/vold/Android.mk
11f78c181e6afe024427be2b7a530280cd4b64e1 03-Jan-2010 San Mehat <san@google.com> vold2: Don't build for simulator

Signed-off-by: San Mehat <san@google.com>
/system/vold/Android.mk
a1c2ca1c70e52cccb7e63f4be8d7127b22afc0e5 21-Dec-2009 San Mehat <san@google.com> vold2: Enable in build

Signed-off-by: San Mehat <san@google.com>
/system/vold/Android.mk
a2677e4ad01f250b0765f04adf0acfa6627efc98 13-Dec-2009 San Mehat <san@google.com> vold2: Get mounting/unmounting/formatting/sharing working

Signed-off-by: San Mehat <san@google.com>
/system/vold/Android.mk
49e2bce5b74129c26a35e25d4693cbfe98c4688e 13-Oct-2009 San Mehat <san@android.com> vold2: Wire up more of the mount function

Signed-off-by: San Mehat <san@android.com>
/system/vold/Android.mk
ae10b91044bf76b40b77d81c169e48e0bbdf6d75 12-Oct-2009 San Mehat <san@android.com> vold2: Rename DeviceVolume -> DirectVolume

Signed-off-by: San Mehat <san@android.com>
/system/vold/Android.mk
f1b736bc5605e92e917ab27f5abf3ba839be2270 11-Oct-2009 San Mehat <san@android.com> system: vold2: Initial skeleton for vold2.

Let there be light.

Signed-off-by: San Mehat <san@android.com>
/system/vold/Android.mk