1cbe0ce40c523de48911fec2a94aec34e8ab14a3 |
18-Oct-2012 |
The Android Automerger <android-build@android.com> |
merge in jb-mr1-release history after reset to jb-mr1-dev
|
92736efab068bdbfeb1177544907b84511fb04e0 |
18-Oct-2012 |
Ken Sumrall <ksumrall@android.com> |
Another fix for encryption The previous problem of the framework not properly restarting after accepting the password to decrypt the storage is also a problem when restarting the framework to display the encryption progress screen. So like the previous hacky fix, add a sleep to wait a few moments before proceeding. Also, increase the sleep of the previous fix from 1 second to 2, as the problem was seen once more in testing. A proper fix has been designed and hopefully will work and be checked-in RSN. Change-Id: Icc2c072ce7f7ebcdea22cd7ff8cb2b87a627c578
ryptfs.c
|
f1a6123f9a05bdfe48129a9ed09ea6fcfe70e1f1 |
09-Oct-2012 |
Ken Sumrall <ksumrall@android.com> |
Fix encryption on certain devices There is a race in the encryption code that after it accepts the decryption password, it tells init to kill all the processes in class "main", then it mounts the decrypted filesystem, preps it, and restarts the framework. For an unknown reason on some devices, the new framework sometimes starts up before init has killed and reaped all the old processes. The proper fix is to make the killing of the old framework synchronous, so vold waits till all the processes have died. But with factory rom a few days away, the much more pragmatic solution of adding a sleep of 1 second after telling init to kill the old framework will suffice. Bug: 7271212 Change-Id: Ie971cd04abbc6f3f6500b4acd79d3b3b26d9561c
ryptfs.c
|
9dedfd473dc59e0277004e5b917e4eced02c8af5 |
09-Oct-2012 |
Ken Sumrall <ksumrall@android.com> |
Fix encryption on certain devices There is a race in the encryption code that after it accepts the decryption password, it tells init to kill all the processes in class "main", then it mounts the decrypted filesystem, preps it, and restarts the framework. For an unknown reason on some devices, the new framework sometimes starts up before init has killed and reaped all the old processes. The proper fix is to make the killing of the old framework synchronous, so vold waits till all the processes have died. But with factory rom a few days away, the much more pragmatic solution of adding a sleep of 1 second after telling init to kill the old framework will suffice. Bug: 7271212 Change-Id: Ie971cd04abbc6f3f6500b4acd79d3b3b26d9561c
ryptfs.c
|
2a012c02b4e6a48076b9d26d9000389f338b8c19 |
07-Oct-2012 |
The Android Automerger <android-build@android.com> |
merge in jb-mr1-release history after reset to jb-mr1-dev
|
7a3c3d462ebd58bda0ceaba9c00c385d44c13d08 |
05-Oct-2012 |
Jeff Sharkey <jsharkey@android.com> |
Unmount in-place instead of using MS_MOVE. To support multi-user emulated storage, we mount rootfs as MS_SHARED, which means we can't MS_MOVE existing mount points rooted in the shared subtree. Initial staging is still able to MS_MOVE, since it's rooted in a MS_PRIVATE tmpfs rooted at /mnt/secure. This change fixes unmounting by operating in-place instead of trying (and failing) to MS_MOVE back to staging. Bug: 7127564 Change-Id: I4783db4319b61c0915da39361cbc7e8f4943d094
olume.cpp
|
13f393d69936fd1876c1c7045cc39b9b51e75254 |
01-Oct-2012 |
Jeff Sharkey <jsharkey@android.com> |
Update environment variable for multi-user. Bug: 7260040 Change-Id: I96d821e11a3f0be32bfe92a4151f00f2b15d100e
ryptfs.c
|
b77bc4696b19d9b1ef82810f8d5f671c963d1dc1 |
01-Oct-2012 |
Jeff Sharkey <jsharkey@android.com> |
Update environment variable for multi-user. Bug: 7260040 Change-Id: I96d821e11a3f0be32bfe92a4151f00f2b15d100e
ryptfs.c
|
9f910d81ae9c7d85709ff41f2de27e2e7fba9141 |
01-Oct-2012 |
The Android Automerger <android-build@android.com> |
merge in jb-mr1-release history after reset to jb-mr1-dev
|
e919efea94b178ed214ed2e78ef0d008727d62ab |
30-Sep-2012 |
Ken Sumrall <ksumrall@android.com> |
Workaround a kernel race when loading dmcrypt table The kernel seems to return from umount(2) sometimes before it has released the underlying block device. So until the kernel is fixed, try up to 10 times to load the crypto mapping table, waiting 500 ms between tries. bug: 7220345 Change-Id: Iad3bbef37cbe2e01613bb8a8c4886babdecb8328
ryptfs.c
|
2bbf02c9b07369a6a9802486c50830885d873381 |
26-Sep-2012 |
The Android Automerger <android-build@android.com> |
merge in jb-mr1-release history after reset to jb-mr1-dev
|
6947904a76b69a1db20a3ddd30c0bcd281922fde |
26-Sep-2012 |
Jeff Sharkey <jsharkey@android.com> |
Handle multi-user mountObb() requests. Mount OBB containers using shared app GID, so that an app can read the mount point across users. Bug: 7212801 Change-Id: Ia1be52df9854c259b20728111f3a2c9facf4beaa
ommandListener.cpp
olumeManager.cpp
|
e270d6c1b5c9095a07910560734a7d40e133689b |
23-Aug-2012 |
Jeff Sharkey <jsharkey@android.com> |
Unmount external storage on multi-user devices. Bug: 7044670 Change-Id: If1f99968b0392cae9420d067c75bfc18d1067b2c
ryptfs.c
|
7382f81fba895f1ac970ac2fad875f35836b8082 |
23-Aug-2012 |
Jeff Sharkey <jsharkey@android.com> |
Unmount external storage on multi-user devices. Bug: 7044670 Change-Id: If1f99968b0392cae9420d067c75bfc18d1067b2c
ryptfs.c
|
f763b2fc07ee79045ca6c47e54d09dec90694e6c |
17-Aug-2012 |
The Android Open Source Project <initial-contribution@android.com> |
am 7c5109be: (-s ours) Reconcile with jb-mr0-release - do not merge * commit '7c5109bef8c1f8b857b043bf9c1d26c2f0556e8f':
|
7c5109bef8c1f8b857b043bf9c1d26c2f0556e8f |
17-Aug-2012 |
The Android Open Source Project <initial-contribution@android.com> |
Reconcile with jb-mr0-release - do not merge Change-Id: I3ec7be5d1d08566f120f18b68d2f691f92f006c8
|
a20b197260f33dc32f61b245934753c252c8b2f5 |
17-Aug-2012 |
The Android Automerger <android-build@android.com> |
merge in jb-mr0-release history after reset to jb-dev
|
4fe053e1b406b41b5a60707523b389530619d953 |
13-Aug-2012 |
Kenny Root <kroot@google.com> |
am 62224a32: (-s ours) am eacf7e03: Only cleanup ASECs in external storage DO NOT MERGE * commit '62224a32f00c344c8ba6edab2107c833700e26a8': Only cleanup ASECs in external storage DO NOT MERGE
|
62224a32f00c344c8ba6edab2107c833700e26a8 |
13-Aug-2012 |
Kenny Root <kroot@google.com> |
am eacf7e03: Only cleanup ASECs in external storage DO NOT MERGE * commit 'eacf7e03d60a2b33ac6cdaa0e01bd6a6fdd9455a': Only cleanup ASECs in external storage DO NOT MERGE
|
eacf7e03d60a2b33ac6cdaa0e01bd6a6fdd9455a |
09-Aug-2012 |
Kenny Root <kroot@google.com> |
Only cleanup ASECs in external storage DO NOT MERGE Any ASEC or OBB files were unmounted when USB storage was set to UMS mode. This changes it so only ASEC files on external storage and OBB files mounted from external storage are unmounted. (Cherry-pick of 93ecb38daded7583a4a61f4f22519bb7a8a8c154) Bug: 6948035 Change-Id: Ib60727bd360caa32173797ff5b4e1e21fcf20054
olumeManager.cpp
olumeManager.h
|
93ecb38daded7583a4a61f4f22519bb7a8a8c154 |
09-Aug-2012 |
Kenny Root <kroot@google.com> |
Only cleanup ASECs in external storage Any ASEC or OBB files were unmounted when USB storage was set to UMS mode. This changes it so only ASEC files on external storage and OBB files mounted from external storage are unmounted. Bug: 6948035 Change-Id: I91bc09ee5b792970b0eef895f6886f3ffad00e8f
olumeManager.cpp
olumeManager.h
|
912d0b07555eb691f0320530c4e0f6ab85521e95 |
29-Jun-2012 |
Ken Sumrall <ksumrall@android.com> |
Merge "Fix a typo in cryptfs.c"
|
319369ac111aec79b42668477c998c36b5f3be06 |
28-Jun-2012 |
Ken Sumrall <ksumrall@android.com> |
Fix a typo in cryptfs.c Change-Id: If629fa996b135e432bc89da7518b0c1f02750b45
ryptfs.c
|
4684e58a8d1d502012c48295233e6663043cfb0b |
27-Jun-2012 |
Nick Kralevich <nnk@google.com> |
Add mode when open(O_CREAT) is used. When creating a new file using open(..., O_CREAT), it is an error to fail to specify a creation mode. If a mode is not specified, a random stack provided value is used as the "mode". This will become a compile error in a future Android change. Change-Id: I761708c001247d7a2faac2e286288b45bfecc6f7
ryptfs.c
|
b405f3676038ba088edd4974bcecbcbfe094fc96 |
19-Jun-2012 |
The Android Open Source Project <initial-contribution@android.com> |
am 9ee8a315: Reconcile with jb-release * commit '9ee8a315eefde7e6ad1bc07bc9d50528f548e8e8': Unmount all asec apps before encrypting
|
9ee8a315eefde7e6ad1bc07bc9d50528f548e8e8 |
19-Jun-2012 |
The Android Open Source Project <initial-contribution@android.com> |
Reconcile with jb-release Change-Id: I60294fb5c41ef34eccc322889168497d9449c6ea
|
51d1ae176ece369db099ce5f5b775bc475f14353 |
18-Jun-2012 |
Ken Sumrall <ksumrall@android.com> |
am a7926050: am 425524db: Unmount all asec apps before encrypting * commit 'a79260500a869f867118a6e5289c6e5a0353558f': Unmount all asec apps before encrypting
|
a79260500a869f867118a6e5289c6e5a0353558f |
18-Jun-2012 |
Ken Sumrall <ksumrall@android.com> |
am 425524db: Unmount all asec apps before encrypting * commit '425524dba1552ab3d2ad39e205e65d0a2af997f2': Unmount all asec apps before encrypting
|
4053aaef6f067433a19d04b54af9e035982e108b |
15-Jun-2012 |
Ken Sumrall <ksumrall@android.com> |
Unmount all asec apps before encrypting Now that forward locked apps are stored on /data as asec image files that are mounted, they need to be unmounted before /data can be unmounted so it can be encrypted. Change-Id: I7c87deb52aaed21c8ad8ce8aceb7c15c2338620a
olumeManager.cpp
olumeManager.h
ryptfs.c
|
425524dba1552ab3d2ad39e205e65d0a2af997f2 |
15-Jun-2012 |
Ken Sumrall <ksumrall@android.com> |
Unmount all asec apps before encrypting Now that forward locked apps are stored on /data as asec image files that are mounted, they need to be unmounted before /data can be unmounted so it can be encrypted. Change-Id: I7c87deb52aaed21c8ad8ce8aceb7c15c2338620a
olumeManager.cpp
olumeManager.h
ryptfs.c
|
fc676b69bd7e6975d52bc8397d14e5583e00df49 |
22-May-2012 |
Jean-Baptiste Queru <jbq@google.com> |
am e925ff66: am bac5eb96: Merge "Delay disk inserted broadcast until disk is ready" * commit 'e925ff6670bb9cef9118ddceb2e3bff81833bd09': Delay disk inserted broadcast until disk is ready
|
e925ff6670bb9cef9118ddceb2e3bff81833bd09 |
22-May-2012 |
Jean-Baptiste Queru <jbq@google.com> |
am bac5eb96: Merge "Delay disk inserted broadcast until disk is ready" * commit 'bac5eb966c5c3aa9abe83cdb5187326f422741ab': Delay disk inserted broadcast until disk is ready
|
bac5eb966c5c3aa9abe83cdb5187326f422741ab |
22-May-2012 |
Jean-Baptiste Queru <jbq@google.com> |
Merge "Delay disk inserted broadcast until disk is ready"
|
ac3d1eac00cc7077528392d5f1dfc7af94bf9d78 |
16-May-2012 |
The Android Open Source Project <initial-contribution@android.com> |
am 2fdea0aa: Reconcile with jb-release nakasi-factoryrom-release * commit '2fdea0aa78cefce50c6f51be97084977f2a6ae69': Native library loading needs to read directory Only set permissions on dirs or files Fix truncation of ASEC ids
|
2fdea0aa78cefce50c6f51be97084977f2a6ae69 |
16-May-2012 |
The Android Open Source Project <initial-contribution@android.com> |
Reconcile with jb-release nakasi-factoryrom-release Change-Id: I2bc2763dc285edb9aa8bd9bedd068ee4483a3ce5
|
bfc7db4772e73367bac5a190739326128b27f758 |
14-May-2012 |
The Android Automerger <android-build@android.com> |
merge in jb-release history after reset to jb-dev
|
b1dd92ca9fce9e0ae4c16054708390df66a6222d |
11-May-2012 |
Kenny Root <kroot@google.com> |
am 760cec44: am 41836711: Merge "Sleep to wait for dm to create node" into jb-dev * commit '760cec444b0f3c8a243d100cd5f5520af7531d17': Sleep to wait for dm to create node
|
760cec444b0f3c8a243d100cd5f5520af7531d17 |
11-May-2012 |
Kenny Root <kroot@google.com> |
am 41836711: Merge "Sleep to wait for dm to create node" into jb-dev * commit '418367112c96f6ce45aa142d613a575046b7f65f': Sleep to wait for dm to create node
|
418367112c96f6ce45aa142d613a575046b7f65f |
11-May-2012 |
Kenny Root <kroot@google.com> |
Merge "Sleep to wait for dm to create node" into jb-dev
|
4817b30fb3572e1dee0724eb202f2ea604feaf8f |
11-May-2012 |
Kenny Root <kroot@google.com> |
Native library loading needs to read directory When calling System.loadLibrary(), it needs to be able to read the directory to load the file. We could probably fix that, but changing permissions here is faster. Bug: 6478606 Change-Id: I296b0805839da5a19950157f9a16755a4d258ca8
olumeManager.cpp
|
59f31de0d445b61a1f04d1362c276a960ebbea70 |
11-May-2012 |
Kenny Root <kroot@google.com> |
Only set permissions on dirs or files Traversal would mark directories with the correct permissions, but they're visited again in post-order which is a different fts_info flag. Then it would set that to regular file permissions. Explicitly check to make sure we're looking at a file instead. Bug: 6478606 Change-Id: I13cab3e69f451da6a994fa974d575ef366f82025
olumeManager.cpp
|
cdc2a1c83575a349ee44035de8c3b38b8b401003 |
03-May-2012 |
Kenny Root <kroot@google.com> |
Sleep to wait for dm to create node There appears to be a race condition from when the device mapper is asked to create a device and when it actually appears. When we moved ASECs to use Ext4, mount started winning the race more often. Just insert a sleep-retry loop here to counter-act this race. We should ideally look at the uevent replies, but it takes a bit more effort to separate them out. Change-Id: Ie8a5b36b1c9a26f2320a178d37312059d03a1281
olumeManager.cpp
|
e80077f18362e7abbf6e4aa02734edd2ddb7fdff |
11-May-2012 |
Kenny Root <kroot@google.com> |
am 9688165c: am 1a673c86: Native library loading needs to read directory * commit '9688165c81a1ab4c2ce08fc831030eebcf2ecc6f': Native library loading needs to read directory
|
9688165c81a1ab4c2ce08fc831030eebcf2ecc6f |
11-May-2012 |
Kenny Root <kroot@google.com> |
am 1a673c86: Native library loading needs to read directory * commit '1a673c868c2d2d81fcaeab34b4a7c75d4a978584': Native library loading needs to read directory
|
dc452c399dae789207978104a2f12d2e9c48ed03 |
11-May-2012 |
Kenny Root <kroot@google.com> |
am 457197c5: am 348c8aba: Only set permissions on dirs or files * commit '457197c50056216c1552e020998274a3bb249dd9': Only set permissions on dirs or files
|
1a673c868c2d2d81fcaeab34b4a7c75d4a978584 |
11-May-2012 |
Kenny Root <kroot@google.com> |
Native library loading needs to read directory When calling System.loadLibrary(), it needs to be able to read the directory to load the file. We could probably fix that, but changing permissions here is faster. Bug: 6478606 Change-Id: I296b0805839da5a19950157f9a16755a4d258ca8
olumeManager.cpp
|
457197c50056216c1552e020998274a3bb249dd9 |
11-May-2012 |
Kenny Root <kroot@google.com> |
am 348c8aba: Only set permissions on dirs or files * commit '348c8aba0d2df2996e0fe57900ef518c6aeb4b29': Only set permissions on dirs or files
|
348c8aba0d2df2996e0fe57900ef518c6aeb4b29 |
11-May-2012 |
Kenny Root <kroot@google.com> |
Only set permissions on dirs or files Traversal would mark directories with the correct permissions, but they're visited again in post-order which is a different fts_info flag. Then it would set that to regular file permissions. Explicitly check to make sure we're looking at a file instead. Bug: 6478606 Change-Id: I13cab3e69f451da6a994fa974d575ef366f82025
olumeManager.cpp
|
7bffd4486dff76d61c45aa53a33be48ec50ae8b1 |
09-May-2012 |
Jean-Baptiste Queru <jbq@google.com> |
am 0e110bb5: am 5cf6325c: Merge "Unshare ums when SD card is removed" * commit '0e110bb5a2559b60003effa0e0bf460993e634a6': Unshare ums when SD card is removed
|
0e110bb5a2559b60003effa0e0bf460993e634a6 |
08-May-2012 |
Jean-Baptiste Queru <jbq@google.com> |
am 5cf6325c: Merge "Unshare ums when SD card is removed" * commit '5cf6325c91792dbb1bb08fa1958c1fc8a5b9c45d': Unshare ums when SD card is removed
|
5cf6325c91792dbb1bb08fa1958c1fc8a5b9c45d |
08-May-2012 |
Jean-Baptiste Queru <jbq@google.com> |
Merge "Unshare ums when SD card is removed"
|
3dafc26e4f3adb9607e82ab0bd52ead5f76859a1 |
19-Jan-2011 |
Magnus Malmborn <magnus.malmborn@sonyericsson.com> |
Delay disk inserted broadcast until disk is ready Delay sending of "VolumeDiskInserted" broadcast until the disk is ready (ie until all the partitions have been received from kernel). This solves a race with MountService, otherwise there is a risk that MountService tries to mount the SD-card before the partition(s) have been received and the card will fail to mount. Change-Id: Ie2a28227ae9a7d6fe9106fb6875f469a0e899014
irectVolume.cpp
|
627366196859339d72ab9f68a817dd395a13468f |
07-Apr-2011 |
Lars Svensson <lars1.svensson@sonyericsson.com> |
Unshare ums when SD card is removed If SD card is removed without unmounting when in USB mass storage mode the ums share is not properly closed and the device files 179:0 and 179:1 are left in use. This causes erratic behaviour on subsequent operations on the card, i.e. mounting and formatting will fail. Change-Id: I757703c6282f4b76e2d8b027f4644920737309b6
irectVolume.cpp
|
e9435395d070c8748cfe8b0c95cb004950435d29 |
02-May-2012 |
The Android Automerger <android-build@android.com> |
merge in jb-release history after reset to jb-dev
|
af05ec0e5e99f9a91c7b7d731a8ef34f87976948 |
01-May-2012 |
Ken Sumrall <ksumrall@android.com> |
am e5032c42: Changes to encryption to work with the new filesystem manager * commit 'e5032c42da3c33a854df0a24a7968b4ab54190b9': Changes to encryption to work with the new filesystem manager
|
e5032c42da3c33a854df0a24a7968b4ab54190b9 |
02-Apr-2012 |
Ken Sumrall <ksumrall@android.com> |
Changes to encryption to work with the new filesystem manager The new filesystem manager is in charge of mounting the block devices now, removing much of the knowledge from init.<device>.rc. This also let us clean up some init code dealing with encryption, so this change updates vold to work with that. More cleanup is possible, but the main goal of the filesystem manager was to enable e2fsck, not a full cleanup of encryption. Change-Id: I00ea80a923d14770ed8fdd190e8840be195f8514
ndroid.mk
ryptfs.c
|
f0679f0da4970f04e1cb03f4cb0fcde29e3e7098 |
02-Apr-2012 |
Ken Sumrall <ksumrall@android.com> |
Changes to encryption to work with the new filesystem manager The new filesystem manager is in charge of mounting the block devices now, removing much of the knowledge from init.<device>.rc. This also let us clean up some init code dealing with encryption, so this change updates vold to work with that. More cleanup is possible, but the main goal of the filesystem manager was to enable e2fsck, not a full cleanup of encryption. Change-Id: I00ea80a923d14770ed8fdd190e8840be195f8514
ndroid.mk
ryptfs.c
|
5dcf48a2c5956a763694f24472bcd48434fc1c94 |
28-Apr-2012 |
Kenny Root <kroot@google.com> |
Fix truncation of ASEC ids Change-Id: I1e6bfcc6b0a5be47e6fd19922fc81669f61b5dba
ommandListener.cpp
|
7b0bc8571465666d6cba79bda60b72a97f852c05 |
28-Apr-2012 |
Kenny Root <kroot@google.com> |
Fix truncation of ASEC ids Change-Id: I1e6bfcc6b0a5be47e6fd19922fc81669f61b5dba
ommandListener.cpp
|
344ca10856f3d3087a3288ce8f91ad83665d93fb |
04-Apr-2012 |
Kenny Root <kroot@google.com> |
Add in ext4 support for ASEC containers Now forward locked applications will be in ASEC containers both internal to the system and externally. This change adds support for putting applications in ext4-based ASECs. Change-Id: I8d6765b72dd2606e429c067b47a2dbcaa8bef37d
ndroid.mk
sec.h
ommandListener.cpp
ommandListener.h
xt4.cpp
xt4.h
oop.cpp
oop.h
olume.cpp
olume.h
olumeManager.cpp
olumeManager.h
|
8cd47b4c3bd811d1f94fd262db6031d4469ee121 |
21-Mar-2012 |
Mike Lockwood <lockwood@google.com> |
Merge remote-tracking branch 'goog/ics-aah-exp'
|
781bbab8dd2c9b9b82644c56dc1d4d7ad01c07ef |
21-Mar-2012 |
Mike Lockwood <lockwood@google.com> |
Merge commit '43b80c229bdee7f32654e2ec561078c5c94c8851' empty merge with -s ours Change-Id: I4c7d6fb13e175af819cab784704e08e9189f6739
|
b018fe74c29d4ca3a365adf82c710d8c214a71a3 |
10-Mar-2012 |
Ken Sumrall <ksumrall@android.com> |
Merge "Fix vdc to add sequence number for NativeConectorDaemon"
|
d02a47239c6a92a16530fd7101c53fd39eeae05c |
10-Mar-2012 |
Ken Sumrall <ksumrall@android.com> |
Merge "Fix to not return a bogus decryption error when a device is not encrypted."
|
d4b3661cae1664ca07025b7f0dacc621de0ed93f |
10-Mar-2012 |
Ken Sumrall <ksumrall@android.com> |
Fix vdc to add sequence number for NativeConectorDaemon NativeConnectorDaemon was changed to use an optional sequence number, and most services were changed to require it. Now that vold requires a sequence number, vdc must provide one. Change-Id: Ibdff9878faf19eae25525221c80bcb5e5f87cfea
dc.c
|
c7ad3263813c070e34f5cc755a7a2fb7b414d052 |
07-Mar-2012 |
Glenn Kasten <gkasten@google.com> |
Merge "Use sched_policy to avoid hard-coded cpuctl path"
|
1b4807b19aab60d725078258967d6a8627013a66 |
06-Mar-2012 |
Glenn Kasten <gkasten@google.com> |
Use sched_policy to avoid hard-coded cpuctl path Change-Id: I8f62287d1b60d8eef72d1dfc64be5c3d56e9f498
ogwrapper.c
|
149aa3eb65a8cb878781206b1476aae110e0e1fd |
16-Feb-2012 |
Robert Greenwalt <rgreenwalt@google.com> |
Use the new command numbering scheme. Support multiple commands on a single socket via command numbers. NativeDaemonConnector has been changed, so we need to use it here too. bug:5864209 Change-Id: Ie06e966d50057d122a958377731c0385ea367b69
ommandListener.cpp
|
9713ed463917f193823c7c6ecf1c7cb2a1ae9fcc |
23-Feb-2012 |
Nick Kralevich <nnk@google.com> |
vold: add -Werror=format Stop format string bugs from creeping into root level processes. Change-Id: Ifa19ac0cacba76392040ab16cebe557b5b016706
ndroid.mk
|
ee6d8c42f337ea1446a319df53f6d1a96afbd209 |
15-Feb-2012 |
Mike Lockwood <lockwood@google.com> |
Add support for wiping data immediately if crypt fails Needed for headless devices that need to recover with no user intervention Bug: 5556856 Change-Id: I0f85591df513a6893324fb057bde114ac1df044b Signed-off-by: Mike Lockwood <lockwood@google.com>
ryptfs.c
|
a6251c6f911f2aeacc8bb8931bfc82d9609a22b6 |
15-Feb-2012 |
Mike Lockwood <lockwood@google.com> |
Add support for wiping data immediately if crypt fails Needed for headless devices that need to recover with no user intervention Bug: 5556856 Change-Id: Iabe5d68599259b14626bfcf45e6697d81b866101 Signed-off-by: Mike Lockwood <lockwood@google.com>
ryptfs.c
|
e1a458578474954ea38456aacedbaf2ddfd37988 |
15-Dec-2011 |
Ken Sumrall <ksumrall@android.com> |
Fix to not return a bogus decryption error when a device is not encrypted. If there is filesystem damage on a non-encrypted device, and /data is not mountable, and if the device stores the keys in a file on a different partition (like on Crespo) then, vold would return an error which caused the crypto UI to present an option to the user to wipe the device because it assumed encryption had failed. This fixes it to not do that. Change-Id: Ibff6299787b45768416dbc4052de7db3b140b808
ryptfs.c
|
43b80c229bdee7f32654e2ec561078c5c94c8851 |
28-Oct-2011 |
Ed Heyl <ed@google.com> |
keep previous history after reset to mr1 plus aah changes (ics-aah-wip)
|
fab5f878acf4abd5b6b6a579011fa965795a81da |
26-Oct-2011 |
Ed Heyl <ed@google.com> |
undo reset to ics-mr1 until we have a better method
|
e029169812e6947b6fdbbc17263c2de9bd7164a1 |
26-Oct-2011 |
Ed Heyl <ed@google.com> |
reset to ics-mr1, but keep history
|
71189e7f31dad5ef31d7f250e76034b7b0b478fb |
25-Oct-2011 |
Steve Block <steveblock@google.com> |
am 8c487331: (-s ours) Rename LOG() to ALOG() DO NOT MERGE * commit '8c4873319a77c54cc198a4e5f4429099ff9da4f7': Rename LOG() to ALOG() DO NOT MERGE
|
8c4873319a77c54cc198a4e5f4429099ff9da4f7 |
12-Oct-2011 |
Steve Block <steveblock@google.com> |
Rename LOG() to ALOG() DO NOT MERGE See https://android-git.corp.google.com/g/#/c/141576 Bug: 5449033 Change-Id: Icc1c76abe506d53c07c7c3db526c6fa05f73988b
ogwrapper.c
|
3ad9072a5d6f6bda32123b367545649364e3c11d |
05-Oct-2011 |
Ken Sumrall <ksumrall@android.com> |
Add the new verifypw command to vold/cryptfs This vold command returns 0 if the given password matches the password used to decrypt the device on boot. It returns 1 if they don't match, and it returns -1 on an internal error, and -2 if the device is not encrypted. Also check the uid of the sender of the command and only allow the root and system users to issue cryptfs commands. Change-Id: I5e5ae3b72a2d7814ae68c2d49aa9deb90fb1dac5
ommandListener.cpp
esponseCode.h
ryptfs.c
ryptfs.h
|
3be890f59c04f94537f2f66f1d2841ed591f1a6e |
15-Sep-2011 |
Ken Sumrall <ksumrall@android.com> |
Fix cryptfs to work with a raw block device for key storage If a raw block is specified for key storage, do not try to force the size of the file to 16 Kbytes when writing the keys, and do not complain if the size is not 16 Kbytes when reading the keys. Only do them if the keyfile is a regular file. Change-Id: I4de1cb7c3614479d93289d4f2767ca6ce1bbbc73
ryptfs.c
|
0b8b59719357fb80c330442787f7d5b1e332263b |
01-Sep-2011 |
Ken Sumrall <ksumrall@android.com> |
Add the ability to revert a crypto mapping when unmounting a volume Add the force_and_revert option to the unmount command which will force the unmount, and revert a crypto mapping. This is used during factory reset so that when the internal sdcard volume is formatted, it formats the raw device, not the encrypted mapping. Change-Id: I36b6ff9bb54863b121de635472a303bf4a2334a9
ommandListener.cpp
irectVolume.cpp
irectVolume.h
olume.cpp
olume.h
olumeManager.cpp
olumeManager.h
ryptfs.c
ryptfs.h
|
e14fcf99b59954f3b2eb07a3724c078b80d58ffd |
18-Jul-2011 |
The Android Open Source Project <initial-contribution@android.com> |
Reconcile with gingerbread-release Change-Id: Ia9383258bc25f7a82628a1c7238140b810e2f3d3
|
5bf00e62a2995473140f4277f08ee8918a7fba26 |
14-Jul-2011 |
David 'Digit' Turner <digit@google.com> |
am 6c190fd3: am 137858b4: resolved conflicts for merge of 5284bcff to gingerbread-plus-aosp * commit '6c190fd326099d8315e194b0ad0a173e21146e14': Avoid array overrun. We can now mount the /sdcard partition on our boot sdcards
|
6c190fd326099d8315e194b0ad0a173e21146e14 |
14-Jul-2011 |
David 'Digit' Turner <digit@google.com> |
am 137858b4: resolved conflicts for merge of 5284bcff to gingerbread-plus-aosp * commit '137858b43b7e0ed46fb8ebce9230eb40f0a62432': Avoid array overrun. We can now mount the /sdcard partition on our boot sdcards
|
137858b43b7e0ed46fb8ebce9230eb40f0a62432 |
14-Jul-2011 |
David 'Digit' Turner <digit@google.com> |
resolved conflicts for merge of 5284bcff to gingerbread-plus-aosp Change-Id: I108a0c32efb5add1fec41bfe76f041971801d48d
|
81893259c97a0a5efb804387088f257ac4eb6296 |
12-Jul-2011 |
Jeff Brown <jeffbrown@google.com> |
Merge "Remove the simulator target from all makefiles. Bug: 5010576"
|
ea89f53387dc6451f6e2afc82b4c4bede5be6dc6 |
12-Jul-2011 |
Jeff Brown <jeffbrown@google.com> |
Remove the simulator target from all makefiles. Bug: 5010576 Change-Id: I7e531101ae057fb059d7d56c99433c4d66e866dc
ndroid.mk
|
6f0b430815e282214b6a4f1cc534114a0765480c |
12-Jul-2011 |
Ken Sumrall <ksumrall@android.com> |
Merge "Prevent sharing or formatting of a vold managed volumes during encryption."
|
3b17005083be230509480ea65ae67c237142fada |
12-Jul-2011 |
Ken Sumrall <ksumrall@android.com> |
Prevent sharing or formatting of a vold managed volumes during encryption. Mounting was already not allowed, but also unshare before starting encryption, and don't allow sharing or formatting to be initiated during encrytion. Change-Id: Ida188d81f025739ba4dd90492b3e66088735991e
olumeManager.cpp
olumeManager.h
ryptfs.c
|
396844d17ad81d326bbe60ce1fca98c3a45d33ba |
12-Jul-2011 |
Ken Sumrall <ksumrall@android.com> |
Merge "Fix to display the proper percentage complete during encryption."
|
128626fc5aa3bf12d1ae5981c7f84f63625e8972 |
29-Jun-2011 |
Ken Sumrall <ksumrall@android.com> |
Fix to display the proper percentage complete during encryption. Forgot to include the size of the userdata partition when computing the total size of vold managed volumes to encrypt. Change-Id: I237548439d4380b4225ffbc603fa972c3b1c5bae
ryptfs.c
|
a0272d2c18ff992f78d99d97ec9e9985b93d3b78 |
08-Jul-2011 |
android-merger <android-build@android.com> |
reset, and keep history
|
5284bcffed2788b26399bec7150831eb8d9da74f |
08-Jul-2011 |
David 'Digit' Turner <digit@google.com> |
merge intel x86 patches into gingerbread branch
|
52830522720525fb588201c5f309a6195785143b |
08-Jul-2011 |
The Android Open Source Project <initial-contribution@android.com> |
Reconcile with gingerbread-release Change-Id: I3cb3d915837ebe59c2d7007d71ef3a1f334e9b8b
|
1c55ddb75833b6bb6b7ebafd0fdf4f47596a4505 |
07-Jul-2011 |
android-merger <android-build@android.com> |
Revert "add bounds checking for mPartMinors[]" This reverts commit f3d3ce5e53ab7928f4c292c183c417a1bd051151.
irectVolume.cpp
|
cf7369a45845466dffba252d62364f49dfc3b30d |
07-Jul-2011 |
android-merger <android-build@android.com> |
Revert "vold: Enable the SO_PASSCRED socket option" This reverts commit c51920c82463b240e2be0430849837d6fdc5352e.
etlinkManager.cpp
|
507d31b86b38dffe7c60ca5c54b5e631f5a7cab3 |
12-Apr-2011 |
Joseph Lehrer <jlehrer@nvidia.com> |
vold: retry mounting partition Works around a race condition between the vold and MountService uevent handlers Change-Id: I71c92f2e9b92e1fefc192da166a91d81bc60e242 Signed-off-by: Mike Lockwood <lockwood@android.com>
irectVolume.cpp
olume.cpp
olume.h
|
9322b103a39ec370c077152faccb60c6b3e94b2c |
29-Jun-2011 |
Mike Lockwood <lockwood%android.com@gtempaccount.com> |
am 273d3549: am 2c9d8de7: Merge "Prevent buffer overflows." * commit '273d3549198d144331f3e502eeb1215417d72b16': Prevent buffer overflows.
|
273d3549198d144331f3e502eeb1215417d72b16 |
29-Jun-2011 |
Mike Lockwood <lockwood%android.com@gtempaccount.com> |
am 2c9d8de7: Merge "Prevent buffer overflows." * commit '2c9d8de79a0dd7f894c65777a197c86486aff96c': Prevent buffer overflows.
|
2c9d8de79a0dd7f894c65777a197c86486aff96c |
29-Jun-2011 |
Mike Lockwood <lockwood%android.com@gtempaccount.com> |
Merge "Prevent buffer overflows."
|
736910ca99a40b9add4353bf619e778c40938948 |
27-Jun-2011 |
Dianne Hackborn <hackbod@google.com> |
Add new vold call to get the path to an asec fs. Change-Id: Ife15628ed6e2493c9e85a2ade6d59a194fdddde5
ommandListener.cpp
olumeManager.cpp
olumeManager.h
|
092aa1c585fedd9e169eece41b8a471f1739908a |
01-Apr-2011 |
Peter Bohm <peter.m.bohm@sonyericsson.com> |
Prevent buffer overflows. To eliminate possible buffer overflows some strcpy, sprintf and strcat have been changed to strlcpy, snprintf and strlcat. Change-Id: Ieb9d4b600c894946a6492f8629ff39f2fcc106d3 Signed-off-by: Oskar Andero <oskar.andero@sonyericsson.com>
evmapper.cpp
oop.cpp
dc.c
|
97f2fc110b2ace7914671c2f5852379bd78922e4 |
07-Jun-2011 |
Mike Lockwood <lockwood@android.com> |
Update path for seting USB mass storage backing store Change-Id: I0e5fab1624e5ef5d2f55e2584d8adc1b6bab91b0 Signed-off-by: Mike Lockwood <lockwood@android.com>
olumeManager.cpp
|
6b715592ec94f9d75ca8119ace824ff729c104c2 |
18-Jun-2011 |
Mike Lockwood <lockwood@android.com> |
Merge "Remove obsolete code for monitoring USB status"
|
86bccb14d6db2435e0115b20e8e30f8200d06ef1 |
15-Jun-2011 |
Ken Sumrall <ksumrall@android.com> |
Merge "Don't abort the encryption process if an internal volume is present but unmounted."
|
319b1043bbbd410aa2d572d88b5936f26072d026 |
14-Jun-2011 |
Ken Sumrall <ksumrall@android.com> |
Don't abort the encryption process if an internal volume is present but unmounted. It is not a failure if the SD card is not mounted. Change-Id: If954f77c55ac124b9b7b39c89ffbafb4e5ea9e98
olume.cpp
olumeManager.cpp
olumeManager.h
ryptfs.c
|
5864fabc8bd407938835c18cefe059d45ca492af |
09-Jun-2011 |
Nick Kralevich <nnk@google.com> |
am 598e833d: am b20d54b2: Merge "fix double closing file descriptors" * commit '598e833d42a687259bc3c9a5a39ad9ba8b105cbb': fix double closing file descriptors
|
d11b833201ae72265d52d606fa084841b44e9a65 |
22-Jul-2010 |
Bruce Beare <brucex.j.beare@intel.com> |
Avoid array overrun. We can now mount the /sdcard partition on our boot sdcards Orig-Change-Id: I6e9db8c55db49b4aa61dd40cd59495f55e5b3368 Signed-off-by: Bruce Beare <brucex.j.beare@intel.com>
irectVolume.cpp
|
598e833d42a687259bc3c9a5a39ad9ba8b105cbb |
08-Jun-2011 |
Nick Kralevich <nnk@google.com> |
am b20d54b2: Merge "fix double closing file descriptors" * commit 'b20d54b2309adee8d192942015740735ded975d3': fix double closing file descriptors
|
b20d54b2309adee8d192942015740735ded975d3 |
08-Jun-2011 |
Nick Kralevich <nnk@google.com> |
Merge "fix double closing file descriptors"
|
a976656ff90291b9437a4d37b48e82abcd48195e |
07-Jun-2011 |
Mike Lockwood <lockwood@android.com> |
Remove obsolete code for monitoring USB status Change-Id: I8ac8900b3135f03b7717540b825ff6df76f31c0b Signed-off-by: Mike Lockwood <lockwood@android.com>
ommandListener.cpp
ommandListener.h
etlinkHandler.cpp
olumeManager.cpp
olumeManager.h
|
06aaa410962ec14cddcc8a6efed203a48cbd3653 |
06-Jun-2011 |
Robert CH Chou <Robert_CH_Chou@acer.com.tw> |
fix double closing file descriptors Change-Id: I243628b77a0b7b138785167ccb5520e1a9374a78
ogwrapper.c
|
29d8da8cefa99e436c13295d4c9bad060ca18a6d |
19-May-2011 |
Ken Sumrall <ksumrall@android.com> |
vold: allow to store key in a file on another partition Add support for keeping the keys in a separate file on another partition, for devices with no space reserved for a footer after the userdata filesystem. Add support for encrypting the volumes managed by vold, if they meet certain criteria, namely being marked as nonremovable and encryptable in vold.fstab. A bit of trickiness is required to keep vold happy. Change-Id: Idf0611f74b56c1026c45742ca82e0c26e58828fe
irectVolume.cpp
irectVolume.h
olume.cpp
olume.h
olumeManager.cpp
olumeManager.h
ryptfs.c
ryptfs.h
ain.cpp
|
10a9e42835e7a241e796fe1b9c159dbfb312a69d |
20-May-2011 |
The Android Open Source Project <initial-contribution@android.com> |
Reconcile with gingerbread-release honeycomb-release Change-Id: I70f4170b78ed5412a4addd3c603c8ff52c8cfa0d
|
93f032122f0d45d565f899cc4c8f229e4ee27e89 |
13-May-2011 |
The Android Automerger <android-build@android.com> |
merge in gingerbread-release history after reset to gingerbread
|
311e06bc72c3f8f1ee13c74f3be8c2126c8e0d27 |
09-May-2011 |
The Android Automerger <android-build@android.com> |
am 9496945d: (-s ours) am 4e00f1fa: Merge remote branch \'goog/honeycomb-mr2\' into honeycomb-LTE * commit '9496945d0ded76031cb129de65be425cfa971673': DO NOT MERGE Only create android_secure mountpoint on the primary external storage volume. DO NOT MERGE Mount secondary external storage writable by AID_MEDIA_RW rather than AID_SDCARD_RW
|
9496945d0ded76031cb129de65be425cfa971673 |
09-May-2011 |
The Android Automerger <android-build@android.com> |
am 4e00f1fa: Merge remote branch \'goog/honeycomb-mr2\' into honeycomb-LTE * commit '4e00f1fa4d4e82bba4afe1c2a21bf0a56b3a4c8f': DO NOT MERGE Only create android_secure mountpoint on the primary external storage volume. DO NOT MERGE Mount secondary external storage writable by AID_MEDIA_RW rather than AID_SDCARD_RW
|
4e00f1fa4d4e82bba4afe1c2a21bf0a56b3a4c8f |
09-May-2011 |
The Android Automerger <android-build@android.com> |
Merge remote branch 'goog/honeycomb-mr2' into honeycomb-LTE
|
31ab84f6a91cfbe216cbacbc2c137c1202d44c18 |
04-May-2011 |
Mike Lockwood <lockwood@android.com> |
am c13e0967: (-s ours) am 745ddcb2: DO NOT MERGE Only create android_secure mountpoint on the primary external storage volume. * commit 'c13e0967debb6b5a817004e9184e6d3466c42813': DO NOT MERGE Only create android_secure mountpoint on the primary external storage volume.
|
71bde5e706164d238b9d4346d59aab9bd675a108 |
04-May-2011 |
Mike Lockwood <lockwood@android.com> |
am 7877388b: (-s ours) am f4cd1c6b: DO NOT MERGE Mount secondary external storage writable by AID_MEDIA_RW rather than AID_SDCARD_RW * commit '7877388b6c65c4819e436141ccc519161b719bec': DO NOT MERGE Mount secondary external storage writable by AID_MEDIA_RW rather than AID_SDCARD_RW
|
c13e0967debb6b5a817004e9184e6d3466c42813 |
04-May-2011 |
Mike Lockwood <lockwood@android.com> |
am 745ddcb2: DO NOT MERGE Only create android_secure mountpoint on the primary external storage volume. * commit '745ddcb2a6247817dde0790be4c74a81e7b324d4': DO NOT MERGE Only create android_secure mountpoint on the primary external storage volume.
|
7877388b6c65c4819e436141ccc519161b719bec |
04-May-2011 |
Mike Lockwood <lockwood@android.com> |
am f4cd1c6b: DO NOT MERGE Mount secondary external storage writable by AID_MEDIA_RW rather than AID_SDCARD_RW * commit 'f4cd1c6b1912d2481334152f7dec50067960a90c': DO NOT MERGE Mount secondary external storage writable by AID_MEDIA_RW rather than AID_SDCARD_RW
|
745ddcb2a6247817dde0790be4c74a81e7b324d4 |
25-Mar-2011 |
Mike Lockwood <lockwood@android.com> |
DO NOT MERGE Only create android_secure mountpoint on the primary external storage volume. Change-Id: If2532ce8ca7d584f2442d830450313198234bd23 Signed-off-by: Mike Lockwood <lockwood@android.com>
olume.cpp
|
f4cd1c6b1912d2481334152f7dec50067960a90c |
23-Mar-2011 |
Mike Lockwood <lockwood@android.com> |
DO NOT MERGE Mount secondary external storage writable by AID_MEDIA_RW rather than AID_SDCARD_RW Change-Id: Id9a6fa6705cf97b94d419e85b5d74413e79fc748 Signed-off-by: Mike Lockwood <lockwood@android.com>
olume.cpp
|
3bcc2410f572691620647d79f0b4e96bba08c899 |
25-Mar-2011 |
Mike Lockwood <lockwood@android.com> |
DO NOT MERGE Only create android_secure mountpoint on the primary external storage volume. Change-Id: If21d134e7d8333b8214603a2d43a3153ab8760cc Signed-off-by: Mike Lockwood <lockwood@android.com>
olume.cpp
|
11a3922ec6d81d8e0c61f9edd243e145dc60b599 |
23-Mar-2011 |
Mike Lockwood <lockwood@android.com> |
DO NOT MERGE Mount secondary external storage writable by AID_MEDIA_RW rather than AID_SDCARD_RW Change-Id: Id65f76eacaec1787aa557f96447c5bc19b7b127f Signed-off-by: Mike Lockwood <lockwood@android.com>
olume.cpp
|
cc8e96c8dccea1e8041db3146d389175582d3890 |
30-Apr-2011 |
Nick Kralevich <nnk@google.com> |
DirectVolume: don't continue on invalid PARTN value Change-Id: I1e434c5b47b40fabaf1e702d7f2e43a88c0497dc
irectVolume.cpp
|
8bd9b3fcc65b50155b793495a6debf2263ed7d70 |
27-Apr-2011 |
Conley Owens <cco3@android.com> |
am 3368f167: am 9cb6e501: Ignore change "Set SO_PASSCRED on the uevent socket." in favor of change in internal tree. * commit '3368f167578fcd2ef024e6d8da723f349089fa7c': Set SO_PASSCRED on the uevent socket. (needed for change I393c21da)
|
3368f167578fcd2ef024e6d8da723f349089fa7c |
27-Apr-2011 |
Conley Owens <cco3@android.com> |
am 9cb6e501: Ignore change "Set SO_PASSCRED on the uevent socket." in favor of change in internal tree. * commit '9cb6e501f17ec2a511d942c833ea51a53bcd7249': Set SO_PASSCRED on the uevent socket. (needed for change I393c21da)
|
9cb6e501f17ec2a511d942c833ea51a53bcd7249 |
27-Apr-2011 |
Conley Owens <cco3@android.com> |
Ignore change "Set SO_PASSCRED on the uevent socket." in favor of change in internal tree. Change-Id: Ibdf7cf1e1d0ba177d9de813baa6481ddd31d5d9c
|
c840b382c560829938dd4f6b39d0a34c7961eaa5 |
27-Apr-2011 |
Conley Owens <cco3@android.com> |
Merge "Set SO_PASSCRED on the uevent socket. (needed for change I393c21da)"
|
5f6ae96bab32bcb2871359e2381498a9c0e52af9 |
25-Apr-2011 |
Vernon Tang <vt@foilhead.net> |
Set SO_PASSCRED on the uevent socket. (needed for change I393c21da) Change-Id: I09a8a6d7c654869a40339adce181e6b981f10369
etlinkManager.cpp
|
cf5af171190c26f62f23d45d0c653a4137b1b291 |
20-Apr-2011 |
Nick Kralevich <nnk@google.com> |
am b510cd4e: am 77992e71: vold: Enable the SO_PASSCRED socket option * commit 'b510cd4e8a480cbb01ff3175f2e99b11328ff88a': vold: Enable the SO_PASSCRED socket option
|
b510cd4e8a480cbb01ff3175f2e99b11328ff88a |
20-Apr-2011 |
Nick Kralevich <nnk@google.com> |
am 77992e71: vold: Enable the SO_PASSCRED socket option * commit '77992e713ceac377ed226b555685f99fcfeb2c14': vold: Enable the SO_PASSCRED socket option
|
77992e713ceac377ed226b555685f99fcfeb2c14 |
19-Apr-2011 |
Nick Kralevich <nnk@google.com> |
vold: Enable the SO_PASSCRED socket option Ensure that sender credentials are available when we receive a netlink message. This is a manual cherry-pick of c51920c82463b240e2be0430849837d6fdc5352e Change-Id: I98aff8733449617d35d20bff2fe77e9d3f22f57e
etlinkManager.cpp
|
a6456005885220d5b774ca384920578a47bd9728 |
19-Apr-2011 |
Nick Kralevich <nnk@google.com> |
am 46770e6e: am b9aa1459: am c51920c8: vold: Enable the SO_PASSCRED socket option * commit '46770e6ea0876797b9f6d93e838f3d73dc91917d': vold: Enable the SO_PASSCRED socket option
|
46770e6ea0876797b9f6d93e838f3d73dc91917d |
19-Apr-2011 |
Nick Kralevich <nnk@google.com> |
am b9aa1459: am c51920c8: vold: Enable the SO_PASSCRED socket option * commit 'b9aa145910e22ed97cb51545bf399e6289bca643': vold: Enable the SO_PASSCRED socket option
|
82baf904c6adc9ec2adad9d5acf76e053a50eb99 |
19-Apr-2011 |
Nick Kralevich <nnk@google.com> |
vold: Enable the SO_PASSCRED socket option Ensure that sender credentials are available when we receive a netlink message. Change-Id: I48411205a8fbc1ebd29834f64028662d80f15995
etlinkManager.cpp
|
b9aa145910e22ed97cb51545bf399e6289bca643 |
19-Apr-2011 |
Nick Kralevich <nnk@google.com> |
am c51920c8: vold: Enable the SO_PASSCRED socket option * commit 'c51920c82463b240e2be0430849837d6fdc5352e': vold: Enable the SO_PASSCRED socket option
|
c51920c82463b240e2be0430849837d6fdc5352e |
19-Apr-2011 |
Nick Kralevich <nnk@google.com> |
vold: Enable the SO_PASSCRED socket option Ensure that sender credentials are available when we receive a netlink message. Change-Id: I48411205a8fbc1ebd29834f64028662d80f15995
etlinkManager.cpp
|
f07eeb92fd2d0a4584f70a54e3a7efdccf85ac09 |
18-Apr-2011 |
Nick Kralevich <nnk@google.com> |
am 19df18af: am aecf0e2a: am f3d3ce5e: add bounds checking for mPartMinors[] * commit '19df18af24490f17e82758c38157750c67da245b': add bounds checking for mPartMinors[]
|
19df18af24490f17e82758c38157750c67da245b |
18-Apr-2011 |
Nick Kralevich <nnk@google.com> |
am aecf0e2a: am f3d3ce5e: add bounds checking for mPartMinors[] * commit 'aecf0e2a3dd1a72e448d9df7ed69533578dda12c': add bounds checking for mPartMinors[]
|
aecf0e2a3dd1a72e448d9df7ed69533578dda12c |
18-Apr-2011 |
Nick Kralevich <nnk@google.com> |
am f3d3ce5e: add bounds checking for mPartMinors[] * commit 'f3d3ce5e53ab7928f4c292c183c417a1bd051151': add bounds checking for mPartMinors[]
|
f3d3ce5e53ab7928f4c292c183c417a1bd051151 |
18-Apr-2011 |
Nick Kralevich <nnk@google.com> |
add bounds checking for mPartMinors[] Change-Id: I6d5b26756c8434d6396f3535252608ce61eabfd8
irectVolume.cpp
|
850949485b390c0928ea2f4a7db47be73bebb718 |
25-Mar-2011 |
Mike Lockwood <lockwood@android.com> |
Only create android_secure mountpoint on the primary external storage volume. Change-Id: I4069297a799260b8ecf355e91a1594b4f03126af Signed-off-by: Mike Lockwood <lockwood@android.com>
olume.cpp
|
9092b1dbd31406f6939045fbef70a297b8dbeb62 |
23-Mar-2011 |
Mike Lockwood <lockwood@android.com> |
Mount secondary external storage writable by AID_MEDIA_RW rather than AID_SDCARD_RW Change-Id: I8bb658bb2ab66026f0a54f9c1f80fc5c6e8d918a Signed-off-by: Mike Lockwood <lockwood@android.com>
olume.cpp
|
ad2ac33460d6ee1436b68bab1f820e3b6d3efeb4 |
09-Mar-2011 |
Ken Sumrall <ksumrall@android.com> |
Load persistent properties after mounting an encrypted /data partition. Fix for bug 3415286. Trigger an action in init.rc to load the persistent properties after /data has been decrypted and mounted. Change-Id: I5fe3b481bcc6963113e830728c204b22ffc3b722
ryptfs.c
|
c290eaf6852c6318584926c5e39b27672638891f |
08-Mar-2011 |
Ken Sumrall <ksumrall@android.com> |
Teach vold to use the new android_reboot() function. The new android_reboot() function is a nicer way to reboot. It can optionally sync(2) and remount as read-only writable filesystems. This fixes bug 3350709. Change-Id: I4618bd5e8cccdce08494a7ca3f40ef72b2875e68
ryptfs.c
|
cd235da6fb36a5c7c90faf91e7d65a587f146f92 |
15-Feb-2011 |
Ken Sumrall <ksumrall@android.com> |
Enable detection of failed encryption process, for bug 3384231. Need to detect if the encryption process didn't finish successfully, and if so, provide a way for the UI to detect that and give the user an option to wipe the system clean. Otherwise, the user is stuck in a reboot loop, and they will need to do magic button presses to enter recovery and wipe the device to get out of it. Change-Id: I58253e1e523ee42bdd1a59aa7d8a9d20071bd18b
ryptfs.c
|
4dd1cbf09b3cfc0f60fbd73a834dd581f16a084d |
05-Feb-2011 |
The Android Automerger <android-build@android.com> |
merge in honeycomb-release history after reset to honeycomb
|
906b81d74c366717cd6896d8076116878784cb3e |
05-Feb-2011 |
The Android Automerger <android-build@android.com> |
merge in honeycomb-release history after reset to honeycomb
|
124a0d262edb6354b71306eb130f240231fb3901 |
05-Feb-2011 |
The Android Automerger <android-build@android.com> |
merge in honeycomb-release history after reset to honeycomb
|
bc1a67d54bf5dafd5a36cf7f70059dd3ceb02361 |
04-Feb-2011 |
The Android Automerger <android-build@android.com> |
merge in honeycomb-release history after reset to honeycomb
|
49f0e57ecc6168fc82ec45a11b752f971b7c6e3a |
04-Feb-2011 |
The Android Automerger <android-build@android.com> |
merge in honeycomb-release history after reset to honeycomb
|
946666311f10863d99cf19b0250e16ff3eba893d |
04-Feb-2011 |
The Android Automerger <android-build@android.com> |
merge in honeycomb-release history after reset to honeycomb
|
ad8ed7376893fb7451f4d70a41e434898f03f896 |
04-Feb-2011 |
The Android Automerger <android-build@android.com> |
merge in honeycomb-release history after reset to honeycomb
|
faad095abc2ff258a053bba637523794fdf0ddb1 |
03-Feb-2011 |
The Android Automerger <android-build@android.com> |
merge in honeycomb-release history after reset to honeycomb
|
07ecb8d797c82212e58bbeda49e4793fcbc5bb3f |
03-Feb-2011 |
The Android Automerger <android-build@android.com> |
merge in honeycomb-release history after reset to honeycomb
|
9726aabbde8ff52819c6f6f1b6e27cd084f28e50 |
03-Feb-2011 |
The Android Automerger <android-build@android.com> |
merge in honeycomb-release history after reset to honeycomb
|
057424a224b3efcfcf3066419f33254c6b7e1e14 |
02-Feb-2011 |
The Android Automerger <android-build@android.com> |
merge in honeycomb-release history after reset to honeycomb
|
352d3f9a0987a75ddddb7b3ded1ed41dfa0b572a |
02-Feb-2011 |
Kenny Root <kroot@google.com> |
am 18ed5640: Merge "Use LOOP_GET_STATUS64 for checking loop devices" into honeycomb * commit '18ed56400bb6ae999712ba70af385100d0cd6e55': Use LOOP_GET_STATUS64 for checking loop devices
|
18ed56400bb6ae999712ba70af385100d0cd6e55 |
02-Feb-2011 |
Kenny Root <kroot@google.com> |
Merge "Use LOOP_GET_STATUS64 for checking loop devices" into honeycomb
|
06c6baf3afaa3d40cbab21d22b91f0aa99778b52 |
02-Feb-2011 |
Ken Sumrall <ksumrall@android.com> |
am 7f7dbaa2: Improve detection of incomplete encryption * commit '7f7dbaa2784c10fd2989fb303e5edfb8136d53dc': Improve detection of incomplete encryption
|
7c16502dbc16658c45165edb1c54df6b8b02d9ca |
02-Feb-2011 |
Kenny Root <kroot@google.com> |
Use LOOP_GET_STATUS64 for checking loop devices To determine whether a loop device was available, we use an ioctl call to LOOP_GET_STATUS, but this fails on devices with large storage partitions with errno = EOVERFLOW. Instead use LOOP_GET_STATUS64 which succeeds. Bug: 3412121 Change-Id: Ica3cb48885d3555f2d27073c00e31fc51a08c730
oop.cpp
|
7f7dbaa2784c10fd2989fb303e5edfb8136d53dc |
02-Feb-2011 |
Ken Sumrall <ksumrall@android.com> |
Improve detection of incomplete encryption Bug 3384231 is punted to MR1, but the code to set the flag is already in the tree, so this CL does 3 things: 1. Comments out the lines that set the flag 2. Removes the change to the checkpw that was added in the last change. 3. Implements a new command to check the flag (which no one is calling yet and the flag won't be set anyhow). When MR1 comes, it will be a simple matter to enable the flag setting code and start testing it. The fear is a false positive detection of incomplete encryption could cause people to be prompted to wipe their data when MR1 comes out and the flag is checked. Not setting this for first release, and testing this more before MR1, will give us confidence that the code will not detect false positives of encryption failure. Change-Id: I6dfba11646e291fe5867e8375b71a53c815f3968
ommandListener.cpp
ryptfs.c
ryptfs.h
|
71fac1e011f54018144a511cfae182f28ca57940 |
01-Feb-2011 |
Ken Sumrall <ksumrall@android.com> |
am d33d417e: Detect when encryption failed to complete * commit 'd33d417e3a057fffad22c23f5f002177531db2a5': Detect when encryption failed to complete
|
999ff5ca6168ba6560dc75f88da1dc24bc4d9713 |
01-Feb-2011 |
The Android Automerger <android-build@android.com> |
merge in honeycomb-release history after reset to honeycomb
|
d33d417e3a057fffad22c23f5f002177531db2a5 |
01-Feb-2011 |
Ken Sumrall <ksumrall@android.com> |
Detect when encryption failed to complete For the case there encryption failes to complete because of a kernel crash or the user power cycling the device, define a flag in the crypto footer that says encryption is in progress. Set it when starting the actual encryption, and clear it when it successfully completes. When the user is asked for the disk password, if the flag is set, return a special error to the caller so the UI can know to tell the user there is no valid data on the disk, and present a button to wipe and reset the device. Change-Id: I3723ec77f33437d94b3ac9ad5db0a5c950d11648
ryptfs.c
ryptfs.h
|
e16044bf34e72d858624a062555b88c38f29be05 |
01-Feb-2011 |
The Android Automerger <android-build@android.com> |
merge in honeycomb-release history after reset to honeycomb
|
3f0c0a28f3a1212a2cfdb4268f3f39492aad1a78 |
31-Jan-2011 |
Ken Sumrall <ksumrall@android.com> |
am 5d4c68e4: Have vold grab a partial wakelock when encrypting * commit '5d4c68e40700424b65a4331be75620706a0dd49c': Have vold grab a partial wakelock when encrypting
|
5d4c68e40700424b65a4331be75620706a0dd49c |
31-Jan-2011 |
Ken Sumrall <ksumrall@android.com> |
Have vold grab a partial wakelock when encrypting The Progress bar UI grabs a full wakelock when encrypting, but we've seen a case where it looks like the progress bar UI crashes, and the wakelock is lost, and then all hell breaks loose. The enablecrypto command has a lot of work to do, and it will take some time, so it should grab a wakelock to ensure it can finish without being interrupted and put to sleep. It grabs a partial wake lock, as it doesn't need the screen to be on to do its work. If the UI wants to keep it on, it should also grab a full wakelock, which it does. If the UI crashes, the screen may turn off, but the encryption will keep going, and vold will reboot the device when it's done. Change-Id: I51d3a72b8c77383044a3facb1604c1ee510733ae
ndroid.mk
ryptfs.c
|
1d3c186f88e1bbc8d3fdda8a9001d36e3e145339 |
30-Jan-2011 |
The Android Automerger <android-build@android.com> |
merge in honeycomb-release history after reset to honeycomb
|
e30abd4fb27002e6c27226fc373050a22378ef78 |
30-Jan-2011 |
The Android Automerger <android-build@android.com> |
merge in honeycomb-release history after reset to honeycomb
|
7cb0f59b2090b847204ad1af7cbe68c187d796bc |
30-Jan-2011 |
Ken Sumrall <ksumrall@android.com> |
am 3f476690: Merge "Don\'t try to encrypt in place a filesystem that is too large and return proper errors" into honeycomb * commit '3f476690eaef3b824255813ed335284ef9a90e91': Don't try to encrypt in place a filesystem that is too large and return proper errors
|
3f476690eaef3b824255813ed335284ef9a90e91 |
30-Jan-2011 |
Ken Sumrall <ksumrall@android.com> |
Merge "Don't try to encrypt in place a filesystem that is too large and return proper errors" into honeycomb
|
939ec42d3c538fb34d1186ed456381a2287e16ca |
29-Jan-2011 |
Jason parks <jparks@google.com> |
am 70a4b3fd: Change cryptfs changepw to only require a new password. * commit '70a4b3fd7a84a84bbe6e9d6d4ca3ee2098259fd9': Change cryptfs changepw to only require a new password.
|
3ed8236de11a1be8b45d4c37b2208682f5e97c72 |
29-Jan-2011 |
Ken Sumrall <ksumrall@android.com> |
Don't try to encrypt in place a filesystem that is too large and return proper errors If the already existing filesystem encompasses the entire /data partition and does not leave the last 16 Kbytes for the crypto footer, refuse to do encrypt in place and return an error. This is only an issue for folks with early development systems trying to encrypt an old /data. This should not be seen in released devices. Also, if there is an error, try to report back to the UI what the error was so it can deal with it. Change-Id: If66781a4fe03034c96c3dd12075240deb8663db0
ndroid.mk
ryptfs.c
|
ca279296da47287ccd5ae8e0bc1d21ffb9714abe |
29-Jan-2011 |
The Android Automerger <android-build@android.com> |
merge in honeycomb-release history after reset to honeycomb
|
70a4b3fd7a84a84bbe6e9d6d4ca3ee2098259fd9 |
28-Jan-2011 |
Jason parks <jparks@google.com> |
Change cryptfs changepw to only require a new password. The master key is now stored unhashed in memory. This is needed because certain operation like remote reseting of passwords the old password is not avaliable. The changepw interface has been changed to only take the new password as the only argument. When this is called we reencrypt the master key with the new password and old salt. Bug: 3382129 Change-Id: I9a596b89013194605d6d7790067691aa0dc75e72
ommandListener.cpp
ryptfs.c
ryptfs.h
|
959a21c78d171d36bb906dcceaa8ed9ee339d393 |
28-Jan-2011 |
The Android Automerger <android-build@android.com> |
merge in honeycomb-release history after reset to honeycomb
|
de9d2237be7590a4ca10bd909734a68cc4996e48 |
27-Jan-2011 |
The Android Automerger <android-build@android.com> |
merge in honeycomb-release history after reset to honeycomb
|
b16f6ab0f940c491d535247367eccfddd4a0d43a |
26-Jan-2011 |
The Android Automerger <android-build@android.com> |
merge in honeycomb-release history after reset to honeycomb
|
ce99c90b541f30abecd4e6ca3fca66b9feefc0b4 |
25-Jan-2011 |
The Android Automerger <android-build@android.com> |
merge in honeycomb-release history after reset to honeycomb
|
bb9acd5783de6d31a97632d38740d009ef71c71e |
24-Jan-2011 |
The Android Automerger <android-build@android.com> |
merge in honeycomb-release history after reset to honeycomb
|
d805ede34e192e7a520d493e975b3b3c282baa76 |
23-Jan-2011 |
The Android Automerger <android-build@android.com> |
merge in honeycomb-release history after reset to honeycomb
|
7c536b7d8b1580e502f2fa80c2ca5685e3dcf159 |
22-Jan-2011 |
The Android Automerger <android-build@android.com> |
merge in honeycomb-release history after reset to honeycomb
|
ab593e8e504876d513f5981a77695f02533ff4f7 |
21-Jan-2011 |
Jason parks <jparks@google.com> |
Always return success if the command was run. The caller will check the result code for success. This prevents a exception from being thrown when the result code needs to be propagated to the caller. Change-Id: I471e8d6eb6f339c6f4e40f47adf60d20f6a70974
ommandListener.cpp
|
bc281ee9312d01e654b2176ac6e747a3c3ca2829 |
21-Jan-2011 |
Jason parks <jparks@google.com> |
am 0167cb15: Always return success if the command was run. * commit '0167cb15935592deea9abbd6a8bbe904e27bd101': Always return success if the command was run.
|
0167cb15935592deea9abbd6a8bbe904e27bd101 |
21-Jan-2011 |
Jason parks <jparks@google.com> |
Always return success if the command was run. The caller will check the result code for success. This prevents a exception from being thrown when the result code needs to be propagated to the caller. Change-Id: I471e8d6eb6f339c6f4e40f47adf60d20f6a70974
ommandListener.cpp
|
2137c849a00c98130d9ac6ca5b9572bc66b56c5e |
19-Jan-2011 |
Ken Sumrall <ksumrall@android.com> |
am e8744070: Create and use a salt when calling pbkdf2 to encrypt/decrypt the master key. * commit 'e87440703663f5ee326326f6438f3b00ea315623': Create and use a salt when calling pbkdf2 to encrypt/decrypt the master key.
|
e11337370855cb21d77537ee8281a0e9d151eb7c |
19-Jan-2011 |
Ken Sumrall <ksumrall@android.com> |
am 0cc16638: Verify that it\'s OK to run the various cryptfs commands * commit '0cc166385a7e1d3026bbcb62f094e419f779e872': Verify that it's OK to run the various cryptfs commands
|
e87440703663f5ee326326f6438f3b00ea315623 |
19-Jan-2011 |
Ken Sumrall <ksumrall@android.com> |
Create and use a salt when calling pbkdf2 to encrypt/decrypt the master key. In order to prevent rainbow table attacks on decrypting the master key, create a 16 byte "salt" by reading /dev/urandom. This is done right after reading urandom to get the master key for the filesystem. The salt is stored 32 bytes after the end of the key (a padding added to help prevent accidental overwriting of the salt) and the salt is fixed at 16 bytes long. This change will make existing encrypted filesystems unusable. Change-Id: I420549d064c61d38aea78eef4d86c88acb265ca3
ryptfs.c
ryptfs.h
|
694bc70d4237ffd62680d463f93425c48138ac60 |
19-Jan-2011 |
Ken Sumrall <ksumrall@android.com> |
am 7df84120: Don\'t wait for the framework to come up before starting to encrypt in place. * commit '7df84120b25dca713f623528801385b00208c2aa': Don't wait for the framework to come up before starting to encrypt in place.
|
0cc166385a7e1d3026bbcb62f094e419f779e872 |
19-Jan-2011 |
Ken Sumrall <ksumrall@android.com> |
Verify that it's OK to run the various cryptfs commands Maintain and query some internal state to know if it's OK to run the various cryptfs commands. Do not allow enablecrypto to run if the device is already encrypted. Do no allow restart to run if we have already run it before or if the password has not been validated. Do not allow checkpw to run if not encrypted, or it has already validated the password. This is an extra layer of safety on top of the checks up in the UI code agains possible DoS attacks on the device. Change-Id: I9afc8d42773020e82a512e6b637feede101d1362
ryptfs.c
|
7df84120b25dca713f623528801385b00208c2aa |
18-Jan-2011 |
Ken Sumrall <ksumrall@android.com> |
Don't wait for the framework to come up before starting to encrypt in place. Also, change the value that triggers the progress bar framework from "startup" to "0" in the property vold.encrypt_progress. Change-Id: I3890e66a95283ce2ceeca82f516859b083919b9e
ryptfs.c
|
e23667fa00892c874ee0a57550a3869b1ecd6f5a |
18-Jan-2011 |
Ken Sumrall <ksumrall@android.com> |
am 57b63e61: Minor tweaks to logging for the cryptfs changepw command. * commit '57b63e61cb41e377708a4fdf18ecc80eb1b2b521': Minor tweaks to logging for the cryptfs changepw command.
|
57b63e61cb41e377708a4fdf18ecc80eb1b2b521 |
18-Jan-2011 |
Ken Sumrall <ksumrall@android.com> |
Minor tweaks to logging for the cryptfs changepw command. Change-Id: I87ff9788a56de6d461002407bf6c3cd4c6f900ee
ommandListener.cpp
ryptfs.c
|
934dfed05d9a840103834a54636b250c9b7ec3cb |
18-Jan-2011 |
Ken Sumrall <ksumrall@android.com> |
am 8ddbe40a: Updates to cryptfs framework. * commit '8ddbe40a8a8708dac7c472fa8c098c8f7b24534c': Updates to cryptfs framework.
|
8ddbe40a8a8708dac7c472fa8c098c8f7b24534c |
18-Jan-2011 |
Ken Sumrall <ksumrall@android.com> |
Updates to cryptfs framework. Update the enable inplace API to allow the UI to show a progress bar. Add new command changepw (whichis currently not working) Internal restructuring of code to support these two features. Some minor cleanup of the code as well. Change-Id: I11461fc9ce66965bea6cd0b6bb2ff48bcf607b97
ommandListener.cpp
ryptfs.c
ryptfs.h
|
3b3b89e07c328c9b3b5de870ac5f4836dc468758 |
17-Jan-2011 |
Ken Sumrall <ksumrall@android.com> |
am 6864b7ec: Change the cryptfs command to separate out checking the password and restarting * commit '6864b7ec94a57b73c300457955d86dc604aeddf5': Change the cryptfs command to separate out checking the password and restarting
|
6864b7ec94a57b73c300457955d86dc604aeddf5 |
15-Jan-2011 |
Ken Sumrall <ksumrall@android.com> |
Change the cryptfs command to separate out checking the password and restarting In order to make the animations and the UI look right, we need to change the cryptfs checkpw command to return a status if the password was correct or not, and not have it automatically restart if it's correct. There is a new command restart that will restart the framework with the encrypted filesystem. Change-Id: Ia8ae00d7ed8667699aa58d05ad8ba953cca9316e
ommandListener.cpp
ryptfs.c
ryptfs.h
|
eed82c368b270446006e962ab83ba7f97fd3a57f |
14-Jan-2011 |
Ken Sumrall <ksumrall@android.com> |
am 2eaf7138: Cleanup a few issues with the cryptfs code. * commit '2eaf7138528d30c331d83ab8346a97e66b5499e2': Cleanup a few issues with the cryptfs code.
|
2eaf7138528d30c331d83ab8346a97e66b5499e2 |
14-Jan-2011 |
Ken Sumrall <ksumrall@android.com> |
Cleanup a few issues with the cryptfs code. Now that the framework shuts down quickly, remove the 30 second sleep when enabling crypto. Also, stop spewing the secret master key to the disk in the system log! Change-Id: Icb3f9456ababe3dff8de52cbbae92da0e9e5dd2f
ryptfs.c
|
5fb760a63ca3b8a2b282b8c642508d998706bbd0 |
09-Jan-2011 |
Wink Saville <wink@google.com> |
Revert "Change constructor to match new definition of the superclass" This reverts commit 499806cd60cd45b8cc9ae669b3d49507e04ffc0f.
etlinkHandler.cpp
|
499806cd60cd45b8cc9ae669b3d49507e04ffc0f |
27-Dec-2010 |
Stan Chesnutt <chesnutt@google.com> |
Change constructor to match new definition of the superclass Change-Id: I3526b1920817c2a28ac3e84c1ea278932a9ec895
etlinkHandler.cpp
|
8f869aa1bc685b505c58e97b4e11a9c7491a16f9 |
03-Dec-2010 |
Ken Sumrall <ksumrall@android.com> |
Support for encrypting /data on Stingray. There are still a few hacks and performance issues related to shutting down the framework in this code, but it is functional and tested. Without the UI changes, it requires cryptic adb shell commands to enable, which I shall not utter here. Change-Id: I0b8f90afd707e17fbdb0373d156236946633cf8b
ndroid.mk
ommandListener.cpp
ommandListener.h
ryptfs.c
ryptfs.h
|
3c9a73f643f7c782bdd326f628eeea97bec42ae8 |
11-Dec-2010 |
Mike Lockwood <lockwood@android.com> |
Stifle "Ignoring unknown switch" logging Change-Id: I9770ab880f379e2f7f6a93d3c84990edec60a116 Signed-off-by: Mike Lockwood <lockwood@android.com>
olumeManager.cpp
|
905ed1fbd34ecb537c8c89affa6fae7c592029dc |
20-Nov-2010 |
Jean-Baptiste Queru <jbq@google.com> |
am c1d80272: am 08da5c1f: Merge "vold: replace strsep by strtok_r" * commit 'c1d80272b117cf837de93fadd8d456d89a203e2f': vold: replace strsep by strtok_r
|
c1d80272b117cf837de93fadd8d456d89a203e2f |
20-Nov-2010 |
Jean-Baptiste Queru <jbq@google.com> |
am 08da5c1f: Merge "vold: replace strsep by strtok_r" * commit '08da5c1f17afefe3c9f4f4d4456c5757dede62e1': vold: replace strsep by strtok_r
|
08da5c1f17afefe3c9f4f4d4456c5757dede62e1 |
20-Nov-2010 |
Jean-Baptiste Queru <jbq@google.com> |
Merge "vold: replace strsep by strtok_r"
|
74ca25a716a060b4f676277262d112b569c5fbd2 |
15-Nov-2010 |
Jinho You <l04f3rs@gmail.com> |
vold: replace strsep by strtok_r It permits more white spaces between words in vold.fstab. Change-Id: I38250c3dcc860643e4f102e980fe844693a1451a
ain.cpp
|
2996451f777bd8fb00eeb45ccbb1dd57fc0fbe06 |
19-Nov-2010 |
Jean-Baptiste Queru <jbq@google.com> |
am 1206e872: resolved conflicts for merge of 09f774b7 to gingerbread-plus-aosp * commit '1206e872ce74aab253c39c3547bfaadc5e1f6011': vold: fix an offset one bug that makes partition 4 unusable vold: set state back to idle on formatting error
|
1206e872ce74aab253c39c3547bfaadc5e1f6011 |
19-Nov-2010 |
Jean-Baptiste Queru <jbq@google.com> |
resolved conflicts for merge of 09f774b7 to gingerbread-plus-aosp Change-Id: I103db47198ad09783aa6539cde271df0fdb9c594
|
09f774b7d3ad4e4205485b6997d44f7edd084598 |
18-Nov-2010 |
Jean-Baptiste Queru <jbq@google.com> |
Merge changes Ic8e18e61,I62c78eb8 * changes: vold: fix an offset one bug that makes partition 4 unusable vold: set state back to idle on formatting error
|
def8f3168305cc57803f1e9aafd8ed6d8e93067d |
17-Nov-2010 |
Chih-Wei Huang <cwhuang@linux.org.tw> |
vold: fix an offset one bug that makes partition 4 unusable Change-Id: Ic8e18e6191ad7ee33162e36060b57a6802cf0883
irectVolume.cpp
|
37dcda68d334f70e1f7f69a9817def65fe3ee717 |
16-Nov-2010 |
Olivier Bailly <olivier@google.com> |
Add missing include headers for compilation on Intel target for Google TV. Change-Id: I9f71b5e871671d1d64ad37f78a8944653409b8e1
ommandListener.cpp
evmapper.cpp
at.cpp
oop.cpp
etlinkHandler.cpp
olume.cpp
|
64382de1f93b84ca59f607da4b4fdbd77f1af67d |
16-Nov-2010 |
Chih-Wei Huang <cwhuang@linux.org.tw> |
vold: set state back to idle on formatting error On formatting error due to some reasons, the state is left at Formatting, therefore the user is unable to mount the sdcard again. The patch sets the state to Idle no matter formatting error or not. Change-Id: I62c78eb8299cc397ee5cc442890f8b3dbf09425c
olume.cpp
|
92c243afae15567f166d0059db5aff13b8849596 |
29-Oct-2010 |
Mike Lockwood <lockwood@google.com> |
am a28056b3: Set VM dirty ratio to zero when UMS is active * commit 'a28056b38275003895ff5d9576681aca01544822': Set VM dirty ratio to zero when UMS is active
|
a28056b38275003895ff5d9576681aca01544822 |
28-Oct-2010 |
Mike Lockwood <lockwood@google.com> |
Set VM dirty ratio to zero when UMS is active Improves UI responsiveness when copying large amount of data to the device. BUG: 3131847 Change-Id: I4aa5ade7e2cd7e5110c8f0f7ee43bdc57577e11d Signed-off-by: Mike Lockwood <lockwood@google.com>
olumeManager.cpp
olumeManager.h
|
456b7e6a99b105ee5d58e592930536598713f390 |
01-Oct-2010 |
Kenny Root <kroot@google.com> |
am 918e5f9f: Better error code for unmounting not-mounted volumes Merge commit '918e5f9f10b9c1ff929683743ffbf229027ce240' into gingerbread-plus-aosp * commit '918e5f9f10b9c1ff929683743ffbf229027ce240': Better error code for unmounting not-mounted volumes
|
918e5f9f10b9c1ff929683743ffbf229027ce240 |
01-Oct-2010 |
Kenny Root <kroot@google.com> |
Better error code for unmounting not-mounted volumes ENOENT is more descriptive than the generic error that EINVAL gets turned into. Then we can actually treat it how we want on the other side. Change-Id: I9b4f3be6308e13f680eae368d2167ab9ee6aae5f
olumeManager.cpp
|
45f22ad121117cf2acf9a7b8f5e4a5e6c80fdd59 |
26-Sep-2010 |
Kenny Root <kroot@google.com> |
am cbacf78e: Track type of container mounted Merge commit 'cbacf78eff70bd43bb899e164ec2ab409bc0904c' into gingerbread-plus-aosp * commit 'cbacf78eff70bd43bb899e164ec2ab409bc0904c': Track type of container mounted
|
cbacf78eff70bd43bb899e164ec2ab409bc0904c |
25-Sep-2010 |
Kenny Root <kroot@google.com> |
Track type of container mounted OBB and ASEC are tracked in the same active container list, but when it comes time to unmount everything, it was trying to unmount the OBBs according to ASEC rules. This led to the OBB not being unmounted and the volume unmount failing. Change-Id: I12c1d4d387b8022185d552b63edd61a50b9c0fc3
olumeManager.cpp
olumeManager.h
|
9b46bebd2c7011ff24e999e509f1e137ce6d52ec |
21-Sep-2010 |
Mike Lockwood <lockwood@android.com> |
am a4886f1f: More fixes for internal FAT partitions: Merge commit 'a4886f1f8ed72e24a302a91a0ab18bc54b6f585e' into gingerbread-plus-aosp * commit 'a4886f1f8ed72e24a302a91a0ab18bc54b6f585e': More fixes for internal FAT partitions:
|
a4886f1f8ed72e24a302a91a0ab18bc54b6f585e |
21-Sep-2010 |
Mike Lockwood <lockwood@android.com> |
More fixes for internal FAT partitions: Fix formatting partitions beyond the first partition. Do not try to initialize the MBR when formatting only a single partition. Change-Id: Ifbbd279b1c288b7b1b884a1a89248e3086ed735f Signed-off-by: Mike Lockwood <lockwood@android.com>
irectVolume.h
olume.cpp
olume.h
|
08cd8f76bfa9c01a73e2e2f2e003cf866938c60c |
20-Sep-2010 |
Brad Fitzpatrick <bradfitz@android.com> |
am 1b15d463: Add some missing closes on error conditions. Merge commit '1b15d463d4816fc084767cbeda3ee69ff5527545' into gingerbread-plus-aosp * commit '1b15d463d4816fc084767cbeda3ee69ff5527545': Add some missing closes on error conditions.
|
1b15d463d4816fc084767cbeda3ee69ff5527545 |
20-Sep-2010 |
Brad Fitzpatrick <bradfitz@android.com> |
Add some missing closes on error conditions. Also, some formatting fixes to get back into line with netd's copy of logwrapper.c. Change-Id: Id471b99e9c3c8c9bb0890ca0d5e1567125e35bd7
ogwrapper.c
|
3374b41f1fea95dab455f565e6fc6db456bddc8b |
18-Sep-2010 |
Mike Lockwood <lockwood@android.com> |
am 2dfe297e: Fixes for devices with internal FAT file system: Merge commit '2dfe297ec47559dbe2297a72bea71cf515c03797' into gingerbread-plus-aosp * commit '2dfe297ec47559dbe2297a72bea71cf515c03797': Fixes for devices with internal FAT file system:
|
2dfe297ec47559dbe2297a72bea71cf515c03797 |
18-Sep-2010 |
Mike Lockwood <lockwood@android.com> |
Fixes for devices with internal FAT file system: Only share a single partition via UMS if a specific partition is specified in vold.fstab (rather than "auto") Do not fail to reformat if MBR cannot be found. Change-Id: I544ca2ee325c308af656ab9f4732c788a964c156 Signed-off-by: Mike Lockwood <lockwood@android.com>
irectVolume.cpp
irectVolume.h
olume.cpp
olume.h
olumeManager.cpp
|
90d92f11ab27d1748d13ea3e48fee114e218833c |
02-Sep-2010 |
Kenny Root <kroot@google.com> |
am a3e06084: Allow execute on mounted ASEC and OBB containers Merge commit 'a3e06084564c86ff618c40f185f3676b8b629b94' into gingerbread-plus-aosp * commit 'a3e06084564c86ff618c40f185f3676b8b629b94': Allow execute on mounted ASEC and OBB containers
|
a3e06084564c86ff618c40f185f3676b8b629b94 |
27-Aug-2010 |
Kenny Root <kroot@google.com> |
Allow execute on mounted ASEC and OBB containers This allows us to place shared libraries in these containers which may only be loaded if they are executable. Change-Id: I78fa9ab6d5c58ec8b98c40004da72aebc0aade2a
at.cpp
at.h
olume.cpp
olumeManager.cpp
|
2c7d5761d28c39c8e40bf06874f2f5ca92f726d0 |
30-Aug-2010 |
Ethan <ethan.too@gmail.com> |
am 75a3e1a9: VOLD - make volume daemon to handle state change from shared to no_media Merge commit '75a3e1a95af0a2790de1b12aeca0008bfdc61649' into gingerbread-plus-aosp * commit '75a3e1a95af0a2790de1b12aeca0008bfdc61649': VOLD - make volume daemon to handle state change from shared to no_media
|
75a3e1a95af0a2790de1b12aeca0008bfdc61649 |
21-Jul-2010 |
Ethan <ethan.too@gmail.com> |
VOLD - make volume daemon to handle state change from shared to no_media When volume state changed from shared to no_media, volume is not properly unshared. Change-Id: I0117d67da95440d982275746a166ef6f4ac1c0e2 Signed-off-by: Ethan <ethan.too@gmail.com>
irectVolume.cpp
|
582677b50c012f2683e706d26fc69e0c02b634c7 |
29-Jul-2010 |
Jean-Baptiste Queru <jbq@google.com> |
am 826bec79: Merge "vold: remove unnecessary code from VolumeManager::unshareVolume()" Merge commit '826bec79ea253505813d125700a12816e2c3bc0f' into gingerbread-plus-aosp * commit '826bec79ea253505813d125700a12816e2c3bc0f': vold: remove unnecessary code from VolumeManager::unshareVolume()
|
826bec79ea253505813d125700a12816e2c3bc0f |
29-Jul-2010 |
Jean-Baptiste Queru <jbq@google.com> |
Merge "vold: remove unnecessary code from VolumeManager::unshareVolume()"
|
8f295e9deef5db5a7853e3048b595deca0b54248 |
29-Jul-2010 |
Bruce Beare <brucex.j.beare@intel.com> |
am d766090b: Avoid array overrun. We can now mount the /sdcard partition on our boot sdcards Merge commit 'd766090b7a72562be9e64700e13882663004650e' into gingerbread-plus-aosp * commit 'd766090b7a72562be9e64700e13882663004650e': Avoid array overrun. We can now mount the /sdcard partition on our boot sdcards
|
b2b3d2cd34d52d288b42b7d30cd7db7fd53bfd1d |
10-Jul-2010 |
Seth Forshee <seth.forshee@garmin.com> |
vold: remove unnecessary code from VolumeManager::unshareVolume() Signed-off-by: Seth Forshee <seth.forshee@garmin.com>
olumeManager.cpp
|
d766090b7a72562be9e64700e13882663004650e |
22-Jul-2010 |
Bruce Beare <brucex.j.beare@intel.com> |
Avoid array overrun. We can now mount the /sdcard partition on our boot sdcards Change-Id: I6e9db8c55db49b4aa61dd40cd59495f55e5b3368 Signed-off-by: Bruce Beare <brucex.j.beare@intel.com>
irectVolume.cpp
|
e17e91f63b3cceb2ef670947fd7f9ff3c40ee1a7 |
17-Jul-2010 |
Kenny Root <kroot@google.com> |
Fix loop_info/loop_info64 impedance mismatch LOOP_GET_STATUS64 isn't useful here since the data contained within isn't actually checked, so stick with the regular LOOP_GET_STATUS here to match the struct loop_info we're using. Change-Id: I4f9ff06fa44d4ae3aed046d423054554f9cf450b
oop.cpp
|
508c0e1605b795bbb51cb47d955b89f3df26ca94 |
12-Jul-2010 |
Kenny Root <kroot@google.com> |
Additional Obb functionality * Rename all functions dealing with OBB files to mention Obb * Add 'path' and 'list' functionality to OBB commands * Store hashed filename in loop's lo_crypt_name and keep lo_file_name for the real source filename. That way we can recover it later with an ioctl call. Change-Id: I29e468265988bfb931d981532d86d7be7b3adfc8
ommandListener.cpp
ommandListener.h
oop.cpp
olume.cpp
olumeManager.cpp
olumeManager.h
|
fb7c4d5a8a1031cf0e493ff182dcf458e5fe8c77 |
01-Jul-2010 |
Kenny Root <kroot@google.com> |
Add image mounting commands for OBB files Allow the mounting of OBB filesystem images if they're encrypted with twofish and in FAT filesystem format. Change-Id: I54804e598f46b1f3a784ffe517ebd9d7626de7aa
ommandListener.cpp
ommandListener.h
olume.cpp
olume.h
olumeManager.cpp
olumeManager.h
|
99635f6c289fe2528c226403ea215c917ce86037 |
26-Jun-2010 |
Mike Lockwood <lockwood@android.com> |
Use new kernel notifications to determine if USB mass storage is available. The usb_mass_storage switch no longer exists in our 2.6.35 kernel. Instead we will consider mass storage to be available if both USB is connected and the USB mass storage function is enable. Change-Id: I730d1b3cb3cac664fc2abcdc36cd39856a08404a Signed-off-by: Mike Lockwood <lockwood@android.com>
etlinkHandler.cpp
olumeManager.cpp
olumeManager.h
ain.cpp
|
acc9e7dcca8978fc809fa5b4d9b819c515a980ff |
19-Jun-2010 |
Kenny Root <kroot@google.com> |
Change ASCII conversion for hash and add tests Hash was printed using snprintf(), but we can just write yet another hex conversion utility! Change-Id: I04f1992deaf5bf1b3e2751c8f07072f8ed6660e9
ndroid.mk
olumeManager.cpp
olumeManager.h
ests/Android.mk
ests/VolumeManager_test.cpp
|
f69b3b9af78c94b5ce56a73e086b22b585ea5c85 |
14-May-2010 |
Nick Kralevich <nnk@google.com> |
Get rid of warnings when compiled with -Wformat-security Change-Id: I27e0819aba347e26051ad771c594b69700da1721
ogwrapper.c
|
1a06edaf4db4e9c520624bcc06e0e13ee470d90e |
15-Apr-2010 |
San Mehat <san@google.com> |
vold: Ensure we cleanup secure containers on card removal. Fixes bug: http://b/issue?id=2567572 Note: The framework will still likely restart since the system_server is holding references to assets on the card which are mmaped, but at least now storage will be available when a new card is re-inserted. Change-Id: I4e195c0c666426b93da47198fa826a6f58d855a9 Signed-off-by: San Mehat <san@google.com>
irectVolume.cpp
olumeManager.cpp
olumeManager.h
|
97ac40e4e6f3ed0bd5d6878d7d8d4a54fcaecb76 |
24-Mar-2010 |
San Mehat <san@google.com> |
vold: Switch from LOG -> SLOG Change-Id: I48ee8bd90b47f5845f069cdf4d1b8ba6ecdb1b39 Signed-off-by: San Mehat <san@google.com>
ommandListener.cpp
evmapper.cpp
irectVolume.cpp
at.cpp
oop.cpp
etlinkHandler.cpp
etlinkManager.cpp
rocess.cpp
esponseCode.cpp
olume.cpp
olumeManager.cpp
warp.cpp
ain.cpp
|
da62e7c00259f6b98696cedb7d031f04951caef0 |
25-Mar-2010 |
Kenny Root <kroot@google.com> |
Revert "Prevent null pointer deref in DirectVolume" This reverts commit a9f423dd7e313854ce7c103e1bb4661b05efc9a4.
irectVolume.cpp
irectVolume.h
|
a9f423dd7e313854ce7c103e1bb4661b05efc9a4 |
24-Mar-2010 |
Kenny Root <kroot@google.com> |
Prevent null pointer deref in DirectVolume There's a possibility that if something were messed up a call to NetlinkEvent::findParam could return a NULL. Passing NULL as the argument into atoi() would cause a null pointer dereference. Change-Id: Ib071afbbe2adc341108c245ffa596cc8730bd8fd
irectVolume.cpp
irectVolume.h
|
88ac2c06539485942bf414efda2d39647fa1a415 |
23-Mar-2010 |
San Mehat <san@google.com> |
vold: asec path cmd now returns OpFailedStorageNotFound if id doesn't exist Change-Id: Icbe3de7c28505f7496c8f8edea126c7b616de475 Signed-off-by: San Mehat <san@google.com>
ommandListener.cpp
esponseCode.cpp
esponseCode.h
olumeManager.cpp
|
96597e8b840ef671fe5279f8bd64fb09a8b38d4c |
17-Mar-2010 |
San Mehat <san@google.com> |
vold: Add mounted filesystems to dump cmd Change-Id: If025e7ee10a79ff089920a6d0c1a52358b2d2c22 Signed-off-by: San Mehat <san@google.com>
ommandListener.cpp
olumeManager.cpp
|
7b18a7b36f61574c0f0bdde0a7409dc36676fa12 |
15-Mar-2010 |
Kenny Root <kroot@google.com> |
vold: Convert to use OpenSSL MD5 API Change-Id: I9b84370fa9a98464c211ebe8983be8dbe9dd7ccd
ndroid.mk
olumeManager.cpp
d5.c
d5.h
|
befd59c152835b815665ec3c5e453b55e70d5f0b |
15-Mar-2010 |
San Mehat <san@google.com> |
vold: remove some dead code Change-Id: Iaeb5d3334ec22ed31da9734bb8d7cd17e6a40eaf Signed-off-by: San Mehat <san@google.com>
ndroid.mk
lockDevice.cpp
lockDevice.h
olumeManager.cpp
olumeManager.h
|
cb4dac8a5243f6673b0590019b5b28a01bd3e343 |
14-Mar-2010 |
San Mehat <san@google.com> |
vold: Remove autorun.inf at mount/unmount time if it exists Change-Id: Ia57da8ee177453a601a23d965c2b4f16b6de46e5 Signed-off-by: San Mehat <san@google.com>
olume.cpp
olume.h
|
57df7bf33968d65c23f3d0dc9f30a8ce2625b1d0 |
14-Mar-2010 |
San Mehat <san@google.com> |
vold: Fix argument validation for volume commands Change-Id: I74aa63ff9f9bc32bd871e6c53ab50b6baf79e650 Signed-off-by: San Mehat <san@google.com>
ommandListener.cpp
|
d9a4e358614a0c5f60cc76c0636ee4bb02004a32 |
12-Mar-2010 |
San Mehat <san@google.com> |
vold: Bugfixes & cleanups - Fix issue where container-names > 64 bytes were getting truncated in the kernel. lo_name is only 64 bytes in length, so we now hash the container id via md5 - Add 'dump' command to dump loop and devicemapper status - Add 'debug' command to enable more detailed logging at runtime - Log vold IPC arguments (minus encryption keys) - Fix premature return from Loop::lookupActive() and friends Change-Id: I0e833261a445ce9dc1a8187e5501d27daba1ca76 Signed-off-by: San Mehat <san@google.com>
ndroid.mk
ommandListener.cpp
ommandListener.h
evmapper.cpp
evmapper.h
oop.cpp
oop.h
olume.cpp
olume.h
olumeManager.cpp
olumeManager.h
ash.h
d5.c
d5.h
|
2a5b8ce09b8836a8463ef9beaaff865c36ca5e6a |
10-Mar-2010 |
San Mehat <san@google.com> |
vold: Switch to using libdiskconfig for partition setup. Also handles an issue where NPARTS=0 on a disk change uevent Change-Id: I77c56f177dc65df91468bbd7d5fe1889db414d7a Signed-off-by: San Mehat <san@google.com>
ndroid.mk
irectVolume.cpp
olume.cpp
iskmbr.h
eom_mbr_enc.c
|
d071596fd998f4d2bc58a7580f61c15a87a92fd5 |
09-Mar-2010 |
Jean-Baptiste Queru <jbq@google.com> |
Add an empty CleanSpec.mk Change-Id: Ied5f7eddd18adb38699c8a034a78ff9de4aab8de
leanSpec.mk
|
fcf24fe62f98c5d44431aa575555569c2c7a29b0 |
03-Mar-2010 |
San Mehat <san@google.com> |
vold: Add a versioned superblock to secure containers. Add an un-encrypted superblock to the end of a secure container to help identify the crypto cipher used. This is required in order to provide some semblence of versioning, in case we have cause to change the crypto type on an update - say for example switching from software to hardware encryption, or from 128 -> a zillion bit keys. NOTE: This format is incompatible with previous secure containers. After this change they will no longer be mountable. Signed-off-by: San Mehat <san@google.com>
sec.h
evmapper.cpp
at.cpp
at.h
olume.cpp
olumeManager.cpp
|
2350c44ff39b4cb2940893964a05f778fc80a436 |
02-Mar-2010 |
San Mehat <san@google.com> |
vold: Add support for xwarp Signed-off-by: San Mehat <san@google.com>
ndroid.mk
ommandListener.cpp
ommandListener.h
esponseCode.h
warp.cpp
warp.h
|
f1b07fb5e30667833d7a2a5b7e95eada881a2802 |
02-Mar-2010 |
San Mehat <san@google.com> |
vold: Don't bail out on init failure & bump version number Signed-off-by: San Mehat <san@google.com>
ain.cpp
|
a1091cb0c448a933068f9120fe6946c09812bfb6 |
01-Mar-2010 |
San Mehat <san@google.com> |
vold: Allow creation of a container with no filesystem Signed-off-by: San Mehat <san@google.com>
olumeManager.cpp
|
55013f7131ffe094e1c7d929cfc32b3b25096a9b |
24-Feb-2010 |
San Mehat <san@google.com> |
vold: Fix uninitialized mountpoint bug Signed-off-by: San Mehat <san@google.com>
olumeManager.cpp
|
12f4b89046b54de1bdc188b7057ba77d7566e573 |
24-Feb-2010 |
San Mehat <san@google.com> |
vold: Retry rmdir of asec mount point Signed-off-by: San Mehat <san@google.com>
olumeManager.cpp
|
96956ed0e220cb62a4a96136976ded0d8c2d9075 |
24-Feb-2010 |
San Mehat <san@google.com> |
vold: Prohibit container rename when dst container is mounted Signed-off-by: San Mehat <san@google.com>
olumeManager.cpp
|
0e382532f32e97f90056250f2b13c59840d2c6b4 |
24-Feb-2010 |
San Mehat <san@google.com> |
vold: fix infinite loop when failing to unmount a busy container in unmountVolume() Signed-off-by: San Mehat <san@google.com>
olumeManager.cpp
|
52c2ccb6d25b94b96685efd4803226727710fbae |
24-Feb-2010 |
San Mehat <san@google.com> |
vold: Make asec sdcard dir a hidden dir Signed-off-by: San Mehat <san@google.com>
olume.cpp
|
3bb6020e461e8872e8df0775cba6eb32e06b93ec |
20-Feb-2010 |
San Mehat <san@google.com> |
vold: Stage the mounting of media to hide the ASEC imagefile directory In order to protect the '/android_secure' directory on VFAT removable media from being mucked with by 3rd party applications on the device, we hide the directory with a read-only, zero-sized tmpfs mounted on-top. A reference to the hidden directory is kept by a bind-mount which is mounted at a location which only root can access. Staging consists of: 1. Mount checked media at a secure location (/mnt/secure/staging) 2. Ensure /android_secure exists on the media, (creating if it doesnt) 3. Bind-mount /mnt/secure/staging/android_secure -> /mnt/secure/asec (where only root can access it) 4. Mount an RDONLY zero-sized tmpfs over /mnt/secure/staging/android_secure 5. Atomically move /mnt/secure/staging to the publicly accessable storage directory (/mnt/sdcard) Signed-off-by: San Mehat <san@google.com>
ommandListener.cpp
olume.cpp
olume.h
olumeManager.cpp
|
8f2875b29780312f4edda3d831cc8a99e1648dd5 |
18-Feb-2010 |
San Mehat <san@google.com> |
vold: Clean up asec command response and add support for 'StorageBusy' Signed-off-by: San Mehat <san@google.com>
ndroid.mk
ommandListener.cpp
esponseCode.cpp
esponseCode.h
|
4ba8948dc16463053e21cda5744f519a555080d0 |
18-Feb-2010 |
San Mehat <san@google.com> |
vold: Add 'force' option to anything that can cause an unmount Signed-off-by: San Mehat <san@google.com>
ommandListener.cpp
irectVolume.cpp
olume.cpp
olume.h
olumeManager.cpp
olumeManager.h
|
d31e380bd9689dd9629b510ffe324707e261b439 |
18-Feb-2010 |
San Mehat <san@google.com> |
vold2: Don't allow containers < 1mb, and clean up some logging Signed-off-by: San Mehat <san@google.com>
evmapper.cpp
oop.cpp
olumeManager.cpp
|
b3b4318ab8e2908f7b3c75fb68a5cbfc48fe6ab2 |
18-Feb-2010 |
Kenny Root <kroot@google.com> |
Check length of filenames before strcat Just in case someone tries to set up a series of links to trick us, do a quick sanity check on the total length of the strings we're about to concatenate. Change-Id: Iba9617008dbc1e93e1907393052caf1e52fbe312
rocess.cpp
|
586536c60b773e3517531ad8a6cb0de6722c67fc |
17-Feb-2010 |
San Mehat <san@google.com> |
vold: Refactor Processkiller and add command to return users of a mount point Signed-off-by: San Mehat <san@google.com>
ndroid.mk
ommandListener.cpp
ommandListener.h
rocess.cpp
rocess.h
rocessKiller.c
esponseCode.h
olume.cpp
olumeManager.cpp
|
8c940ef7dbd423cadc92982b44a65ed1014389e2 |
13-Feb-2010 |
San Mehat <san@google.com> |
vold: Fix devmapper/ptmx fd leak, and give asec unmount more time Signed-off-by: San Mehat <san@google.com>
evmapper.cpp
rocessKiller.c
olume.cpp
olumeManager.cpp
ogwrapper.c
|
c6fc646af4f957dc7a586a448e63c458480d8355 |
11-Feb-2010 |
Jean-Baptiste Queru <jbq@google.com> |
am 4468682c: Merge from open-source master Merge commit '4468682c7035d431c6154ab298c5ce0f9e2350f8' * commit '4468682c7035d431c6154ab298c5ce0f9e2350f8': new project, first commit
|
4468682c7035d431c6154ab298c5ce0f9e2350f8 |
11-Feb-2010 |
Jean-Baptiste Queru <jbq@google.com> |
Merge from open-source master
|
3b9b8e830859aa9338b78a7b05ddbe566f5bbb70 |
09-Feb-2010 |
San Mehat <san@google.com> |
vold: Fix format argument bug Signed-off-by: San Mehat <san@google.com>
at.cpp
|
62e5dd245bd508eabcba56b5680e2b28bfc2caf6 |
06-Feb-2010 |
San Mehat <san@google.com> |
vold: Reduce logspam and add 250ms delay before first unmount attempt Signed-off-by: San Mehat <san@google.com>
olume.cpp
|
b9aed74b146beb7499ebc5775e8ae179d16900ef |
05-Feb-2010 |
San Mehat <san@google.com> |
vold: Fix a few bugs - share command was taking wrong arguments - shared command was returning two termination codes - Force FAT32 cluster size to 4k when formatting Signed-off-by: San Mehat <san@google.com>
ommandListener.cpp
at.cpp
olumeManager.cpp
|
f5c61980969a0b49bda37b5dc94ffe675ebd5a5a |
03-Feb-2010 |
San Mehat <san@google.com> |
vold: Silly rabbit, don't use unlink() when you mean't rmdir() Signed-off-by: San Mehat <san@google.com>
olumeManager.cpp
|
2b22552f9a3b077f9d0a3624ac6f9b8b332f8a7a |
03-Feb-2010 |
San Mehat <san@google.com> |
vold: Fix share status argument off by one Signed-off-by: San Mehat <san@google.com>
ommandListener.cpp
|
fbe33b4a407b7ec20da1c11459784aa57890eaee |
03-Feb-2010 |
San Mehat <san@google.com> |
vold2: Don't print error on unknown Netlink event Signed-off-by: San Mehat <san@google.com>
etlinkHandler.cpp
|
eba65e9d438a05f1c5dfd0f8d31bc463a5d08eee |
29-Jan-2010 |
San Mehat <san@google.com> |
vold: Bloat reduction Signed-off-by: San Mehat <san@google.com>
ommandListener.cpp
ommandListener.h
esponseCode.h
olume.cpp
olumeManager.cpp
olumeManager.h
|
048b0801fcd6fcfbb8fa812284c751181e4821b8 |
23-Jan-2010 |
San Mehat <san@google.com> |
vold: Add support for renaming secure containers Signed-off-by: San Mehat <san@google.com>
ommandListener.cpp
ommandListener.h
olumeManager.cpp
olumeManager.h
|
68f8ebdb24dfe1fe94de2c8fc11084ebfab9fa5d |
23-Jan-2010 |
San Mehat <san@google.com> |
vold2: update some debugging Signed-off-by: San Mehat <san@google.com>
olumeManager.cpp
|
a4dc3b15b7886f661675ab5243800c80831e549b |
22-Jan-2010 |
San Mehat <san@google.com> |
vold: Don't fail to return path if volume isn't mounted Signed-off-by: San Mehat <san@google.com>
olumeManager.cpp
|
5817821cf10b5f7d13eb693ffbc3f80f13bc681b |
18-Jan-2010 |
San Mehat <san@google.com> |
vold: Add command to unmount secure containers Signed-off-by: San Mehat <san@google.com>
ommandListener.cpp
ommandListener.h
|
88705166ab82057090a070c6d4200c3d9db76f11 |
15-Jan-2010 |
San Mehat <san@google.com> |
vold: Unmount secure containers when the underlying media is removed. Signed-off-by: San Mehat <san@google.com>
olumeManager.cpp
olumeManager.h
|
0586d54053ee00e6d6523d4f125282ccb9a24aab |
13-Jan-2010 |
San Mehat <san@google.com> |
vold2: Fix issue with destroying / unmounting asec Signed-off-by: San Mehat <san@google.com>
evmapper.cpp
olumeManager.cpp
|
dfe79492a4f5280e9de2db6fa749a7781c59f2a6 |
11-Jan-2010 |
San Mehat <san@google.com> |
vold2: Fix a mb -> sector conversion refactor bug Signed-off-by: San Mehat <san@google.com>
ommandListener.cpp
|
c66770f4c0497430a78e982cabe65b31828055c6 |
11-Jan-2010 |
San Mehat <san@google.com> |
vold: Rename the C in ASEC to Container Signed-off-by: San Mehat <san@google.com>
ommandListener.cpp
|
8b8f71b1d760411279f3b07a5c97709f052c689e |
11-Jan-2010 |
San Mehat <san@google.com> |
vold: Internally use sector counts for asec lengths Signed-off-by: San Mehat <san@google.com>
ommandListener.cpp
evmapper.cpp
evmapper.h
oop.cpp
oop.h
olumeManager.cpp
olumeManager.h
|
b78a32c1d5eeb243bdac0eaf18effb1897f1ee67 |
10-Jan-2010 |
San Mehat <san@google.com> |
vold: Add encrypted ASEC support via devmapper - Supports up to 4096 containers - Keys are now implemented - specifying a key of 'none' means no encryption. Otherwise, the key must be a string of 32 characters Signed-off-by: San Mehat <san@google.com>
ndroid.mk
evmapper.cpp
evmapper.h
oop.cpp
oop.h
olumeManager.cpp
olumeManager.h
|
8da6bcb006f4e4257cdd685e35e910a6334f6cea |
09-Jan-2010 |
San Mehat <san@google.com> |
vold: Increase max supported loop devices to 255 Signed-off-by: San Mehat <san@google.com>
oop.cpp
oop.h
olumeManager.cpp
|
8d934caeae971d7d08ca33e98dae294eb57c402d |
09-Jan-2010 |
San Mehat <san@google.com> |
vold: Always format FAT32 Signed-off-by: San Mehat <san@google.com>
at.cpp
|
23969931fad6e993832208f099f6eea0f6f76eb5 |
09-Jan-2010 |
San Mehat <san@google.com> |
vold: Use process-killer when unmounting asec containers Signed-off-by: San Mehat <san@google.com>
olumeManager.cpp
|
cff5ec3d360b699ad13df05670efe0d0a7386fbe |
08-Jan-2010 |
San Mehat <san@google.com> |
vold: Temporarily disable asec mountpoint permissions Signed-off-by: San Mehat <san@google.com>
olumeManager.cpp
|
1bc9558895dbb38b2103345ab90016f318c37bff |
07-Jan-2010 |
Doug Kwan <dougkwan@google.com> |
Add missing library used by the main executable in linker options. Currently the library is implicit added via inter-library dependency.
ndroid.mk
|
eb13a90bb96b329d8e24a6c3d4720ae88451d301 |
07-Jan-2010 |
San Mehat <san@google.com> |
vold: Don't freak out if an asec mountpoint already exists Signed-off-by: San Mehat <san@google.com>
olumeManager.cpp
|
fff0b47998a722d57eea6a07350bbd7a6032b3cc |
07-Jan-2010 |
San Mehat <san@google.com> |
vold2: Enable support for custom mount perm masks and wire to asec Signed-off-by: San Mehat <san@google.com>
at.cpp
at.h
olume.cpp
olumeManager.cpp
|
a19b250bd273455933ca3502cf2c2e0a803aff77 |
06-Jan-2010 |
San Mehat <san@google.com> |
vold2: Initial support for Android Secure External Caches Signed-off-by: San Mehat <san@google.com>
ndroid.mk
ommandListener.cpp
ommandListener.h
at.cpp
at.h
oop.cpp
oop.h
esponseCode.h
olume.cpp
olumeManager.cpp
olumeManager.h
|
7b8f2db4b07deaaa2f6f5ffbee0386a394032b08 |
04-Jan-2010 |
San Mehat <san@google.com> |
vold2: Don't crap out if the kernel is missing the NPART/PARTN blkdev uevent patches Signed-off-by: San Mehat <san@google.com>
irectVolume.cpp
|
bf04185c88161f13118b9975cdff7967d49a4fa0 |
04-Jan-2010 |
San Mehat <san@google.com> |
vold2: Refactor FAT support into a separate class Signed-off-by: San Mehat <san@google.com>
ndroid.mk
at.cpp
at.h
olume.cpp
olume.h
|
79e31bedcaabcca55aaf40a9de61abed11c9a2e0 |
04-Jan-2010 |
San Mehat <san@google.com> |
vold2: Don't bail out if the UMS switch isn't there Signed-off-by: San Mehat <san@google.com>
ain.cpp
|
11f78c181e6afe024427be2b7a530280cd4b64e1 |
03-Jan-2010 |
San Mehat <san@google.com> |
vold2: Don't build for simulator Signed-off-by: San Mehat <san@google.com>
ndroid.mk
|
0cde53ce7b44ce189d0bc6fa81c0036e096deb51 |
22-Dec-2009 |
San Mehat <san@google.com> |
vold2: Manually bootstrap the ums switch since switch kernel uevents are broken Signed-off-by: San Mehat <san@google.com>
olumeManager.cpp
olumeManager.h
ain.cpp
|
a1c2ca1c70e52cccb7e63f4be8d7127b22afc0e5 |
21-Dec-2009 |
San Mehat <san@google.com> |
vold2: Enable in build Signed-off-by: San Mehat <san@google.com>
ndroid.mk
|
a2677e4ad01f250b0765f04adf0acfa6627efc98 |
13-Dec-2009 |
San Mehat <san@google.com> |
vold2: Get mounting/unmounting/formatting/sharing working Signed-off-by: San Mehat <san@google.com>
ndroid.mk
ommandListener.cpp
ommandListener.h
irectVolume.cpp
irectVolume.h
rrorCode.h
etlinkHandler.cpp
rocessKiller.c
esponseCode.h
olume.cpp
olume.h
olumeManager.cpp
olumeManager.h
iskmbr.h
eom_mbr_enc.c
ain.cpp
|
dd9b8e92aaf330b48ddb40a7380588ef92b53de6 |
21-Oct-2009 |
San Mehat <san@google.com> |
vold2: Some more work on partitioning support Signed-off-by: San Mehat <san@google.com>
irectVolume.cpp
irectVolume.h
olume.cpp
olume.h
|
49e2bce5b74129c26a35e25d4693cbfe98c4688e |
13-Oct-2009 |
San Mehat <san@android.com> |
vold2: Wire up more of the mount function Signed-off-by: San Mehat <san@android.com>
ndroid.mk
ommandListener.cpp
irectVolume.cpp
irectVolume.h
olume.cpp
olume.h
olumeManager.cpp
olumeManager.h
ogwrapper.c
|
8d5ad9a7cd5f8dd0233f7c30d4f926a201f4263b |
13-Oct-2009 |
android-build SharedAccount <android-build@sekiwake.mtv.corp.google.com> |
new project, first commit
|
ae10b91044bf76b40b77d81c169e48e0bbdf6d75 |
12-Oct-2009 |
San Mehat <san@android.com> |
vold2: Rename DeviceVolume -> DirectVolume Signed-off-by: San Mehat <san@android.com>
ndroid.mk
eviceVolume.cpp
eviceVolume.h
irectVolume.cpp
irectVolume.h
olumeManager.cpp
ain.cpp
|
3578c41ef138cb3edf38bb488cb9864921f55c79 |
12-Oct-2009 |
San Mehat <san@android.com> |
vold2: Add block device udev bootstrapping Signed-off-by: San Mehat <san@android.com>
ain.cpp
|
59abc3c56b432089abfe868c04cdbc3b6d28aee2 |
12-Oct-2009 |
San Mehat <san@android.com> |
vold2: DeviceVolume: Add pending partition support Signed-off-by: San Mehat <san@android.com>
eviceVolume.cpp
|
fd7f5875129adfe2845f4f3fffb17db3a89eea25 |
12-Oct-2009 |
San Mehat <san@android.com> |
vold2: Refactor the netlink event handling and better define how partitions/disks are handled Signed-off-by: San Mehat <san@android.com>
eviceVolume.cpp
eviceVolume.h
etlinkHandler.cpp
olume.cpp
olume.h
olumeManager.cpp
olumeManager.h
|
f1b736bc5605e92e917ab27f5abf3ba839be2270 |
11-Oct-2009 |
San Mehat <san@android.com> |
system: vold2: Initial skeleton for vold2. Let there be light. Signed-off-by: San Mehat <san@android.com>
ndroid.mk
lockDevice.cpp
lockDevice.h
ommandListener.cpp
ommandListener.h
eviceVolume.cpp
eviceVolume.h
rrorCode.h
etlinkHandler.cpp
etlinkHandler.h
etlinkManager.cpp
etlinkManager.h
oldCommand.cpp
oldCommand.h
olume.cpp
olume.h
olumeManager.cpp
olumeManager.h
ain.cpp
dc.c
|
8f8ba4d0c0a8bcfed22628928843f943638769db |
09-Oct-2009 |
Jean-Baptiste Queru <jbq@google.com> |
Empty starting point
|