- 10 Jul, 2015 1 commit
-
-
Thierry Strudel authored
Using a getenv('OUT') in such a deep down function is a wrong design choice. Replacing with explicit parameter that may be NULL in case device specific files can be accessed from /. Since TARGET_COPY_OUT_SYSTEM may be defined to something different than system we also ensure that we use a path relative to TARGET_OUT to compute path to fs_config_* files. Bug: 21989305 Bug: 22048934 Change-Id: Id91bc183b29beac7379d1117ad83bd3346e6897b Signed-off-by:
Thierry Strudel <tstrudel@google.com>
-
- 08 Jul, 2015 1 commit
-
-
Sami Tolvanen authored
If verity state is managed by bootloader, it will pass the verity mode to the kernel in the androidboot.veritymode command line parameter. Init copies the value to the ro.boot.veritymode property. Check for ro.boot.veritymode in fs_mgr and use the value to set dm-verity mode. If this property is not set, store verity state in metadata as before, if a storage location is specified in fstab. Bug: 21605676 Change-Id: Ife3c978c133248432c302583d3b70e179605fe42 (cherry picked from commit ac5c1224)
-
- 29 May, 2015 1 commit
-
-
Paul Lawrence authored
(chery-picked from commit 806d10be) Move all key management into vold Reuse vold's existing key management through the crypto footer to manage the device wide keys. Use ro.crypto.type flag to determine crypto type, which prevents any issues when running in block encrypted mode, as well as speeding up boot in block or no encryption. This is one of four changes to enable this functionality: https://android-review.googlesource.com/#/c/148586/ https://android-review.googlesource.com/#/c/148604/ https://android-review.googlesource.com/#/c/148606/ https://android-review.googlesource.com/#/c/148607/ Bug: 18151196 Change-Id: I6a8a18f43ae837e330e2785bd26c2c306ae1816b
-
- 27 May, 2015 1 commit
-
-
Elliott Hughes authored
Bug: http://b/20501816 Change-Id: I1839b48ee4f891b8431ecb809e37a4566a5b3e50 (cherry picked from commit 47b0134e)
-
- 02 May, 2015 1 commit
-
-
Iliyan Malchev authored
If the zramsize entry has a % size at the end, as in the following example: /dev/block/zram0 none swap defaults zramsize=25% then we will set the value as that percentage of total RAM, as read by scanning /proc/meminfo. b/20760266 Seed common build allocated too much for zRAM-backed swap Change-Id: I17c91d311ba99ae7adae112bfe1b38542ea69b80 Signed-off-by:
Iliyan Malchev <malchev@google.com>
-
- 24 Apr, 2015 1 commit
-
-
Elliott Hughes authored
Explain why mount failed, and explicitly say that the umount fixed it. Change-Id: I13b0927a36517f2fc9f9580945ba6ebefc4882df
-
- 10 Apr, 2015 1 commit
-
-
Chris Fries authored
Move fastboot's format logic into fs_mgr, to consolidate the knowledge about how to do this (and when to wipe metadata). Try to format these formattable paritions if they are wiped. If formatting fails, we will fall out to let recovery mode handle it. Bug: 20082763 Change-Id: I397cc197550e78d932e8a154fd234695c46dbe7b
-
- 09 Apr, 2015 1 commit
-
-
Mohamad Ayyash authored
This reverts commit 7b97c7a3. Change-Id: Id47e70479fe9247b7936f2e54d4dbfbb4f63f635
-
- 08 Apr, 2015 1 commit
-
-
Mohamad Ayyash authored
This reverts commit 807f4700. Change-Id: I2d7972c0828c842b44747dd08fbe44668f2a55db
-
- 06 Apr, 2015 1 commit
-
-
Mohamad Ayyash authored
- Cleanup the code to get filesystem size in a block device - Add support to reading size of squashfs in a block device Change-Id: I3848a705ed4dc2fc9afad20331f0fdecfee545c5 Signed-off-by:
Mohamad Ayyash <mkayyash@google.com>
-
- 01 Apr, 2015 2 commits
-
-
Paul Lawrence authored
Fix build break caused by original change This reverts commit 84b0bab5. (cherry picked from commit bbb4c85bdcc9a1bce315ed9d61a228bb1b992a1c) Change-Id: If0ead0f2656b69f33f72c64b03a05784455a4143
-
Dan Albert authored
Change-Id: Ic2461d3a30dbd8a22f9800a33fac27c658340b21
-
- 31 Mar, 2015 3 commits
-
-
Paul Lawrence authored
Fix build break caused by original change This reverts commit 84b0bab5. Change-Id: I99fbd7c3d1ed92db1f546033c8493bb71a327924
-
Sami Tolvanen authored
Store verity state separately for each verified partition, and store a hash of the last verity table signature for each partition. If the signature changes, assume the partition has been reflashed and reset verity state. Bug: 20006638 Change-Id: I1c85fb816bfec1a54b1033c938bf1fdaf572f849
-
Sami Tolvanen authored
Set the verity mode as the value for partition.%s.verified to make it easier for userspace to determine in which mode dm-verity was started. Change-Id: Icc635515f8a8ede941277aed196867351d8387cb
-
- 26 Mar, 2015 2 commits
-
-
Paul Lawrence authored
This reverts commit 6095afc1. Change-Id: Icedfe0036223d7f42eaaefc4a35ad0f2efb14e4e
-
Sami Tolvanen authored
Fix build breakage in aosp_fugu-userdebug_clang (linux) caused by Id8711f7d51dc1e4e9a4d84f9951240f64528e69d Change-Id: Icd04aeaf131be045cf5788846ae9832e6cbbb944
-
- 24 Mar, 2015 1 commit
-
-
Sami Tolvanen authored
Specify the location of verity metadata in fstab, and use a type-length-value format for the metadata that allows other data to be stored in the same location in an extensible way. Change-Id: Id8711f7d51dc1e4e9a4d84f9951240f64528e69d
-
- 23 Mar, 2015 1 commit
-
-
Paul Lawrence authored
Add file encryption flag to fstab. If file encryption flag set in fstab, handle identically to block encrypted volumes. Requires matching change: https://googleplex-android-review.git.corp.google.com/#/c/642778/ Change-Id: I28c236959f2d7d5f0dccc8ea45c325ea0cf871fc
-
- 19 Mar, 2015 1 commit
-
-
Sami Tolvanen authored
Add a command that updates dm-verity state and sets partition.%.verified properties used by adb remount. This is needed in init since fs_mgr cannot set properties: I6a28cccb1ccce960841af20a4b20c32d424b5524 Change-Id: I0fdf5bc29c56690dcadff9d0eb216d3c68483538
-
- 06 Mar, 2015 1 commit
-
-
JP Abgrall authored
Some partitions don't need trimming. Needs a vold:fstrim change Bug: 19624276 Change-Id: I8df715bd18688d7921afa2f3743f7d2a68760699
-
- 05 Mar, 2015 1 commit
-
-
Sami Tolvanen authored
Both init and libcutils define a property_set function. The init version sets the property directly while libcutils simply calls __system_property_set, which sends a message to init to set the property. Since libfs_mgr is statically linked to libcutils, any calls to property_set end up sending a message to init and waiting for a response. When libfs_mgr is further statically linked to init, this leads to init sending a message to itself when property_set is called in fs_mgr. Because send_prop_msg in bionic only waits for a response for 250ms, this does not cause a deadlock. However, using libcutils to set a property in the init process is hardly a good idea. This change removes the property_set call from fs_mgr_verity.c. If this property is required later, it should be set elsewhere. Change-Id: I6a28cccb1ccce960841af20a4b20c32d424b5524
-
- 04 Mar, 2015 2 commits
-
-
Andreas Gampe authored
Suggested printing for off_t is to cast to intmax_t and print that. Follow-up to https://android-review.googlesource.com/133111. Change-Id: Icff6844044c3d0fa6372c3f399453a526fd89954
-
Sami Tolvanen authored
Add support for dm-verity modes and storing persistent state in a location specified by the following properties: ro.verity.state.location ro.verity.state.offset If these properties do not exist, dm-verity is always loaded in EIO mode. If the properties do exist, but the location does not have valid state data, dm-verity is loaded in RESTART mode. The mode is updated to LOGGING if a dm-verity triggered restart has occurred. Change-Id: Ibb82953594d234f81ad21c40f524190b88e4ac8f
-
- 27 Feb, 2015 1 commit
-
-
Sami Tolvanen authored
Currently, when verity is set up on a block device, the underlying device is still accessible directly. Change the existing function fs_set_blk_ro visible to other fs_mgr modules, change the behavior to match the comment above the function definition, and call it to disable write access to the block device when setting up verity. Bug: 18609347 Change-Id: I7884175df15f9161174788d74d20a08e4cd472ca
-
- 18 Feb, 2015 1 commit
-
-
Yabin Cui authored
Bug: 19340053 Change-Id: Id0d866e6195ed4752b4be6081eeb2aab8b1dbe9a
-
- 06 Feb, 2015 2 commits
-
-
Paul Lawrence authored
This reverts commit bda62724. The original fix seems to have led to boot failures in QA. Rather than risk shipping, revert the change. Bug 18764230 reopened. Requires change https://googleplex-android-review.git.corp.google.com/#/c/629764/ Bug: 19278390 Bug: 19199624 Change-Id: I8b6ab585666f2b0f585ffb2a5f61ac2e3462e06e
-
Nick Kralevich authored
Don't silently ignore umount errors. At a minimum, log them. Add strerror(errno) to another umount call, to make sure we get some actionable data. check_fs: try 5 times umounting the filesystem. It appears that the umount is failing, perhaps because some service is opening the file on the device or other error. Try unmounting it multiple times in case it's a transient problem and we can recover. Bug: 19199624 Bug: 19156134 Change-Id: I7213eb52d55116fb2419a36494d26d5e159981a7
-
- 28 Jan, 2015 2 commits
-
-
Paul Lawrence authored
Delay mounting encryptable but unencrypted volumes until we can check the ro.vold.forceencrypt flag, then optionally encrypt. Requires matching vold change from https://googleplex-android-review.git.corp.google.com/#/c/615309/ Bug: 18764230 Change-Id: If22008be8de6a4f3216b349f81ace49be1730314
-
Paul Lawrence authored
This allows a vendor to force encryption on devices via a vendor partition flag: ro.vold.forceencryption 1 Bug: 18764230 Change-Id: Id0049ce64e34e4f6f96e593aadd70c277ac131c8
-
- 23 Jan, 2015 2 commits
-
-
Christoffer Dall authored
When mounting fstab entries it is practical to be able to specify for example LABEL=data instead of a specific block device. This is particularly important for the new Android Emulator code base, which uses virtio block devices for the various partitions (system,data,cache), because there is no defined ordering between the way the filesystems are specified to the emulator and how they are enumerated by the android kernel as /dev/vdX. Change-Id: I7aef95f12e8f7b02ac2e33804ba7897fdcb9ad7f Signed-off-by:
Christoffer Dall <christoffer.dall@linaro.org>
-
Elliott Hughes authored
This reverts commit 69407ccb. Change-Id: I537a3b4257b7bc2a69f1f4d62b4e18e91f2dc713
-
- 21 Jan, 2015 1 commit
-
-
Paul Lawrence authored
Delay mounting encryptable but unencrypted volumes until we can check the ro.vold.forceencrypt flag, then optionally encrypt. Requires matching vold change from https://googleplex-android-review.git.corp.google.com/#/c/615309/ Bug: 18764230 Change-Id: If22008be8de6a4f3216b349f81ace49be1730314
-
- 17 Jan, 2015 1 commit
-
-
Christoffer Dall authored
When mounting fstab entries it is practical to be able to specify for example LABEL=data instead of a specific block device. This is particularly important for the new Android Emulator code base, which uses virtio block devices for the various partitions (system,data,cache), because there is no defined ordering between the way the filesystems are specified to the emulator and how they are enumerated by the android kernel as /dev/vdX. Change-Id: I12c3db0ba6a515dc8e917e0349afd257888d3aef Signed-off-by:
Christoffer Dall <christoffer.dall@linaro.org>
-
- 07 Jan, 2015 1 commit
-
-
Paul Lawrence authored
This allows a vendor to force encryption on devices via a vendor partition flag: ro.vold.forceencryption 1 Bug: 18764230 Change-Id: Id0049ce64e34e4f6f96e593aadd70c277ac131c8
-
- 10 Dec, 2014 3 commits
-
-
Paul Lawrence authored
(cherry-pick of 97e48731.) Change-Id: Ide7925e7ad328f0343d444d63ff72f1a26206d4c
-
Sami Tolvanen authored
If the system partition is larger than 2G, the device fails to read verity metadata, because fseek accepts only a 32-bit signed offset. Switch from fseek to lseek64 to allow seeking using a 64-bit offset, which solves the problem. At the same time, move away from stdio in the function. (cherry-pick of 4cafe2ff.) Bug: 17705619 Change-Id: I226320498dcb750ec6cde84411c7fe0774c9cab7
-
Paul Lawrence authored
This reverts commit 152d2d42. Fixed build error, and also fixed memory leak spotted from warning. (cherry-pick of bbb36319.) Bug: 17691572 Change-Id: I23b5ba537f7b557432041d4338b38b9be434e981
-
- 13 Nov, 2014 2 commits
-
-
Sami Tolvanen authored
The return value of read_verity_metadata is propagated to caller even if the verity metadata is invalid, provided that it can be read from the device. This results in devices with invalid verity metadata signatures to be mounted normally, which is not desirable. This change fixes the bug by changing the return value in case of verification failure to FS_MGR_SETUP_VERITY_FAIL. Bug: 15984840 Bug: 18120110 Change-Id: Ic29f37a23cb417c2538d60fb05de9dd310d50f4a (cherry picked from commit c95e9da3)
-
Sami Tolvanen authored
Verity metadata signatures will be switched to SHA-256. Switch fs_mgr signature verification to use the correct algorithm. Needs matching changes from https://googleplex-android-review.git.corp.google.com/#/c/579905/ https://googleplex-android-review.git.corp.google.com/#/c/583213/ https://googleplex-android-review.git.corp.google.com/#/c/583214/ https://googleplex-android-review.git.corp.google.com/#/c/583233/ Bug: 15984840 Bug: 18120110 Bug: 17917515 Change-Id: I8f90519bffa105a0eb7abeaad3aea1ffceb851e2 (cherry picked from commit a3465e25)
-