1. 15 Jun, 2012 1 commit
    • Ken Sumrall's avatar
      Unmount all asec apps before encrypting · 425524db
      Ken Sumrall authored
      Now that forward locked apps are stored on /data as asec image files
      that are mounted, they need to be unmounted before /data can be unmounted
      so it can be encrypted.
      
      Change-Id: I7c87deb52aaed21c8ad8ce8aceb7c15c2338620a
      425524db
  2. 11 May, 2012 2 commits
    • Kenny Root's avatar
      41836711
    • Kenny Root's avatar
      Sleep to wait for dm to create node · cdc2a1c8
      Kenny Root authored
      There appears to be a race condition from when the device mapper is
      asked to create a device and when it actually appears. When we moved
      ASECs to use Ext4, mount started winning the race more often.
      
      Just insert a sleep-retry loop here to counter-act this race. We should
      ideally look at the uevent replies, but it takes a bit more effort to
      separate them out.
      
      Change-Id: Ie8a5b36b1c9a26f2320a178d37312059d03a1281
      cdc2a1c8
  3. 10 May, 2012 2 commits
    • Kenny Root's avatar
      Native library loading needs to read directory · 1a673c86
      Kenny Root authored
      When calling System.loadLibrary(), it needs to be able to read the
      directory to load the file. We could probably fix that, but changing
      permissions here is faster.
      
      Bug: 6478606
      Change-Id: I296b0805839da5a19950157f9a16755a4d258ca8
      1a673c86
    • Kenny Root's avatar
      Only set permissions on dirs or files · 348c8aba
      Kenny Root authored
      Traversal would mark directories with the correct permissions, but
      they're visited again in post-order which is a different fts_info flag.
      Then it would set that to regular file permissions.
      
      Explicitly check to make sure we're looking at a file instead.
      
      Bug: 6478606
      Change-Id: I13cab3e69f451da6a994fa974d575ef366f82025
      348c8aba
  4. 01 May, 2012 1 commit
    • Ken Sumrall's avatar
      Changes to encryption to work with the new filesystem manager · e5032c42
      Ken Sumrall authored
      The new filesystem manager is in charge of mounting the block devices now,
      removing much of the knowledge from init.<device>.rc.  This also let us
      clean up some init code dealing with encryption, so this change updates
      vold to work with that.  More cleanup is possible, but the main goal of the
      filesystem manager was to enable e2fsck, not a full cleanup of encryption.
      
      Change-Id: I00ea80a923d14770ed8fdd190e8840be195f8514
      e5032c42
  5. 27 Apr, 2012 1 commit
  6. 25 Apr, 2012 1 commit
    • Kenny Root's avatar
      Add in ext4 support for ASEC containers · 344ca108
      Kenny Root authored
      Now forward locked applications will be in ASEC containers both internal
      to the system and externally.
      
      This change adds support for putting applications in ext4-based ASECs.
      
      Change-Id: I8d6765b72dd2606e429c067b47a2dbcaa8bef37d
      344ca108
  7. 21 Mar, 2012 2 commits
  8. 10 Mar, 2012 3 commits
  9. 07 Mar, 2012 1 commit
  10. 05 Mar, 2012 1 commit
  11. 01 Mar, 2012 1 commit
    • Robert Greenwalt's avatar
      Use the new command numbering scheme. · 149aa3eb
      Robert Greenwalt authored
      Support multiple commands on a single socket via command numbers.
      NativeDaemonConnector has been changed, so we need to use it here
      too.
      
      bug:5864209
      Change-Id: Ie06e966d50057d122a958377731c0385ea367b69
      149aa3eb
  12. 23 Feb, 2012 1 commit
    • Nick Kralevich's avatar
      vold: add -Werror=format · 9713ed46
      Nick Kralevich authored
      Stop format string bugs from creeping into root level processes.
      
      Change-Id: Ifa19ac0cacba76392040ab16cebe557b5b016706
      9713ed46
  13. 16 Feb, 2012 1 commit
  14. 15 Feb, 2012 1 commit
  15. 15 Dec, 2011 1 commit
    • Ken Sumrall's avatar
      Fix to not return a bogus decryption error when a device is not encrypted. · e1a45857
      Ken Sumrall authored
      If there is filesystem damage on a non-encrypted device, and /data is not
      mountable, and if the device stores the keys in a file on a different
      partition (like on Crespo) then, vold would return an error which caused
      the crypto UI to present an option to the user to wipe the device because
      it assumed encryption had failed.  This fixes it to not do that.
      
      Change-Id: Ibff6299787b45768416dbc4052de7db3b140b808
      e1a45857
  16. 28 Oct, 2011 1 commit
  17. 26 Oct, 2011 2 commits
  18. 25 Oct, 2011 2 commits
  19. 13 Oct, 2011 1 commit
    • Ken Sumrall's avatar
      Add the new verifypw command to vold/cryptfs · 3ad9072a
      Ken Sumrall authored
      This vold command returns 0 if the given password matches the password
      used to decrypt the device on boot.  It returns 1 if they don't match,
      and it returns -1 on an internal error, and -2 if the device is not encrypted.
      
      Also check the uid of the sender of the command and only allow the root and
      system users to issue cryptfs commands.
      
      Change-Id: I5e5ae3b72a2d7814ae68c2d49aa9deb90fb1dac5
      3ad9072a
  20. 14 Sep, 2011 1 commit
    • Ken Sumrall's avatar
      Fix cryptfs to work with a raw block device for key storage · 3be890f5
      Ken Sumrall authored
      If a raw block is specified for key storage, do not try to force the size
      of the file to 16 Kbytes when writing the keys, and do not complain if
      the size is not 16 Kbytes when reading the keys.  Only do them if the
      keyfile is a regular file.
      
      Change-Id: I4de1cb7c3614479d93289d4f2767ca6ce1bbbc73
      3be890f5
  21. 01 Sep, 2011 1 commit
    • Ken Sumrall's avatar
      Add the ability to revert a crypto mapping when unmounting a volume · 0b8b5971
      Ken Sumrall authored
      Add the force_and_revert option to the unmount command which will force
      the unmount, and revert a crypto mapping.  This is used during factory
      reset so that when the internal sdcard volume is formatted, it formats
      the raw device, not the encrypted mapping.
      
      Change-Id: I36b6ff9bb54863b121de635472a303bf4a2334a9
      0b8b5971
  22. 18 Jul, 2011 1 commit
  23. 14 Jul, 2011 3 commits
  24. 12 Jul, 2011 2 commits
  25. 11 Jul, 2011 4 commits
  26. 08 Jul, 2011 2 commits