- 01 Feb, 2016 7 commits
-
-
Jeff Vander Stoep authored
Change-Id: I69f36f560334b11b099f2eb15999603dd2469d4f
-
Jeffrey Vander Stoep authored
am: 6f69ee09 * commit '6f69ee09': cryptfs: run e2fsck/fsck.f2fs in fsck domain
-
Jeffrey Vander Stoep authored
-
Jeff Vander Stoep authored
e2fsck and fsck.f2fs must run in the fsck domain. Add call to setexeccon() to tell selinux to run in the fsck domain on exec. Addresses: avc: denied { execute_no_trans } for path="/system/bin/e2fsck" dev="mmcblk0p41" ino=241 scontext=u:r:vold:s0 tcontext=u:object_r:fsck_exec:s0 tclass=file Bug: 26872236 Change-Id: Ib2a583aeefc667f8aa67532e0ac0ff9619b65461
-
Paul Crowley authored
FBE devices need a factory reset after this change. Bug: 26704408 Change-Id: I150b82a13a4a007d9a8997ef6a676e96576356b2
-
Paul Crowley authored
Mainly a refactor, but with a substantive change: Keys are created in a temporary location, then moved to their final destination, for atomicity. Bug: 26704408 Change-Id: I0b2dc70d6bfa1f8a65536dd05b73c4b36a4699cf
-
Paul Crowley authored
Change-Id: Icf746ec1968a073fde707ecc788b648f5803fd38
-
- 28 Jan, 2016 1 commit
-
-
Paul Crowley authored
Our code for creating disk encryption keys doesn't work everywhere, and it doesn't need to; only on platforms that support FBE. Don't create them elsewhere. Bug: 26842807 Change-Id: I686d0ffd7cb3adbddfce661c22ce18f66acb1aba
-
- 27 Jan, 2016 2 commits
-
-
Paul Crowley authored
The key storage module didn't comply with Android coding standards and had room for improvemnet in a few other ways, so have cleaned up. Change-Id: I260ccff316423169cf887e538113b5ea400892f2
-
Paul Crowley authored
-
- 26 Jan, 2016 2 commits
-
-
Paul Crowley authored
Instead of writing raw keys, encrypt the keys with keymaster. This paves the way to protecting them with auth tokens and passwords later. In addition, fold in the hash of a 16k file into their encryption, to ensure secure deletion works properly. Now even C++ier! Bug: 22502684 Bug: 22950892 Change-Id: If70f139e342373533c42d5a298444b8438428322
-
Narayan Kamath authored
Avoid ENOTCONN for file system operations. bug: 26645585 bug: 26070583 Change-Id: I19b00db37ef7ba85a2cae16c7c4204826653f559
-
- 21 Jan, 2016 1 commit
-
-
Paul Crowley authored
As a precaution, we do the work of emulating an unlock even on devices that aren't emulating FBE. However, we don't care if it fails, so don't fail the calling command in that instance. Bug: 26713622 Change-Id: I8c5fb4b9a130335ecbb9b8ea6367f1c59835c0f1
-
- 20 Jan, 2016 1 commit
-
-
Paul Crowley authored
Major rework and refactor of FBE code to load the keys at the right time and in a natural way. The old code was aimed at our goals for M, with patches on top, and didn't quite work. Bug: 22358539 Change-Id: I9bf7a0a86ee3f2abf0edbd5966f93efac2474c2c
-
- 15 Jan, 2016 1 commit
-
-
Jeff Sharkey authored
Bug: 26466827 Change-Id: Id5f05298c2cb5f3cf288df37ddf0a196ca49949b
-
- 14 Jan, 2016 1 commit
-
-
Daichi Hirono authored
-
- 12 Jan, 2016 2 commits
-
-
Paul Lawrence authored
Merge "cryptfs: Skip to encrtypt unused blocks into a block group which uninitialize block bitmap ." am: 1ae498e0 am: 9b5db9bc * commit '9b5db9bc': cryptfs: Skip to encrtypt unused blocks into a block group which uninitialize block bitmap .
-
Paul Crowley authored
Much nicer C++ style logging, but the main reason is to clean up AutoCloseFD.h so I don't have to use cutils to use it. Change-Id: I7a7f227508418046eecce6c89f813bd8854f448a
-
- 11 Jan, 2016 2 commits
-
-
Paul Lawrence authored
Merge "cryptfs: Skip to encrtypt unused blocks into a block group which uninitialize block bitmap ." am: 1ae498e0 * commit '1ae498e0': cryptfs: Skip to encrtypt unused blocks into a block group which uninitialize block bitmap .
-
Paul Lawrence authored
Merge "cryptfs: Skip to encrtypt unused blocks into a block group which uninitialize block bitmap ."
-
- 07 Jan, 2016 1 commit
-
-
Daichi Hirono authored
After DocumentsProvider opens FD on app fuse, DocumentProvider passes it to other applications. To allow other applications to use the FD on app fuse, we need to specify allow_other mount option. BUG=25756419 Change-Id: I3c729f90e5b822a7b1032bf80726cc234c0936b1
-
- 06 Jan, 2016 1 commit
-
-
liminghao authored
Bug: 198288 Change-Id: Iaa1a14fd916ddec8dc1a4be18d49732ebcba6884 Signed-off-by:
liminghao <liminghao@xiaomi.com>
-
- 22 Dec, 2015 1 commit
-
-
Daichi Hirono authored
BUG=25756420 Change-Id: I75b41f135c172d400e57a72a2be0473546781475
-
- 19 Dec, 2015 1 commit
-
-
Jeff Sharkey authored
Otherwise later unlock commands will fail. Bug: 26267450 Change-Id: I090ac3a3fd4ac6d49290906e21d88f1efcdec421
-
- 17 Dec, 2015 1 commit
-
-
Jeff Sharkey authored
am: 6a7d34bf * commit '6a7d34bf': Hide external storage from apps if it's not set as adoptable
-
- 16 Dec, 2015 2 commits
-
-
Jeff Sharkey authored
am: f570ded5 * commit 'f570ded5': Hide external storage from apps if it's not set as adoptable
-
Jeff Sharkey authored
-
- 15 Dec, 2015 1 commit
-
-
Qin Chao authored
If storage is not visible to apps and no need to spin up FUSE, it also should not make FUSE mount point directory. Change-Id: I6ecd2e5bf56b5dcf0e11834880256b156a62a9a0 Signed-off-by:
Qin Chao <chao.qin@intel.com>
-
- 14 Dec, 2015 1 commit
-
-
Paul Crowley authored
Change-Id: Ia697de58b983233c78e9ef8eb93098d50dfda931
-
- 11 Dec, 2015 3 commits
-
-
Lenka Trochtova authored
Add the serial parameter to prepare_user_storage to avoid confusion when parsing parameters and passing them around. Change-Id: Id5516c248401ad50585aa8f6e8b1545a6cded549
-
Daichi Hirono authored
BUG=25755834 Change-Id: Icb59b5096239fd3611b614a0870d0ec910cee277
-
Daichi Hirono authored
-
- 10 Dec, 2015 3 commits
-
-
Paul Crowley authored
Change-Id: I2c7333de680cf5d350894f5064e955969e804781
-
Paul Crowley authored
Change-Id: I23bb19a329b34ba4b81c57b815a2a0a4e8f27745
-
Paul Crowley authored
Following around the call graph in code search is hard enough as it is! Change-Id: I09d3513664423aafe0d99f9158acfbbb6c79b590
-
- 09 Dec, 2015 2 commits
-
-
Paul Lawrence authored
Change-Id: Ied03e2ee404a1b4f386740213e6ab01f18ec09b9
-
Daichi Hirono authored
BUG=25755834 Change-Id: Ica8bd336baa74e117be008a6e7ee34e3ffac3769
-
- 08 Dec, 2015 2 commits
-
-
Lenka Trochtova authored
BUG: 24883058 Change-Id: I77d4757f87214166e7c41c7eb0d06b1cd5f06b20
-
Jeff Sharkey authored
When FBE emulation is enabled, lock/unlock the media directories that store emulated SD card contents. Change unlocking logic to always chmod directories back to known state so that we can recover devices that have disabled FBE emulation. Bug: 26010607, 26027473 Change-Id: I6d4bff25d8ad7b948679290106f585f777f7a249
-
- 05 Dec, 2015 1 commit
-
-
Elliott Hughes authored
Change-Id: I0c5211a00d92d0ee796bb9c77d2e13675a2a3e8d
-