1. 16 Mar, 2015 1 commit
  2. 13 Mar, 2015 4 commits
    • Jeff Sharkey's avatar
      Merge "Follow NetlinkEvent refactoring." · 9e02365a
      Jeff Sharkey authored
      9e02365a
    • Jeff Sharkey's avatar
      Follow NetlinkEvent refactoring. · 2e0b4a2c
      Jeff Sharkey authored
      Change-Id: I130b250a663cdfb379def24583523d0287ec31dd
      2e0b4a2c
    • Jeff Sharkey's avatar
      6f90ce0f
    • Jeff Sharkey's avatar
      Checkpoint of better dynamic device support. · deb24057
      Jeff Sharkey authored
      This is the first in a series of changes that are designed to
      introduce better support for dynamic block devices.
      
      It starts by defining a new Volume object which represents a storage
      endpoint that knows how to mount, unmount, and format itself.  This
      could be a filesystem directly on a partition, or it could be an
      emulated FUSE filesystem, an ASEC, or an OBB.
      
      These new volumes can be "stacked" so that unmounting a volume will
      also unmount any volumes stacked above it.  Volumes that provide
      shared storage can also be asked to present themselves (through bind
      mounts) into user-specific mount areas.
      
      This change also adds a Disk class which is created based on block
      kernel netlink events.  Instead of waiting for partition events from
      the kernel, it uses gptfdisk to read partition details and creates
      the relevant Volume objects.
      
      Change-Id: I0e8bc1f8f9dcb24405f5e795c0658998e22ae2f7
      deb24057
  3. 06 Mar, 2015 1 commit
  4. 05 Mar, 2015 5 commits
  5. 26 Feb, 2015 12 commits
  6. 24 Feb, 2015 1 commit
    • Shawn Willden's avatar
      Rename keymaster_device_t to keymaster0_device_t. · d1fd8468
      Shawn Willden authored
      This is to accomodate the new keymaster1_device_t, which has an entirely
      different interface.
      
      Soon I'll provide a libkeymaster which provides a unified (and nicer)
      interface for dealing with both v0 and v1 keymaster implementations
      using a v1 keymaster API.  For now this change is just so that vold will
      build and run.
      
      Change-Id: I5c54282c12d1c4b8b22ed4929b6e6c724a94ede4
      d1fd8468
  7. 11 Feb, 2015 1 commit
    • JP Abgrall's avatar
      crytpfs: fix clobbering of crypto info on keymaster failure · 933216c8
      JP Abgrall authored
      Changing the device lock (even from swipe to none) will cause the
      master key to be re-encrypted.
      If at that point keymaster fails (e.g. due to an incompatible keymaster update)
      cryptfs will write back the now-incomplete crypto metadata.
      Upon next reboot, userdata can't be decrypted.
      
      Now we don't bother writing on keymaster failure.
      
      Bug: 19301883
      Change-Id: I2b9a1278f8b4d333ac8d567e17e2263005e99409
      933216c8
  8. 09 Feb, 2015 3 commits
  9. 07 Feb, 2015 5 commits
  10. 06 Feb, 2015 7 commits