1. 24 Apr, 2015 1 commit
    • Jeff Sharkey's avatar
      Migrate primary external storage. · 1d6fbcc3
      Jeff Sharkey authored
      When requested, kick off a thread that will migrate storage contents
      between two locations.  This is performed in several steps that
      also interact with the framework:
      
      1. Take old and new volumes offline during migration
      2. Wipe new location clean (10% of progress)
      3. Copy files from old to new (60% of progress)
      4. Inform framework that move was successful so it can persist
      5. Wipe old location clean (15% of progress)
      
      Derives a hacky progress estimate by using a rough proxy of free
      disk space changes while a cp/rm is taking place.
      
      Add new internal path for direct access to volumes to bypass any
      FUSE emulation overhead, and send it to framework.  Remove mutex
      around various exec calls since setexeccon() is already per-thread.
      
      Bug: 19993667
      Change-Id: Ibcb4f6fe0126d05b2365f316f53e71dc3e79a2b8
      1d6fbcc3
  2. 13 Jun, 2013 1 commit
    • Ken Sumrall's avatar
      vold: Add an optional wipe paramter to the volume format command · 9caab76c
      Ken Sumrall authored
      The new wipe option to the vold format command will invoke BLKDISCARD
      on the partition before invoking newfs_msdos.  This will be used whenever
      a full wipe of the device is wanted, as this is more secure than just
      doing newfs_msdos.
      
      Bug: 9392982
      Change-Id: Ie106f1b9cc70abc61206006d1821641c27c7ccae
      9caab76c
  3. 02 Sep, 2010 1 commit
  4. 03 Mar, 2010 1 commit
    • San Mehat's avatar
      vold: Add a versioned superblock to secure containers. · fcf24fe6
      San Mehat authored
      
      Add an un-encrypted superblock to the end of a secure container to
      help identify the crypto cipher used. This is required in order to
      provide some semblence of versioning, in case we have cause to
      change the crypto type on an update - say for example switching
      from software to hardware encryption, or from 128 -> a zillion
      bit keys.
      
      NOTE: This format is incompatible with previous secure containers.
      After this change they will no longer be mountable.
      Signed-off-by: default avatarSan Mehat <san@google.com>
      fcf24fe6
  5. 07 Jan, 2010 1 commit
  6. 06 Jan, 2010 1 commit
  7. 04 Jan, 2010 1 commit
  8. 11 Oct, 2009 1 commit