I've ran into problems tackling the native encryption of Android: after spending a considerable amount of time on reading the code and splitting functions out from vold, I ran into the dead end of ARM's Trusted Execution Environment (TEE, learn more about it here on Wikipedia). The repository also holds the incomplete code in attempt to implement Android cryptfs decryption by hand. What's more, this verifies that our toolchain was really generating correctly statically-linked executables that can be directly executed by the kernel. Implementing the toy init is necessary is because we set up a tiny-platform that we can place other things onto it in this way: maybe password prompts for entering LUKS passphrases, or options to choose different Android snapshots. I've set up a repository called preinit_angler, which currently implements the test function (print haiku into kernel message so that we can verify them on next boot) described in this article. The progress of each subproject are listed below. ![]() This week was about creating a repository for an init program written in C/C++, testing it out, and trying to load the real init inside Gentoo root.
0 Comments
Leave a Reply. |