Home
last modified time | relevance | path

Searched refs:fstab_entry (Results 1 – 11 of 11) sorted by relevance

/system/core/init/
Dfirst_stage_mount.cpp108 virtual bool SetUpDmVerity(FstabEntry* fstab_entry) = 0;
130 bool SetUpDmVerity(FstabEntry* fstab_entry) override;
142 bool SetUpDmVerity(FstabEntry* fstab_entry) override;
208 const FstabEntry& fstab_entry) { in IsStandaloneImageRollback() argument
209 std::string old_spl = builtin_vbmeta.GetSecurityPatchLevel(fstab_entry); in IsStandaloneImageRollback()
210 std::string new_spl = standalone_vbmeta.GetSecurityPatchLevel(fstab_entry); in IsStandaloneImageRollback()
218 LOG(ERROR) << "Image rollback detected for " << fstab_entry.mount_point in IsStandaloneImageRollback()
622 for (const auto& fstab_entry : fstab_) { in GetDmVerityDevices() local
624 if (fstab_entry.fs_mgr_flags.verify_at_boot) { in GetDmVerityDevices()
629 if (fstab_entry.fs_mgr_flags.verify) { in GetDmVerityDevices()
[all …]
/system/core/fs_mgr/libfs_avb/
Dfs_avb_util.cpp35 std::unique_ptr<VBMetaData> LoadAndVerifyVbmeta(const FstabEntry& fstab_entry, in LoadAndVerifyVbmeta() argument
42 std::string avb_partition_name = DeriveAvbPartitionName(fstab_entry, fs_mgr_get_slot_suffix(), in LoadAndVerifyVbmeta()
50 std::string device_path = fstab_entry.blk_device; in LoadAndVerifyVbmeta()
51 if (fstab_entry.fs_mgr_flags.logical && in LoadAndVerifyVbmeta()
52 !android::base::StartsWith(fstab_entry.blk_device, "/")) { in LoadAndVerifyVbmeta()
54 if (!dm.GetDmDevicePathByName(fstab_entry.blk_device, &device_path)) { in LoadAndVerifyVbmeta()
55 LERROR << "Failed to resolve logical device path for: " << fstab_entry.blk_device; in LoadAndVerifyVbmeta()
Dfs_avb.cpp282 AvbUniquePtr AvbHandle::LoadAndVerifyVbmeta(const FstabEntry& fstab_entry, in LoadAndVerifyVbmeta() argument
285 if (preload_avb_key_blobs.empty() && fstab_entry.avb_keys.empty()) { in LoadAndVerifyVbmeta()
286 LERROR << "avb_keys=/path/to/key(s) is missing for " << fstab_entry.mount_point; in LoadAndVerifyVbmeta()
298 fstab_entry.blk_device, "" /* partition_name, no need for a standalone path */, in LoadAndVerifyVbmeta()
304 LERROR << "Failed to load vbmeta: " << fstab_entry.blk_device; in LoadAndVerifyVbmeta()
344 auto list_avb_keys_in_dir = ListFiles(fstab_entry.avb_keys); in LoadAndVerifyVbmeta()
349 allowed_avb_keys = Split(fstab_entry.avb_keys, ":"); in LoadAndVerifyVbmeta()
358 LWARNING << "Found unknown public key used to sign " << fstab_entry.mount_point; in LoadAndVerifyVbmeta()
366 LINFO << "AVB verification disabled on: " << fstab_entry.mount_point; in LoadAndVerifyVbmeta()
370 LINFO << "Returning avb_handle for '" << fstab_entry.mount_point in LoadAndVerifyVbmeta()
[all …]
Davb_util.cpp98 bool HashtreeDmVeritySetup(FstabEntry* fstab_entry, const FsAvbHashtreeDescriptor& hashtree_desc, in HashtreeDmVeritySetup() argument
101 if (!ConstructVerityTable(hashtree_desc, fstab_entry->blk_device, &table) || !table.valid()) { in HashtreeDmVeritySetup()
111 const std::string mount_point(Basename(fstab_entry->mount_point)); in HashtreeDmVeritySetup()
112 const std::string device_name(GetVerityDeviceName(*fstab_entry)); in HashtreeDmVeritySetup()
120 SetBlockDeviceReadOnly(fstab_entry->blk_device); in HashtreeDmVeritySetup()
123 fstab_entry->blk_device = dev_path; in HashtreeDmVeritySetup()
244 bool LoadAvbHashtreeToEnableVerity(FstabEntry* fstab_entry, bool wait_for_verity_dev, in LoadAvbHashtreeToEnableVerity() argument
250 std::string partition_name = DeriveAvbPartitionName(*fstab_entry, ab_suffix, ab_other_suffix); in LoadAvbHashtreeToEnableVerity()
265 return HashtreeDmVeritySetup(fstab_entry, *hashtree_descriptor, wait_for_verity_dev); in LoadAvbHashtreeToEnableVerity()
298 std::string DeriveAvbPartitionName(const FstabEntry& fstab_entry, const std::string& ab_suffix, in DeriveAvbPartitionName() argument
[all …]
Davb_ops.cpp155 auto fstab_entry = GetEntryForMountPoint(&fstab_, mount_point); in GetLogicalPath() local
156 if (!fstab_entry) return ""; in GetLogicalPath()
159 if (fstab_entry->fs_mgr_flags.logical) { in GetLogicalPath()
161 if (!dm.GetDmDevicePathByName(fstab_entry->blk_device, &device_path)) { in GetLogicalPath()
162 LERROR << "Failed to resolve logical device path for: " << fstab_entry->blk_device; in GetLogicalPath()
Davb_util.h53 bool HashtreeDmVeritySetup(FstabEntry* fstab_entry, const FsAvbHashtreeDescriptor& hashtree_desc,
57 bool LoadAvbHashtreeToEnableVerity(FstabEntry* fstab_entry, bool wait_for_verity_dev,
67 std::string DeriveAvbPartitionName(const FstabEntry& fstab_entry, const std::string& ab_suffix,
/system/core/fs_mgr/libfs_avb/include/fs_avb/
Dfs_avb.h94 const FstabEntry& fstab_entry,
114 AvbHashtreeResult SetUpAvbHashtree(FstabEntry* fstab_entry, bool wait_for_verity_dev);
117 static AvbHashtreeResult SetUpStandaloneAvbHashtree(FstabEntry* fstab_entry,
123 static bool TearDownAvbHashtree(FstabEntry* fstab_entry, bool wait);
127 std::string GetSecurityPatchLevel(const FstabEntry& fstab_entry) const;
Dfs_avb_util.h29 std::unique_ptr<VBMetaData> LoadAndVerifyVbmeta(const FstabEntry& fstab_entry,
/system/core/fs_mgr/libfs_avb/tests/
Davb_util_test.cpp103 FstabEntry fstab_entry = { in TEST_F() local
112 fstab_entry.fs_mgr_flags.logical = true; in TEST_F()
113 EXPECT_EQ("system", DeriveAvbPartitionName(fstab_entry, "_dont_care", "_dont_care")); in TEST_F()
114 EXPECT_EQ("system", DeriveAvbPartitionName(fstab_entry, "_a", "_b")); in TEST_F()
115 EXPECT_EQ("system", DeriveAvbPartitionName(fstab_entry, "", "")); in TEST_F()
117 fstab_entry.fs_mgr_flags.slot_select = true; in TEST_F()
118 fstab_entry.logical_partition_name = "system_a"; in TEST_F()
119 EXPECT_EQ("system", DeriveAvbPartitionName(fstab_entry, "_a", "_dont_care")); in TEST_F()
120 EXPECT_EQ("system", DeriveAvbPartitionName(fstab_entry, "_a", "_b")); in TEST_F()
121 EXPECT_EQ("system", DeriveAvbPartitionName(fstab_entry, "_a", "")); in TEST_F()
[all …]
/system/core/fs_mgr/
Dfs_mgr.cpp1723 auto fstab_entry = fs_mgr_get_mounted_entry_for_userdata(fstab, block_device); in fs_mgr_remount_userdata_into_checkpointing() local
1724 if (fstab_entry == nullptr) { in fs_mgr_remount_userdata_into_checkpointing()
1732 if (!force_umount && !SupportsCheckpoint(fstab_entry)) { in fs_mgr_remount_userdata_into_checkpointing()
1741 if (!force_umount && fstab_entry->fs_mgr_flags.checkpoint_fs) { in fs_mgr_remount_userdata_into_checkpointing()
1743 if (!checkpoint_manager.Update(fstab_entry)) { in fs_mgr_remount_userdata_into_checkpointing()
1747 if (mount(block_device.c_str(), fstab_entry->mount_point.c_str(), "none", in fs_mgr_remount_userdata_into_checkpointing()
1748 MS_REMOUNT | fstab_entry->flags, fstab_entry->fs_options.c_str()) != 0) { in fs_mgr_remount_userdata_into_checkpointing()
1820 for (auto& fstab_entry : *fstab) { in fs_mgr_do_mount_helper()
1821 if (!fs_match(fstab_entry.mount_point, n_name)) { in fs_mgr_do_mount_helper()
1827 if (fstab_entry.fs_type == "swap" || fstab_entry.fs_type == "emmc" || in fs_mgr_do_mount_helper()
[all …]
Dfs_mgr_fstab.cpp346 std::vector<std::string> fstab_entry; in ReadFstabFromDt() local
363 fstab_entry.push_back(value); in ReadFstabFromDt()
374 fstab_entry.push_back(mount_point); in ReadFstabFromDt()
381 fstab_entry.push_back(value); in ReadFstabFromDt()
388 fstab_entry.push_back(value); in ReadFstabFromDt()
395 fstab_entry.push_back(value); in ReadFstabFromDt()
397 fstab_dt_entries.emplace_back(mount_point, android::base::Join(fstab_entry, " ")); in ReadFstabFromDt()