/system/core/init/ |
D | first_stage_mount.cpp | 108 virtual bool SetUpDmVerity(FstabEntry* fstab_entry) = 0; 130 bool SetUpDmVerity(FstabEntry* fstab_entry) override; 142 bool SetUpDmVerity(FstabEntry* fstab_entry) override; 208 const FstabEntry& fstab_entry) { in IsStandaloneImageRollback() argument 209 std::string old_spl = builtin_vbmeta.GetSecurityPatchLevel(fstab_entry); in IsStandaloneImageRollback() 210 std::string new_spl = standalone_vbmeta.GetSecurityPatchLevel(fstab_entry); in IsStandaloneImageRollback() 218 LOG(ERROR) << "Image rollback detected for " << fstab_entry.mount_point in IsStandaloneImageRollback() 622 for (const auto& fstab_entry : fstab_) { in GetDmVerityDevices() local 624 if (fstab_entry.fs_mgr_flags.verify_at_boot) { in GetDmVerityDevices() 629 if (fstab_entry.fs_mgr_flags.verify) { in GetDmVerityDevices() [all …]
|
/system/core/fs_mgr/libfs_avb/ |
D | fs_avb_util.cpp | 35 std::unique_ptr<VBMetaData> LoadAndVerifyVbmeta(const FstabEntry& fstab_entry, in LoadAndVerifyVbmeta() argument 42 std::string avb_partition_name = DeriveAvbPartitionName(fstab_entry, fs_mgr_get_slot_suffix(), in LoadAndVerifyVbmeta() 50 std::string device_path = fstab_entry.blk_device; in LoadAndVerifyVbmeta() 51 if (fstab_entry.fs_mgr_flags.logical && in LoadAndVerifyVbmeta() 52 !android::base::StartsWith(fstab_entry.blk_device, "/")) { in LoadAndVerifyVbmeta() 54 if (!dm.GetDmDevicePathByName(fstab_entry.blk_device, &device_path)) { in LoadAndVerifyVbmeta() 55 LERROR << "Failed to resolve logical device path for: " << fstab_entry.blk_device; in LoadAndVerifyVbmeta()
|
D | fs_avb.cpp | 282 AvbUniquePtr AvbHandle::LoadAndVerifyVbmeta(const FstabEntry& fstab_entry, in LoadAndVerifyVbmeta() argument 285 if (preload_avb_key_blobs.empty() && fstab_entry.avb_keys.empty()) { in LoadAndVerifyVbmeta() 286 LERROR << "avb_keys=/path/to/key(s) is missing for " << fstab_entry.mount_point; in LoadAndVerifyVbmeta() 298 fstab_entry.blk_device, "" /* partition_name, no need for a standalone path */, in LoadAndVerifyVbmeta() 304 LERROR << "Failed to load vbmeta: " << fstab_entry.blk_device; in LoadAndVerifyVbmeta() 344 auto list_avb_keys_in_dir = ListFiles(fstab_entry.avb_keys); in LoadAndVerifyVbmeta() 349 allowed_avb_keys = Split(fstab_entry.avb_keys, ":"); in LoadAndVerifyVbmeta() 358 LWARNING << "Found unknown public key used to sign " << fstab_entry.mount_point; in LoadAndVerifyVbmeta() 366 LINFO << "AVB verification disabled on: " << fstab_entry.mount_point; in LoadAndVerifyVbmeta() 370 LINFO << "Returning avb_handle for '" << fstab_entry.mount_point in LoadAndVerifyVbmeta() [all …]
|
D | avb_util.cpp | 98 bool HashtreeDmVeritySetup(FstabEntry* fstab_entry, const FsAvbHashtreeDescriptor& hashtree_desc, in HashtreeDmVeritySetup() argument 101 if (!ConstructVerityTable(hashtree_desc, fstab_entry->blk_device, &table) || !table.valid()) { in HashtreeDmVeritySetup() 111 const std::string mount_point(Basename(fstab_entry->mount_point)); in HashtreeDmVeritySetup() 112 const std::string device_name(GetVerityDeviceName(*fstab_entry)); in HashtreeDmVeritySetup() 120 SetBlockDeviceReadOnly(fstab_entry->blk_device); in HashtreeDmVeritySetup() 123 fstab_entry->blk_device = dev_path; in HashtreeDmVeritySetup() 244 bool LoadAvbHashtreeToEnableVerity(FstabEntry* fstab_entry, bool wait_for_verity_dev, in LoadAvbHashtreeToEnableVerity() argument 250 std::string partition_name = DeriveAvbPartitionName(*fstab_entry, ab_suffix, ab_other_suffix); in LoadAvbHashtreeToEnableVerity() 265 return HashtreeDmVeritySetup(fstab_entry, *hashtree_descriptor, wait_for_verity_dev); in LoadAvbHashtreeToEnableVerity() 298 std::string DeriveAvbPartitionName(const FstabEntry& fstab_entry, const std::string& ab_suffix, in DeriveAvbPartitionName() argument [all …]
|
D | avb_ops.cpp | 155 auto fstab_entry = GetEntryForMountPoint(&fstab_, mount_point); in GetLogicalPath() local 156 if (!fstab_entry) return ""; in GetLogicalPath() 159 if (fstab_entry->fs_mgr_flags.logical) { in GetLogicalPath() 161 if (!dm.GetDmDevicePathByName(fstab_entry->blk_device, &device_path)) { in GetLogicalPath() 162 LERROR << "Failed to resolve logical device path for: " << fstab_entry->blk_device; in GetLogicalPath()
|
D | avb_util.h | 53 bool HashtreeDmVeritySetup(FstabEntry* fstab_entry, const FsAvbHashtreeDescriptor& hashtree_desc, 57 bool LoadAvbHashtreeToEnableVerity(FstabEntry* fstab_entry, bool wait_for_verity_dev, 67 std::string DeriveAvbPartitionName(const FstabEntry& fstab_entry, const std::string& ab_suffix,
|
/system/core/fs_mgr/libfs_avb/include/fs_avb/ |
D | fs_avb.h | 94 const FstabEntry& fstab_entry, 114 AvbHashtreeResult SetUpAvbHashtree(FstabEntry* fstab_entry, bool wait_for_verity_dev); 117 static AvbHashtreeResult SetUpStandaloneAvbHashtree(FstabEntry* fstab_entry, 123 static bool TearDownAvbHashtree(FstabEntry* fstab_entry, bool wait); 127 std::string GetSecurityPatchLevel(const FstabEntry& fstab_entry) const;
|
D | fs_avb_util.h | 29 std::unique_ptr<VBMetaData> LoadAndVerifyVbmeta(const FstabEntry& fstab_entry,
|
/system/core/fs_mgr/libfs_avb/tests/ |
D | avb_util_test.cpp | 103 FstabEntry fstab_entry = { in TEST_F() local 112 fstab_entry.fs_mgr_flags.logical = true; in TEST_F() 113 EXPECT_EQ("system", DeriveAvbPartitionName(fstab_entry, "_dont_care", "_dont_care")); in TEST_F() 114 EXPECT_EQ("system", DeriveAvbPartitionName(fstab_entry, "_a", "_b")); in TEST_F() 115 EXPECT_EQ("system", DeriveAvbPartitionName(fstab_entry, "", "")); in TEST_F() 117 fstab_entry.fs_mgr_flags.slot_select = true; in TEST_F() 118 fstab_entry.logical_partition_name = "system_a"; in TEST_F() 119 EXPECT_EQ("system", DeriveAvbPartitionName(fstab_entry, "_a", "_dont_care")); in TEST_F() 120 EXPECT_EQ("system", DeriveAvbPartitionName(fstab_entry, "_a", "_b")); in TEST_F() 121 EXPECT_EQ("system", DeriveAvbPartitionName(fstab_entry, "_a", "")); in TEST_F() [all …]
|
/system/core/fs_mgr/ |
D | fs_mgr.cpp | 1723 auto fstab_entry = fs_mgr_get_mounted_entry_for_userdata(fstab, block_device); in fs_mgr_remount_userdata_into_checkpointing() local 1724 if (fstab_entry == nullptr) { in fs_mgr_remount_userdata_into_checkpointing() 1732 if (!force_umount && !SupportsCheckpoint(fstab_entry)) { in fs_mgr_remount_userdata_into_checkpointing() 1741 if (!force_umount && fstab_entry->fs_mgr_flags.checkpoint_fs) { in fs_mgr_remount_userdata_into_checkpointing() 1743 if (!checkpoint_manager.Update(fstab_entry)) { in fs_mgr_remount_userdata_into_checkpointing() 1747 if (mount(block_device.c_str(), fstab_entry->mount_point.c_str(), "none", in fs_mgr_remount_userdata_into_checkpointing() 1748 MS_REMOUNT | fstab_entry->flags, fstab_entry->fs_options.c_str()) != 0) { in fs_mgr_remount_userdata_into_checkpointing() 1820 for (auto& fstab_entry : *fstab) { in fs_mgr_do_mount_helper() 1821 if (!fs_match(fstab_entry.mount_point, n_name)) { in fs_mgr_do_mount_helper() 1827 if (fstab_entry.fs_type == "swap" || fstab_entry.fs_type == "emmc" || in fs_mgr_do_mount_helper() [all …]
|
D | fs_mgr_fstab.cpp | 346 std::vector<std::string> fstab_entry; in ReadFstabFromDt() local 363 fstab_entry.push_back(value); in ReadFstabFromDt() 374 fstab_entry.push_back(mount_point); in ReadFstabFromDt() 381 fstab_entry.push_back(value); in ReadFstabFromDt() 388 fstab_entry.push_back(value); in ReadFstabFromDt() 395 fstab_entry.push_back(value); in ReadFstabFromDt() 397 fstab_dt_entries.emplace_back(mount_point, android::base::Join(fstab_entry, " ")); in ReadFstabFromDt()
|