/system/core/fs_mgr/libfs_avb/ |
D | fs_avb_util.cpp | 35 std::unique_ptr<VBMetaData> LoadAndVerifyVbmeta(const FstabEntry& fstab_entry, in LoadAndVerifyVbmeta() argument 42 std::string avb_partition_name = DeriveAvbPartitionName(fstab_entry, fs_mgr_get_slot_suffix(), in LoadAndVerifyVbmeta() 50 std::string device_path = fstab_entry.blk_device; in LoadAndVerifyVbmeta() 51 if (fstab_entry.fs_mgr_flags.logical && in LoadAndVerifyVbmeta() 52 !android::base::StartsWith(fstab_entry.blk_device, "/")) { in LoadAndVerifyVbmeta() 54 if (!dm.GetDmDevicePathByName(fstab_entry.blk_device, &device_path)) { in LoadAndVerifyVbmeta() 55 LERROR << "Failed to resolve logical device path for: " << fstab_entry.blk_device; in LoadAndVerifyVbmeta()
|
D | fs_avb.cpp | 268 AvbUniquePtr AvbHandle::LoadAndVerifyVbmeta(const FstabEntry& fstab_entry) { in LoadAndVerifyVbmeta() argument 269 if (fstab_entry.avb_keys.empty()) { in LoadAndVerifyVbmeta() 270 LERROR << "avb_keys=/path/to/key(s) is missing for " << fstab_entry.mount_point; in LoadAndVerifyVbmeta() 282 fstab_entry.blk_device, "" /* partition_name, no need for a standalone path */, in LoadAndVerifyVbmeta() 288 LERROR << "Failed to load vbmeta: " << fstab_entry.blk_device; in LoadAndVerifyVbmeta() 311 if (!ValidatePublicKeyBlob(public_key_data, Split(fstab_entry.avb_keys, ":"))) { in LoadAndVerifyVbmeta() 313 LWARNING << "Found unknown public key used to sign " << fstab_entry.mount_point; in LoadAndVerifyVbmeta() 321 LINFO << "AVB verification disabled on: " << fstab_entry.mount_point; in LoadAndVerifyVbmeta() 325 LINFO << "Returning avb_handle for '" << fstab_entry.mount_point in LoadAndVerifyVbmeta() 427 AvbHashtreeResult AvbHandle::SetUpStandaloneAvbHashtree(FstabEntry* fstab_entry, in SetUpStandaloneAvbHashtree() argument [all …]
|
D | avb_util.cpp | 98 bool HashtreeDmVeritySetup(FstabEntry* fstab_entry, const FsAvbHashtreeDescriptor& hashtree_desc, in HashtreeDmVeritySetup() argument 101 if (!ConstructVerityTable(hashtree_desc, fstab_entry->blk_device, &table) || !table.valid()) { in HashtreeDmVeritySetup() 107 const std::string mount_point(Basename(fstab_entry->mount_point)); in HashtreeDmVeritySetup() 108 const std::string device_name(GetVerityDeviceName(*fstab_entry)); in HashtreeDmVeritySetup() 122 SetBlockDeviceReadOnly(fstab_entry->blk_device); in HashtreeDmVeritySetup() 125 fstab_entry->blk_device = dev_path; in HashtreeDmVeritySetup() 194 bool LoadAvbHashtreeToEnableVerity(FstabEntry* fstab_entry, bool wait_for_verity_dev, in LoadAvbHashtreeToEnableVerity() argument 200 std::string partition_name = DeriveAvbPartitionName(*fstab_entry, ab_suffix, ab_other_suffix); in LoadAvbHashtreeToEnableVerity() 215 return HashtreeDmVeritySetup(fstab_entry, *hashtree_descriptor, wait_for_verity_dev); in LoadAvbHashtreeToEnableVerity() 248 std::string DeriveAvbPartitionName(const FstabEntry& fstab_entry, const std::string& ab_suffix, in DeriveAvbPartitionName() argument [all …]
|
D | avb_ops.cpp | 155 auto fstab_entry = GetEntryForMountPoint(&fstab_, mount_point); in GetLogicalPath() local 156 if (!fstab_entry) return ""; in GetLogicalPath() 159 if (fstab_entry->fs_mgr_flags.logical) { in GetLogicalPath() 161 if (!dm.GetDmDevicePathByName(fstab_entry->blk_device, &device_path)) { in GetLogicalPath() 162 LERROR << "Failed to resolve logical device path for: " << fstab_entry->blk_device; in GetLogicalPath()
|
D | avb_util.h | 50 bool HashtreeDmVeritySetup(FstabEntry* fstab_entry, const FsAvbHashtreeDescriptor& hashtree_desc, 54 bool LoadAvbHashtreeToEnableVerity(FstabEntry* fstab_entry, bool wait_for_verity_dev, 64 std::string DeriveAvbPartitionName(const FstabEntry& fstab_entry, const std::string& ab_suffix,
|
/system/core/init/ |
D | first_stage_mount.cpp | 98 virtual bool SetUpDmVerity(FstabEntry* fstab_entry) = 0; 118 bool SetUpDmVerity(FstabEntry* fstab_entry) override; 130 bool SetUpDmVerity(FstabEntry* fstab_entry) override; 196 const FstabEntry& fstab_entry) { in IsStandaloneImageRollback() argument 197 std::string old_spl = builtin_vbmeta.GetSecurityPatchLevel(fstab_entry); in IsStandaloneImageRollback() 198 std::string new_spl = standalone_vbmeta.GetSecurityPatchLevel(fstab_entry); in IsStandaloneImageRollback() 206 LOG(ERROR) << "Image rollback detected for " << fstab_entry.mount_point in IsStandaloneImageRollback() 650 for (const auto& fstab_entry : fstab_) { in GetDmVerityDevices() local 652 if (fstab_entry.fs_mgr_flags.verify_at_boot) { in GetDmVerityDevices() 657 if (fstab_entry.fs_mgr_flags.verify) { in GetDmVerityDevices() [all …]
|
/system/core/fs_mgr/libfs_avb/include/fs_avb/ |
D | fs_avb.h | 89 const FstabEntry& fstab_entry); // loads offline vbmeta. 107 AvbHashtreeResult SetUpAvbHashtree(FstabEntry* fstab_entry, bool wait_for_verity_dev); 110 static AvbHashtreeResult SetUpStandaloneAvbHashtree(FstabEntry* fstab_entry, 116 static bool TearDownAvbHashtree(FstabEntry* fstab_entry, bool wait); 120 std::string GetSecurityPatchLevel(const FstabEntry& fstab_entry) const;
|
D | fs_avb_util.h | 29 std::unique_ptr<VBMetaData> LoadAndVerifyVbmeta(const FstabEntry& fstab_entry,
|
/system/core/fs_mgr/libfs_avb/tests/ |
D | avb_util_test.cpp | 103 FstabEntry fstab_entry = { in TEST_F() local 112 fstab_entry.fs_mgr_flags.logical = true; in TEST_F() 113 EXPECT_EQ("system", DeriveAvbPartitionName(fstab_entry, "_dont_care", "_dont_care")); in TEST_F() 114 EXPECT_EQ("system", DeriveAvbPartitionName(fstab_entry, "_a", "_b")); in TEST_F() 115 EXPECT_EQ("system", DeriveAvbPartitionName(fstab_entry, "", "")); in TEST_F() 117 fstab_entry.fs_mgr_flags.slot_select = true; in TEST_F() 118 fstab_entry.logical_partition_name = "system_a"; in TEST_F() 119 EXPECT_EQ("system", DeriveAvbPartitionName(fstab_entry, "_a", "_dont_care")); in TEST_F() 120 EXPECT_EQ("system", DeriveAvbPartitionName(fstab_entry, "_a", "_b")); in TEST_F() 121 EXPECT_EQ("system", DeriveAvbPartitionName(fstab_entry, "_a", "")); in TEST_F() [all …]
|
/system/core/fs_mgr/ |
D | fs_mgr.cpp | 1393 for (auto& fstab_entry : *fstab) { in fs_mgr_do_mount_helper() 1394 if (!fs_match(fstab_entry.mount_point, n_name)) { in fs_mgr_do_mount_helper() 1400 if (fstab_entry.fs_type == "swap" || fstab_entry.fs_type == "emmc" || in fs_mgr_do_mount_helper() 1401 fstab_entry.fs_type == "mtd") { in fs_mgr_do_mount_helper() 1402 LERROR << "Cannot mount filesystem of type " << fstab_entry.fs_type << " on " in fs_mgr_do_mount_helper() 1407 if (fstab_entry.fs_mgr_flags.logical) { in fs_mgr_do_mount_helper() 1408 if (!fs_mgr_update_logical_partition(&fstab_entry)) { in fs_mgr_do_mount_helper() 1414 if (!checkpoint_manager.Update(&fstab_entry, n_blk_device)) { in fs_mgr_do_mount_helper() 1420 if (fstab_entry.fs_mgr_flags.wait && !fs_mgr_wait_for_file(n_blk_device, 20s)) { in fs_mgr_do_mount_helper() 1425 int fs_stat = prepare_fs_for_mount(n_blk_device, fstab_entry); in fs_mgr_do_mount_helper() [all …]
|
D | fs_mgr_fstab.cpp | 380 std::vector<std::string> fstab_entry; in ReadFstabFromDt() local 397 fstab_entry.push_back(value); in ReadFstabFromDt() 408 fstab_entry.push_back(mount_point); in ReadFstabFromDt() 415 fstab_entry.push_back(value); in ReadFstabFromDt() 422 fstab_entry.push_back(value); in ReadFstabFromDt() 429 fstab_entry.push_back(value); in ReadFstabFromDt() 431 fstab_dt_entries.emplace_back(mount_point, android::base::Join(fstab_entry, " ")); in ReadFstabFromDt()
|