/system/core/fs_mgr/ |
D | fs_mgr_remount.cpp | 67 if (entry.mount_point == "/") return "/system"; in system_mount_point() 68 return entry.mount_point; in system_mount_point() 73 auto mount_point = system_mount_point(entry); in is_wrapped() local 75 [&mount_point](const auto& entry) { in is_wrapped() 76 return android::base::StartsWith(mount_point, in is_wrapped() 202 GetEntryForMountPoint(&overlayfs_candidates, entry.mount_point) || in main() 215 const auto mount_point = system_mount_point(entry); in main() local 216 if (partition == mount_point) return true; in main() 217 if (partition == android::base::Basename(mount_point)) return true; in main() 231 << wrap->mount_point << ", switching"; in main() [all …]
|
D | fs_mgr_roots.cpp | 60 static MountState GetMountState(const std::string& mount_point) { in GetMountState() argument 67 auto mv = GetEntryForMountPoint(&mounted_fstab, mount_point); in GetMountState() 104 auto mounted = GetMountState(rec->mount_point); in EnsurePathMounted() 112 const std::string mount_point = mount_pt.empty() ? rec->mount_point : mount_pt; in EnsurePathMounted() local 116 LERROR << "unknown fs_type \"" << rec->fs_type << "\" for " << mount_point; in EnsurePathMounted() 120 int result = fs_mgr_do_mount_one(*rec, mount_point); in EnsurePathMounted() 122 PERROR << "Failed to mount " << mount_point << "; formatting"; in EnsurePathMounted() 125 PERROR << "Failed to format " << mount_point; in EnsurePathMounted() 128 result = fs_mgr_do_mount_one(*rec, mount_point); in EnsurePathMounted() 132 PERROR << "Failed to mount " << mount_point; in EnsurePathMounted() [all …]
|
D | fs_mgr_overlayfs.cpp | 138 bool fs_mgr_filesystem_has_space(const std::string& mount_point) { in fs_mgr_filesystem_has_space() argument 143 if (statvfs(mount_point.c_str(), &vst)) { in fs_mgr_filesystem_has_space() 157 if (!fs_mgr_filesystem_has_space(entry->mount_point)) { in fs_mgr_overlayfs_enabled() 165 auto has_shared_blocks = fs_mgr_has_shared_blocks(entry->mount_point, entry->blk_device); in fs_mgr_overlayfs_enabled() 166 if (!has_shared_blocks && (entry->mount_point == "/system")) { in fs_mgr_overlayfs_enabled() 227 std::string fs_mgr_get_overlayfs_candidate(const std::string& mount_point) { in fs_mgr_get_overlayfs_candidate() argument 228 if (!fs_mgr_is_dir(mount_point)) return ""; in fs_mgr_get_overlayfs_candidate() 229 const auto base = android::base::Basename(mount_point) + "/"; in fs_mgr_get_overlayfs_candidate() 246 std::string fs_mgr_get_overlayfs_options(const std::string& mount_point) { in fs_mgr_get_overlayfs_options() argument 247 auto candidate = fs_mgr_get_overlayfs_candidate(mount_point); in fs_mgr_get_overlayfs_options() [all …]
|
D | fs_mgr.cpp | 580 check_fs(blk_device, entry.fs_type, entry.mount_point, &fs_stat); in prepare_fs_for_mount() 706 i < fstab.size() && fstab[start_idx].mount_point == fstab[i].mount_point; i++) { in mount_with_alternatives() 711 LERROR << __FUNCTION__ << "(): skipping fstab dup mountpoint=" << fstab[i].mount_point in mount_with_alternatives() 720 << "(): skipping mount due to invalid magic, mountpoint=" << fstab[i].mount_point in mount_with_alternatives() 729 if (!__mount(fstab[i].blk_device, fstab[i].mount_point, fstab[i])) { in mount_with_alternatives() 734 << fstab[i].mount_point << " with fs_type=" << fstab[i].fs_type in mount_with_alternatives() 748 check_fs(fstab[i].blk_device, fstab[i].fs_type, fstab[i].mount_point, &fs_stat); in mount_with_alternatives() 827 auto convert_fde_name = entry.mount_point + "/misc/vold/convert_fde"; in needs_block_encryption() 832 auto convert_fbe_name = entry.mount_point + "/convert_fbe"; in needs_block_encryption() 847 if (umount(entry.mount_point.c_str()) == 0) { in handle_encryptable() [all …]
|
D | fs_mgr_verity.cpp | 569 if (snprintf(tag, sizeof(tag), VERITY_LASTSIG_TAG "_%s", basename(entry.mount_point.c_str())) >= in compare_last_signature() 571 LERROR << "Metadata tag name too long for " << entry.mount_point; in compare_last_signature() 614 if (snprintf(tag, sizeof(tag), VERITY_STATE_TAG "_%s", basename(entry.mount_point.c_str())) >= in get_verity_state_offset() 616 LERROR << "Metadata tag name too long for " << entry.mount_point; in get_verity_state_offset() 725 const std::string mount_point(basename(entry->mount_point.c_str())); in fs_mgr_setup_verity() local 799 LINFO << "Enabling dm-verity for " << mount_point.c_str() in fs_mgr_setup_verity() 807 if (load_verity_table(dm, mount_point, verity.data_size, ¶ms, format_verity_table) == 0) { in fs_mgr_setup_verity() 813 LINFO << "Disabling error correction for " << mount_point.c_str(); in fs_mgr_setup_verity() 816 … if (load_verity_table(dm, mount_point, verity.data_size, ¶ms, format_verity_table) == 0) { in fs_mgr_setup_verity() 822 if (load_verity_table(dm, mount_point, verity.data_size, ¶ms, format_legacy_verity_table) == in fs_mgr_setup_verity() [all …]
|
D | fs_mgr_fstab.cpp | 399 std::string mount_point; in ReadFstabFromDt() local 404 mount_point = value; in ReadFstabFromDt() 406 mount_point = android::base::StringPrintf("/%s", dp->d_name); in ReadFstabFromDt() 408 fstab_entry.push_back(mount_point); in ReadFstabFromDt() 431 fstab_dt_entries.emplace_back(mount_point, android::base::Join(fstab_entry, " ")); in ReadFstabFromDt() 499 entry.mount_point = p; in ReadFstabFile() 598 .mount_point = "/data", in BuildGsiUserdataFstabEntry() 612 bool EraseFstabEntry(Fstab* fstab, const std::string& mount_point) { in EraseFstabEntry() argument 614 [&](const auto& entry) { return entry.mount_point == mount_point; }); in EraseFstabEntry() 720 return entry.mount_point == skip_mount_point; in SkipMountingPartitions() [all …]
|
D | fs_mgr_vendor_overlay.cpp | 71 bool fs_mgr_vendor_overlay_mount(const std::pair<std::string, std::string>& mount_point) { in fs_mgr_vendor_overlay_mount() argument 72 const auto [overlay_top, mount_dir] = mount_point; in fs_mgr_vendor_overlay_mount()
|
/system/core/fs_mgr/tests/ |
D | fs_mgr_test.cpp | 157 EXPECT_EQ(mentry->mnt_dir, entry.mount_point); in TEST() 233 EXPECT_EQ("/", fstab[0].mount_point); in TEST() 237 EXPECT_EQ("/metadata", fstab[1].mount_point); in TEST() 241 EXPECT_EQ("/data", fstab[2].mount_point); in TEST() 245 EXPECT_EQ("/misc", fstab[3].mount_point); in TEST() 249 EXPECT_EQ("/vendor/firmware_mnt", fstab[4].mount_point); in TEST() 256 EXPECT_EQ("auto", fstab[5].mount_point); in TEST() 260 EXPECT_EQ("none", fstab[6].mount_point); in TEST() 264 EXPECT_EQ("none2", fstab[7].mount_point); in TEST() 268 EXPECT_EQ("none3", fstab[8].mount_point); in TEST() [all …]
|
/system/core/init/ |
D | mount_handler.cpp | 86 if (stat(entry.mount_point.c_str(), &sb) || !S_ISDIR(sb.st_mode)) value = ""; in SetMountProperty() 89 if (android::base::StartsWith(entry.mount_point, "/apex/")) value = ""; in SetMountProperty() 91 auto mount_prop = entry.mount_point; in SetMountProperty() 104 MountHandlerEntry::MountHandlerEntry(const std::string& blk_device, const std::string& mount_point, in MountHandlerEntry() argument 106 : blk_device(blk_device), mount_point(mount_point), fs_type(fs_type) {} in MountHandlerEntry() 111 if (mount_point < r.mount_point) return true; in operator <() 112 if (mount_point > r.mount_point) return false; in operator <()
|
D | mount_namespace.cpp | 36 static bool MakeShared(const std::string& mount_point, bool recursive = false) { in MakeShared() argument 41 if (mount(nullptr, mount_point.c_str(), nullptr, mountflags, nullptr) == -1) { in MakeShared() 48 static bool MakePrivate(const std::string& mount_point, bool recursive = false) { in MakePrivate() argument 53 if (mount(nullptr, mount_point.c_str(), nullptr, mountflags, nullptr) == -1) { in MakePrivate()
|
D | first_stage_mount.cpp | 172 return entry.mount_point == "/" && entry.fs_type != "rootfs"; in GetRootEntry() 206 LOG(ERROR) << "Image rollback detected for " << fstab_entry.mount_point in IsStandaloneImageRollback() 469 PLOG(ERROR) << "Failed to setup verity for '" << begin->mount_point << "'"; in MountPartition() 477 for (; current != fstab_.end() && current->mount_point == begin->mount_point; current++) { in MountPartition() 499 return entry.mount_point == "/metadata"; in TrySwitchSystemAsRoot() 508 return entry.mount_point == "/system"; in TrySwitchSystemAsRoot() 534 if (current->mount_point == "/system") { in MountPartitions() 542 LOG(INFO) << "Failed to mount " << current->mount_point in MountPartitions() 545 LOG(INFO) << "Failed to mount " << current->mount_point in MountPartitions() 548 PLOG(ERROR) << "Failed to mount " << current->mount_point; in MountPartitions() [all …]
|
D | mount_handler.h | 31 MountHandlerEntry(const std::string& blk_device, const std::string& mount_point, 37 const std::string mount_point; member
|
/system/core/adb/daemon/ |
D | set_verity_enable_state_service.cpp | 66 static bool set_verity_enabled_state(int fd, const char* block_device, const char* mount_point, in set_verity_enabled_state() argument 90 WriteFdFmt(fd, "Verity already disabled on %s\n", mount_point); in set_verity_enabled_state() 95 WriteFdFmt(fd, "Verity already enabled on %s\n", mount_point); in set_verity_enabled_state() 108 if (enable ? fs_mgr_overlayfs_teardown(mount_point, &change) in set_verity_enabled_state() 109 : fs_mgr_overlayfs_setup(nullptr, mount_point, &change)) { in set_verity_enabled_state() 111 WriteFdFmt(fd, "%s overlayfs for %s\n", enable ? "disabling" : "using", mount_point); in set_verity_enabled_state() 115 mount_point, strerror(errno)); in set_verity_enabled_state() 117 WriteFdFmt(fd, "Verity %s on %s\n", enable ? "enabled" : "disabled", mount_point); in set_verity_enabled_state() 236 entry.mount_point.c_str(), enable)) { in set_verity_enabled_state_service()
|
/system/core/fs_mgr/include/ |
D | fs_mgr_overlayfs.h | 28 bool fs_mgr_overlayfs_setup(const char* backing = nullptr, const char* mount_point = nullptr, 30 bool fs_mgr_overlayfs_teardown(const char* mount_point = nullptr, bool* change = nullptr); 32 bool fs_mgr_has_shared_blocks(const std::string& mount_point, const std::string& dev); 33 std::string fs_mgr_get_context(const std::string& mount_point);
|
/system/extras/ext4_utils/ |
D | mkuserimg_mke2fs.py | 168 if args.mount_point: 169 mke2fs_opts += ["-M", args.mount_point] 184 ["-f", args.src_dir, "-a", args.mount_point, 199 if not args.mount_point: 202 if args.mount_point[0] != '/': 203 args.mount_point = '/' + args.mount_point
|
D | test_mkuserimg_mke2fs.py | 42 self.assertEqual("data", args.mount_point) 76 self.assertEqual("data", args.mount_point) 129 args.file_contexts, "-f", args.src_dir, "-a", args.mount_point,
|
/system/core/fs_mgr/libfs_avb/ |
D | avb_ops.cpp | 113 std::string mount_point(partition_name); in DeriveMountPoint() local 116 mount_point.erase(found); // converts system_a => system in DeriveMountPoint() 119 return "/" + mount_point; in DeriveMountPoint() 152 const auto mount_point = DeriveMountPoint(partition_name); in GetLogicalPath() local 153 if (mount_point.empty()) return ""; in GetLogicalPath() 155 auto fstab_entry = GetEntryForMountPoint(&fstab_, mount_point); in GetLogicalPath()
|
/system/apex/apexd/ |
D | apex_database.h | 36 std::string mount_point; // Path this apex is mounted on. member 41 const std::string& mount_point, in MountedApexData() 45 mount_point(mount_point), in MountedApexData() 61 compare_val = mount_point.compare(rhs.mount_point);
|
D | apexd_prepostinstall.cpp | 92 std::string mount_point = in StageFnInstall() local 96 Status mountStatus = apexd_private::MountPackage(apex, mount_point); in StageFnInstall() 153 std::string mount_point; in RunFnInstall() local 164 mount_point = apexd_private::GetPackageMountPoint(manifest); in RunFnInstall() 169 Status bind_status = apexd_private::BindMount(active_point, mount_point); in RunFnInstall() 171 LOG(ERROR) << "Failed to bind-mount " << mount_point << " to " in RunFnInstall()
|
D | apex_shim.cpp | 179 Status ValidateShimApex(const std::string& mount_point, in ValidateShimApex() argument 181 LOG(DEBUG) << "Validating shim apex " << mount_point; in ValidateShimApex() 189 auto iter = fs::directory_iterator(mount_point, ec); in ValidateShimApex() 192 << "Failed to scan " << mount_point << " : " << ec); in ValidateShimApex() 205 << "Failed to scan " << mount_point << " : " << ec); in ValidateShimApex()
|
D | apex_shim.h | 33 Status ValidateShimApex(const std::string& mount_point,
|
/system/vold/ |
D | MetadataCrypt.cpp | 61 static bool mount_via_fs_mgr(const char* mount_point, const char* blk_device) { in mount_via_fs_mgr() argument 68 auto mount_rc = fs_mgr_do_mount(&fstab_default, const_cast<char*>(mount_point), in mount_via_fs_mgr() 79 LOG(DEBUG) << "Mounted " << mount_point; in mount_via_fs_mgr() 252 bool fscrypt_mount_metadata_encrypted(const std::string& blk_device, const std::string& mount_point, in fscrypt_mount_metadata_encrypted() argument 254 LOG(DEBUG) << "fscrypt_mount_metadata_encrypted: " << mount_point << " " << needs_encrypt; in fscrypt_mount_metadata_encrypted() 261 auto data_rec = GetEntryForMountPoint(&fstab_default, mount_point); in fscrypt_mount_metadata_encrypted() 292 LOG(DEBUG) << "Mounting metadata-encrypted filesystem:" << mount_point; in fscrypt_mount_metadata_encrypted() 293 mount_via_fs_mgr(data_rec->mount_point.c_str(), crypto_blkdev.c_str()); in fscrypt_mount_metadata_encrypted()
|
D | MetadataCrypt.h | 23 const std::string& mount_point, bool needs_encrypt);
|
/system/core/fastboot/device/ |
D | flashing.cpp | 59 auto partition = android::base::Basename(entry.mount_point); in WipeOverlayfsForPartition() 60 if ("/" == entry.mount_point) { in WipeOverlayfsForPartition() 65 fs_mgr_overlayfs_teardown(entry.mount_point.c_str()); in WipeOverlayfsForPartition()
|
/system/core/fs_mgr/include/fs_mgr/ |
D | roots.h | 38 bool EnsurePathMounted(Fstab* fstab, const std::string& path, const std::string& mount_point = "");
|