Home
last modified time | relevance | path

Searched refs:mount_point (Results 1 – 25 of 41) sorted by relevance

12

/system/core/fs_mgr/
Dfs_mgr_remount.cpp67 if (entry.mount_point == "/") return "/system"; in system_mount_point()
68 return entry.mount_point; in system_mount_point()
73 auto mount_point = system_mount_point(entry); in is_wrapped() local
75 [&mount_point](const auto& entry) { in is_wrapped()
76 return android::base::StartsWith(mount_point, in is_wrapped()
202 GetEntryForMountPoint(&overlayfs_candidates, entry.mount_point) || in main()
215 const auto mount_point = system_mount_point(entry); in main() local
216 if (partition == mount_point) return true; in main()
217 if (partition == android::base::Basename(mount_point)) return true; in main()
231 << wrap->mount_point << ", switching"; in main()
[all …]
Dfs_mgr_roots.cpp60 static MountState GetMountState(const std::string& mount_point) { in GetMountState() argument
67 auto mv = GetEntryForMountPoint(&mounted_fstab, mount_point); in GetMountState()
104 auto mounted = GetMountState(rec->mount_point); in EnsurePathMounted()
112 const std::string mount_point = mount_pt.empty() ? rec->mount_point : mount_pt; in EnsurePathMounted() local
116 LERROR << "unknown fs_type \"" << rec->fs_type << "\" for " << mount_point; in EnsurePathMounted()
120 int result = fs_mgr_do_mount_one(*rec, mount_point); in EnsurePathMounted()
122 PERROR << "Failed to mount " << mount_point << "; formatting"; in EnsurePathMounted()
125 PERROR << "Failed to format " << mount_point; in EnsurePathMounted()
128 result = fs_mgr_do_mount_one(*rec, mount_point); in EnsurePathMounted()
132 PERROR << "Failed to mount " << mount_point; in EnsurePathMounted()
[all …]
Dfs_mgr_overlayfs.cpp138 bool fs_mgr_filesystem_has_space(const std::string& mount_point) { in fs_mgr_filesystem_has_space() argument
143 if (statvfs(mount_point.c_str(), &vst)) { in fs_mgr_filesystem_has_space()
157 if (!fs_mgr_filesystem_has_space(entry->mount_point)) { in fs_mgr_overlayfs_enabled()
165 auto has_shared_blocks = fs_mgr_has_shared_blocks(entry->mount_point, entry->blk_device); in fs_mgr_overlayfs_enabled()
166 if (!has_shared_blocks && (entry->mount_point == "/system")) { in fs_mgr_overlayfs_enabled()
227 std::string fs_mgr_get_overlayfs_candidate(const std::string& mount_point) { in fs_mgr_get_overlayfs_candidate() argument
228 if (!fs_mgr_is_dir(mount_point)) return ""; in fs_mgr_get_overlayfs_candidate()
229 const auto base = android::base::Basename(mount_point) + "/"; in fs_mgr_get_overlayfs_candidate()
246 std::string fs_mgr_get_overlayfs_options(const std::string& mount_point) { in fs_mgr_get_overlayfs_options() argument
247 auto candidate = fs_mgr_get_overlayfs_candidate(mount_point); in fs_mgr_get_overlayfs_options()
[all …]
Dfs_mgr.cpp580 check_fs(blk_device, entry.fs_type, entry.mount_point, &fs_stat); in prepare_fs_for_mount()
706 i < fstab.size() && fstab[start_idx].mount_point == fstab[i].mount_point; i++) { in mount_with_alternatives()
711 LERROR << __FUNCTION__ << "(): skipping fstab dup mountpoint=" << fstab[i].mount_point in mount_with_alternatives()
720 << "(): skipping mount due to invalid magic, mountpoint=" << fstab[i].mount_point in mount_with_alternatives()
729 if (!__mount(fstab[i].blk_device, fstab[i].mount_point, fstab[i])) { in mount_with_alternatives()
734 << fstab[i].mount_point << " with fs_type=" << fstab[i].fs_type in mount_with_alternatives()
748 check_fs(fstab[i].blk_device, fstab[i].fs_type, fstab[i].mount_point, &fs_stat); in mount_with_alternatives()
827 auto convert_fde_name = entry.mount_point + "/misc/vold/convert_fde"; in needs_block_encryption()
832 auto convert_fbe_name = entry.mount_point + "/convert_fbe"; in needs_block_encryption()
847 if (umount(entry.mount_point.c_str()) == 0) { in handle_encryptable()
[all …]
Dfs_mgr_verity.cpp569 if (snprintf(tag, sizeof(tag), VERITY_LASTSIG_TAG "_%s", basename(entry.mount_point.c_str())) >= in compare_last_signature()
571 LERROR << "Metadata tag name too long for " << entry.mount_point; in compare_last_signature()
614 if (snprintf(tag, sizeof(tag), VERITY_STATE_TAG "_%s", basename(entry.mount_point.c_str())) >= in get_verity_state_offset()
616 LERROR << "Metadata tag name too long for " << entry.mount_point; in get_verity_state_offset()
725 const std::string mount_point(basename(entry->mount_point.c_str())); in fs_mgr_setup_verity() local
799 LINFO << "Enabling dm-verity for " << mount_point.c_str() in fs_mgr_setup_verity()
807 if (load_verity_table(dm, mount_point, verity.data_size, &params, format_verity_table) == 0) { in fs_mgr_setup_verity()
813 LINFO << "Disabling error correction for " << mount_point.c_str(); in fs_mgr_setup_verity()
816 … if (load_verity_table(dm, mount_point, verity.data_size, &params, format_verity_table) == 0) { in fs_mgr_setup_verity()
822 if (load_verity_table(dm, mount_point, verity.data_size, &params, format_legacy_verity_table) == in fs_mgr_setup_verity()
[all …]
Dfs_mgr_fstab.cpp399 std::string mount_point; in ReadFstabFromDt() local
404 mount_point = value; in ReadFstabFromDt()
406 mount_point = android::base::StringPrintf("/%s", dp->d_name); in ReadFstabFromDt()
408 fstab_entry.push_back(mount_point); in ReadFstabFromDt()
431 fstab_dt_entries.emplace_back(mount_point, android::base::Join(fstab_entry, " ")); in ReadFstabFromDt()
499 entry.mount_point = p; in ReadFstabFile()
598 .mount_point = "/data", in BuildGsiUserdataFstabEntry()
612 bool EraseFstabEntry(Fstab* fstab, const std::string& mount_point) { in EraseFstabEntry() argument
614 [&](const auto& entry) { return entry.mount_point == mount_point; }); in EraseFstabEntry()
720 return entry.mount_point == skip_mount_point; in SkipMountingPartitions()
[all …]
Dfs_mgr_vendor_overlay.cpp71 bool fs_mgr_vendor_overlay_mount(const std::pair<std::string, std::string>& mount_point) { in fs_mgr_vendor_overlay_mount() argument
72 const auto [overlay_top, mount_dir] = mount_point; in fs_mgr_vendor_overlay_mount()
/system/core/fs_mgr/tests/
Dfs_mgr_test.cpp157 EXPECT_EQ(mentry->mnt_dir, entry.mount_point); in TEST()
233 EXPECT_EQ("/", fstab[0].mount_point); in TEST()
237 EXPECT_EQ("/metadata", fstab[1].mount_point); in TEST()
241 EXPECT_EQ("/data", fstab[2].mount_point); in TEST()
245 EXPECT_EQ("/misc", fstab[3].mount_point); in TEST()
249 EXPECT_EQ("/vendor/firmware_mnt", fstab[4].mount_point); in TEST()
256 EXPECT_EQ("auto", fstab[5].mount_point); in TEST()
260 EXPECT_EQ("none", fstab[6].mount_point); in TEST()
264 EXPECT_EQ("none2", fstab[7].mount_point); in TEST()
268 EXPECT_EQ("none3", fstab[8].mount_point); in TEST()
[all …]
/system/core/init/
Dmount_handler.cpp86 if (stat(entry.mount_point.c_str(), &sb) || !S_ISDIR(sb.st_mode)) value = ""; in SetMountProperty()
89 if (android::base::StartsWith(entry.mount_point, "/apex/")) value = ""; in SetMountProperty()
91 auto mount_prop = entry.mount_point; in SetMountProperty()
104 MountHandlerEntry::MountHandlerEntry(const std::string& blk_device, const std::string& mount_point, in MountHandlerEntry() argument
106 : blk_device(blk_device), mount_point(mount_point), fs_type(fs_type) {} in MountHandlerEntry()
111 if (mount_point < r.mount_point) return true; in operator <()
112 if (mount_point > r.mount_point) return false; in operator <()
Dmount_namespace.cpp36 static bool MakeShared(const std::string& mount_point, bool recursive = false) { in MakeShared() argument
41 if (mount(nullptr, mount_point.c_str(), nullptr, mountflags, nullptr) == -1) { in MakeShared()
48 static bool MakePrivate(const std::string& mount_point, bool recursive = false) { in MakePrivate() argument
53 if (mount(nullptr, mount_point.c_str(), nullptr, mountflags, nullptr) == -1) { in MakePrivate()
Dfirst_stage_mount.cpp172 return entry.mount_point == "/" && entry.fs_type != "rootfs"; in GetRootEntry()
206 LOG(ERROR) << "Image rollback detected for " << fstab_entry.mount_point in IsStandaloneImageRollback()
469 PLOG(ERROR) << "Failed to setup verity for '" << begin->mount_point << "'"; in MountPartition()
477 for (; current != fstab_.end() && current->mount_point == begin->mount_point; current++) { in MountPartition()
499 return entry.mount_point == "/metadata"; in TrySwitchSystemAsRoot()
508 return entry.mount_point == "/system"; in TrySwitchSystemAsRoot()
534 if (current->mount_point == "/system") { in MountPartitions()
542 LOG(INFO) << "Failed to mount " << current->mount_point in MountPartitions()
545 LOG(INFO) << "Failed to mount " << current->mount_point in MountPartitions()
548 PLOG(ERROR) << "Failed to mount " << current->mount_point; in MountPartitions()
[all …]
Dmount_handler.h31 MountHandlerEntry(const std::string& blk_device, const std::string& mount_point,
37 const std::string mount_point; member
/system/core/adb/daemon/
Dset_verity_enable_state_service.cpp66 static bool set_verity_enabled_state(int fd, const char* block_device, const char* mount_point, in set_verity_enabled_state() argument
90 WriteFdFmt(fd, "Verity already disabled on %s\n", mount_point); in set_verity_enabled_state()
95 WriteFdFmt(fd, "Verity already enabled on %s\n", mount_point); in set_verity_enabled_state()
108 if (enable ? fs_mgr_overlayfs_teardown(mount_point, &change) in set_verity_enabled_state()
109 : fs_mgr_overlayfs_setup(nullptr, mount_point, &change)) { in set_verity_enabled_state()
111 WriteFdFmt(fd, "%s overlayfs for %s\n", enable ? "disabling" : "using", mount_point); in set_verity_enabled_state()
115 mount_point, strerror(errno)); in set_verity_enabled_state()
117 WriteFdFmt(fd, "Verity %s on %s\n", enable ? "enabled" : "disabled", mount_point); in set_verity_enabled_state()
236 entry.mount_point.c_str(), enable)) { in set_verity_enabled_state_service()
/system/core/fs_mgr/include/
Dfs_mgr_overlayfs.h28 bool fs_mgr_overlayfs_setup(const char* backing = nullptr, const char* mount_point = nullptr,
30 bool fs_mgr_overlayfs_teardown(const char* mount_point = nullptr, bool* change = nullptr);
32 bool fs_mgr_has_shared_blocks(const std::string& mount_point, const std::string& dev);
33 std::string fs_mgr_get_context(const std::string& mount_point);
/system/extras/ext4_utils/
Dmkuserimg_mke2fs.py168 if args.mount_point:
169 mke2fs_opts += ["-M", args.mount_point]
184 ["-f", args.src_dir, "-a", args.mount_point,
199 if not args.mount_point:
202 if args.mount_point[0] != '/':
203 args.mount_point = '/' + args.mount_point
Dtest_mkuserimg_mke2fs.py42 self.assertEqual("data", args.mount_point)
76 self.assertEqual("data", args.mount_point)
129 args.file_contexts, "-f", args.src_dir, "-a", args.mount_point,
/system/core/fs_mgr/libfs_avb/
Davb_ops.cpp113 std::string mount_point(partition_name); in DeriveMountPoint() local
116 mount_point.erase(found); // converts system_a => system in DeriveMountPoint()
119 return "/" + mount_point; in DeriveMountPoint()
152 const auto mount_point = DeriveMountPoint(partition_name); in GetLogicalPath() local
153 if (mount_point.empty()) return ""; in GetLogicalPath()
155 auto fstab_entry = GetEntryForMountPoint(&fstab_, mount_point); in GetLogicalPath()
/system/apex/apexd/
Dapex_database.h36 std::string mount_point; // Path this apex is mounted on. member
41 const std::string& mount_point, in MountedApexData()
45 mount_point(mount_point), in MountedApexData()
61 compare_val = mount_point.compare(rhs.mount_point);
Dapexd_prepostinstall.cpp92 std::string mount_point = in StageFnInstall() local
96 Status mountStatus = apexd_private::MountPackage(apex, mount_point); in StageFnInstall()
153 std::string mount_point; in RunFnInstall() local
164 mount_point = apexd_private::GetPackageMountPoint(manifest); in RunFnInstall()
169 Status bind_status = apexd_private::BindMount(active_point, mount_point); in RunFnInstall()
171 LOG(ERROR) << "Failed to bind-mount " << mount_point << " to " in RunFnInstall()
Dapex_shim.cpp179 Status ValidateShimApex(const std::string& mount_point, in ValidateShimApex() argument
181 LOG(DEBUG) << "Validating shim apex " << mount_point; in ValidateShimApex()
189 auto iter = fs::directory_iterator(mount_point, ec); in ValidateShimApex()
192 << "Failed to scan " << mount_point << " : " << ec); in ValidateShimApex()
205 << "Failed to scan " << mount_point << " : " << ec); in ValidateShimApex()
Dapex_shim.h33 Status ValidateShimApex(const std::string& mount_point,
/system/vold/
DMetadataCrypt.cpp61 static bool mount_via_fs_mgr(const char* mount_point, const char* blk_device) { in mount_via_fs_mgr() argument
68 auto mount_rc = fs_mgr_do_mount(&fstab_default, const_cast<char*>(mount_point), in mount_via_fs_mgr()
79 LOG(DEBUG) << "Mounted " << mount_point; in mount_via_fs_mgr()
252 bool fscrypt_mount_metadata_encrypted(const std::string& blk_device, const std::string& mount_point, in fscrypt_mount_metadata_encrypted() argument
254 LOG(DEBUG) << "fscrypt_mount_metadata_encrypted: " << mount_point << " " << needs_encrypt; in fscrypt_mount_metadata_encrypted()
261 auto data_rec = GetEntryForMountPoint(&fstab_default, mount_point); in fscrypt_mount_metadata_encrypted()
292 LOG(DEBUG) << "Mounting metadata-encrypted filesystem:" << mount_point; in fscrypt_mount_metadata_encrypted()
293 mount_via_fs_mgr(data_rec->mount_point.c_str(), crypto_blkdev.c_str()); in fscrypt_mount_metadata_encrypted()
DMetadataCrypt.h23 const std::string& mount_point, bool needs_encrypt);
/system/core/fastboot/device/
Dflashing.cpp59 auto partition = android::base::Basename(entry.mount_point); in WipeOverlayfsForPartition()
60 if ("/" == entry.mount_point) { in WipeOverlayfsForPartition()
65 fs_mgr_overlayfs_teardown(entry.mount_point.c_str()); in WipeOverlayfsForPartition()
/system/core/fs_mgr/include/fs_mgr/
Droots.h38 bool EnsurePathMounted(Fstab* fstab, const std::string& path, const std::string& mount_point = "");

12