/system/update_engine/payload_consumer/ |
D | install_plan.cc | 61 for (const auto& partition : partitions) { in Dump() local 65 partition.name.c_str(), in Dump() 66 partition.source_size, in Dump() 67 partition.target_size, in Dump() 68 utils::ToString(partition.run_postinstall).c_str()); in Dump() 89 for (Partition& partition : partitions) { in LoadPartitionsFromSlots() 92 partition.name, source_slot, &partition.source_path) && result; in LoadPartitionsFromSlots() 94 partition.source_path.clear(); in LoadPartitionsFromSlots() 99 partition.name, target_slot, &partition.target_path) && result; in LoadPartitionsFromSlots() 101 partition.target_path.clear(); in LoadPartitionsFromSlots()
|
D | filesystem_verifier_action.cc | 140 InstallPlan::Partition& partition = in StartPartitionHashing() local 148 partition.name, install_plan_.source_slot, &part_path); in StartPartitionHashing() 149 remaining_size_ = partition.source_size; in StartPartitionHashing() 153 partition.name, install_plan_.target_slot, &part_path); in StartPartitionHashing() 154 remaining_size_ = partition.target_size; in StartPartitionHashing() 158 << partition.name << ") on device " << part_path; in StartPartitionHashing() 246 InstallPlan::Partition& partition = in FinishPartitionHashing() local 248 LOG(INFO) << "Hash of " << partition.name << ": " << hasher_->hash(); in FinishPartitionHashing() 252 partition.source_hash = hasher_->raw_hash(); in FinishPartitionHashing() 256 if (partition.target_hash != hasher_->raw_hash()) { in FinishPartitionHashing() [all …]
|
D | postinstall_runner_action.cc | 98 const InstallPlan::Partition& partition = in PerformPartitionPostinstall() local 102 utils::MakePartitionNameForMount(partition.target_path); in PerformPartitionPostinstall() 104 LOG(ERROR) << "Cannot make mountable device from " << partition.target_path; in PerformPartitionPostinstall() 118 base::FilePath postinstall_path(partition.postinstall_path); in PerformPartitionPostinstall() 122 << partition.postinstall_path; in PerformPartitionPostinstall() 131 << partition.postinstall_path; in PerformPartitionPostinstall() 150 partition.filesystem_type, in PerformPartitionPostinstall() 156 LOG(INFO) << "Performing postinst (" << partition.postinstall_path << " at " in PerformPartitionPostinstall() 157 << abs_path << ") installed on device " << partition.target_path in PerformPartitionPostinstall() 163 LOG(INFO) << "Format file for new " << partition.postinstall_path in PerformPartitionPostinstall() [all …]
|
D | delta_performer.cc | 332 const PartitionUpdate& partition = partitions_[current_partition_]; in OpenCurrentPartition() local 341 << partition.partition_name() << " on slot " in OpenCurrentPartition() 353 << partition.partition_name() << " on slot " in OpenCurrentPartition() 359 LOG(INFO) << "Applying " << partition.operations().size() in OpenCurrentPartition() 360 << " operations to partition \"" << partition.partition_name() in OpenCurrentPartition() 379 for (const PartitionUpdate& partition : partitions) { in LogPartitionInfo() local 380 LogPartitionInfoHash(partition.old_partition_info(), in LogPartitionInfo() 381 "old " + partition.partition_name()); in LogPartitionInfo() 382 LogPartitionInfoHash(partition.new_partition_info(), in LogPartitionInfo() 383 "new " + partition.partition_name()); in LogPartitionInfo() [all …]
|
D | delta_performer_unittest.cc | 614 PartitionUpdate* partition = manifest.add_partitions(); in TEST_F() local 615 partition->mutable_old_partition_info(); in TEST_F() 616 partition->mutable_new_partition_info(); in TEST_F()
|
/system/core/fastboot/ |
D | fastboot.cpp | 792 static bool needs_erase(Transport* transport, const char* partition) { in needs_erase() argument 794 if (!fb_getvar(transport, std::string("partition-type:") + partition, &partition_type)) { in needs_erase() 1124 auto update = [&](const std::string &partition) { in do_update() argument 1126 if (erase_first && needs_erase(transport, partition.c_str())) { in do_update() 1127 fb_queue_erase(partition.c_str()); in do_update() 1129 flash_buf(partition.c_str(), &buf); in do_update() 1204 auto flashall = [&](const std::string &partition) { in do_flashall() argument 1206 if (erase_first && needs_erase(transport, partition.c_str())) { in do_flashall() 1207 fb_queue_erase(partition.c_str()); in do_flashall() 1209 flash_buf(partition.c_str(), &buf); in do_flashall() [all …]
|
D | fastboot_protocol.txt | 129 named partition (if possible). 131 "erase:%s" Erase the indicated partition (clear to 0xFFs)
|
/system/update_engine/payload_generator/ |
D | payload_file.cc | 133 PartitionUpdate* partition = manifest_.add_partitions(); in WritePayload() local 134 partition->set_partition_name(part.name); in WritePayload() 136 partition->set_run_postinstall(true); in WritePayload() 138 partition->set_postinstall_path(part.postinstall.path); in WritePayload() 140 partition->set_filesystem_type(part.postinstall.filesystem_type); in WritePayload() 141 partition->set_postinstall_optional(part.postinstall.optional); in WritePayload() 144 *partition->add_operations() = aop.op; in WritePayload() 147 *(partition->mutable_old_partition_info()) = part.old_info; in WritePayload() 149 *(partition->mutable_new_partition_info()) = part.new_info; in WritePayload()
|
D | delta_diff_utils.h | 133 bool InitializePartitionInfo(const PartitionConfig& partition,
|
/system/sepolicy/ |
D | sgdisk.te | 5 # Allowed to read/write low-level partition tables 16 # Used to probe kernel to reload partition tables
|
D | cppreopts.te | 3 # This command copies preopted files from the system_b partition to the data 4 # partition. This domain ensures that we are only copying into specific
|
D | device.te | 91 # Block device for any swap partition. 95 # Assign this type to the partition specified by the encryptable= 99 # The 'misc' partition used by recovery and A/B.
|
D | update_verifier.te | 15 # Read all blocks in system partition.
|
D | toolbox.te | 18 # Assign swap_block_device type any such partition in your
|
D | property_contexts | 70 # data partition encryption properties
|
D | priv_app.te | 76 # Allow GMS core to scan executables on the system partition
|
D | domain.te | 272 # outside the rootfs or /system partition except for a few whitelisted domains. 348 # No domain other than recovery and update_engine can write to system partition(s). 357 # this partition for testing purposes.
|
D | system_server.te | 470 # protection partition. This block device does not get wiped in a factory reset.
|
/system/update_engine/ |
D | update_metadata.proto | 65 // - SOURCE_COPY: Copy the data in src_extents in the old partition to 66 // dst_extents in the new partition. There's no overlapping of data because 71 // - SOURCE_BSDIFF: Read the data in src_extents in the old partition, perform 73 // new partition. 90 // physical partition. An ordered list of extents is another 157 SOURCE_COPY = 4; // Copy from source to target partition 158 SOURCE_BSDIFF = 5; // Like BSDIFF, but read from source partition 202 // Describes the update to apply to a single partition. 204 // A platform-specific name to identify the partition set being updated. For 208 // Whether this partition carries a filesystem with post-install program that [all …]
|
D | boot_control_chromeos.cc | 165 params.partition = partition_num; in IsSlotBootable() 190 params.partition = partition_num; in MarkSlotUnbootable() 233 add_params.partition = partition_num; in SetActiveBootSlot()
|
/system/update_engine/scripts/ |
D | brillo_update_payload | 341 die "Invalid partition names found in the partition list."
|
/system/core/init/ |
D | perfboot.py | 214 for partition in ['system', 'vendor']: 215 verity_mode = device.get_prop('partition.%s.verified' % partition) 219 partition)
|
D | readme.txt | 60 directory of the partition where they reside. There is a build 160 Services on the system partition can instead use policy-defined transitions 326 use "exec -- rm ..." instead (provided the system partition is 366 set the partition.<mount_point>.verified properties used by adb remount 508 emulator -partition-size 1024 -verbose -show-kernel -no-window
|
/system/core/rootdir/ |
D | init.rc | 42 # Link /vendor to /system/vendor for devices without a vendor partition. 296 # We restorecon /cache in case the cache partition has been reset. 303 # Backup/restore mechanism uses the cache partition 332 # We restorecon /data in case the userdata partition has been reset. 343 # Start bootcharting as soon as possible after the data partition is
|