/system/core/fs_mgr/ |
D | fs_mgr_remount.cpp | 73 if (entry.mount_point == "/") return "/system"; in system_mount_point() 74 return entry.mount_point; in system_mount_point() 79 auto mount_point = system_mount_point(entry); in is_wrapped() local 81 [&mount_point](const auto& entry) { in is_wrapped() 82 return android::base::StartsWith(mount_point, in is_wrapped() 245 GetEntryForMountPoint(&overlayfs_candidates, entry.mount_point) || in do_remount() 258 const auto mount_point = system_mount_point(entry); in do_remount() local 259 if (partition == mount_point) return true; in do_remount() 260 if (partition == android::base::Basename(mount_point)) return true; in do_remount() 274 << wrap->mount_point << ", switching"; in do_remount() [all …]
|
D | fs_mgr_roots.cpp | 60 static MountState GetMountState(const std::string& mount_point) { in GetMountState() argument 67 auto mv = GetEntryForMountPoint(&mounted_fstab, mount_point); in GetMountState() 104 const std::string mount_point = mount_pt.empty() ? rec->mount_point : mount_pt; in EnsurePathMounted() local 106 auto mounted = GetMountState(mount_point); in EnsurePathMounted() 117 LERROR << "unknown fs_type \"" << rec->fs_type << "\" for " << mount_point; in EnsurePathMounted() 121 int result = fs_mgr_do_mount_one(*rec, mount_point); in EnsurePathMounted() 123 PERROR << "Failed to mount " << mount_point << "; formatting"; in EnsurePathMounted() 126 PERROR << "Failed to format " << mount_point; in EnsurePathMounted() 129 result = fs_mgr_do_mount_one(*rec, mount_point); in EnsurePathMounted() 133 PERROR << "Failed to mount " << mount_point; in EnsurePathMounted() [all …]
|
D | fs_mgr_overlayfs.cpp | 181 bool fs_mgr_filesystem_has_space(const std::string& mount_point) { in fs_mgr_filesystem_has_space() argument 186 if (statvfs(mount_point.c_str(), &vst)) { in fs_mgr_filesystem_has_space() 237 if (!fs_mgr_filesystem_has_space(entry->mount_point)) { in fs_mgr_overlayfs_enabled() 249 auto has_shared_blocks = fs_mgr_has_shared_blocks(entry->mount_point, entry->blk_device); in fs_mgr_overlayfs_enabled() 250 if (!has_shared_blocks && (entry->mount_point == "/system")) { in fs_mgr_overlayfs_enabled() 307 std::string fs_mgr_get_overlayfs_candidate(const std::string& mount_point) { in fs_mgr_get_overlayfs_candidate() argument 308 if (!fs_mgr_is_dir(mount_point)) return ""; in fs_mgr_get_overlayfs_candidate() 309 const auto base = android::base::Basename(mount_point) + "/"; in fs_mgr_get_overlayfs_candidate() 326 std::string fs_mgr_get_overlayfs_options(const std::string& mount_point) { in fs_mgr_get_overlayfs_options() argument 327 auto candidate = fs_mgr_get_overlayfs_candidate(mount_point); in fs_mgr_get_overlayfs_options() [all …]
|
D | fs_mgr.cpp | 530 if (entry.mount_point != "/data" || !wants_casefold || has_casefold) return; in tune_casefold() 701 auto& mount_point = alt_mount_point.empty() ? entry.mount_point : alt_mount_point; in prepare_fs_for_mount() local 705 if (lstat(mount_point.c_str(), &info) == 0 && (info.st_mode & S_IFMT) == S_IFLNK) { in prepare_fs_for_mount() 706 unlink(mount_point.c_str()); in prepare_fs_for_mount() 708 mkdir(mount_point.c_str(), 0755); in prepare_fs_for_mount() 742 check_fs(blk_device, entry.fs_type, mount_point, &fs_stat); in prepare_fs_for_mount() 883 i < fstab.size() && fstab[start_idx].mount_point == fstab[i].mount_point; i++) { in mount_with_alternatives() 888 LERROR << __FUNCTION__ << "(): skipping fstab dup mountpoint=" << fstab[i].mount_point in mount_with_alternatives() 897 << "(): skipping mount due to invalid magic, mountpoint=" << fstab[i].mount_point in mount_with_alternatives() 906 if (!__mount(fstab[i].blk_device, fstab[i].mount_point, fstab[i])) { in mount_with_alternatives() [all …]
|
D | fs_mgr_verity.cpp | 388 const std::string mount_point(basename(entry->mount_point.c_str())); in fs_mgr_setup_verity() local 462 LINFO << "Enabling dm-verity for " << mount_point.c_str() in fs_mgr_setup_verity() 470 if (load_verity_table(dm, mount_point, verity.data_size, ¶ms, format_verity_table) == 0) { in fs_mgr_setup_verity() 476 LINFO << "Disabling error correction for " << mount_point.c_str(); in fs_mgr_setup_verity() 479 … if (load_verity_table(dm, mount_point, verity.data_size, ¶ms, format_verity_table) == 0) { in fs_mgr_setup_verity() 485 if (load_verity_table(dm, mount_point, verity.data_size, ¶ms, format_legacy_verity_table) == in fs_mgr_setup_verity() 492 LINFO << "Falling back to EIO mode for " << mount_point.c_str(); in fs_mgr_setup_verity() 495 if (load_verity_table(dm, mount_point, verity.data_size, ¶ms, in fs_mgr_setup_verity() 501 LERROR << "Failed to load verity table for " << mount_point.c_str(); in fs_mgr_setup_verity() 505 if (!dm.GetDmDevicePathByName(mount_point, &verity_blk_name)) { in fs_mgr_setup_verity() [all …]
|
D | fs_mgr_fstab.cpp | 370 std::string mount_point; in ReadFstabFromDt() local 375 mount_point = value; in ReadFstabFromDt() 377 mount_point = android::base::StringPrintf("/%s", dp->d_name); in ReadFstabFromDt() 379 fstab_entry.push_back(mount_point); in ReadFstabFromDt() 402 fstab_dt_entries.emplace_back(mount_point, android::base::Join(fstab_entry, " ")); in ReadFstabFromDt() 472 entry.mount_point = p; in ReadFstabFile() 571 .mount_point = "/data", in BuildDsuUserdataFstabEntry() 585 bool EraseFstabEntry(Fstab* fstab, const std::string& mount_point) { in EraseFstabEntry() argument 587 [&](const auto& entry) { return entry.mount_point == mount_point; }); in EraseFstabEntry() 638 std::string mount_point = "/" + lp_name; in TransformFstabForDsu() local [all …]
|
D | fs_mgr_vendor_overlay.cpp | 71 bool fs_mgr_vendor_overlay_mount(const std::pair<std::string, std::string>& mount_point) { in fs_mgr_vendor_overlay_mount() argument 72 const auto [overlay_top, mount_dir] = mount_point; in fs_mgr_vendor_overlay_mount()
|
/system/core/fs_mgr/include/ |
D | fs_mgr_overlayfs.h | 30 bool fs_mgr_overlayfs_setup(const char* backing = nullptr, const char* mount_point = nullptr, 32 bool fs_mgr_overlayfs_teardown(const char* mount_point = nullptr, bool* change = nullptr); 34 bool fs_mgr_has_shared_blocks(const std::string& mount_point, const std::string& dev); 35 std::string fs_mgr_get_context(const std::string& mount_point); 56 void TeardownAllOverlayForMountPoint(const std::string& mount_point = {});
|
D | fs_mgr.h | 86 const std::string& mount_point = ""); 137 bool fs_mgr_create_canonical_mount_point(const std::string& mount_point);
|
/system/apex/apexd/ |
D | apex_database.cpp | 114 std::pair<std::string, int> ParseMountPoint(const std::string& mount_point) { in ParseMountPoint() argument 115 auto package_id = fs::path(mount_point).filename(); in ParseMountPoint() 127 bool IsActiveMountPoint(const std::string& mount_point) { in IsActiveMountPoint() argument 128 return (mount_point.find('@') == std::string::npos); in IsActiveMountPoint() 202 const BlockDevice& block, const std::string& mount_point, in ResolveMountInfo() argument 205 bool temp_mount = EndsWith(mount_point, ".tmp"); in ResolveMountInfo() 213 auto result = MountedApexData(block.DevPath(), *backing_file, mount_point, in ResolveMountInfo() 226 result.mount_point = mount_point; in ResolveMountInfo() 277 auto [block, mount_point] = ParseMountInfo(line); in PopulateFromMounts() 279 if (fs::path(mount_point).parent_path() != kApexRoot) { in PopulateFromMounts() [all …]
|
D | apexd_prepostinstall.cpp | 123 activation_dirs](const std::string& mount_point) mutable { in RunFnInstall() argument 128 ReadManifest(mount_point + "/" + kManifestFilenamePb); in RunFnInstall() 130 LOG(ERROR) << "Could not read manifest from " << mount_point << "/" in RunFnInstall() 135 manifest_or = ReadManifest(mount_point + "/" + kManifestFilenameJson); in RunFnInstall() 137 LOG(ERROR) << "Could not read manifest from " << mount_point << "/" in RunFnInstall() 158 apexd_private::BindMount(active_point, mount_point); in RunFnInstall() 160 LOG(ERROR) << "Failed to bind-mount " << mount_point << " to " in RunFnInstall()
|
D | apex_shim.cpp | 112 Result<void> ValidateShimApex(const std::string& mount_point, in ValidateShimApex() argument 114 LOG(DEBUG) << "Validating shim apex " << mount_point; in ValidateShimApex() 126 auto iter = fs::recursive_directory_iterator(mount_point, ec); in ValidateShimApex() 133 auto resolved_mount_point = fs::path(mount_point).string(); in ValidateShimApex() 158 return Error() << "Failed to scan " << mount_point << " : " in ValidateShimApex()
|
D | apex_database.h | 40 std::string mount_point; // Path this apex is mounted on. member 52 const std::string& mount_point, 58 mount_point(mount_point), in loop_name() 76 compare_val = mount_point.compare(rhs.mount_point);
|
D | apexd.cpp | 405 const std::string& mount_point) { in VerifyMountedImage() argument 409 ReadManifest(mount_point + "/" + kManifestFilenamePb); in VerifyMountedImage() 418 return shim::ValidateShimApex(mount_point, apex); in VerifyMountedImage() 424 const std::string& mount_point, in MountPackageImpl() argument 434 LOG(VERBOSE) << "Creating mount point: " << mount_point; in MountPackageImpl() 444 auto exists = PathExists(mount_point); in MountPackageImpl() 448 if (!*exists && mkdir(mount_point.c_str(), kMkdirMode) != 0) { in MountPackageImpl() 449 return ErrnoError() << "Could not create mount point " << mount_point; in MountPackageImpl() 451 auto deleter = [&mount_point]() { in MountPackageImpl() 452 if (rmdir(mount_point.c_str()) != 0) { in MountPackageImpl() [all …]
|
/system/core/init/ |
D | mount_handler.cpp | 85 if (stat(entry.mount_point.c_str(), &sb) || !S_ISDIR(sb.st_mode)) value = ""; in SetMountProperty() 88 if (android::base::StartsWith(entry.mount_point, "/apex/")) value = ""; in SetMountProperty() 90 auto mount_prop = entry.mount_point; in SetMountProperty() 103 MountHandlerEntry::MountHandlerEntry(const std::string& blk_device, const std::string& mount_point, in MountHandlerEntry() argument 105 : blk_device(blk_device), mount_point(mount_point), fs_type(fs_type) {} in MountHandlerEntry() 110 if (mount_point < r.mount_point) return true; in operator <() 111 if (mount_point > r.mount_point) return false; in operator <()
|
D | first_stage_mount.cpp | 189 return entry.mount_point == "/" && entry.fs_type != "rootfs"; in GetRootEntry() 223 LOG(ERROR) << "Image rollback detected for " << fstab_entry.mount_point in IsStandaloneImageRollback() 259 return entry.mount_point == "/metadata"; in DoCreateDevices() 423 if (!fs_mgr_create_canonical_mount_point(begin->mount_point)) { in MountPartition() 436 PLOG(ERROR) << "Failed to setup verity for '" << begin->mount_point << "'"; in MountPartition() 444 for (; current != fstab_.end() && current->mount_point == begin->mount_point; current++) { in MountPartition() 514 return entry.mount_point == "/system"; in TrySwitchSystemAsRoot() 544 if (current->mount_point == "/system") { in MountPartitions() 566 LOG(INFO) << "Failed to mount " << current->mount_point in MountPartitions() 569 LOG(INFO) << "Failed to mount " << current->mount_point in MountPartitions() [all …]
|
D | mount_handler.h | 31 MountHandlerEntry(const std::string& blk_device, const std::string& mount_point, 37 const std::string mount_point; member
|
D | mount_namespace.cpp | 47 static bool BindMount(const std::string& source, const std::string& mount_point) { in BindMount() argument 48 if (mount(source.c_str(), mount_point.c_str(), nullptr, MS_BIND | MS_REC, nullptr) == -1) { in BindMount() 55 static bool ChangeMount(const std::string& mount_point, unsigned long mountflags) { in ChangeMount() argument 56 if (mount(nullptr, mount_point.c_str(), nullptr, mountflags, nullptr) == -1) { in ChangeMount() 57 PLOG(ERROR) << "Failed to remount " << mount_point << " as " << std::hex << mountflags; in ChangeMount()
|
/system/core/set-verity-state/ |
D | set-verity-state.cpp | 63 static bool set_verity_enabled_state(const char* block_device, const char* mount_point, in set_verity_enabled_state() argument 86 printf("Verity already disabled on %s\n", mount_point); in set_verity_enabled_state() 91 printf("Verity already enabled on %s\n", mount_point); in set_verity_enabled_state() 103 if (enable ? fs_mgr_overlayfs_teardown(mount_point, &change) in set_verity_enabled_state() 104 : fs_mgr_overlayfs_setup(nullptr, mount_point, &change)) { in set_verity_enabled_state() 106 printf("%s overlayfs for %s\n", enable ? "disabling" : "using", mount_point); in set_verity_enabled_state() 112 mount_point, strerror(errno)); in set_verity_enabled_state() 115 printf("Verity %s on %s\n", enable ? "enabled" : "disabled", mount_point); in set_verity_enabled_state() 261 if (set_verity_enabled_state(entry.blk_device.c_str(), entry.mount_point.c_str(), enable)) { in main()
|
/system/core/fs_mgr/tests/ |
D | fs_mgr_test.cpp | 274 EXPECT_EQ(mentry->mnt_dir, entry.mount_point); in TEST() 505 EXPECT_EQ("none0", entry->mount_point); in TEST() 526 EXPECT_EQ("none1", entry->mount_point); in TEST() 552 EXPECT_EQ("none2", entry->mount_point); in TEST() 578 EXPECT_EQ("none0", entry->mount_point); in TEST() 602 EXPECT_EQ("none0", entry->mount_point); in TEST() 608 EXPECT_EQ("none1", entry->mount_point); in TEST() 614 EXPECT_EQ("none2", entry->mount_point); in TEST() 620 EXPECT_EQ("none3", entry->mount_point); in TEST() 642 EXPECT_EQ("none0", entry->mount_point); in TEST() [all …]
|
/system/vold/ |
D | MetadataCrypt.cpp | 83 static bool mount_via_fs_mgr(const char* mount_point, const char* blk_device) { in mount_via_fs_mgr() argument 90 auto mount_rc = fs_mgr_do_mount(&fstab_default, const_cast<char*>(mount_point), in mount_via_fs_mgr() 101 LOG(DEBUG) << "Mounted " << mount_point; in mount_via_fs_mgr() 214 bool fscrypt_mount_metadata_encrypted(const std::string& blk_device, const std::string& mount_point, in fscrypt_mount_metadata_encrypted() argument 217 LOG(DEBUG) << "fscrypt_mount_metadata_encrypted: " << mount_point in fscrypt_mount_metadata_encrypted() 226 auto data_rec = GetEntryForMountPoint(&fstab_default, mount_point); in fscrypt_mount_metadata_encrypted() 228 LOG(ERROR) << "Failed to get data_rec for " << mount_point; in fscrypt_mount_metadata_encrypted() 271 error = ext4::Format(crypto_blkdev, 0, mount_point); in fscrypt_mount_metadata_encrypted() 278 LOG(DEBUG) << "Format (err=" << error << ") " << crypto_blkdev << " on " << mount_point; in fscrypt_mount_metadata_encrypted() 285 LOG(DEBUG) << "Mounting metadata-encrypted filesystem:" << mount_point; in fscrypt_mount_metadata_encrypted() [all …]
|
/system/core/fs_mgr/libfs_avb/ |
D | avb_ops.cpp | 113 std::string mount_point(partition_name); in DeriveMountPoint() local 116 mount_point.erase(found); // converts system_a => system in DeriveMountPoint() 119 return "/" + mount_point; in DeriveMountPoint() 152 const auto mount_point = DeriveMountPoint(partition_name); in GetLogicalPath() local 153 if (mount_point.empty()) return ""; in GetLogicalPath() 155 auto fstab_entry = GetEntryForMountPoint(&fstab_, mount_point); in GetLogicalPath()
|
/system/apex/tests/native/ |
D | apex_shared_libraries_test.cpp | 52 if (fs::path(entry.mount_point).parent_path() != kApexRoot) { in TEST() 57 if (entry.mount_point.find('@') != std::string::npos) { in TEST() 68 auto lib = fs::path(entry.mount_point) / "lib"; in TEST() 70 auto lib = fs::path(entry.mount_point) / "lib64"; in TEST()
|
/system/extras/ext4_utils/ |
D | mkuserimg_mke2fs.py | 187 if args.mount_point: 188 mke2fs_opts += ["-M", args.mount_point] 203 ["-f", args.src_dir, "-a", args.mount_point, 218 if not args.mount_point: 221 if args.mount_point[0] != '/': 222 args.mount_point = '/' + args.mount_point
|
D | test_mkuserimg_mke2fs.py | 42 self.assertEqual("data", args.mount_point) 76 self.assertEqual("data", args.mount_point) 129 args.file_contexts, "-f", args.src_dir, "-a", args.mount_point,
|