summaryrefslogtreecommitdiffstats
path: root/fs_mgr/Android.mk
Commit message (Collapse)AuthorAgeFilesLines
* fs_mgr: Add an optional libfs_mgr shared libraryDiogo Ferreira2016-04-081-0/+24
| | | | Change-Id: I79aec4549af3f71c8c08f8901f5edf9b5a6b8f62
* Rename libext2_uuid -> libext2_uuid_static libquanganh26272015-10-161-2/+2
| | | | Change-Id: I2dd416558321c424bca97efa973ee5a68b742a64
* fs_mgr: Skip filesystem check unless fs_type matchesDan Pasanen2015-10-161-3/+3
| | | | | | | | * Prevent accidentally destroying a partition of the wrong type. * Don't skip iterations of the internal mount_all loop, otherwise encryptability may not be properly handled. Change-Id: I8f3ddc396a5fb85f4ae0a0a11dd61fb4d6462d6d
* resolved conflicts for merge of 79f33846 to lmp-mr1-dev-plus-aospEd Tam2015-04-131-1/+6
|\ | | | | | | Change-Id: I24c60a2747931917a3ea09b953905ce0f4145280
| * fs_mgr: introduce fs_mgr_format to format wiped partitionsChris Fries2015-04-101-1/+6
| | | | | | | | | | | | | | | | | | | | | | | | Move fastboot's format logic into fs_mgr, to consolidate the knowledge about how to do this (and when to wipe metadata). Try to format these formattable paritions if they are wiped. If formatting fails, we will fall out to let recovery mode handle it. Bug: 20082763 Change-Id: I397cc197550e78d932e8a154fd234695c46dbe7b
| * Revert "Revert "Enable verity on userdebug, and add disable-verity to adb""Paul Lawrence2014-10-091-0/+4
| | | | | | | | | | | | | | | | | | This reverts commit 152d2d4234ba89e0c20c4af13e291b6049a7bc33. Fixed build error, and also fixed memory leak spotted from warning. Bug: 17691572 Change-Id: I23b5ba537f7b557432041d4338b38b9be434e981
| * Revert "Enable verity on userdebug, and add disable-verity to adb"Nick Kralevich2014-10-081-4/+0
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Build is broken. system/core/fs_mgr/fs_mgr_verity.c: In function 'fs_mgr_setup_verity': system/core/fs_mgr/fs_mgr_verity.c:103:20: error: 'verity_table_signature' may be used uninitialized in this function [-Werror=maybe-uninitialized] if (!RSA_verify(key, ^ system/core/fs_mgr/fs_mgr_verity.c:374:11: note: 'verity_table_signature' was declared here char *verity_table_signature; ^ cc1: all warnings being treated as errors make: *** [out/target/product/minnow/obj/STATIC_LIBRARIES/libfs_mgr_intermediates/fs_mgr_verity.o] Error 1 make: *** Waiting for unfinished jobs.... This reverts commit d4cea0bc16d1ad96cc6d6177232d7b339785460c. Change-Id: I6862cc79ef9d944a2472b6fb2e46dae514cea8ce
| * Enable verity on userdebug, and add disable-verity to adbPaul Lawrence2014-10-081-0/+4
| | | | | | | | | | | | Bug: 17691572 Change-Id: I58f588f318e7952d06a41325337d946d7c007e31
* | Revert "Revert "fs_mgr_verity: Add support for squashfs""Mohamad Ayyash2015-04-081-3/+3
| | | | | | | | | | | | This reverts commit 7b97c7a3fa0f1bdae5b45a70f625ff48f9dab0c1. Change-Id: Id47e70479fe9247b7936f2e54d4dbfbb4f63f635
* | Revert "fs_mgr_verity: Add support for squashfs"Mohamad Ayyash2015-04-081-3/+3
| | | | | | | | | | | | This reverts commit 807f47004f03653997edbe3c83d46350cb056cd4. Change-Id: I2d7972c0828c842b44747dd08fbe44668f2a55db
* | fs_mgr_verity: Add support for squashfsMohamad Ayyash2015-04-061-3/+3
| | | | | | | | | | | | | | | | - Cleanup the code to get filesystem size in a block device - Add support to reading size of squashfs in a block device Change-Id: I3848a705ed4dc2fc9afad20331f0fdecfee545c5 Signed-off-by: Mohamad Ayyash <mkayyash@google.com>
* | Link libc++_static into fs_mgr.Dan Albert2015-04-011-0/+1
| | | | | | | | Change-Id: Ic2461d3a30dbd8a22f9800a33fac27c658340b21
* | Revert "Revert "Enable verity on userdebug, and add disable-verity to adb""Paul Lawrence2014-12-091-0/+4
|/ | | | | | | | | | | This reverts commit 152d2d4234ba89e0c20c4af13e291b6049a7bc33. Fixed build error, and also fixed memory leak spotted from warning. (cherry-pick of bbb36319119edde9377fb80015235893c30d2bc9.) Bug: 17691572 Change-Id: I23b5ba537f7b557432041d4338b38b9be434e981
* fs_mgr: turn on -WerrorMark Salyzyn2014-05-071-0/+3
| | | | | | - deal with some -Wunused-variable issues Change-Id: Ie0140d4777ddf862e4bbed76142a1dbb8320c1b0
* fs_mgr: split fstab parsing into separate fileColin Cross2014-01-231-1/+1
| | | | | | | | Move fstab parsing into fs_mgr_fstab.c so that it compiles into a separate compilation unit. uncrypt links against it but doesn't need to pull in the rest of the dependencies on fs_mgr.c. Change-Id: I6bffe1cd42720151533e958028259d1931aaa4bf
* Add basic verity support to fs_mgr.Geremy Condra2013-08-061-3/+4
| | | | | | | | | | | This change adds a "verify" fs_mgr flag specifying that the device in question should be verified. Devices marked with this flag are expected to have a footer immediately after their data containing all the information needed to set up a verity instance. Change-Id: I10101f2c3240228ee0932e3767fe35e673d2e720
* Include liblog in fs_mgr to fix the build.Ken Sumrall2013-04-151-1/+1
| | | | | | | A recent change to how libcutils is built requires liblog to be explicitly included in the link list if it's needed. Change-Id: I8547f5e65c488c8f6e314ccd4eb96606742272be
* fs_mgr: Capture the output of e2fsck and add to the kernel logKen Sumrall2013-04-141-1/+2
| | | | | | | | | | | | | | | | Currently, the output of e2fsck is not saved, and we have no insight into how many errors e2fsck is finding and fixing. Using the new abbreviated logging feature in liblogwrap, up to the first 100 lines, and last 4K bytes of the output of e2fsck is captured by fs_mgr, and added to the kernel log. Usually, the filesystem will be clean, and this will only add a few lines to the kernel log on boot, but when things go wrong, it should save enough to indicate what the problem is, without potentially filling the kernel log with only e2fsck output if the filesystem is really corrupted. Change-Id: I9c264798e6fe721c8f818b5ce15d0975027ddbdd
* A filesystem manager library to mount filesystems for init.Ken Sumrall2012-04-301-0/+33
Instead of specifying in init what to mount, and having various hacks in init itself to deal with encryption, use a filesystem manager library to do the work, that can also be invoked by vold when mounting an encrypted volume. Keep all the magic filesystem info an a device specific fstab file. Change-Id: Ib988f1e4fb0638ba1d5fd98407fa6d8cf862aaca