platform_system_core/fs_mgr
Tom Cherry e1e71b9b98 Merge "init: allow first stage mount to read an fstab" 2018-12-05 20:32:08 +00:00
..
include Merge "init: allow first stage mount to read an fstab" 2018-12-05 20:32:08 +00:00
include_fstab/fstab init: allow first stage mount to read an fstab 2018-12-04 11:06:30 -08:00
libdm Add noexcept to move constructors and assignment operators. 2018-10-05 16:43:47 +00:00
libfs_avb fs_mgr: move AVB related source into libfs_avb 2018-11-29 22:21:33 +08:00
liblp liblp: Allocate "b" extents in the second half of super. 2018-12-03 16:58:34 -08:00
tests fs_mgr: overlay: test assumption wrong if verity is enabled 2018-11-30 07:49:32 -08:00
tools Adding bow dm-target 2018-10-02 10:12:30 -07:00
.clang-format Fix-up coding style 2017-02-18 12:33:36 +08:00
Android.bp C++17 is the default now. 2018-12-03 09:02:18 -08:00
OWNERS Add OWNERS. 2017-12-07 13:30:03 -08:00
README.overlayfs.md fs_mgr: Change scratch margin to 3 X logical_block_size. 2018-12-03 12:15:25 -08:00
fs_mgr.cpp Merge "init: allow first stage mount to read an fstab" 2018-12-05 20:32:08 +00:00
fs_mgr_boot_config.cpp fs_mgr: reorder getting boot config 2018-06-12 00:16:14 +08:00
fs_mgr_dm_linear.cpp Handle renamed "super" device correctly 2018-12-04 11:21:34 -08:00
fs_mgr_format.cpp make_f2fs: use -g android by default 2018-11-22 03:42:07 -08:00
fs_mgr_fstab.cpp init: allow first stage mount to read an fstab 2018-12-04 11:06:30 -08:00
fs_mgr_overlayfs.cpp init: allow first stage mount to read an fstab 2018-12-04 11:06:30 -08:00
fs_mgr_priv.h Merge "init: allow first stage mount to read an fstab" 2018-12-05 20:32:08 +00:00
fs_mgr_priv_boot_config.h fs_mgr: fs_mgr_get_boot_config_from_kernel_cmdline deal with quote 2018-06-08 16:04:17 -07:00
fs_mgr_slotselect.cpp fs_mgr: Create a C++ Fstab struct 2018-12-03 09:40:55 -08:00
fs_mgr_vendor_overlay.cpp Allow product partition to have vendor_overlay 2018-11-27 23:34:00 +00:00
fs_mgr_verity.cpp fs_mgr/init: use unique_ptr + CLO_EXEC for setmntent()/fopen() 2018-10-03 13:19:04 -07:00

README.overlayfs.md

Android Overlayfs integration with adb remount

Introduction

Users working with userdebug or eng builds expect to be able to remount the system partition as read-write and then add or modify any number of files without reflashing the system image, which is understandably efficient for a development cycle. Limited memory systems that chose to use readonly filesystems like squashfs, or Logical Resizable Android Partitions which land system partition images right-sized, and with filesystem that have been deduped on the block level to compress the content; means that either a remount is not possible directly, or when done offers little or no utility because of remaining space limitations or support logistics.

Overlayfs comes to the rescue for these debug scenarios, and logic will automatically setup backing storage for a writable filesystem as an upper reference, and mount overtop the lower. These actions will be performed in the adb disable-verity and adb remount requests.

Operations

Cookbook

The typical action to utilize the remount facility is:

$ adb root
$ adb disable-verity
$ adb reboot
$ adb wait-for-device
$ adb root
$ adb remount

Followed by one of the following:

$ adb stop
$ adb sync
$ adb start
$ adb reboot

or

$ adb push <source> <destination>
$ adb reboot

Note that the sequence above:

$ adb disable-verity
$ adb reboot

can be replaced with:

$ adb reboot -R

which will not reboot if everything is already prepared and ready to go.

None of this changes if overlayfs needs to be engaged. The decisions whether to use traditional direct filesystem remount, or one wrapped by overlayfs is automatically determined based on a probe of the filesystem types and space remaining.

Backing Storage

When overlayfs logic is feasible, it will use either the /cache/overlay/ directory for non-A/B devices, or the /mnt/scratch/overlay directory for A/B devices that have access to Logical Resizeable Android Partitions. The backing store is used as soon as possible in the boot process and can occur at first stage init, or at the mount_all init rc commands.

This early as possible attachment of overlayfs means that sepolicy or init itself can also be pushed and used after the exec phases that accompany each stage.

Caveats

  • Space used in the backing storage is on a file by file basis and will require more space than if updated in place.
  • Kernel must have CONFIG_OVERLAY_FS=y and will need to be patched with "overlayfs: override_creds=off option bypass creator_cred" if higher than 4.6.
  • adb enable-verity will free up overlayfs and as a bonus the device will be reverted pristine to before any content was updated.
  • If dynamic partitions runs out of space, resizing a logical partition larger may fail because of the scratch partition. If this happens, either fastboot flashall or adb enable-verity can be used to clear scratch storage to permit the flash. Then reinstate the overrides and continue.
  • File bugs or submit fixes for review.