Home
last modified time | relevance | path

Searched refs:mount_point (Results 1 – 11 of 11) sorted by relevance

/system/core/fs_mgr/
Dfs_mgr.c318 … i < fstab->num_entries && !strcmp(fstab->recs[start_idx].mount_point, fstab->recs[i].mount_point); in mount_with_alternatives()
327 … fstab->recs[i].mount_point, i, fstab->recs[i].fs_type, fstab->recs[*attempted_idx].fs_type); in mount_with_alternatives()
333 fstab->recs[i].mount_point); in mount_with_alternatives()
335 if (!__mount(fstab->recs[i].blk_device, fstab->recs[i].mount_point, &fstab->recs[i])) { in mount_with_alternatives()
340 … fstab->recs[i].blk_device, fstab->recs[i].mount_point, fstab->recs[i].fs_type, in mount_with_alternatives()
444 if (umount(rec->mount_point) == 0) { in handle_encryptable()
448 rec->mount_point, strerror(errno)); in handle_encryptable()
456 if (!e4crypt_non_default_key(rec->mount_point)) { in handle_encryptable()
457 INFO("%s is default file encrypted\n", rec->mount_point); in handle_encryptable()
461 INFO("%s is non-default file encrypted\n", rec->mount_point); in handle_encryptable()
[all …]
Dfs_mgr_verity.c728 ERROR("Failed to read verity signature from %s\n", fstab->mount_point); in compare_last_signature()
735 basename(fstab->mount_point)) >= (int)sizeof(tag)) { in compare_last_signature()
736 ERROR("Metadata tag name too long for %s\n", fstab->mount_point); in compare_last_signature()
788 basename(fstab->mount_point)) >= (int)sizeof(tag)) { in get_verity_state_offset()
789 ERROR("Metadata tag name too long for %s\n", fstab->mount_point); in get_verity_state_offset()
893 char *mount_point; in fs_mgr_update_verity_state() local
943 mount_point = basename(fstab->recs[i].mount_point); in fs_mgr_update_verity_state()
944 verity_ioctl_init(io, mount_point, 0); in fs_mgr_update_verity_state()
947 ERROR("Failed to query DM_TABLE_STATUS for %s (%s)\n", mount_point, in fs_mgr_update_verity_state()
962 callback(&fstab->recs[i], mount_point, mode, *status); in fs_mgr_update_verity_state()
[all …]
Dfs_mgr_fstab.c296 fstab->recs[cnt].mount_point = strdup(p); in fs_mgr_read_fstab()
357 free(fstab->recs[i].mount_point); in fs_mgr_free_fstab()
376 const char *mount_point, const char *fs_type, in fs_mgr_add_entry() argument
391 new_fstab_recs[n].mount_point = strdup(mount_point); in fs_mgr_add_entry()
425 int len = strlen(fstab->recs[i].mount_point); in fs_mgr_get_entry_for_mount_point_after()
426 if (strncmp(path, fstab->recs[i].mount_point, len) == 0 && in fs_mgr_get_entry_for_mount_point_after()
Dfs_mgr_format.c113 rc = format_ext4(fstab->blk_device, fstab->mount_point); in fs_mgr_do_format()
/system/core/adb/
Dset_verity_enable_state_service.cpp80 const char* mount_point, bool enable) in set_verity_enabled_state() argument
120 WriteFdFmt(fd, "Verity already disabled on %s\n", mount_point); in set_verity_enabled_state()
125 WriteFdFmt(fd, "Verity already enabled on %s\n", mount_point); in set_verity_enabled_state()
147 WriteFdFmt(fd, "Verity %s on %s\n", enable ? "enabled" : "disabled", mount_point); in set_verity_enabled_state()
190 fstab->recs[i].mount_point, in set_verity_enabled_state_service()
/system/core/fs_mgr/include/
Dfs_mgr.h56 char *mount_point; member
72 const char *mount_point, int mode, int status);
97 const char *mount_point, const char *fs_type,
/system/vold/
DTrimTask.cpp92 if (prev_rec && !strcmp(prev_rec->mount_point, fstab->recs[i].mount_point)) { in addFromFstab()
96 mPaths.push_back(fstab->recs[i].mount_point); in addFromFstab()
Dcryptfs.c1766 static int do_crypto_complete(char *mount_point) argument
1778 if (e4crypt_crypto_complete(mount_point) == 0) {
1822 char *passwd, char *mount_point, char *label) argument
1888 sprintf(tmp_mount_point, "%s/tmp_mnt", mount_point);
1917 saved_mount_point = strdup(mount_point);
/system/extras/tests/fstest/
Drecovery_test.cpp202 if (!strcmp(fstab->recs[i].mount_point, "/cache")) { in setCacheInfoFromFstab()
/system/core/init/
Dbuiltins.cpp636 static void verity_update_property(fstab_rec *fstab, const char *mount_point, int mode, int status)… in verity_update_property() argument
637 property_set(android::base::StringPrintf("partition.%s.verified", mount_point).c_str(), in verity_update_property()
Dreadme.txt288 verity_update_state <mount_point>
290 set the partition.<mount_point>.verified properties used by adb remount