/system/core/fs_mgr/ |
D | fs_mgr.c | 318 … i < fstab->num_entries && !strcmp(fstab->recs[start_idx].mount_point, fstab->recs[i].mount_point); in mount_with_alternatives() 327 … fstab->recs[i].mount_point, i, fstab->recs[i].fs_type, fstab->recs[*attempted_idx].fs_type); in mount_with_alternatives() 333 fstab->recs[i].mount_point); in mount_with_alternatives() 335 if (!__mount(fstab->recs[i].blk_device, fstab->recs[i].mount_point, &fstab->recs[i])) { in mount_with_alternatives() 340 … fstab->recs[i].blk_device, fstab->recs[i].mount_point, fstab->recs[i].fs_type, in mount_with_alternatives() 444 if (umount(rec->mount_point) == 0) { in handle_encryptable() 448 rec->mount_point, strerror(errno)); in handle_encryptable() 456 if (!e4crypt_non_default_key(rec->mount_point)) { in handle_encryptable() 457 INFO("%s is default file encrypted\n", rec->mount_point); in handle_encryptable() 461 INFO("%s is non-default file encrypted\n", rec->mount_point); in handle_encryptable() [all …]
|
D | fs_mgr_verity.c | 728 ERROR("Failed to read verity signature from %s\n", fstab->mount_point); in compare_last_signature() 735 basename(fstab->mount_point)) >= (int)sizeof(tag)) { in compare_last_signature() 736 ERROR("Metadata tag name too long for %s\n", fstab->mount_point); in compare_last_signature() 788 basename(fstab->mount_point)) >= (int)sizeof(tag)) { in get_verity_state_offset() 789 ERROR("Metadata tag name too long for %s\n", fstab->mount_point); in get_verity_state_offset() 893 char *mount_point; in fs_mgr_update_verity_state() local 943 mount_point = basename(fstab->recs[i].mount_point); in fs_mgr_update_verity_state() 944 verity_ioctl_init(io, mount_point, 0); in fs_mgr_update_verity_state() 947 ERROR("Failed to query DM_TABLE_STATUS for %s (%s)\n", mount_point, in fs_mgr_update_verity_state() 962 callback(&fstab->recs[i], mount_point, mode, *status); in fs_mgr_update_verity_state() [all …]
|
D | fs_mgr_fstab.c | 296 fstab->recs[cnt].mount_point = strdup(p); in fs_mgr_read_fstab() 357 free(fstab->recs[i].mount_point); in fs_mgr_free_fstab() 376 const char *mount_point, const char *fs_type, in fs_mgr_add_entry() argument 391 new_fstab_recs[n].mount_point = strdup(mount_point); in fs_mgr_add_entry() 425 int len = strlen(fstab->recs[i].mount_point); in fs_mgr_get_entry_for_mount_point_after() 426 if (strncmp(path, fstab->recs[i].mount_point, len) == 0 && in fs_mgr_get_entry_for_mount_point_after()
|
D | fs_mgr_format.c | 113 rc = format_ext4(fstab->blk_device, fstab->mount_point); in fs_mgr_do_format()
|
/system/core/adb/ |
D | set_verity_enable_state_service.cpp | 80 const char* mount_point, bool enable) in set_verity_enabled_state() argument 120 WriteFdFmt(fd, "Verity already disabled on %s\n", mount_point); in set_verity_enabled_state() 125 WriteFdFmt(fd, "Verity already enabled on %s\n", mount_point); in set_verity_enabled_state() 147 WriteFdFmt(fd, "Verity %s on %s\n", enable ? "enabled" : "disabled", mount_point); in set_verity_enabled_state() 190 fstab->recs[i].mount_point, in set_verity_enabled_state_service()
|
/system/core/fs_mgr/include/ |
D | fs_mgr.h | 56 char *mount_point; member 72 const char *mount_point, int mode, int status); 97 const char *mount_point, const char *fs_type,
|
/system/vold/ |
D | TrimTask.cpp | 92 if (prev_rec && !strcmp(prev_rec->mount_point, fstab->recs[i].mount_point)) { in addFromFstab() 96 mPaths.push_back(fstab->recs[i].mount_point); in addFromFstab()
|
D | cryptfs.c | 1766 static int do_crypto_complete(char *mount_point) argument 1778 if (e4crypt_crypto_complete(mount_point) == 0) { 1822 char *passwd, char *mount_point, char *label) argument 1888 sprintf(tmp_mount_point, "%s/tmp_mnt", mount_point); 1917 saved_mount_point = strdup(mount_point);
|
/system/extras/tests/fstest/ |
D | recovery_test.cpp | 202 if (!strcmp(fstab->recs[i].mount_point, "/cache")) { in setCacheInfoFromFstab()
|
/system/core/init/ |
D | builtins.cpp | 636 static void verity_update_property(fstab_rec *fstab, const char *mount_point, int mode, int status)… in verity_update_property() argument 637 property_set(android::base::StringPrintf("partition.%s.verified", mount_point).c_str(), in verity_update_property()
|
D | readme.txt | 288 verity_update_state <mount_point> 290 set the partition.<mount_point>.verified properties used by adb remount
|