/system/core/fs_mgr/ |
D | fs_mgr.cpp | 431 check_fs(blk_device, rec->fs_type, rec->mount_point, &fs_stat); in prepare_fs_for_mount() 576 … i < fstab->num_entries && !strcmp(fstab->recs[start_idx].mount_point, fstab->recs[i].mount_point); in mount_with_alternatives() 585 << fstab->recs[i].mount_point << " rec[" << i in mount_with_alternatives() 595 << fstab->recs[i].mount_point << " rec[" << i in mount_with_alternatives() 603 if (!__mount(fstab->recs[i].blk_device, fstab->recs[i].mount_point, in mount_with_alternatives() 609 << " on " << fstab->recs[i].mount_point in mount_with_alternatives() 625 fstab->recs[i].mount_point, &fs_stat); in mount_with_alternatives() 729 "%s/misc/vold/convert_fde", rec->mount_point); in needs_block_encryption() 736 "%s/convert_fbe", rec->mount_point); in needs_block_encryption() 753 if (umount(rec->mount_point) == 0) { in handle_encryptable() [all …]
|
D | fs_mgr_verity.cpp | 602 basename(fstab->mount_point)) >= (int)sizeof(tag)) { in compare_last_signature() 603 LERROR << "Metadata tag name too long for " << fstab->mount_point; in compare_last_signature() 650 basename(fstab->mount_point)) >= (int)sizeof(tag)) { in get_verity_state_offset() 651 LERROR << "Metadata tag name too long for " << fstab->mount_point; in get_verity_state_offset() 765 const std::string mount_point(basename(fstab->mount_point)); in fs_mgr_setup_verity() local 771 LINFO << "Verity setup skipped for " << mount_point; in fs_mgr_setup_verity() 814 if (!fs_mgr_create_verity_device(io, mount_point, fd)) { in fs_mgr_setup_verity() 820 if (!fs_mgr_get_verity_device_name(io, mount_point, fd, &verity_blk_name)) { in fs_mgr_setup_verity() 862 LINFO << "Enabling dm-verity for " << mount_point.c_str() in fs_mgr_setup_verity() 870 if (load_verity_table(io, mount_point, verity.data_size, fd, ¶ms, in fs_mgr_setup_verity() [all …]
|
D | fs_mgr_avb.cpp | 361 const std::string mount_point(basename(fstab_entry->mount_point)); in hashtree_dm_verity_setup() local 362 if (!fs_mgr_create_verity_device(io, mount_point, fd)) { in hashtree_dm_verity_setup() 369 if (!fs_mgr_get_verity_device_name(io, mount_point, fd, &verity_blk_name)) { in hashtree_dm_verity_setup() 382 if (!load_verity_table(io, mount_point, fd, hashtree_desc.image_size, verity_table)) { in hashtree_dm_verity_setup() 388 if (!fs_mgr_resume_verity_table(io, mount_point, fd)) { in hashtree_dm_verity_setup() 581 LINFO << "AVB HASHTREE disabled on: " << fstab_entry->mount_point; in SetUpAvbHashtree()
|
D | fs_mgr_fstab.cpp | 557 fstab->recs[cnt].mount_point = strdup(p); in fs_mgr_read_fstab_file() 743 free(fstab->recs[i].mount_point); in fs_mgr_free_fstab() 763 const char *mount_point, const char *fs_type, in fs_mgr_add_entry() argument 778 new_fstab_recs[n].mount_point = strdup(mount_point); in fs_mgr_add_entry() 812 int len = strlen(fstab->recs[i].mount_point); in fs_mgr_get_entry_for_mount_point_after() 813 if (strncmp(path, fstab->recs[i].mount_point, len) == 0 && in fs_mgr_get_entry_for_mount_point_after()
|
D | fs_mgr_format.cpp | 106 rc = format_ext4(fstab->blk_device, fstab->mount_point, crypt_footer); in fs_mgr_do_format()
|
/system/update_engine/ |
D | utils_android.cc | 43 bool DeviceForMountPoint(const string& mount_point, base::FilePath* device) { in DeviceForMountPoint() argument 52 record = fs_mgr_get_entry_for_mount_point(fstab, mount_point.c_str()); in DeviceForMountPoint() 54 LOG(ERROR) << "Error finding " << mount_point << " entry in fstab file."; in DeviceForMountPoint()
|
D | utils_android.h | 30 bool DeviceForMountPoint(const std::string& mount_point,
|
/system/core/adb/ |
D | set_verity_enable_state_service.cpp | 49 static bool set_verity_enabled_state(int fd, const char* block_device, const char* mount_point, in set_verity_enabled_state() argument 73 WriteFdFmt(fd, "Verity already disabled on %s\n", mount_point); in set_verity_enabled_state() 78 WriteFdFmt(fd, "Verity already enabled on %s\n", mount_point); in set_verity_enabled_state() 89 WriteFdFmt(fd, "Verity %s on %s\n", enable ? "enabled" : "disabled", mount_point); in set_verity_enabled_state() 195 fstab->recs[i].mount_point, enable)) { in set_verity_enabled_state_service()
|
/system/libvintf/ |
D | VintfObjectRecovery.cpp | 31 static status_t mountAt(const FstabMgr &fstab, const char* path, const char* mount_point) { in mountAt() argument 36 int result = mount(rec->blk_device, mount_point, rec->fs_type, rec->flags, rec->fs_options); in mountAt()
|
/system/vold/ |
D | TrimTask.cpp | 92 if (prev_rec && !strcmp(prev_rec->mount_point, fstab->recs[i].mount_point)) { in addFromFstab() 96 mPaths.push_back(fstab->recs[i].mount_point); in addFromFstab()
|
D | MetadataCrypt.cpp | 54 static bool mount_via_fs_mgr(const char* mount_point, const char* blk_device) { in mount_via_fs_mgr() argument 61 auto mount_rc = fs_mgr_do_mount(fstab, const_cast<char*>(mount_point), in mount_via_fs_mgr() 71 LOG(DEBUG) << "Mounted " << mount_point; in mount_via_fs_mgr() 269 mount_via_fs_mgr(data_rec->mount_point, crypto_blkdev.c_str()); in e4crypt_mount_metadata_encrypted() 315 mount_via_fs_mgr(data_rec->mount_point, crypto_blkdev.c_str()); in e4crypt_enable_crypto()
|
D | cryptfs.cpp | 1503 static int do_crypto_complete(const char *mount_point) in do_crypto_complete() argument 1560 const char *passwd, const char *mount_point, const char *label) in test_mount_encrypted_fs() argument 1619 mount_point); in test_mount_encrypted_fs() 1648 saved_mount_point = strdup(mount_point); in test_mount_encrypted_fs()
|
/system/core/fs_mgr/include_fstab/fstab/ |
D | fstab.h | 46 char* mount_point; member 72 int fs_mgr_add_entry(struct fstab* fstab, const char* mount_point, const char* fs_type,
|
/system/core/fs_mgr/include/ |
D | fs_mgr.h | 54 const char *mount_point, int mode, int status);
|
/system/core/init/ |
D | init_first_stage.cpp | 269 PLOG(ERROR) << "Failed to setup verity for '" << fstab_rec->mount_point << "'"; in MountPartitions() 273 PLOG(ERROR) << "Failed to mount '" << fstab_rec->mount_point << "'"; in MountPartitions() 327 LOG(INFO) << "Verity disabled/skipped for '" << fstab_rec->mount_point << "'"; in SetUpDmVerity()
|
D | builtins.cpp | 671 static void verity_update_property(fstab_rec *fstab, const char *mount_point, in verity_update_property() argument 673 property_set("partition."s + mount_point + ".verified", std::to_string(mode)); in verity_update_property()
|
/system/extras/tests/fstest/ |
D | recovery_test.cpp | 197 if (!strcmp(fstab->recs[i].mount_point, "/cache")) { in setCacheInfoFromFstab()
|