Home
last modified time | relevance | path

Searched refs:mount_point (Results 1 – 17 of 17) sorted by relevance

/system/core/fs_mgr/
Dfs_mgr.cpp431 check_fs(blk_device, rec->fs_type, rec->mount_point, &fs_stat); in prepare_fs_for_mount()
576 … i < fstab->num_entries && !strcmp(fstab->recs[start_idx].mount_point, fstab->recs[i].mount_point); in mount_with_alternatives()
585 << fstab->recs[i].mount_point << " rec[" << i in mount_with_alternatives()
595 << fstab->recs[i].mount_point << " rec[" << i in mount_with_alternatives()
603 if (!__mount(fstab->recs[i].blk_device, fstab->recs[i].mount_point, in mount_with_alternatives()
609 << " on " << fstab->recs[i].mount_point in mount_with_alternatives()
625 fstab->recs[i].mount_point, &fs_stat); in mount_with_alternatives()
729 "%s/misc/vold/convert_fde", rec->mount_point); in needs_block_encryption()
736 "%s/convert_fbe", rec->mount_point); in needs_block_encryption()
753 if (umount(rec->mount_point) == 0) { in handle_encryptable()
[all …]
Dfs_mgr_verity.cpp602 basename(fstab->mount_point)) >= (int)sizeof(tag)) { in compare_last_signature()
603 LERROR << "Metadata tag name too long for " << fstab->mount_point; in compare_last_signature()
650 basename(fstab->mount_point)) >= (int)sizeof(tag)) { in get_verity_state_offset()
651 LERROR << "Metadata tag name too long for " << fstab->mount_point; in get_verity_state_offset()
765 const std::string mount_point(basename(fstab->mount_point)); in fs_mgr_setup_verity() local
771 LINFO << "Verity setup skipped for " << mount_point; in fs_mgr_setup_verity()
814 if (!fs_mgr_create_verity_device(io, mount_point, fd)) { in fs_mgr_setup_verity()
820 if (!fs_mgr_get_verity_device_name(io, mount_point, fd, &verity_blk_name)) { in fs_mgr_setup_verity()
862 LINFO << "Enabling dm-verity for " << mount_point.c_str() in fs_mgr_setup_verity()
870 if (load_verity_table(io, mount_point, verity.data_size, fd, &params, in fs_mgr_setup_verity()
[all …]
Dfs_mgr_avb.cpp361 const std::string mount_point(basename(fstab_entry->mount_point)); in hashtree_dm_verity_setup() local
362 if (!fs_mgr_create_verity_device(io, mount_point, fd)) { in hashtree_dm_verity_setup()
369 if (!fs_mgr_get_verity_device_name(io, mount_point, fd, &verity_blk_name)) { in hashtree_dm_verity_setup()
382 if (!load_verity_table(io, mount_point, fd, hashtree_desc.image_size, verity_table)) { in hashtree_dm_verity_setup()
388 if (!fs_mgr_resume_verity_table(io, mount_point, fd)) { in hashtree_dm_verity_setup()
581 LINFO << "AVB HASHTREE disabled on: " << fstab_entry->mount_point; in SetUpAvbHashtree()
Dfs_mgr_fstab.cpp557 fstab->recs[cnt].mount_point = strdup(p); in fs_mgr_read_fstab_file()
743 free(fstab->recs[i].mount_point); in fs_mgr_free_fstab()
763 const char *mount_point, const char *fs_type, in fs_mgr_add_entry() argument
778 new_fstab_recs[n].mount_point = strdup(mount_point); in fs_mgr_add_entry()
812 int len = strlen(fstab->recs[i].mount_point); in fs_mgr_get_entry_for_mount_point_after()
813 if (strncmp(path, fstab->recs[i].mount_point, len) == 0 && in fs_mgr_get_entry_for_mount_point_after()
Dfs_mgr_format.cpp106 rc = format_ext4(fstab->blk_device, fstab->mount_point, crypt_footer); in fs_mgr_do_format()
/system/update_engine/
Dutils_android.cc43 bool DeviceForMountPoint(const string& mount_point, base::FilePath* device) { in DeviceForMountPoint() argument
52 record = fs_mgr_get_entry_for_mount_point(fstab, mount_point.c_str()); in DeviceForMountPoint()
54 LOG(ERROR) << "Error finding " << mount_point << " entry in fstab file."; in DeviceForMountPoint()
Dutils_android.h30 bool DeviceForMountPoint(const std::string& mount_point,
/system/core/adb/
Dset_verity_enable_state_service.cpp49 static bool set_verity_enabled_state(int fd, const char* block_device, const char* mount_point, in set_verity_enabled_state() argument
73 WriteFdFmt(fd, "Verity already disabled on %s\n", mount_point); in set_verity_enabled_state()
78 WriteFdFmt(fd, "Verity already enabled on %s\n", mount_point); in set_verity_enabled_state()
89 WriteFdFmt(fd, "Verity %s on %s\n", enable ? "enabled" : "disabled", mount_point); in set_verity_enabled_state()
195 fstab->recs[i].mount_point, enable)) { in set_verity_enabled_state_service()
/system/libvintf/
DVintfObjectRecovery.cpp31 static status_t mountAt(const FstabMgr &fstab, const char* path, const char* mount_point) { in mountAt() argument
36 int result = mount(rec->blk_device, mount_point, rec->fs_type, rec->flags, rec->fs_options); in mountAt()
/system/vold/
DTrimTask.cpp92 if (prev_rec && !strcmp(prev_rec->mount_point, fstab->recs[i].mount_point)) { in addFromFstab()
96 mPaths.push_back(fstab->recs[i].mount_point); in addFromFstab()
DMetadataCrypt.cpp54 static bool mount_via_fs_mgr(const char* mount_point, const char* blk_device) { in mount_via_fs_mgr() argument
61 auto mount_rc = fs_mgr_do_mount(fstab, const_cast<char*>(mount_point), in mount_via_fs_mgr()
71 LOG(DEBUG) << "Mounted " << mount_point; in mount_via_fs_mgr()
269 mount_via_fs_mgr(data_rec->mount_point, crypto_blkdev.c_str()); in e4crypt_mount_metadata_encrypted()
315 mount_via_fs_mgr(data_rec->mount_point, crypto_blkdev.c_str()); in e4crypt_enable_crypto()
Dcryptfs.cpp1503 static int do_crypto_complete(const char *mount_point) in do_crypto_complete() argument
1560 const char *passwd, const char *mount_point, const char *label) in test_mount_encrypted_fs() argument
1619 mount_point); in test_mount_encrypted_fs()
1648 saved_mount_point = strdup(mount_point); in test_mount_encrypted_fs()
/system/core/fs_mgr/include_fstab/fstab/
Dfstab.h46 char* mount_point; member
72 int fs_mgr_add_entry(struct fstab* fstab, const char* mount_point, const char* fs_type,
/system/core/fs_mgr/include/
Dfs_mgr.h54 const char *mount_point, int mode, int status);
/system/core/init/
Dinit_first_stage.cpp269 PLOG(ERROR) << "Failed to setup verity for '" << fstab_rec->mount_point << "'"; in MountPartitions()
273 PLOG(ERROR) << "Failed to mount '" << fstab_rec->mount_point << "'"; in MountPartitions()
327 LOG(INFO) << "Verity disabled/skipped for '" << fstab_rec->mount_point << "'"; in SetUpDmVerity()
Dbuiltins.cpp671 static void verity_update_property(fstab_rec *fstab, const char *mount_point, in verity_update_property() argument
673 property_set("partition."s + mount_point + ".verified", std::to_string(mode)); in verity_update_property()
/system/extras/tests/fstest/
Drecovery_test.cpp197 if (!strcmp(fstab->recs[i].mount_point, "/cache")) { in setCacheInfoFromFstab()