/system/core/fs_mgr/ |
D | fs_mgr.cpp | 115 static void log_fs_stat(const char* blk_device, int fs_stat) in log_fs_stat() argument 118 std::string msg = android::base::StringPrintf("\nfs_stat,%s,0x%x\n", blk_device, fs_stat); in log_fs_stat() 138 static void check_fs(const char *blk_device, char *fs_type, char *target, int *fs_stat) in check_fs() argument 144 const char* e2fsck_argv[] = {E2FSCK_BIN, "-y", blk_device}; in check_fs() 145 const char* e2fsck_forced_argv[] = {E2FSCK_BIN, "-f", "-y", blk_device}; in check_fs() 171 ret = mount(blk_device, target, fs_type, tmpmnt_flags, tmpmnt_opts); in check_fs() 172 PINFO << __FUNCTION__ << "(): mount(" << blk_device << "," << target << "," << fs_type in check_fs() 201 LINFO << "Not running " << E2FSCK_BIN << " on " << blk_device in check_fs() 204 LINFO << "Running " << E2FSCK_BIN << " on " << blk_device; in check_fs() 228 blk_device in check_fs() [all …]
|
D | fs_mgr_slotselect.cpp | 46 if (asprintf(&tmp, "%s%s", fstab->recs[n].blk_device, ab_suffix.c_str()) > 0) { in fs_mgr_update_for_slotselect() 47 free(fstab->recs[n].blk_device); in fs_mgr_update_for_slotselect() 48 fstab->recs[n].blk_device = tmp; in fs_mgr_update_for_slotselect()
|
D | fs_mgr_verity.cpp | 587 if (fec_open(&f, fstab->blk_device, O_RDONLY, FEC_VERITY_DISABLE, in compare_last_signature() 589 PERROR << "Failed to open '" << fstab->blk_device << "'"; in compare_last_signature() 595 PERROR << "Failed to get verity metadata '" << fstab->blk_device << "'"; in compare_last_signature() 707 static void update_verity_table_blk_device(const std::string& blk_device, char** table, in update_verity_table_blk_device() argument 719 if (token == blk_device) return; // no need to update if they're already the same. in update_verity_table_blk_device() 720 std::size_t found1 = blk_device.find("by-name"); in update_verity_table_blk_device() 723 blk_device.substr(found1) == token.substr(found2) + ab_suffix) { in update_verity_table_blk_device() 724 new_token = blk_device; in update_verity_table_blk_device() 768 if (fec_open(&f, fstab->blk_device, O_RDONLY, FEC_VERITY_DISABLE, in fs_mgr_setup_verity() 770 PERROR << "Failed to open '" << fstab->blk_device << "'"; in fs_mgr_setup_verity() [all …]
|
D | fs_mgr_format.cpp | 140 LERROR << __FUNCTION__ << ": Format " << fstab->blk_device in fs_mgr_do_format() 144 rc = format_f2fs(fstab->blk_device, fstab->length, crypt_footer); in fs_mgr_do_format() 146 rc = format_ext4(fstab->blk_device, fstab->mount_point, crypt_footer); in fs_mgr_do_format()
|
D | fs_mgr_avb.cpp | 236 const std::string& blk_device) { in construct_verity_table() argument 261 verity_table << hashtree_desc.dm_verity_version << " " << blk_device << " " << blk_device << " " in construct_verity_table() 283 optional_args << "use_fec_from_device " << blk_device in construct_verity_table() 375 construct_verity_table(hashtree_desc, salt, root_digest, fstab_entry->blk_device); in hashtree_dm_verity_setup() 393 fs_mgr_set_blk_ro(fstab_entry->blk_device); in hashtree_dm_verity_setup() 396 free(fstab_entry->blk_device); in hashtree_dm_verity_setup() 397 fstab_entry->blk_device = strdup(verity_blk_name.c_str()); in hashtree_dm_verity_setup() 587 std::string partition_name(basename(fstab_entry->blk_device)); in SetUpAvbHashtree()
|
D | fs_mgr_fstab.cpp | 578 fstab->recs[cnt].blk_device = strdup(p); in fs_mgr_read_fstab_file() 696 std::string blk_device(fstab.recs[i].blk_device); in extract_boot_devices() local 698 if (!android::base::StartsWith(blk_device, "/dev/block") || in extract_boot_devices() 699 android::base::StartsWith(blk_device, "/dev/block/by-name") || in extract_boot_devices() 700 android::base::StartsWith(blk_device, "/dev/block/bootdevice/by-name")) { in extract_boot_devices() 706 auto slash_by_name = blk_device.find("/by-name"); in extract_boot_devices() 708 blk_device.erase(slash_by_name); // erases /by-name/<partition> in extract_boot_devices() 711 blk_device.erase(0, std::string("/dev/block/").size()); in extract_boot_devices() 715 auto first_slash = blk_device.find('/'); in extract_boot_devices() 718 auto boot_device = blk_device.substr(first_slash + 1); in extract_boot_devices() [all …]
|
D | fs_mgr_avb_ops.cpp | 129 std::string partition_name = basename(fstab.recs[i].blk_device); in FsManagerAvbOps() 130 by_name_symlink_map_[partition_name] = fstab.recs[i].blk_device; in FsManagerAvbOps()
|
/system/extras/boot_control_copy/ |
D | bootinfo.cpp | 83 path = strdup(record->blk_device); in boot_info_open_partition() 86 const char *end_slash = strrchr(record->blk_device, '/'); in boot_info_open_partition() 91 trimmed_len = end_slash - record->blk_device + 1; in boot_info_open_partition() 94 strncpy(path, record->blk_device, trimmed_len); in boot_info_open_partition()
|
/system/extras/squashfs_utils/ |
D | squashfs_utils.c | 60 int squashfs_parse_sb(const char *blk_device, struct squashfs_info *info) in squashfs_parse_sb() argument 66 data_device = TEMP_FAILURE_RETRY(open(blk_device, O_RDONLY | O_CLOEXEC)); in squashfs_parse_sb()
|
D | squashfs_utils.h | 36 int squashfs_parse_sb(const char *blk_device, struct squashfs_info *info);
|
/system/vold/ |
D | MetadataCrypt.cpp | 54 static bool mount_via_fs_mgr(const char* mount_point, const char* blk_device) { in mount_via_fs_mgr() argument 62 const_cast<char*>(blk_device), nullptr); in mount_via_fs_mgr() 221 if (!get_number_of_sectors(data_rec->blk_device, &nr_sec)) return false; in e4crypt_mount_metadata_encrypted() 224 default_key_params(data_rec->blk_device, key), &crypto_blkdev)) in e4crypt_mount_metadata_encrypted() 231 cryptfs_enable_inplace(const_cast<char*>(crypto_blkdev.c_str()), data_rec->blk_device, in e4crypt_mount_metadata_encrypted()
|
D | main.cpp | 243 std::string sysPattern(rec->blk_device); in process_config()
|
D | IdleMaint.cpp | 133 Realpath(fstab->recs[i].blk_device, &gc_path)) { in addFromFstab()
|
/system/core/fs_mgr/include_fstab/fstab/ |
D | fstab.h | 40 char* blk_device; member 69 const char* blk_device);
|
/system/update_engine/ |
D | utils_android.cc | 58 *device = base::FilePath(record->blk_device); in DeviceForMountPoint()
|
/system/core/init/ |
D | init_first_stage.cpp | 327 required_devices_partition_names_.emplace(basename(fstab_rec->blk_device)); in GetRequiredDevices() 349 return InitVerityDevice(fstab_rec->blk_device); in SetUpDmVerity() 384 required_devices_partition_names_.emplace(basename(fstab_rec->blk_device)); in GetRequiredDevices() 448 return InitVerityDevice(fstab_rec->blk_device); in SetUpDmVerity()
|
D | property_service.cpp | 742 int fd = open(rec->blk_device, O_RDONLY); in load_recovery_id_prop() 744 PLOG(ERROR) << "error opening block device " << rec->blk_device; in load_recovery_id_prop()
|
/system/libvintf/ |
D | VintfObjectRecovery.cpp | 35 int result = mount(rec->blk_device, mount_point, rec->fs_type, rec->flags, rec->fs_options); in mountAt()
|
/system/core/adb/ |
D | set_verity_enable_state_service.cpp | 191 if (set_verity_enabled_state(fd, fstab->recs[i].blk_device, in set_verity_enabled_state_service()
|
D | remount_service.cpp | 60 return rec ? rec->blk_device : ""; in find_fstab_mount()
|
/system/extras/tests/fstest/ |
D | recovery_test.cpp | 198 strcpy(blk_path_, fstab->recs[i].blk_device); in setCacheInfoFromFstab()
|