/system/vold/ |
H A D | MetadataCrypt.h | 22 bool e4crypt_mount_metadata_encrypted(const std::string& mount_point, bool needs_encrypt);
|
H A D | MetadataCrypt.cpp | 54 static bool mount_via_fs_mgr(const char* mount_point, const char* blk_device) { argument 61 auto mount_rc = fs_mgr_do_mount(fstab_default, const_cast<char*>(mount_point), 71 LOG(DEBUG) << "Mounted " << mount_point; 206 bool e4crypt_mount_metadata_encrypted(const std::string& mount_point, bool needs_encrypt) { argument 207 LOG(DEBUG) << "e4crypt_mount_metadata_encrypted: " << mount_point << " " << needs_encrypt; 213 auto data_rec = fs_mgr_get_entry_for_mount_point(fstab_default, mount_point); 244 LOG(DEBUG) << "Mounting metadata-encrypted filesystem:" << mount_point; 245 mount_via_fs_mgr(data_rec->mount_point, crypto_blkdev.c_str());
|
H A D | IdleMaint.cpp | 124 if (prev_rec && !strcmp(prev_rec->mount_point, fstab->recs[i].mount_point)) { 129 paths->push_back(fstab->recs[i].mount_point);
|
H A D | cryptfs.cpp | 1683 static int do_crypto_complete(const char *mount_point) argument 1740 const char *passwd, const char *mount_point, const char *label) 1797 mount_point); 1826 saved_mount_point = strdup(mount_point); 1739 test_mount_encrypted_fs(struct crypt_mnt_ftr* crypt_ftr, const char *passwd, const char *mount_point, const char *label) argument
|
/system/update_engine/ |
H A D | utils_android.cc | 42 bool DeviceForMountPoint(const string& mount_point, base::FilePath* device) { argument 51 record = fs_mgr_get_entry_for_mount_point(fstab, mount_point.c_str()); 53 LOG(ERROR) << "Error finding " << mount_point << " entry in fstab file.";
|
H A D | utils_android.h | 28 // Find the block device that should be mounted in the |mount_point| path and 30 bool DeviceForMountPoint(const std::string& mount_point,
|
/system/core/adb/ |
H A D | set_verity_enable_state_service.cpp | 49 static bool set_verity_enabled_state(int fd, const char* block_device, const char* mount_point, argument 73 WriteFdFmt(fd, "Verity already disabled on %s\n", mount_point); 78 WriteFdFmt(fd, "Verity already enabled on %s\n", mount_point); 89 WriteFdFmt(fd, "Verity %s on %s\n", enable ? "enabled" : "disabled", mount_point); 192 fstab->recs[i].mount_point, enable)) {
|
/system/core/fs_mgr/ |
H A D | fs_mgr.cpp | 442 check_fs(blk_device, rec->fs_type, rec->mount_point, &fs_stat); 578 i < fstab->num_entries && !strcmp(fstab->recs[start_idx].mount_point, fstab->recs[i].mount_point); 587 << fstab->recs[i].mount_point << " rec[" << i 597 << fstab->recs[i].mount_point << " rec[" << i 605 if (!__mount(fstab->recs[i].blk_device, fstab->recs[i].mount_point, 611 << " on " << fstab->recs[i].mount_point 627 fstab->recs[i].mount_point, &fs_stat); 733 "%s/misc/vold/convert_fde", rec->mount_point); 740 "%s/convert_fbe", rec->mount_point); 1046 char* mount_point; local 1128 PERROR << "Cannot mount filesystem on " << n_blk_device << " at " << mount_point; local 1378 std::string mount_point; local [all...] |
H A D | fs_mgr_verity.cpp | 602 basename(fstab->mount_point)) >= (int)sizeof(tag)) { 603 LERROR << "Metadata tag name too long for " << fstab->mount_point; 650 basename(fstab->mount_point)) >= (int)sizeof(tag)) { 651 LERROR << "Metadata tag name too long for " << fstab->mount_point; 765 const std::string mount_point(basename(fstab->mount_point)); 807 if (!fs_mgr_create_verity_device(io, mount_point, fd)) { 813 if (!fs_mgr_get_verity_device_name(io, mount_point, fd, &verity_blk_name)) { 855 LINFO << "Enabling dm-verity for " << mount_point.c_str() 863 if (load_verity_table(io, mount_point, verit [all...] |
H A D | fs_mgr_avb.cpp | 361 const std::string mount_point(basename(fstab_entry->mount_point)); 362 if (!fs_mgr_create_verity_device(io, mount_point, fd)) { 369 if (!fs_mgr_get_verity_device_name(io, mount_point, fd, &verity_blk_name)) { 382 if (!load_verity_table(io, mount_point, fd, hashtree_desc.image_size, verity_table)) { 388 if (!fs_mgr_resume_verity_table(io, mount_point, fd)) { 581 LINFO << "AVB HASHTREE disabled on: " << fstab_entry->mount_point;
|
H A D | fs_mgr_fstab.cpp | 448 std::string mount_point; local 453 mount_point = value; 455 mount_point = android::base::StringPrintf("/%s", dp->d_name); 457 fstab_entry.push_back(mount_point); 479 // Adds a fstab_entry to fstab_dt_entries, to be sorted by mount_point later. 480 fstab_dt_entries.emplace_back(mount_point, android::base::Join(fstab_entry, " ")); 581 LERROR << "Error parsing mount_point"; 584 fstab->recs[cnt].mount_point = strdup(p); 837 free(fstab->recs[i].mount_point); 858 const char *mount_point, cons 857 fs_mgr_add_entry(struct fstab *fstab, const char *mount_point, const char *fs_type, const char *blk_device) argument [all...] |
H A D | fs_mgr_format.cpp | 146 rc = format_ext4(fstab->blk_device, fstab->mount_point, crypt_footer);
|
/system/core/fs_mgr/include_fstab/fstab/ |
H A D | fstab.h | 41 char* mount_point; member in struct:fstab_rec 68 int fs_mgr_add_entry(struct fstab* fstab, const char* mount_point, const char* fs_type,
|
/system/libvintf/ |
H A D | VintfObjectRecovery.cpp | 30 static status_t mountAt(const FstabMgr &fstab, const char* path, const char* mount_point) { argument 35 int result = mount(rec->blk_device, mount_point, rec->fs_type, rec->flags, rec->fs_options);
|
/system/core/fs_mgr/include/ |
H A D | fs_mgr.h | 52 const char *mount_point, int mode, int status);
|
/system/core/init/ |
H A D | init_first_stage.cpp | 285 PLOG(ERROR) << "Failed to setup verity for '" << fstab_rec->mount_point << "'"; 289 PLOG(ERROR) << "Failed to mount '" << fstab_rec->mount_point << "'"; 343 LOG(INFO) << "Verity disabled/skipped for '" << fstab_rec->mount_point << "'";
|
H A D | builtins.cpp | 712 static void verity_update_property(fstab_rec *fstab, const char *mount_point, argument 714 property_set("partition."s + mount_point + ".verified", std::to_string(mode));
|
/system/extras/tests/fstest/ |
H A D | recovery_test.cpp | 197 if (!strcmp(fstab->recs[i].mount_point, "/cache")) {
|