Searched refs:mount_point (Results 1 - 18 of 18) sorted by relevance

/system/vold/
H A DMetadataCrypt.h22 bool e4crypt_mount_metadata_encrypted(const std::string& mount_point, bool needs_encrypt);
H A DMetadataCrypt.cpp54 static bool mount_via_fs_mgr(const char* mount_point, const char* blk_device) { argument
61 auto mount_rc = fs_mgr_do_mount(fstab_default, const_cast<char*>(mount_point),
71 LOG(DEBUG) << "Mounted " << mount_point;
206 bool e4crypt_mount_metadata_encrypted(const std::string& mount_point, bool needs_encrypt) { argument
207 LOG(DEBUG) << "e4crypt_mount_metadata_encrypted: " << mount_point << " " << needs_encrypt;
213 auto data_rec = fs_mgr_get_entry_for_mount_point(fstab_default, mount_point);
244 LOG(DEBUG) << "Mounting metadata-encrypted filesystem:" << mount_point;
245 mount_via_fs_mgr(data_rec->mount_point, crypto_blkdev.c_str());
H A DIdleMaint.cpp124 if (prev_rec && !strcmp(prev_rec->mount_point, fstab->recs[i].mount_point)) {
129 paths->push_back(fstab->recs[i].mount_point);
H A Dcryptfs.cpp1683 static int do_crypto_complete(const char *mount_point) argument
1740 const char *passwd, const char *mount_point, const char *label)
1797 mount_point);
1826 saved_mount_point = strdup(mount_point);
1739 test_mount_encrypted_fs(struct crypt_mnt_ftr* crypt_ftr, const char *passwd, const char *mount_point, const char *label) argument
/system/update_engine/
H A Dutils_android.cc42 bool DeviceForMountPoint(const string& mount_point, base::FilePath* device) { argument
51 record = fs_mgr_get_entry_for_mount_point(fstab, mount_point.c_str());
53 LOG(ERROR) << "Error finding " << mount_point << " entry in fstab file.";
H A Dutils_android.h28 // Find the block device that should be mounted in the |mount_point| path and
30 bool DeviceForMountPoint(const std::string& mount_point,
/system/core/adb/
H A Dset_verity_enable_state_service.cpp49 static bool set_verity_enabled_state(int fd, const char* block_device, const char* mount_point, argument
73 WriteFdFmt(fd, "Verity already disabled on %s\n", mount_point);
78 WriteFdFmt(fd, "Verity already enabled on %s\n", mount_point);
89 WriteFdFmt(fd, "Verity %s on %s\n", enable ? "enabled" : "disabled", mount_point);
192 fstab->recs[i].mount_point, enable)) {
/system/core/fs_mgr/
H A Dfs_mgr.cpp442 check_fs(blk_device, rec->fs_type, rec->mount_point, &fs_stat);
578 i < fstab->num_entries && !strcmp(fstab->recs[start_idx].mount_point, fstab->recs[i].mount_point);
587 << fstab->recs[i].mount_point << " rec[" << i
597 << fstab->recs[i].mount_point << " rec[" << i
605 if (!__mount(fstab->recs[i].blk_device, fstab->recs[i].mount_point,
611 << " on " << fstab->recs[i].mount_point
627 fstab->recs[i].mount_point, &fs_stat);
733 "%s/misc/vold/convert_fde", rec->mount_point);
740 "%s/convert_fbe", rec->mount_point);
1046 char* mount_point; local
1128 PERROR << "Cannot mount filesystem on " << n_blk_device << " at " << mount_point; local
1378 std::string mount_point; local
[all...]
H A Dfs_mgr_verity.cpp602 basename(fstab->mount_point)) >= (int)sizeof(tag)) {
603 LERROR << "Metadata tag name too long for " << fstab->mount_point;
650 basename(fstab->mount_point)) >= (int)sizeof(tag)) {
651 LERROR << "Metadata tag name too long for " << fstab->mount_point;
765 const std::string mount_point(basename(fstab->mount_point));
807 if (!fs_mgr_create_verity_device(io, mount_point, fd)) {
813 if (!fs_mgr_get_verity_device_name(io, mount_point, fd, &verity_blk_name)) {
855 LINFO << "Enabling dm-verity for " << mount_point.c_str()
863 if (load_verity_table(io, mount_point, verit
[all...]
H A Dfs_mgr_avb.cpp361 const std::string mount_point(basename(fstab_entry->mount_point));
362 if (!fs_mgr_create_verity_device(io, mount_point, fd)) {
369 if (!fs_mgr_get_verity_device_name(io, mount_point, fd, &verity_blk_name)) {
382 if (!load_verity_table(io, mount_point, fd, hashtree_desc.image_size, verity_table)) {
388 if (!fs_mgr_resume_verity_table(io, mount_point, fd)) {
581 LINFO << "AVB HASHTREE disabled on: " << fstab_entry->mount_point;
H A Dfs_mgr_fstab.cpp448 std::string mount_point; local
453 mount_point = value;
455 mount_point = android::base::StringPrintf("/%s", dp->d_name);
457 fstab_entry.push_back(mount_point);
479 // Adds a fstab_entry to fstab_dt_entries, to be sorted by mount_point later.
480 fstab_dt_entries.emplace_back(mount_point, android::base::Join(fstab_entry, " "));
581 LERROR << "Error parsing mount_point";
584 fstab->recs[cnt].mount_point = strdup(p);
837 free(fstab->recs[i].mount_point);
858 const char *mount_point, cons
857 fs_mgr_add_entry(struct fstab *fstab, const char *mount_point, const char *fs_type, const char *blk_device) argument
[all...]
H A Dfs_mgr_format.cpp146 rc = format_ext4(fstab->blk_device, fstab->mount_point, crypt_footer);
/system/core/fs_mgr/include_fstab/fstab/
H A Dfstab.h41 char* mount_point; member in struct:fstab_rec
68 int fs_mgr_add_entry(struct fstab* fstab, const char* mount_point, const char* fs_type,
/system/libvintf/
H A DVintfObjectRecovery.cpp30 static status_t mountAt(const FstabMgr &fstab, const char* path, const char* mount_point) { argument
35 int result = mount(rec->blk_device, mount_point, rec->fs_type, rec->flags, rec->fs_options);
/system/core/fs_mgr/include/
H A Dfs_mgr.h52 const char *mount_point, int mode, int status);
/system/core/init/
H A Dinit_first_stage.cpp285 PLOG(ERROR) << "Failed to setup verity for '" << fstab_rec->mount_point << "'";
289 PLOG(ERROR) << "Failed to mount '" << fstab_rec->mount_point << "'";
343 LOG(INFO) << "Verity disabled/skipped for '" << fstab_rec->mount_point << "'";
H A Dbuiltins.cpp712 static void verity_update_property(fstab_rec *fstab, const char *mount_point, argument
714 property_set("partition."s + mount_point + ".verified", std::to_string(mode));
/system/extras/tests/fstest/
H A Drecovery_test.cpp197 if (!strcmp(fstab->recs[i].mount_point, "/cache")) {

Completed in 314 milliseconds