HomeSort by relevance Sort by last modified time
    Searched refs:ext4 (Results 51 - 63 of 63) sorted by null

1 23

  /test/framework/harnesses/host_controller/gsi/
change_security_patch_ver.sh 144 sudo mount -t ext4 -o loop "$UNSPARSED_SYSTEM_IMG" "${MOUNT_POINT}/"
224 sudo /bin/bash -c "PATH=out/host/linux-x86/bin/:\$PATH mkuserimg_mke2fs.sh -s ${MOUNT_POINT} $OUTPUT_SYSTEM_IMG ext4 system $IMG_SIZE -D ${MOUNT_POINT} -L system $FILE_CONTEXTS_BIN"
226 sudo /bin/bash -c "PATH=out/host/linux-x86/bin/:\$PATH mkuserimg_mke2fs.sh -s ${MOUNT_POINT} $OUTPUT_SYSTEM_IMG ext4 / $IMG_SIZE -D ${MOUNT_POINT}/system -L / $FILE_CONTEXTS_BIN"
  /external/e2fsprogs/misc/
Makefile.in 43 FMANPAGES= mke2fs.conf.5 ext4.5
430 ext4.5: $(DEP_SUBSTITUTE) $(srcdir)/ext4.5.in
527 $(Q) for i in ext2 ext3 ext4 ext4dev; do \
556 $(Q) for i in ext2 ext3 ext4 ext4dev; do \
578 $(LN) $(LINK_INSTALL_FLAGS) ext4.5 $$i.5); \
631 $(DESTDIR)$(root_sbindir)/mkfs.ext4 \
641 $(DESTDIR)$(man8dir)/mkfs.ext4.8 \
645 $(DESTDIR)$(man8dir)/fsck.ext4.8 \
    [all...]
  /compatibility/cdd/9_security-model/
9_9_full-disk-encryption.md 78 this feature based on the Linux kernel ext4 encryption feature.
  /packages/services/Car/tests/carservice_unit_test/src/com/android/car/storagemonitoring/
CarStorageMonitoringTest.java 616 try (TemporaryDirectory ext4 = temporaryDirectory.getSubdirectory("ext4");
618 try(TemporaryDirectory ext4_part1 = ext4.getSubdirectory("part1");
620 TemporaryDirectory ext4_part2 = ext4.getSubdirectory("part2");
630 new LifetimeWriteInfo("part1", "ext4", 123*1024);
634 new LifetimeWriteInfo("part2", "ext4", 2147483660L*1024);
655 LifetimeWriteInfo writeInfo = new LifetimeWriteInfo("part1", "ext4", 123);
656 LifetimeWriteInfo writeInfoEq = new LifetimeWriteInfo("part1", "ext4", 123);
658 LifetimeWriteInfo writeInfoNeq1 = new LifetimeWriteInfo("part2", "ext4", 123);
660 LifetimeWriteInfo writeInfoNeq3 = new LifetimeWriteInfo("part1", "ext4", 100)
    [all...]
  /external/e2fsprogs/debian/
rules 492 ln -sf e2fsck fsck.ext3 ; ln -sf e2fsck fsck.ext4 ; \
494 ln -sf mke2fs mkfs.ext4)
  /external/e2fsprogs/e2fsck/
Makefile.in 199 $(Q) for i in ext2 ext3 ext4 ext4dev; do \
218 $(Q) for i in ext2 ext3 ext4 ext4dev; do \
236 $(DESTDIR)$(root_sbindir)/fsck.ext4 \
246 $(DESTDIR)$(root_sbindir)/fsck.ext4 \
  /system/sepolicy/prebuilts/api/26.0/private/
file_contexts 519 /sys/kernel/debug/tracing/events/ext4/ext4_da_write_begin/enable u:object_r:tracing_shell_writable_debug:s0
520 /sys/kernel/debug/tracing/events/ext4/ext4_da_write_end/enable u:object_r:tracing_shell_writable_debug:s0
521 /sys/kernel/debug/tracing/events/ext4/ext4_sync_file_enter/enable u:object_r:tracing_shell_writable_debug:s0
522 /sys/kernel/debug/tracing/events/ext4/ext4_sync_file_exit/enable u:object_r:tracing_shell_writable_debug:s0
  /system/vold/
EncryptInplace.cpp 26 #include <ext4_utils/ext4.h>
289 << " for ext4 inplace encrypt, retrying";
293 << " for ext4 inplace encrypt";
300 LOG(ERROR) << "Reading ext4 extent caused an exception";
306 LOG(ERROR) << "Failed to read ext4 extent";
315 LOG(INFO) << "Encrypting ext4 filesystem in place...";
  /device/google/marlin/
device-common.mk 585 FILESYSTEM_TYPE_system=ext4 \
  /external/scapy/scapy/contrib/
gsm_um.py     [all...]
  /device/google/wahoo/
device.mk 126 FILESYSTEM_TYPE_system=ext4 \
  /system/core/fs_mgr/
fs_mgr.cpp 48 #include <ext4_utils/ext4.h>
117 if ((fs_stat & FS_STAT_IS_EXT4) == 0) return; // only log ext4
127 return fs_type == "ext4" || fs_type == "ext3" || fs_type == "ext2";
167 if (!strcmp(fs_type, "ext4")) {
168 // This option is only valid with ext4
263 // Read the primary superblock from an ext4 filesystem. On failure return
264 // false. If it's not an ext4 filesystem, also set FS_STAT_EXT4_INVALID_MAGIC.
279 LINFO << "Invalid ext4 superblock on '" << blk_device << "'";
286 if (sb->s_max_mnt_count == 0xffff) { // -1 (int16) in ext2, but uint16 in ext4
394 LERROR << "Unable to enable ext4 encryption on " << blk_devic
    [all...]
  /build/make/core/
Makefile     [all...]

Completed in 404 milliseconds

1 23