/ohos5.0/foundation/filemanagement/storage_service/services/storage_daemon/libfscrypt/src/ |
H A D | key_control.c | 83 static bool FsIoctl(const char *mnt, unsigned long cmd, void *arg) in FsIoctl() argument 85 char *realPath = realpath(mnt, NULL); in FsIoctl() 94 FSCRYPT_LOGE("open %s failed, errno:%d", mnt, errno); in FsIoctl() 98 FSCRYPT_LOGE("ioctl to %s failed, errno:%d", mnt, errno); in FsIoctl() 108 bool KeyCtrlInstallKey(const char *mnt, struct fscrypt_add_key_arg *arg) in KeyCtrlInstallKey() argument 111 return FsIoctl(mnt, FS_IOC_ADD_ENCRYPTION_KEY, (void *)(arg)); in KeyCtrlInstallKey() 117 return FsIoctl(mnt, FS_IOC_REMOVE_ENCRYPTION_KEY, (void *)arg); in KeyCtrlRemoveKey() 145 static uint8_t CheckKernelFscrypt(const char *mnt) in CheckKernelFscrypt() argument 147 char *realPath = realpath(mnt, NULL); in CheckKernelFscrypt() 182 uint8_t KeyCtrlGetFscryptVersion(const char *mnt) in KeyCtrlGetFscryptVersion() argument [all …]
|
/ohos5.0/foundation/filemanagement/storage_service/services/storage_daemon/crypto/src/ |
H A D | fscrypt_key_v2.cpp | 24 bool FscryptKeyV2::ActiveKey(uint32_t flag, const std::string &mnt) in ActiveKey() argument 44 if (!KeyCtrlInstallKey(mnt.c_str(), arg)) { in ActiveKey() 66 bool FscryptKeyV2::InactiveKey(uint32_t flag, const std::string &mnt) in InactiveKey() argument 88 if (!KeyCtrlRemoveKey(mnt.c_str(), &arg)) { in InactiveKey() 103 bool FscryptKeyV2::ActiveKey(uint32_t flag, const std::string &mnt) 105 (void)mnt; 111 bool FscryptKeyV2::InactiveKey(uint32_t flag, const std::string &mnt) 113 (void)mnt; 120 bool FscryptKeyV2::LockUserScreen(uint32_t flag, uint32_t sdpClass, const std::string &mnt) in LockUserScreen() argument 122 (void)mnt; in LockUserScreen() [all …]
|
H A D | fscrypt_key_v1.cpp | 32 bool FscryptKeyV1::ActiveKey(uint32_t flag, const std::string &mnt) in ActiveKey() argument 35 (void)mnt; in ActiveKey() 167 bool FscryptKeyV1::UnlockUserScreen(uint32_t flag, uint32_t sdpClass, const std::string &mnt) in UnlockUserScreen() argument 169 (void)mnt; in UnlockUserScreen() 419 bool FscryptKeyV1::InactiveKey(uint32_t flag, const std::string &mnt) in InactiveKey() argument 421 (void)mnt; in InactiveKey() 452 bool FscryptKeyV1::LockUserScreen(uint32_t flag, uint32_t sdpClass, const std::string &mnt) in LockUserScreen() argument 455 (void)mnt; in LockUserScreen()
|
/ohos5.0/base/startup/init/remount/ |
H A D | remount_overlay.c | 38 static bool MntNeedRemount(const char *mnt) in MntNeedRemount() argument 42 if (strcmp(remountPath[i], mnt) == 0) { in MntNeedRemount() 144 static void OverlayRemountPre(const char *mnt) in OverlayRemountPre() argument 146 if (strcmp(mnt, MNT_VENDOR) == 0) { in OverlayRemountPre() 153 if (strcmp(mnt, MNT_VENDOR) == 0) { in OverlayRemountPost() 161 char *mnt = NULL; in DoRemount() local 179 mnt = mentry->mnt_dir; in DoRemount() 185 ret = FormatExt4(devExt4, mnt); in DoRemount() 202 OverlayRemountPre(mnt); in DoRemount() 203 if (MountOverlayOne(mnt)) { in DoRemount() [all …]
|
/ohos5.0/base/startup/init/interfaces/innerkits/fs_manager/erofs_overlay/ |
H A D | erofs_remount_overlay.c | 161 int MountOverlayOne(const char *mnt) in MountOverlayOne() argument 163 if ((strcmp(mnt, MODEM_DRIVER_MNT_PATH) == 0) || (strcmp(mnt, MODEM_VENDOR_MNT_PATH) == 0)) { in MountOverlayOne() 171 if (strcmp(mnt, "/usr") == 0) { in MountOverlayOne() 177 … if (snprintf_s(dirLower, MAX_BUFFER_LEN, MAX_BUFFER_LEN - 1, "%s%s", PREFIX_LOWER, mnt) < 0) { in MountOverlayOne() 183 …if (snprintf_s(dirUpper, MAX_BUFFER_LEN, MAX_BUFFER_LEN - 1, "%s%s%s", PREFIX_OVERLAY, mnt, PREFIX… in MountOverlayOne() 188 …if (snprintf_s(dirWork, MAX_BUFFER_LEN, MAX_BUFFER_LEN - 1, "%s%s%s", PREFIX_OVERLAY, mnt, PREFIX_… in MountOverlayOne() 199 if (strcmp(mnt, "/usr") == 0) { in MountOverlayOne() 205 if (mount("overlay", mnt, "overlay", 0, mntOpt)) { in MountOverlayOne() 210 BEGET_LOGI("mount overlay fs success on mnt:%s", mnt); in MountOverlayOne()
|
H A D | erofs_mount_overlay.c | 317 static int MountRofsDevice(const char *dev, const char *mnt) in MountRofsDevice() argument 322 rc = mount(dev, mnt, "erofs", MS_RDONLY, NULL); in MountRofsDevice() 324 BEGET_LOGI("mount erofs dev [%s] on mnt [%s] failed, retry", dev, mnt); in MountRofsDevice() 334 int MountExt4Device(const char *dev, const char *mnt, bool isFirstMount) in MountExt4Device() argument 345 BEGET_LOGI("start to set selinux. mnt:%s", mnt); in MountExt4Device() 346 if (strcmp(mnt, "/vendor") == 0) { in MountExt4Device() 354 ret = snprintf_s(dirExt4, MAX_BUFFER_LEN, MAX_BUFFER_LEN - 1, PREFIX_OVERLAY"%s", mnt); in MountExt4Device() 360 …et = snprintf_s(dirUpper, MAX_BUFFER_LEN, MAX_BUFFER_LEN - 1, PREFIX_OVERLAY"%s"PREFIX_UPPER, mnt); in MountExt4Device() 366 … ret = snprintf_s(dirWork, MAX_BUFFER_LEN, MAX_BUFFER_LEN - 1, PREFIX_OVERLAY"%s"PREFIX_WORK, mnt); in MountExt4Device()
|
/ohos5.0/foundation/filemanagement/storage_service/services/storage_daemon/include/mock/ |
H A D | fscrypt_key_v2_mock.h | 29 virtual bool ActiveKey(uint32_t flag, const std::string &mnt) = 0; 32 virtual bool InactiveKey(uint32_t flag, const std::string &mnt) = 0; 33 virtual bool LockUserScreen(uint32_t flag, uint32_t sdpClass, const std::string &mnt) = 0; 35 virtual bool UnlockUserScreen(uint32_t flag, uint32_t sdpClass, const std::string &mnt) = 0; 48 MOCK_METHOD2(ActiveKey, bool(uint32_t flag, const std::string &mnt)); 51 MOCK_METHOD2(InactiveKey, bool(uint32_t flag, const std::string &mnt)); 52 MOCK_METHOD3(LockUserScreen, bool(uint32_t flag, uint32_t sdpClass, const std::string &mnt)); 54 MOCK_METHOD3(UnlockUserScreen, bool(uint32_t flag, uint32_t sdpClass, const std::string &mnt));
|
H A D | key_control_mock.h | 30 virtual uint8_t KeyCtrlGetFscryptVersion(const char *mnt) = 0; 48 MOCK_METHOD1(KeyCtrlGetFscryptVersion, uint8_t(const char *mnt));
|
H A D | base_key_mock.h | 32 virtual bool ClearKey(const std::string &mnt) = 0; 51 MOCK_METHOD1(ClearKey, bool(const std::string &mnt));
|
/ohos5.0/foundation/filemanagement/storage_service/services/storage_daemon/mock/ |
H A D | fscrypt_key_v2_mock.cpp | 22 bool FscryptKeyV2::ActiveKey(uint32_t flag, const std::string &mnt) in ActiveKey() argument 27 return IFscryptKeyV2Moc::fscryptKeyV2Moc->ActiveKey(flag, mnt); in ActiveKey() 30 bool FscryptKeyV2::InactiveKey(uint32_t flag, const std::string &mnt) in InactiveKey() argument 35 return IFscryptKeyV2Moc::fscryptKeyV2Moc->InactiveKey(flag, mnt); in InactiveKey() 38 bool FscryptKeyV2::LockUserScreen(uint32_t flag, uint32_t sdpClass, const std::string &mnt) in LockUserScreen() argument 43 return IFscryptKeyV2Moc::fscryptKeyV2Moc->LockUserScreen(flag, sdpClass, mnt); in LockUserScreen() 54 bool FscryptKeyV2::UnlockUserScreen(uint32_t flag, uint32_t sdpClass, const std::string &mnt) in UnlockUserScreen() argument 59 return IFscryptKeyV2Moc::fscryptKeyV2Moc->UnlockUserScreen(flag, sdpClass, mnt); in UnlockUserScreen()
|
H A D | key_control_mock.cpp | 22 uint8_t KeyCtrlGetFscryptVersion(const char *mnt) in KeyCtrlGetFscryptVersion() argument 28 return IKeyControlMoc::keyControlMoc->KeyCtrlGetFscryptVersion(mnt); in KeyCtrlGetFscryptVersion()
|
H A D | base_key_mock.cpp | 56 bool BaseKey::ClearKey(const std::string &mnt) in ClearKey() argument 61 return IBaseKeyMoc::baseKeyMoc->ClearKey(mnt); in ClearKey()
|
/ohos5.0/base/security/selinux_adapter/sepolicy/ohos_policy/security/dlp_permission_service/system/ |
H A D | storage_daemon.te | 17 …ied { getattr } for pid=494 comm="storage_daemon" path="/mnt/sandbox/com.ohos.dlpmanager/mnt/dat… 18 …ied { getattr } for pid=494 comm="storage_daemon" path="/mnt/sandbox/com.ohos.dlpmanager/mnt/dat… 19 …ied { getattr } for pid=494 comm="storage_daemon" path="/mnt/sandbox/com.ohos.dlpmanager/mnt/dat… 25 # avc: denied { getattr } for pid=630 comm="storage_daemon" path="/mnt/data/fuse/com.example.ohn…
|
H A D | appspawn.te | 18 # avc: denied { mounton } for pid=3454 comm="appspawn" path="/mnt/sandbox/com.ohos.dlpmanager/da… 27 …d { mounton } for pid=4924 comm="ohos.dlpmanager" path="/mnt/sandbox/com.ohos.dlpmanager/mnt/dat…
|
/ohos5.0/base/startup/appspawn/ |
H A D | appspawn.cfg | 5 "mkdir /mnt/sandbox", 6 "mkdir /mnt/sandbox/com.ohos.render/ 0711 nwebspawn nwebspawn", 7 "mkdir /mnt/startup", 8 "mkdir /mnt/startup/appspawn 0700 root root", 9 "mkdir /mnt/startup/nwebspawn/ 0700 nwebspawn nwebspawn"
|
/ohos5.0/foundation/filemanagement/storage_service/services/storage_daemon/include/crypto/ |
H A D | fscrypt_key_v2.h | 33 bool ActiveKey(uint32_t flag = 0, const std::string &mnt = MNT_DATA); 34 bool InactiveKey(uint32_t flag = 0, const std::string &mnt = MNT_DATA); 35 … bool LockUserScreen(uint32_t flag = 0, uint32_t sdpClass = 0, const std::string &mnt = MNT_DATA); 36 …bool UnlockUserScreen(uint32_t flag = 0, uint32_t sdpClass = 0, const std::string &mnt = MNT_DATA);
|
H A D | fscrypt_key_v1.h | 35 bool ActiveKey(uint32_t flag = 0, const std::string &mnt = MNT_DATA); 36 bool InactiveKey(uint32_t flag = 0, const std::string &mnt = MNT_DATA); 37 … bool LockUserScreen(uint32_t flag = 0, uint32_t sdpClass = 0, const std::string &mnt = MNT_DATA); 38 …bool UnlockUserScreen(uint32_t flag = 0, uint32_t sdpClass = 0, const std::string &mnt = MNT_DATA);
|
H A D | base_key.h | 50 virtual bool ActiveKey(uint32_t flag, const std::string &mnt = MNT_DATA) = 0; 51 virtual bool InactiveKey(uint32_t flag, const std::string &mnt = MNT_DATA) = 0; 52 …virtual bool LockUserScreen(uint32_t flag, uint32_t sdpClass, const std::string &mnt = MNT_DATA) =… 53 …virtual bool UnlockUserScreen(uint32_t flag, uint32_t sdpClass, const std::string &mnt = MNT_DATA)… 67 bool ClearKey(const std::string &mnt = MNT_DATA);
|
/ohos5.0/foundation/filemanagement/storage_service/services/storage_daemon/include/libfscrypt/ |
H A D | key_control.h | 106 bool KeyCtrlInstallKey(const char *mnt, struct fscrypt_add_key_arg *arg); 107 bool KeyCtrlRemoveKey(const char *mnt, struct fscrypt_remove_key_arg *arg); 108 bool KeyCtrlGetKeyStatus(const char *mnt, struct fscrypt_get_key_status_arg *arg); 115 uint8_t KeyCtrlGetFscryptVersion(const char *mnt);
|
/ohos5.0/docs/zh-cn/release-notes/changelogs/v3.2-beta2/ |
H A D | application-sandbox-adaptation-guide.md | 35 | mnt | 挂载目录 | 78 | /mnt/hmdfs/\<USERID\>/account/merge_view/data/\<PACKAGENAME\> | /data/storage/el2/distributedfile… 79 | /mnt/hmdfs/\<USERID\>/non_account/merge_view/data/ | /data/storage/el2/auth_groups … 80 | /mnt/hmdfs/ | /mnt/hmdfs/ …
|
/ohos5.0/docs/zh-cn/device-dev/kernel/ |
H A D | kernel-small-bundles-fs-new.md | 61 int VfsJffs2Bind(struct Mount *mnt, struct Vnode *blkDriver, const void *data) 101 pv->originMount = mnt; 103 mnt->data = p; 104 mnt->vnodeCovered = pv;
|
/ohos5.0/docs/zh-cn/device-dev/subsystems/ |
H A D | subsys-boot-appspawn.md | 101 "sandbox-root" : "/mnt/sandbox/<PackageName>", // 沙盒根路径 120 "sandbox-root" : "/mnt/sandbox/<PackageName>", // 沙盒根路径 157 "sandbox-root" : "/mnt/sandbox/<PackageName>",
|
H A D | subsys-build-cargo2gn-guide.md | 20 "cargo-bin": "/mnt/xxx/openharmony/prebuilts/rustc/linux-x86_64/current/bin" 27 python3 /mnt/xxx/openharmony/build/scripts/cargo2gn.py --config cargo2gn.json
|
/ohos5.0/base/security/selinux_adapter/sepolicy/ohos_policy/web/webview/system/ |
H A D | nwebspawn.te | 62 #avc: denied { mounton } for pid=4868 comm="nwebspawn" path="/mnt/sandbox/com.example.web0422sta… 65 #avc: denied { mounton } for pid=4868 comm="nwebspawn" path="/mnt/sandbox/com.example.web0422sta… 76 #avc: denied { mounton } for pid=2318 comm="nwebspawn" path="/mnt/sandbox/com.example.web330/sys… 79 #avc: denied { mounton } for pid=2318 comm="nwebspawn" path="/mnt/sandbox/com.example.web330/sys… 82 #avc: denied { mounton } for pid=2763 comm="nwebspawn" path="/mnt/sandbox/com.example.web330/sys… 85 #avc: denied { mounton } for pid=2763 comm="nwebspawn" path="/mnt/sandbox/com.example.web330/sys… 88 #avc: denied { mounton } for pid=2763 comm="nwebspawn" path="/mnt/sandbox/com.example.web330/sys… 91 # avc: denied { mounton } for pid=1604 comm="nwebspawn" path="/mnt/sandbox/com.example.web330/sy… 94 #avc: denied { mounton } for pid=2763 comm="nwebspawn" path="/mnt/sandbox/com.example.web330/sys…
|
/ohos5.0/base/security/selinux_adapter/sepolicy/ohos_policy/update/sys_installer_sa/system/ |
H A D | sys_installer_sa.te | 107 # avc: denied { open } for pid=1092 comm="IPC_2_1112" path="/mnt/sys_installer" dev="tmpfs" ino=… 113 # avc: denied { getattr } for pid=1092 comm="IPC_2_1112" path="/mnt/sys_installer/updater_binary… 114 # avc: denied { ioctl } for pid=1092 comm="IPC_2_1112" path="/mnt/sys_installer/updater_binary" … 115 # avc: denied { open } for pid=1092 comm="IPC_2_1112" path="/mnt/sys_installer/updater_binary" d… 120 # avc: denied { ioctl } for pid=1092 comm="IPC_2_1112" path="/mnt/sys_installer/updater_binary" …
|