Home
last modified time | relevance | path

Searched refs:mnt (Results 1 – 25 of 70) sorted by relevance

123

/ohos5.0/foundation/filemanagement/storage_service/services/storage_daemon/libfscrypt/src/
H A Dkey_control.c83 static bool FsIoctl(const char *mnt, unsigned long cmd, void *arg) in FsIoctl() argument
85 char *realPath = realpath(mnt, NULL); in FsIoctl()
94 FSCRYPT_LOGE("open %s failed, errno:%d", mnt, errno); in FsIoctl()
98 FSCRYPT_LOGE("ioctl to %s failed, errno:%d", mnt, errno); in FsIoctl()
108 bool KeyCtrlInstallKey(const char *mnt, struct fscrypt_add_key_arg *arg) in KeyCtrlInstallKey() argument
111 return FsIoctl(mnt, FS_IOC_ADD_ENCRYPTION_KEY, (void *)(arg)); in KeyCtrlInstallKey()
117 return FsIoctl(mnt, FS_IOC_REMOVE_ENCRYPTION_KEY, (void *)arg); in KeyCtrlRemoveKey()
145 static uint8_t CheckKernelFscrypt(const char *mnt) in CheckKernelFscrypt() argument
147 char *realPath = realpath(mnt, NULL); in CheckKernelFscrypt()
182 uint8_t KeyCtrlGetFscryptVersion(const char *mnt) in KeyCtrlGetFscryptVersion() argument
[all …]
/ohos5.0/foundation/filemanagement/storage_service/services/storage_daemon/crypto/src/
H A Dfscrypt_key_v2.cpp24 bool FscryptKeyV2::ActiveKey(uint32_t flag, const std::string &mnt) in ActiveKey() argument
44 if (!KeyCtrlInstallKey(mnt.c_str(), arg)) { in ActiveKey()
66 bool FscryptKeyV2::InactiveKey(uint32_t flag, const std::string &mnt) in InactiveKey() argument
88 if (!KeyCtrlRemoveKey(mnt.c_str(), &arg)) { in InactiveKey()
103 bool FscryptKeyV2::ActiveKey(uint32_t flag, const std::string &mnt)
105 (void)mnt;
111 bool FscryptKeyV2::InactiveKey(uint32_t flag, const std::string &mnt)
113 (void)mnt;
120 bool FscryptKeyV2::LockUserScreen(uint32_t flag, uint32_t sdpClass, const std::string &mnt) in LockUserScreen() argument
122 (void)mnt; in LockUserScreen()
[all …]
H A Dfscrypt_key_v1.cpp32 bool FscryptKeyV1::ActiveKey(uint32_t flag, const std::string &mnt) in ActiveKey() argument
35 (void)mnt; in ActiveKey()
167 bool FscryptKeyV1::UnlockUserScreen(uint32_t flag, uint32_t sdpClass, const std::string &mnt) in UnlockUserScreen() argument
169 (void)mnt; in UnlockUserScreen()
419 bool FscryptKeyV1::InactiveKey(uint32_t flag, const std::string &mnt) in InactiveKey() argument
421 (void)mnt; in InactiveKey()
452 bool FscryptKeyV1::LockUserScreen(uint32_t flag, uint32_t sdpClass, const std::string &mnt) in LockUserScreen() argument
455 (void)mnt; in LockUserScreen()
/ohos5.0/base/startup/init/remount/
H A Dremount_overlay.c38 static bool MntNeedRemount(const char *mnt) in MntNeedRemount() argument
42 if (strcmp(remountPath[i], mnt) == 0) { in MntNeedRemount()
144 static void OverlayRemountPre(const char *mnt) in OverlayRemountPre() argument
146 if (strcmp(mnt, MNT_VENDOR) == 0) { in OverlayRemountPre()
153 if (strcmp(mnt, MNT_VENDOR) == 0) { in OverlayRemountPost()
161 char *mnt = NULL; in DoRemount() local
179 mnt = mentry->mnt_dir; in DoRemount()
185 ret = FormatExt4(devExt4, mnt); in DoRemount()
202 OverlayRemountPre(mnt); in DoRemount()
203 if (MountOverlayOne(mnt)) { in DoRemount()
[all …]
/ohos5.0/base/startup/init/interfaces/innerkits/fs_manager/erofs_overlay/
H A Derofs_remount_overlay.c161 int MountOverlayOne(const char *mnt) in MountOverlayOne() argument
163 if ((strcmp(mnt, MODEM_DRIVER_MNT_PATH) == 0) || (strcmp(mnt, MODEM_VENDOR_MNT_PATH) == 0)) { in MountOverlayOne()
171 if (strcmp(mnt, "/usr") == 0) { in MountOverlayOne()
177 … if (snprintf_s(dirLower, MAX_BUFFER_LEN, MAX_BUFFER_LEN - 1, "%s%s", PREFIX_LOWER, mnt) < 0) { in MountOverlayOne()
183 …if (snprintf_s(dirUpper, MAX_BUFFER_LEN, MAX_BUFFER_LEN - 1, "%s%s%s", PREFIX_OVERLAY, mnt, PREFIX… in MountOverlayOne()
188 …if (snprintf_s(dirWork, MAX_BUFFER_LEN, MAX_BUFFER_LEN - 1, "%s%s%s", PREFIX_OVERLAY, mnt, PREFIX_… in MountOverlayOne()
199 if (strcmp(mnt, "/usr") == 0) { in MountOverlayOne()
205 if (mount("overlay", mnt, "overlay", 0, mntOpt)) { in MountOverlayOne()
210 BEGET_LOGI("mount overlay fs success on mnt:%s", mnt); in MountOverlayOne()
H A Derofs_mount_overlay.c317 static int MountRofsDevice(const char *dev, const char *mnt) in MountRofsDevice() argument
322 rc = mount(dev, mnt, "erofs", MS_RDONLY, NULL); in MountRofsDevice()
324 BEGET_LOGI("mount erofs dev [%s] on mnt [%s] failed, retry", dev, mnt); in MountRofsDevice()
334 int MountExt4Device(const char *dev, const char *mnt, bool isFirstMount) in MountExt4Device() argument
345 BEGET_LOGI("start to set selinux. mnt:%s", mnt); in MountExt4Device()
346 if (strcmp(mnt, "/vendor") == 0) { in MountExt4Device()
354 ret = snprintf_s(dirExt4, MAX_BUFFER_LEN, MAX_BUFFER_LEN - 1, PREFIX_OVERLAY"%s", mnt); in MountExt4Device()
360 …et = snprintf_s(dirUpper, MAX_BUFFER_LEN, MAX_BUFFER_LEN - 1, PREFIX_OVERLAY"%s"PREFIX_UPPER, mnt); in MountExt4Device()
366 … ret = snprintf_s(dirWork, MAX_BUFFER_LEN, MAX_BUFFER_LEN - 1, PREFIX_OVERLAY"%s"PREFIX_WORK, mnt); in MountExt4Device()
/ohos5.0/foundation/filemanagement/storage_service/services/storage_daemon/include/mock/
H A Dfscrypt_key_v2_mock.h29 virtual bool ActiveKey(uint32_t flag, const std::string &mnt) = 0;
32 virtual bool InactiveKey(uint32_t flag, const std::string &mnt) = 0;
33 virtual bool LockUserScreen(uint32_t flag, uint32_t sdpClass, const std::string &mnt) = 0;
35 virtual bool UnlockUserScreen(uint32_t flag, uint32_t sdpClass, const std::string &mnt) = 0;
48 MOCK_METHOD2(ActiveKey, bool(uint32_t flag, const std::string &mnt));
51 MOCK_METHOD2(InactiveKey, bool(uint32_t flag, const std::string &mnt));
52 MOCK_METHOD3(LockUserScreen, bool(uint32_t flag, uint32_t sdpClass, const std::string &mnt));
54 MOCK_METHOD3(UnlockUserScreen, bool(uint32_t flag, uint32_t sdpClass, const std::string &mnt));
H A Dkey_control_mock.h30 virtual uint8_t KeyCtrlGetFscryptVersion(const char *mnt) = 0;
48 MOCK_METHOD1(KeyCtrlGetFscryptVersion, uint8_t(const char *mnt));
H A Dbase_key_mock.h32 virtual bool ClearKey(const std::string &mnt) = 0;
51 MOCK_METHOD1(ClearKey, bool(const std::string &mnt));
/ohos5.0/foundation/filemanagement/storage_service/services/storage_daemon/mock/
H A Dfscrypt_key_v2_mock.cpp22 bool FscryptKeyV2::ActiveKey(uint32_t flag, const std::string &mnt) in ActiveKey() argument
27 return IFscryptKeyV2Moc::fscryptKeyV2Moc->ActiveKey(flag, mnt); in ActiveKey()
30 bool FscryptKeyV2::InactiveKey(uint32_t flag, const std::string &mnt) in InactiveKey() argument
35 return IFscryptKeyV2Moc::fscryptKeyV2Moc->InactiveKey(flag, mnt); in InactiveKey()
38 bool FscryptKeyV2::LockUserScreen(uint32_t flag, uint32_t sdpClass, const std::string &mnt) in LockUserScreen() argument
43 return IFscryptKeyV2Moc::fscryptKeyV2Moc->LockUserScreen(flag, sdpClass, mnt); in LockUserScreen()
54 bool FscryptKeyV2::UnlockUserScreen(uint32_t flag, uint32_t sdpClass, const std::string &mnt) in UnlockUserScreen() argument
59 return IFscryptKeyV2Moc::fscryptKeyV2Moc->UnlockUserScreen(flag, sdpClass, mnt); in UnlockUserScreen()
H A Dkey_control_mock.cpp22 uint8_t KeyCtrlGetFscryptVersion(const char *mnt) in KeyCtrlGetFscryptVersion() argument
28 return IKeyControlMoc::keyControlMoc->KeyCtrlGetFscryptVersion(mnt); in KeyCtrlGetFscryptVersion()
H A Dbase_key_mock.cpp56 bool BaseKey::ClearKey(const std::string &mnt) in ClearKey() argument
61 return IBaseKeyMoc::baseKeyMoc->ClearKey(mnt); in ClearKey()
/ohos5.0/base/security/selinux_adapter/sepolicy/ohos_policy/security/dlp_permission_service/system/
H A Dstorage_daemon.te17 …ied { getattr } for pid=494 comm="storage_daemon" path="/mnt/sandbox/com.ohos.dlpmanager/mnt/dat…
18 …ied { getattr } for pid=494 comm="storage_daemon" path="/mnt/sandbox/com.ohos.dlpmanager/mnt/dat…
19 …ied { getattr } for pid=494 comm="storage_daemon" path="/mnt/sandbox/com.ohos.dlpmanager/mnt/dat…
25 # avc: denied { getattr } for pid=630 comm="storage_daemon" path="/mnt/data/fuse/com.example.ohn…
H A Dappspawn.te18 # avc: denied { mounton } for pid=3454 comm="appspawn" path="/mnt/sandbox/com.ohos.dlpmanager/da…
27 …d { mounton } for pid=4924 comm="ohos.dlpmanager" path="/mnt/sandbox/com.ohos.dlpmanager/mnt/dat…
/ohos5.0/base/startup/appspawn/
H A Dappspawn.cfg5 "mkdir /mnt/sandbox",
6 "mkdir /mnt/sandbox/com.ohos.render/ 0711 nwebspawn nwebspawn",
7 "mkdir /mnt/startup",
8 "mkdir /mnt/startup/appspawn 0700 root root",
9 "mkdir /mnt/startup/nwebspawn/ 0700 nwebspawn nwebspawn"
/ohos5.0/foundation/filemanagement/storage_service/services/storage_daemon/include/crypto/
H A Dfscrypt_key_v2.h33 bool ActiveKey(uint32_t flag = 0, const std::string &mnt = MNT_DATA);
34 bool InactiveKey(uint32_t flag = 0, const std::string &mnt = MNT_DATA);
35 … bool LockUserScreen(uint32_t flag = 0, uint32_t sdpClass = 0, const std::string &mnt = MNT_DATA);
36 …bool UnlockUserScreen(uint32_t flag = 0, uint32_t sdpClass = 0, const std::string &mnt = MNT_DATA);
H A Dfscrypt_key_v1.h35 bool ActiveKey(uint32_t flag = 0, const std::string &mnt = MNT_DATA);
36 bool InactiveKey(uint32_t flag = 0, const std::string &mnt = MNT_DATA);
37 … bool LockUserScreen(uint32_t flag = 0, uint32_t sdpClass = 0, const std::string &mnt = MNT_DATA);
38 …bool UnlockUserScreen(uint32_t flag = 0, uint32_t sdpClass = 0, const std::string &mnt = MNT_DATA);
H A Dbase_key.h50 virtual bool ActiveKey(uint32_t flag, const std::string &mnt = MNT_DATA) = 0;
51 virtual bool InactiveKey(uint32_t flag, const std::string &mnt = MNT_DATA) = 0;
52 …virtual bool LockUserScreen(uint32_t flag, uint32_t sdpClass, const std::string &mnt = MNT_DATA) =…
53 …virtual bool UnlockUserScreen(uint32_t flag, uint32_t sdpClass, const std::string &mnt = MNT_DATA)…
67 bool ClearKey(const std::string &mnt = MNT_DATA);
/ohos5.0/foundation/filemanagement/storage_service/services/storage_daemon/include/libfscrypt/
H A Dkey_control.h106 bool KeyCtrlInstallKey(const char *mnt, struct fscrypt_add_key_arg *arg);
107 bool KeyCtrlRemoveKey(const char *mnt, struct fscrypt_remove_key_arg *arg);
108 bool KeyCtrlGetKeyStatus(const char *mnt, struct fscrypt_get_key_status_arg *arg);
115 uint8_t KeyCtrlGetFscryptVersion(const char *mnt);
/ohos5.0/docs/zh-cn/release-notes/changelogs/v3.2-beta2/
H A Dapplication-sandbox-adaptation-guide.md35 | mnt | 挂载目录 |
78 | /mnt/hmdfs/\<USERID\>/account/merge_view/data/\<PACKAGENAME\> | /data/storage/el2/distributedfile…
79 | /mnt/hmdfs/\<USERID\>/non_account/merge_view/data/ | /data/storage/el2/auth_groups …
80 | /mnt/hmdfs/ | /mnt/hmdfs/ …
/ohos5.0/docs/zh-cn/device-dev/kernel/
H A Dkernel-small-bundles-fs-new.md61 int VfsJffs2Bind(struct Mount *mnt, struct Vnode *blkDriver, const void *data)
101 pv->originMount = mnt;
103 mnt->data = p;
104 mnt->vnodeCovered = pv;
/ohos5.0/docs/zh-cn/device-dev/subsystems/
H A Dsubsys-boot-appspawn.md101 "sandbox-root" : "/mnt/sandbox/<PackageName>", // 沙盒根路径
120 "sandbox-root" : "/mnt/sandbox/<PackageName>", // 沙盒根路径
157 "sandbox-root" : "/mnt/sandbox/<PackageName>",
H A Dsubsys-build-cargo2gn-guide.md20 "cargo-bin": "/mnt/xxx/openharmony/prebuilts/rustc/linux-x86_64/current/bin"
27 python3 /mnt/xxx/openharmony/build/scripts/cargo2gn.py --config cargo2gn.json
/ohos5.0/base/security/selinux_adapter/sepolicy/ohos_policy/web/webview/system/
H A Dnwebspawn.te62 #avc: denied { mounton } for pid=4868 comm="nwebspawn" path="/mnt/sandbox/com.example.web0422sta…
65 #avc: denied { mounton } for pid=4868 comm="nwebspawn" path="/mnt/sandbox/com.example.web0422sta…
76 #avc: denied { mounton } for pid=2318 comm="nwebspawn" path="/mnt/sandbox/com.example.web330/sys…
79 #avc: denied { mounton } for pid=2318 comm="nwebspawn" path="/mnt/sandbox/com.example.web330/sys…
82 #avc: denied { mounton } for pid=2763 comm="nwebspawn" path="/mnt/sandbox/com.example.web330/sys…
85 #avc: denied { mounton } for pid=2763 comm="nwebspawn" path="/mnt/sandbox/com.example.web330/sys…
88 #avc: denied { mounton } for pid=2763 comm="nwebspawn" path="/mnt/sandbox/com.example.web330/sys…
91 # avc: denied { mounton } for pid=1604 comm="nwebspawn" path="/mnt/sandbox/com.example.web330/sy…
94 #avc: denied { mounton } for pid=2763 comm="nwebspawn" path="/mnt/sandbox/com.example.web330/sys…
/ohos5.0/base/security/selinux_adapter/sepolicy/ohos_policy/update/sys_installer_sa/system/
H A Dsys_installer_sa.te107 # avc: denied { open } for pid=1092 comm="IPC_2_1112" path="/mnt/sys_installer" dev="tmpfs" ino=…
113 # avc: denied { getattr } for pid=1092 comm="IPC_2_1112" path="/mnt/sys_installer/updater_binary…
114 # avc: denied { ioctl } for pid=1092 comm="IPC_2_1112" path="/mnt/sys_installer/updater_binary" …
115 # avc: denied { open } for pid=1092 comm="IPC_2_1112" path="/mnt/sys_installer/updater_binary" d…
120 # avc: denied { ioctl } for pid=1092 comm="IPC_2_1112" path="/mnt/sys_installer/updater_binary" …

123