/system/sepolicy/private/compat/30.0/ |
D | 30.0.compat.cil | 11 …_data_file (dir (ioctl read write create getattr setattr lock rename open watch watch_reads add_na… 12 …le (ioctl read write create getattr setattr lock append map unlink rename open watch watch_reads))) 13 …_data_file (dir (ioctl read write create getattr setattr lock rename open watch watch_reads add_na… 14 …le (ioctl read write create getattr setattr lock append map unlink rename open watch watch_reads))) 22 (allow dumpstate debugfs (file (ioctl read getattr lock map open watch watch_reads))) 23 (allow dumpstate debugfs_mmc (file (ioctl read getattr lock map open watch watch_reads))) 24 (allow dumpstate debugfs_wakeup_sources (file (ioctl read getattr lock map open watch watch_reads))) 25 (auditallow dumpstate debugfs (file (ioctl read getattr lock map open watch watch_reads))) 31 …fs_type (filesystem (mount remount unmount getattr relabelfrom associate quotamod quotaget watch))) 36 (allow system_server debugfs_wakeup_sources (file (ioctl read getattr lock map open watch watch_rea…
|
/system/sepolicy/private/compat/29.0/ |
D | 29.0.compat.cil | 10 …_data_file (dir (ioctl read write create getattr setattr lock rename open watch watch_reads add_na… 11 …le (ioctl read write create getattr setattr lock append map unlink rename open watch watch_reads))) 12 …_data_file (dir (ioctl read write create getattr setattr lock rename open watch watch_reads add_na… 13 …le (ioctl read write create getattr setattr lock append map unlink rename open watch watch_reads))) 21 (allow dumpstate debugfs (file (ioctl read getattr lock map open watch watch_reads))) 22 (allow dumpstate debugfs_mmc (file (ioctl read getattr lock map open watch watch_reads))) 23 (allow dumpstate debugfs_wakeup_sources (file (ioctl read getattr lock map open watch watch_reads))) 24 (auditallow dumpstate debugfs (file (ioctl read getattr lock map open watch watch_reads))) 30 …fs_type (filesystem (mount remount unmount getattr relabelfrom associate quotamod quotaget watch))) 35 (allow system_server debugfs_wakeup_sources (file (ioctl read getattr lock map open watch watch_rea…
|
/system/security/keystore2/src/ |
D | watchdog_helper.rs | 38 Watchdog::watch(&WD, id, Duration::from_millis(millis)) in watch_millis() 42 pub fn watch(id: &'static str) -> Option<WatchPoint> { in watch() function 43 Watchdog::watch(&WD, id, DEFAULT_TIMEOUT) in watch() 67 fn watch(_: &'static str) -> Option<WatchPoint> { in watch() function
|
D | maintenance.rs | 305 let _wp = wd::watch("IKeystoreMaintenance::onUserPasswordChanged"); in onUserPasswordChanged() 312 let _wp = wd::watch("IKeystoreMaintenance::onUserAdded"); in onUserAdded() 323 let _wp = wd::watch("IKeystoreMaintenance::initUserSuperKeys"); in initUserSuperKeys() 330 let _wp = wd::watch("IKeystoreMaintenance::onUserRemoved"); in onUserRemoved() 336 let _wp = wd::watch("IKeystoreMaintenance::onUserLskfRemoved"); in onUserLskfRemoved() 342 let _wp = wd::watch("IKeystoreMaintenance::clearNamespace"); in clearNamespace() 348 let _wp = wd::watch("IKeystoreMaintenance::earlyBootEnded"); in earlyBootEnded() 358 let _wp = wd::watch("IKeystoreMaintenance::migrateKeyNamespace"); in migrateKeyNamespace() 364 let _wp = wd::watch("IKeystoreMaintenance::deleteAllKeys"); in deleteAllKeys() 374 let _wp = wd::watch("IKeystoreMaintenance::getAppUidsAffectedBySid"); in getAppUidsAffectedBySid()
|
D | authorization.rs | 254 let _wp = wd::watch("IKeystoreAuthorization::addAuthToken"); in addAuthToken() 259 let _wp = wd::watch("IKeystoreAuthorization::onDeviceUnlocked"); in onDeviceUnlocked() 269 let _wp = wd::watch("IKeystoreAuthorization::onDeviceLocked"); in onDeviceLocked() 275 let _wp = wd::watch("IKeystoreAuthorization::onWeakUnlockMethodsExpired"); in onWeakUnlockMethodsExpired() 280 let _wp = wd::watch("IKeystoreAuthorization::onNonLskfUnlockMethodsExpired"); in onNonLskfUnlockMethodsExpired() 290 let _wp = wd::watch("IKeystoreAuthorization::getAuthTokensForCredStore"); in getAuthTokensForCredStore()
|
D | operation.rs | 289 let _wp = wd::watch("In Operation::prune: calling abort()"); in prune() 365 let _wp = wd::watch("Operation::update_aad: calling updateAad"); in update_aad() 389 let _wp = wd::watch("Operation::update: calling update"); in update() 419 let _wp = wd::watch("Operation::finish: calling finish"); in finish() 450 let _wp = wd::watch("Operation::abort: calling abort"); in abort() 824 let _wp = wd::watch("IKeystoreOperation::updateAad"); in updateAad() 833 let _wp = wd::watch("IKeystoreOperation::update"); in update() 845 let _wp = wd::watch("IKeystoreOperation::finish"); in finish() 854 let _wp = wd::watch("IKeystoreOperation::abort"); in abort()
|
D | service.rs | 390 let _wp = wd::watch("IKeystoreService::get_key_entry"); in getKeyEntry() 399 let _wp = wd::watch("IKeystoreService::updateSubcomponent"); in updateSubcomponent() 403 let _wp = wd::watch("IKeystoreService::listEntries"); in listEntries() 407 let _wp = wd::watch("IKeystoreService::deleteKey"); in deleteKey() 418 let _wp = wd::watch("IKeystoreService::grant"); in grant() 422 let _wp = wd::watch("IKeystoreService::ungrant"); in ungrant() 431 let _wp = wd::watch("IKeystoreService::listEntriesBatched"); in listEntriesBatched() 436 let _wp = wd::watch("IKeystoreService::getNumberOfEntries"); in getNumberOfEntries()
|
D | security_level.rs | 115 fn watch(&self, id: &'static str) -> Option<wd::WatchPoint> { in watch() method 334 self.watch("In KeystoreSecurityLevel::create_operation: calling begin"); in create_operation() 449 .watch("In KeystoreSecurityLevel::add_required_parameters calling: get_aaid"); in add_required_parameters() 681 let _wp = self.watch("In KeystoreSecurityLevel::import_key: calling importKey."); in import_key() 794 let _wp = self.watch( in import_wrapped_key() 901 let _wp = wd::watch("Calling store_rkpd_attestation_key()"); in upgrade_rkpd_keyblob_if_required_with() 932 let _wp = self.watch(concat!( in convert_storage_key_to_ephemeral() 944 let _wp = self.watch("In convert_storage_key_to_ephemeral: calling upgradeKey"); in convert_storage_key_to_ephemeral() 949 let _wp = self.watch( in convert_storage_key_to_ephemeral() 983 let _wp = self.watch("In KeystoreSecuritylevel::delete_key: calling deleteKey"); in delete_key() [all …]
|
D | metrics.rs | 54 let _wp = wd::watch("IKeystoreMetrics::pullMetrics"); in pullMetrics()
|
D | raw_device.rs | 214 let _wp = wd::watch(concat!( in lookup_or_generate_key() 308 let _wp = wd::watch("In use_key_in_one_step: calling: begin"); in use_key_in_one_step() 316 let _wp = wd::watch("In use_key_in_one_step: calling: finish"); in use_key_in_one_step()
|
D | legacy_importer.rs | 205 let _wp = wd::watch("LegacyImporter::list_uid"); in list_uid() 302 let _wp = wd::watch("LegacyImporter::with_try_import"); in with_try_import() 358 let _wp = wd::watch("LegacyImporter::with_try_import_super_key"); in with_try_import_super_key() 382 let _wp = wd::watch("LegacyImporter::bulk_delete_uid"); in bulk_delete_uid() 405 let _wp = wd::watch("LegacyImporter::bulk_delete_user"); in bulk_delete_user() 926 let _wd = wd::watch("Calling GetKeyCharacteristics."); in get_key_characteristics_without_app_data()
|
D | remote_provisioning.rs | 132 let _wd = wd::watch("Calling get_rkpd_attestation_key()"); in get_rkpd_attestation_key()
|
D | apc.rs | 346 let _wp = wd::watch("IProtectedConfirmation::cancelPrompt"); in cancelPrompt() 350 let _wp = wd::watch("IProtectedConfirmation::isSupported"); in isSupported()
|
D | database.rs | 888 let _wp = wd::watch("KeystoreDB::new"); in new() 1123 let _wp = wd::watch("KeystoreDB::get_storage_stat"); in get_storage_stat() 1186 let _wp = wd::watch("KeystoreDB::handle_next_superseded_blob"); in handle_next_superseded_blobs() 1274 let _wp = wd::watch("KeystoreDB::cleanup_leftovers"); in cleanup_leftovers() 1295 let _wp = wd::watch("KeystoreDB::key_exists"); in key_exists() 1322 let _wp = wd::watch("KeystoreDB::store_super_key"); in store_super_key() 1367 let _wp = wd::watch("KeystoreDB::load_super_key"); in load_super_key() 1419 let _wp = name.map(wd::watch); in with_transaction_timeout() 1505 let _wp = wd::watch("KeystoreDB::set_blob"); in set_blob() 1518 let _wp = wd::watch("KeystoreDB::set_deleted_blob"); in set_deleted_blob() [all …]
|
/system/sepolicy/private/ |
D | untrusted_app_29.te | 31 allow untrusted_app_29 apk_data_file:dir { watch watch_reads }; 32 allow untrusted_app_29 apk_data_file:file { watch watch_reads }; 34 auditallow untrusted_app_29 apk_data_file:dir { watch watch_reads }; 35 auditallow untrusted_app_29 apk_data_file:file { watch watch_reads };
|
D | untrusted_app_30.te | 33 allow untrusted_app_30 apk_data_file:dir { watch watch_reads }; 34 allow untrusted_app_30 apk_data_file:file { watch watch_reads }; 36 auditallow untrusted_app_30 apk_data_file:dir { watch watch_reads }; 37 auditallow untrusted_app_30 apk_data_file:file { watch watch_reads };
|
D | untrusted_app_32.te | 34 allow untrusted_app_32 apk_data_file:dir { watch watch_reads }; 35 allow untrusted_app_32 apk_data_file:file { watch watch_reads }; 37 auditallow untrusted_app_32 apk_data_file:dir { watch watch_reads }; 38 auditallow untrusted_app_32 apk_data_file:file { watch watch_reads };
|
D | untrusted_app_27.te | 53 allow untrusted_app_27 apk_data_file:dir { watch watch_reads }; 54 allow untrusted_app_27 apk_data_file:file { watch watch_reads }; 56 auditallow untrusted_app_27 apk_data_file:dir { watch watch_reads }; 57 auditallow untrusted_app_27 apk_data_file:file { watch watch_reads };
|
D | untrusted_app_25.te | 65 allow untrusted_app_25 apk_data_file:dir { watch watch_reads }; 66 allow untrusted_app_25 apk_data_file:file { watch watch_reads }; 68 auditallow untrusted_app_25 apk_data_file:dir { watch watch_reads }; 69 auditallow untrusted_app_25 apk_data_file:file { watch watch_reads };
|
/system/sepolicy/private/compat/34.0/ |
D | 34.0.compat.cil | 16 (allow system_server vendor_hidraw_device (dir (open getattr read search ioctl lock watch watch_rea… 17 (allow system_server vendor_hidraw_device (chr_file (getattr open read ioctl lock map watch watch_r…
|
/system/sepolicy/public/ |
D | neverallow_macros | 4 define(`no_rw_file_perms', `{ no_w_file_perms open read ioctl lock watch watch_mount watch_sb watch…
|
D | global_macros | 25 define(`r_file_perms', `{ getattr open read ioctl lock map watch watch_reads }') 33 define(`r_dir_perms', `{ open getattr read search ioctl lock watch watch_reads }')
|
/system/sepolicy/microdroid/system/public/ |
D | neverallow_macros | 4 define(`no_rw_file_perms', `{ no_w_file_perms open read ioctl lock watch watch_mount watch_sb watch…
|
D | global_macros | 25 define(`r_file_perms', `{ getattr open read ioctl lock map watch watch_reads }') 33 define(`r_dir_perms', `{ open getattr read search ioctl lock watch watch_reads }')
|
/system/security/keystore2/legacykeystore/ |
D | lib.rs | 535 let _wp = wd::watch("ILegacyKeystore::get"); in get() 539 let _wp = wd::watch("ILegacyKeystore::put"); in put() 543 let _wp = wd::watch("ILegacyKeystore::remove"); in remove() 547 let _wp = wd::watch("ILegacyKeystore::list"); in list()
|