Home
last modified time | relevance | path

Searched refs:logd (Results 1 – 25 of 159) sorted by relevance

1234567

/system/core/logcat/
Dlogcatd.rc7 # notwithstanding) for logd.logpersistd.size logd.logpersistd.rotate_kbytes and
8 # logd.logpersistd.buffer.
12 on property:persist.logd.logpersistd.count=*
14 setprop persist.logd.logpersistd.size ${persist.logd.logpersistd.count}
16 on property:persist.logd.logpersistd.size=*
17 setprop logd.logpersistd.size ${persist.logd.logpersistd.size}
19 on property:persist.logd.logpersistd.rotate_kbytes=*
20 setprop logd.logpersistd.rotate_kbytes ${persist.logd.logpersistd.rotate_kbytes}
22 on property:persist.logd.logpersistd.buffer=*
23 setprop logd.logpersistd.buffer ${persist.logd.logpersistd.buffer}
[all …]
/system/core/logd/
Dlogd.rc1 service logd /system/bin/logd
2 socket logd stream 0666 logd logd
3 socket logdr seqpacket 0666 logd logd
4 socket logdw dgram+passcred 0222 logd logd
7 user logd
8 group logd system package_info readproc
13 service logd-reinit /system/bin/logd --reinit
16 user logd
17 group logd
21 service logd-auditctl /system/bin/auditctl -r 5
[all …]
DREADME.property1 The properties that logd and friends react to are:
4 ro.logd.auditd bool true Enable selinux audit daemon
5 ro.logd.auditd.dmesg bool true selinux audit messages sent to dmesg.
6 ro.logd.auditd.main bool true selinux audit messages sent to main.
7 ro.logd.auditd.events bool true selinux audit messages sent to events.
8 persist.logd.security bool false Enable security buffer.
9 ro.organization_owned bool false Override persist.logd.security to false
10 ro.logd.kernel bool svelte+ Enable klogd daemon
11 logd.statistics bool svelte+ Enable logcat -S statistics.
12 ro.debuggable number if not "1", logd.statistics &
[all …]
Dlogtagd.rc5 mkdir /data/misc/logd 0750 logd log
6 write /data/misc/logd/event-log-tags ""
7 chown logd log /data/misc/logd/event-log-tags
8 chmod 0600 /data/misc/logd/event-log-tags
9 restorecon /data/misc/logd/event-log-tags
DAndroid.bp21 // event_flag += $(call event_logtags,logd)
74 name: "logd",
76 init_rc: ["logd.rc"],
129 name: "logd-unit-test-defaults",
160 // adb shell /data/nativetest/logd-unit-tests/logd-unit-tests
162 name: "logd-unit-tests",
164 defaults: ["logd-unit-test-defaults"],
169 defaults: ["logd-unit-test-defaults"],
/system/sepolicy/prebuilts/api/26.0/public/
Dlogd.te2 type logd, domain, mlstrustedsubject;
6 r_dir_file(logd, cgroup)
7 r_dir_file(logd, proc)
8 r_dir_file(logd, proc_meminfo)
9 r_dir_file(logd, proc_net)
11 allow logd self:capability { setuid setgid setpcap sys_nice audit_control };
12 allow logd self:capability2 syslog;
13 allow logd self:netlink_audit_socket { create_socket_perms_no_ioctl nlmsg_write };
14 allow logd kernel:system syslog_read;
15 allow logd kmsg_device:chr_file w_file_perms;
[all …]
/system/sepolicy/prebuilts/api/28.0/public/
Dlogd.te2 type logd, domain, mlstrustedsubject;
6 r_dir_file(logd, cgroup)
7 r_dir_file(logd, proc_kmsg)
8 r_dir_file(logd, proc_meminfo)
9 r_dir_file(logd, proc_net)
11 allow logd self:global_capability_class_set { setuid setgid setpcap sys_nice audit_control };
12 allow logd self:global_capability2_class_set syslog;
13 allow logd self:netlink_audit_socket { create_socket_perms_no_ioctl nlmsg_write };
14 allow logd kernel:system syslog_read;
15 allow logd kmsg_device:chr_file w_file_perms;
[all …]
/system/sepolicy/prebuilts/api/27.0/public/
Dlogd.te2 type logd, domain, mlstrustedsubject;
6 r_dir_file(logd, cgroup)
7 r_dir_file(logd, proc)
8 r_dir_file(logd, proc_meminfo)
9 r_dir_file(logd, proc_net)
11 allow logd self:capability { setuid setgid setpcap sys_nice audit_control };
12 allow logd self:capability2 syslog;
13 allow logd self:netlink_audit_socket { create_socket_perms_no_ioctl nlmsg_write };
14 allow logd kernel:system syslog_read;
15 allow logd kmsg_device:chr_file w_file_perms;
[all …]
/system/sepolicy/prebuilts/api/30.0/public/
Dlogd.te2 type logd, domain, mlstrustedsubject;
6 r_dir_file(logd, cgroup)
7 r_dir_file(logd, proc_kmsg)
8 r_dir_file(logd, proc_meminfo)
10 allow logd self:global_capability_class_set { setuid setgid setpcap sys_nice audit_control };
11 allow logd self:global_capability2_class_set syslog;
12 allow logd self:netlink_audit_socket { create_socket_perms_no_ioctl nlmsg_write };
13 allow logd kernel:system syslog_read;
14 allow logd kmsg_device:chr_file { getattr w_file_perms };
15 allow logd system_data_file:{ file lnk_file } r_file_perms;
[all …]
/system/sepolicy/public/
Dlogd.te2 type logd, domain, mlstrustedsubject;
6 r_dir_file(logd, cgroup)
7 r_dir_file(logd, proc_kmsg)
8 r_dir_file(logd, proc_meminfo)
10 allow logd self:global_capability_class_set { setuid setgid setpcap sys_nice audit_control };
11 allow logd self:global_capability2_class_set syslog;
12 allow logd self:netlink_audit_socket { create_socket_perms_no_ioctl nlmsg_write };
13 allow logd kernel:system syslog_read;
14 allow logd kmsg_device:chr_file { getattr w_file_perms };
15 allow logd system_data_file:{ file lnk_file } r_file_perms;
[all …]
/system/sepolicy/prebuilts/api/29.0/public/
Dlogd.te2 type logd, domain, mlstrustedsubject;
6 r_dir_file(logd, cgroup)
7 r_dir_file(logd, proc_kmsg)
8 r_dir_file(logd, proc_meminfo)
10 allow logd self:global_capability_class_set { setuid setgid setpcap sys_nice audit_control };
11 allow logd self:global_capability2_class_set syslog;
12 allow logd self:netlink_audit_socket { create_socket_perms_no_ioctl nlmsg_write };
13 allow logd kernel:system syslog_read;
14 allow logd kmsg_device:chr_file { getattr w_file_perms };
15 allow logd system_data_file:{ file lnk_file } r_file_perms;
[all …]
/system/sepolicy/private/
Dlogd.te1 typeattribute logd coredomain;
3 init_daemon_domain(logd)
6 get_prop(logd, device_logging_prop)
8 # logd is not allowed to write anywhere other than /data/misc/logd, and then
10 neverallow logd {
24 -logd
Dcrash_dump.te15 -logd
21 allow crash_dump { apexd llkd logd vold }:process { ptrace signal sigchld sigstop sigkill };
40 logd
41 userdebug_or_eng(`-logd')
Dlogpersist.te16 unix_socket_connect(logpersist, logdr, logd)
27 neverallow { domain -init -dumpstate -incidentd userdebug_or_eng(`-logpersist -logd') } misc_logd_f…
28 neverallow { domain -init userdebug_or_eng(`-logpersist -logd') } misc_logd_file:file no_w_file_per…
29 neverallow { domain -init userdebug_or_eng(`-logpersist -logd') } misc_logd_file:dir { add_name lin…
/system/sepolicy/prebuilts/api/30.0/private/
Dlogd.te1 typeattribute logd coredomain;
3 init_daemon_domain(logd)
5 # logd is not allowed to write anywhere other than /data/misc/logd, and then
7 neverallow logd {
21 -logd
Dcrash_dump.te15 -logd
21 allow crash_dump { apexd llkd logd vold }:process { ptrace signal sigchld sigstop sigkill };
40 logd
41 userdebug_or_eng(`-logd')
Dlogpersist.te16 unix_socket_connect(logpersist, logdr, logd)
27 neverallow { domain -init -dumpstate -incidentd userdebug_or_eng(`-logpersist -logd') } misc_logd_f…
28 neverallow { domain -init userdebug_or_eng(`-logpersist -logd') } misc_logd_file:file no_w_file_per…
29 neverallow { domain -init userdebug_or_eng(`-logpersist -logd') } misc_logd_file:dir { add_name lin…
/system/sepolicy/prebuilts/api/29.0/private/
Dlogd.te1 typeattribute logd coredomain;
3 init_daemon_domain(logd)
5 # logd is not allowed to write anywhere other than /data/misc/logd, and then
7 neverallow logd {
21 -logd
Dcrash_dump.te15 -logd
21 allow crash_dump { apexd llkd logd vold }:process { ptrace signal sigchld sigstop sigkill };
40 logd
41 userdebug_or_eng(`-logd')
Dlogpersist.te16 unix_socket_connect(logpersist, logdr, logd)
27 neverallow { domain -init userdebug_or_eng(`-logpersist -logd -dumpstate') } misc_logd_file:file no…
28 neverallow { domain -init userdebug_or_eng(`-logpersist -logd') } misc_logd_file:dir { add_name lin…
/system/sepolicy/prebuilts/api/28.0/private/
Dlogd.te1 typeattribute logd coredomain;
3 init_daemon_domain(logd)
5 # logd is not allowed to write anywhere other than /data/misc/logd, and then
8 neverallow logd {
22 -logd
/system/sepolicy/prebuilts/api/26.0/private/
Dlogd.te1 typeattribute logd coredomain;
3 init_daemon_domain(logd)
5 # logd is not allowed to write anywhere other than /data/misc/logd, and then
8 neverallow logd {
22 -logd
/system/sepolicy/prebuilts/api/27.0/private/
Dlogd.te1 typeattribute logd coredomain;
3 init_daemon_domain(logd)
5 # logd is not allowed to write anywhere other than /data/misc/logd, and then
8 neverallow logd {
22 -logd
Dlogpersist.te16 unix_socket_connect(logpersist, logdr, logd)
23 neverallow { domain -init userdebug_or_eng(`-logpersist -logd -dumpstate') } misc_logd_file:file no…
24 neverallow { domain -init userdebug_or_eng(`-logpersist -logd') } misc_logd_file:dir { add_name lin…
/system/core/liblog/
DREADME.protocol.md1 # liblog -> logd
3 The data that liblog sends to logd is represented below.
67 The header is added immediately before sending the log message to logd.
89 # logd -> liblog
91 logd sends a `logger_entry` struct to liblog followed by the payload. The payload is identical to
92 the payloads defined above. The max size of the entire message from logd is LOGGER_ENTRY_MAX_LEN.

1234567