Searched refs:logd (Results 1 – 25 of 159) sorted by relevance
1234567
/system/core/logcat/ |
D | logcatd.rc | 7 # notwithstanding) for logd.logpersistd.size logd.logpersistd.rotate_kbytes and 8 # logd.logpersistd.buffer. 12 on property:persist.logd.logpersistd.count=* 14 setprop persist.logd.logpersistd.size ${persist.logd.logpersistd.count} 16 on property:persist.logd.logpersistd.size=* 17 setprop logd.logpersistd.size ${persist.logd.logpersistd.size} 19 on property:persist.logd.logpersistd.rotate_kbytes=* 20 setprop logd.logpersistd.rotate_kbytes ${persist.logd.logpersistd.rotate_kbytes} 22 on property:persist.logd.logpersistd.buffer=* 23 setprop logd.logpersistd.buffer ${persist.logd.logpersistd.buffer} [all …]
|
/system/core/logd/ |
D | logd.rc | 1 service logd /system/bin/logd 2 socket logd stream 0666 logd logd 3 socket logdr seqpacket 0666 logd logd 4 socket logdw dgram+passcred 0222 logd logd 7 user logd 8 group logd system package_info readproc 13 service logd-reinit /system/bin/logd --reinit 16 user logd 17 group logd 21 service logd-auditctl /system/bin/auditctl -r 5 [all …]
|
D | README.property | 1 The properties that logd and friends react to are: 4 ro.logd.auditd bool true Enable selinux audit daemon 5 ro.logd.auditd.dmesg bool true selinux audit messages sent to dmesg. 6 ro.logd.auditd.main bool true selinux audit messages sent to main. 7 ro.logd.auditd.events bool true selinux audit messages sent to events. 8 persist.logd.security bool false Enable security buffer. 9 ro.organization_owned bool false Override persist.logd.security to false 10 ro.logd.kernel bool svelte+ Enable klogd daemon 11 logd.statistics bool svelte+ Enable logcat -S statistics. 12 ro.debuggable number if not "1", logd.statistics & [all …]
|
D | logtagd.rc | 5 mkdir /data/misc/logd 0750 logd log 6 write /data/misc/logd/event-log-tags "" 7 chown logd log /data/misc/logd/event-log-tags 8 chmod 0600 /data/misc/logd/event-log-tags 9 restorecon /data/misc/logd/event-log-tags
|
D | Android.bp | 21 // event_flag += $(call event_logtags,logd) 74 name: "logd", 76 init_rc: ["logd.rc"], 129 name: "logd-unit-test-defaults", 160 // adb shell /data/nativetest/logd-unit-tests/logd-unit-tests 162 name: "logd-unit-tests", 164 defaults: ["logd-unit-test-defaults"], 169 defaults: ["logd-unit-test-defaults"],
|
/system/sepolicy/prebuilts/api/26.0/public/ |
D | logd.te | 2 type logd, domain, mlstrustedsubject; 6 r_dir_file(logd, cgroup) 7 r_dir_file(logd, proc) 8 r_dir_file(logd, proc_meminfo) 9 r_dir_file(logd, proc_net) 11 allow logd self:capability { setuid setgid setpcap sys_nice audit_control }; 12 allow logd self:capability2 syslog; 13 allow logd self:netlink_audit_socket { create_socket_perms_no_ioctl nlmsg_write }; 14 allow logd kernel:system syslog_read; 15 allow logd kmsg_device:chr_file w_file_perms; [all …]
|
/system/sepolicy/prebuilts/api/28.0/public/ |
D | logd.te | 2 type logd, domain, mlstrustedsubject; 6 r_dir_file(logd, cgroup) 7 r_dir_file(logd, proc_kmsg) 8 r_dir_file(logd, proc_meminfo) 9 r_dir_file(logd, proc_net) 11 allow logd self:global_capability_class_set { setuid setgid setpcap sys_nice audit_control }; 12 allow logd self:global_capability2_class_set syslog; 13 allow logd self:netlink_audit_socket { create_socket_perms_no_ioctl nlmsg_write }; 14 allow logd kernel:system syslog_read; 15 allow logd kmsg_device:chr_file w_file_perms; [all …]
|
/system/sepolicy/prebuilts/api/27.0/public/ |
D | logd.te | 2 type logd, domain, mlstrustedsubject; 6 r_dir_file(logd, cgroup) 7 r_dir_file(logd, proc) 8 r_dir_file(logd, proc_meminfo) 9 r_dir_file(logd, proc_net) 11 allow logd self:capability { setuid setgid setpcap sys_nice audit_control }; 12 allow logd self:capability2 syslog; 13 allow logd self:netlink_audit_socket { create_socket_perms_no_ioctl nlmsg_write }; 14 allow logd kernel:system syslog_read; 15 allow logd kmsg_device:chr_file w_file_perms; [all …]
|
/system/sepolicy/prebuilts/api/30.0/public/ |
D | logd.te | 2 type logd, domain, mlstrustedsubject; 6 r_dir_file(logd, cgroup) 7 r_dir_file(logd, proc_kmsg) 8 r_dir_file(logd, proc_meminfo) 10 allow logd self:global_capability_class_set { setuid setgid setpcap sys_nice audit_control }; 11 allow logd self:global_capability2_class_set syslog; 12 allow logd self:netlink_audit_socket { create_socket_perms_no_ioctl nlmsg_write }; 13 allow logd kernel:system syslog_read; 14 allow logd kmsg_device:chr_file { getattr w_file_perms }; 15 allow logd system_data_file:{ file lnk_file } r_file_perms; [all …]
|
/system/sepolicy/public/ |
D | logd.te | 2 type logd, domain, mlstrustedsubject; 6 r_dir_file(logd, cgroup) 7 r_dir_file(logd, proc_kmsg) 8 r_dir_file(logd, proc_meminfo) 10 allow logd self:global_capability_class_set { setuid setgid setpcap sys_nice audit_control }; 11 allow logd self:global_capability2_class_set syslog; 12 allow logd self:netlink_audit_socket { create_socket_perms_no_ioctl nlmsg_write }; 13 allow logd kernel:system syslog_read; 14 allow logd kmsg_device:chr_file { getattr w_file_perms }; 15 allow logd system_data_file:{ file lnk_file } r_file_perms; [all …]
|
/system/sepolicy/prebuilts/api/29.0/public/ |
D | logd.te | 2 type logd, domain, mlstrustedsubject; 6 r_dir_file(logd, cgroup) 7 r_dir_file(logd, proc_kmsg) 8 r_dir_file(logd, proc_meminfo) 10 allow logd self:global_capability_class_set { setuid setgid setpcap sys_nice audit_control }; 11 allow logd self:global_capability2_class_set syslog; 12 allow logd self:netlink_audit_socket { create_socket_perms_no_ioctl nlmsg_write }; 13 allow logd kernel:system syslog_read; 14 allow logd kmsg_device:chr_file { getattr w_file_perms }; 15 allow logd system_data_file:{ file lnk_file } r_file_perms; [all …]
|
/system/sepolicy/private/ |
D | logd.te | 1 typeattribute logd coredomain; 3 init_daemon_domain(logd) 6 get_prop(logd, device_logging_prop) 8 # logd is not allowed to write anywhere other than /data/misc/logd, and then 10 neverallow logd { 24 -logd
|
D | crash_dump.te | 15 -logd 21 allow crash_dump { apexd llkd logd vold }:process { ptrace signal sigchld sigstop sigkill }; 40 logd 41 userdebug_or_eng(`-logd')
|
D | logpersist.te | 16 unix_socket_connect(logpersist, logdr, logd) 27 neverallow { domain -init -dumpstate -incidentd userdebug_or_eng(`-logpersist -logd') } misc_logd_f… 28 neverallow { domain -init userdebug_or_eng(`-logpersist -logd') } misc_logd_file:file no_w_file_per… 29 neverallow { domain -init userdebug_or_eng(`-logpersist -logd') } misc_logd_file:dir { add_name lin…
|
/system/sepolicy/prebuilts/api/30.0/private/ |
D | logd.te | 1 typeattribute logd coredomain; 3 init_daemon_domain(logd) 5 # logd is not allowed to write anywhere other than /data/misc/logd, and then 7 neverallow logd { 21 -logd
|
D | crash_dump.te | 15 -logd 21 allow crash_dump { apexd llkd logd vold }:process { ptrace signal sigchld sigstop sigkill }; 40 logd 41 userdebug_or_eng(`-logd')
|
D | logpersist.te | 16 unix_socket_connect(logpersist, logdr, logd) 27 neverallow { domain -init -dumpstate -incidentd userdebug_or_eng(`-logpersist -logd') } misc_logd_f… 28 neverallow { domain -init userdebug_or_eng(`-logpersist -logd') } misc_logd_file:file no_w_file_per… 29 neverallow { domain -init userdebug_or_eng(`-logpersist -logd') } misc_logd_file:dir { add_name lin…
|
/system/sepolicy/prebuilts/api/29.0/private/ |
D | logd.te | 1 typeattribute logd coredomain; 3 init_daemon_domain(logd) 5 # logd is not allowed to write anywhere other than /data/misc/logd, and then 7 neverallow logd { 21 -logd
|
D | crash_dump.te | 15 -logd 21 allow crash_dump { apexd llkd logd vold }:process { ptrace signal sigchld sigstop sigkill }; 40 logd 41 userdebug_or_eng(`-logd')
|
D | logpersist.te | 16 unix_socket_connect(logpersist, logdr, logd) 27 neverallow { domain -init userdebug_or_eng(`-logpersist -logd -dumpstate') } misc_logd_file:file no… 28 neverallow { domain -init userdebug_or_eng(`-logpersist -logd') } misc_logd_file:dir { add_name lin…
|
/system/sepolicy/prebuilts/api/28.0/private/ |
D | logd.te | 1 typeattribute logd coredomain; 3 init_daemon_domain(logd) 5 # logd is not allowed to write anywhere other than /data/misc/logd, and then 8 neverallow logd { 22 -logd
|
/system/sepolicy/prebuilts/api/26.0/private/ |
D | logd.te | 1 typeattribute logd coredomain; 3 init_daemon_domain(logd) 5 # logd is not allowed to write anywhere other than /data/misc/logd, and then 8 neverallow logd { 22 -logd
|
/system/sepolicy/prebuilts/api/27.0/private/ |
D | logd.te | 1 typeattribute logd coredomain; 3 init_daemon_domain(logd) 5 # logd is not allowed to write anywhere other than /data/misc/logd, and then 8 neverallow logd { 22 -logd
|
D | logpersist.te | 16 unix_socket_connect(logpersist, logdr, logd) 23 neverallow { domain -init userdebug_or_eng(`-logpersist -logd -dumpstate') } misc_logd_file:file no… 24 neverallow { domain -init userdebug_or_eng(`-logpersist -logd') } misc_logd_file:dir { add_name lin…
|
/system/core/liblog/ |
D | README.protocol.md | 1 # liblog -> logd 3 The data that liblog sends to logd is represented below. 67 The header is added immediately before sending the log message to logd. 89 # logd -> liblog 91 logd sends a `logger_entry` struct to liblog followed by the payload. The payload is identical to 92 the payloads defined above. The max size of the entire message from logd is LOGGER_ENTRY_MAX_LEN.
|
1234567