Home
last modified time | relevance | path

Searched refs:audit (Results 1 – 25 of 34) sorted by relevance

12

/system/core/logd/
DREADME.auditd3 The audit daemon is a simplified version of its desktop
4 counterpart designed to gather the audit logs from the
5 audit kernel subsystem. The audit subsystem of the kernel
8 To enable the audit subsystem, you must add this to your
DLogAudit.cpp354 char* audit = strstr(buf, " audit("); in log() local
355 if (!audit || (audit >= &buf[len])) { in log()
359 *audit = '\0'; in log()
364 rc = logPrint("%s %s", type, audit + 1); in log()
366 rc = logPrint("%s", audit + 1); in log()
368 *audit = ' '; in log()
DREADME.property4 ro.logd.auditd bool true Enable selinux audit daemon
5 ro.logd.auditd.dmesg bool true selinux audit messages sent to dmesg.
6 ro.logd.auditd.main bool true selinux audit messages sent to main.
7 ro.logd.auditd.events bool true selinux audit messages sent to events.
/system/sepolicy/prebuilts/api/30.0/private/
Dtraced_perf.te35 # Do not audit the cases where traced_perf attempts to access /proc/[pid] for
39 # Do not audit failures to signal a process, as there are cases when this is
Ddexoptanalyzer.te34 # "dontaudit...audit_access" policy line to suppress the audit access without
/system/sepolicy/private/
Dtraced_perf.te35 # Do not audit the cases where traced_perf attempts to access /proc/[pid] for
39 # Do not audit failures to signal a process, as there are cases when this is
Ddexoptanalyzer.te34 # "dontaudit...audit_access" policy line to suppress the audit access without
Dproperty.te104 # Don't audit legacy ctl. property handling. We only want the newer permission check to appear
105 # in the audit log
/system/sepolicy/vendor/
Dhal_wifi_supplicant_default.te23 # Write to security logs for audit.
/system/sepolicy/prebuilts/api/27.0/private/
Ddexoptanalyzer.te25 # "dontaudit...audit_access" policy line to suppress the audit access without
/system/sepolicy/prebuilts/api/28.0/private/
Ddexoptanalyzer.te25 # "dontaudit...audit_access" policy line to suppress the audit access without
/system/sepolicy/prebuilts/api/29.0/private/
Ddexoptanalyzer.te27 # "dontaudit...audit_access" policy line to suppress the audit access without
/system/sepolicy/prebuilts/api/26.0/public/
Dcrash_dump.te13 # which will result in an audit log even when it's allowed to trace.
/system/sepolicy/prebuilts/api/27.0/public/
Dcrash_dump.te13 # which will result in an audit log even when it's allowed to trace.
/system/sepolicy/prebuilts/api/28.0/public/
Dcrash_dump.te5 # which will result in an audit log even when it's allowed to trace.
Dproperty.te142 # Don't audit legacy ctl. property handling. We only want the newer permission check to appear
143 # in the audit log
/system/sepolicy/public/
Dcrash_dump.te5 # which will result in an audit log even when it's allowed to trace.
Dattributes49 # This attribute is used to audit access to proc_net. it is temporary and will
/system/sepolicy/prebuilts/api/30.0/public/
Dcrash_dump.te5 # which will result in an audit log even when it's allowed to trace.
Dproperty.te368 # Don't audit legacy ctl. property handling. We only want the newer permission check to appear
369 # in the audit log
Dattributes49 # This attribute is used to audit access to proc_net. it is temporary and will
/system/sepolicy/prebuilts/api/29.0/public/
Dcrash_dump.te5 # which will result in an audit log even when it's allowed to trace.
Dproperty.te177 # Don't audit legacy ctl. property handling. We only want the newer permission check to appear
178 # in the audit log
Dattributes49 # This attribute is used to audit access to proc_net. it is temporary and will
/system/sepolicy/tools/sepolicy-analyze/
DREADME18 conditional rules, audit-related rules (auditallow or dontaudit),

12