/system/core/logd/ |
logd.rc | 1 service logd /system/bin/logd 2 socket logd stream 0666 logd logd 3 socket logdr seqpacket 0666 logd logd 4 socket logdw dgram+passcred 0222 logd logd 7 user logd [all...] |
logtagd.rc | 5 mkdir /data/misc/logd 0700 logd log 6 write /data/misc/logd/event-log-tags "" 7 chown logd log /data/misc/logd/event-log-tags 8 chmod 0600 /data/misc/logd/event-log-tags 9 restorecon /data/misc/logd/event-log-tags
|
README.property | 1 The properties that logd and friends react to are: 4 ro.logd.auditd bool true Enable selinux audit daemon 5 ro.logd.auditd.dmesg bool true selinux audit messages sent to dmesg. 6 ro.logd.auditd.main bool true selinux audit messages sent to main. 7 ro.logd.auditd.events bool true selinux audit messages sent to events. 8 persist.logd.security bool false Enable security buffer. 9 ro.device_owner bool false Override persist.logd.security to false 10 ro.logd.kernel bool+ svelte+ Enable klogd daemon 11 ro.logd.statistics bool+ svelte+ Enable logcat -S statistics. 12 ro.debuggable number if not "1", logd.statistics [all...] |
/system/sepolicy/prebuilts/api/26.0/public/ |
logd.te | 2 type logd, domain, mlstrustedsubject; 6 r_dir_file(logd, cgroup) 7 r_dir_file(logd, proc) 8 r_dir_file(logd, proc_meminfo) 9 r_dir_file(logd, proc_net) 11 allow logd self:capability { setuid setgid setpcap sys_nice audit_control }; 12 allow logd self:capability2 syslog; 13 allow logd self:netlink_audit_socket { create_socket_perms_no_ioctl nlmsg_write }; 14 allow logd kernel:system syslog_read; 15 allow logd kmsg_device:chr_file w_file_perms [all...] |
/system/sepolicy/prebuilts/api/27.0/public/ |
logd.te | 2 type logd, domain, mlstrustedsubject; 6 r_dir_file(logd, cgroup) 7 r_dir_file(logd, proc) 8 r_dir_file(logd, proc_meminfo) 9 r_dir_file(logd, proc_net) 11 allow logd self:capability { setuid setgid setpcap sys_nice audit_control }; 12 allow logd self:capability2 syslog; 13 allow logd self:netlink_audit_socket { create_socket_perms_no_ioctl nlmsg_write }; 14 allow logd kernel:system syslog_read; 15 allow logd kmsg_device:chr_file w_file_perms [all...] |
/system/sepolicy/prebuilts/api/28.0/public/ |
logd.te | 2 type logd, domain, mlstrustedsubject; 6 r_dir_file(logd, cgroup) 7 r_dir_file(logd, proc_kmsg) 8 r_dir_file(logd, proc_meminfo) 9 r_dir_file(logd, proc_net) 11 allow logd self:global_capability_class_set { setuid setgid setpcap sys_nice audit_control }; 12 allow logd self:global_capability2_class_set syslog; 13 allow logd self:netlink_audit_socket { create_socket_perms_no_ioctl nlmsg_write }; 14 allow logd kernel:system syslog_read; 15 allow logd kmsg_device:chr_file w_file_perms [all...] |
/system/sepolicy/public/ |
logd.te | 2 type logd, domain, mlstrustedsubject; 6 r_dir_file(logd, cgroup) 7 r_dir_file(logd, proc_kmsg) 8 r_dir_file(logd, proc_meminfo) 9 r_dir_file(logd, proc_net) 11 allow logd self:global_capability_class_set { setuid setgid setpcap sys_nice audit_control }; 12 allow logd self:global_capability2_class_set syslog; 13 allow logd self:netlink_audit_socket { create_socket_perms_no_ioctl nlmsg_write }; 14 allow logd kernel:system syslog_read; 15 allow logd kmsg_device:chr_file w_file_perms [all...] |
/system/core/logcat/ |
logcatd.rc | 7 # notwithstanding) for logd.logpersistd.size and logd.logpersistd.buffer. 11 on property:persist.logd.logpersistd.size=256 12 setprop persist.logd.logpersistd.size "" 13 setprop logd.logpersistd.size "" 15 on property:persist.logd.logpersistd.size=* 17 setprop logd.logpersistd.size ${persist.logd.logpersistd.size} 19 on property:persist.logd.logpersistd.buffer=all 20 setprop persist.logd.logpersistd.buffer " [all...] |
/system/sepolicy/prebuilts/api/26.0/private/ |
logd.te | 1 typeattribute logd coredomain; 3 init_daemon_domain(logd) 5 # logd is not allowed to write anywhere other than /data/misc/logd, and then 8 neverallow logd { 22 -logd
|
logpersist.te | 16 unix_socket_connect(logpersist, logdr, logd) 23 neverallow { domain -init userdebug_or_eng(`-logpersist -logd -dumpstate') } misc_logd_file:file no_rw_file_perms; 24 neverallow { domain -init userdebug_or_eng(`-logpersist -logd') } misc_logd_file:dir { add_name link relabelfrom remove_name rename reparent rmdir write };
|
/system/sepolicy/prebuilts/api/27.0/private/ |
logd.te | 1 typeattribute logd coredomain; 3 init_daemon_domain(logd) 5 # logd is not allowed to write anywhere other than /data/misc/logd, and then 8 neverallow logd { 22 -logd
|
logpersist.te | 16 unix_socket_connect(logpersist, logdr, logd) 23 neverallow { domain -init userdebug_or_eng(`-logpersist -logd -dumpstate') } misc_logd_file:file no_rw_file_perms; 24 neverallow { domain -init userdebug_or_eng(`-logpersist -logd') } misc_logd_file:dir { add_name link relabelfrom remove_name rename reparent rmdir write };
|
/system/sepolicy/prebuilts/api/28.0/private/ |
logd.te | 1 typeattribute logd coredomain; 3 init_daemon_domain(logd) 5 # logd is not allowed to write anywhere other than /data/misc/logd, and then 8 neverallow logd { 22 -logd
|
logpersist.te | 16 unix_socket_connect(logpersist, logdr, logd) 23 neverallow { domain -init userdebug_or_eng(`-logpersist -logd -dumpstate') } misc_logd_file:file no_rw_file_perms; 24 neverallow { domain -init userdebug_or_eng(`-logpersist -logd') } misc_logd_file:dir { add_name link relabelfrom remove_name rename reparent rmdir write };
|
/system/sepolicy/private/ |
logd.te | 1 typeattribute logd coredomain; 3 init_daemon_domain(logd) 5 # logd is not allowed to write anywhere other than /data/misc/logd, and then 8 neverallow logd { 22 -logd
|
logpersist.te | 16 unix_socket_connect(logpersist, logdr, logd) 23 neverallow { domain -init userdebug_or_eng(`-logpersist -logd -dumpstate') } misc_logd_file:file no_rw_file_perms; 24 neverallow { domain -init userdebug_or_eng(`-logpersist -logd') } misc_logd_file:dir { add_name link relabelfrom remove_name rename reparent rmdir write };
|
/system/core/liblog/include/log/ |
logd.h | 4 #warning "Deprecated: do not include log/logd.h, use log/log.h instead"
|
/build/make/target/board/generic/sepolicy/ |
logpersist.te | 8 # Read from logd. 9 unix_socket_connect(logpersist, logdr, logd)
|
/frameworks/base/cmds/statsd/src/logd/ |
LogReader.h | 20 #include "logd/LogListener.h" 31 * Class to read logs from logd. 57 * Connect to a single instance of logd, and read until there's a read error. 58 * Logd can crash, exit, be killed etc.
|
/packages/services/Telephony/src/com/android/phone/otasp/ |
OtaspActivationService.java | 75 logd("otasp service onCreate"); 83 logd("OTASP call tried " + sOtaspCallRetries + " times"); 85 logd("OTASP call exceeds max retries => activation failed"); 108 logd("EVENT_SERVICE_STATE_CHANGED"); 112 logd("EVENT_START_OTASP_CALL"); 116 logd("OTASP_CALL_STATE_CHANGED"); 120 logd("OTASP_ACTIVATION_STATUS_UPDATE_EVENT"); 124 logd("EVENT_CDMA_OTASP_CALL_RETRY"); 149 logd("startNonInteractiveOtasp: placing call to '" + OTASP_NUMBER + "'..."); 156 if (DBG) logd(" ==> success return from placeCall(): callStatus = " + callStatus) 218 private static void logd(String s) { method in class:OtaspActivationService [all...] |
/frameworks/opt/telephony/tests/telephonytests/src/com/android/internal/telephony/uicc/ |
IccCardStatusTest.java | 58 logd(mIccCardStatus.toString()); 62 logd(mIccCardStatus.toString()); 66 logd(mIccCardStatus.toString()); 74 logd(mIccCardStatus.toString()); 80 logd(mIccCardStatus.toString()); 83 private static void logd(String s) { method in class:IccCardStatusTest
|
/system/chre/platform/include/chre/platform/ |
log.h | 29 * LOGD(format, ...) 54 #ifndef LOGD 55 #error "LOGD must be defined" 56 #endif // LOGD 83 #undef LOGD 84 #define LOGD(format, ...) chreLogNull(format, ##__VA_ARGS__)
|
/device/google/marlin/camera/QCamera2/stack/mm-camera-test/src/ |
mm_qcamera_commands.c | 45 LOGD("E"); 70 LOGD("E"); 83 LOGD("E"); 96 LOGD("E"); 110 LOGD("E"); 123 LOGD("E"); 137 LOGD("E"); 150 LOGD("E"); 164 LOGD("E"); 177 LOGD("E") [all...] |
/hardware/qcom/camera/msm8998/QCamera2/stack/mm-camera-test/src/ |
mm_qcamera_commands.c | 45 LOGD("E"); 70 LOGD("E"); 83 LOGD("E"); 96 LOGD("E"); 110 LOGD("E"); 123 LOGD("E"); 137 LOGD("E"); 150 LOGD("E"); 164 LOGD("E"); 177 LOGD("E") [all...] |
/device/generic/goldfish/wifi/ipv6proxy/ |
log.h | 24 #define logd(...) ALOGD(__VA_ARGS__) macro 30 void logd(const char* fmt, ...);
|