HomeSort by relevance Sort by last modified time
    Searched full:logd (Results 1 - 25 of 708) sorted by null

1 2 3 4 5 6 7 8 91011>>

  /system/core/logd/
logd.rc 1 service logd /system/bin/logd
2 socket logd stream 0666 logd logd
3 socket logdr seqpacket 0666 logd logd
4 socket logdw dgram+passcred 0222 logd logd
7 user logd
    [all...]
logtagd.rc 5 mkdir /data/misc/logd 0700 logd log
6 write /data/misc/logd/event-log-tags ""
7 chown logd log /data/misc/logd/event-log-tags
8 chmod 0600 /data/misc/logd/event-log-tags
9 restorecon /data/misc/logd/event-log-tags
README.property 1 The properties that logd and friends react to are:
4 ro.logd.auditd bool true Enable selinux audit daemon
5 ro.logd.auditd.dmesg bool true selinux audit messages sent to dmesg.
6 ro.logd.auditd.main bool true selinux audit messages sent to main.
7 ro.logd.auditd.events bool true selinux audit messages sent to events.
8 persist.logd.security bool false Enable security buffer.
9 ro.device_owner bool false Override persist.logd.security to false
10 ro.logd.kernel bool+ svelte+ Enable klogd daemon
11 ro.logd.statistics bool+ svelte+ Enable logcat -S statistics.
12 ro.debuggable number if not "1", logd.statistics
    [all...]
  /system/sepolicy/prebuilts/api/26.0/public/
logd.te 2 type logd, domain, mlstrustedsubject;
6 r_dir_file(logd, cgroup)
7 r_dir_file(logd, proc)
8 r_dir_file(logd, proc_meminfo)
9 r_dir_file(logd, proc_net)
11 allow logd self:capability { setuid setgid setpcap sys_nice audit_control };
12 allow logd self:capability2 syslog;
13 allow logd self:netlink_audit_socket { create_socket_perms_no_ioctl nlmsg_write };
14 allow logd kernel:system syslog_read;
15 allow logd kmsg_device:chr_file w_file_perms
    [all...]
  /system/sepolicy/prebuilts/api/27.0/public/
logd.te 2 type logd, domain, mlstrustedsubject;
6 r_dir_file(logd, cgroup)
7 r_dir_file(logd, proc)
8 r_dir_file(logd, proc_meminfo)
9 r_dir_file(logd, proc_net)
11 allow logd self:capability { setuid setgid setpcap sys_nice audit_control };
12 allow logd self:capability2 syslog;
13 allow logd self:netlink_audit_socket { create_socket_perms_no_ioctl nlmsg_write };
14 allow logd kernel:system syslog_read;
15 allow logd kmsg_device:chr_file w_file_perms
    [all...]
  /system/sepolicy/prebuilts/api/28.0/public/
logd.te 2 type logd, domain, mlstrustedsubject;
6 r_dir_file(logd, cgroup)
7 r_dir_file(logd, proc_kmsg)
8 r_dir_file(logd, proc_meminfo)
9 r_dir_file(logd, proc_net)
11 allow logd self:global_capability_class_set { setuid setgid setpcap sys_nice audit_control };
12 allow logd self:global_capability2_class_set syslog;
13 allow logd self:netlink_audit_socket { create_socket_perms_no_ioctl nlmsg_write };
14 allow logd kernel:system syslog_read;
15 allow logd kmsg_device:chr_file w_file_perms
    [all...]
  /system/sepolicy/public/
logd.te 2 type logd, domain, mlstrustedsubject;
6 r_dir_file(logd, cgroup)
7 r_dir_file(logd, proc_kmsg)
8 r_dir_file(logd, proc_meminfo)
9 r_dir_file(logd, proc_net)
11 allow logd self:global_capability_class_set { setuid setgid setpcap sys_nice audit_control };
12 allow logd self:global_capability2_class_set syslog;
13 allow logd self:netlink_audit_socket { create_socket_perms_no_ioctl nlmsg_write };
14 allow logd kernel:system syslog_read;
15 allow logd kmsg_device:chr_file w_file_perms
    [all...]
  /system/core/logcat/
logcatd.rc 7 # notwithstanding) for logd.logpersistd.size and logd.logpersistd.buffer.
11 on property:persist.logd.logpersistd.size=256
12 setprop persist.logd.logpersistd.size ""
13 setprop logd.logpersistd.size ""
15 on property:persist.logd.logpersistd.size=*
17 setprop logd.logpersistd.size ${persist.logd.logpersistd.size}
19 on property:persist.logd.logpersistd.buffer=all
20 setprop persist.logd.logpersistd.buffer "
    [all...]
  /system/sepolicy/prebuilts/api/26.0/private/
logd.te 1 typeattribute logd coredomain;
3 init_daemon_domain(logd)
5 # logd is not allowed to write anywhere other than /data/misc/logd, and then
8 neverallow logd {
22 -logd
logpersist.te 16 unix_socket_connect(logpersist, logdr, logd)
23 neverallow { domain -init userdebug_or_eng(`-logpersist -logd -dumpstate') } misc_logd_file:file no_rw_file_perms;
24 neverallow { domain -init userdebug_or_eng(`-logpersist -logd') } misc_logd_file:dir { add_name link relabelfrom remove_name rename reparent rmdir write };
  /system/sepolicy/prebuilts/api/27.0/private/
logd.te 1 typeattribute logd coredomain;
3 init_daemon_domain(logd)
5 # logd is not allowed to write anywhere other than /data/misc/logd, and then
8 neverallow logd {
22 -logd
logpersist.te 16 unix_socket_connect(logpersist, logdr, logd)
23 neverallow { domain -init userdebug_or_eng(`-logpersist -logd -dumpstate') } misc_logd_file:file no_rw_file_perms;
24 neverallow { domain -init userdebug_or_eng(`-logpersist -logd') } misc_logd_file:dir { add_name link relabelfrom remove_name rename reparent rmdir write };
  /system/sepolicy/prebuilts/api/28.0/private/
logd.te 1 typeattribute logd coredomain;
3 init_daemon_domain(logd)
5 # logd is not allowed to write anywhere other than /data/misc/logd, and then
8 neverallow logd {
22 -logd
logpersist.te 16 unix_socket_connect(logpersist, logdr, logd)
23 neverallow { domain -init userdebug_or_eng(`-logpersist -logd -dumpstate') } misc_logd_file:file no_rw_file_perms;
24 neverallow { domain -init userdebug_or_eng(`-logpersist -logd') } misc_logd_file:dir { add_name link relabelfrom remove_name rename reparent rmdir write };
  /system/sepolicy/private/
logd.te 1 typeattribute logd coredomain;
3 init_daemon_domain(logd)
5 # logd is not allowed to write anywhere other than /data/misc/logd, and then
8 neverallow logd {
22 -logd
logpersist.te 16 unix_socket_connect(logpersist, logdr, logd)
23 neverallow { domain -init userdebug_or_eng(`-logpersist -logd -dumpstate') } misc_logd_file:file no_rw_file_perms;
24 neverallow { domain -init userdebug_or_eng(`-logpersist -logd') } misc_logd_file:dir { add_name link relabelfrom remove_name rename reparent rmdir write };
  /system/core/liblog/include/log/
logd.h 4 #warning "Deprecated: do not include log/logd.h, use log/log.h instead"
  /build/make/target/board/generic/sepolicy/
logpersist.te 8 # Read from logd.
9 unix_socket_connect(logpersist, logdr, logd)
  /frameworks/base/cmds/statsd/src/logd/
LogReader.h 20 #include "logd/LogListener.h"
31 * Class to read logs from logd.
57 * Connect to a single instance of logd, and read until there's a read error.
58 * Logd can crash, exit, be killed etc.
  /packages/services/Telephony/src/com/android/phone/otasp/
OtaspActivationService.java 75 logd("otasp service onCreate");
83 logd("OTASP call tried " + sOtaspCallRetries + " times");
85 logd("OTASP call exceeds max retries => activation failed");
108 logd("EVENT_SERVICE_STATE_CHANGED");
112 logd("EVENT_START_OTASP_CALL");
116 logd("OTASP_CALL_STATE_CHANGED");
120 logd("OTASP_ACTIVATION_STATUS_UPDATE_EVENT");
124 logd("EVENT_CDMA_OTASP_CALL_RETRY");
149 logd("startNonInteractiveOtasp: placing call to '" + OTASP_NUMBER + "'...");
156 if (DBG) logd(" ==> success return from placeCall(): callStatus = " + callStatus)
218 private static void logd(String s) { method in class:OtaspActivationService
    [all...]
  /frameworks/opt/telephony/tests/telephonytests/src/com/android/internal/telephony/uicc/
IccCardStatusTest.java 58 logd(mIccCardStatus.toString());
62 logd(mIccCardStatus.toString());
66 logd(mIccCardStatus.toString());
74 logd(mIccCardStatus.toString());
80 logd(mIccCardStatus.toString());
83 private static void logd(String s) { method in class:IccCardStatusTest
  /system/chre/platform/include/chre/platform/
log.h 29 * LOGD(format, ...)
54 #ifndef LOGD
55 #error "LOGD must be defined"
56 #endif // LOGD
83 #undef LOGD
84 #define LOGD(format, ...) chreLogNull(format, ##__VA_ARGS__)
  /device/google/marlin/camera/QCamera2/stack/mm-camera-test/src/
mm_qcamera_commands.c 45 LOGD("E");
70 LOGD("E");
83 LOGD("E");
96 LOGD("E");
110 LOGD("E");
123 LOGD("E");
137 LOGD("E");
150 LOGD("E");
164 LOGD("E");
177 LOGD("E")
    [all...]
  /hardware/qcom/camera/msm8998/QCamera2/stack/mm-camera-test/src/
mm_qcamera_commands.c 45 LOGD("E");
70 LOGD("E");
83 LOGD("E");
96 LOGD("E");
110 LOGD("E");
123 LOGD("E");
137 LOGD("E");
150 LOGD("E");
164 LOGD("E");
177 LOGD("E")
    [all...]
  /device/generic/goldfish/wifi/ipv6proxy/
log.h 24 #define logd(...) ALOGD(__VA_ARGS__) macro
30 void logd(const char* fmt, ...);

Completed in 927 milliseconds

1 2 3 4 5 6 7 8 91011>>