blob: 530f34232c18e845b6e039ad036a8de2f24a3d4b [file] [log] [blame]
Tom Cherry20391b12015-08-14 13:02:51 -07001service logd /system/bin/logd
Tom Cherry20391b12015-08-14 13:02:51 -07002 socket logd stream 0666 logd logd
3 socket logdr seqpacket 0666 logd logd
Mark Salyzyn54d8ff12017-05-05 15:32:10 -07004 socket logdw dgram+passcred 0222 logd logd
Mark Salyzyne0b8ccd2016-10-27 08:21:35 -07005 file /proc/kmsg r
6 file /dev/kmsg w
Mark Salyzyn77fdb222016-10-28 14:36:36 -07007 user logd
Mark Salyzynd392ac12017-04-27 14:46:31 -07008 group logd system package_info readproc
Tom Cherry0b2a0112019-06-06 13:41:20 -07009 capabilities SYSLOG AUDIT_CONTROL
10 priority 10
Tom Cherry984bd832015-09-21 14:25:34 -070011 writepid /dev/cpuset/system-background/tasks
Tom Cherry20391b12015-08-14 13:02:51 -070012
13service logd-reinit /system/bin/logd --reinit
14 oneshot
15 disabled
Mark Salyzyn5b443402016-10-27 08:34:12 -070016 user logd
17 group logd
Tom Cherry984bd832015-09-21 14:25:34 -070018 writepid /dev/cpuset/system-background/tasks
Mark Salyzyn61e9ce62016-09-12 14:51:54 -070019
Nick Kralevichbe5e4462019-04-09 10:59:39 -070020# Limit SELinux denial generation to 5/second
21service logd-auditctl /system/bin/auditctl -r 5
22 oneshot
23 disabled
24 user logd
25 group logd
26 capabilities AUDIT_CONTROL
27
Mark Salyzyn61e9ce62016-09-12 14:51:54 -070028on fs
29 write /dev/event-log-tags "# content owned by logd
30"
31 chown logd logd /dev/event-log-tags
32 chmod 0644 /dev/event-log-tags
Nick Kralevichbe5e4462019-04-09 10:59:39 -070033
34on property:sys.boot_completed=1
35 start logd-auditctl