696817d352
- if network read/write broken up, reassemble the pieces. - Use a 20ms poll to check if a new fragment has been sent by the other side. - fixup logd-unit-tests to take a (simplified) fragment from the liblog changes. Bug: 14164765 Change-Id: I98ff87888c119e1e8349717646d0f733e8971bc8 |
||
---|---|---|
.. | ||
tests | ||
Android.mk | ||
CommandListener.cpp | ||
CommandListener.h | ||
FlushCommand.cpp | ||
FlushCommand.h | ||
LogAudit.cpp | ||
LogAudit.h | ||
LogBuffer.cpp | ||
LogBuffer.h | ||
LogBufferElement.cpp | ||
LogBufferElement.h | ||
LogCommand.cpp | ||
LogCommand.h | ||
LogListener.cpp | ||
LogListener.h | ||
LogReader.cpp | ||
LogReader.h | ||
LogStatistics.cpp | ||
LogStatistics.h | ||
LogTimes.cpp | ||
LogTimes.h | ||
LogWhiteBlackList.cpp | ||
LogWhiteBlackList.h | ||
README.auditd | ||
libaudit.c | ||
libaudit.h | ||
main.cpp |
README.auditd
Auditd Daemon The audit daemon is a simplified version of its desktop counterpart designed to gather the audit logs from the audit kernel subsystem. The audit subsystem of the kernel includes Linux Security Modules (LSM) messages as well. To enable the audit subsystem, you must add this to your kernel config: CONFIG_AUDIT=y To enable a LSM, you must consult that LSM's documentation, the example below is for SELinux: CONFIG_SECURITY_SELINUX=y This does not include possible dependencies that may need to be satisfied for that particular LSM.