d3ba665020
* Test statistics output, all four main log id types are checked to be present, and output is properly formatted with header (ascii new-line terminated byte count) and trailer (newline formfeed) frames. * On dev build test dgram_qlen, circumvent if liblog benchmarks executed first though. * Test if kernel and user space loggers are present, and if any content has leaked to both. * test benchmark and use it to verify worst UID pruning Change-Id: I890c89f64825956f40108de806ed750b0170ac6c |
||
---|---|---|
.. | ||
tests | ||
Android.mk | ||
CommandListener.cpp | ||
CommandListener.h | ||
FlushCommand.cpp | ||
FlushCommand.h | ||
libaudit.c | ||
libaudit.h | ||
LogAudit.cpp | ||
LogAudit.h | ||
LogBuffer.cpp | ||
LogBuffer.h | ||
LogBufferElement.cpp | ||
LogBufferElement.h | ||
LogCommand.cpp | ||
LogCommand.h | ||
LogListener.cpp | ||
LogListener.h | ||
LogReader.cpp | ||
LogReader.h | ||
LogStatistics.cpp | ||
LogStatistics.h | ||
LogTimes.cpp | ||
LogTimes.h | ||
LogWhiteBlackList.cpp | ||
LogWhiteBlackList.h | ||
main.cpp | ||
README.auditd |
Auditd Daemon The audit daemon is a simplified version of its desktop counterpart designed to gather the audit logs from the audit kernel subsystem. The audit subsystem of the kernel includes Linux Security Modules (LSM) messages as well. To enable the audit subsystem, you must add this to your kernel config: CONFIG_AUDIT=y To enable a LSM, you must consult that LSM's documentation, the example below is for SELinux: CONFIG_SECURITY_SELINUX=y This does not include possible dependencies that may need to be satisfied for that particular LSM.