Dangerous bridge to cross to whitelist, who is special, who is not? Rationalized as these events are used to catch exploits on platform. As it stands no one should be allowed to block any messages in the security context, not even for development purposes. Bug: 26178938 Change-Id: Ibdc76bc0fe29ba05be168b623af1c9f41d7edbd2
49 lines
1.1 KiB
Makefile
49 lines
1.1 KiB
Makefile
LOCAL_PATH:= $(call my-dir)
|
|
|
|
include $(CLEAR_VARS)
|
|
|
|
LOCAL_MODULE:= logd
|
|
|
|
LOCAL_INIT_RC := logd.rc
|
|
|
|
LOCAL_SRC_FILES := \
|
|
main.cpp \
|
|
LogCommand.cpp \
|
|
CommandListener.cpp \
|
|
LogListener.cpp \
|
|
LogReader.cpp \
|
|
FlushCommand.cpp \
|
|
LogBuffer.cpp \
|
|
LogBufferElement.cpp \
|
|
LogTimes.cpp \
|
|
LogStatistics.cpp \
|
|
LogWhiteBlackList.cpp \
|
|
libaudit.c \
|
|
LogAudit.cpp \
|
|
LogKlog.cpp \
|
|
event.logtags
|
|
|
|
LOCAL_SHARED_LIBRARIES := \
|
|
libsysutils \
|
|
liblog \
|
|
libcutils \
|
|
libbase \
|
|
libpackagelistparser
|
|
|
|
# This is what we want to do:
|
|
# event_logtags = $(shell \
|
|
# sed -n \
|
|
# "s/^\([0-9]*\)[ \t]*$1[ \t].*/-D`echo $1 | tr a-z A-Z`_LOG_TAG=\1/p" \
|
|
# $(LOCAL_PATH)/$2/event.logtags)
|
|
# event_flag := $(call event_logtags,auditd)
|
|
# event_flag += $(call event_logtags,logd)
|
|
# so make sure we do not regret hard-coding it as follows:
|
|
event_flag := -DAUDITD_LOG_TAG=1003 \
|
|
-DLOGD_LOG_TAG=1004 \
|
|
-DSNET_EVENT_LOG_TAG=1397638484
|
|
|
|
LOCAL_CFLAGS := -Werror $(event_flag)
|
|
|
|
include $(BUILD_EXECUTABLE)
|
|
|
|
include $(call first-makefiles-under,$(LOCAL_PATH))
|