From c234ba3805a2b8619f6cff5b9e5afd78210c40b7 Mon Sep 17 00:00:00 2001 From: Dan Cashman <dcashman@google.com> Date: Tue, 6 Jun 2017 08:15:01 -0700 Subject: [PATCH] Hide grep filename output. checkseapp does not expect filenames before the appearance of neverallow rules against which to check. They had previously been hidden by default because they were only gathered from one file, but with the addition of the BOARD_PLAT_[PUBLIC|PRIVATE]_SEPOLICY_DIRS to allow for /system policy extensions, this may change. Bug: 36467375 Bug: 62357603 Test: Builds with seapp_contexts extension. Change-Id: I270bd60ae368aa3c082299d57c4bf12936ac2073 --- Android.mk | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/Android.mk b/Android.mk index c990d4ddb..737d31ab9 100644 --- a/Android.mk +++ b/Android.mk @@ -799,7 +799,7 @@ $(LOCAL_BUILT_MODULE): PRIVATE_SC_FILES := $(nonplat_sc_files) $(LOCAL_BUILT_MODULE): PRIVATE_SC_NEVERALLOW_FILES := $(plat_sc_neverallow_files) $(LOCAL_BUILT_MODULE): $(built_sepolicy) $(nonplat_sc_files) $(HOST_OUT_EXECUTABLES)/checkseapp $(plat_sc_neverallow_files) @mkdir -p $(dir $@) - $(hide) grep -ie '^neverallow' $(PRIVATE_SC_NEVERALLOW_FILES) > $@.tmp + $(hide) grep -ihe '^neverallow' $(PRIVATE_SC_NEVERALLOW_FILES) > $@.tmp $(hide) $(HOST_OUT_EXECUTABLES)/checkseapp -p $(PRIVATE_SEPOLICY) -o $@ $(PRIVATE_SC_FILES) $@.tmp built_nonplat_sc := $(LOCAL_BUILT_MODULE) @@ -815,7 +815,7 @@ include $(BUILD_SYSTEM)/base_rules.mk $(LOCAL_BUILT_MODULE): $(plat_sc_neverallow_files) @mkdir -p $(dir $@) - - $(hide) grep -ie '^neverallow' $< > $@ + - $(hide) grep -ihe '^neverallow' $< > $@ plat_sc_neverallow_files := -- GitLab