diff options
Diffstat (limited to 'meta-application-manager/recipes-application-framework/aul')
4 files changed, 655 insertions, 0 deletions
diff --git a/meta-application-manager/recipes-application-framework/aul/aul-extraconf.inc b/meta-application-manager/recipes-application-framework/aul/aul-extraconf.inc new file mode 100644 index 0000000..65d4b2a --- /dev/null +++ b/meta-application-manager/recipes-application-framework/aul/aul-extraconf.inc @@ -0,0 +1,30 @@ +do_prep_append() { + sed -i 's!/usr/bin/mkdir -p!/bin/mkdir -p!g' ${S}/packaging/ac.service + # preload_list.txt and preexec_list.txt are generated from .in files so they are located in the build directory instead of the source one + sed -i 's@INSTALL(FILES ${CMAKE_CURRENT_SOURCE_DIR}/legacy/preload_list.txt DESTINATION /usr/share/aul )@INSTALL(FILES ${CMAKE_CURRENT_BINARY_DIR}/legacy/preload_list.txt DESTINATION /usr/share/aul )@' ${S}/CMakeLists.txt + sed -i 's@INSTALL(FILES ${CMAKE_CURRENT_SOURCE_DIR}/feature/preexec_list.txt DESTINATION /usr/share/aul )@INSTALL(FILES ${CMAKE_CURRENT_BINARY_DIR}/feature/preexec_list.txt DESTINATION /usr/share/aul )@' ${S}/CMakeLists.txt +} + +SRC_URI_append_class-native = " file://remove-dlog-for-native-build.patch" +aul_files += "${prefix}/share/aul/mida_db.sql" + + +RDEPENDS_${PN}_remove_class-native = "systemd-native" +RDEPENDS_${PN}_remove_class-native = "glibc-native" + +DEPENDS_remove_class-native = "dlog-native" + +EXTRA_OECMAKE+="-DCMAKE_AR:PATH=ar" + +do_install_append() { + + mkdir -p ${D}${prefix}/lib/systemd/user/default.target.wants + ln -s ../amd_session_agent.service ${D}${prefix}/lib/systemd/user/default.target.wants/amd_session_agent.service + + mkdir -p ${D}${systemd_unitdir}/system/default.target.wants + ln -s ../ac.service ${D}${systemd_unitdir}/system/default.target.wants/ac.service + +} + +FILES_${PN} += "${prefix}/lib/systemd/user/default.target.wants/amd_session_agent.service" +FILES_${PN} += "${systemd_unitdir}/system/default.target.wants/ac.service"
\ No newline at end of file diff --git a/meta-application-manager/recipes-application-framework/aul/aul.inc b/meta-application-manager/recipes-application-framework/aul/aul.inc new file mode 100644 index 0000000..366e59d --- /dev/null +++ b/meta-application-manager/recipes-application-framework/aul/aul.inc @@ -0,0 +1,222 @@ +DESCRIPTION = "App utility library" +HOMEPAGE = "http://nohomepage.org" +SECTION = "System/Libraries" +LICENSE = "Apache-2.0" +PV = "0.0.300" + +SRC_URI = "" + +S = "${WORKDIR}/git" + +inherit autotools-brokensep + +BBCLASSEXTEND = "" +PROVIDES = "" + +#PROVIDES by aul + + +#PROVIDES by aul-dev +PROVIDES += "aul-dev" + + +#PROVIDES by aul-test +PROVIDES += "aul-test" + + +RDEPENDS = "" +#RDEPENDS of aul (${PN}) +RDEPENDS_${PN} += "glibc" +RDEPENDS_${PN} += "systemd" + +#RDEPENDS of aul-dev (${PN}-dev) +RDEPENDS_${PN}-dev += "aul" + +#RDEPENDS of aul-test (${PN}-test) +RDEPENDS_${PN}-test += "aul" + + +DEPENDS = "" +#DEPENDS of aul +DEPENDS += "pkgmgr-info" +DEPENDS += "librua" +inherit tizen_cmake +DEPENDS += "attr" +DEPENDS += "tizen-platform-config" +DEPENDS += "privacy-manager-server" +inherit pkgconfig +DEPENDS += "bundle" +DEPENDS += "ail" +DEPENDS += "smack" +DEPENDS += "dlog" +DEPENDS += "sqlite3" +DEPENDS += "xdgmime" +DEPENDS += "libprivilege-control" +DEPENDS += "app-checker" +DEPENDS += "vconf" +DEPENDS += "dbus-glib" + +do_prep() { + cd ${S} + chmod -Rf a+rX,u+w,g-w,o-w ${S} + #setup -q + sed -i 's|TZ_SYS_DB|${prefix}/dbspace|g' ${S}/packaging/aul.manifest + cp ${S}/packaging/aul.manifest . + + +} +do_patch_append() { + bb.build.exec_func('do_prep', d) +} + +do_configure() { +} + +do_compile() { + cd ${S} + LANG=C + export LANG + unset DISPLAY + LD_AS_NEEDED=1; export LD_AS_NEEDED ; + + + + cmake \ + -DCMAKE_VERBOSE_MAKEFILE=ON \ + -DCMAKE_INSTALL_PREFIX:PATH=${prefix} \ + -DCMAKE_INSTALL_LIBDIR:PATH=${prefix}/lib \ + -DINCLUDE_INSTALL_DIR:PATH=${prefix}/include \ + -DLIB_INSTALL_DIR:PATH=${prefix}/lib \ + -DSYSCONF_INSTALL_DIR:PATH=${sysconfdir} \ + -DSHARE_INSTALL_PREFIX:PATH=${prefix}/share \ + -DCMAKE_SKIP_RPATH:BOOL=ON \ + -DBUILD_SHARED_LIBS:BOOL=ON \ + -DCMAKE_TOOLCHAIN_FILE=${WORKDIR}/toolchain.cmake \ + ${EXTRA_OECMAKE} . + oe_runmake ${PARALLEL_MAKE} + + + +} + +do_install() { + export RPM_BUILD_ROOT=${D} + cd ${S} + LANG=C + export LANG + unset DISPLAY + rm -rf ${D} + mkdir -p ${D} + + rm -rf ${D} + + oe_runmake \ + DESTDIR=${D} \ + INSTALL_ROOT=${D} \ + BINDIR=${prefix}/bin \ + install + rm -f ${D}${infodir}/dir + find ${D} -regex ".*\.la$" | xargs rm -f -- + find ${D} -regex ".*\.a$" | xargs rm -f -- + + mkdir -p ${D}${sysconfdir}/init.d + install -m 755 launchpad_run ${D}${sysconfdir}/init.d + + mkdir -p ${D}${sysconfdir}/rc.d/rc3.d + mkdir -p ${D}${sysconfdir}/rc.d/rc4.d + ln -sf ../../init.d/launchpad_run ${D}/${sysconfdir}/rc.d/rc3.d/S34launchpad_run + ln -sf ../../init.d/launchpad_run ${D}/${sysconfdir}/rc.d/rc4.d/S80launchpad_run + + mkdir -p ${D}${prefix}/dbspace + sqlite3 ${D}${prefix}/dbspace/.mida.db < ${D}${prefix}/share/aul/mida_db.sql + rm -rf ${D}${prefix}/share/aul/mida_db.sql + + mkdir -p ${D}${systemd_unitdir}/system + mkdir -p ${D}${prefix}/lib/systemd/user + install -m 0644 ${S}/packaging/ac.service ${D}${systemd_unitdir}/system/ac.service + install -m 0644 ${S}/packaging/amd_session_agent.service ${D}${prefix}/lib/systemd/user/amd_session_agent.service + + +} + +pkg_postinst_${PN}() { + #!/bin/sh -e + + [ "x$D" == "x" ] && ldconfig + systemctl enable ac + systemctl --global enable amd_session_agent + systemctl daemon-reload + if [ $1 == 1 ]; then + systemctl restart ac.service + fi + +} + +pkg_prerm_${PN}() { + #!/bin/sh -e + + if [ $1 == 0 ]; then + systemctl stop ac.service + systemctl disable ac + systemctl --global disable amd_session_agent + fi + +} + +pkg_postrm_${PN}() { + #!/bin/sh -e + + [ "x$D" == "x" ] && ldconfig + systemctl daemon-reload + +} + +PACKAGES = "${PN}-dbg ${PN}-doc ${PN}-locale" +PACKAGES += " aul " +PACKAGES += " aul-dev " +PACKAGES += " aul-test " + +aul_files = "" +aul_files += "${prefix}/lib/libaul.so.0" +aul_files += "${prefix}/lib/libaul.so.0.1.0" +aul_files += "${sysconfdir}/init.d/launchpad_run" +aul_files += "${sysconfdir}/rc.d/rc3.d/S34launchpad_run" +aul_files += "${sysconfdir}/rc.d/rc4.d/S80launchpad_run" +aul_files += "%attr(0644,root,users) ${prefix}/dbspace/.mida.db" +aul_files += "%attr(0644,root,users) ${prefix}/dbspace/.mida.db-journal" +aul_files += "${prefix}/bin/aul_mime.sh" +aul_files += "${prefix}/bin/aul_test" +aul_files += "${prefix}/bin/app_launcher" +aul_files += "${prefix}/bin/amd_session_agent" +aul_files += "${prefix}/share/aul/miregex/*" +aul_files += "${prefix}/share/aul/service/*" +aul_files += "${prefix}/share/aul/preload_list.txt" +aul_files += "${prefix}/share/aul/preexec_list.txt" +aul_files += "${systemd_unitdir}/system/ac.service" +aul_files += "${prefix}/lib/systemd/user/amd_session_agent.service" +aul_files += "${prefix}/bin/amd" +aul_files += "${prefix}/bin/daemon-manager-release-agent" +aul_files += "${prefix}/bin/daemon-manager-launch-agent" +MANIFESTFILES_${PN} = "aul.manifest" + +aul-dev_files = "" +aul-dev_files += "${prefix}/include/aul/*.h" +aul-dev_files += "${prefix}/lib/*.so" +aul-dev_files += "${prefix}/lib/pkgconfig/*.pc" + +aul-test_files = "" +aul-test_files += "${prefix}/bin/launch_app" +aul-test_files += "${prefix}/bin/open_app" +aul-test_files += "${prefix}/bin/aul_service.sh" +aul-test_files += "${prefix}/bin/aul_service_test.sh" + +FILES_${PN} = "${aul_files}" +FILES_${PN}-dev = "${aul-dev_files}" +FILES_${PN}-test = "${aul-test_files}" + +PKG_aul= "aul" +PKG_aul-dev= "aul-dev" +PKG_aul-test= "aul-test" + +require aul-extraconf.inc + diff --git a/meta-application-manager/recipes-application-framework/aul/aul_git.bb b/meta-application-manager/recipes-application-framework/aul/aul_git.bb new file mode 100644 index 0000000..2816749 --- /dev/null +++ b/meta-application-manager/recipes-application-framework/aul/aul_git.bb @@ -0,0 +1,10 @@ +require aul.inc + +PRIORITY = "10" + +LIC_FILES_CHKSUM ??= "file://${COMMON_LICENSE_DIR}/GPL-2.0;md5=801f80980d171dd6425610833a22dbe6" + +SRC_URI += "git://review.tizen.org/platform/core/appfw/aul-1;tag=ef7b405abf2577b9e5bf7aa24944e24552ca5b8e;nobranch=1" + +BBCLASSEXTEND += " native " + diff --git a/meta-application-manager/recipes-application-framework/aul/files/remove-dlog-for-native-build.patch b/meta-application-manager/recipes-application-framework/aul/files/remove-dlog-for-native-build.patch new file mode 100644 index 0000000..183eb6c --- /dev/null +++ b/meta-application-manager/recipes-application-framework/aul/files/remove-dlog-for-native-build.patch @@ -0,0 +1,393 @@ +diff --git a/CMakeLists.txt b/CMakeLists.txt +index c99e444..2753a59 100644 +--- a/CMakeLists.txt ++++ b/CMakeLists.txt +@@ -19,11 +19,11 @@ MESSAGE("Build type: ${CMAKE_BUILD_TYPE}") + + # Set required packages + INCLUDE(FindPkgConfig) +-SET(AUL-1_PKG_CHECK_MODULES dlog libprivilege-control app-checker rua glib-2.0 vconf pkgmgr-info privacy-manager-client) ++SET(AUL-1_PKG_CHECK_MODULES libprivilege-control app-checker rua glib-2.0 vconf pkgmgr-info privacy-manager-client) + pkg_check_modules(pkgs REQUIRED ${AUL-1_PKG_CHECK_MODULES} ) + +-pkg_check_modules(libpkgs REQUIRED dlog bundle dbus-glib-1 ail xdgmime app-checker libtzplatform-config) +-PKG_CHECK_MODULES(PKGS REQUIRED glib-2.0 gio-2.0 dlog bundle) ++pkg_check_modules(libpkgs REQUIRED bundle dbus-glib-1 ail xdgmime app-checker libtzplatform-config) ++PKG_CHECK_MODULES(PKGS REQUIRED glib-2.0 gio-2.0 bundle) + + FIND_LIBRARY(LIB_DL dl) + +diff --git a/am_daemon/amd_appinfo.c b/am_daemon/amd_appinfo.c +index 0e1b862..990d784 100755 +--- a/am_daemon/amd_appinfo.c ++++ b/am_daemon/amd_appinfo.c +@@ -197,7 +197,7 @@ static int __app_info_insert_handler (const pkgmgrinfo_appinfo_h handle, void *d + r = pkgmgrinfo_appinfo_get_pkgid(handle, &pkgid); + c->val[_AI_PKGID] = strdup(pkgid); + +- SECURE_LOGD("%s : %s : %s", c->val[_AI_FILE], c->val[_AI_COMP], c->val[_AI_TYPE]); ++ //SECURE_LOGD("%s : %s : %s", c->val[_AI_FILE], c->val[_AI_COMP], c->val[_AI_TYPE]); + + g_hash_table_insert(cf->tbl, c->val[_AI_FILE], c); + +@@ -259,7 +259,7 @@ static void __vconf_cb(keynode_t *key, void *data) + return; + } + +- SECURE_LOGD("noti_string : %s",noti_string); ++ //SECURE_LOGD("noti_string : %s",noti_string); + type_string = strtok_r(noti_string, ":", &saveptr); + appid = strtok_r(NULL, ":", &saveptr); + uid_string = strtok_r(NULL, ":", &saveptr); +@@ -278,7 +278,7 @@ static void __vconf_cb(keynode_t *key, void *data) + _E("pkgmgrinfo_appinfo_get_appinfo fail"); + } + +- SECURE_LOGD("appid : %s /handle : %x", appid, handle); ++ //SECURE_LOGD("appid : %s /handle : %x", appid, handle); + + __app_info_insert_handler(handle, data); + +@@ -304,7 +304,7 @@ int app_func(pkgmgrinfo_appinfo_h handle, void *user_data) + + pkgmgrinfo_appinfo_get_appid(handle, &appid); + r = g_hash_table_remove(cf->tbl, appid); +- SECURE_LOGD("upgrading... (%s)", appid); ++ //SECURE_LOGD("upgrading... (%s)", appid); + + return 0; + } +@@ -316,7 +316,7 @@ static int __cb(int req_id, const char *pkg_type, + int ret = 0; + pkgmgrinfo_pkginfo_h handle; + +- SECURE_LOGD("appid(%s), key(%s), value(%s)", pkgid, key, val); ++ //SECURE_LOGD("appid(%s), key(%s), value(%s)", pkgid, key, val); + + if((strncmp(key,"start", 5) == 0) && (strncmp(val, "update", 6) == 0) ) { + ret = pkgmgrinfo_pkginfo_get_pkginfo(pkgid, &handle); +@@ -533,7 +533,7 @@ const struct appinfo *appinfo_find(uid_t caller_uid, const char *appid) + r = pkgmgrinfo_appinfo_get_pkgid(handle, &pkgid); + res->val[_AI_PKGID] = strdup(pkgid); + +- SECURE_LOGD("%s : %s : %s", res->val[_AI_FILE], res->val[_AI_COMP], res->val[_AI_TYPE]); ++ //SECURE_LOGD("%s : %s : %s", res->val[_AI_FILE], res->val[_AI_COMP], res->val[_AI_TYPE]); + + return res; + } +@@ -563,7 +563,7 @@ const char *appinfo_get_filename(const struct appinfo *c) + { + if (!c) { + errno = EINVAL; +- SECURE_LOGE("appinfo get filename: %s", strerror(errno)); ++ //SECURE_LOGE("appinfo get filename: %s", strerror(errno)); + return NULL; + } + +diff --git a/am_daemon/amd_launch.c b/am_daemon/amd_launch.c +index 685699a..4993870 100755 +--- a/am_daemon/amd_launch.c ++++ b/am_daemon/amd_launch.c +@@ -713,7 +713,7 @@ int _start_app(char* appid, bundle* kb, int cmd, int caller_pid, uid_t caller_ui + if (_status_get_app_info_status(pid) == STATUS_DYING) { + pid = -ETERMINATING; + } else if (caller_pid == pid) { +- SECURE_LOGD("caller process & callee process is same.[%s:%d]", appid, pid); ++ //SECURE_LOGD("caller process & callee process is same.[%s:%d]", appid, pid); + pid = -ELOCALLAUNCH_ID; + } else { + if ((ret = __nofork_processing(cmd, pid, kb, fd)) < 0) { +diff --git a/am_daemon/amd_request.c b/am_daemon/amd_request.c +index 349cfd3..c1923bb 100755 +--- a/am_daemon/amd_request.c ++++ b/am_daemon/amd_request.c +@@ -188,7 +188,7 @@ static gboolean __add_history_handler(gpointer user_data) + rec.arg = (char *)pkt_uid->pkt->data; + } + +- SECURE_LOGD("add rua history %s %s", rec.pkg_name, rec.app_path); ++ //SECURE_LOGD("add rua history %s %s", rec.pkg_name, rec.app_path); + + ret = rua_add_history(&rec); + if (ret == -1) +@@ -219,14 +219,14 @@ static int __release_srv(uid_t caller_uid, const char *filename) + + ai = (struct appinfo *)appinfo_find(caller_uid, filename); + if (!ai) { +- SECURE_LOGE("release service: '%s' not found", filename); ++ //SECURE_LOGE("release service: '%s' not found", filename); + return -1; + } + + r = appinfo_get_boolean(ai, AIT_RESTART); + if (r == 1) { + /* Auto restart */ +- SECURE_LOGD("Auto restart set: '%s'", filename); ++ //SECURE_LOGD("Auto restart set: '%s'", filename); + return _start_srv(ai, NULL); + } + +@@ -349,7 +349,7 @@ static gboolean __request_handler(gpointer data) + appid = malloc(MAX_PACKAGE_STR_SIZE); + strncpy(appid, (const char*)pkt->data, MAX_PACKAGE_STR_SIZE-1); + ret = _status_app_is_running(appid, cr.uid); +- SECURE_LOGD("APP_IS_RUNNING : %s : %d",appid, ret); ++ //SECURE_LOGD("APP_IS_RUNNING : %s : %d",appid, ret); + __send_result_to_client(clifd, ret); + free(appid); + break; +diff --git a/am_daemon/amd_status.c b/am_daemon/amd_status.c +index 12f595e..525134f 100755 +--- a/am_daemon/amd_status.c ++++ b/am_daemon/amd_status.c +@@ -70,7 +70,7 @@ int _status_add_app_info_list(char *appid, char *app_path, int pid, int pad_pid, + { + info_t = (app_status_info_t *)iter->data; + +- SECURE_LOGD(" [%d] : %s, %d, %d", info_t->user, info_t->appid, info_t->pid, info_t->status); ++ //SECURE_LOGD(" [%d] : %s, %d, %d", info_t->user, info_t->appid, info_t->pid, info_t->status); + } + + return 0; +@@ -94,7 +94,7 @@ int _status_update_app_info_list(int pid, int status, uid_t uid) + { + info_t = (app_status_info_t *)iter->data; + +- //SECURE_LOGD("%s, %d, %d", info_t->appid, info_t->pid, info_t->status); ++ ////SECURE_LOGD("%s, %d, %d", info_t->appid, info_t->pid, info_t->status); + } + + return 0; +@@ -119,7 +119,7 @@ int _status_remove_app_info_list(int pid, uid_t uid) + { + info_t = (app_status_info_t *)iter->data; + +- //SECURE_LOGD("%s, %d, %d", info_t->appid, info_t->pid, info_t->status); ++ ////SECURE_LOGD("%s, %d, %d", info_t->appid, info_t->pid, info_t->status); + } + + return 0; +@@ -336,7 +336,7 @@ int _status_get_appid_bypid(int fd, int pid) + pkt->cmd = APP_GET_APPID_BYPID_ERROR; + + if (__get_pkgname_bypid(pid, (char *)pkt->data, MAX_PACKAGE_STR_SIZE) == 0) { +- SECURE_LOGD("appid for %d is %s", pid, pkt->data); ++ //SECURE_LOGD("appid for %d is %s", pid, pkt->data); + pkt->cmd = APP_GET_APPID_BYPID_OK; + goto out; + } +diff --git a/include/simple_util.h b/include/simple_util.h +index e0dc4c7..edb1600 100755 +--- a/include/simple_util.h ++++ b/include/simple_util.h +@@ -25,7 +25,7 @@ + + #include <unistd.h> + #include <ctype.h> +-#include <dlog.h> ++//#include <dlog.h> + #include <tzplatform_config.h> + + #define GLOBAL_USER tzplatform_getuid(TZ_SYS_GLOBALAPP_USER) +@@ -52,9 +52,9 @@ + #define MAX_LOCAL_BUFSZ 128 + #define MAX_PID_STR_BUFSZ 20 + +-#define _E(fmt, arg...) LOGE(fmt, ##arg) +-#define _D(fmt, arg...) LOGD(fmt, ##arg) +-#define _W(fmt, arg...) LOGW(fmt, ##arg) ++#define _E(fmt, arg...) //LOGE(fmt, ##arg) ++#define _D(fmt, arg...) //LOGD(fmt, ##arg) ++#define _W(fmt, arg...) //LOGW(fmt, ##arg) + + #define retvm_if(expr, val, fmt, arg...) do { \ + if (expr) { \ +diff --git a/src/launch.c b/src/launch.c +index 1e7a925..bc69a16 100755 +--- a/src/launch.c ++++ b/src/launch.c +@@ -319,7 +319,7 @@ int app_request_to_launchpad(int cmd, const char *pkgname, bundle *kb) + int must_free = 0; + int ret = 0; + +- SECURE_LOGD("launch request : %s", pkgname); ++ //SECURE_LOGD("launch request : %s", pkgname); + if (kb == NULL) { + kb = bundle_create(); + must_free = 1; +diff --git a/src/mida.c b/src/mida.c +index 9bb37fc..61dc852 100755 +--- a/src/mida.c ++++ b/src/mida.c +@@ -334,7 +334,7 @@ int mida_add_app(const char *mime_type, const char *pkg_name) + cnt = __count_with_field(MIDA_TBL_NAME, MIDA_F_MIMETYPE, mime_type, 0); + + if (cnt == 0) { +- SECURE_LOGD("Inserting (%s, %s)", pkg_name, mime_type); ++ //SECURE_LOGD("Inserting (%s, %s)", pkg_name, mime_type); + /* insert */ + _sqlbuf = sqlite3_mprintf( + "INSERT INTO %s (%s,%s) values (\"%s\", \"%s\");", +@@ -344,7 +344,7 @@ int mida_add_app(const char *mime_type, const char *pkg_name) + rc = _exec(mida_db, _sqlbuf); + sqlite3_free(_sqlbuf); + } else { +- SECURE_LOGD("Setting %s for %s", pkg_name, mime_type); ++ //SECURE_LOGD("Setting %s for %s", pkg_name, mime_type); + /* update */ + _sqlbuf = sqlite3_mprintf( + "UPDATE %s SET %s = '%s' where %s = '%s';", +@@ -443,7 +443,7 @@ int svc_add_app(const char *svc_name, const char *pkg_name) + + if (cnt == 0) { + /* insert */ +- SECURE_LOGD("Inserting (%s, %s)", pkg_name, svc_name); ++ //SECURE_LOGD("Inserting (%s, %s)", pkg_name, svc_name); + _sqlbuf = sqlite3_mprintf( + "INSERT INTO %s (%s,%s) values (\"%s\", \"%s\");", + SVC_TBL_NAME, SVC_F_PKGNAME, SVC_F_SVCNAME, pkg_name, +@@ -453,7 +453,7 @@ int svc_add_app(const char *svc_name, const char *pkg_name) + sqlite3_free(_sqlbuf); + } else { + /* update */ +- SECURE_LOGD("Setting %s for %s", pkg_name, svc_name); ++ //SECURE_LOGD("Setting %s for %s", pkg_name, svc_name); + _sqlbuf = sqlite3_mprintf( + "UPDATE %s SET %s = '%s' where %s = '%s';", + SVC_TBL_NAME, SVC_F_PKGNAME, pkg_name, +@@ -509,7 +509,7 @@ int is_supported_svc(const char *svc_name) + if (cnt > 0) + rc = 1; + else +- SECURE_LOGD("%s is not supported.", svc_name); ++ //SECURE_LOGD("%s is not supported.", svc_name); + + __fini(); + return rc; +diff --git a/src/mime.c b/src/mime.c +index 0649e16..6ef272b 100755 +--- a/src/mime.c ++++ b/src/mime.c +@@ -70,7 +70,7 @@ SLPAPI int aul_get_mime_from_content(const char *content, char *mimetype, + if (__match_content_with_regex(content, + &(miregex_tbl->regex_preg))) { + founded = miregex_tbl->mimetype; +- SECURE_LOGD("content %s => mimetype %s\n", content, founded); ++ //SECURE_LOGD("content %s => mimetype %s\n", content, founded); + break; + } + miregex_tbl = miregex_tbl->next; +@@ -360,9 +360,9 @@ static int __launch_with_defapp(const char *mime_type, const char *mime_content) + if (_aul_get_defapp_from_mime + (mime_type, unaliased_mime_type, defapp, + sizeof(unaliased_mime_type), sizeof(defapp)) < 0) { +- SECURE_LOGD("mimetype : %s, unaliased mimetype : %s, mime_content : %s," +- " no default app", mime_type, +- unaliased_mime_type, mime_content); ++ //SECURE_LOGD("mimetype : %s, unaliased mimetype : %s, mime_content : %s," ++ // " no default app", mime_type, ++ // unaliased_mime_type, mime_content); + bundle_add(kb, AUL_K_UNALIASED_MIME_TYPE, unaliased_mime_type); + ret = aul_launch_app(MIME_APP_SELECTOR, kb); + /* TODO: When launching MIME APP SELECTOR, what should +@@ -379,22 +379,22 @@ static int __launch_with_defapp(const char *mime_type, const char *mime_content) + + if (ail_ret == AIL_ERROR_OK) { + ail_destroy_appinfo(handle); +- SECURE_LOGD("mimetype : %s, unaliased mimetype : %s, " +- "mime_content : %s, defapp : %s", mime_type, +- unaliased_mime_type, +- mime_content, defapp); ++ //SECURE_LOGD("mimetype : %s, unaliased mimetype : %s, " ++ // "mime_content : %s, defapp : %s", mime_type, ++ // unaliased_mime_type, ++ // mime_content, defapp); + bundle_add(kb, AUL_K_UNALIASED_MIME_TYPE, + unaliased_mime_type); + ret = aul_launch_app(defapp, kb); + } else if (ail_ret == AIL_ERROR_NO_DATA) { +- SECURE_LOGD("defapp %s for mimetype : %s, mime_content : %s " +- "does NOT exist", defapp, +- mime_type, mime_content); ++ //SECURE_LOGD("defapp %s for mimetype : %s, mime_content : %s " ++ // "does NOT exist", defapp, ++ // mime_type, mime_content); + mida_delete_with_pkgname(defapp); + ail_destroy_appinfo(handle); + goto retry; + } else { +- SECURE_LOGE("ail_get_appinfo with %s failed", defapp); ++ //SECURE_LOGE("ail_get_appinfo with %s failed", defapp); + if (kb) { + bundle_free(kb); + kb = NULL; +diff --git a/src/pkginfo.c b/src/pkginfo.c +index 975c01e..7cb4771 100755 +--- a/src/pkginfo.c ++++ b/src/pkginfo.c +@@ -123,7 +123,7 @@ SLPAPI int aul_app_get_appid_bypid(int pid, char *appid, int len) + + if(pid == getpid() || getuid()==0 || geteuid()==0) { + if (__get_pkgname_bypid(pid, appid, len) == 0) { +- SECURE_LOGD("appid for %d is %s", pid, appid); ++ //SECURE_LOGD("appid for %d is %s", pid, appid); + return AUL_R_OK; + } + /* support app launched by shell script*/diff --git a/am_session_agent/agent.c b/am_session_agent/agent.c +index 1d1efd0..1968f49 100644 +--- a/am_session_agent/agent.c ++++ b/am_session_agent/agent.c +@@ -216,13 +216,13 @@ _static_ void __real_launch(const char *app_path, bundle * kb) + for (i = 0; i < app_argc; i++) { + if( (i%2) == 1) + continue; +- SECURE_LOGD("input argument %d : %s##", i, app_argv[i]); ++ //SECURE_LOGD("input argument %d : %s##", i, app_argv[i]); + } + + PERF("setup argument done"); + + /* Temporary log: launch time checking */ +- LOG(LOG_DEBUG, "LAUNCH", "[%s:Platform:agent:done]", app_path); ++ //LOG(LOG_DEBUG, "LAUNCH", "[%s:Platform:agent:done]", app_path); + #ifdef PRELOAD_ACTIVATE + __preload_exec(app_argc, app_argv); + #endif +@@ -347,7 +347,7 @@ _static_ void __modify_bundle(bundle * kb, int caller_pid, + char value[256]; + + ptr += flag; +- SECURE_LOGD("parsing app_path: EXEC - %s\n", exe); ++ //SECURE_LOGD("parsing app_path: EXEC - %s\n", exe); + + do { + flag = __parser(ptr, key, sizeof(key)); +@@ -604,7 +604,7 @@ _static_ void __agent_main_loop(int main_fd) + PERF("packet processing start"); + + pkg_name = bundle_get_val(kb, AUL_K_PKG_NAME); +- SECURE_LOGD("pkg name : %s\n", pkg_name); ++ //SECURE_LOGD("pkg name : %s\n", pkg_name); + + /* get caller uid and check if not coming from someone else than AMD */ + uid = __get_caller_uid(kb); +@@ -660,8 +660,8 @@ _static_ void __agent_main_loop(int main_fd) + + if (__prepare_exec(pkg_name, app_path, + menu_info, kb) < 0) { +- SECURE_LOGE("preparing work fail to launch - " +- "can not launch %s\n", pkg_name); ++ //SECURE_LOGE("preparing work fail to launch - " ++ // "can not launch %s\n", pkg_name); + exit(-1); + } + +@@ -672,7 +672,7 @@ _static_ void __agent_main_loop(int main_fd) + + exit(-1); + } +- SECURE_LOGD("==> real launch pid : %d %s\n", pid, app_path); ++ //SECURE_LOGD("==> real launch pid : %d %s\n", pid, app_path); + is_real_launch = 1; + } + end: |