Per specific request of Visual Display Division.
Change-Id: I4e5f579dafa16aab7f7f443a9f57e15c443862b4
}
if (FS::directoryStatus(userAppsRWSharedDir) > 0) {
- LogDebug("Attempting to bindMountRO for pkg name: " << pkg_name << ", path: " << userAppsRWSharedDir);
+ LogWarning("Attempting to bindMountRO for pkg name: " << pkg_name << ", path: " << userAppsRWSharedDir);
ret = MountNS::bindMountRO(userAppsRWSharedDir, userAppsRWSharedDir);
- LogDebug("bindMountRO for pkg name: " << pkg_name << " returned: " << ret);
+ LogWarning("bindMountRO for pkg name: " << pkg_name << " returned: " << ret);
if (ret != SECURITY_MANAGER_SUCCESS)
return ret;
} else
}
if (subsession_id)
- LogDebug("security_manager_prepare_app2() called for app " << app_name << " subsession " << subsession_id);
+ LogWarning("security_manager_prepare_app2() called for app " << app_name << " subsession " << subsession_id);
else
- LogDebug("security_manager_prepare_app2() called for app " << app_name);
+ LogWarning("security_manager_prepare_app2() called for app " << app_name);
LOG_EXECUTION_TIME("security_manager_prepare_app2(" + std::string(app_name) + "," +
throw;
}
- LogDebug("security_manager_prepare_app2() finished with return code " << ret);
+ LogWarning("security_manager_prepare_app2() finished with return code " << ret);
return ret;
});
const auto tid = gettid();
if (resource_set_cpu_inheritance(tid, RESOURCE_CPU_DEST_NAME, 1000) != 0)
LogError("resource_set_cpu_inheritance failed");
- LogDebug("Sending request to server & waiting for response");
+ LogWarning("Sending request to server & waiting for response");
m_status = sendToServer(SERVICE_SOCKET, m_buffer);
- LogDebug("Request sent, response should be received; m_status: " << m_status);
+ LogWarning("Request sent, response should be received; m_status: " << m_status);
if (resource_clear_cpu_inheritance(tid, RESOURCE_CPU_DEST_NAME) != 0)
LogError("resource_clear_cpu_inheritance failed");
if (!failed())
bool isHybrid, enabledSharedRO;
if (!m_privilegeDb.GetAppPkgInfo(appName, pkgName, isHybrid, enabledSharedRO))
return SECURITY_MANAGER_ERROR_UNKNOWN;
- LogDebug("Package ID: " << pkgName << ", hybrid status: " << isHybrid << ", enabledSharedRO: " << enabledSharedRO);
+ LogWarning("Package ID: " << pkgName << ", hybrid status: " << isHybrid << ", enabledSharedRO: " << enabledSharedRO);
prepareAppFlags = m_prepareAppFlags | (enabledSharedRO ? PREPARE_APP_SHARED_RO_FLAG : 0);
label = SmackLabels::generateProcessLabel(appName, pkgName, isHybrid);
return ret;
}
- LogDebug("Allowed privileges returned - number: " << allowedPrivileges.size());
+ LogWarning("Allowed privileges returned - number: " << allowedPrivileges.size());
std::string authorHash;
m_privilegeDb.GetPkgAuthorHash(pkgName, authorHash);
+ LogWarning("GetPkgAuthorHash returned : " << authorHash);
+
std::vector<std::string> pkgLabels;
getPkgLabels(pkgName, pkgLabels);
ret = getForbiddenAndAllowedGroups(label, allowedPrivileges, forbiddenGroups,
allowedGroups);
- LogDebug("getForbiddenAndAllowedGroups returned: " << ret);
+ LogWarning("getForbiddenAndAllowedGroups returned: " << ret);
return ret != SECURITY_MANAGER_SUCCESS ? ret
: appSetupNamespace(creds, label, privPathsVector, privPathsStatusVector);