Change some logs into warnings 25/285625/2
authorTomasz Swierczek <t.swierczek@samsung.com>
Thu, 15 Dec 2022 11:54:50 +0000 (12:54 +0100)
committerTomasz Swierczek <t.swierczek@samsung.com>
Mon, 19 Dec 2022 12:32:41 +0000 (13:32 +0100)
Per specific request of Visual Display Division.

Change-Id: I4e5f579dafa16aab7f7f443a9f57e15c443862b4

src/client/client-security-manager.cpp
src/client/include/client-request.h
src/common/service_impl.cpp

index b94db7acce733b91f216b721024955302a25f37b..c622a12385b6e4398263f618a3b2bb26e8b0c5c5 100644 (file)
@@ -856,9 +856,9 @@ static int setupSharedRO(const std::string &pkg_name, bool enabledSharedRO, cons
     }
 
     if (FS::directoryStatus(userAppsRWSharedDir) > 0) {
-        LogDebug("Attempting to bindMountRO for pkg name: " << pkg_name << ", path: " << userAppsRWSharedDir);
+        LogWarning("Attempting to bindMountRO for pkg name: " << pkg_name << ", path: " << userAppsRWSharedDir);
         ret = MountNS::bindMountRO(userAppsRWSharedDir, userAppsRWSharedDir);
-        LogDebug("bindMountRO for pkg name: " << pkg_name << " returned: " << ret);
+        LogWarning("bindMountRO for pkg name: " << pkg_name << " returned: " << ret);
         if (ret != SECURITY_MANAGER_SUCCESS)
             return ret;
     } else
@@ -976,9 +976,9 @@ int security_manager_prepare_app2(const char *app_name, const char *subsession_i
     }
 
     if (subsession_id)
-        LogDebug("security_manager_prepare_app2() called for app " << app_name << " subsession " << subsession_id);
+        LogWarning("security_manager_prepare_app2() called for app " << app_name << " subsession " << subsession_id);
     else
-        LogDebug("security_manager_prepare_app2() called for app " << app_name);
+        LogWarning("security_manager_prepare_app2() called for app " << app_name);
 
 
     LOG_EXECUTION_TIME("security_manager_prepare_app2(" + std::string(app_name) + "," +
@@ -1024,7 +1024,7 @@ int security_manager_prepare_app2(const char *app_name, const char *subsession_i
             throw;
         }
 
-        LogDebug("security_manager_prepare_app2() finished with return code " << ret);
+        LogWarning("security_manager_prepare_app2() finished with return code " << ret);
 
         return ret;
     });
index 82f729fa4ee388bf6929c2bd4ab8a0b167b4b268..2fa397e836314e4ea14ae35cefea39c22a3c7dd8 100644 (file)
@@ -92,9 +92,9 @@ public:
         const auto tid = gettid();
         if (resource_set_cpu_inheritance(tid, RESOURCE_CPU_DEST_NAME, 1000) != 0)
             LogError("resource_set_cpu_inheritance failed");
-        LogDebug("Sending request to server & waiting for response");
+        LogWarning("Sending request to server & waiting for response");
         m_status = sendToServer(SERVICE_SOCKET, m_buffer);
-        LogDebug("Request sent, response should be received; m_status: " << m_status);
+        LogWarning("Request sent, response should be received; m_status: " << m_status);
         if (resource_clear_cpu_inheritance(tid, RESOURCE_CPU_DEST_NAME) != 0)
             LogError("resource_clear_cpu_inheritance failed");
         if (!failed())
index e73188d07948316529aad6103fcf8df4ab721a80..b94c092f94b781702fc8a1f256416be08ecc323a 100644 (file)
@@ -2253,7 +2253,7 @@ int ServiceImpl::prepareApp(const Credentials &creds, const std::string &appName
         bool isHybrid, enabledSharedRO;
         if (!m_privilegeDb.GetAppPkgInfo(appName, pkgName, isHybrid, enabledSharedRO))
             return SECURITY_MANAGER_ERROR_UNKNOWN;
-        LogDebug("Package ID: " << pkgName << ", hybrid status: " << isHybrid << ", enabledSharedRO: " << enabledSharedRO);
+        LogWarning("Package ID: " << pkgName << ", hybrid status: " << isHybrid << ", enabledSharedRO: " << enabledSharedRO);
         prepareAppFlags = m_prepareAppFlags | (enabledSharedRO ? PREPARE_APP_SHARED_RO_FLAG : 0);
         label = SmackLabels::generateProcessLabel(appName, pkgName, isHybrid);
 
@@ -2264,11 +2264,13 @@ int ServiceImpl::prepareApp(const Credentials &creds, const std::string &appName
             return ret;
         }
 
-        LogDebug("Allowed privileges returned - number: " << allowedPrivileges.size());
+        LogWarning("Allowed privileges returned - number: " << allowedPrivileges.size());
 
         std::string authorHash;
         m_privilegeDb.GetPkgAuthorHash(pkgName, authorHash);
 
+        LogWarning("GetPkgAuthorHash returned : " << authorHash);
+
         std::vector<std::string> pkgLabels;
         getPkgLabels(pkgName, pkgLabels);
 
@@ -2291,7 +2293,7 @@ int ServiceImpl::prepareApp(const Credentials &creds, const std::string &appName
         ret = getForbiddenAndAllowedGroups(label, allowedPrivileges, forbiddenGroups,
                                         allowedGroups);
 
-        LogDebug("getForbiddenAndAllowedGroups returned: " << ret);
+        LogWarning("getForbiddenAndAllowedGroups returned: " << ret);
 
         return ret != SECURITY_MANAGER_SUCCESS ? ret
             : appSetupNamespace(creds, label, privPathsVector, privPathsStatusVector);