Per explicit request of Visual Display division.
One log changed to warning, also for specific request.
Change-Id: I6fbfc528002a78afd78e60699e342795248f4a1b
}
if (FS::directoryStatus(userAppsRWSharedDir) > 0) {
+ LogDebug("Attempting to bindMountRO for pkg name: " << pkg_name << ", path: " << userAppsRWSharedDir);
ret = MountNS::bindMountRO(userAppsRWSharedDir, userAppsRWSharedDir);
+ LogDebug("bindMountRO for pkg name: " << pkg_name << " returned: " << ret);
if (ret != SECURITY_MANAGER_SUCCESS)
return ret;
} else
return SECURITY_MANAGER_ERROR_INPUT_PARAM;
}
- LOG_EXECUTION_TIME("security_manager_prepare_app2(" + std::string(app_name) + "," +
- (subsession_id ?: "(default)") + ")", Credentials::getCredentialsFromSelf());
-
if (subsession_id)
LogDebug("security_manager_prepare_app2() called for app " << app_name << " subsession " << subsession_id);
else
LogDebug("security_manager_prepare_app2() called for app " << app_name);
+
+ LOG_EXECUTION_TIME("security_manager_prepare_app2(" + std::string(app_name) + "," +
+ (subsession_id ?: "(default)") + ")", Credentials::getCredentialsFromSelf());
+
return try_catch([&] {
std::string appLabel, pkgName;
throw;
}
+ LogDebug("security_manager_prepare_app2() finished with return code " << ret);
+
return ret;
});
}
const auto tid = gettid();
if (resource_set_cpu_inheritance(tid, RESOURCE_CPU_DEST_NAME, 1000) != 0)
LogError("resource_set_cpu_inheritance failed");
+ LogDebug("Sending request to server & waiting for response");
m_status = sendToServer(SERVICE_SOCKET, m_buffer);
+ LogDebug("Request sent, response should be received; m_status: " << m_status);
if (resource_clear_cpu_inheritance(tid, RESOURCE_CPU_DEST_NAME) != 0)
LogError("resource_clear_cpu_inheritance failed");
if (!failed())
std::vector<gid_t> &forbiddenGroups, std::vector<gid_t> &allowedGroups, std::vector<bool> &privPathsStatusVector)
{
try {
- LogDebug("Requested prepareApp for application " << appName);
+ LogWarning("Requested prepareApp for application " << appName);
bool isHybrid, enabledSharedRO;
if (!m_privilegeDb.GetAppPkgInfo(appName, pkgName, isHybrid, enabledSharedRO))
return SECURITY_MANAGER_ERROR_UNKNOWN;
+ LogDebug("Package ID: " << pkgName << ", hybrid status: " << isHybrid << ", enabledSharedRO: " << enabledSharedRO);
prepareAppFlags = m_prepareAppFlags | (enabledSharedRO ? PREPARE_APP_SHARED_RO_FLAG : 0);
label = SmackLabels::generateProcessLabel(appName, pkgName, isHybrid);
return ret;
}
+ LogDebug("Allowed privileges returned - number: " << allowedPrivileges.size());
+
std::string authorHash;
m_privilegeDb.GetPkgAuthorHash(pkgName, authorHash);
ret = getForbiddenAndAllowedGroups(label, allowedPrivileges, forbiddenGroups,
allowedGroups);
+
+ LogDebug("getForbiddenAndAllowedGroups returned: " << ret);
+
return ret != SECURITY_MANAGER_SUCCESS ? ret
: appSetupNamespace(creds, label, privPathsVector, privPathsStatusVector);
} catch (const FS::Exception::Base &e) {