diff options
author | Dariusz Michaluk <d.michaluk@samsung.com> | 2020-04-16 15:22:02 +0200 |
---|---|---|
committer | Dariusz Michaluk <d.michaluk@samsung.com> | 2020-04-22 13:44:44 +0200 |
commit | 35febec18e303dc86ee0ef3009eb8e5044ec22d7 (patch) | |
tree | ae6bff48d172d05b4908bdb0f84320bc237c84b9 | |
parent | dcb117a8c87c2300db0e6d69c5ed1b37c38014f7 (diff) | |
download | security-manager-35febec18e303dc86ee0ef3009eb8e5044ec22d7.tar.gz security-manager-35febec18e303dc86ee0ef3009eb8e5044ec22d7.tar.bz2 security-manager-35febec18e303dc86ee0ef3009eb8e5044ec22d7.zip |
Fix security_manager_cleanup_app()
After introducing sharedRO mount namespace setup,
every app should cleanup own namespace after termination.
Change-Id: I358007e3f47213f3038e6c3f2a05cbe5e273627f
-rw-r--r-- | src/client/client-security-manager.cpp | 8 |
1 files changed, 2 insertions, 6 deletions
diff --git a/src/client/client-security-manager.cpp b/src/client/client-security-manager.cpp index 64a593aa..19da56a4 100644 --- a/src/client/client-security-manager.cpp +++ b/src/client/client-security-manager.cpp @@ -964,12 +964,8 @@ int security_manager_cleanup_app(const char *app_name, uid_t uid, pid_t pid) return SECURITY_MANAGER_ERROR_INPUT_PARAM; } - if (MountNS::isPrivacyPrivilegeMountNamespaceEnabled()) { - ClientRequest request(SecurityModuleCall::APP_CLEAN_NAMESPACE); - return request.send(std::string(app_name), uid, pid).getStatus(); - } - - return SECURITY_MANAGER_SUCCESS; + ClientRequest request(SecurityModuleCall::APP_CLEAN_NAMESPACE); + return request.send(std::string(app_name), uid, pid).getStatus(); }); } |