summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorDariusz Michaluk <d.michaluk@samsung.com>2020-04-16 15:22:02 +0200
committerDariusz Michaluk <d.michaluk@samsung.com>2020-04-22 13:44:44 +0200
commit35febec18e303dc86ee0ef3009eb8e5044ec22d7 (patch)
treeae6bff48d172d05b4908bdb0f84320bc237c84b9
parentdcb117a8c87c2300db0e6d69c5ed1b37c38014f7 (diff)
downloadsecurity-manager-35febec18e303dc86ee0ef3009eb8e5044ec22d7.tar.gz
security-manager-35febec18e303dc86ee0ef3009eb8e5044ec22d7.tar.bz2
security-manager-35febec18e303dc86ee0ef3009eb8e5044ec22d7.zip
Fix security_manager_cleanup_app()
After introducing sharedRO mount namespace setup, every app should cleanup own namespace after termination. Change-Id: I358007e3f47213f3038e6c3f2a05cbe5e273627f
-rw-r--r--src/client/client-security-manager.cpp8
1 files changed, 2 insertions, 6 deletions
diff --git a/src/client/client-security-manager.cpp b/src/client/client-security-manager.cpp
index 64a593aa..19da56a4 100644
--- a/src/client/client-security-manager.cpp
+++ b/src/client/client-security-manager.cpp
@@ -964,12 +964,8 @@ int security_manager_cleanup_app(const char *app_name, uid_t uid, pid_t pid)
return SECURITY_MANAGER_ERROR_INPUT_PARAM;
}
- if (MountNS::isPrivacyPrivilegeMountNamespaceEnabled()) {
- ClientRequest request(SecurityModuleCall::APP_CLEAN_NAMESPACE);
- return request.send(std::string(app_name), uid, pid).getStatus();
- }
-
- return SECURITY_MANAGER_SUCCESS;
+ ClientRequest request(SecurityModuleCall::APP_CLEAN_NAMESPACE);
+ return request.send(std::string(app_name), uid, pid).getStatus();
});
}