index
:
platform/core/security/security-manager
accepted/tizen_3.0.2014.q3_common
accepted/tizen_3.0.2015.q1_common
accepted/tizen_3.0.2015.q2_common
accepted/tizen_3.0.m14.3_ivi
accepted/tizen_3.0.m2_mobile
accepted/tizen_3.0.m2_tv
accepted/tizen_3.0.m2_wearable
accepted/tizen_3.0_common
accepted/tizen_3.0_ivi
accepted/tizen_3.0_mobile
accepted/tizen_3.0_tv
accepted/tizen_3.0_wearable
accepted/tizen_4.0_unified
accepted/tizen_5.0_unified
accepted/tizen_5.5_unified
accepted/tizen_5.5_unified_mobile_hotfix
accepted/tizen_5.5_unified_wearable_hotfix
accepted/tizen_6.0_unified
accepted/tizen_6.0_unified_hotfix
accepted/tizen_6.5_unified
accepted/tizen_7.0_unified
accepted/tizen_7.0_unified_hotfix
accepted/tizen_8.0_unified
accepted/tizen_9.0_unified
accepted/tizen_common
accepted/tizen_ivi
accepted/tizen_mobile
accepted/tizen_tv
accepted/tizen_unified
accepted/tizen_unified_dev
accepted/tizen_unified_riscv
accepted/tizen_unified_toolchain
accepted/tizen_unified_x
accepted/tizen_unified_x_asan
accepted/tizen_wearable
app_encryption
appdefined
master
privacy-popup-issue
sandbox/ade/profiling
sandbox/chanleebf/asan
sandbox/dkson95/build
sandbox/dnxowls/cmake_upgrade
sandbox/mkashkarov/tizen_6.0_build
sandbox/nmerinov/llvm
sandbox/rkrypa/dpl
sandbox/zabramowska/hybrid
tizen
tizen_3.0
tizen_3.0.2014.q3_common
tizen_3.0.2014.q4_common
tizen_3.0.2015.q1_common
tizen_3.0.2015.q2_common
tizen_3.0.m14.3_ivi
tizen_3.0.m1_mobile
tizen_3.0.m1_tv
tizen_3.0.m2
tizen_3.0_ivi
tizen_3.0_tv
tizen_4.0
tizen_4.0_tv
tizen_5.0
tizen_5.5
tizen_5.5_mobile_hotfix
tizen_5.5_tv
tizen_5.5_wearable_hotfix
tizen_6.0
tizen_6.0_hotfix
tizen_6.5
tizen_7.0
tizen_7.0_hotfix
tizen_7.0_unified
tizen_8.0
tizen_9.0
Domain: Security / Access Control;
Tomasz Swierczek <t.swierczek@samsung.com>
summary
refs
log
tree
commit
diff
log msg
author
committer
range
path:
root
/
policy
Age
Commit message (
Expand
)
Author
Files
Lines
2019-12-11
Add http://tizen.org/privilege/internal/livecoredump and disable it for non-a...
Karol Lewandowski
7
-1
/
+8
2019-11-20
Remove package generated SharedRO rules
Dariusz Michaluk
3
-11
/
+1
2019-10-11
Add core privileges: securesysteminfo and voicecontrol.tts
Yunjin Lee
5
-0
/
+10
2019-08-29
Disable http://tizen.org/privilege/internal/sysadmin for non-applications
Tomasz Swierczek
6
-0
/
+7
2019-04-15
Add core privilege: d2d.datasharing, d2d.remotelaunch
Yunjin Lee
5
-0
/
+10
2019-04-09
Add new rules-loader options
Dariusz Michaluk
1
-5
/
+8
2019-03-28
Add core privilege: windowsystem.admin
Yunjin Lee
5
-0
/
+5
2018-12-18
Add core privileges
Yunjin Lee
5
-0
/
+20
2018-11-22
Change local permissible file location to use UID rather than username
Tomasz Swierczek
1
-0
/
+26
2018-10-10
Replace smack rule storage with straight-from-db rule loader
Konrad Lipinski
3
-0
/
+173
2018-09-17
Add core privilege: updatecontrol.admin and permission.check
Yunjin Lee
5
-0
/
+10
2018-09-12
Move standard users group management from GUM to security-manager
Karol Lewandowski
7
-0
/
+24
2018-08-24
Initialize database and restart service in policy-reload
Konrad Lipinski
1
-0
/
+8
2018-08-24
Give internet privilege to kernel thread(@)
jin-gyu.kim
1
-0
/
+3
2018-08-09
Rework security-manager-migration script as a policy update script
Rafal Krypa
1
-1
/
+23
2018-08-06
Add /opt/usr/media to privilege-mount.list again
jin-gyu.kim
1
-0
/
+1
2018-07-17
Retrieve package manager privilege from User::Shell client
jin-gyu.kim
1
-6
/
+0
2018-07-03
Add TZ_SYS_MEDIASHARED to privilege-mount.list
jin-gyu.kim
1
-1
/
+1
2018-04-05
Add core privilege voicecontrol.manager, softap and softap.admin
Yunjin Lee
5
-0
/
+15
2018-01-17
Restore mediastorage/externalstorage privilege to group mapping
Dariusz Michaluk
1
-0
/
+2
2018-01-03
Add core privilege: devicecertificate
Yunjin Lee
5
-0
/
+5
2017-12-22
client: do not add application process to hardcoded groups
Rafal Krypa
1
-2
/
+0
2017-11-28
Allow privilege enforcement with bind mounts to be configured
Rafal Krypa
2
-0
/
+18
2017-11-28
Add ConfigFile class for run-time reading and parsing of config files
Rafal Krypa
1
-1
/
+1
2017-11-17
Adding privilege group priv_tee_client.
r.tyminski
1
-0
/
+1
2017-09-28
Add core privilege: peripheralio
Yunjin Lee
5
-0
/
+5
2017-09-26
Remove core privilege: d2d.datasharing
Yunjin Lee
5
-5
/
+0
2017-08-07
Add core privilege: gesturegrab, gestureactivation
Yunjin Lee
5
-0
/
+10
2017-07-05
Add core privilege: blocknumber.read, blocknumber.write
Yunjin Lee
5
-0
/
+10
2017-05-19
Add core privilege: zigbee, zigbee.admin
Yunjin Lee
5
-0
/
+10
2017-05-19
Add core privilege: tee.client
Yunjin Lee
5
-5
/
+10
2017-04-24
Merge remote-tracking branch 'origin/tizen' into appdefined
Bartlomiej Grzelewski
4
-5
/
+5
2017-04-19
Revert of changes related to privacy popups
Radoslaw Bartosiak
1
-16
/
+0
2017-04-02
Migrate existing application policy to use new ask-user policies
Rafal Krypa
1
-0
/
+16
2017-03-28
Remove the redundant SharedRO SMACK rules.
jin-gyu.kim
4
-4
/
+4
2017-03-15
Fix buckets: aggregation of global and local instance privileges of an app
Dariusz Michaluk
2
-6
/
+45
2017-02-16
Make it possible to use out-of-the-source build dir
Lukasz Pawelczyk
1
-1
/
+1
2017-02-08
Add APPDEFINED Cynara bucket
Radoslaw Bartosiak
1
-0
/
+2
2016-12-27
Don't put empty lines in generated Smack policy
Rafal Krypa
2
-1
/
+9
2016-12-13
Map email privilege to priv_email
jin-gyu.kim
1
-0
/
+1
2016-12-08
Add transmute rule between non-hybrid app and RW path
Zofia Abramowska
1
-0
/
+38
2016-10-23
Treat web only privilege as core privilege
Yunjin Lee
5
-77
/
+77
2016-10-14
Add FOTA script for security-manager policy update
Rafal Krypa
2
-0
/
+12
2016-10-12
SM : Unify Smack rules of System access to application
Mateusz Forc
1
-3
/
+3
2016-10-11
Update policy set for 'security' user type
jooseong lee
1
-2
/
+2
2016-10-07
Add packagemanger.info privilege for 'User::Shell' domain
jooseong lee
1
-0
/
+3
2016-09-29
Migrate security policy after app labeling schema changed
Rafal Krypa
1
-0
/
+65
2016-09-29
Fix policy versioning mechanism
Rafal Krypa
3
-7
/
+11
2016-09-29
Merge remote-tracking branch 'sandbox/zabramowska/hybrid' into tizen
Rafal Krypa
3
-28
/
+28
2016-09-28
Update default policy for new domain('User::Shell')
jooseong lee
1
-0
/
+6
[next]