index
:
platform/core/security/security-manager
accepted/tizen_3.0.2014.q3_common
accepted/tizen_3.0.2015.q1_common
accepted/tizen_3.0.2015.q2_common
accepted/tizen_3.0.m14.3_ivi
accepted/tizen_3.0.m2_mobile
accepted/tizen_3.0.m2_tv
accepted/tizen_3.0.m2_wearable
accepted/tizen_3.0_common
accepted/tizen_3.0_ivi
accepted/tizen_3.0_mobile
accepted/tizen_3.0_tv
accepted/tizen_3.0_wearable
accepted/tizen_4.0_unified
accepted/tizen_5.0_unified
accepted/tizen_5.5_unified
accepted/tizen_5.5_unified_mobile_hotfix
accepted/tizen_5.5_unified_wearable_hotfix
accepted/tizen_6.0_unified
accepted/tizen_6.0_unified_hotfix
accepted/tizen_6.5_unified
accepted/tizen_7.0_unified
accepted/tizen_7.0_unified_hotfix
accepted/tizen_8.0_unified
accepted/tizen_common
accepted/tizen_ivi
accepted/tizen_mobile
accepted/tizen_tv
accepted/tizen_unified
accepted/tizen_unified_dev
accepted/tizen_unified_riscv
accepted/tizen_unified_toolchain
accepted/tizen_unified_x
accepted/tizen_wearable
app_encryption
appdefined
master
privacy-popup-issue
sandbox/ade/profiling
sandbox/chanleebf/asan
sandbox/dkson95/build
sandbox/dnxowls/cmake_upgrade
sandbox/mkashkarov/tizen_6.0_build
sandbox/nmerinov/llvm
sandbox/rkrypa/dpl
sandbox/zabramowska/hybrid
tizen
tizen_3.0
tizen_3.0.2014.q3_common
tizen_3.0.2014.q4_common
tizen_3.0.2015.q1_common
tizen_3.0.2015.q2_common
tizen_3.0.m14.3_ivi
tizen_3.0.m1_mobile
tizen_3.0.m1_tv
tizen_3.0.m2
tizen_3.0_ivi
tizen_3.0_tv
tizen_4.0
tizen_4.0_tv
tizen_5.0
tizen_5.5
tizen_5.5_mobile_hotfix
tizen_5.5_tv
tizen_5.5_wearable_hotfix
tizen_6.0
tizen_6.0_hotfix
tizen_6.5
tizen_7.0
tizen_7.0_hotfix
tizen_7.0_unified
tizen_8.0
Domain: Security / Access Control;
Tomasz Swierczek <t.swierczek@samsung.com>
summary
refs
log
tree
commit
diff
log msg
author
committer
range
path:
root
/
src
/
common
/
service_impl.cpp
Age
Commit message (
Expand
)
Author
Files
Lines
2023-11-29
Implement a mechanism for permissible file repair
Filip Skrzeczkowski
1
-3
/
+41
2023-05-10
Optimize operations on file with list of Smack labels
Tomasz Swierczek
1
-17
/
+29
2022-12-19
Change some logs into warnings
Tomasz Swierczek
1
-3
/
+5
2022-11-28
Add additional logs to security-manager
Tomasz Swierczek
1
-1
/
+7
2022-10-18
Change logic of security_manager_app_update()
Tomasz Swierczek
1
-1
/
+1
2022-08-01
Refrain from calling sessiond in offline mode
Konrad Lipinski
1
-3
/
+4
2022-07-22
Simplify service and IO thread's class hierarchies
Konrad Lipinski
1
-4
/
+0
2022-07-18
Fix subsession paths
Konrad Lipinski
1
-23
/
+16
2020-10-21
Apply private sharing rules before relabeling
Konrad Lipinski
1
-3
/
+3
2020-10-02
Fix segfault when iterating directories
Mateusz Cegielka
1
-33
/
+41
2020-09-29
Remove redundant author name from db
Krzysztof Jackiewicz
1
-5
/
+5
2020-09-21
Fix author_id mismatch after DB upgrade
Dariusz Michaluk
1
-21
/
+21
2020-07-29
Switch security-manager to dual license (Apache 2.0 or MIT)
Dariusz Michaluk
1
-11
/
+15
2020-07-01
Reimplement prepare_app proper drop checking
Konrad Lipinski
1
-2
/
+16
2020-05-14
Add new arguments for installation requests
Tomasz Swierczek
1
-2
/
+4
2020-04-21
Properly handle nonexisting apps uninstallation
Krzysztof Jackiewicz
1
-11
/
+13
2020-04-20
Fix multi-user detection
Zofia Abramowska
1
-34
/
+10
2020-04-20
Use mount namespace mount points to find running apps
Zofia Abramowska
1
-107
/
+69
2020-04-20
Remove privilege related Smack rules when multi-user is detected
Zofia Abramowska
1
-2
/
+48
2020-04-20
Change privilege related Smack rules on cynara policy change
Zofia Abramowska
1
-0
/
+114
2020-04-20
Remove privilege Smack mapping rules on application uninstallation
Zofia Abramowska
1
-4
/
+3
2020-04-20
Check if smack privilege mapping is enabled
Zofia Abramowska
1
-1
/
+3
2020-04-17
Split smack API wrapper and rules management
Zofia Grzelewska
1
-45
/
+47
2020-04-17
Change privilege and privilege status vector names for clarity
Zofia Abramowska
1
-7
/
+7
2020-04-17
Change cynara client check to admin check for allowed privs
Zofia Abramowska
1
-1
/
+5
2020-04-17
Add privilege-Smack mapping
Zofia Grzelewska
1
-18
/
+50
2020-02-06
Fix app_update not setting sharedRO to false in db
Konrad Lipinski
1
-2
/
+1
2020-01-23
db: drop redundant IsPackageSharedRO query
Konrad Lipinski
1
-2
/
+1
2020-01-23
prepare_app: refactor supplementary group assignment
Konrad Lipinski
1
-9
/
+11
2020-01-23
prepare_app: coalesce all client->mgr IPCs into one
Konrad Lipinski
1
-13
/
+22
2019-12-19
Skip mount namespace setup specific to privacy privileges
Dariusz Michaluk
1
-13
/
+12
2019-11-27
Add SharedRO skel path labelling when labeling any dir as SharedRO
Tomasz Swierczek
1
-0
/
+15
2019-11-20
Label package base paths for SHARED_RO bind mounting
Zofia Grzelewska
1
-1
/
+12
2019-11-20
Add new $APP_HOME/.shared/$PKG_NAME dir to legal paths
Zofia Grzelewska
1
-8
/
+15
2019-11-20
Implement SharedRO with mount namespace
Dariusz Michaluk
1
-2
/
+8
2019-11-20
Remove package generated SharedRO rules
Dariusz Michaluk
1
-42
/
+2
2019-10-01
Refactor service_impl.cpp
Tomasz Swierczek
1
-173
/
+4
2019-06-03
Improve security_manager_prepare_app() performance
Dariusz Michaluk
1
-57
/
+39
2018-11-22
Protect security_manager_app_has_privilege with privilege check
Tomasz Swierczek
1
-2
/
+9
2018-11-21
Check some poll() and mount() errors
Konrad Lipinski
1
-1
/
+2
2018-11-14
Change config.cpp variables to #define
Tomasz Swierczek
1
-23
/
+23
2018-10-10
Replace smack rule storage with straight-from-db rule loader
Konrad Lipinski
1
-15
/
+11
2018-10-04
Optimize package installation
Konrad Lipinski
1
-3
/
+7
2018-10-03
Prevent smack rules leaking during multi-app hybrid pkg uninstall
Konrad Lipinski
1
-14
/
+8
2018-09-25
Add privilege for checking app permission
Pawel Kowalski
1
-7
/
+13
2018-09-12
Move standard users group management from GUM to security-manager
Karol Lewandowski
1
-0
/
+1
2018-08-29
Optimize application uninstallation
Konrad Lipinski
1
-24
/
+24
2018-08-17
Fix: Remove all SharedRO rules after pkg uninstallation.
Dariusz Michaluk
1
-2
/
+11
2018-08-16
Remove fileExists() duplicates
Dariusz Michaluk
1
-9
/
+1
2018-06-29
Change log message in realPath
akoszewski
1
-1
/
+1
[next]