Add clat.service 18/218618/1 accepted/tizen/unified/20191127.141720 accepted/tizen/unified/20191128.001525 accepted/tizen/unified/20191204.130702 submit/tizen/20191126.081457 submit/tizen/20191126.105153 submit/tizen/20191204.024545
authorjin-gyu.kim <jin-gyu.kim@samsung.com>
Tue, 26 Nov 2019 05:53:01 +0000 (14:53 +0900)
committerjin-gyu.kim <jin-gyu.kim@samsung.com>
Tue, 26 Nov 2019 05:56:39 +0000 (14:56 +0900)
- network_fw / network_fw / System permissions
- cap_net_admin To create and configure interface, modify routing tables
- cap_net_raw To open raw socket
- cap_ipc_lock clatd calls mmap(MAP_LOCKED) with a 1M buffer. MAP_LOCKED first checks capable(CAP_IPC_LOCK)
- cap_setuid To forge UID when passing socket credentials via UNIX domain sockets
- cap_setgid To forge GID when passing socket credentials via UNIX domain sockets

Change-Id: Ie36a2d060215d27374fa0fd6e9a78a442fb9453b

config/set_capability
test/capability_test/new_capabilities_exception.list
test/new_service_test/target/mobile/systemd_service.list
test/new_service_test/target/tv/systemd_service.list
test/new_service_test/target/wearable/systemd_service.list

index b59fb3c2f6ea7d509698ce37cbe921345c30cfac..a2f34d32cbf177f1029f720ab09260bd21b94cb7 100755 (executable)
@@ -786,6 +786,18 @@ if [ -e "/usr/bin/du" ]
 then /usr/sbin/setcap cap_dac_read_search=ei /usr/bin/du
 fi
 
+# Package               product/upstream/clat
+# Date                  Nov 26, 2019
+# Required              cap_net_admin,cap_net_raw,cap_ipc_lock,cap_setuid,cap_setgid
+# cap_net_admin                To create and configure interface, modify routing tables
+# cap_net_raw          To open raw socket
+# cap_ipc_lock         clatd calls mmap(MAP_LOCKED) with a 1M buffer. MAP_LOCKED first checks capable(CAP_IPC_LOCK)
+# cap_setuid           To forge UID when passing socket credentials via UNIX domain sockets
+# cap_setgid           To forge GID when passing socket credentials via UNIX domain sockets
+
+if [ -e "/usr/bin/clatd" ]
+then /usr/sbin/setcap cap_net_admin,cap_net_raw,cap_ipc_lock,cap_setuid,cap_setgid=ei /usr/bin/clatd
+fi
 
 # TODO: MOVE TO OTHER SCRIPT OR REMOVE
 # Requested by sooyeon.kim@samsung.com (.voice) and dalton.lee@samsung.com (.multiassistant)
index 58bd633ca7b474263818fb5a73286ddf1fe8597d..9408fbbba600607131a0a9cf0917abea42e8d318 100755 (executable)
 /usr/bin/audit-trail-daemon = cap_audit_write,cap_audit_control+ei
 /usr/sbin/tcpdump = cap_net_raw+ei
 /usr/bin/ua-manager = cap_net_raw,cap_sys_rawio+ei
+/usr/libexec/crash-stack = cap_dac_read_search,cap_sys_ptrace+ei
+/usr/sbin/minicoredumper = cap_dac_read_search,cap_sys_ptrace+ei
+/usr/bin/crash-service = cap_dac_override,cap_kill,cap_sys_ptrace+ei
+/usr/bin/dlogutil = cap_syslog+ei
+/usr/bin/du = cap_dac_read_search+ei
+/usr/bin/clatd = cap_setgid,cap_setuid,cap_net_admin,cap_net_raw,cap_ipc_lock+ei
+/usr/bin/buxton2ctl = cap_dac_override+ei
+/usr/bin/df = cap_dac_read_search+ei
+/usr/bin/crash-manager = cap_dac_override,cap_kill,cap_sys_ptrace+ei
+/usr/bin/memps = cap_dac_read_search,cap_sys_ptrace+ei
+/usr/bin/dotnet-hydra-launcher = cap_setgid,cap_sys_admin+ei
+/usr/bin/top = cap_sys_ptrace+ei
+/usr/bin/livedumper = cap_dac_override,cap_sys_ptrace+ei
index 0ac9ce8e012376fb7cb985cdf3381dacf88af4f6..a4b9852faa2f82ef76d57956cbf3eac8588dd341 100755 (executable)
@@ -39,6 +39,7 @@ cert-server.service;security_fw;security_fw;System;
 chromium-efl.service;root;root;System::Privileged;
 chromium-efl-install.service;web_fw;web_fw;System;
 chromium-efl-update.service;root;root;System::Privileged;
+clat.service;network_fw;network_fw;System;
 connman-vpn.service;network_fw;network_fw;System;
 connman.service;network_fw;network_fw;System;
 console-getty.service;root;root;System;
index 7c25166e86c3c7f139349d09813b1be7267fa90c..727ef45a6927467fbac461ed86db192db780ec33 100755 (executable)
@@ -29,6 +29,7 @@ cert-server.service;security_fw;security_fw;System;
 chromium-efl.service;root;root;System::Privileged;
 chromium-efl-install.service;web_fw;web_fw;System;
 chromium-efl-update.service;root;root;System::Privileged;
+clat.service;network_fw;network_fw;System;
 connman-vpn.service;network_fw;network_fw;System;
 connman.service;network_fw;network_fw;System;
 console-getty.service;root;root;System;
index df4c2b8487fe4e1a635f81a3b49acc86eb369e91..d4853e274a64339624b4aebf9bee2e664e72dfe3 100755 (executable)
@@ -35,6 +35,7 @@ cert-server.service;security_fw;security_fw;System;
 chromium-efl.service;root;root;System::Privileged;
 chromium-efl-install.service;web_fw;web_fw;System;
 chromium-efl-update.service;root;root;System::Privileged;
+clat.service;network_fw;network_fw;System;
 connman.service;network_fw;network_fw;System;
 console-getty.service;root;root;System;
 console-shell.service;root;root;System;