platform/core/security/security-config.git
45 hours agoReduce sessiond-generate-cache privileges 17/325617/1 accepted/tizen_unified accepted/tizen_unified_x tizen accepted/tizen/unified/20250613.040701 accepted/tizen/unified/x/20250613.044725
Karol Lewandowski [Thu, 12 Jun 2025 10:13:36 +0000 (12:13 +0200)]
Reduce sessiond-generate-cache privileges

system_fw:system_fw should be enough to perform needed dbus call.

Change-Id: Ib5bee1b11dc39f005eb009d5c09ce563cac2bebf

2 days agoAdd service sessiond-generate-cache.service 47/325547/1
Michal Bloch [Wed, 11 Jun 2025 13:09:03 +0000 (15:09 +0200)]
Add service sessiond-generate-cache.service

Change-Id: Ib43b9da96b5b2858f2dea9cad721fe412337b450

5 weeks agoAdd new version of riscv64/readelf 97/323797/1 accepted/tizen/unified/20250509.120512 accepted/tizen/unified/x/20250510.053324
Karol Lewandowski [Wed, 7 May 2025 12:29:34 +0000 (14:29 +0200)]
Add new version of riscv64/readelf

This version has been compiled:
 - without libctf-nobfd library dependency
 - with sframe library compiled in

Built from commit 15c0f4c14d5d5d8032d013bfe9c95 from platform/upstream/binutils
repository on tizen.org.

Change-Id: I9da074e31457c1caea66cfe2ddc090a12c2337eb

6 weeks agoAdd unified-system-service & its socket. 83/323483/1
Tomasz Swierczek [Tue, 29 Apr 2025 07:30:06 +0000 (09:30 +0200)]
Add unified-system-service & its socket.

Change-Id: I064a8239a065b32f8d6ee1584b0b8a3100f0e5c0

2 months agoAdd cap_setuid also for app loaders in dev_wos mode 64/322164/8 accepted/tizen/unified/20250411.015556 accepted/tizen/unified/x/20250411.040404
Tomasz Swierczek [Fri, 4 Apr 2025 07:59:54 +0000 (09:59 +0200)]
Add cap_setuid also for app loaders in dev_wos mode

This requires adding cap_setuid to AmbientCapabilities in systemd's user
service configuration. To avoid forking systemd we modify its
configuration as a part of no-smack configuration script.

Change-Id: I0d2892b2e123de6059e2dee6b34d5f15c9f0face

2 months agoAdd hal-backend-service-codec .service & .socket 77/321377/1 accepted/tizen/unified/20250322.012731 accepted/tizen/unified/x/20250323.134035
Tomasz Swierczek [Wed, 19 Mar 2025 11:34:54 +0000 (12:34 +0100)]
Add hal-backend-service-codec .service & .socket

Change-Id: I28ff2670331b270020d28c39afccc3d8bd933ec2

3 months agoAdd hal-backend service & socket to allowed lists. accepted/tizen/unified/20250311.134550 accepted/tizen/unified/x/20250312.054007
Tomasz Swierczek [Sun, 9 Mar 2025 11:12:27 +0000 (12:12 +0100)]
Add hal-backend service & socket to allowed lists.

Re-revert again due to hal-backend service failing on quickbuild.

Change-Id: I30e1080580ba6fe099f514b23d5cf5f0feb7e73e

3 months agoRevert "Add hal-backend service & socket to allowed lists." accepted/tizen/unified/20250310.024630
Tomasz Swierczek [Sun, 9 Mar 2025 11:08:36 +0000 (12:08 +0100)]
Revert "Add hal-backend service & socket to allowed lists."

This reverts commit 63aec578fb3ad9f70e3a4f32cba149c830e79cc9.

Hal-backend service is failing continously on quickbuild
& we need to release the latest changes from tizen branch.

Reverted commit will be back after this revert is released.

Change-Id: I1c0d19dba946bf5928896cb614e6f27dbc94cca6

3 months agoFix launchpad-process-pool capabilities on no-smack 34/320734/3
Krzysztof Jackiewicz [Thu, 6 Mar 2025 14:59:11 +0000 (15:59 +0100)]
Fix launchpad-process-pool capabilities on no-smack

Existing configure_wos script was launched in security-config rpm
postinstall. However, during image creation, after rpm installation
according to *.ks file the capabilities are overwritten by
set_capability script making the configure_wos changes ineffective and
leading to security_manager_prepare_app() failure due to insufficient
launchpad-process-pool capabilities:

W/SECURITY_MANAGER_CLIENT( 3483): client-security-manager.cpp: operator()(639) > Process ****doesn't**** have required effective capability!
E/SECURITY_MANAGER_CLIENT( 3483): client-security-manager.cpp: security_manager_pre_check(649) > Lack of required capabilities. Aborting!

This commit aims to set proper capabilities both via security-config
rpm installation and during image build as well as making the
image_test.sh launched during image creation pass. All of this while
keeping most of no-smack related changes in one place.

The capability testing script is currently not able to handle more than
one set of capability flags (e.g. cap_setuid=eip cap_setgid+ei) for
given binary. This can be fixed in future. Launchpad-process-pool needs
cap_setuid=eip but other capabilities have only 'ei' flag. To work
around it, all launchpad-process-pool capabilities have been changed from
'ei' to 'eip'.

The generate_configure_wos script modifies the set_capability script at
build time so the launchpad-process-pool capabilities are set to desired
values during image build and can be compared to expected values by
check_new_capabilities.sh.

The configure_wos script is also launched in rpm postinstall to
facilitate no-smack module development.

Verification:
1. Install security-config rpm
2. Check launchpad-process-pool caps:
   $ getcap /usr/bin/launchpad-process-pool
   /usr/bin/launchpad-process-pool cap_dac_override,cap_setgid,cap_setuid,cap_sys_chroot,cap_sys_admin,cap_sys_nice,cap_mac_admin=eip
3. Restart it to use new capabilities:
   $ su - owner
   $ systemctl --user restart launchpad-process-pool
4. Make sure that an app is properly launched, e.g.:
   $ launch_app attach-panel-gallery
   There should be no logs indicating lack of capabilities from
   SECURITY_MANAGER_CLIENT
5. Run the image test:
   $ /usr/share/security-config/test/image_test.sh
6. Make sure that the capability test result is positive:
   $ cat /opt/share/security-config/result/check_new_capabilities.result
   YES

Change-Id: Id7e79382469fb715fa4443f950dcd24c90320aca

3 months agoFix delimiters in capability test 33/320733/1
Krzysztof Jackiewicz [Thu, 6 Mar 2025 13:31:23 +0000 (14:31 +0100)]
Fix delimiters in capability test

Change-Id: I6677278b08439ae54af84ae4baa0b7e20040c6c4

3 months agoAdd hal-backend service & socket to allowed lists. 17/320417/1 accepted/tizen/unified/20250310.131213 accepted/tizen/unified/x/20250311.125549
Tomasz Swierczek [Fri, 28 Feb 2025 08:36:10 +0000 (09:36 +0100)]
Add hal-backend service & socket to allowed lists.

Change-Id: I3d03e28a8074241656cf35e59d8bb43a96c61d66

3 months agoGet rid of app_access group 31/320231/2
Krzysztof Jackiewicz [Tue, 25 Feb 2025 12:15:03 +0000 (13:15 +0100)]
Get rid of app_access group

Change-Id: I7fe3cd1869a5d8e12b3c53e7d220098295872213

3 months agoAdd esd-badge.socket & esd-shortcut.socket to allowed list 99/320299/1 accepted/tizen/unified/20250304.070205 accepted/tizen/unified/x/20250304.080616
Tomasz Swierczek [Wed, 26 Feb 2025 08:20:37 +0000 (09:20 +0100)]
Add esd-badge.socket & esd-shortcut.socket to allowed list

Change-Id: I7b57154f9115be7835e98f08f81abf294c9d7f9f

3 months agoGive RX access to home and app dir to others 95/319695/6 accepted/tizen/unified/20250221.111443 accepted/tizen/unified/x/20250221.231456
Krzysztof Jackiewicz [Fri, 14 Feb 2025 18:05:53 +0000 (19:05 +0100)]
Give RX access to home and app dir to others

Without it other apps won't be able to access application
subdirectories.

Change-Id: I2d528d8288f4398650fd1e20400023f8c9500e44

4 months agoAdd cap_setuid to launchpad-process-pool in dev_wos mode 71/318871/7 accepted/tizen/unified/20250217.155043 accepted/tizen/unified/x/20250221.042202
Tomasz Swierczek [Wed, 29 Jan 2025 09:32:43 +0000 (10:32 +0100)]
Add cap_setuid to launchpad-process-pool in dev_wos mode

Added outside set_capability script as its a dev_wos-only
modification, so far only for PoC.

Change-Id: I86fe560d2ed5a34455d92577ce846f6dc47738e1

4 months agoAdd app_access and system_access groups + add services to the latter 34/318334/6 accepted/tizen_unified_x_asan accepted/tizen/unified/20250128.152850 accepted/tizen/unified/x/20250212.043846 accepted/tizen/unified/x/asan/20250211.003510
Krzysztof Malysa [Wed, 15 Jan 2025 15:23:06 +0000 (16:23 +0100)]
Add app_access and system_access groups + add services to the latter

Change-Id: I3d41f4df66adee1ffe8088c8668e4d3725375988

5 months agoAdd CAP_SYS_PTRACE capability to amd 71/317171/1 accepted/tizen/unified/20250114.104257 accepted/tizen/unified/x/20250114.211240
Changgyu Choi [Thu, 26 Dec 2024 08:37:45 +0000 (17:37 +0900)]
Add CAP_SYS_PTRACE capability to amd

To debug without killing the blocked app process, amd must have CAP_SYS_PTRACE cap.
amd prints backtrace of an blocked app process.

Change-Id: I3a3ab61444f6dabf57327308efcef1ab1e975af4
Signed-off-by: Changgyu Choi <changyu.choi@samsung.com>
6 months agoRemove smack labeling for /csa 37/316537/1
Dongsun Lee [Fri, 13 Dec 2024 07:13:10 +0000 (16:13 +0900)]
Remove smack labeling for /csa

Change-Id: Ia2b3b36e8c4bdb75a6b98c93ad2af868c691c807

6 months agoChange smack label of smack_pre_labeling to floor(_) 17/316217/1 accepted/tizen/unified/20241216.010825 accepted/tizen/unified/x/20241218.032734 accepted/tizen/unified/x/asan/20241224.004500
Dongsun Lee [Thu, 12 Dec 2024 01:29:35 +0000 (10:29 +0900)]
Change smack label of smack_pre_labeling to floor(_)

Change-Id: Iac3386bb1c116a32d20f66a5e1800f23c56d79c7

7 months agoAdd hal-compatibility-check.service 10/320010/1 accepted/tizen/unified/20241108.105517
Tomasz Swierczek [Wed, 6 Nov 2024 11:31:26 +0000 (12:31 +0100)]
Add hal-compatibility-check.service

Change-Id: I9b03a5c5b4f4e0e559cd51e270663aeabf407c20

7 months agoAdd CAP_FOWNER capability to amd 17/319717/2
Hwankyu Jhun [Wed, 30 Oct 2024 23:27:56 +0000 (08:27 +0900)]
Add CAP_FOWNER capability to amd

To delete temporary files of applications, amd must have CAP_FOWNER cap.
Because, the file permission is "srw- --- ---".

Required by:
- https://review.tizen.org/gerrit/#/c/platform/core/appfw/amd/+/319716/

Change-Id: Iad573eb6e78cbfd1722c863d5d3a535b67fefdd5
Signed-off-by: Hwankyu Jhun <h.jhun@samsung.com>
8 months agoAdd capability for the lux 05/317805/1 accepted/tizen_unified_dev accepted/tizen_unified_toolchain accepted/tizen/9.0/unified/20241030.235052 accepted/tizen/unified/20240920.050212 accepted/tizen/unified/dev/20240924.080620 accepted/tizen/unified/toolchain/20241004.101901 accepted/tizen/unified/x/20240920.102421 accepted/tizen/unified/x/asan/20241014.000242 tizen_9.0_m2_release
Hwankyu Jhun [Thu, 19 Sep 2024 01:46:36 +0000 (10:46 +0900)]
Add capability for the lux

Currently, the launchpad-process-pool has a problem about creating
children processes. Because, there are many threads in the launchpad-process-pool.
If the sub thread tries to allocate the memory or calling getenv() when
the main thread is calling fork(), it makes the deadlock issue of
the children processes. The lux is a children process of
the launchpad-process-pool to create children processes for applications.
(The lux is a single thread process.)

Change-Id: I20d7ce82b77af226bda0e59b8690896245b64580
Signed-off-by: Hwankyu Jhun <h.jhun@samsung.com>
9 months agoAdd esd.service sockets to configuration 83/317683/1
Tomasz Swierczek [Fri, 13 Sep 2024 04:34:02 +0000 (06:34 +0200)]
Add esd.service sockets to configuration

* esd-cion.socket
* esd-group.socket

Change-Id: I762df13213c8c2fd711bd1af0beff0aaf0339d58

9 months agoAdd rscmgr-msgq.service 50/317050/1 accepted/tizen/unified/20240905.010628 accepted/tizen/unified/dev/20240910.111520 accepted/tizen/unified/x/20240905.023721
Tomasz Swierczek [Tue, 3 Sep 2024 07:42:04 +0000 (09:42 +0200)]
Add rscmgr-msgq.service

Service runs as root, but its a one-shot that only
creates systemv message queue for usage in rscmgr-service,
thats running with multimedia_fw user/gid.

Change-Id: If4dcb747e65955a92aef9f1a77f7ecdf4dd2be49

9 months agoChange mscmgr.service from root to multimedia_fw 93/316993/1 accepted/tizen/unified/20240903.110737 accepted/tizen/unified/x/20240904.025247
Tomasz Swierczek [Mon, 2 Sep 2024 08:46:35 +0000 (10:46 +0200)]
Change mscmgr.service from root to multimedia_fw

Change-Id: I1a2c2171531facb17eb5bf7538d72e6dc6dc44fd

9 months agoAdd service lightweight-web-engine-update.service 18/316418/1 accepted/tizen/unified/20240822.181327 accepted/tizen/unified/dev/20240826.221215 accepted/tizen/unified/x/20240823.023307
Tomasz Swierczek [Wed, 21 Aug 2024 06:04:43 +0000 (08:04 +0200)]
Add service lightweight-web-engine-update.service

Change-Id: I8ec1c4a3c75018825f9a9f1e0362013dadd9b338

9 months agoRevert "Run rscmgr-service with System::Run label" 00/316200/1 accepted/tizen/unified/20240819.043930 accepted/tizen/unified/dev/20240821.053448 accepted/tizen/unified/x/20240819.023507
YoungHun Kim [Thu, 15 Aug 2024 23:17:23 +0000 (23:17 +0000)]
Revert "Run rscmgr-service with System::Run label"

This reverts commit b134bbe15284c1145b6ef9a83307827fcc5da7a3.

Change-Id: I2d84af5977eaf397cea4fd59d326be35c544077d

10 months agoRun rscmgr-service with System::Run label 90/316090/1 accepted/tizen/unified/20240814.180336 accepted/tizen/unified/20240815.163627 accepted/tizen/unified/dev/20240819.095612
Dariusz Michaluk [Tue, 13 Aug 2024 11:32:43 +0000 (13:32 +0200)]
Run rscmgr-service with System::Run label

This change should be reverted as it's not secure,
made on special HQ request.

Change-Id: I061b551b70e2f593878aff434bed41059af0d794

10 months agoChange rscmgr-service to root 96/315996/1 accepted/tizen/unified/20240813.181634 accepted/tizen/unified/x/20240814.051358
Dariusz Michaluk [Mon, 12 Aug 2024 08:45:29 +0000 (10:45 +0200)]
Change rscmgr-service to root

Change-Id: Id5d62c3d31dd241c46be4d862f712ee1a7db1bb1

10 months agoAdd rscmgr-service service file 63/315863/1 accepted/tizen/unified/20240809.055157 accepted/tizen/unified/dev/20240812.222948 accepted/tizen/unified/toolchain/20240813.045222 accepted/tizen/unified/x/20240812.041953 accepted/tizen/unified/x/asan/20240813.231650
Dariusz Michaluk [Thu, 8 Aug 2024 07:36:51 +0000 (09:36 +0200)]
Add rscmgr-service service file

Change-Id: I27450ecce1d1f3d5808979164490ed52d13137c1

10 months agoAdd modprobe service file 26/314726/2 accepted/tizen/unified/20240727.112802 accepted/tizen/unified/dev/20240722.073455 accepted/tizen/unified/toolchain/20240812.133235 accepted/tizen/unified/x/20240729.014250
Dariusz Michaluk [Thu, 18 Jul 2024 06:15:31 +0000 (08:15 +0200)]
Add modprobe service file

Change-Id: I21f625689c61894e83f9f083e31f62aba301f174

10 months agoMake test/smack_rule_test/checksmackrule.sh more robust 68/314268/2
Krzysztof Malysa [Tue, 9 Jul 2024 11:16:32 +0000 (13:16 +0200)]
Make test/smack_rule_test/checksmackrule.sh more robust

Change-Id: I88a9c0a756264d1676768b33ea3c3c9236545053

11 months agoDo not check SmackProcessLabel for .service units without [Service] section 61/314361/1 accepted/tizen/unified/20240716.112358 accepted/tizen/unified/20240716.140240 accepted/tizen/unified/dev/20240717.110327 accepted/tizen/unified/x/20240717.012454
Karol Lewandowski [Wed, 10 Jul 2024 18:41:04 +0000 (20:41 +0200)]
Do not check SmackProcessLabel for .service units without [Service] section

Such units are provided by new systemd (>= 255).

We retain old logic and service exceptions for package to work with both new
and old systemd versions.

Change-Id: Ia01365e0ba76053932b61bf3f143e0bcdbddf573

11 months agoAdd a socket for extended key manager API 17/313417/1 accepted/tizen/unified/20240703.100108 accepted/tizen/unified/dev/20240704.065621 accepted/tizen/unified/x/20240704.022925
Filip Skrzeczkowski [Tue, 25 Jun 2024 14:28:52 +0000 (16:28 +0200)]
Add a socket for extended key manager API

Change-Id: I9c7c228290dabb0a8c9d2d13c97e79a2afd8549a

12 months agoRename services due to Online Upgrade 80/311880/1 accepted/tizen/unified/20240611.122500 accepted/tizen/unified/dev/20240620.005643 accepted/tizen/unified/toolchain/20240624.121520 accepted/tizen/unified/x/20240612.025948 accepted/tizen/unified/x/asan/20240625.092557
Mateusz Moscicki [Wed, 29 May 2024 09:33:04 +0000 (11:33 +0200)]
Rename services due to Online Upgrade

Changes to standardize the nomenclature:

    offline-update.service -> system-update.service
    update-post.service -> offline-update-post.service

Change-Id: I212cb7c4387304164020a4c4db84ca582bb5507b

12 months agoChange the smack label for data-checkpoint.service 61/311161/1 accepted/tizen/unified/20240606.161529
Mateusz Moscicki [Wed, 15 May 2024 11:48:38 +0000 (13:48 +0200)]
Change the smack label for data-checkpoint.service

Change-Id: Id3049e744766bab9d5e9353ee583c0129b4fa368

13 months agoConfigure bluetooth service & tools 92/310792/4 accepted/tizen/unified/20240509.124641 accepted/tizen/unified/toolchain/20240513.061315 accepted/tizen/unified/x/20240510.061433
Tomasz Swierczek [Wed, 8 May 2024 07:52:45 +0000 (09:52 +0200)]
Configure bluetooth service & tools

* add bt-core service (as DBus) & its capabilities
* add caps to bluez hcitool tool

Reference ticket: SECSFV-273

Change-Id: Ie6372de7701891bf58e643b0a5d10656555c7709

13 months agoAdd webauthn service & socket 78/310378/1 accepted/tizen/unified/20240430.020642 accepted/tizen/unified/toolchain/20240507.011842 accepted/tizen/unified/x/20240430.094820 accepted/tizen/unified/x/20240508.055416
Tomasz Swierczek [Fri, 26 Apr 2024 08:59:29 +0000 (10:59 +0200)]
Add webauthn service & socket

Change-Id: Idb5c9bd8afa6ffa2b51b25eb5e0ebda7805a6115

13 months agoAdd online-update service files 95/309695/1 accepted/tizen/unified/toolchain/20240508.012342 accepted/tizen/unified/x/20240507.051012
Mateusz Moscicki [Mon, 15 Apr 2024 11:41:16 +0000 (13:41 +0200)]
Add online-update service files

Change-Id: Ie1e73111f120d65cc6becf68ffdd0ea7203a8d8c

14 months agoAdd cap_dac_override to isud binary 10/309510/1 accepted/tizen/unified/20240423.164547 accepted/tizen/unified/x/20240425.051128
Adam Michalski [Thu, 11 Apr 2024 13:49:58 +0000 (15:49 +0200)]
Add cap_dac_override to isud binary

- This is needed by the isud to perform clean-up of the unnecessary
  files from globalapps path which is owned by tizenglobalapp:root
  but the isud service is run with the system:system user and group.

Reference ticket: SECSFV-271

Change-Id: Ib4b57bf44891dc902fa18d2c555c0e91adad93c9

14 months agoAdd package-manager systemd socket accepted/tizen/unified/20240403.095042 accepted/tizen/unified/20240404.021411 accepted/tizen/unified/x/20240404.062006
Tomasz Swierczek [Tue, 2 Apr 2024 06:02:46 +0000 (08:02 +0200)]
Add package-manager systemd socket

SECSFV-270

Change-Id: I3d46bdaf34c784201b042d2f126044d24b65638b

15 months agoAdd org.tizen.machinelearning.service.service 20/307920/1 accepted/tizen/unified/20240319.020740 accepted/tizen/unified/x/20240320.055311
gichan2-jang [Thu, 14 Mar 2024 07:48:43 +0000 (16:48 +0900)]
Add org.tizen.machinelearning.service.service

Add org.tizen.machinelearning.service.service to dbus_service.list

Change-Id: If116ad569a49c99bee21948fee7d7d92c2c6d69d
Signed-off-by: gichan2-jang <gichan2.jang@samsung.com>
15 months agoUpdate the service name in systemd_service.csv 90/307690/1
Sangjung Woo [Tue, 12 Mar 2024 08:22:05 +0000 (17:22 +0900)]
Update the service name in systemd_service.csv

The existing 'machine-learning-agent' is renamed to 'mlops-agent' since
new functionality is added to the daemon. Because of this reason,
systemd service file should be updated as 'mlops-agent.service' too.

Change-Id: I4ad0b31ebab11201f00a6f9a9ba8efbc9eec52b9
Signed-off-by: Sangjung Woo <sangjung.woo@samsung.com>
17 months agoUpdate path check exception list 44/303944/1 accepted/tizen_unified_riscv accepted/tizen/unified/20240109.155342 accepted/tizen/unified/riscv/20240110.014513
Jeongmo Yang [Mon, 8 Jan 2024 08:41:32 +0000 (17:41 +0900)]
Update path check exception list

- "/etc/profile.d/mmf.sh" is added.
- It's used for setting environment value of platform bash login, not executed by the user.

Change-Id: I0095b8fb44406ab782cacb35264946145bfe5c27
Signed-off-by: Jeongmo Yang <jm80.yang@samsung.com>
18 months agoFixed isud.service added previously accepted/tizen/8.0/unified/20231214.164513 accepted/tizen/unified/20231214.164950 accepted/tizen/unified/riscv/20231226.211509
Tomasz Swierczek [Wed, 13 Dec 2023 11:35:44 +0000 (12:35 +0100)]
Fixed isud.service added previously

The request SECSFV-268 mixed systemd service file with DBus one.

Change-Id: Ifa2e964321aa7169ac09768fdb103b0c0b72fe92

18 months agoAdd isud.service accepted/tizen/unified/20231213.162126
Tomasz Swierczek [Tue, 12 Dec 2023 11:28:59 +0000 (12:28 +0100)]
Add isud.service

- DBus service - short-lived, on-demand activated service.
- SECSFV-268

Change-Id: I81234aef8c722c0b731a7075d14bcb779573e711

21 months agoAdd cap_sys_resource to /usr/bin/pass 32/298632/1 accepted/tizen/8.0/unified/20231005.093703 accepted/tizen/unified/20230912.171635 tizen_8.0_m2_release
Yunjin Lee [Tue, 12 Sep 2023 02:25:01 +0000 (11:25 +0900)]
Add cap_sys_resource to /usr/bin/pass

- Add cap_sys_resource to /usr/bin/pass
- SECSFV-267

Change-Id: I211b2d2889bb222a65d8c063f107bf91e025b006
Signed-off-by: Yunjin Lee <yunjin-.lee@samsung.com>
21 months agoAdd /usr/bin/crash-manager to list of exceptions for exec label check 66/297766/2 accepted/tizen/unified/20230830.170538
Tomasz Swierczek [Thu, 24 Aug 2023 04:55:47 +0000 (06:55 +0200)]
Add /usr/bin/crash-manager to list of exceptions for exec label check

Its owned and can be launched by root only, so its not really
world-readable/executable, despite having _ Smack label.

The fact it has _ access Smack label (&System::Privileged exec label)
is consequence of upstream kernel change - other Smack access
label makes the kernel not able to launch it on coredump.

Change-Id: I6af9a5e90edad3c371de9d7ea43bcd5e44db7088

23 months agoCheck services in ISU directories 99/292199/3
Mateusz Moscicki [Thu, 27 Apr 2023 11:14:41 +0000 (13:14 +0200)]
Check services in ISU directories

This patch adds verification of service files provided under the ISU
(Individual Service Upgrade) mechanism.

Change-Id: I86afe2cc5c99169c79976298498377a51b3182d6

2 years agoRemove utils after running image test 80/292680/1 accepted/tizen/unified/20230512.084101
Yunjin Lee [Thu, 11 May 2023 07:59:50 +0000 (16:59 +0900)]
Remove utils after running image test

Change-Id: I05ba8c67011e527a2224d2ae5f00f0421c0b24a3
Signed-off-by: Yunjin Lee <yunjin-.lee@samsung.com>
2 years agoChange the binary readelf for riscv64 62/292662/1
wchang kim [Thu, 11 May 2023 04:27:13 +0000 (13:27 +0900)]
Change the binary readelf for riscv64

Change-Id: Ibbdf42315cbeffbd858d706d52ef14ef0fbd4a11

2 years agoMerge "Add RISC-V test utils" into tizen
Kim Kidong [Mon, 17 Apr 2023 00:26:22 +0000 (00:26 +0000)]
Merge "Add RISC-V test utils" into tizen

2 years agoDisable askuser in all profile 19/287119/1 accepted/tizen/unified/20230406.165750
Yunjin Lee [Fri, 20 Jan 2023 04:19:36 +0000 (13:19 +0900)]
Disable askuser in all profile

Change-Id: Id289e61b2cfb957261a6d90edb77c2a00372c94e
Signed-off-by: Yunjin Lee <yunjin-.lee@samsung.com>
2 years agoAdd RISC-V test utils 57/284557/1
Marek Pikuła [Mon, 17 Oct 2022 21:17:16 +0000 (23:17 +0200)]
Add RISC-V test utils

Change-Id: I6a5f1302dc4bf017a2b094d4c5095be6f0e18fea
Signed-off-by: Łukasz Stelmach <l.stelmach@samsung.com>
2 years agoDo not check profile info while running systemd unit test. 24/283024/1 accepted/tizen/unified/20221102.020603
Jin-gyu Kim [Mon, 17 Oct 2022 02:20:25 +0000 (11:20 +0900)]
Do not check profile info while running systemd unit test.

- If invalid systemd units exists, move those in every profile.

Change-Id: Ie4bc762f0d6e57fba0af41240b876300f1d04b5a

2 years agoFix a wrong service name. 06/282906/1 accepted/tizen_7.0_unified_hotfix tizen_7.0_hotfix accepted/tizen/7.0/unified/20221110.062725 accepted/tizen/7.0/unified/hotfix/20221116.105631 accepted/tizen/unified/20221014.074150 tizen_7.0_m2_release
Jin-gyu Kim [Thu, 13 Oct 2022 07:27:31 +0000 (16:27 +0900)]
Fix a wrong service name.

- scmirroring.service -> scmirroring.server.service

Change-Id: I2518e4f49461ee117b8e0c47fef4c96a09f3c562

2 years agoAdd pass-resource-monitor.socket 85/281285/1 accepted/tizen/unified/20220919.012632
Jin-gyu Kim [Thu, 15 Sep 2022 07:04:58 +0000 (16:04 +0900)]
Add pass-resource-monitor.socket

Change-Id: Ie2d513796fe8422052322275137c19349ffdc88e

2 years agoAdd machine-learning-agent.service 36/279836/2 accepted/tizen/unified/20220819.122457 submit/tizen/20220818.081536
Jin-gyu Kim [Thu, 18 Aug 2022 08:00:25 +0000 (17:00 +0900)]
Add machine-learning-agent.service

Change-Id: I3525c8d4996d56da5c699637068c33167367c4a9

2 years agoCheck static linked binaries rather than including those in the list. 76/279376/5
Jin-gyu Kim [Mon, 8 Aug 2022 06:45:49 +0000 (15:45 +0900)]
Check static linked binaries rather than including those in the list.

- Before : Specify static linked binaries in the exception list.
- With this : Check whether binaries are staic linked.
              If so, do not check ASLR.
- Do not check "dll" and if the name is started with "qemu".
- Do not see "onlycap" file while testing, as it is not needed.
- Leave the list as an empty for the future use or security-analyzer.

Change-Id: I26dc7044a62e49c0b07ca532900732aa429e5d0e

2 years agoUse csv format for lists of systemd unit tests. 53/278853/1 accepted/tizen/unified/20220729.131711 submit/tizen/20220727.081746 submit/tizen/20220728.083909
Jin-gyu Kim [Wed, 27 Jul 2022 03:16:07 +0000 (12:16 +0900)]
Use csv format for lists of systemd unit tests.

- Use unified csv files for maintaining systemd unit tests.
- create_list.sh creates lists per profiles.
- Even after this is applied, the target has the same list as before.

Change-Id: I88b76f92e33f167b772a06a5a5d6ed97e1a1bc52

2 years agoChange SmackProcessLabel of user@.service & add resourced.socket 70/278570/1 accepted/tizen/unified/20220726.012238 submit/tizen/20220721.112425 submit/tizen/20220725.022745
Jin-gyu Kim [Fri, 22 Jul 2022 05:42:38 +0000 (14:42 +0900)]
Change SmackProcessLabel of user@.service & add resourced.socket

Change-Id: Ic36eb7278d300282231bbb70d3fa037e5a4b55ec

2 years agoRead link before setting capability to /usr/sbin/insmod 05/278305/2 accepted/tizen/unified/20220722.131751 submit/tizen/20220719.031510
Jin-gyu Kim [Tue, 19 Jul 2022 02:04:37 +0000 (11:04 +0900)]
Read link before setting capability to /usr/sbin/insmod

Consideration : It would be better to read link for every cases.

Change-Id: I96ad4fc378200f54ae9e6fd6bf92e925eda2d4cf

3 years agoAdd cap_sys_ptrace to /usr/bin/pass 43/276343/1 accepted/tizen/unified/20220629.152839 submit/tizen/20220616.073240 submit/tizen/20220628.083839
Jin-gyu Kim [Wed, 15 Jun 2022 04:45:00 +0000 (13:45 +0900)]
Add cap_sys_ptrace to /usr/bin/pass

Change-Id: I48e8f16f4159021c4209a44e7bb13507db1797bf

3 years agoChange Smack Process Label of pkg-db-recovery & package-recovery services 89/275689/1 accepted/tizen/unified/20220608.140055 submit/tizen/20220531.074151
Jin-gyu Kim [Mon, 30 May 2022 07:52:57 +0000 (16:52 +0900)]
Change Smack Process Label of pkg-db-recovery & package-recovery services

- To use cap_mac_override used by installer cmd (ex : tpk-backend),
  System::Privileged is required for these services.

Change-Id: I8d7bff03e50e6110da3b5e940d11f219325efd01

3 years agoChanges the service name 31/275531/2
Jin-gyu Kim [Thu, 26 May 2022 05:09:11 +0000 (14:09 +0900)]
Changes the service name
- tizen-recovery.service -> recovery.service

Change-Id: I682c117c43cd3b13fe800fc6b3b69d63c87788e5

3 years agoGive cap_mac_override to package-manager.service 64/275464/1 accepted/tizen/unified/20220528.144435 submit/tizen/20220526.031554
Jin-gyu Kim [Wed, 25 May 2022 07:46:41 +0000 (16:46 +0900)]
Give cap_mac_override to package-manager.service

- To abort app direcories creation & deletion, it needs cap_mac_override permission.
  Because SMACK rules between "System" and "User::Pkg::..." are removed at this time.

Change-Id: Ief2e8d08e22f6738336dfec473de9920823f2df5

3 years agoAdd update-manager.service 83/275383/1
Jin-gyu Kim [Tue, 24 May 2022 03:48:05 +0000 (12:48 +0900)]
Add update-manager.service

Change-Id: I0b37c75e8d872d8cd5e64dd0de5fb1dd1dbe7a9a

3 years agoAdd tizen-recovery.service, clone_partitions_recovery.service and 40/275340/1
Jin-gyu Kim [Mon, 23 May 2022 20:28:31 +0000 (05:28 +0900)]
Add tizen-recovery.service, clone_partitions_recovery.service and
recovery-reboot.service

Change-Id: I321a883144a73358b85ca96b992c92ef089269d1

3 years agoAdd cap_sys_nice to pkginfo-server. 88/274488/1 accepted/tizen/unified/20220501.223714 submit/tizen/20220429.050615
Jin-gyu Kim [Fri, 29 Apr 2022 04:58:42 +0000 (13:58 +0900)]
Add cap_sys_nice to pkginfo-server.

Change-Id: I56e3ef8f15b1cda612f2048cf1a4f2a6af3817f9

3 years agoAdd clone_partitions.service 08/274308/1 accepted/tizen/unified/20220427.140139 submit/tizen/20220426.103748
Jin-gyu Kim [Tue, 26 Apr 2022 05:45:55 +0000 (14:45 +0900)]
Add clone_partitions.service

Change-Id: I2b4da639a5d153887c66566d573a13e25f23a823

3 years agoChange SmackProcessLabel of booting-done.service 33/274233/1 submit/tizen/20220425.073332 submit/tizen/20220426.010256
JinGyu Kim [Tue, 26 Apr 2022 00:18:18 +0000 (09:18 +0900)]
Change SmackProcessLabel of booting-done.service

Change from System::Privileged to System

Change-Id: I5a699fa6edc439da1b301abbecc01fe2560758c1

3 years agoChange permissions of booting-done.service 60/273960/1 submit/tizen/20220421.021204
Jin-gyu Kim [Tue, 19 Apr 2022 23:05:36 +0000 (08:05 +0900)]
Change permissions of booting-done.service

- Need root and System::Privileged permissions
- Check booting status and do recovery operaitions

Change-Id: Ie7f40824ece83745d4e93f7a08874ce0e5c57625

3 years agoAdd sessiond.service 85/273585/2 accepted/tizen/unified/20220412.100309 submit/tizen/20220409.014712
Jin-gyu Kim [Fri, 8 Apr 2022 22:34:46 +0000 (07:34 +0900)]
Add sessiond.service

- Root and System::Privileged permissions are required.
- It creates directories and sets SMACK attributes as like gumd.

Change-Id: Ia2fe49ce65c613bde9c09ffdb75ab71a7d109edc

3 years agoAdd cap_net_admin to /usr/bin/pass 89/271589/1 accepted/tizen/unified/20220302.131922 submit/tizen/20220224.015932
Jin-gyu Kim [Thu, 24 Feb 2022 01:37:59 +0000 (10:37 +0900)]
Add cap_net_admin to /usr/bin/pass

- Requested by SECSFV-229
- cap_net_admin is required to use netlink interface

Change-Id: I524b7ce4a22a02d9d7213303a07758dde4b54445

3 years agoAdd cap_sys_chroot to launchpad-process-pool 24/270524/1 accepted/tizen/unified/20220208.112103 submit/tizen/20220207.065417
Jin-gyu Kim [Fri, 4 Feb 2022 23:47:09 +0000 (08:47 +0900)]
Add cap_sys_chroot to launchpad-process-pool

- It is needed to support "Debug Attach" used by gdbserver.

Change-Id: I1ec73238bd3b2294b6a3b1600e1460921c047a43

3 years agoSecurity upgrade: always set dummy_file mode/label 15/269515/1 submit/tizen/20220119.054430
Konrad Lipinski [Mon, 17 Jan 2022 13:22:41 +0000 (14:22 +0100)]
Security upgrade: always set dummy_file mode/label

Prior to this commit, the script only changed the mode/label if the file
has not existed before. If the script ever managed to touch the file and
then got killed, the file's mode/label would never get properly adjusted
when running the script again.

Change-Id: I707870eea9abb63ccf10e8c54fb3ca984e92196a

3 years agoUse double brackets for checking path exception list. 55/269055/1 accepted/tizen/unified/20220111.123041 submit/tizen/20220110.203715
Jin-gyu Kim [Fri, 7 Jan 2022 23:06:34 +0000 (08:06 +0900)]
Use double brackets for checking path exception list.

- This is needed to avoid the error raised by some exceptional cases.

Change-Id: I833fee25bb563093812ddf1b3492591e9f92f11a

3 years agoAdd telephony-dongle service. 39/268939/1 accepted/tizen/unified/20220107.120853 submit/tizen/20220106.013141
Jin-gyu Kim [Wed, 5 Jan 2022 22:14:37 +0000 (07:14 +0900)]
Add telephony-dongle service.

- Requested by SECSFV-207
- Give cap_sys_module capability with "ei" option to /usr/sbin/insmod

Change-Id: I704059ae5d9d0062e4217f252acda324e6818411

3 years agoAdd display-manager-ready.service 74/268874/2 accepted/tizen/unified/20220105.120755 submit/tizen/20220105.002009
Jin-gyu Kim [Tue, 4 Jan 2022 23:49:03 +0000 (08:49 +0900)]
Add display-manager-ready.service

- display-manager-ready service is used for iot headless profile.
- There is no list difference between headed and headless. (Added to iot list)

Change-Id: I2cc6ff7ff09f0d7af85c541ec16d1260ffadfef1

3 years agoAdd update-post.service & update-finalize.service 73/267173/1 accepted/tizen/unified/20211130.125525 submit/tizen/20211129.232451
Jin-gyu Kim [Mon, 29 Nov 2021 22:04:14 +0000 (07:04 +0900)]
Add update-post.service & update-finalize.service

- Requested by SECSFV-204
- Root privilege is required as those are used during the system upgrade process.

Change-Id: I8d46de7787bcf61ec15c6fc2bf9922d0a2d14743

3 years agoWhen running smack rule test, all apps need to be executed twice. 78/267078/2 accepted/tizen/unified/20211129.035309 submit/tizen/20211126.233820
Jin-gyu Kim [Thu, 25 Nov 2021 22:59:18 +0000 (07:59 +0900)]
When running smack rule test, all apps need to be executed twice.

- Some applications may have dependencies on other apps,
  so double execution is required at first.

Change-Id: I0b345f2348d8bec0fda6a7256aa153d098ca3f89

3 years agoRemove unused file 30/266530/1
Yunjin Lee [Mon, 15 Nov 2021 03:43:35 +0000 (12:43 +0900)]
Remove unused file

Change-Id: I74649d8f3e016893be24d66eec78b4fddc057d87

3 years agoAdd dbus-daemon-launch-helper as setuid exception for 64 38/264938/2 accepted/tizen/unified/20211029.132541 submit/tizen/20211006.013535 submit/tizen/20211028.030415
Yunjin Lee [Wed, 6 Oct 2021 01:28:43 +0000 (10:28 +0900)]
Add dbus-daemon-launch-helper as setuid exception for 64

Change-Id: I4aedd20b914e71b67e7860faf8bb7f850aa11511
Signed-off-by: Yunjin Lee <yunjin-.lee@samsung.com>
3 years agoSet cap_dac_override to pkginfo-server 90/263690/1 accepted/tizen/6.5/unified/20211028.123248 accepted/tizen/unified/20210909.002357 submit/tizen/20210908.083351 submit/tizen/20210908.083551 submit/tizen_6.5/20211028.162401 tizen_6.5.m2_release
Jin-gyu Kim [Thu, 9 Sep 2021 01:09:56 +0000 (10:09 +0900)]
Set cap_dac_override to pkginfo-server

cap_dac_override : To write data on user database

Change-Id: I263ec0908df67a7ec67b873012c0821399aab084

3 years agoAdd nsjail.service 26/263526/1 accepted/tizen/unified/20210907.015400 submit/tizen/20210906.040311
Yunjin Lee [Mon, 6 Sep 2021 03:52:03 +0000 (12:52 +0900)]
Add nsjail.service

- Requested by SECSFV-203

Change-Id: I3adebd83ed0791217bb880000e0e145958f14a37
Signed-off-by: Yunjin Lee <yunjin-.lee@samsung.com>
3 years agoRemove an unnecessary capability. 68/263468/2
Jin-gyu Kim [Fri, 3 Sep 2021 23:08:00 +0000 (08:08 +0900)]
Remove an unnecessary capability.

- cap_fowner is not needed for pkgmgr-server.

Change-Id: I605f138f51a1e0bb68f524697d7e72ef8b9d70fb

3 years agoAdd capabilities for res-copy 71/263371/3 accepted/tizen/unified/20210903.083035 submit/tizen/20210902.020354
Yunjin Lee [Wed, 1 Sep 2021 08:59:30 +0000 (17:59 +0900)]
Add capabilities for res-copy

- cap_chown,cap_dac_override,cap_fowner is required to changed
  copied resources ownership(root:priv_platform). pkgmgr-server
  fork execs it hence give cap_fowner to pkgmgr-server and give
  ie for those caps to res-copy.

Change-Id: I951d5bfe4b17a66f871ec60ff935da8670850d18
Signed-off-by: Yunjin Lee <yunjin-.lee@samsung.com>
3 years agoAdd hal-rpmdb-checker.service 56/263056/1 accepted/tizen/unified/20210830.103947 submit/tizen/20210826.015715 submit/tizen/20210827.231742
Jin-gyu Kim [Thu, 26 Aug 2021 01:23:49 +0000 (10:23 +0900)]
Add hal-rpmdb-checker.service

Requested by SECSFV-202

Change-Id: I33753ba9ad15b387c473dae0600099b4cf13e6ae

3 years agoAdd priv_platform group. 87/262987/1
Jin-gyu Kim [Wed, 25 Aug 2021 02:16:24 +0000 (11:16 +0900)]
Add priv_platform group.

- Mapped with http://tizen.org/privilege/internal/default/platform

Change-Id: I614421b9e13cc65bf6800f011b2f84dadbc935b7

3 years agoAdd data-checkpoint.service & udev-trigger-dmbow@.service. 52/262252/6 accepted/tizen/unified/20210810.135340 submit/tizen/20210809.195630
Jin-gyu Kim [Fri, 6 Aug 2021 00:49:12 +0000 (09:49 +0900)]
Add data-checkpoint.service & udev-trigger-dmbow@.service.

- Requested by SECSFV-201

Change-Id: I33bf75444ba1e677fc3956429a32140c4a091848

3 years agoMerge "Add priv_peripheralio group id" into tizen accepted/tizen/unified/20210624.131813 submit/tizen/20210624.042100
Jin-gyu Kim [Wed, 23 Jun 2021 10:19:27 +0000 (10:19 +0000)]
Merge "Add priv_peripheralio group id" into tizen

3 years agoAdd aslr exception lists. 41/260241/2 submit/tizen/20210623.223540
Jin-gyu Kim [Wed, 23 Jun 2021 04:06:25 +0000 (13:06 +0900)]
Add aslr exception lists.

- Some executables are included in packages not being compiled.
- In these cases, applying PIE option is not available.

Change-Id: I20b2da508ad01a9beeb0c497ed1086533da460ea

3 years agoAdd priv_peripheralio group id 28/260228/2
Jin-gyu Kim [Wed, 23 Jun 2021 01:48:03 +0000 (10:48 +0900)]
Add priv_peripheralio group id

- This will be mapped to http://tizen.org/privilege/peripheralio

Change-Id: I32130ffaf18b0034b0d4870afe9aa3c3f8fdef16

4 years agoCheck the existence of ipv6host before trying to write. 71/259671/1 accepted/tizen/unified/20210611.013615 submit/tizen/20210611.191252
Jin-gyu Kim [Fri, 11 Jun 2021 19:08:25 +0000 (04:08 +0900)]
Check the existence of ipv6host before trying to write.

Change-Id: Ie79e77df84c7ee8ae5332d3ab59aaa898ccc5ce0

4 years agosmack: add ip(10.0.2.15) to allow gdb remote debugging 43/259243/2 accepted/tizen/unified/20210608.130914 submit/tizen/20210604.073048 submit/tizen/20210607.102409
Dongkyun Son [Thu, 3 Jun 2021 02:54:19 +0000 (11:54 +0900)]
smack: add ip(10.0.2.15) to allow gdb remote debugging

To fix smack denial:
audit: type=1400 audit(1622180305.290:90): lsm=SMACK fn=smack_inet_conn_request action=denied subject="System::Privilege::Internet" object="User::Pkg::org.example.basicui4" requested=w pid=2315 comm="sdbd" saddr=10.0.2.15 src=39898 daddr=10.0.2.15 dest=26112 netif=lo

Change-Id: Id6ee685555d68df90ec226847e7d2c87c502333d
Signed-off-by: Dongkyun Son <dongkyun.s@samsung.com>
4 years agoMerge "Add IPv6 configuration for internet privilege" into tizen submit/tizen/20210602.093717
Tomasz Swierczek [Wed, 2 Jun 2021 09:30:30 +0000 (09:30 +0000)]
Merge "Add IPv6 configuration for internet privilege" into tizen

4 years agoAdd deviced-request-shutdown@.service 07/259007/2 accepted/tizen/unified/20210601.135336 submit/tizen/20210531.203739
Jin-gyu Kim [Mon, 31 May 2021 19:50:33 +0000 (04:50 +0900)]
Add deviced-request-shutdown@.service

- Requested by SECSFV-200

Change-Id: I9487efef589b4987aae50559838df21f0a9bae8c

4 years agoAdd IPv6 configuration for internet privilege 86/258686/1
Tomasz Swierczek [Mon, 24 May 2021 07:54:36 +0000 (09:54 +0200)]
Add IPv6 configuration for internet privilege

Change-Id: I12b260cecb8352dc7dc9f943f2824d4639da8028

4 years agoAdd audio-aec.service to all profiles. 96/257896/2 accepted/tizen/unified/20210507.010004 submit/tizen/20210506.063914
Jin-gyu Kim [Thu, 6 May 2021 05:56:37 +0000 (14:56 +0900)]
Add audio-aec.service to all profiles.

Requested by SECSFV-199

Change-Id: Ic040a99d69d2f670e152bc52313cab0476ddd0ca

4 years agoAdd missing SMACK labelling cmd in change_permission. 12/257812/4 submit/tizen/20210503.084402
Jin-gyu Kim [Mon, 3 May 2021 08:13:19 +0000 (17:13 +0900)]
Add missing SMACK labelling cmd in change_permission.

This does not affect any operation, but need to reset SMACK label
for any mismatch in SMACK label.

Change-Id: I0d6053c341d4070d25b7a0839ef439a4972ed424