platform/core/security/security-config.git
10 months agoFix previously added isud.service accepted/tizen_6.0_unified tizen_6.0 accepted/tizen/6.0/unified/20231215.094401
Tomasz Swierczek [Wed, 13 Dec 2023 12:24:31 +0000 (13:24 +0100)]
Fix previously added isud.service

The request SECSFV-268 mixed systemd service file with DBus one.

Change-Id: Iedc6acf73b8307973c5415feca549b56df32c35f

10 months agoAdd isud.service
Tomasz Swierczek [Tue, 12 Dec 2023 11:50:15 +0000 (12:50 +0100)]
Add isud.service

- DBus service - short-lived, on-demand activated service.
- SECSFV-268

Change-Id: I559ceb73ff706d5ebc026dd0e1dc105a180b3575

15 months agoCheck services in ISU directories 44/295544/1
Mateusz Moscicki [Thu, 27 Apr 2023 11:14:41 +0000 (13:14 +0200)]
Check services in ISU directories

This patch adds verification of service files provided under the ISU
(Individual Service Upgrade) mechanism.

Change-Id: I86afe2cc5c99169c79976298498377a51b3182d6

2 years agoAdd missing systemd service lists. 88/283188/1 accepted/tizen/6.0/unified/20221021.125144 submit/tizen_6.0/20221020.044533
Jin-gyu Kim [Mon, 17 Oct 2022 06:26:39 +0000 (15:26 +0900)]
Add missing systemd service lists.

Change-Id: I09237ecdd414d8463b7f82b1ef477a97cb5260cb

2 years agoDo not check profile info while running systemd unit test. 27/283027/1
Jin-gyu Kim [Mon, 17 Oct 2022 02:20:25 +0000 (11:20 +0900)]
Do not check profile info while running systemd unit test.

- If invalid systemd units exists, move those in every profile.

Change-Id: Ie4bc762f0d6e57fba0af41240b876300f1d04b5a

2 years agoAdd priv_platform group. 62/267562/1 accepted/tizen/6.0/unified/20211208.121643 submit/tizen_6.0/20211207.191536
Jin-gyu Kim [Wed, 25 Aug 2021 02:16:24 +0000 (11:16 +0900)]
Add priv_platform group.

- Mapped with http://tizen.org/privilege/internal/default/platform

Change-Id: I614421b9e13cc65bf6800f011b2f84dadbc935b7

3 years agoRemove an unnecessary capability. 89/263789/1 accepted/tizen/6.0/unified/20210913.102320 submit/tizen_6.0/20210910.052738
Jin-gyu Kim [Fri, 3 Sep 2021 23:08:00 +0000 (08:08 +0900)]
Remove an unnecessary capability.

- cap_fowner is not needed for pkgmgr-server.

Change-Id: I605f138f51a1e0bb68f524697d7e72ef8b9d70fb

3 years agoAdd capabilities for res-copy 88/263788/1
Yunjin Lee [Wed, 1 Sep 2021 08:59:30 +0000 (17:59 +0900)]
Add capabilities for res-copy

- cap_chown,cap_dac_override,cap_fowner is required to changed
  copied resources ownership(root:priv_platform). pkgmgr-server
  fork execs it hence give cap_fowner to pkgmgr-server and give
  ie for those caps to res-copy.

Change-Id: I951d5bfe4b17a66f871ec60ff935da8670850d18
Signed-off-by: Yunjin Lee <yunjin-.lee@samsung.com>
3 years agoAdd deviced-request-shutdown@.service 08/259008/1 accepted/tizen/6.0/unified/20210601.135418 submit/tizen_6.0/20210531.035723 submit/tizen_6.0/20210531.203729
Jin-gyu Kim [Mon, 31 May 2021 19:50:33 +0000 (04:50 +0900)]
Add deviced-request-shutdown@.service

- Requested by SECSFV-200

Change-Id: I9487efef589b4987aae50559838df21f0a9bae8c

3 years agoAdd missing SMACK labelling cmd in change_permission. 15/257815/1 accepted/tizen/6.0/unified/20210504.115215 submit/tizen_6.0/20210503.084411
Jin-gyu Kim [Mon, 3 May 2021 08:13:19 +0000 (17:13 +0900)]
Add missing SMACK labelling cmd in change_permission.

This does not affect any operation, but need to reset SMACK label
for any mismatch in SMACK label.

Change-Id: I0d6053c341d4070d25b7a0839ef439a4972ed424

3 years agoDo not use rpm command in set_capability 14/257814/1
Jin-gyu Kim [Mon, 3 May 2021 05:34:25 +0000 (14:34 +0900)]
Do not use rpm command in set_capability

"rpm" command cannot be existed in some cases.
Instead of using it, check a specific file path to determine a certain
rpm is installed or not.

Change-Id: I6f5fda1cd35cac3bc039c5b4e008b28eafdeb1c1

3 years agoCreate a new script for setting permissions. 64/257364/3 accepted/tizen/6.0/unified/20210427.155130 submit/tizen_6.0/20210423.071547 submit/tizen_6.0/20210426.005308
Jin-gyu Kim [Fri, 23 Apr 2021 05:31:51 +0000 (14:31 +0900)]
Create a new script for setting permissions.

This script needs to be run while image is being created or updated.
(After in-house applications are installed.)
We could consider it to be run in security-config service, but it will
increase the 1st boot time.

Change-Id: I5a11dd720ea46ae69b1acc6be09305c74fb39292

3 years agoGive cap_mac_admin to wrt-service 71/251571/1 accepted/tizen/6.0/unified/20210118.072718 submit/tizen_6.0/20210115.062230
jin-gyu.kim [Fri, 15 Jan 2021 03:55:27 +0000 (12:55 +0900)]
Give cap_mac_admin to wrt-service

- "eip" option is applied, but restricted to use by only chromium-efl app.

Change-Id: I025a3c34c84179d4986c25216288a088c555c4bf

3 years agoGive cap_kill to sdbd & sdbd-service. 98/249398/1 accepted/tizen/6.0/unified/20201215.112448 submit/tizen_6.0/20201211.061259 submit/tizen_6.0/20201214.010123
jin-gyu.kim [Fri, 11 Dec 2020 06:00:35 +0000 (15:00 +0900)]
Give cap_kill to sdbd & sdbd-service.

Change-Id: I68ec6f1d95857f797d582eabde9581165e944ce2

3 years agoAdd FOTA script to apply privilege mapping changes 55/246755/1 accepted/tizen/6.0/unified/20201109.024721 submit/tizen_6.0/20201105.054021
Yunjin Lee [Wed, 21 Oct 2020 10:22:32 +0000 (19:22 +0900)]
Add FOTA script to apply privilege mapping changes

4.0
- native systemsettings.admin -> core systemsettings.admin
- web filesystem.read -> core systemsettings.admin
- web filesystem.write -> core systemsettings.admin
- web setting -> core systemsettings.admin
- web networkbearerselection -> core network.set

5.5
- native systemsettings.admin -> core systemsettings.admin,
                                      internal/buxton/systemsettings
- web filesystem.read -> core filesystem.read
- web filesystem.write -> core filesystem.write
- web setting -> core internal/buxton/systemsettings

6.0
- web networkbearerselection -> core network.set,
                                     netowrk.route

Change-Id: I5f69666cb3774fd2bba2c175e3df327b15d1f3ed
Signed-off-by: Yunjin Lee <yunjin-.lee@samsung.com>
3 years agoAdd emergency-target-holder.service 78/246678/1 accepted/tizen/6.0/unified/20201109.024705 submit/tizen_6.0/20201103.055512
jin-gyu.kim [Tue, 27 Oct 2020 01:29:48 +0000 (10:29 +0900)]
Add emergency-target-holder.service

Change-Id: I8cad5e7059a7831bfd1a72aea7734d71c5dae1ef

4 years agoFix typo in netlabel_config. 93/245793/1 accepted/tizen_6.0_unified_hotfix tizen_6.0_hotfix accepted/tizen/6.0/unified/20201030.114917 accepted/tizen/6.0/unified/hotfix/20201103.004337 accepted/tizen/unified/20201016.015203 submit/tizen/20201016.010710 submit/tizen_6.0/20201029.205104 submit/tizen_6.0_hotfix/20201102.192504 submit/tizen_6.0_hotfix/20201103.114804 tizen_6.0.m2_release
jin-gyu.kim [Fri, 16 Oct 2020 00:49:08 +0000 (09:49 +0900)]
Fix typo in netlabel_config.

Change-Id: I1ea188fd6765520dd99c4b025b0c322420c10a94

4 years agoUpdate path check exception list 44/245244/1 accepted/tizen/unified/20201013.023225 submit/tizen/20201006.034802
Yunjin Lee [Tue, 6 Oct 2020 01:50:29 +0000 (10:50 +0900)]
Update path check exception list

- Add followings:
    /usr/share/icu/65.1/install-sh
    /usr/share/icu/65.1/mkinstalldirs

Change-Id: I73c3fcaf9bb89d20fb3edfa78f6f19e2132dc5b8
Signed-off-by: Yunjin Lee <yunjin-.lee@samsung.com>
4 years agoUpdate path check exception list 78/245178/1 accepted/tizen/unified/20201005.101359 submit/tizen/20201005.072135
Yunjin Lee [Mon, 5 Oct 2020 06:21:56 +0000 (15:21 +0900)]
Update path check exception list

- Add followings:
    /usr/bin/strace-log-merge
    /usr/bin/gdb-add-index
    /usr/bin/gcore

Change-Id: I952feb03bf409287091425e1efbe553009048bd2
Signed-off-by: Yunjin Lee <yunjin-.lee@samsung.com>
4 years agoAdd exception list for path check test. 22/245022/1 accepted/tizen/unified/20201005.010024 submit/tizen/20200929.075822
jin-gyu.kim [Tue, 29 Sep 2020 07:34:10 +0000 (16:34 +0900)]
Add exception list for path check test.

Add below scripts for exception lists.
/usr/share/upgrade/scripts/600.gpsd.patch.sh
/opt/etc/dump.d/module.d/dump_gpsd.sh

Change-Id: I2d02bb5fdcff9fe011687d301bcb8f4074e372ba

4 years agoLaunch all apps when running SMACK rule test. 41/244941/1 submit/tizen/20200928.074137
jin-gyu.kim [Mon, 28 Sep 2020 07:15:03 +0000 (16:15 +0900)]
Launch all apps when running SMACK rule test.

- Some SMACK rules are dynamically added while launching apps.
- To compare all SMACK rules, launching all apps before running security test.

Change-Id: I562d2bafaab0ea2dffdeaecfc41f85bfb8e04e09

4 years agoMerge "Modify netlabel to support privilege-smack mapping." into tizen
Kim Kidong [Thu, 24 Sep 2020 02:21:34 +0000 (02:21 +0000)]
Merge "Modify netlabel to support privilege-smack mapping." into tizen

4 years agoChange smack label of tlm.service (User -> System) 12/244412/1 accepted/tizen/unified/20200921.042436 submit/tizen/20200918.074817
Kidong Kim [Fri, 18 Sep 2020 08:00:59 +0000 (17:00 +0900)]
Change smack label of tlm.service (User -> System)

Change-Id: Ic0f90d5790c98c024aad655058aceb13cfa27edc

4 years agoGive capabilities to sdbd-service 70/243670/1 accepted/tizen/unified/20200910.123949 accepted/tizen/unified/20200911.143455 submit/tizen/20200909.061047 submit/tizen/20200909.080622
Kidong Kim [Wed, 9 Sep 2020 04:55:26 +0000 (13:55 +0900)]
Give capabilities to sdbd-service

Change-Id: I2f5c72c66eb53dbad5442dc2c8341b4c98198287

4 years agoGive capabilities to support update-control. 50/243350/1 accepted/tizen/unified/20200909.155611 submit/tizen/20200907.025654
jin-gyu.kim [Mon, 7 Sep 2020 02:45:28 +0000 (02:45 +0000)]
Give capabilities to support update-control.

- cap_sys_admin to /usr/bin/update-manager
- cap_dac_override to /usr/sbin/img-verifier

Change-Id: I97330c8ba642e34bbff97b800bebc1faa95107d9

4 years agoAdd system_fw to disk group. 04/243104/1 submit/tizen/20200903.072814
jin-gyu.kim [Thu, 3 Sep 2020 06:23:31 +0000 (06:23 +0000)]
Add system_fw to disk group.

- To support OS upgrade with removable storage.
- Upgrade trigger script needs to ramdisk-recovery under /dev.

Change-Id: I60eb8465b7bf37d0b92984b70d65cec07c422e43

4 years agoAdd ramdisk-flush service. 85/242385/1 accepted/tizen/unified/20200828.121616 submit/tizen/20200826.073249
jin-gyu.kim [Wed, 26 Aug 2020 06:42:47 +0000 (06:42 +0000)]
Add ramdisk-flush service.

- Add cap_sys_admin to /usr/sbin/blockdev

Change-Id: Iab2897f172d8ab93114696a07861ff7496b2f828

4 years agoModify netlabel to support privilege-smack mapping. 37/242237/3
jin-gyu.kim [Tue, 25 Aug 2020 06:40:13 +0000 (06:40 +0000)]
Modify netlabel to support privilege-smack mapping.

- 10.0.2.2, 10.0.2.16 and 192.168.129.3 for appdebugging privilege.
- All other IPs for internet privilege.

Change-Id: Ic4723bd35b63ff6aed1852b46bf65f4a7a038b19

4 years agoAdd tizen-theme-manager.service to all profiles. 20/242220/1 accepted/tizen/unified/20200826.133105 submit/tizen/20200825.054752
jin-gyu.kim [Tue, 25 Aug 2020 05:12:04 +0000 (05:12 +0000)]
Add tizen-theme-manager.service to all profiles.

Change-Id: I52d2776b82207f760555e2bd3a4722dc45b7da7d

4 years agoMerge "Change Smack label fro crash-service to System::Privileged" into tizen accepted/tizen/unified/20200824.030005 submit/tizen/20200820.145124 submit/tizen/20200821.053252
Jin-gyu Kim [Fri, 21 Aug 2020 05:19:04 +0000 (05:19 +0000)]
Merge "Change Smack label fro crash-service to System::Privileged" into tizen

4 years agoAdd capi-ui-gesture.service to wearable profile 88/241888/1
Sungwook Park [Thu, 20 Aug 2020 12:24:43 +0000 (21:24 +0900)]
Add capi-ui-gesture.service to wearable profile

Change-Id: I2d79fd2d36f20f50a8cd67113e0783462b090dc2
Signed-off-by: Sungwook Park <sungwook79.park@samsung.com>
4 years agoChange Smack label fro crash-service to System::Privileged 70/241470/1
Mateusz Moscicki [Thu, 20 Aug 2020 10:18:44 +0000 (12:18 +0200)]
Change Smack label fro crash-service to System::Privileged

The System::Privileged label is needed because on newer kernels (>=
4.20) it's not possible to read/ptrace processes listed in onlycap set.
Crash-service needs the right to do ptrace to correctly generate
reports.

Change-Id: Iad849f0b11eb3eece8d537fd2856daf59ffe757c

4 years agoAdd cap_net_raw to bluetooth-meshd 37/241137/1 accepted/tizen/unified/20200819.035935 submit/tizen/20200818.003628
jin-gyu.kim [Tue, 18 Aug 2020 00:26:43 +0000 (00:26 +0000)]
Add cap_net_raw to bluetooth-meshd

Change-Id: I7c69b3a6774b77daa0a728c9e41da7f7c6b8c354

4 years agoRefactor capability test. 17/240417/2
jin-gyu.kim [Thu, 6 Aug 2020 07:08:39 +0000 (07:08 +0000)]
Refactor capability test.

- Do not refer capability exception list.
- Read set_capability script then generate allowed lists automatically.

Change-Id: I4dbb2f2c71dce91b0f2f2ba99c59c67dcac74105

4 years agoAdd engine-loader.service 55/240155/2 accepted/tizen/unified/20200805.122517 submit/tizen/20200804.071109
jin-gyu.kim [Tue, 4 Aug 2020 05:01:31 +0000 (05:01 +0000)]
Add engine-loader.service

Change-Id: I4904f8ec285da5e6a77e838012a2b9695ec920d8

4 years agoMerge "add peripheral-bus.service to all targets/emulators" into tizen submit/tizen/20200724.041835
Jin-gyu Kim [Fri, 24 Jul 2020 04:06:48 +0000 (04:06 +0000)]
Merge "add peripheral-bus.service to all targets/emulators" into tizen

4 years agoGive cap_dac_override to /usr/bin/peripheral-bus 18/239318/1
jin-gyu.kim [Fri, 24 Jul 2020 01:07:49 +0000 (01:07 +0000)]
Give cap_dac_override to /usr/bin/peripheral-bus

Change-Id: I463917631ed78c085086c2ca00278a82cb2d8000

4 years agoadd peripheral-bus.service to all targets/emulators 61/237761/3
Konrad Kuchciak [Fri, 3 Jul 2020 08:21:39 +0000 (10:21 +0200)]
add peripheral-bus.service to all targets/emulators

Change-Id: Iae2e109c8c7a481c6f40d9d2a5faf3d11ad78da0

4 years agoAdd capabilities to pkg_recovery & unified-backend 88/238588/1 accepted/tizen/unified/20200716.144605 submit/tizen/20200716.021757
jin-gyu.kim [Wed, 15 Jul 2020 09:01:36 +0000 (18:01 +0900)]
Add capabilities to pkg_recovery & unified-backend

- cap_chown, cap_dac_override and cap_fowner are added.

Change-Id: I196e985101b4b24ec59f12b4541dff4be0511645

4 years agoadd system-update-cleanup.service and fix capability exception 72/236772/2 accepted/tizen/unified/20200623.124133 submit/tizen/20200622.064032
Kidong Kim [Mon, 22 Jun 2020 04:49:17 +0000 (13:49 +0900)]
add system-update-cleanup.service and fix capability exception

Change-Id: I92ca69292c00c14212d8a54e872b91df62b8b9ef

4 years agoadd systemd-boot-check-no-failures.service to all targets/emulators 29/236629/1 submit/tizen/20200619.051215
Kidong Kim [Fri, 19 Jun 2020 02:25:33 +0000 (11:25 +0900)]
add systemd-boot-check-no-failures.service to all targets/emulators

Change-Id: I0740613a3d3822387855e0f29e6cbef2c8b8c125

4 years agoadd setup-adaptor.service to iot profile (target only) 40/236240/1 accepted/tizen/unified/20200617.055816 submit/tizen/20200616.040400
Kidong Kim [Tue, 16 Jun 2020 02:09:17 +0000 (11:09 +0900)]
add setup-adaptor.service to iot profile (target only)

Change-Id: Iab754ddbbe072642f5c1726fc7a0d65424fce369

4 years agoexclude *.dll files from ASLR test 37/235937/1 accepted/tizen/unified/20200616.170956 submit/tizen/20200615.072038
Kidong Kim [Thu, 11 Jun 2020 06:40:28 +0000 (15:40 +0900)]
exclude *.dll files from ASLR test

Change-Id: I37c78839d2a6d77afb48e347516eb7e19401fe0a

4 years agoadd update-manager.service to iot profile 27/235727/1 accepted/tizen/unified/20200612.145005 submit/tizen/20200611.040302
Kidong Kim [Tue, 9 Jun 2020 06:35:10 +0000 (15:35 +0900)]
add update-manager.service to iot profile

Change-Id: Ia996423d2fe0d856c24025bc61a0891c01f85341

4 years agoAdd nan-manager.service to IoT profiles 25/235725/1
jin-gyu.kim [Tue, 9 Jun 2020 06:35:59 +0000 (15:35 +0900)]
Add nan-manager.service to IoT profiles

Change-Id: I6535b3224ee76aa78bddae852e2976dd7c3b11cf

4 years agoadd some files to capability exception list 91/235691/1
Kidong Kim [Tue, 9 Jun 2020 02:47:46 +0000 (11:47 +0900)]
add some files to capability exception list

Change-Id: I72f84db83b6e4bd6df408517ed2b61ec709f3635

4 years agoSecurity-test: Ignore target that will not be included in the image 86/235686/1
Yunjin Lee [Tue, 9 Jun 2020 02:13:47 +0000 (11:13 +0900)]
Security-test: Ignore target that will not be included in the image

- qemu-aarch64

Change-Id: I13855bfafb784459e346e9f1f9bf2f0997cd6aed
Signed-off-by: Yunjin Lee <yunjin-.lee@samsung.com>
4 years agoRevert "revert unreviewed patch" 24/235624/1 accepted/tizen/unified/20200610.015551 submit/tizen/20200608.075218
Kim Kidong [Mon, 8 Jun 2020 06:52:12 +0000 (06:52 +0000)]
Revert "revert unreviewed patch"

This reverts commit 0d0fddfeaf03675527c442f8307aa8773d5fb2da.

Change-Id: I9ecff7e9a08e05f0eb2314b522d748c9c291111d

4 years agorevert unreviewed patch 22/235622/1
Kidong Kim [Mon, 8 Jun 2020 06:42:34 +0000 (15:42 +0900)]
revert unreviewed patch

Change-Id: I17e1003c49e0fa1fef21a488ff80497f4e3d30f3

4 years agoadd bluetooth-meshd configuration
Kidong Kim [Mon, 8 Jun 2020 06:23:10 +0000 (15:23 +0900)]
add bluetooth-meshd configuration

4 years agoMerge "Use tizen-build.conf to distinguish a profile" into tizen accepted/tizen/unified/20200601.051601 submit/tizen/20200507.072454 submit/tizen/20200528.070044 submit/tizen/20200529.013437
Jin-gyu Kim [Thu, 7 May 2020 04:45:41 +0000 (04:45 +0000)]
Merge "Use tizen-build.conf to distinguish a profile" into tizen

4 years agoUse tizen-build.conf to distinguish a profile 01/232201/1
jin-gyu.kim [Wed, 29 Apr 2020 04:50:34 +0000 (13:50 +0900)]
Use tizen-build.conf to distinguish a profile

- Check profile info before moving failed lists of systemd units.

Change-Id: Iebc30d76a1ee5d007ef810c3c92c9de62213188c

4 years agoAdd IoT headed / IoT headless profiles. 76/232176/1
jin-gyu.kim [Wed, 29 Apr 2020 02:08:13 +0000 (11:08 +0900)]
Add IoT headed / IoT headless profiles.

- IoT headed : Enable askuser, Install IoT service lists
- IoT headless : Disable askuser, Install IoT service lists

TODO : Check IoT specific service lists later.

Change-Id: I759cea1b85a18b7b750a08d5927ce17dcc7d7c81

4 years agoAdd priv_appdebugging group ID. 33/231633/1 accepted/tizen/unified/20200423.161058 submit/tizen/20200423.065713
jin-gyu.kim [Thu, 23 Apr 2020 06:47:29 +0000 (15:47 +0900)]
Add priv_appdebugging group ID.

Change-Id: I972eaec1e8cda66fd9ef9d080bd2102b80fee381

4 years agoFix capability to dotnet executables 17/230517/1 accepted/tizen/unified/20200413.070822 submit/tizen/20200410.075941
Hyungju Lee [Fri, 10 Apr 2020 07:39:46 +0000 (16:39 +0900)]
Fix capability to dotnet executables

- dotnet-loader, dotnet-hydra-loader, dotnet

Change-Id: I821251574d70e4c34bb969b39ffd927d85c0bf53

4 years agoAdd nan-manager.service 80/230480/2 submit/tizen/20200410.060235
jin-gyu.kim [Fri, 10 Apr 2020 05:50:47 +0000 (14:50 +0900)]
Add nan-manager.service

- network_fw / network_fw / System
- cap_net_admin & cap_net_raw are added.

Change-Id: Ib0d6f74ae772053642493bd6563f54f23887a919

4 years agoAdd capability to dotnet executables 89/230389/1 submit/tizen/20200410.010850 submit/tizen/20200410.050711
Woongsuk Cho [Thu, 9 Apr 2020 23:54:43 +0000 (08:54 +0900)]
Add capability to dotnet executables
- dotnet-loader, dotnet-hydra-loader, dotnet

Change-Id: Ibfbf2c2d051ad16e3cc4755f788f00ccac3b9c84

4 years agoAdd smartreply.service to Mobile and Common 19/229719/1 accepted/tizen/unified/20200406.133152 submit/tizen/20200403.052058
Sungwook Park [Fri, 3 Apr 2020 04:37:06 +0000 (13:37 +0900)]
Add smartreply.service to Mobile and Common

Change-Id: Ic509286eaccf91eaf9e28ad6671d60f47ab31e9f
Signed-off-by: Sungwook Park <sungwook79.park@samsung.com>
4 years agoAdd user-runtime-dir@.service 06/229706/1 submit/tizen/20200403.032411
jin-gyu.kim [Fri, 3 Apr 2020 03:20:01 +0000 (12:20 +0900)]
Add user-runtime-dir@.service

- root / root / System::Privileged
- It was a part of systemd-logind.service, now separated.

Change-Id: I7c079af0488b270478107e7b542a4d69d9f9d426

4 years agoAdd modes.service 67/229267/1 accepted/tizen/unified/20200402.002821 submit/tizen/20200331.014017
jin-gyu.kim [Tue, 31 Mar 2020 01:07:34 +0000 (10:07 +0900)]
Add modes.service

- system_fw / system_fw / System permissions

Change-Id: Ia44c6ec69eeb54a20ecd90de65050d2e0d9cbf34

4 years agoAdd dumpysys-service.service 87/227487/1 accepted/tizen/unified/20200316.220955 submit/tizen/20200310.154349 submit/tizen/20200313.114712
jin-gyu.kim [Thu, 12 Mar 2020 07:03:31 +0000 (16:03 +0900)]
Add dumpysys-service.service

- log / log / System permissions

Change-Id: I9c18722a14b9b9c716e1990e08b3929568845a80

4 years agoAdd scmirroring.server.service 94/226394/1 accepted/tizen/unified/20200306.040230 submit/tizen/20200303.081056 submit/tizen/20200304.002151 submit/tizen/20200304.234738
jin-gyu.kim [Mon, 2 Mar 2020 08:43:59 +0000 (17:43 +0900)]
Add scmirroring.server.service

- multimedia_fw / multimedia_fw / System permissions.

Change-Id: I971779804aa3e37f614f542ba57c60b926f49369

4 years agoAdd capability for the app-defined-loader 52/225852/3 accepted/tizen/unified/20200226.124315 submit/tizen/20200225.045152
hyunho [Tue, 25 Feb 2020 04:05:57 +0000 (13:05 +0900)]
Add capability for the app-defined-loader

Change-Id: I3586503e0c83cc35ae6321cf1b4bdd63b0e09297
Signed-off-by: hyunho <hhstark.kang@samsung.com>
4 years agoAdd mtp-responder-dummy.service 23/225323/1 accepted/tizen/unified/20200220.122429 submit/tizen/20200218.230813 submit/tizen/20200221.002149
jin-gyu.kim [Wed, 19 Feb 2020 05:52:32 +0000 (14:52 +0900)]
Add mtp-responder-dummy.service

- network_fw / network_fw / System permission
- systemd socket unit : mtp-responder-dummy.socket

Change-Id: I858147652b2cdaaad28ce664e3e8b343c44cea36

4 years agoEnable move_systemd_unit for dbus & systemd socket also. 96/225296/1
jin-gyu.kim [Wed, 19 Feb 2020 01:58:40 +0000 (10:58 +0900)]
Enable move_systemd_unit for dbus & systemd socket also.

- Failed dbus & systemd socket units will be moved to not permitted path.
- Add tts related dbus services to the exception list.

Change-Id: Ida83ef56aa1906da9661d2b1e06ab838a627eb97

4 years agoFix not deleting systemd list files in the post script. 72/225172/1 accepted/tizen/unified/20200219.130228 submit/tizen/20200218.043728
jin-gyu.kim [Tue, 18 Feb 2020 04:10:21 +0000 (13:10 +0900)]
Fix not deleting systemd list files in the post script.

- When image is being created, systemd list files are not overrided with
  those in each profile RPM.
- The detail reason is not found, because no problem if RPMs are installed
  manually in run-time.
- By the way, if not deleting files in the post script, this issue can be addressed.

Change-Id: If451950c13daf67ef1b1fe7f42794a94502ca1e1

4 years agoRun systemd unit tests for common profile also. 92/224192/1 accepted/tizen/unified/20200210.131817 submit/tizen/20200207.093609
jin-gyu.kim [Fri, 7 Feb 2020 04:53:10 +0000 (13:53 +0900)]
Run systemd unit tests for common profile also.

- For common profile, use the same list in mobile profile.
- It will not disable systemd unit, just for checking the status.
- Failed lists will be disabled later.

Change-Id: Ia0c9a1a07092e3dbc23c1a88fa8ba82008389d64

4 years agoRun aslr test in all profiles. 73/224073/2 accepted/tizen/unified/20200207.122401 submit/tizen/20200206.064637
jin-gyu.kim [Thu, 6 Feb 2020 05:56:21 +0000 (14:56 +0900)]
Run aslr test in all profiles.

- Previously, aslr test was executed only for mobile / wearable.
- Now, make it run for all profiles, but execute permission is retrieved
  only in case of mobile / werarable profiles.

Change-Id: I291866495ae5db0fdaf77af47fc87fb770e4669d

4 years agoUse readelf instead of execstack for DEP test 11/223611/3 accepted/tizen/unified/20200206.123530 submit/tizen/20200203.014719 submit/tizen/20200204.035833 submit/tizen/20200205.042003
jin-gyu.kim [Fri, 31 Jan 2020 06:59:44 +0000 (15:59 +0900)]
Use readelf instead of execstack for DEP test

- execstack can give a execute permission, so it may need to be removed.

Change-Id: Idcc53b495b7797dbbf26004c98847c1676764d30

4 years agoAdd wait-mount@opt-usr.service 98/222698/1 accepted/tizen/unified/20200121.121517 submit/tizen/20200120.015914
jin-gyu.kim [Fri, 17 Jan 2020 08:22:03 +0000 (17:22 +0900)]
Add wait-mount@opt-usr.service

- system_fw / system_fw / System permissions
- Added for emulator profiles

Change-Id: I9b93f11dfa76dda49897fbc2f2655f8bae456604

4 years agoFix typo in systemd service list. 14/220214/1 accepted/tizen/unified/20191217.122951 submit/tizen/20191216.064559
jin-gyu.kim [Mon, 16 Dec 2019 04:51:30 +0000 (13:51 +0900)]
Fix typo in systemd service list.

Change-Id: I7a3ea651198b06072ecb46480159b6cf8af1ba06

4 years agoMerge "systemd service test" into tizen submit/tizen/20191212.081042
Kim Kidong [Thu, 12 Dec 2019 08:04:18 +0000 (08:04 +0000)]
Merge "systemd service test" into tizen

4 years agosystemd service test 16/217416/9
jin-gyu.kim [Mon, 11 Nov 2019 10:27:05 +0000 (19:27 +0900)]
systemd service test

- Check systemd service / systemd socket / dbus service
- Disable moving not permitted systemd socket & dbus service for now.
- "Exec*=" should not have prefixes one of "!", "!!" and "+".

Change-Id: Icaf728cf7b2f9b1915e8792e297e8106054beac3

4 years agoChange UID / GID for stablity_monitor & crash_worker 11/219811/2
jin-gyu.kim [Tue, 10 Dec 2019 07:44:31 +0000 (16:44 +0900)]
Change UID / GID for stablity_monitor & crash_worker

- Generally, UID / GID for system daemons need to set below 2000.
- For System Domain, range should be set as 200-249.

Change-Id: I1b54302e08d542460c0bc277e5793b21d80a8c5d

4 years agoAdd clat.service 18/218618/1 accepted/tizen/unified/20191127.141720 accepted/tizen/unified/20191128.001525 accepted/tizen/unified/20191204.130702 submit/tizen/20191126.081457 submit/tizen/20191126.105153 submit/tizen/20191204.024545
jin-gyu.kim [Tue, 26 Nov 2019 05:53:01 +0000 (14:53 +0900)]
Add clat.service

- network_fw / network_fw / System permissions
- cap_net_admin To create and configure interface, modify routing tables
- cap_net_raw To open raw socket
- cap_ipc_lock clatd calls mmap(MAP_LOCKED) with a 1M buffer. MAP_LOCKED first checks capable(CAP_IPC_LOCK)
- cap_setuid To forge UID when passing socket credentials via UNIX domain sockets
- cap_setgid To forge GID when passing socket credentials via UNIX domain sockets

Change-Id: Ie36a2d060215d27374fa0fd6e9a78a442fb9453b

4 years agoAdd dlog_cleanup.service 02/218302/1 accepted/tizen/unified/20191128.162008 submit/tizen/20191121.124127 submit/tizen/20191122.132437 submit/tizen/20191126.094154
jin-gyu.kim [Thu, 21 Nov 2019 07:07:23 +0000 (16:07 +0900)]
Add dlog_cleanup.service

log / log / System permissions.

Change-Id: I2ed9268e5019d34e8ac9a111ced2a330091687c5

4 years agoAdd user and group for stability-monitor 17/217217/2
Konrad Kuchciak [Thu, 7 Nov 2019 14:28:54 +0000 (15:28 +0100)]
Add user and group for stability-monitor

Change-Id: Iefc6b75d22741e76a039b78d6d862122d7443bd1

4 years agoAdd stability-monitor.service 60/214260/3
Konrad Kuchciak [Thu, 19 Sep 2019 09:51:46 +0000 (11:51 +0200)]
Add stability-monitor.service

Change-Id: I409bc3116175317f2bca3c2d38dabb89c2ac2dd1

4 years agoMerge "Change crash-service as non root." into tizen
Jin-gyu Kim [Thu, 21 Nov 2019 05:10:43 +0000 (05:10 +0000)]
Merge "Change crash-service as non root." into tizen

4 years agoChange crash-service as non root. 63/218063/3
jin-gyu.kim [Tue, 19 Nov 2019 07:06:09 +0000 (16:06 +0900)]
Change crash-service as non root.

- crash_worker / crash_worker / System permissions needed.
- This will require following capabilities.

setcap cap_dac_override,cap_kill,cap_sys_ptrace=ei /bin/crash-manager
   cap_dac_override - create directory
   cap_kill - send signals to processes
   cap_sys_ptrace - read /proc/<pid>/ files

setcap cap_dac_override,cap_kill,cap_sys_ptrace=ei /bin/crash-service
   cap_dac_override - create directory
   cap_kill - send signals to processes
   cap_sys_ptrace - read /proc/<pid>/ files

setcap cap_dac_read_search,cap_sys_ptrace=ei /sbin/minicoredumper
   cap_dac_read_search - access to read any binary file
   cap_sys_ptrace - read /proc/<pid>/ files

setcap cap_syslog=ei /bin/dlogutil
    cap_syslog is needed because android logger returns incorrect values without this capability (this is bug in the kernel driver).

setcap cap_dac_override=ei /bin/buxton2ctl
    buxton2ctl needs access to write to /run/buxton2/ directory

setcap cap_dac_override,cap_kill,cap_sys_ptrace+ei /bin/livedumper
   cap_dac_override  - create livedump/ directory to
   cap_sys_ptrace - read /proc/<pid>/ files

setcap cap_dac_read_search,cap_sys_ptrace=ei /usr/libexec/crash-stack
   reads /proc/<pid>/{maps, task, status}, and all binary files

setcap cap_dac_read_search,cap_sys_ptrace=ei /bin/memps
   reads files from /proc/ and /sys/

setcap cap_sys_ptrace=ei /bin/top
   read /proc/<pid>/files

setcap cap_dac_read_search=ei /bin/df
   counting of disk space usage (eg /opt/usr/home/owner/media)

setcap cap_dac_read_search=ei /bin/du

Change-Id: I0073cf19f717855941b317fa1ec6b6af5793d869

4 years agoGive capabilities to stability-monitor 78/218178/1
jin-gyu.kim [Wed, 20 Nov 2019 06:23:16 +0000 (15:23 +0900)]
Give capabilities to stability-monitor

cap_sys_ptrace        To attach in process and readlink for working
cap_sys_module        To load/unload kernel module
cap_kill              To kill processes

Change-Id: Iac3d91ed4ee647609b029c5ecae4171e8282770f

4 years agoAdd dummyasm.service 75/217875/1 accepted/tizen/unified/20191119.083943 submit/tizen/20191118.060330
jin-gyu.kim [Fri, 15 Nov 2019 06:26:42 +0000 (15:26 +0900)]
Add dummyasm.service

- service_fw / service_fw / System permission

Change-Id: Ief511d2a5ccc1696cd62a621883922c4853d4694

4 years agoAdd smartreply.service to wearable target 48/217648/1 accepted/tizen/unified/20191115.083913 submit/tizen/20191114.052118
Sungwook Park [Wed, 13 Nov 2019 06:19:58 +0000 (15:19 +0900)]
Add smartreply.service to wearable target

Change-Id: I3ce472946d1a816379bf5eba3a54487cb474f61c
Signed-off-by: Sungwook Park <sungwook79.park@samsung.com>
4 years agoAdd smartcard-service.service 97/217597/1 accepted/tizen/unified/20191114.123456 submit/tizen/20191113.042706 submit/tizen/20191113.095843
jin-gyu.kim [Wed, 13 Nov 2019 02:37:32 +0000 (11:37 +0900)]
Add smartcard-service.service

- network_fw / network_fw / System permissions

Change-Id: I37d44736e416d2971d704ee088c84ff8b4cf7a95

4 years agoFix typo. 67/217367/1 accepted/tizen/unified/20191112.033929 submit/tizen/20191111.033718
jin-gyu.kim [Mon, 11 Nov 2019 03:34:06 +0000 (12:34 +0900)]
Fix typo.

- Add missing "fi" in "if-then-fi".

Change-Id: I21ca8c61b7c841279b49078a97770e8b0d382bd5

4 years agoAdd capability to dotnet-hydra-launcher 82/217082/2 accepted/tizen/unified/20191108.065927 submit/tizen/20191106.083239
Woongsuk Cho [Wed, 6 Nov 2019 06:36:08 +0000 (15:36 +0900)]
Add capability to dotnet-hydra-launcher

Change-Id: I0ecab62e91bc1259517e791c2bf725386cbf6e3c

4 years agoMove key-manager script into key-manager package 10/216710/1 accepted/tizen/unified/20191106.124735 submit/tizen/20191105.052254
Dongsun Lee [Thu, 31 Oct 2019 04:23:50 +0000 (13:23 +0900)]
Move key-manager script into key-manager package

Change-Id: Ie426090e04b87af3c5cfaf9f58ca0ae37bafecbd
Signed-off-by: Dongsun Lee <ds73.lee@samsung.com>
4 years agoAdd batterymonitor.service to wearable emulator 87/216187/1 accepted/tizen_5.5_unified_mobile_hotfix tizen_5.5_mobile_hotfix accepted/tizen/5.5/unified/20191031.023546 accepted/tizen/5.5/unified/mobile/hotfix/20201027.091013 accepted/tizen/unified/20191022.150251 submit/tizen/20191022.055821 submit/tizen_5.5/20191031.000004 submit/tizen_5.5_mobile_hotfix/20201026.185104 tizen_5.5.m2_release
jin-gyu.kim [Tue, 22 Oct 2019 05:57:13 +0000 (14:57 +0900)]
Add batterymonitor.service to wearable emulator

Change-Id: I627203644b7b2340eeb6ad334608ebee0c6ad7aa

5 years agoAdd crash-service.service. 88/216088/1 submit/tizen/20191021.045321
jin-gyu.kim [Mon, 21 Oct 2019 04:14:43 +0000 (13:14 +0900)]
Add crash-service.service.

- root / root / System permissions
- It is too complicated to change as non-root service, due to too many tools are
related with this service.
- Need to consider again to retrieve root permissions later.

Change-Id: I03ace80d04b11e00ad9824aa26a9324afe7cff8e

5 years agoMerge "Support additional privilege-mount lists." into tizen accepted/tizen/unified/20191011.015403 submit/tizen/20191010.100323
Kim Kidong [Thu, 10 Oct 2019 06:52:51 +0000 (06:52 +0000)]
Merge "Support additional privilege-mount lists." into tizen

5 years agoRun central-key-manager service in the upgrade script. 19/215419/3 submit/tizen/20191008.051009
Dongsun Lee [Tue, 8 Oct 2019 04:27:18 +0000 (13:27 +0900)]
Run central-key-manager service in the upgrade script.

Change-Id: Ie6364b62132c321a7db7c9bf9abe834733c2b6c1
Signed-off-by: Dongsun Lee <ds73.lee@samsung.com>
5 years agoSupport additional privilege-mount lists. 27/215027/2
jin-gyu.kim [Tue, 1 Oct 2019 05:34:42 +0000 (14:34 +0900)]
Support additional privilege-mount lists.

- Put addtional lists in each profiles to add privilege-mount list.
- This lists will be used in case lists cannot be added automatically
while creating an image. (ex : dev node)
- Currently only mobile profile have this list. If needed, other profiles
can have it as similar way.

Change-Id: Ia154121ea9a1343e6de67f0c18d1e1ca68fcb84e

5 years agoAdd asp-manager.service 15/215315/1 accepted/tizen/unified/20191008.101556 submit/tizen/20191007.083447
jin-gyu.kim [Mon, 7 Oct 2019 04:43:01 +0000 (13:43 +0900)]
Add asp-manager.service

- network_fw / network_fw / System permissions.

Change-Id: I568826caee71c80c4c1ba7dc93ede56482dffa2e

5 years agoMerge "Add edge-orchestration services to wearable & tv profiles." into tizen accepted/tizen/unified/20191001.062535 submit/tizen/20190930.101952
Kim Kidong [Mon, 30 Sep 2019 09:56:46 +0000 (09:56 +0000)]
Merge "Add edge-orchestration services to wearable & tv profiles." into tizen

5 years agoAdd edge-orchestration services to wearable & tv profiles. 74/214974/1
jin-gyu.kim [Mon, 30 Sep 2019 09:30:09 +0000 (18:30 +0900)]
Add edge-orchestration services to wearable & tv profiles.

Change-Id: Ieed4839904f8e0418275576a147c85c2ad0a0d9f

5 years agoAdd rndis.service. 70/214970/1
jin-gyu.kim [Mon, 30 Sep 2019 08:29:09 +0000 (17:29 +0900)]
Add rndis.service.

- network_fw / network_fw / System permissions.

Change-Id: I2a3a2799de56562d678dc70535ec1284aaf1d9d4

5 years agoFix typo error. 67/214567/1 accepted/tizen/unified/20190925.033607 submit/tizen/20190924.053526
jin-gyu.kim [Tue, 24 Sep 2019 05:28:09 +0000 (14:28 +0900)]
Fix typo error.

Change-Id: I19f8ad9d879c943367a8323d09bfd00321e749d5

5 years agoAdd batterymonitor.service 31/214531/1 submit/tizen/20190924.013215
jin-gyu.kim [Tue, 24 Sep 2019 01:25:30 +0000 (10:25 +0900)]
Add batterymonitor.service

- service_fw / service_fw / System permissions.
- Add to wearable target.

Change-Id: Ifac9b4d9fa681b9f871e7ef08c9b5595a696e0d7

5 years agoAdd bluetooth related services 40/214440/1 accepted/tizen/unified/20190924.062114 submit/tizen/20190923.054044
jin-gyu.kim [Mon, 23 Sep 2019 05:32:10 +0000 (14:32 +0900)]
Add bluetooth related services

- bluetooth-ag-agents / bluetooth-hf-agent / bluetooth-hid-agent / obex
- All services have network_fw / network_fw / System permissions.

Change-Id: Ief0edae83ccbbd073d0f752a3967dc0ee8cbacaa

5 years agoAdd wifi-ready.service 93/214193/1 accepted/tizen/unified/20190920.065309 submit/tizen/20190919.042909
jin-gyu.kim [Thu, 19 Sep 2019 02:06:22 +0000 (11:06 +0900)]
Add wifi-ready.service

- network_fw / network_fw / System
- Installed by wearable plugin.

Change-Id: I7bf82141ddf06050e3788be69188ee494bb2a803