Module You shown logs only capability checks without any more information - no further information about the process (e.g. we want to have information about what capabilities process uses running as executed binary). We wanted to provide method easy to use. Feel free to use another one if You think it is easier to work with :) It should however show what capabilities process executing binary uses for sure and raise a question - why is it using those (sometimes usage is unnecessary) and does it need other ones.
BR, Marcin Niesluchowski -----Original Message----- From: Dev [mailto:[email protected]] On Behalf Of Kok, Auke-jan H Sent: Wednesday, April 16, 2014 10:53 PM To: Bartlomiej Grzelewski Cc: [email protected] Subject: Re: [Dev] Remove root privileges from daemons. maybe slightly offtopic, but is there any reason you didn't use: http://lkml.iu.edu//hypermail/linux/kernel/1205.2/01117.html Cheers, Auke On Mon, Apr 14, 2014 at 7:20 AM, Bartlomiej Grzelewski <[email protected]> wrote: > Dear all, > > My team was asked to reduce number of process with root privileges. We > prepared wiki pages that points tools and describe process of daemon > analysis. > > https://wiki.tizen.org/wiki/Security:Analysing_security_privileges_of_tizen_ > services > https://wiki.tizen.org/wiki/Security:Capable_Probe_Module > > Pages are being constructed, but is highest time to share and probably start > a discussion. > > Best regards, > -- > Bartłomiej Grzelewski > Samsung R&D Institute Poland > Samsung Electronics > > > _______________________________________________ > Dev mailing list > [email protected] > https://lists.tizen.org/listinfo/dev _______________________________________________ Dev mailing list [email protected] https://lists.tizen.org/listinfo/dev _______________________________________________ Dev mailing list [email protected] https://lists.tizen.org/listinfo/dev
