Module You shown logs only capability checks without any more information - no 
further information about the process (e.g. we want to have information about 
what capabilities process uses running as executed binary). We wanted to 
provide method easy to use. Feel free to use another one if You think it is 
easier to work with :) It should however show what capabilities process 
executing binary uses for sure and raise a question - why is it using those 
(sometimes usage is unnecessary) and does it need other ones.

BR,
Marcin Niesluchowski

-----Original Message-----
From: Dev [mailto:[email protected]] On Behalf Of Kok, Auke-jan H
Sent: Wednesday, April 16, 2014 10:53 PM
To: Bartlomiej Grzelewski
Cc: [email protected]
Subject: Re: [Dev] Remove root privileges from daemons.

maybe slightly offtopic, but is there any reason you didn't use:

http://lkml.iu.edu//hypermail/linux/kernel/1205.2/01117.html

Cheers,


Auke


On Mon, Apr 14, 2014 at 7:20 AM, Bartlomiej Grzelewski
<[email protected]> wrote:
> Dear all,
>
> My team was asked to reduce number of process with root privileges. We
> prepared wiki pages that points tools and describe process of daemon
> analysis.
>
> https://wiki.tizen.org/wiki/Security:Analysing_security_privileges_of_tizen_
> services
> https://wiki.tizen.org/wiki/Security:Capable_Probe_Module
>
> Pages are being constructed, but is highest time to share and probably start
> a discussion.
>
> Best regards,
> --
> Bartłomiej Grzelewski
> Samsung R&D Institute Poland
> Samsung  Electronics
>
>
> _______________________________________________
> Dev mailing list
> [email protected]
> https://lists.tizen.org/listinfo/dev
_______________________________________________
Dev mailing list
[email protected]
https://lists.tizen.org/listinfo/dev


_______________________________________________
Dev mailing list
[email protected]
https://lists.tizen.org/listinfo/dev

Reply via email to