I think you're encountering the already fixed amd crash issue, see
https://bugs.tizen.org/jira/browse/PTREL-591

It's none-business of security in fact.

--
Thanks,
Chengwei

On Tue, Jan 14, 2014 at 09:02:34AM +0100, Baptiste Durand wrote:
> Hello all & security team members,
> 
> I've started to work on TIVI-2579.
> 
> This issues appens only if we re-enable the security at kernel level.
> (remove security=none from kernel bootcmd line)
> 
> As I know currently,is :
> - amd crashs at startup if we enable smack features. (version snapshot 0.0.286
> )
> - amd don't crash if we use release version 0.0.282 (SHA
> c8161d60b872f2eede002b2e6c2017b919f5b7c5 ), by using this command :
> zypper in -f http://download.tizen.org/snapshots/tizen/ivi/ivi-release/latest/
> repos/ivi/ia32/packages/i686/aul-0.0.282-14.2.i686.rpm
> 
> The only commit that has an impact on the init of the amd binary is :
> - SHA : b3e81797b08679aad1a2cce4ab3f31574c5bc231
> - Commit msg : "Fix a launch bug at installation"
> 
> I've noticed that these previous changes introduces some dlopen calls, I
> checked the smack label of concerned libraries but the label of pkgmgr-info 
> lib
> is set to "_".
> 
> I don't see any link between this changes and the smack feature.
> 
> I would appreciate some help.
> 
> Thanks in advance for your answer
> 
> --
> Baptiste DURAND
> Eurogiciel Vannes/FR

> _______________________________________________
> Dev mailing list
> [email protected]
> https://lists.tizen.org/listinfo/dev

Attachment: signature.asc
Description: Digital signature

_______________________________________________
Dev mailing list
[email protected]
https://lists.tizen.org/listinfo/dev

Reply via email to