James Carlson wrote: > It'd be an interesting idea for testing, but I think it'd actually be > counter-productive to do this. The problem is that the actual privilege > enforcement (and thus the effects of each privilege bit) are hard-coded > into the kernel itself. There's no good way to replicate that logic out > into a user-space wrapper so that the code somehow 'knows' whether a > given system call should have succeeded give a privilege set.
Also for privilege debugging it shouldn't be necessary. This is what the "Privilege Debug Mode" is for see ppriv(1). For the cases where that isn't sufficient or accurate then the Sun Blueprint "Privilege Debugging in the Solaris 10 Operating System"[1] is useful. [1] http://www.sun.com/blueprints/0206/819-5507.pdf Not that I'm biased by being a co-author on the above blueprint, but I think that is a better way of dealing with privilege debugging that attempting to do a "fakeroot" for privileges which by its very nature of being upstream will rot and be wrong. It will also be even more of an issue if/when FMAC makes its way into OpenSolaris distributions. Having said all that I have no problem with fakeroot being delivered. I would have possible issues if I see OpenSolaris originated projects wanting to depend on fakeroot. -- Darren J Moffat