Darren J Moffat wrote:
> James Carlson wrote:
>> It'd be an interesting idea for testing, but I think it'd actually be
>> counter-productive to do this.  The problem is that the actual privilege
>> enforcement (and thus the effects of each privilege bit) are hard-coded
>> into the kernel itself.  There's no good way to replicate that logic out
>> into a user-space wrapper so that the code somehow 'knows' whether a
>> given system call should have succeeded give a privilege set.
>
> Also for privilege debugging it shouldn't be necessary.  This is what 
> the "Privilege Debug Mode" is for see ppriv(1).  For the cases where 
> that isn't sufficient or accurate then the Sun Blueprint
> "Privilege Debugging in the Solaris 10 Operating System"[1] is useful.
>
> [1] http://www.sun.com/blueprints/0206/819-5507.pdf
>
> Not that I'm biased by being a co-author on the above blueprint, but I 
> think that is a better way of dealing with privilege debugging that 
> attempting to do a "fakeroot" for privileges which by its very nature 
> of being upstream will rot and be wrong.
>
> It will also be even more of an issue if/when FMAC makes its way into 
> OpenSolaris distributions.
>
> Having said all that I have no problem with fakeroot being delivered.  
> I would have possible issues if I see OpenSolaris originated projects 
> wanting to depend on fakeroot.

Agreed.  Do you want to derail the case to generate an opinion to this 
effect?

    - Garrett



Reply via email to