Garrett D'Amore wrote:
> Darren J Moffat wrote:
>> James Carlson wrote:
>>> It'd be an interesting idea for testing, but I think it'd actually be
>>> counter-productive to do this.  The problem is that the actual privilege
>>> enforcement (and thus the effects of each privilege bit) are hard-coded
>>> into the kernel itself.  There's no good way to replicate that logic out
>>> into a user-space wrapper so that the code somehow 'knows' whether a
>>> given system call should have succeeded give a privilege set.
>>
>> Also for privilege debugging it shouldn't be necessary.  This is what 
>> the "Privilege Debug Mode" is for see ppriv(1).  For the cases where 
>> that isn't sufficient or accurate then the Sun Blueprint
>> "Privilege Debugging in the Solaris 10 Operating System"[1] is useful.
>>
>> [1] http://www.sun.com/blueprints/0206/819-5507.pdf
>>
>> Not that I'm biased by being a co-author on the above blueprint, but I 
>> think that is a better way of dealing with privilege debugging that 
>> attempting to do a "fakeroot" for privileges which by its very nature 
>> of being upstream will rot and be wrong.
>>
>> It will also be even more of an issue if/when FMAC makes its way into 
>> OpenSolaris distributions.
>>
>> Having said all that I have no problem with fakeroot being delivered.  
>> I would have possible issues if I see OpenSolaris originated projects 
>> wanting to depend on fakeroot.
> 
> Agreed.  Do you want to derail the case to generate an opinion to this 
> effect?

Nope I think this email in the case log is sufficient.

-- 
Darren J Moffat

Reply via email to