[Dev] Remove root privileges from daemons.
m.niesluchow at samsung.com
Thu Apr 17 08:21:59 GMT 2014
Module You shown logs only capability checks without any more information - no further information about the process (e.g. we want to have information about what capabilities process uses running as executed binary). We wanted to provide method easy to use. Feel free to use another one if You think it is easier to work with :) It should however show what capabilities process executing binary uses for sure and raise a question - why is it using those (sometimes usage is unnecessary) and does it need other ones.
From: Dev [mailto:dev-bounces at lists.tizen.org] On Behalf Of Kok, Auke-jan H
Sent: Wednesday, April 16, 2014 10:53 PM
To: Bartlomiej Grzelewski
Cc: dev at lists.tizen.org
Subject: Re: [Dev] Remove root privileges from daemons.
maybe slightly offtopic, but is there any reason you didn't use:
On Mon, Apr 14, 2014 at 7:20 AM, Bartlomiej Grzelewski
<b.grzelewski at samsung.com> wrote:
> Dear all,
> My team was asked to reduce number of process with root privileges. We
> prepared wiki pages that points tools and describe process of daemon
> Pages are being constructed, but is highest time to share and probably start
> a discussion.
> Best regards,
> Bartłomiej Grzelewski
> Samsung R&D Institute Poland
> Samsung Electronics
> Dev mailing list
> Dev at lists.tizen.org
Dev mailing list
Dev at lists.tizen.org
More information about the Dev