[Shr-Devel] Security features of SHR
martin.jansa at gmail.com
Fri May 28 16:20:53 CEST 2010
On Fri, May 28, 2010 at 06:54:44PM +0500, Shaz wrote:
> On Fri, May 28, 2010 at 5:57 PM, Tom Hacohen <tom at stosb.com> wrote:
> > On Fri, May 28, 2010 at 3:19 PM, Shaz <shazalive at gmail.com> wrote:
> >> Still not satisfied because sharing phones is very unusual.
> > Although unusual, it's a nice feature, and it's easy to do (after you run
> > everything as non-root).
> > In other words, don't try to justify a bad design. (i.e hardcoding user
> > names).
> So going back to the point where Mickey pointed out that this requires
> some change in the kernel. I still have no idea why. Is the root
> currently hard coded? Let me check ...
> Mickey said: You may have to fix the kernel to provide sysfs access to
> non-priviledged users. I don't get this.
I guess that Mickey meant ie fsogsmd running under unprivileged "gsm"
user asking kernel to power-up gsm chip.
Running all fso daemons which needs to control hw, with suid doesn't improve
current situation that much.
uin:136542059 jid:Martin.Jansa at gmail.com
Jansa Martin sip:jamasip at voip.wengo.fr
More information about the openmoko-kernel