There is a discussion with gdm developers at https://bugzilla.gnome.org
/show_bug.cgi?id=776203 , but they are not yet ready to implement this
solution.
В Пн, 16/01/2017 в 13:56 +, Simon McVittie пишет:
> On Wed, 14 Dec 2016 at 23:23:55 +0300, Oleg Samarin wrote:
> > The following
The following change in systemd-226:
systemd now supports the concept of user buses replacing
session buses, if used with dbus-1.10 (and enabled via dbus
--enable-user-session). It previously only supported this on
kdbus-enabled systems, and this release expands this to
'dbus-daemon' systems
tota
2015-05-28 13:06 GMT+03:00 Lennart Poettering :
> On Thu, 28.05.15 11:10, Oleg Samarin (osamari...@gmail.com) wrote:
>
> > Hi!
> >
> > I have an imsm raid-1 device /dev/md126 assembled of /dev/sda and
> /dev/sdb.
> > I have a lvm group on top of /dev/md126p2 with some
> > After adding the simple udev rule:
> >
> > --
> > KERNEL=="seq", SUBSYSTEM=="sound", TAG+="shared"
> > --
> >
> > /dev/snd/seq becomes accessible from all seats.
> >
> > Could you resolve this patch upstream
ccessible from all seats.
Could you resolve this patch upstream or propose another way of granting
access to /dev/snd/seq on activating sessions?
From: Oleg Samarin
Subject: [PATCH] logind: support of shared devices
Supporting of acls on devices shared between all seats (like /dev/snd/seq):
A
В Пт, 23/05/2014 в 16:20 +0200, David Herrmann пишет:
> Hi
>
> On Thu, May 22, 2014 at 9:19 PM, Oleg Samarin wrote:
> >
> > I have two-seat configuration on my PC. The problem is that when I log
> > in to GDM session on seat0, it rests being not active, and I c
I have two-seat configuration on my PC. The problem is that when I log
in to GDM session on seat0, it rests being not active, and I can not
activate it with 'loginctl activate' command.
[oleg@oleg2 ~]$ loginctl
SESSIONUID USER SEAT
c1 42 gdm
reformatted patch is here
>From eade2b14853eb56917fcf3ec8c7cfc2af0affdcb Mon Sep 17 00:00:00 2001
From: Oleg Samarin
Date: Sat, 5 Jan 2013 20:57:56 +0400
Subject: [PATCH 2/2] logind: user access to shared devices
Supporting of acls on devices shared between all seats (like /dev/snd/seq):
A u
В Пт., 04/01/2013 в 00:40 +0100, Lennart Poettering пишет:
> On Thu, 27.12.12 22:54, Oleg Samarin (osamari...@gmail.com) wrote:
>
> > В Пн., 24/12/2012 в 13:08 +0100, Lennart Poettering пишет:
> > > On Thu, 20.12.12 22:08, Oleg Samarin (osamari...@gmail.com) wrote:
> >
s "shared"
tag for all devices with "uaccess" tag and without ONE_SEAT attribute.
If you know how to achieve this without ONE_SEAT, I'd like to implement
it.
Oleg.
From: Oleg Samarin
Subject: [PATCH] logind: user access to shared devices
Supporting of acls on devices shared
В Пн., 24/12/2012 в 13:08 +0100, Lennart Poettering пишет:
> On Thu, 20.12.12 22:08, Oleg Samarin (osamari...@gmail.com) wrote:
>
> Could you please split these patches up? The "seat-master" bit looks
> straightforward to me, and I'd merge that quickly, the ONE_SEAT
The next attempt to post the patch (the patch is attached, because
evolution breaks the lines)
i1. Capability of making seats without framebuffer devices
logind.c: The seat is now activated by any device with udev tag
"seat-master"
71-seat.rules.in: All framebuffer devices have this tag
i1. Capability of making seats without framebuffer devices
logind.c: The seat is now activated by any device with udev tag
"seat-master"
71-seat.rules.in: All framebuffer devices have this tag
multi-seat-x.c: if the seat does not have a framebuffer device, runs X
as a proxy, adding -sha
i1. Capability of making seats without framebuffer devices
logind.c: The seat is now activated by any device with udev tag
"seat-master"
71-seat.rules.in: All framebuffer devices have this tag
multi-seat-x.c: if the seat does not have a framebuffer device, runs X
as a proxy, adding
> > But nigther user of seat0 nor user of seat1 can access it even another
> > > user is not working with it, even no user is logged on anothe seat.
>
I made more testing and found, that /dev/snd/seq is accessible for any
user, logged in on the seat0, but not to one logged on the seat1.
After re
В Вс., 25/11/2012 в 02:21 +0100, Kay Sievers пишет:
> On Sat, Nov 24, 2012 at 10:46 PM, Lennart Poettering
> wrote:
>
> > This sounds as if it should be tagged with uaccess, so that it is
> > managed by dynamic ACLs as sessoins become active and inactive.
> >
> > Kay, what's the story behind /dev
press Ctrl+Alt+fN on the seat1, it switchs tty on the
seat0.
7. When seat0 is switched into the text mode (ex. after Ctrl+Alt+F2),
all keys typed on seat1 is displayed on Seat0. It seems as a serious
security vulnerability, because seat0 user can see the login password of
seat1 typed at GDM log
В Ср., 21/11/2012 в 20:23 +0100, Lennart Poettering пишет:
> I think there are other ways thinkable, where we don't have to add
> explicit nvidia-compatibility switches. For example, instead of
> explicitly watching for fb devices to show up before we consider a seat
> to be around, we could inste
18 matches
Mail list logo