[Shr-Devel] Security features of SHR
Shaz
shazalive at gmail.com
Thu May 27 22:05:42 CEST 2010
On Fri, May 28, 2010 at 12:35 AM, Tom Hacohen <tom at stosb.com> wrote:
> On Thu, May 27, 2010 at 10:03 PM, Michael 'Mickey' Lauer
> <mickey at vanille-media.de> wrote:
>>
>> * You may have to fix the kernel to provide sysfs access to
>> non-priviledged users.
I will look at this but what do you mean by fix the kernel!?
> Of course, make sure you don't give "too much" access in sysfs, or in other
> words, don't expose what shouldn't be exposed.
>>
>> * Fix X to be able to run as non-root.
>
> Mickey: Isn't X running as root pretty standard? I mean, he should probably
> hack it to run e as non-root (which is reasonable) but X itself?
This should mean setuid for X.
> Anyhow, shaz: don't forget to also adjust the SHR apps. To be honest, I
> don't think there's almost any work needed to be done (except for dbus
> privileges),
> at least not as a first stage. After you'll have stuff running as a regular
> user, or at least have a regular user in general, it'll be easier for us
> to adjust the SHR applications ourselves. Now changing everything is just
> too annoying when there's nothing else ready. :P
> Though as said, if I'm not missing anything, everything should just work, at
> least it just works running as a regular user on my pc :P
What name should be given to the regular user? user :)
Thanks.
--
Shaz
More information about the openmoko-kernel
mailing list