On Sun, Aug 25, 2019 at 07:18:33PM +0200, Pierre Labastie via blfs-dev wrote: > On 25/08/2019 18:26, Ken Moffat via blfs-dev wrote: > > > > On the pre-9.0 system on my haswell I'll explore membership of the > > wheel group.
Failed to startx, I think I've broken something there. But that was supposed to be a "generic" build (the sort I should be able to copy to a new machine, fix up the kernel, and use to boot a new LFS) and I'd accidentally left -march=native in the glibc build. So, I'm doing a fresh build of that system, with myself in the wheel group. > > I've added myself to the wheel group to see if it could change something for > the gdm problem. > But before that, I've been able to start X without belonging to this group > several times before (and during my first adventures with gdm too). So no, I > do not think you need to belong to an administrative group to access > /dev/input/xxx. Actually, I don't think polkit is involved for accessing > those: it is the whole purpose of dbus to provide access to hardware devices > for normal users. > The devices in this case being /dev/input/* > I've not read the whole thread in details (have been out of town for a day and > a half), so you may already have tried this, but I would suggest that you try > to recompile elogind, Xorg libraries, and then dbus again. > What are you suggesting I should do differently in recompiling elogind ? I've already compiled dbus for a first time, elogind, xtrans and the rest of the xorg libs, dbus again, the usual stuff including pixman, libdrm, Mesa, some xorg apps, polkit with its deps, and then xorg-server. I appreciate you haven't read the whole set of threads/subthreads, so may I post soemthing I wrote earlier (reformatted) ? From /usr/share/polkit-1/actions/org.freedesktop.login1.policy <action id="org.freedesktop.login1.attach-device"> <description gettext-domain="systemd">Allow attaching devices to seats</description> <message gettext-domain="systemd">Authentication is required for attaching a device to a seat.</message> <defaults> <allow_any>auth_admin_keep</allow_any> <allow_inactive>auth_admin_keep</allow_inactive> <allow_active>auth_admin_keep</allow_active> </defaults> <annotate key="org.freedesktop.policykit.imply">org.freedesktop.login1.flush-devices</annotate> </action> Please note that this authentication is auth_admin_keep. From https://www.freedesktop.org/software/polkit/docs/latest/polkit.8.html auth_admin Authentication by an administrative user is required. [...] auth_admin_keep Like auth_admin but the authorization is kept for a brief period (e.g. five minutes). That is why I think being an administrative user is required. ĸen -- Adopted by dwarfs, brought up by dwarfs. To dwarfs I'm a dwarf, sir. I can do the rite of k'zakra, I know the secrets of h'ragna, I can ha'lk my g'rakha correctly ... I am a dwarf Captain Carrot Ironfoundersson (in The Fifth Elephant) -- http://lists.linuxfromscratch.org/listinfo/blfs-dev FAQ: http://www.linuxfromscratch.org/blfs/faq.html Unsubscribe: See the above information page