aboutsummaryrefslogtreecommitdiff
path: root/libseat/backend
diff options
context:
space:
mode:
authorGreg Depoire--Ferrer <greg.depoire@gmail.com>2021-08-04 07:55:28 +0200
committerKenny Levinsen <kl@kl.wtf>2021-08-15 14:03:23 +0200
commitd9ae4c3010abfa1a72f1030afd282b5490747775 (patch)
tree76b03643f482c3015e9c2b5c60978c72b54ef931 /libseat/backend
parent6e7a1db32d1a10593fd3adb95f8243ec322f472d (diff)
Revert "libseat: Check euid before using builtin"
This reverts commit 1ae6c3b3ddf0ce2a2e1817eb9c74e0c03153df58. A user might want to run the builtin server as non root, if they have permission to use the devices. The check was originally copied from wlroots's direct backend. It was reverted in fa05d3cde68d with a detailed explanation of why root priviledges are not always necessary to use the DRM device.
Diffstat (limited to 'libseat/backend')
-rw-r--r--libseat/backend/seatd.c5
1 files changed, 0 insertions, 5 deletions
diff --git a/libseat/backend/seatd.c b/libseat/backend/seatd.c
index 25d8e95..3ff54d6 100644
--- a/libseat/backend/seatd.c
+++ b/libseat/backend/seatd.c
@@ -606,11 +606,6 @@ static struct libseat *builtin_open_seat(struct libseat_seat_listener *listener,
return NULL;
}
- if (geteuid() != 0) {
- log_error("Built-in seatd instance requires root privileges");
- return NULL;
- }
-
pid_t pid = fork();
if (pid == -1) {
log_errorf("Could not fork: %s", strerror(errno));