public inbox for linux-kernel@vger.kernel.org
 help / color / mirror / Atom feed
From: Greg KH <gregkh@linuxfoundation.org>
To: helene.gsaenger@studium.fau.de
Cc: jslaby@suse.cz, dh.herrmann@gmail.com, daniel.vetter@ffwll.ch,
	peter@hurleysoftware.com, tiwai@suse.de, mark.d.rustad@intel.com,
	joe@perches.com, linux-kernel@vger.kernel.org,
	linux-kernel@i4.cs.fau.de, simone.weiss@fau.de
Subject: Re: questions to planned lock-functionality for vts
Date: Sun, 22 Mar 2015 23:23:37 +0100	[thread overview]
Message-ID: <20150322222337.GA28785@kroah.com> (raw)
In-Reply-To: <5084791d6ec7b09c5f3047a376cc8677.squirrel@faumail.uni-erlangen.de>

On Sun, Mar 22, 2015 at 11:03:03PM +0100, helene.gsaenger@studium.fau.de wrote:
> Hello,
> 
> 
> We want to add a functionality to the kernel that allows to lock and unlock
> virtual terminals to maybe one day replace X11 screensavers and console
> lockers by a more secure kernel mechanism.

Wait, what's wrong with the existing functionality?

> It should behave like:
> If user A owns e.g. vt2, A is able to lock vt2 and unlock it again.
> This is realized by a userspace programm that calls ioctl, which the above
> mentioned added cases VT_LOCK and VT_UNLOCK.
> Another user(that is not root) wouldn't be allowed to un-/lock vt2.
> If anybody wants to change to a looked VT he gets redirected to vt12.
> At vt12 a userspace programm (to unlock a VT) would run and ask for
> loginname and password, if it is the password from the user that owns the
> locked terminal or from root.
> The VT gets unlocked and the user gets directed to his terminal.

Why would you want to put all of that into the kernel?

thanks,

greg k-h

  reply	other threads:[~2015-03-22 22:23 UTC|newest]

Thread overview: 8+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2015-03-22 22:03 questions to planned lock-functionality for vts helene.gsaenger
2015-03-22 22:23 ` Greg KH [this message]
2015-03-23 10:29   ` simone.weiss
2015-03-23 12:29     ` David Herrmann
2015-03-23 13:02       ` simone.weiss
2015-03-23 13:26         ` David Herrmann
2015-03-23 14:48           ` simone.weiss
2015-03-23 14:58             ` David Herrmann

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20150322222337.GA28785@kroah.com \
    --to=gregkh@linuxfoundation.org \
    --cc=daniel.vetter@ffwll.ch \
    --cc=dh.herrmann@gmail.com \
    --cc=helene.gsaenger@studium.fau.de \
    --cc=joe@perches.com \
    --cc=jslaby@suse.cz \
    --cc=linux-kernel@i4.cs.fau.de \
    --cc=linux-kernel@vger.kernel.org \
    --cc=mark.d.rustad@intel.com \
    --cc=peter@hurleysoftware.com \
    --cc=simone.weiss@fau.de \
    --cc=tiwai@suse.de \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox