-rw-r--r-- | share/opie-login/post-session | 2 | ||||
-rw-r--r-- | share/opie-login/pre-session | 4 |
2 files changed, 3 insertions, 3 deletions
diff --git a/share/opie-login/post-session b/share/opie-login/post-session index 5275513..680701f 100644 --- a/share/opie-login/post-session +++ b/share/opie-login/post-session @@ -1,24 +1,24 @@ #!/bin/sh permout () { if [ -e $1 ] then chown root $1 else echo Warning: $1 does not exist. return 1 fi } if [ -e /proc/hal/model ]; then - devs=/dev/sound/dsp /dev/sound/mixer /dev/touchscreen/0 \ + devs=/dev/sound/dsp /dev/sound/mixer /dev/touchscreen/* \ /dev/fb/0 /dev/vc/0 else devs=/dev/dsp /dev/dsp1 /dev/mixer /dev/ts /dev/fb0 \ /dev/sharp* /dev/collie* fi for i in $devs; do permout $i done diff --git a/share/opie-login/pre-session b/share/opie-login/pre-session index 1c2b630..28d4a1f 100644 --- a/share/opie-login/pre-session +++ b/share/opie-login/pre-session @@ -8,34 +8,34 @@ USER=$1 # question. We wish to ensure that, as a policy # choice, a login to opie makes access to these # devices exclusive by 1) changing device ownership # to the user, and 2) removing group access. # # A better implementation would probably be to store # existing device permissions at load time, and restore # them at exit, rather than making assumptions about # user/group ownership, or permissions. permin () { if [ -e $1 ] then chown $USER $1 else echo Warning: $1 does not exist. return 1 fi } if [ -e /proc/hal/model ]; then # fix for misconfigured devfsd chmod +x /dev/sound /dev/touchscreen /dev/fb /dev/vc - devs=/dev/sound/dsp /dev/sound/mixer /dev/touchscreen/0 \ + devs=/dev/sound/dsp /dev/sound/mixer /dev/touchscreen/* \ /dev/fb/0 /dev/vc/0 else - devs=/dev/dsp /dev/dsp1 /dev/mixer /dev/ts /dev/fb0 \ + devs=/dev/dsp/* /dev/dsp1 /dev/mixer /dev/ts /dev/fb0 \ /dev/sharp* /dev/collie* fi for i in $devs; do permin $i done |