Thanks for opening this bug report. Most of the daemons you've listed run as superuser as that is the only way to have the necessary privileges for them to operate correctly. In some cases, the daemons are protected by AppArmor profiles. This is the case with cups and dhcp3.
If you have discovered a way of running some of the daemons you've listed above as a non-root user, without losing functionality, please open a separate bug report for each of them that includes instructions/patches. Thank you. ** Changed in: acpid (Ubuntu) Status: New => Invalid ** Changed in: bluez (Ubuntu) Status: New => Invalid ** Changed in: cron (Ubuntu) Status: New => Invalid ** Changed in: devicekit-power (Ubuntu) Status: New => Invalid ** Changed in: gdm (Ubuntu) Status: New => Invalid ** Changed in: ntfs-3g (Ubuntu) Status: New => Invalid ** Changed in: devicekit (Ubuntu) Status: New => Invalid ** Changed in: dhcp3 (Ubuntu) Status: New => Invalid ** Changed in: xorg (Ubuntu) Status: New => Invalid ** Changed in: xorg-server (Ubuntu) Status: New => Invalid ** Changed in: cups (Ubuntu) Status: New => Invalid ** Changed in: network-manager (Ubuntu) Status: New => Invalid ** Changed in: devicekit-disks (Ubuntu) Status: New => Invalid ** Changed in: samba (Ubuntu) Status: New => Invalid ** Changed in: wpasupplicant (Ubuntu) Status: New => Invalid -- Software runs as root https://bugs.launchpad.net/bugs/401107 You received this bug notification because you are a member of Ubuntu Desktop Bugs, which is subscribed to gdm in ubuntu. -- desktop-bugs mailing list desktop-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/desktop-bugs