On Fri, 5 Apr 2002 15:50, Thomas Hood wrote:
> Permissions on /dev/apm_bios are currently 660.
> Is there any reason these permissions shouldn't be 664?
>
> The latter would allow non-root users to find out about
> power management events (but not to initiate them).

You should ask the authors of the apm kernel code about that.

> I would also like to know what people think would be the
> right way safely to allow users other than root to perform
> power management events.  Currently only root can perform
> apm suspend, for example.  It would be nice if anyone in
> the operator group could also do this.  The apm driver
> requires CAP_SYS_ADMIN for privileged operations, so a
> setuid program would be required.  Report #134595 asks
> that /usr/bin/apm simply be made setuid root; please read
> the discussion there first.

SUID root is not required to provide capabilities on LSM systems, but that's 
probably not relevant to this discussion.

Why not use pam_group.so to add the apm group to the user if they login at 
the console?  If you're at the console of a laptop you can always suspend by 
shutting the lid anyway...

-- 
If you send email to me or to a mailing list that I use which has >4 lines
of legalistic junk at the end then you are specifically authorizing me to do
whatever I wish with the message and all other messages from your domain, by
posting the message you agree that your long legalistic sig is void.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]


Reply via email to