I have a question related to this.
If a driver ioctl handler requires
(filp->f_mode) & FMODE_WRITE
to be set before processing a request, and if only
root has write permission to the device file, does this
make it unnecessary to check for
capable(CAP_SYS_ADMIN)
?
If we were to use the write permission bit to control
access, then it would not be necessary for the apm
command to be setuid root to give the non-root user
the ability to suspend the machine. Instead we could
chgrp apm /dev/apm_bios
chmod g+w /dev/apm_bios
and add the trusted user to the 'apm' group.
Am I missing something here?
-- Thomas- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
This archive was generated by hypermail 2b29 : Wed Oct 31 2001 - 21:00:40 EST