suds_ctrl(ADM)
suds_ctrl --
specify permissions for SUDS functions
Syntax
/etc/suds_ctrl [ -a | -d ] gid
Description
The suds_ctrl function allows root to
specify groups that may execute binaries who
use SUDS spin locks or latches.
Any user that needs to execute
such a binary should belong to a group which has been
granted permission by suds_ctrl.
As an alternative, a binary that uses SUDS spin locks
or latches can set a specific group ID (gid)
on execution to which suds_ctrl must previously have
granted permission.
The options are:
-a-
Add the specified group to the list of groups that
can use SUDS spin locks and latches.
-d-
Delete the specified group from the current list of
groups.
suds_ctrl can be executed automatically when a
system goes into multiuser mode by modifying the startup
scripts (see
rc2(ADM)).
Examples
Allow a user to run a binary that uses SUDS spin locks
and latches, when that binary sets the group ID
newgroup on execution:
suds_ctrl -a newgroup
Limitations
suds_ctrl can only be executed by root.
See also
chown(C),
latch_wait(S-osr5),
rc2(ADM),
setgid(S-osr5),
suds_lockinit(S-osr5)
Standards conformance
suds_ctrl is not part of any currently supported
standard; it is an extension of AT&T
System V provided by The Santa Cruz Operation, Inc.
© 2005 The SCO Group, Inc. All rights reserved.
SCO OpenServer Release 6.0.0 -- 03 June 2005