suds_ctrl(ADM)


suds_ctrl -- specify permissions for SUDS functions

Syntax

/etc/suds_ctrl [ -a | -d ] gid

Description

The suds_ctrl function allows root to specify groups that may execute binaries who use SUDS spin locks or latches.

Any user that needs to execute such a binary should belong to a group which has been granted permission by suds_ctrl. As an alternative, a binary that uses SUDS spin locks or latches can set a specific group ID (gid) on execution to which suds_ctrl must previously have granted permission.

The options are:


-a
Add the specified group to the list of groups that can use SUDS spin locks and latches.

-d
Delete the specified group from the current list of groups.
suds_ctrl can be executed automatically when a system goes into multiuser mode by modifying the startup scripts (see rc2(ADM)).

Examples

Allow a user to run a binary that uses SUDS spin locks and latches, when that binary sets the group ID newgroup on execution:

suds_ctrl -a newgroup

Limitations

suds_ctrl can only be executed by root.

See also

chown(C), latch_wait(S-osr5), rc2(ADM), setgid(S-osr5), suds_lockinit(S-osr5)

Standards conformance

suds_ctrl is not part of any currently supported standard; it is an extension of AT&T System V provided by The Santa Cruz Operation, Inc.
© 2005 The SCO Group, Inc. All rights reserved.
SCO OpenServer Release 6.0.0 -- 03 June 2005