Description of problem: Plug in a USB IOwarrior device. The device-files appears where expected, but are accessible only by root. I'd expect them rw by whoever has console access. Version-Release number of selected component (if applicable): udev-151-10.fc13.x86_64 How reproducible: Always Steps to Reproduce: 1. plug in e.g. an IO-warrior40 device 2. see that no acl is set for the currently logged in user(s) 3. Additional info: This is similar to Bug 45642 once submitted by me, but that was the hal solution. You could also use the more crude /etc/security/console.perms.d/ approach. Patch: Add this to /lib/udev/rules.d/70-acl.rules ----------- # IOWarrior SUBSYSTEM=="usb", ATTRS{idVendor}=="07c0", ATTRS{idProduct}=="1500", ENV{ACL_MANAGE}="1" ----------- (And the same for idProduct 1501, 1503, 1511 and 1512, which are other USB IOWarrior devices; there may be even more)
Hmm, please put this rule in your private /etc/udev/rules.d/70-iowarrior-acl.rules We cannot permit general access by default. This is your private config.
Well, that's what I did actually. But I don't agree with the fact that it should be in private config. I see no difference between a iowarrior device and e.g. a USB music player or e.g. DVB stick: the user that can physically plug it in should be able to use it. That's of course not a technical issue, so it can be discussed...