I just did it from my own ID (non root), after making the device nodes writable.
[EMAIL PROTECTED]:~ > /sbin/hcp q n ESAWRITE - DSC , LZSW004Q - DSC , LZSW004T - DSC , LZSW003T - DSC LZSW003Q - DSC , LZSW002T - DSC , LZSW002Q - DSC , LZSW001T - DSC LZSD001Q - DSC , LZSD002T - DSC , LZSD001T - DSC , LNXPCDBT - DSC TXDDR - DSC , DATAMOV1 - DSC , DATAMOVE - DSC , ESASERVE - DSC LNXLDAP - DSC , LNXDDPCT - DSC , LNXDDPC - DSC , LNXECSST - DSC LNX401KT - DSC , MPROUTE - DSC , FTPSERVE - DSC , VMSERVR - DSC Ready; Or is the device driver sensitive to certain commands? > -----Original Message----- > From: Ferguson, Neale [mailto:[EMAIL PROTECTED] > Sent: Tuesday, March 18, 2003 10:27 AM > To: [EMAIL PROTECTED] > Subject: Re: [LINUX-390] CP Commands from Linux > > > Yeah, but I wrote the device driver to check who was > accessing and deny > non-root users. > > Neale > > -----Original Message----- > Well, technically, hcp doesn't care if you're root. It uses > some device > nodes in /dev to communicate with CP. If those are writable > by the user, he > can issue commands via hcp. > > So your best bet is to protect: > > cpcmd -> cpint8 > cpint0 > cpint220 > cpint8 > cpmon -> cpint220 >
