I just did it from my own ID (non root), after making the device nodes writable.

[EMAIL PROTECTED]:~ > /sbin/hcp q n
ESAWRITE - DSC , LZSW004Q - DSC , LZSW004T - DSC , LZSW003T - DSC
LZSW003Q - DSC , LZSW002T - DSC , LZSW002Q - DSC , LZSW001T - DSC
LZSD001Q - DSC , LZSD002T - DSC , LZSD001T - DSC , LNXPCDBT - DSC
TXDDR    - DSC , DATAMOV1 - DSC , DATAMOVE - DSC , ESASERVE - DSC
LNXLDAP  - DSC , LNXDDPCT - DSC , LNXDDPC  - DSC , LNXECSST - DSC
LNX401KT - DSC , MPROUTE  - DSC , FTPSERVE - DSC , VMSERVR  - DSC
Ready;

Or is the device driver sensitive to certain commands?

> -----Original Message-----
> From: Ferguson, Neale [mailto:[EMAIL PROTECTED]
> Sent: Tuesday, March 18, 2003 10:27 AM
> To: [EMAIL PROTECTED]
> Subject: Re: [LINUX-390] CP Commands from Linux
>
>
> Yeah, but I wrote the device driver to check who was
> accessing and deny
> non-root users.
>
> Neale
>
> -----Original Message-----
> Well, technically, hcp doesn't care if you're root.  It uses
> some device
> nodes in /dev to communicate with CP.  If those are writable
> by the user, he
> can issue commands via hcp.
>
> So your best bet is to protect:
>
> cpcmd -> cpint8
> cpint0
> cpint220
> cpint8
> cpmon -> cpint220
>

Reply via email to