Sponsored Content
Operating Systems Solaris Script running even after execute permission removed. Post 302696709 by Rockyc3400 on Wednesday 5th of September 2012 10:21:03 AM
Old 09-05-2012
Hi Corona,

This script is an application for BMC which is not being used. It is an application named Dashboard which is used in BMC.It resides in /opt.

As you mentioned above, ' Scripts without execute permissions can still be sourced.' can you please name few scripts for my knowledge in future.

Thanks
Rocky

---------- Post updated at 09:21 AM ---------- Previous update was at 09:19 AM ----------

Hi Coolboys,

I had earlier done the same as you mentioned it but still it is running.

Regards,
Rocky
 

10 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

No permission to execute file

I am logged in as root and am trying to execute a file called x_cleanup_equdata but keep getting the message ksh: x_cleanup_equdataNEW: 0403-006 Execute permission denied. I did FTP this file from another server using GET, would this make the difference? I tried chmod 666 but still no luck. ... (2 Replies)
Discussion started by: markbeeson
2 Replies

2. Shell Programming and Scripting

without execute permission

how can a script run without execute permissions. when i run myscript as : sh a.sh it was working but when i say simple a.sh its not working since it has no x permission.but how about fist case? (1 Reply)
Discussion started by: Raom
1 Replies

3. Shell Programming and Scripting

Only Execute Permission for Others...

This might be very silly question but i dont know y is it so... i Have script I have Given the permissions in the following manner... -rwxrwx--x 1 root system 3 Jun 08 15:46 temp I want no one to see what is present in that but should be able to execute it.. but when... (3 Replies)
Discussion started by: pbsrinivas
3 Replies

4. UNIX for Advanced & Expert Users

Script without read permission but execute the script

I have a script, except me no one can read the script but they can execute the script. Is it possible? (14 Replies)
Discussion started by: kingganesh04
14 Replies

5. Shell Programming and Scripting

How to execute a script without giving x permission to the file?

How to execute a script with out giving x permission to the file? (7 Replies)
Discussion started by: praveen_b744
7 Replies

6. Shell Programming and Scripting

perl script to check read/write/execute permission for 'others'

I want to check access rights permissions not for 'user', not for 'group', but for 'others'. I want to do it by system command in which i want to use 'ls -l' and 'awk' command. I have written the following program : #!/usr/bin/local/perl #include <stdlib.h> system ("ls -l | awk... (1 Reply)
Discussion started by: shubhamsachdeva
1 Replies

7. Debian

Execute permission problem

Hello, I need to install a program from a DVD. It uses a sh script called setup. root@ragnok: head -2 /media/cdrom0/setup #!/bin/sh root@ragnok: ls -l /media/cdrom0/setup -r-xr-xr-x 1 root root 4688 Nov 8 08:38 /media/cdrom0/setup root@ragnok: /media/cdrom0/setup bash:... (2 Replies)
Discussion started by: snorkack59
2 Replies

8. UNIX for Advanced & Expert Users

Allow user without dir write permission to execute a script that creates files

In our project we have several unix scripts that trigger different processes. These scripts write logs to a particular folder 'sesslogs', create output data files in a separate directory called 'datafiles' etc. Usually L1 support team re-run these scripts . We donot want L1 support team to have... (14 Replies)
Discussion started by: waavman
14 Replies

9. Shell Programming and Scripting

Execute permission for shell script

Hi All, I am not able to figure out what is the problem with calling a shell script within a shell script. i have given all the permissions to both schell scripts. but when i am seeing the log file error is coming like weekly_us_push_rpts_tst.sh: ./vacation_quota_summary_detail.sh: Execute... (9 Replies)
Discussion started by: krupasindhu18
9 Replies

10. Shell Programming and Scripting

Permission denied running shell script in opensuse

Hello, I am having an odd problem in open suse 12. I have a shell script and when I try to run it, I get "permission denied" The permissions from ls -l are, -rw------- 1 user1 users 25904 Jan 10 16:26 script.sh I have tried to change the permissions in dolphin but this does not change the... (5 Replies)
Discussion started by: LMHmedchem
5 Replies
openipmi_conparms(7)					Connection Parameters for OpenIPMI				      openipmi_conparms(7)

NAME
openipmi_cmdparms - Connection parameters for OpenIPMI SYNOPSIS
smi smi-num lan [-U username] [-P password] [-p[2] port] [-A authtype] [-L privilege] [-s] [-Ra auth alg] [-Ri integ alg] [-Rc conf algo] [-Rl] [-Rk bmc key] [-H hackname] host [ host] DESCRIPTION
The connection parameters for OpenIPMI vary depending on the connection type. This document describes the standard connection types; oth- ers may be available from OEMs. OPTIONS
smi-num The SMI interface for the local connection. There may be more than one BMC connection on a system and they are generally numbered, like /dev/ipmi0, /dev/ipmi1, etc. -U username Use the given username for the LAN connection. If none is given, then no username is used. -P password The password to use for the connection. If none is given, the user is assumed to have an empty password -p[2] port The UCP port to connect to. This defaults to the standard 623 port, so it is not necessary unless a special port is required. Note that since you can have two connections (hosts), -p is for the first host and -p2 is for the second host. -A authtype The authentication type to use, one of rmcp+, md5, md2, straight, or none. If you don't supply this, the most secure one available is chosen, in the order given in the previous list. -L privilege The privilege to use for the connection. Lower privileges cannot execute some commands. Privileges are: callback, user, operator, admin, and oem. The default is admin. -Ra authentication algorithm Set the RMCP+ authentication algorithm to use. Options are: bmcpick, rakp_none, rakp_hmac_sha1, and rakp_hmac_md5. The bmcpick option is used by default, which means the BMC picks the algorithm it wants to use. -Ri integrity algorithm The RMCP+ integrity algorithm to use. This ensures that the data has not be altered between the sender and receiver. Valid options are: bmcpick, none, hmac_sha1, hmac_md5, and md5. The bmcpick option is used by default, which means the BMC picks the algorithm it wants to use. -Rc confidentiality algorithm The RMCP+ confidentiality (encryption) algorithm to use. This keeps eavesdroppers from seeing the data. Valid values are: bmcpick, aes_cbc_128, xrc4_128, and xrc_40. The bmcpick option is used by default, which means the BMC picks the algorithm it wants to use. -Rl If this is specified, the username is looked up using the privilege level along with the username. This allows the same name to have different passwords with different privilege levels. -Rk BMC Key If the system requires two-key lookups, this specifies the second key (the BMC key) to use. This is ignored if two-key lookups are not enabled by the BMC. -H hackname Well, it always happens. Things in the field don't work quite like they are supposed to. There was some vagueness in the first IPMI specs and different vendors interpreted RMCP+ in different ways. This allows different options to be supported. Try different hacks if your RMCP+ systems don't authenticate properly. These are: rakp3_wrong_rolem Some systems use the incorrect Role(m) field in a specific authentication message (the RAKP3 message). This is a common problem. rmcpp_integ_sik The original IPMI 2.0 spec specified the incorrect key to use for the integrity key. This forces use of the Session Initia- tion Key. The default is to use K(1) -s Make two connections to the BMC. This means the BMC has two different IP addresses/ports that are equivalent. If this is speci- fied, a second host must be supplied. This is not the same as two connections to two different BMCs. This must be a connection to the same BMC. host The IP address (either by name lookup or specified directly) to connect to. If the -s is specified, two hosts must be supplied. The -Ra, -Ri, -Rc, -Rk and -Rl options only apply to RMCP+ connections and will be ignored if the connection does not support RMCP+ or if a non-RMCP+ authentication type is specified. SEE ALSO
ipmish(8), openipmicmd(8), solterm(1) KNOWN PROBLEMS
This is excessively complicated, but the defaults should be good. AUTHOR
Corey Minyard <cminyard@mvista.org> OpenIPMI 05/13/03 openipmi_conparms(7)
All times are GMT -4. The time now is 01:06 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy