02-18-2009
Permission denied message for parent directory
Hi All,
I have an issue that's eating my head for few days. I would appreciate if anyone could help me out in this to resolve this.
In Solaris 8 container I am facing the below issue.
As oracle user when I do ls -l in /dboracle mountpoint getting permission denied error messages.
$ ls -la
./..: Permission denied
total 8
drwxrwx--- 8 oracle dba 1024 Feb 18 16:14 .
drwxrwxr-x 6 oracle dba 1024 Jan 30 15:36 admin
drwxrwxr-x 2 oracle dba 96 Jan 27 15:28 lost+found
drwxrwxr-x 6 oracle dba 96 Feb 18 06:23 orabase
drwxrwxr-x 6 oracle dba 1024 Feb 17 14:07 oracle
drwxr-xr-x 5 oracle dba 1024 Feb 18 11:50 software
drwxrwxr-x 3 oracle dba 96 Jan 2 06:01 tools
$ id
uid=1000047(oracle) gid=90(dba)
$ pwd
/dboracle
$ ls -ld
drwxrwx--- 8 oracle dba 1024 Feb 18 16:14 .
Thanks
Sreerag
10 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
i'm trying to set up my internet connection and i was told i need to edit the file
/etc/ppp/pap-secrets
but i get a permission denied message...why?? (6 Replies)
Discussion started by: justchillin
6 Replies
2. UNIX for Dummies Questions & Answers
I'll start off by saying that I know very little about Unix - however, I do know that I have a .profile file in my home directory, and that I should be able to invoke it by typing . profile. However, when I do this for ANY .filename, I get ".: Permission denied". I'm pretty sure that there is... (12 Replies)
Discussion started by: bbersani
12 Replies
3. Shell Programming and Scripting
Hi Gurus,
I am new to scripting and needs your help in expect script used for telnet. I wrote a simple script as
#!/usr/bin/expect-5.43 -f
spawn telnet localhost 2233
expect "password:"
send "secret\r"
send "i data.cnbc.com\r"
send "exit\r"
expect eof
When I am trying to execute... (2 Replies)
Discussion started by: niks_yv
2 Replies
4. Programming
Hi guys.
i have wrote a simple program to test message queue attributes. here it is:
#include <stdio.h>
#include <stdlib.h>
#include <mqueue.h>
#include <fcntl.h>
#include <string.h>
#include <errno.h>
#include <sys/stat.h>
int main()
{
struct mq_attr attr;
mqd_t mqd;
... (2 Replies)
Discussion started by: majid.merkava
2 Replies
5. UNIX for Dummies Questions & Answers
Hi,
I am trying to run a shell script which contains an mkdir command as part of the execution. The script fails with the following error:
mkdir: cannot create directory `/builds/somedir/': Permission denied
The user running the script is 'harry' and belongs to group 'school'.... (5 Replies)
Discussion started by: Technext
5 Replies
6. UNIX for Dummies Questions & Answers
Hi there,
I want to restrict a users account to only a subdirectory, but it does not seem to be working.
For example
/dir1/dir2/dir3/dir4
user A is only allowed to do things in dir4. the permission is 777.
i've set the permissions to 700 on dir3, dir2, and dir1 to prevent them from... (3 Replies)
Discussion started by: newbie121
3 Replies
7. Programming
I want to use msgget() to obtain a message queue between two processes, here is my code:
the first one create the mq, the second one open it and add a message to it. But when I execute the second one, I get permission denied. I've already desperately tried everything I can think of to solve this... (2 Replies)
Discussion started by: tefino
2 Replies
8. Red Hat
for incompatibility installation problems, I've decided to reinstall Centos 6.3
as can be seem from the df output, I've partitioned both / and and /home directories
$ df -h
Filesystem Size Used Avail Use% Mounted on
/dev/sda8 12G 5.3G 6.5G 45% /
tmpfs ... (2 Replies)
Discussion started by: jediwannabe
2 Replies
9. UNIX for Beginners Questions & Answers
Asking about the permission inherit from the parent directory
I am running the web app with tomcat8, I did use umask 007 to set permission for folder which enable the sub files and folder inherit the permission from the parent directory, I was successful which some directories but the directories... (1 Reply)
Discussion started by: janecaongoc
1 Replies
10. UNIX for Beginners Questions & Answers
Asking about the permission inherit from the parent directory
I am running the web app with tomcat8, I did use umask 007 to set permission for folder which enable the sub files and folder inherit the permission from the parent directory, I was successful which some directories but the directories... (2 Replies)
Discussion started by: janecaongoc
2 Replies
CHING(6) BSD Games Manual CHING(6)
NAME
ching -- the book of changes and other cookies
SYNOPSIS
ching [hexagram]
DESCRIPTION
The I Ching or Book of Changes is an ancient Chinese oracle that has been in use for centuries as a source of wisdom and advice.
The text of the oracle (as it is sometimes known) consists of sixty-four hexagrams, each symbolized by a particular arrangement of six
straight (---) and broken (- -) lines. These lines have values ranging from six through nine, with the even values indicating the broken
lines.
Each hexagram consists of two major sections. The Judgement relates specifically to the matter at hand (e.g., ``It furthers one to have
somewhere to go.'') while the Image describes the general attributes of the hexagram and how they apply to one's own life (``Thus the
superior man makes himself strong and untiring.'')
When any of the lines have the values six or nine, they are moving lines; for each there is an appended judgement which becomes significant.
Furthermore, the moving lines are inherently unstable and change into their opposites; a second hexagram (and thus an additional judgement)
is formed.
Normally, one consults the oracle by fixing the desired question firmly in mind and then casting a set of changes (lines) using yarrow-stalks
or tossed coins. The resulting hexagram will be the answer to the question.
Using an algorithm suggested by S. C. Johnson, the UNIX oracle simply reads a question from the standard input (up to an EOF) and hashes the
individual characters in combination with the time of day, process id and any other magic numbers which happen to be lying around the system.
The resulting value is used as the seed of a random number generator which drives a simulated coin-toss divination. The answer is then piped
through nroff(1) for formatting and will appear on the standard output.
For those who wish to remain steadfast in the old traditions, the oracle will also accept the results of a personal divination using, for
example, coins. To do this, cast the change and then type the resulting line values as an argument.
The impatient modern may prefer to settle for Chinese cookies; try fortune(6).
DIAGNOSTICS
The great prince issues commands,
Founds states, vests families with fiefs.
Inferior people should not be employed.
SEE ALSO
It furthers one to see the great man.
BUGS
Waiting in the mud
Brings about the arrival of the enemy.
If one is not extremely careful,
Somebody may come up from behind and strike him.
Misfortune.
BSD
May 31, 1993 BSD