02-18-2009
Quote:
Originally Posted by
justsam
Does the user trying to delete the file has enough privileges???
file was owned by me and our group
10 More Discussions You Might Find Interesting
1. Shell Programming and Scripting
Hi all
I currently use the following in shell.
#!/bin/sh
while read LINE
do
perl -i -ne "$/ = ''; print if !m'Using archive: ${LINE}'ms;" "datafile"
done < "listfile"
NOTE the single quote delimiters in the expression. It's highly likely the 'LINE' may very well have characters in it... (3 Replies)
Discussion started by: Festus Hagen
3 Replies
2. Shell Programming and Scripting
I have a control file which looks like this
LOAD DATA
INFILE '/array/data/data_Finished_T5_col_change/home/oracle/emp.dat'
PRESERVE BLANKS
INTO TABLE SCOTT.EMP
FIELDS TERMINATED BY '|' OPTIONALLY ENCLOSED BY '"' TRAILING NULLCOLS
(.................
..................)
How can i edit the... (1 Reply)
Discussion started by: mwrg
1 Replies
3. Solaris
I know how to check if any file has a unix process using a file by looking at 'lsof <fullpath/filename>' command.
I think using lsof is very expensive. Also to make it accurate we need to inlcude fullpath of the file.
Is there another command that can tell if a file has a truely active... (12 Replies)
Discussion started by: kchinnam
12 Replies
4. Homework & Coursework Questions
1. The problem statement, all variables and given/known data:
When looking for corefiles, include any file with core in its name. (Some UNIX/Linux systems add the PID of the process that created the core to reduce the chances of overwriting an already existing core file that might be needed. The... (6 Replies)
Discussion started by: s3270226
6 Replies
5. Shell Programming and Scripting
I have two files
File1
====
1|2000-00-00|2010-02-02||
2| 00:00:00|2012-02-24||
3|2000-00-00|2011-02-02||
File2
====
2000-00-00
00:00:00
I want the delete the patterns which are found in file 2 from file 1,
Expected output:
File1
==== (5 Replies)
Discussion started by: machomaddy
5 Replies
6. Shell Programming and Scripting
Need unix commands to delete records from one file if the same record present in another file...
just like join ... if the record present in both files.. delete from first file or delete the particular record and write the unmatched records to new file..
tried with grep and while... (6 Replies)
Discussion started by: msathees
6 Replies
7. UNIX for Dummies Questions & Answers
Hi All,
I need to delete the oldest file in folder when the file count in the folder exceed 6 ( i have a process that puts the source files into this folder )
E.x : Folder : /data/opt/backup
01/01/2012 a.txt
01/02/2012 b.txt
... (1 Reply)
Discussion started by: akshay01987
1 Replies
8. Shell Programming and Scripting
Hi all
i want to write program with shell script that able compare two file content and if one of lines of file have # at the first of string or nothing find same string in one of two file . remove the line in second file that have not the string in first file. for example:
file... (2 Replies)
Discussion started by: saleh67
2 Replies
9. Red Hat
ENVIROMENT
Linux: Fedora Core release 1 (Yarrow)
iPlanet: iPlanet-WebServer-Enterprise/6.0SP1
Log Path: /usr/iplanet/servers/https-company/logs
I have iPlanet log rotation enabled rotating files on a daily basis.
The rotated logs are NOT compressed & are taking up too much space.
I... (7 Replies)
Discussion started by: zachs
7 Replies
10. UNIX for Dummies Questions & Answers
hi,
I need a help. I used this command to list all the log files which are for more than 10 days to a text file.
find /usr/script_test -type f -mtime +10>>/usr/ftprm.txt
I want all these files listed in the ftprm.txt to be ftp in another machine and then rm the files.
Anyone can help me... (8 Replies)
Discussion started by: kamaldev
8 Replies
LEARN ABOUT HPUX
getprivgrp
getprivgrp(2) System Calls Manual getprivgrp(2)
NAME
getprivgrp(), setprivgrp() - get and set special attributes for group
SYNOPSIS
DESCRIPTION
getprivgrp()
The system call returns a table of the privileged group assignments into a user-supplied structure. grplist points to an array of struc-
tures of type associating a group ID with a privilege mask. Privilege masks are formed by ORing together elements from the access types
specified in The array may have gaps in it, distinguished as having a field value of The group number gives the global privilege mask.
Only information about groups which are in the user's group access list, or about the user's real or effective group ID, is returned to an
ordinary user. The complete set is returned to a user with the privilege.
setprivgrp()
The system call associates a kernel capability with a group ID. This allows subletting of superuser-like privileges to members of a par-
ticular group or groups. takes two arguments: grpid, the integer group ID, and mask, a mask of permissions. The mask is created by treat-
ing the access types defined in as bit numbers (using 1 for the least significant bit). Thus, privilege number 5 would be represented by
the bits or 16. More generally, privilege p is represented by:
where is given 8 bits per byte. As it is possible to have more than word-size distinct privileges, mask is a pointer to an integer array
of size
privileges include those specified in the file A process can access the system call protected by a specific privileged group if it belongs
to or has an effective group ID of a group having access to the system call. All processes are considered to belong to the pseudo-group
Specifying a grpid of causes privileges to be revoked on all privileged groups that have any of the privileges specified in mask. Specify-
ing a grpid of causes privileges to be granted to all processes.
The constant in defines the system limit on the number of groups that can be assigned privileges. One of these is always the psuedo-group
allowing for actual groups.
Only processes with the privilege can use
Security Restrictions
Some or all of the actions associated with this system call require the privilege. Processes owned by the superuser have this privilege.
Processes owned by other users may have this privilege, depending on system configuration. See privileges(5) for more information about
privileged access on systems that support fine-grained privileges.
RETURN VALUE
and return the following values:
Successful completion.
Failure.
is set to indicate the error.
ERRORS
If fails, is set to one of the following values.
grplist points to an illegal address. The reliable detection of this error is implementation dependent.
If fails, is set to one of the following values.
The request would require assigning privileges to more than
groups.
mask points to an illegal address. The reliable detection of this error is implementation dependent.
mask has bits set for one or more unknown privileges.
grpid is out of range.
The caller is not a privileged user.
EXAMPLES
The following example prints out and the group IDs of the privilege groups to which the user belongs:
AUTHOR
and were developed by HP.
SEE ALSO
getprivgrp(1), setprivgrp(1M), setgroups(2), privgrp(4), privileges(5).
getprivgrp(2)