12-03-2010
u might not have execute permission. check!!
10 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
hi , i added ls -F to .profile. and i need to do ./.profile for the effect to take effect BUT i didnt and YET the next day when i came to work and log in, the changes took effect. i am on aix.
please explain..
thanks (4 Replies)
Discussion started by: yls177
4 Replies
2. Shell Programming and Scripting
Hello,
I got this question which tells me to customize my login script. Some people in the forums suggested to modify the .profile file in my home directory. I did so, but none of my customizations show up when I open the terminal after.
So, I tried to modify other files in my home directory,... (1 Reply)
Discussion started by: Hyunkel
1 Replies
3. Infrastructure Monitoring
Hello
I really wonder what's trap in etc/profile and in each user .profile.
I try to google for it but I think I have no luck. Mostly hit is SNMP traps which I think it is not the same thing.
I want to know ...
1. What's a "trap 2 3" means and are there any other value I can set... (4 Replies)
Discussion started by: Smith
4 Replies
4. Shell Programming and Scripting
During batch processing the following error occurs and will stop the process, ~environment_name/.profile : not found. The error happens randomly. Any ideas? (6 Replies)
Discussion started by: dlhinpgh
6 Replies
5. AIX
hello all
i just installed my 1rst 6.1 machine and it's working fine but i can't find the root .profile ?????
can any one help
BEst Regards (1 Reply)
Discussion started by: islam.said
1 Replies
6. UNIX for Dummies Questions & Answers
Hi All,
I just have a small question. I was wondering what would happen if there was no .profile file. I understand that the aliases and my path related commands wouldnt work, however i wanted to know if i would still be able to use the ls,cp,mv.... commands without a .profile file. If... (3 Replies)
Discussion started by: raghu_shekar
3 Replies
7. UNIX for Advanced & Expert Users
Hello All,
I create an oracle user, on my Solaris OS.
i modified my .profile file on the oracle home.
the problem that each time i want my variables to work, ORACLE_HOME, ORACLE_BASE ...
i have to run the .profile file (. ./.profile) and each time i exit the terminal i have to run again so... (7 Replies)
Discussion started by: beayni33
7 Replies
8. Shell Programming and Scripting
Hi,
I have a machine running Solaris 9. We are having a application user login.
While connecting using putty in telnet directly we will give the application name in username field and it wont prompt for password and directly it will open the application menu. The executable for the application... (1 Reply)
Discussion started by: sol_user
1 Replies
9. UNIX for Dummies Questions & Answers
Hi there, I am really new to unix (about 3 days using it). In my assignment spec i have been told to modify my .profile file and create an environmental file.
Until now all tasks have been file manipulation, etc learn how to use chmod or grep etc.
I literally can't find this .profile file, I... (1 Reply)
Discussion started by: paulbuckley221
1 Replies
10. UNIX for Dummies Questions & Answers
Hi
where to see my .profile file in unix
thanks
Dharma (2 Replies)
Discussion started by: na.dharma
2 Replies
LEARN ABOUT OPENDARWIN
access
ACCESS(2) BSD System Calls Manual ACCESS(2)
NAME
access -- check access permissions of a file or pathname
SYNOPSIS
#include <unistd.h>
int
access(const char *path, int mode);
DESCRIPTION
The access() function checks the accessibility of the file named by path for the access permissions indicated by mode. The value of mode is
the bitwise inclusive OR of the access permissions to be checked (R_OK for read permission, W_OK for write permission and X_OK for exe-
cute/search permission) or the existence test, F_OK. All components of the pathname path are checked for access permissions (including
F_OK).
The real user ID is used in place of the effective user ID and the real group access list (including the real group ID) are used in place of
the effective ID for verifying permission.
Even if a process has appropriate privileges and indicates success for X_OK, the file may not actually have execute permission bits set.
Likewise for R_OK and W_OK.
RETURN VALUES
If path cannot be found or if any of the desired access modes would not be granted, then a -1 value is returned; otherwise a 0 value is
returned.
ERRORS
Access to the file is denied if:
[ENOTDIR] A component of the path prefix is not a directory.
[ENAMETOOLONG] A component of a pathname exceeded {NAME_MAX} characters, or an entire path name exceeded {PATH_MAX} characters.
[ENOENT] The named file does not exist.
[ELOOP] Too many symbolic links were encountered in translating the pathname.
[EROFS] Write access is requested for a file on a read-only file system.
[ETXTBSY] Write access is requested for a pure procedure (shared text) file presently being executed.
[EACCES] Permission bits of the file mode do not permit the requested access, or search permission is denied on a component of the
path prefix. The owner of a file has permission checked with respect to the ``owner'' read, write, and execute mode bits,
members of the file's group other than the owner have permission checked with respect to the ``group'' mode bits, and all
others have permissions checked with respect to the ``other'' mode bits.
[EFAULT] Path points outside the process's allocated address space.
[EIO] An I/O error occurred while reading from or writing to the file system.
[EINVAL] An invalid value was specified for mode.
SEE ALSO
chmod(2), stat(2)
STANDARDS
The access() function conforms to ISO/IEC 9945-1:1990 (``POSIX.1'').
CAVEAT
Access() is a potential security hole and should never be used.
4th Berkeley Distribution April 1, 1994 4th Berkeley Distribution