home *** CD-ROM | disk | FTP | other *** search
- Newsgroups: comp.os.linux
- Path: sparky!uunet!gatech!bloom-beacon!bloom-picayune.mit.edu!daemon
- From: Kevin W. Hammond <hammond@kwhpc.caseng.com>
- Subject: symlinks in 0.97pl2
- Message-ID: <1992Aug31.020059.21670@athena.mit.edu>
- Sender: daemon@athena.mit.edu (Mr Background)
- Reply-To: hammond@kwhpc.caseng.com
- Organization: The Internet
- Date: Mon, 31 Aug 1992 02:00:59 GMT
- Lines: 24
-
- I just read a message where an individual has a symlink to a file such as:
-
- slink -> executable
-
- and the permissions on executable were 511 (r-x--x--x). When attempting to
- execute slink, the shell would respond with:
-
- slink: Operation not permitted
-
- When the permissions on executable where changed to 555 (r-xr-xr-x), executing
- slink worked fine.
-
- Two things: first, I can confirm this behavior. My 0.97pl2 does the exact same
- think. Second, I do not ever recall seeing a Unix system with regualr executables
- with execute only permission (I take that back, I have seen a couple...but not with
- symlinks to them!) I'll try this on my SunOS system at work tomorrow and see what
- happens.
-
- -kwh-
- --
- Kevin W. Hammond
- hammond@kwhpc.caseng.com
-
- CASE Engineering * 575 W. Madison #1601 * Chicago, IL 60661 * (312)902-2161
-