"Theodoros V. Kalamatianos" <[EMAIL PROTECTED]> writes:

> It seems that my distribution (Mandrake 10.1) in the high security
> mode restricts access to /proc,

Thanks for tracking that down.  Does the following patch fix things
for you?

2005-10-30  Paul Eggert  <[EMAIL PROTECTED]>

        * lib/utimens.c (futimens) [HAVE_WORKING_UTIMES &&
        HAVE_FUTIMES]: Don't assume that futimes failing with errno ==
        EACCES means we must fail.  With /proc mounted, paranoid
        distributions like Mandrake 10.1 in high security mode don't
        allow ordinary users to read /proc, so futimes fails with
        errno == EACCES.  Problem reported by Theodoros
        V. Kalamatianos.

--- lib/utimens.c.~1.10.~       2005-09-26 15:15:28.000000000 -0700
+++ lib/utimens.c       2005-10-30 01:45:21.000000000 -0800
@@ -100,11 +100,13 @@ futimens (int fd ATTRIBUTE_UNUSED,
        return 0;
 
       /* On GNU/Linux without the futimes syscall and without /proc
-        mounted, glibc futimes fails with errno == ENOENT.  Fall back
-        on utimes if we get a weird error number like that.  */
+        mounted, glibc futimes fails with errno == ENOENT.  And with
+        /proc mounted, some paranoid distributions don't allow
+        ordinary users to read /proc, so futimes fails with errno ==
+        EACCES.  Fall back on utimes if we get an error number like
+        that.  */
       switch (errno)
        {
-       case EACCES:
        case EIO:
        case EPERM:
        case EROFS:


_______________________________________________
Bug-coreutils mailing list
[email protected]
http://lists.gnu.org/mailman/listinfo/bug-coreutils

Reply via email to