IEEE Standards Interpretation for IEEE Std 1003.1™-2001 IEEE Standard Standard for Information Technology -- Portable Operating System Interface (POSIX(R))
Copyright © 2006 by the Institute of Electrical and Electronics Engineers, Inc. 3 Park Avenue New York, New York 10016-5997 USA All Rights Reserved.
Interpretations are issued to explain and clarify the intent of a standard and do not constitute an alteration to the original standard. In addition, interpretations are not intended to supply consulting information. Permission is hereby granted to download and print one copy of this document. Individuals seeking permission to reproduce and/or distribute this document in its entirety or portions of this document must contact the IEEE Standards Department for the appropriate license. Use of the information contained in this document is at your own risk.
IEEE Standards Department Copyrights and Permissions 445 Hoes Lane, Piscataway, New Jersey 08855-1331, USA
Interpretation Request #45
Topic: access X_OK Relevant Sections: XSH access
7 Defect Report concerning (number and title of International Standard or DIS final text, if applicable):
The System Interfaces Volume of IEEE Std 1003-2011
8 Qualifier (e.g. error, omission, clarification required):
9 References in document (e.g. page, clause, figure, and/or table numbers):
Page: 99 Line: 3766 Section: access
XSHbug2.txt Enhancement Request Nunmber 12
10 Nature of defect (complete, concise explanation of the perceived problem):
Defect code : 1. Error
The statement "If the process has appropriate privileges, an implementation may indicate success for X_OK ..." incorrectly implies that, when privileges are associated with user IDs, it applies to the effective user ID instead of the real user ID.
11 Solution proposed by the submitter (optional):
Change "If the process has appropriate privileges" to "For implementations where appropriate privileges are associated with user IDs, if the real user ID has appropriate privileges".
Interpretation Response #45
The standards states the requirements for access(), and conforming implementations must conform to this. However, concerns have been raised about this which are being referred to the sponsor.
Rationale for Interpretation