Open System Services System Calls Reference Manual (G06.28+, H06.05+)

stat(2) OSS System Calls Reference Manual
modication time. The st_atime eld indicates the last time the le was opened, and the
st_ctime eld is set equal to st_mtime. No other time-related elds are updated by OSS function
calls.
The st_ctime and st_atime elds for Guardian regular disk les (except for EDIT les) are
updated by OSS function calls, not by Guardian procedure calls.
The time elds for /G, /G/vol, and /G/vol/subvol always contain the current time.
When the path parameter points to the name of a Guardian process that is not a process of sub-
type 30, the stat() function call fails. The value -1 is returned, and errno is set to [ENOENT].
The stat() function always returns access modes of "d---------" when the
path parameter points to
a Guardian subvolume that has a reserved name beginning with ZYQ. The other access modes
reported for les in /G vary according to the le type.
The next table shows the mapping between Guardian les and their corresponding le types
described in the st_mode eld.
Guardian st_mode
Example in /G File Type File Type Permissions
___________________________________________________________________
N/A Directory r-xr-xr-x/G
vol Disk volume Directory rwxrwxrwx
vol/subvol Subvolume Directory rwxrwxrwx
vol/subvol/leid Disk le Regular le See following text
vol/#123 Temporary disk le Regular le See following text
ztnt Subtype 30 process Directory --x--x--x
ztnt/#pty0001 Subtype 30 process
with qualier
Character special rw-rw-rw-
vol1/zyq00001 Subvolume Directory ---------
A Guardian le classied as a directory is always owned by the super ID.
Guardian permissions are mapped as follows:
Guardian network or any user permission is mapped to OSS other per-
mission.
Guardian community or group user permission is mapped to OSS group
permission.
Guardian user or owner permission is mapped to OSS owner permission.
Guardian super ID permission is mapped to OSS super ID permission.
Guardian read permission is mapped to OSS read permission.
Guardian write permission is mapped to OSS write permission.
Guardian execute permission is mapped to OSS execute permission.
Guardian purge permission is ignored.
Users are not allowed read access to Guardian processes.
OSS le permissions are divided into three groups (owner, group, and other) of
three permission bits each (read, write, and execute). The OSS permission bits
do not distinguish between remote and local users as Guardian security does;
local and remote users are treated alike.
7388 Hewlett-Packard Company 527186-007