Issue opened upstream: https://github.com/uutils/coreutils/issues/8068
** Description changed: This was found while investigating FTBFS in util-linux (https://launchpadlibrarian.net/797485933/buildlog_ubuntu-questing- amd64.util-linux_2.41-4ubuntu1_BUILDING.txt.gz). This is triggered by this test: tests/ts/lsfd/mkfds-multiplexing This test was skipped with GNU coreutils, because at some point, `cat` fails (with reason) to read a file: https://github.com/util-linux/util-linux/blob/35128888075ade600413092214b62acf3601ead9/tests/ts/lsfd/mkfds-multiplexing#L49-L55 With uutils coreutils, the test is not skipped, but fails for unclear reasons. It boils down to this very easy reproducer: cat /proc/$$/syscall GNU coreutils output: skia@noble:/$ cat /proc/$$/syscall cat: /proc/208/syscall: Operation not permitted skia@noble:/$ echo $? 1 uutils coreutils output: skia@questing:/$ cat /proc/$$/syscall skia@questing:/$ echo $? 0 + + `strace cat /proc/$$/syscall` clearly shows that `read()` return EPERM with both binaries: + ... + read(3, 0x7ffd4ef80798, 65536) = -1 EPERM (Operation not permitted) + ... ** Bug watch added: github.com/uutils/coreutils/issues #8068 https://github.com/uutils/coreutils/issues/8068 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2112552 Title: cat doesn't handle EPERM To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/rust-coreutils/+bug/2112552/+subscriptions -- ubuntu-bugs mailing list [email protected] https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
