Sponsored Content
Top Forums UNIX for Dummies Questions & Answers changing default file permissions Post 93222 by FredSmith on Friday 16th of December 2005 01:23:16 PM
Old 12-16-2005
changing default file permissions

How can I change the default permissions that are assigned when I create a file? (By default the file has: -rw-r--r-- ..... I'd like it to be -rw-r-----

How can I change this default behavior?
 

10 More Discussions You Might Find Interesting

1. Shell Programming and Scripting

changing file permissions

Use the following to Change permission of fileB (fileB could be fileB*) to change its permission same as the permission of fileA. chmod `ls -l fileA | awk '{pr int "u+", substr($1,2,1), substr($1,3,1), substr($1,4,1), ",g+", substr($1,5,1), substr($1,6,1), substr($1,7,1), ",o+",... (0 Replies)
Discussion started by: gagansharma
0 Replies

2. UNIX for Advanced & Expert Users

Changing file permissions on upload

Hello ! When I connect to a RH FTP server, the files I transfer (from my "windows computer") to this server have the following permissions : -rw------- but I would like those files to have the following permissions : - rw-rw-r-x How can I do that ??? :) Thanks for your help ! G. (6 Replies)
Discussion started by: guix
6 Replies

3. UNIX for Advanced & Expert Users

Changing default permissions -without "umask"-...

Hi! My question is this: Is it possible to change the default permissions in UNIX (666 for files and 777 for directories)?. I am not talking about using the command "umask". I mean, with the command "umask" you can modify permissions from a default permissions x. Is it possible to make... (4 Replies)
Discussion started by: chicoGuapo
4 Replies

4. UNIX for Dummies Questions & Answers

Changing file permissions

Is there a way to change a unix user's default file permissions so that when he creates a file, by default permissions are 777??? Thanks! (7 Replies)
Discussion started by: FredSmith
7 Replies

5. UNIX for Dummies Questions & Answers

changing permissions on a 444 file (ie chmod 444)

if I have a file set to permisions 444 (r-- r-- r--) should anyone other than the owner and root be able to change these permissions or delete the file. Apologies if this is a no-brainer but I cant test it myself and someone in our organisation is playin around with files they shouldnt be (1 Reply)
Discussion started by: ajcannon
1 Replies

6. Cybersecurity

changing /cn@0:console file permissions

I'm doing a security sweep of a Sun Sol 5.8 system. The file: /dev/console, which links to /devices/pseudo/cn@0:console, has the following perms: crw--w--w- I would like to get rid of the world write permissions. I can change the file permissions, but as soon as log back in, they are changed... (4 Replies)
Discussion started by: ErnieG
4 Replies

7. Shell Programming and Scripting

HELP changing file permissions

does anyone know how to write a script that will change file permissions. because the Admin blocked me from altering any of my files im only allowed to read and i heard a script like this can bypass it but i dont know how to write it. Display current users. Display user Ids only. Display... (10 Replies)
Discussion started by: live2learn
10 Replies

8. Homework & Coursework Questions

changing permissions of a file whos name was passed to 755

Use and complete the template provided. The entire template must be completed. If you don't, your post may be deleted! 1. The problem statement, all variables and given/known data: Write a shell script that gives a passed file the "755" access permissions. The shell script should: Change... (0 Replies)
Discussion started by: anix007
0 Replies

9. Homework & Coursework Questions

changing permissions of a file whos name was passed to 755

Use and complete the template provided. The entire template must be completed. If you don't, your post may be deleted! 1. The problem statement, all variables and given/known data: Write a shell script that gives a passed file the "755" access permissions. The shell script should: Change... (5 Replies)
Discussion started by: anix007
5 Replies

10. Shell Programming and Scripting

Changing file permissions of a file created by another user

Hi, I have used expdp for datapump. The .dmp file is created by the "oracle" user. my requirement is to make a zipped file of this .dmp file. What i am trying to do is change the permissions of this .dmp file from 0640 to 0644 and then do a gzip and zip it. Is there any way i can change... (3 Replies)
Discussion started by: qwertyu
3 Replies
pset_bind(2)							System Calls Manual						      pset_bind(2)

NAME
pset_bind() - bind process or thread to a processor set SYNOPSIS
DESCRIPTION
The function binds thread(s) or process(es) specified by idtype and id to the processor set pset. If idtype is then id specifies the pid of the process to be assigned, and the binding affects all threads of the process. If idtype is then id specifies the lwpid of the thread to be assigned, and the binding affects only the specified thread. You cannot spec- ify a pthread ID for pthreads in id, an lwpid is required. See in pthread_processor_bind_np(3T) for information on binding pthreads to processor sets. If idtype is then id specifies the effective user ID of all processes to be assigned, and the binding affects all threads in these pro- cesses. The operation is not a "success is all or none" type, because it rebinds as many processes as possible without error. If idtype is then id specifies the process group ID of all processes to be assigned, and the binding affects all threads in these pro- cesses. The operation is not a "success is all or none" type, because it rebinds as many processes as possible without error. All pro- cesses in a process group need not have same access permissions to target processor set. If opset is not it contains the previous processor set binding of the specified thread or process upon successful operation. However, opset is ignored if idtype is or All threads of a process need not be assigned to the same processor set. If id is then idtype identifies the target process(es) or thread(s) to be assigned to pset. The identifies the calling process, whereas identifies the calling thread. The identifies all processes with the effective user ID of the calling process, and identifies all pro- cesses in the process group of the calling process. If pset is or the system default processor set is the target processor set. If pset is the processor set binding is not changed, the current processor set's processor set ID is returned in opset. If idtype is or request has no meaning. No special access privileges are needed for operation. If pset is the same as the current processor set for the specified process or thread, the operation is considered a request. The system daemon processes are not restricted to any user defined processor sets. They may execute on any processor in the system irre- spective of the processor set configuration a user may have set up. The processor set binding of system daemon processes may not be changed. The operation on system daemon processes returns a special processor set ID of to indicate they are treated differently. Note: The system daemon processes are created in the kernel for kernel activities, and not the user daemon processes that execute in user space. A user with the privilege, or a user with EXEC permission for the processor set pset may affect the binding change. The and functions may be used to set and query the processor set access permissions. See pset_getattr(2)). If the thread or process being assigned to pset has binding to a processor or a locality domain in its current processor set, the binding is reassigned to a processor or locality domain in the new processor set pset. If pset is empty (no processors are assigned as yet), the behavior of function depends on the value of attribute. The default behavior on an attempt to bind a thread or a process to an empty processor set is to fail the request. The child process and its first thread created by a or function inherits the processor set binding from the parent process. The new threads in the multi-threaded process inherits their processor set binding from the creator thread. Security Restrictions Some or all of the actions associated with this system call require the privilege. Processes owned by the superuser have this privilege. Processes owned by other users may have this privilege, depending on system configuration. See privileges(5) for more information about privileged access on systems that support fine-grained privileges. RETURN VALUE
returns the following values: Successful completion. Failure. is set to indicate the error. ERRORS
sets to one of the following values if the corresponding condition occurs. The memory location pointed to by opset is not writable by the user. pset is not valid. idtype or id is not valid. pset is empty and the current setting of processor set attributes does not allow this operation on an empty processor set. The memory location pointed to by opset is NULL and the operation is requested. The processor set functionality is not supported by the underlying HP-UX version. User does not have necessary permissions to bind a thread or a process to specified processor set. The specified thread or process is a system daemon. The specified thread, process, user ID, or process group does not exist. EXAMPLES
Migrate the current thread to another processor set new_pset, and retrive its current processor set in old_pset. SEE ALSO
psrset(1M), fork(2), pset_assign(2), pset_create(2), pset_ctl(2), pset_destroy(2), pset_getattr(2), pset_setattr(2), vfork(2), privgrp(4), privileges(5). pset_bind(2)
All times are GMT -4. The time now is 04:07 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy