Sponsored Content
Top Forums UNIX for Dummies Questions & Answers changing default file permissions Post 93222 by FredSmith on Friday 16th of December 2005 01:23:16 PM
Old 12-16-2005
changing default file permissions

How can I change the default permissions that are assigned when I create a file? (By default the file has: -rw-r--r-- ..... I'd like it to be -rw-r-----

How can I change this default behavior?
 

10 More Discussions You Might Find Interesting

1. Shell Programming and Scripting

changing file permissions

Use the following to Change permission of fileB (fileB could be fileB*) to change its permission same as the permission of fileA. chmod `ls -l fileA | awk '{pr int "u+", substr($1,2,1), substr($1,3,1), substr($1,4,1), ",g+", substr($1,5,1), substr($1,6,1), substr($1,7,1), ",o+",... (0 Replies)
Discussion started by: gagansharma
0 Replies

2. UNIX for Advanced & Expert Users

Changing file permissions on upload

Hello ! When I connect to a RH FTP server, the files I transfer (from my "windows computer") to this server have the following permissions : -rw------- but I would like those files to have the following permissions : - rw-rw-r-x How can I do that ??? :) Thanks for your help ! G. (6 Replies)
Discussion started by: guix
6 Replies

3. UNIX for Advanced & Expert Users

Changing default permissions -without "umask"-...

Hi! My question is this: Is it possible to change the default permissions in UNIX (666 for files and 777 for directories)?. I am not talking about using the command "umask". I mean, with the command "umask" you can modify permissions from a default permissions x. Is it possible to make... (4 Replies)
Discussion started by: chicoGuapo
4 Replies

4. UNIX for Dummies Questions & Answers

Changing file permissions

Is there a way to change a unix user's default file permissions so that when he creates a file, by default permissions are 777??? Thanks! (7 Replies)
Discussion started by: FredSmith
7 Replies

5. UNIX for Dummies Questions & Answers

changing permissions on a 444 file (ie chmod 444)

if I have a file set to permisions 444 (r-- r-- r--) should anyone other than the owner and root be able to change these permissions or delete the file. Apologies if this is a no-brainer but I cant test it myself and someone in our organisation is playin around with files they shouldnt be (1 Reply)
Discussion started by: ajcannon
1 Replies

6. Cybersecurity

changing /cn@0:console file permissions

I'm doing a security sweep of a Sun Sol 5.8 system. The file: /dev/console, which links to /devices/pseudo/cn@0:console, has the following perms: crw--w--w- I would like to get rid of the world write permissions. I can change the file permissions, but as soon as log back in, they are changed... (4 Replies)
Discussion started by: ErnieG
4 Replies

7. Shell Programming and Scripting

HELP changing file permissions

does anyone know how to write a script that will change file permissions. because the Admin blocked me from altering any of my files im only allowed to read and i heard a script like this can bypass it but i dont know how to write it. Display current users. Display user Ids only. Display... (10 Replies)
Discussion started by: live2learn
10 Replies

8. Homework & Coursework Questions

changing permissions of a file whos name was passed to 755

Use and complete the template provided. The entire template must be completed. If you don't, your post may be deleted! 1. The problem statement, all variables and given/known data: Write a shell script that gives a passed file the "755" access permissions. The shell script should: Change... (0 Replies)
Discussion started by: anix007
0 Replies

9. Homework & Coursework Questions

changing permissions of a file whos name was passed to 755

Use and complete the template provided. The entire template must be completed. If you don't, your post may be deleted! 1. The problem statement, all variables and given/known data: Write a shell script that gives a passed file the "755" access permissions. The shell script should: Change... (5 Replies)
Discussion started by: anix007
5 Replies

10. Shell Programming and Scripting

Changing file permissions of a file created by another user

Hi, I have used expdp for datapump. The .dmp file is created by the "oracle" user. my requirement is to make a zipped file of this .dmp file. What i am trying to do is change the permissions of this .dmp file from 0640 to 0644 and then do a gzip and zip it. Is there any way i can change... (3 Replies)
Discussion started by: qwertyu
3 Replies
pset_create(2)							System Calls Manual						    pset_create(2)

NAME
pset_create() - create a processor set SYNOPSIS
DESCRIPTION
The function creates an empty processor set with no processors. Processor sets allow a subset of processors in the system to be isolated for exclusive use by specified threads and processes. Only the threads bound to a processor set can execute on processors in that proces- sor set. The binding of threads and processes to processor sets is controlled by the function (see pset_bind(2)). A unique identifier is assigned to the new processor set created by the function, and is returned to the caller in the memory location pointed to by newpset. This value is valid only if the function return value is zero. A processor can be assigned to a processor set by the function. A processor may not belong to more than one processor set at a time. There may be an implementation dependent limit on the maximum number of processor sets that may exist (created and not destroyed) at any given time. Any user may create a new processor set with the function. However, special permissions are needed to populate a processor set with pro- cessors (see pset_assign(2)), to execute applications in a processor set (see pset_bind(2)), or to destroy a processor set (see pset_destroy(2)). There may be a per user limit on how many processor sets that users without the privilege may own. Every processor set is assigned ownership and access permission attributes. The creator of a processor set becomes the default owner of the processor set. The READ, WRITE, and EXEC access permissions are defined for processor sets for three access modes -- Owner, Group, and Others -- similar to the UNIX file system access permissions. The READ permission allows the caller to query about processor set configuration, the WRITE permission allows the caller to change processor set configuration and attributes, and the EXEC permission allows the caller to execute on processors in the processor set. The function may be used to change the ownership and access permissions, whereas the function may be used to query the current ownership and access permissions. A system default processor set is created at system initialization time and cannot be destroyed. The default processor set is always owned by the user with UID 0 and has the processor set ID of Processor 0 is always assigned to the default processor set and cannot be reassigned to another processor set. Note on Hyper-Threading On systems with the hyper-threading capability enabled at the firmware level, each hyper-thread represents a logical processor (LCPU). Since the logical processors in the same physical processor core share common resources, interfaces dealing with workload migration or pro- cessor migration must operate at the physical processor core granularity. The following is a list of processor set attributes and their default values at processor set creation time (see pset_getattr(2)): Indicates the behavior on a request to bind a process or a thread to a processor set that does not contain any processors. By default, such a request will be rejected. GID of processor set's owner group. The creator's gid is assigned by default. A flag to indicate if processors in the set are configured to receive external I/O interrupts or not. All processors by default are made available to receive interrupts. Indicates the behavior on a request to remove the last processor from a processor set. By default, all processes/threads assigned to the processor set are reassigned to the default processor set and the processor is reassigned as requested. On a system with the hyper-threading feature enabled, the LCPU attribute indicates whether or not the processor cores in a processor set are enabled with logical processors (LCPU). By default, the default processor set's attribute value is inherited at the time of creation. The non-default processor set's can be modified by but the default processor set's can only be modified by the dynamic kernel tunable command, Indicates the behavior on a request to destroy a non-empty processor set. The non-empty processor set refers to one that has at least one processor assigned to it. By default, all processors and processes/threads assigned to the processor set are reassigned to the system default processor set, and the processor set is destroyed. UID of the processor set owner. The processor set creator is the default owner. Access permissions for the processor set. By default, the processor set owner has all permissions, whereas group and others have only READ and EXEC permissions. Processor sets define a scheduling allocation domain for threads and processes. All threads may execute only on processors within the assigned processor set. The kernel load balancers work within the processor set boundary. There is no load balancing across the processor set boundary although users can explicitly migrate threads and processes from one processor set to another by using the function. The POSIX RTSCHED scheduler (see rtsched(2)) no longer works at the system level; its scheduling domain is restricted to the processor set boundary. System daemon threads created in the kernel are not restricted to a user defined processor set configuration. They may run on any proces- sor in the system as necessary. Use with to see if the processor set functionality is supported by the underlying HP-UX operating system version. Security Restrictions Some or all of the actions associated with this system call require the privilege. Processes owned by the superuser have this privilege. Processes owned by other users may have this privilege, depending on system configuration. See privileges(5) for more information about privileged access on systems that support fine-grained privileges. EXAMPLES
Create a new processor set: RETURN VALUE
returns zero on successful completion. Otherwise, -1 is returned and is set to indicate the error. ERRORS
fails if one or more of the following is true: The user has reached the per user limit on how many processor sets a user without the privilege may own. The memory location pointed to by newpset is not writable by the user. The memory location pointed to by newpset is Processor sets cannot be created on a uniprocessor system. The user does not have necessary permissions to create a new processor set. A new processor set cannot be created at this time due to lack of necessary system resources. The processor set functionality is not supported by the underlying HP-UX version. SEE ALSO
kctune(1M), psrset(1M), pset_assign(2), pset_bind(2), pset_ctl(2), pset_destroy(2), pset_getattr(2), pset_setattr(2), rtsched(2), sysconf(2), privgrp(4), privileges(5). pset_create(2)
All times are GMT -4. The time now is 01:23 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy