Here is the surprise:
I updated the facl of the directory nowI can see the effective permission of that user "ydarwish" is rwx. However the user is not being able to create a file inside it.
i want to replace the *alloc and free function calls in an existing project with my own functions, to be able to log the adresses etc in a text file. (memoryleak debugging)
I think LD_PRELOAD is what i am looking for.
That way i could create a Library with my own malloc functions and link them... (1 Reply)
Hi,
I have come across a fact that /etc/resolv.conf can be overrided by using ~/.nslookuprc.
Is this completely true...i.e can I completely override /etc/resolv.conf.
If so, can I have a list of my own domainnames & Nameservers in ~/.nslookuprc that can override those in resolv.conf.
... (3 Replies)
Hi,
I wonder how can we override the dynamic library loaded by ld on start up.(dynamic linked application). so that linker uses the new library to find symbols.
Is it possible to do.
Cheers. (4 Replies)
Hello,
I'm using Sun solaris .
I'm trying to override the environmental variable in my script, however when I execute the script, the PATH whatever being set in .profile is taking precedence.
I have done the sanity checks like order of my entry in path, permissions for the user etc.,
To... (1 Reply)
class B
{
public:
void fns(void){//base def;}
};
class D:public B
{
public:
void fns(void) {//new def;}
};
I was thinking the above is overriding but somewhere else i found the above is just hiding.Only virtual functions can be considered as overriding?
This is the exact statement ... (1 Reply)
Hi All,
I have an XML file (normally >3mb). I need to loop through this and override with some new (correct) values.
Here is a row of data:-
<row>
<field name="ID">1</field>
<field name="Type">a</field>
<field name="value1">xxx</field>
<field name="value2">xxxx</field>
....... (3 Replies)
Hi Experts,
I'm using samba -3.6.1 on Red Hat Enterprise Linux ES release 4 (Nahant Update 8) ,all seems ok. The issue im facing is as follows.
When ever a user creates a file via windows explorer the permissions assgined to the file are as follows
-rw-rwxr--+ 1 tom group2 0 Mar 9... (1 Reply)
Hello All,
I am working on a project where the requirement is override mailx command in such way that, instead of sending mailing to email addresses coded in codes, it should send mails to one common email address at run time.
We do not intend to change the email addresses in codes.
This... (1 Reply)
I am executing a shell script which contains a jar call to an external java package for which I don’t have a read access to. The external package was written in such a way that whenever we make a java –jar call to the package, it shows a prompt on the console asking if we want to continue or no... (1 Reply)
Discussion started by: Harry1302
1 Replies
LEARN ABOUT DEBIAN
dpns-setacl
DPNS-SETACL(1) DPNS User Commands DPNS-SETACL(1)NAME
dpns-setacl - set DPNS directory/file access control lists
SYNOPSIS
dpns-setacl [-d] [-m] [-s] acl_entries path...
DESCRIPTION
dpns-setacl sets the Access Control List associated with a DPNS directory/file.
acl_entries is a comma separated list of entries. Each entry has colon separated fields: ACL type, id (uid or gid), permission. Only direc-
tories can have default ACL entries.
The entries look like:
user::perm
user:uid:perm
group::perm
group:gid:perm
mask:perm
other:perm
default:user::perm
default:user:uid:perm
default:group::perm
default:group:gid:perm
default:mask:perm
default:other:perm
The ACL type can be abbreviated to the first letter. The first "user" entry gives the permissions granted to the owner of the file. The
following "user" entries show the permissions granted to specific users, they are sorted in ascending order of uid. The first "group"
entry gives the permissions granted to the group owner of the file. The following "group" entries show the permissions granted to specific
groups, they are sorted in ascending order of gid. The "mask" entry is the maximum permission granted to specific users or groups. It
does not affect the "owner" and "other" permissions. The "mask" entry must be present if there are specific "user" or "group" entries.
"default" entries associated with a directory are inherited as access ACL by the files or sub-directories created in that directory. The
umask is not used. Sub-directories also inherit the default ACL as default ACL. As soon as there is one default ACL entry, the 3 default
ACL base entries (default user, default group, default other) must be present.
The entry processing conforms to the Posix 1003.1e draft standard 17.
The effective user ID of the process must match the owner of the file or the caller must have ADMIN privilege in the Cupv database.
path specifies the DPNS pathname. If path does not start with /, it is prefixed by the content of the DPNS_HOME environment variable.
uid can be given as the username or the corresponding numeric id.
gid can be given as the groupname or the corresponding numeric id.
perm can be expressed as a combination of characters rwx- or as a value between 0 and 7.
OPTIONS -d remove ACL entries. The "perm" field is ignored.
-m modify existing ACL entries or add new entries.
-s set the ACL entries. The complete set of ACL entries is replaced.
EXAMPLES
Let's create a directory:
dpns-mkdir /dpm/dteam/test/file.log/d6
and add write permission for user bcouturi:
dpns-setacl -m u:bcouturi:rwx,m:rwx /dpm/dteam/test/file.log/d6
Let's create a directory:
dpns-mkdir /dpm/dteam/test/file.log/d7
and add default ACLs to it:
dpns-setacl -m d:u::7,d:g::7,d:o:5 /dpm/dteam/test/file.log/d7
Let's check the resulting ACLs:
dpns-getacl /dpm/dteam/test/file.log/d7
# file: /dpm/dteam/test/file.log/d7
# owner: baud
# group: c3
user::rwx
group::r-x #effective:r-x
other::r-x
default:user::rwx
default:group::rwx
default:other::r-x
Let's create a sub-directory and check the resulting ACLs:
dpns-mkdir /dpm/dteam/test/file.log/d7/d2
dpns-getacl /dpm/dteam/test/file.log/d7/d2
# file: /dpm/dteam/test/file.log/d7/d2
# owner: baud
# group: c3
user::rwx
group::rwx #effective:rwx
other::r-x
default:user::rwx
default:group::rwx
default:other::r-x
Let's create a file in the same directory and check the resulting ACLs:
dpns-touch /dpm/dteam/test/file.log/d7/f2
dpns-getacl /dpm/dteam/test/file.log/d7/f2
# file: /dpm/dteam/test/file.log/d7/f2
# owner: baud
# group: c3
user::rw-
group::rw- #effective:rw-
other::r--
EXIT STATUS
This program returns 0 if the operation was successful or >0 if the operation failed.
SEE ALSO Castor_limits(4), dpns_chmod(3), dpns_chown(3), Cupvlist(1)AUTHOR
LCG Grid Deployment Team
DPNS $Date: 2003/08/26 06:21:13 $ DPNS-SETACL(1)