Sponsored Content
Operating Systems Solaris Unable to chmod a file/directory Post 302145783 by Perderabo on Thursday 15th of November 2007 06:11:34 AM
Old 11-15-2007
What does this command show:
ppriv -e -D chmod +w local/
 

10 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

directory permissions and CHMOD

I am working on a new UNIX box that has been delivered to us, and noticed that the /home directory has 555 permissions on it (dr-xr-xr-x). Any attempt to create write permissions fails on this directory (such as chmod 777), responding only with a message; chmod: WARNING: can't change home ... (3 Replies)
Discussion started by: ncarmstrong
3 Replies

2. UNIX for Dummies Questions & Answers

what to chmod to write in a directory?

i am unable to write to some .php files in the following directory: drwxr-xr-x 3 headroom max 448 Jun 6 2004 Docs i already tried this: chmod +777 Docs chmod: changing permissions of `Docs': Operation not permitted thanks for your help! (2 Replies)
Discussion started by: phonedog365
2 Replies

3. UNIX for Dummies Questions & Answers

chmod erased a directory(?)

I was attempting to change permissions on a directory, used a 'chmod -rwrwrw DirectoryName' command, and hit enter. Now, that directory shows that it's empty! How could this be? Any Ideas? Thanks (1 Reply)
Discussion started by: SmooBG
1 Replies

4. Shell Programming and Scripting

Unable to see all file in a current directory

Hi, I am unable to see all files in a current directory when use "ls -lrt" command it is giving error message as below ( I think this current directory is having about 500 files) <CONTROL /home/ckanth/sri>ls -lrt UX:ls: ERROR: Out of memory: Insufficient or invalid memory But when i... (3 Replies)
Discussion started by: srikanthus2002
3 Replies

5. UNIX for Advanced & Expert Users

unable to create any directory that uses numbers as the directory name

Version-Release number of selected component (if applicable): ================================================================== root@server # cat /etc/redhat-release Red Hat Enterprise Linux ES release 4 (Nahant Update 5) root@server # uname -a Linux server.integrityserver.net... (16 Replies)
Discussion started by: fed.linuxgossip
16 Replies

6. UNIX for Dummies Questions & Answers

rm: Unable to remove directory /mnt/users/test/logs/: File exists

rm: Unable to remove directory /mnt/users/test/logs/: File exists ls -latr total 191208 drwxrwxrwx 6 test echo 4096 Jul 3 22:36 .. -rwxrwxrwx 1 test echo 97692804 Jul 3 22:36 .nfsDFA4 drwxrwxr-x 2 test echo 4096 Jul 3 23:00 . M not able to delete... (4 Replies)
Discussion started by: solitare123
4 Replies

7. Programming

chmod:No such file or directory

sprintf(fname, "core.%d", pid); (void) unlink(fname); if (ttrace(TT_PROC_CORE, pid, 0, 0, 0, 0) != 0) { perror("TT_PROC_CORE pass"); Fail(); } if (chmod(fname, 0) != 0) { perror("chmod"); Fail(); } Hi, If i execute above code,everytime am getting below... (1 Reply)
Discussion started by: mansa
1 Replies

8. UNIX and Linux Applications

What is the difference between chmod in solaris and chmod in Linux?

i think it is the same in both... Iam i right? (1 Reply)
Discussion started by: sumaiya
1 Replies

9. Red Hat

chmod only immediate directory?

I am having trouble figuring out how to do a "chmod o-w" for all files under a certain directory, while excluding directories under that certain directory. I can do chmod -R o-w /thisdirectory but that changes permissions of all directories under the directory as well as files. I just... (2 Replies)
Discussion started by: austinharris43
2 Replies

10. Shell Programming and Scripting

excluding a directory with chown, chmod

does anyone know how to exclude a directory with chown or chmod? im trying to do something like this chown $username:$username $directory/* chown $username:$username $directory/.* chown $username:$username $directory and find $directory/* -type f -exec... (1 Reply)
Discussion started by: vanessafan99
1 Replies
ppriv(1)																  ppriv(1)

NAME
ppriv - inspect or modify process privilege sets and attributes SYNOPSIS
/usr/bin/ppriv -e [-D | -N] [-s spec] command [arg...] /usr/bin/ppriv [-v] [-S] [-D | -N] [-s spec] [pid | core] ... /usr/bin/ppriv -l [-v] [privilege-specification...] The first invocation of the ppriv command runs the command specified with the privilege sets and flags modified according to the arguments on the command line. The second invocation examines or changes the privilege state of running process and core files. The third invocation lists the privileges defined and information about specified privileges or privileges set specifications. The following options are supported: -D Turns on privilege debugging for the processes or command supplied. -e Interprets the remainder of the arguments as a command line and runs the command line with specified privilege attributes and sets. -l Lists all currently defined privileges on stdout. -N Turns off privilege debugging for the processes or command supplied. -s spec Modifies a process's privilege sets according to spec, a specification with the format [AEILP][+-=]privsetspec, containing no spa- ces, where: AEILP Indicates one or more letters indicating which privilege sets to change. These are case insensitive, for example, either a or A indicates all privilege sets. +-= Indicates a modifier to respectively add (+), remove (-), or assign (=) the listed privileges to the specified set(s) in privsetspec. privsetspec Indicates a comma-separated privilege set specification (priv1,priv2, and so on), as described in priv_str_to_set(3C). Modifying the same set with multiple -s options is possible as long as there is either precisely one assignment to an individual set or any number of additions and removals. That is, assignment and addition or removal for one set are mutually exclusive. -S Short. Reports the shortest possible output strings for sets. The default is portable output. See priv_str_to_set(3C). -v Verbose. Reports privilege sets using privilege names. The ppriv utility examines processes and core files and prints or changes their privilege sets. ppriv can run commands with privilege debugging on or off or with fewer privileges than the invoking process. When executing a sub process, the only sets that can be modified are L and I. Privileges can only be removed from L and I as ppriv starts with P=E=I. ppriv can also be used to remove privileges from processes or to convey privileges to other processes. In order to control a process, the effective set of the ppriv utility must be a super set of the controlled process's E, I, and P. The utility's limit set must be a super set of the target's limit set. If the target's process uids do not match, the {PRIV_PROC_OWNER} privilege must be asserted in the utility's effective set. If the controlled processes have any uid with the value 0, more restrictions may exist. See privileges(5). Example 1: Obtaining the Process Privileges of the Current Shell example$ ppriv $$ 387: -sh flags = <none> E: basic I: basic P: basic L: all Example 2: Removing a Privilege From Your Shell's Inheritable and Effective set example$ ppriv -s EI-proc_session $$ The subprocess can still inspect the parent shell but it can no longer influence the parent because the parent has more privileges in its Permitted set than the ppriv child process: example$ truss -p $$ truss: permission denied: 387 example$ ppriv $$ 387: -sh flags = <none> E: basic,!proc_session I: basic,!proc_session P: basic L: all Example 3: Running a Process with Privilege Debugging example$ ppriv -e -D cat /etc/shadow cat[418]: missing privilege "file_dac_read" (euid = 21782), needed at ufs_access+0x3c cat: cannot open /etc/shadow The privilege debugging error messages are sent to the controlling terminal of the current process. The "needed at" address specification is an artifact of the kernel implementation and it can be changed at any time after a software update. The system call number can be mapped to a system call using /etc/name_to_sysnum. Example 4: Listing the Privileges Available in the Current Zone This example lists the privileges available in the current zone (see zones(5)). When run in the global zone, all defined privileges are listed. example$ ppriv -l zone ... listing of all privileges elided ... Example 5: Examining a Privilege Aware Process The following example examines a privilege aware process: example$ ppriv -S `pgrep rpcbind` 928: /usr/sbin/rpcbind flags = PRIV_AWARE E: net_privaddr,proc_fork,sys_nfs I: none P: net_privaddr,proc_fork,sys_nfs L: none See setpflags(2) for explanations of the flags. The following exit values are returned: 0 Successful operation. non-zero An error has occurred. /proc/* Process files /etc/name_to_sysnum system call name to number mapping See attributes(5) for descriptions of the following attributes: +-----------------------------+-----------------------------+ | ATTRIBUTE TYPE | ATTRIBUTE VALUE | +-----------------------------+-----------------------------+ |Availability |SUNWesu | +-----------------------------+-----------------------------+ |Interface Stability |See below. | +-----------------------------+-----------------------------+ The invocation is Evolving. The output is Unstable. gcore(1), truss(1), setpflags(2), priv_str_to_set(3C), proc(4), attributes(5), privileges(5), zones(5) 15 Mar 2005 ppriv(1)
All times are GMT -4. The time now is 08:54 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy