Sponsored Content
Operating Systems Solaris USB Mount issue in Solaris 10 Post 302424382 by Rowley on Tuesday 25th of May 2010 05:47:18 AM
Old 05-25-2010
pcfs has no support for handling owner or group id's, hence you losing you file acl's when you copy across.
 

10 More Discussions You Might Find Interesting

1. Solaris

How to mount USB driver in solaris 8?

Can anyone tell me how to mount the USB driver in solaris 8? I try many time that can't to mount USB driver. It can detect the USB driver by typing #iostat -En but can't mount the driver. (1 Reply)
Discussion started by: kingsan
1 Replies

2. Solaris

mount USB

Ok, I have a rocsecure USB 2.0 hardrive. Currently it is formatted as an NTFS drive. I need to mount it on solaris and move an oracle dmp file onto it. Will I be even able to format it to a PCFS on a solaris 9 machine. Or do I need to format it FAT-32 first on a windows machine? steps ... (3 Replies)
Discussion started by: csaunders
3 Replies

3. Linux

Mount USB memorey

Hi guys i gonna ask a so silly question here, i have a usb memory and i want to mount it in Linux Red Hat 9, its give a message its plugged, and i can see that when i run dmesg command, but i don't know the device name to mount neither the fat32 name in red hat, and its not be mounted in any mount... (3 Replies)
Discussion started by: XP_2600
3 Replies

4. Solaris

How Can I mount usb on Sollaris 8?

Please ... help me... I´m trying to mount usb flash disk in Sollaris 8 but it doesn´t still recognized. Flash´s disk led on but I didn´t mount it... Someone how to solve this problem? thanks... (4 Replies)
Discussion started by: dekkade
4 Replies

5. UNIX for Dummies Questions & Answers

usb mount problem

Hi friends, when i boot into my linux system, i am not able to use my USB device while it works on window. i know mount command but it seems my USB does not detected and when i insert my USB into USB port .. and run fdisk list command it does not show any additional device . normally... (2 Replies)
Discussion started by: johnray31
2 Replies

6. Solaris

solaris 10 errors mount external usb Harddisk zfs on a nas without cdrom

Hi, I try to mount an external USB HD on a solaris 10 without any success. Machine hardware: i86pc OS version: 5.10 Processor type: i386 Hardware: i86pc The HD is a zfs, but I installed this with a Ubuntu 8.10. iostat -En displays this: --> so the system... (0 Replies)
Discussion started by: edubidu
0 Replies

7. Solaris

how to mount USB in SXDE 1/08

hi friends recently i have installed Solaris Express Developers Edition-SXDE 1/08 distribution.Problem is that i dont have network drivers pre-installed in SXDE.So i have to install manually to this i need to mount USB(Jetflash V60-4GB),when i pluged into my system it is showing JEtflash but when... (5 Replies)
Discussion started by: srinivas2828
5 Replies

8. Filesystems, Disks and Memory

Mount USB stick...

Dummies questions, perfect for this. I cannot mount my idiotic usb stick on Slackware, I input the following on non-graphic mode as root: Mount -t vfat /dev/sdc1/usbstick usbstick is the folder i created for mounting my USB, the file system is FAT, and everytime I input that I get some kind... (2 Replies)
Discussion started by: Dax01
2 Replies

9. SCO

Mount USB stick

hi Howto mount an USB stick under SCO 5.0.7? BTW ist it possible to mount USB stick in the command line using 'tools' at the Boot: prompt from OpenServer Release 5.0.7 installation CD? (1 Reply)
Discussion started by: ccc
1 Replies

10. Linux

mount usb

Hi Guys,am unable to mount usb in Cenos..I did all those options.....kindly let me know the commands...as soon as possible... (1 Reply)
Discussion started by: Rajesh_Apple
1 Replies
chacl(1)						      General Commands Manual							  chacl(1)

NAME
chacl - add, modify, delete, copy, or summarize access control lists (ACLs) of files SYNOPSIS
acl file ... acl file ... aclpatt file ... fromfile tofile ... file... DESCRIPTION
extends the capabilities of chmod(1), by enabling the user to grant or restrict file access to additional specific users and/or groups. Traditional file access permissions, set when a file is created, grant or restrict access to the file's owner, group, and other users. These file access permissions (eg., are mapped into three base access control list entries: one entry for the file's owner (umode), one for the file's group g, mode), and one for other users mode). enables a user to designate up to thirteen additional sets of permissions (called optional access control list (ACL) entries) which are stored in the access control list of the file. To use chacl, the owner (or superuser) constructs an acl, a set of (user.group, mode) mappings to associate with one or more files. A spe- cific user and group can be referred to by either name or number; any user (u), group (g), or both can be referred to with a symbol, repre- senting any user or group. The @ symbol specifies the file's owner or group. Read, write, and execute/search modes are identical to those used by chmod; symbolic operators (op) add remove or set access rights. The entire acl should be quoted if it contains whitespace or special characters. Although two variants for constructing the acl are available (and fully explained in acl(5)), the following syntax is suggested: entry[, entry] ... where the syntax for an entry is u.g op mode[op mode] ... By default, modifies existing ACLs. It adds ACL entries or modifies access rights in existing ACL entries. If acl contains an ACL entry already associated with a file, the entry's mode bits are changed to the new value given, or are modified by the specified operators. If the file's ACL does not already contain the specified entry, that ACL entry is added. can also remove all access to files. Giving it a null acl argument means either ``no access'' (when using the option) or ``no changes.'' For a summary of the syntax, run without arguments. If file is specified as reads from standard input. Options recognizes the following options: Replace old ACLs with the given ACL. All optional ACL entries are first deleted from the specified files's ACLs, their base permissions are set to zero, and the new ACL is applied. If acl does not contain an entry for the owner (uthe group g), or other users of a file, that base ACL entry's mode is set to zero (no access). The command affects all of the file's ACL entries, but does not change the file's owner or group ID. In chmod(1), the ``modify'' and ``replace'' operations are distinguished by the syntax (string or octal value). There is no corollary for ACLs because they have a variable number of entries. Hence modifies specific entries by default, and option- ally replaces all entries. Delete the specified entries from the ACLs on all specified files. The aclpatt argument can be an exact ACL or an ACL pattern (see acl(5)). updates each file's ACL only if entries are deleted from it. If you attempt to delete a base ACL entry from any file, the entry remains but its access mode is set to zero (no access). If you attempt to delete a non-existent ACL entry from a file (that is, if an ACL entry pattern matches no ACL entry), informs you of the error, continues, and eventually returns non-zero. Copy the ACL from fromfile to the specified tofile, transferring ownership, if necessary (see acl(5), chown(2), or chownacl(3C)). fromfile can be to represent standard input. This option implies the option. If the owner and group of fromfile are identical to those of tofile, is identical to: To copy an ACL without transferring ownership, the above command is suggested instead of Delete (``zap'') all optional entries in the specified file's ACLs, leaving only base entries. Delete (``zap'') all optional entries in the specified file's ACLs, and set the access modes in all base entries to zero (no access). This is identical to replacing the old ACL with a null ACL: or using chmod(1), which deletes optional entries as a side effect: Incorporate (``fold'') optional ACL entries into base ACL entries. The base ACL entry's permission bits are altered, if necessary, to reflect the caller's effective access rights to the file; all optional entries, if any, are deleted. For ordinary users, only the access mode of the owner base ACL entry can be altered. Unlike the write bit is not turned off for a file on a read-only file system or a shared-text program being executed (see getaccess(1)). For super-users, only the execute mode bit in the owner base ACL entry might be changed, only if the file is not an regular file or if an execute bit is not already set in a base ACL entry mode, but is set in an optional ACL entry mode. acl also can be obtained from a string in a file: Using @ in acl to represent ``file owner or group'' can cause to run more slowly because it must reparse the ACL for each file (except with the option). EXTERNAL INFLUENCES
Environment Variables determines the language in which messages are displayed. If is not specified or is set to the empty string, a default of "C" (see lang(5)) is used instead of If any internationalization variable contains an invalid setting, behaves as if all internationalization variables are set to "C". See environ(5). RETURN VALUE
If succeeds, it returns a value of zero. If encounters an error before it changes any file's ACL, it prints an error message to standard error and returns 1. Such errors include invalid invocation, invalid syntax of acl (aclpatt), a given user name or group name is unknown, or inability to get an ACL from fromfile with the option. If cannot execute the requested operation, it prints an error message to standard error, continues, and later returns 2. This includes cases when a file does not exist, a file's ACL cannot be altered, more ACL entries would result than are allowed, or an attempt is made to delete a non-existing ACL entry. EXAMPLES
The following command adds read access for user in any group, and removes write access for any user in the files's groups, for files and This command replaces the ACL on the file open as standard input and on file with one which only allows the file owner read and write access. Delete from file the specific access rights, if any, for user 165 in group 13. Note that this is different from adding an ACL entry that restricts access for that user and group. The user's resulting access rights depend on the entries remaining in the ACL. The command also deletes all entries for user that have a read bit turned on (the asterisk can be used as a wildcard in the ACL pattern for user, group, or access mode): Copy the ACL from to and Delete the optional ACL entries, if any, on the file open as standard input. Deny all access to all files in the current directory whose names start with or Incorporate the optional ACL entries of a file into the base ACL entries: WARNINGS
An ACL string cannot contain more than 16 unique entries, even though converting @ symbols to user or group names and combining redundant entries might result in fewer than 16 entries for some files. DEPENDENCIES
will fail when the target file resides on a file system which does not support ACLs. NFS Only the option is supported on remote files. AUTHOR
was developed by HP. SEE ALSO
chmod(1), getaccess(1), lsacl(1), getacl(2), setacl(2), acl(5), glossary(9). chacl(1)
All times are GMT -4. The time now is 09:36 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy