Sponsored Content
Full Discussion: Revision Control System
Top Forums UNIX for Advanced & Expert Users Revision Control System Post 302763363 by Don Cragun on Wednesday 30th of January 2013 01:12:31 AM
Old 01-30-2013
You may be seeing an entirely different issue. You didn't say which UNIX System you were using. On Solaris systems, the set-GID bit in the permissions of a directory controls whether newly created files in that directory will be assigned the group-ID of the creating process or the group-ID of the containing directory. This could happen any time when the file system on which your source files reside is being provided by a Solaris server.
 

7 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

Raid control vs scsi for operating system

I was trying to get a server using a raid controller card up and running. I could not get the card configured right so i just installed the system strait onto a scsi drive. Questions? Is is nescessary to have the operating system on raid? Pros/Cons Is it really difficult to go back later... (1 Reply)
Discussion started by: macdonto
1 Replies

2. Solaris

Control system

I want to check system memory Usage of CPU and disk and report number of free disk block in Sun Solaris How can I do Help me thks (2 Replies)
Discussion started by: iwbasts
2 Replies

3. Programming

Revision Control Sw

Hi All, Please let me know any freeware revision control software name and URL. Any response is highly appreciated. OS: Solaris 5.10 Thanks, Naga:cool: (3 Replies)
Discussion started by: Nagapandi
3 Replies

4. Solaris

Who has "Solaris 10 Advanced System Administration(SA-202-S10)" latest revision doc?

Dear All, I am going to examine SA202 but I got SA-202-S10 revision A.1 so it might be out of date. Who has "Solaris 10 Advanced System Administration(SA-202-S10)" latest revision document? Could you share it ? Thank you in advance (2 Replies)
Discussion started by: unitipon
2 Replies

5. Shell Programming and Scripting

Operating System Revision Level

Hi i am trying to find the operating system revsion level and know i can use the 'uname -a' commmand i just wanted to know what part of the output displays this? Also what command can i use to display the cpu run queue? (1 Reply)
Discussion started by: warlock129
1 Replies

6. Solaris

root password for system maintenance (control-d to bypass)

I have message "root password for system maintenance (control-d to bypass)" after Solaris 10 boots up. Why it appears ? thx for help. (3 Replies)
Discussion started by: presul
3 Replies

7. AIX

/tmp/man18809436: Invalid file system control data detected

/tmp/man18809436: Invalid file system control data detected Help me what do I do? Если знаете русскии, пишите на нем. (2 Replies)
Discussion started by: islily
2 Replies
mkdir(2)							System Calls Manual							  mkdir(2)

NAME
mkdir - make a directory file SYNOPSIS
DESCRIPTION
The system call creates a new directory file named by path. The file permission bits of the new directory are initialized from mode, and are modified by the process's file mode creation mask. For each bit set in the process's file mode creation mask, the corresponding bit in the new directory's mode is cleared (see umask(2)). The directory's owner ID is set to the process's effective-user-ID. If the set-group-ID bit of the parent directory is set, the direc- tory's group ID is set to the group ID of the parent directory. Otherwise, the directory's group ID is set to the process's effective- group-ID. The set-group-ID bit of the new directory is set to the same value as the set-group-ID bit of the parent directory. Symbolic constants defining the access permission bits are found in the header and are used to construct the argument mode. The value of the argument mode is the bitwise inclusive OR of the values of the desired permissions. Read by owner. Write by owner. Execute (search) by owner. Read by group. Write by group. Execute (search) by group. Read by others (that is, anybody else). Write by others. Execute (search) by others. Access Control Lists - HFS File Systems Only On HFS file systems implementing access control lists, the directory is created with three base ACL entries, corresponding to the file access permission bits (see acl(5)). Access Control Lists - JFS File Systems Only On JFS file systems that support access control lists, optional ACL entries are created corresponding to the parent directory's default ACL entries. Also, the parent directory's default ACL entries are copied as the new directory's default ACL entries (see aclv(5)). RETURN VALUE
returns one of the following values: Successful completion. Failure. An error code is stored in ERRORS
If fails, no directory is created and is set to one of the following values: A component of the path prefix denies search permission. The parent directory of the new directory denies write permission. User's or group's disk quota block or inode limit has been reached for this file system. The named file already exists. path points outside the process's allocated address space. The reliable detection of this error is implementation dependent. An I/O error occurred while writing to the file system. Too many symbolic links are encountered in translating the path name. The maximum number of links to the parent directory, would be exceeded. The length of the specified path name exceeds bytes, or the length of a component of the path name exceeds bytes while is in effect. A component of the path prefix does not exist. Not enough space on the file system. A component of the path prefix is not a directory. The named file resides on a read-only file system. AUTHOR
was developed by the University of California, Berkeley. SEE ALSO
acl(2), chmod(2), setacl(2), stat(2), umask(2), acl(5), aclv(5), limits(5). STANDARDS CONFORMANCE
mkdir(2)
All times are GMT -4. The time now is 11:34 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy