Sponsored Content
Full Discussion: protection schemes
Special Forums Hardware Filesystems, Disks and Memory protection schemes Post 46338 by kduffin on Tuesday 13th of January 2004 09:44:04 PM
Old 01-13-2004
Mattyboy,

Your question sounds like homework as do your other posts. Please read the forum rules.

As for an example of setting an extended ACL:

/usr/bin/setfacl -s user:user4991:r-x,user::rwx,group::---,mask:r-x,other:---, /path/to/some/file

Read the manpage for setfacl.

Cheers,

Keith
 

6 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

Override protection.....

I am having this problem......when I run this script: print -n "Enter file name to be deleted: " read answer if then rm $name else echo "No such file with the name: $name exists" fi I was trying to test my script for errors, and basically when the user had files with the rights: 400,... (1 Reply)
Discussion started by: Makaveli.2003
1 Replies

2. Cybersecurity

spam and protection?

Hello, Long time ago we used to suffer from relay and users using your own mailservers to spam but thanks god for auth-before-pop. But now i'm facing small problem with someone which us he is spaning using whatever mailserver with your@email.address.com and when these emails go to unknown... (10 Replies)
Discussion started by: Bashar
10 Replies

3. Shell Programming and Scripting

override protection 644 (yes/no)?

Hi pls help me out to short out this problem rm PAB113_011.out rm: PAB113_011.out: override protection 644 (yes/no)? n If i give y it remove the file. But i added the rm command as a part of ksh file and i tried to remove the file. Its not removing and the the file prompting as... (9 Replies)
Discussion started by: sri_aue
9 Replies

4. Shell Programming and Scripting

File Protection and Security

Since I'm just new in unix, can I ask the experts on how I can develop or enhance a unix utility in protecting or securing a file using scripts. Im thinking chmod, is it enought? or are there other utilities in unix? My algorithm is like there will be a menu that shows a list of types of... (2 Replies)
Discussion started by: imjustjong
2 Replies

5. Linux

file security/protection

Hi All I am working on a site to help newbie to learn linux for free. demo.freelinuxconsole.info there is only one file index.php its been able to rename or deleted. Kindly let me know what permissions should i give to secure this file from editing or deleting by others. (8 Replies)
Discussion started by: smithjack
8 Replies

6. Shell Programming and Scripting

Script protection against changes

Hi everyone, I´m trying to protect the scripts I have made from changes. At my office I´m the one who research improvements on daily tasks, and I´ve done many scripts, that I share with my partners.I´m tired because they take my scripts and make their owns with new features that don´t share... (4 Replies)
Discussion started by: dover07
4 Replies
PKEY_ALLOC(2)						     Linux Programmer's Manual						     PKEY_ALLOC(2)

NAME
pkey_alloc, pkey_free - allocate or free a protection key SYNOPSIS
#include <sys/mman.h> int pkey_alloc(unsigned long flags, unsigned long access_rights); int pkey_free(int pkey); DESCRIPTION
pkey_alloc() allocates a protection key (pkey) and allows it to be passed to pkey_mprotect(2). The pkey_alloc() flags is reserved for future use and currently must always be specified as 0. The pkey_alloc() access_rights argument may contain zero or more disable operations: PKEY_DISABLE_ACCESS Disable all data access to memory covered by the returned protection key. PKEY_DISABLE_WRITE Disable write access to memory covered by the returned protection key. pkey_free() frees a protection key and makes it available for later allocations. After a protection key has been freed, it may no longer be used in any protection-key-related operations. An application should not call pkey_free() on any protection key which has been assigned to an address range by pkey_mprotect(2) and which is still in use. The behavior in this case is undefined and may result in an error. RETURN VALUE
On success, pkey_alloc() returns a positive protection key value. On success, pkey_free() returns zero. On error, -1 is returned, and errno is set appropriately. ERRORS
EINVAL pkey, flags, or access_rights is invalid. ENOSPC (pkey_alloc()) All protection keys available for the current process have been allocated. The number of keys available is architec- ture-specific and implementation-specific and may be reduced by kernel-internal use of certain keys. There are currently 15 keys available to user programs on x86. This error will also be returned if the processor or operating system does not support protection keys. Applications should always be prepared to handle this error, since factors outside of the application's control can reduce the number of available pkeys. VERSIONS
pkey_alloc() and pkey_free() were added to Linux in kernel 4.9; library support was added in glibc 2.27. CONFORMING TO
The pkey_alloc() and pkey_free() system calls are Linux-specific. NOTES
pkey_alloc() is always safe to call regardless of whether or not the operating system supports protection keys. It can be used in lieu of any other mechanism for detecting pkey support and will simply fail with the error ENOSPC if the operating system has no pkey support. The kernel guarantees that the contents of the hardware rights register (PKRU) will be preserved only for allocated protection keys. Any time a key is unallocated (either before the first call returning that key from pkey_alloc() or after it is freed via pkey_free()), the kernel may make arbitrary changes to the parts of the rights register affecting access to that key. EXAMPLE
See pkeys(7). SEE ALSO
pkey_mprotect(2), pkeys(7) COLOPHON
This page is part of release 4.15 of the Linux man-pages project. A description of the project, information about reporting bugs, and the latest version of this page, can be found at https://www.kernel.org/doc/man-pages/. Linux 2018-02-02 PKEY_ALLOC(2)
All times are GMT -4. The time now is 12:58 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy