Lines Matching +full:ls +full:- +full:bits
16 .\" Standard for Information Technology -- Portable Operating System
18 .\" Copyright (C) 2001-2004 by the Institute of Electrical and Electronics
50 chmod \- change the permissions mode of a file
54 \fBchmod\fR [\fB-fR\fR] \fIabsolute-mode\fR \fIfile\fR ...
59 \fBchmod\fR [\fB-fR\fR] \fIsymbolic-mode-list\fR \fIfile\fR ...
64 \fBchmod\fR [\fB-fR\fR] \fIacl_operation\fR \fIfile\fR ...
69 \fBchmod\fR [\fB-fR\fR] [\fB-@\fR \fInamed_attribute\fR]...\fIattribute_specification_list\fR \fIfiā¦
78 directories, and to modify boolean read-write system attributes on regular
85 \fBchmod\fR [\fIoptions\fR] \fIabsolute-mode\fR \fIfile\fR ...
88 where \fIabsolute-mode\fR is specified using octal numbers \fInnnn\fR defined
121 directories, the set-gid bit can only be set or cleared by using symbolic mode.
247 \fBg-s\fR).
253 \fBchmod\fR [\fIoptions\fR] \fIsymbolic-mode-list\fR \fIfile\fR ...
256 where \fIsymbolic-mode-list\fR is a comma-separated list (with no intervening
334 If \fBwho\fR is omitted, add the file mode bits represented by
335 \fIpermissions\fR, \fIexcept\fR for the those with corresponding bits in the
338 If \fBwho\fR is present, add the file mode bits represented by the
352 If \fBwho\fR is omitted, clear the file mode bits represented by
353 \fIpermissions\fR, \fIexcept\fR for those with corresponding bits in the file
356 If \fBwho\fR is present, clear the file mode bits represented by
368 If \fBwho\fR is omitted, clear all file mode bits; if \fBwho\fR is present,
369 clear the file mode bits represented by \fBwho\fR.
373 If \fBwho\fR is omitted, add the file mode bits represented by
374 \fIpermissions\fR, \fIexcept\fR for the those with corresponding bits in the
377 If \fBwho\fR is present, add the file mode bits represented by
382 resets all other bits represented by \fBwho\fR. Omitting \fIpermissions\fR is
417 user or group set-ID
491 In a directory which has the set-group-ID bit set (reflected as either
492 \fB-----s---\fR or \fB-----l---\fR in the output of \fB\&'ls -ld'\fR), files
493 and subdirectories are created with the group-ID of the parent directory\(emnot
498 set-group-ID bit and enable a file to be locked on execution at the same time.
509 Only the owner of a file or directory (or the super-user) can change that
510 file's or directory's mode. Only the super-user can set the sticky bit on a
511 non-directory file. If you are not super-user, \fBchmod\fR masks the sticky-bit
512 but does not return an error. In order to turn on a file's set-group-ID bit,
523 chmod [\fIoptions\fR] A[\fInumber\fR]- \fIfile\fR ...
524 chmod [\fIoptions\fR] A-\fIacl_specification\fR \fIfile\fR ...
532 Where \fIacl_specification\fR is a comma-separated list (with no intervening
549 \fB\fBA-\fR\fR
559 \fB\fBA\fIindex\fR\fR-\fR
568 \fB\fBA-\fIacl_specification\fR\fR\fR
601 \fBPOSIX-draft ACL Specification (as supported by UFS)\fR
604 POSIX-draft ACLs (as supported by UFS) are specified as colon (\fB:\fR)
734 user:tom:rw-,mask:rwx,group:staff:r-x
836 letters or the hyphen (\fB-\fR) to identify no permissions.
931 The ability to read basic attributes (non-ACLs) of a file.
1007 arguments similar to the \fBls\fR \fB-V\fR format. The hyphen (\fB-\fR), which
1020 rwx--D--------
1153 positional arguments similar to the \fBls\fR \fB-V\fR format. A hyphen
1171 fd-n---
1211 comma-separated list of one or more \fIattribute_specifications\fR. Each
1237 \fB\fB-\fR\fR
1253 boolean read-write extended system attributes associated with the current file
1271 Set all boolean read-write extended system attributes associated with the
1286 Set each boolean read-write extended system attribute identified by
1301 Set each boolean read-write extended system attribute identified by
1309 Characters\fR later in this section. An arbitrary number of hyphen (\fB-\fR)
1320 A \fIverbose_attribute_setting_list\fR is zero or more comma-separated
1454 \fB\fB-f\fR\fR
1463 \fB\fB-R\fR\fR
1474 \fB\fB-@\fR \fInamed_attribute\fR\fR
1478 file operand instead of the file operand itself. If multiple \fB-@\fR
1498 \fB\fIabsolute-mode\fR\fR
1502 \fB\fIsymbolic-mode-list\fR\fR
1506 Represents the change to be made to the file mode bits of each file named by
1525 \fBA[\fR\fInumber\fR\fB] -\fR
1526 \fBA-\fR\fIacl_specification\fR
1553 A path name of a file whose file mode bits are to be modified.
1570 % chmod a-x \fIfile\fR
1576 \fBExample 2 \fRAllowing \fBread-only\fR Permission
1621 group-ID\fR Permission on a File
1625 the file, and turns on the set group-ID:
1649 $ ls -v file.3
1650 -rw-r--r-- 1 marks staff 0 Oct 9 15:49 file.3
1683 $ ls -v file.3
1684 -rw-r--r--+ 1 marks staff 0 Oct 9 15:49 file.3
1700 \fBExample 7 \fRPrepending a New POSIX-draft ACL Entry on a UFS File
1703 The following example prepends a new POSIX-draft ACL entry on a UFS file.
1712 $ ls -v file.2
1713 -rw-r--r-- 1 marks staff 0 Oct 9 15:52 file.2
1714 0:user::rw-
1715 1:group::r-- #effective:r--
1716 2:mask:r--
1717 3:other:r--
1729 $ chmod A+user:lp:-wx file.2
1741 $ ls -v file.2
1742 -rw-r--r--+ 1 marks staff 0 Oct 9 15:52 file.2
1743 0:user::rw-
1744 1:user:lp:-wx #effective:---
1745 2:group::r-- #effective:r--
1746 3:mask:r--
1747 4:other:r--
1766 % ls -V file.1
1767 -rw-r--r--+ 1 root root 0 Oct 6 12:16 file.1
1768 user:lp:rw------------:-------:allow
1769 owner@:--x-----------:-------:deny
1770 owner@:rw-p---A-W-Co-:-------:allow
1771 group@:-wxp----------:-------:deny
1772 group@:r-------------:-------:allow
1773 everyone@:-wxp---A-W-Co-:-------:deny
1774 everyone@:r-----a-R-c--s:-------:allow
1782 currently in position 3 - 6 to be pushed down.
1803 $ ls -V file.1
1804 -rw-r--r--+ 1 root staff 0 Feb 3 14:13 file.1
1805 user:lp:rw------------:-------:allow
1806 owner@:--x-----------:-------:deny
1807 owner@:rw-p---A-W-Co-:-------:allow
1808 user:marks:r-------------:-------:deny
1809 group@:-wxp----------:-------:deny
1810 group@:r-------------:-------:allow
1811 everyone@:-wxp---A-W-Co-:-------:deny
1812 everyone@:r-----a-R-c--s:-------:allow
1818 \fBExample 9 \fRInserting a POSIX-draft ACL in a Specific Position on a UFS
1828 $ ls -v file.1
1829 -rw-r--r--+ 1 root root 0 Sep 29 16:10 file.1
1830 0:user::rw-
1831 1:user:lp:rw- #effective:r--
1832 2:group::r-- #effective:r--
1833 3:mask:r--
1834 4:other:r--
1847 $ chmod A3+user:marks:rw- file.1
1848 $ ls -v file.1
1849 -rw-r--r--+ 1 root root 0 Sep 29 16:10 file.1
1850 0:user::rw-
1851 1:user:lp:rw- #effective:r--
1852 2:user:marks:rw- #effective:r--
1853 3:group::r-- #effective:r--
1854 4:mask:r--
1855 5:other:r--
1874 $ ls -v file.3
1875 -rw-r--r--+ 1 marks staff 0 Oct 9 15:49 file.3
1893 $ chmod A-user:lp:read_data:deny file.3
1894 $ ls -v file.3
1895 -rw-r--r-- 1 marks staff 0 Oct 9 15:49 file.3
1910 \fBExample 11 \fRRemoving a POSIX-draft ACL on a UFS File
1918 $ ls -v file.2
1919 -rw-r--r--+ 1 marks staff 0 Oct 9 15:52 file.2
1920 0:user::rw-
1921 1:user:lp:-wx #effective:---
1922 2:group::r-- #effective:r--
1923 3:mask:r--
1924 4:other:r--
1932 $ chmod A-user:lp:-wx file.2
1933 $ ls -v file.2
1934 -rw-r--r-- 1 marks staff 0 Oct 9 15:52 file.2
1935 0:user::rw-
1936 1:group::r-- #effective:r--
1937 2:mask:r--
1938 3:other:r--
1952 $ ls -v file
1976 $ chmod A2- file
1977 $ ls -v file
1994 \fBExample 13 \fRRemoving a Specific POSIX-draft ACL Entry on a UFS File
2003 $ ls -v file.1
2004 -rw-r--r--+ 1 root root 0 Sep 29 16:10 file.1
2005 0:user::rw-
2006 1:user:lp:rw- #effective:r--
2007 2:group::r-- #effective:r--
2008 3:mask:r--
2009 4:other:r--
2011 $ chmod A1- file.1
2012 $ ls -v
2013 -rw-r--r--+ 1 root root 0 Sep 29 16:10 file.1
2014 0:user::rw-
2015 1:group::r-- #effective:r--
2016 2:mask:r--
2017 3:other:r--
2026 The following command works with either NFSv4/ZFS or POSIX-draft ACLs.
2035 $ ls -v file.3
2036 -rw-r--r--+ 1 marks staff 0 Oct 9 15:49 file.3
2055 represents the permission bits of the file.
2060 $ chmod A- file.3
2061 $ ls -v file.3
2062 -rw-r--r-- 1 marks staff 0 Oct 9 15:49 file.3
2088 $ ls -v file.4
2089 -rw-rw----+ 1 marks staff 0 Oct 9 16:12 file.4
2098 \fBExample 16 \fRReplacing an Entire POSIX-draft ACL on a UFS File
2108 $ chmod A=user::rw-,group::rw-,other::---,mask:r--,
2109 user:lp:r-- file.3
2110 $ ls -v file.3
2111 -rw-r-----+ 1 root root 0 Oct 9 16:14 file.3
2112 0:user::rw-
2113 1:user:lp:r-- #effective:r--
2114 2:group::rw- #effective:r--
2115 3:mask:r--
2116 4:other:---
2130 $ ls -v file.5
2131 -rw-r--r--+ 1 marks staff 0 Oct 9 16:18 file.5
2154 $ ls -v file.5
2155 -rw-r--r--+ 1 marks staff 0 Aug 23 09:11 file.5
2170 \fBExample 18 \fRReplacing a Specific POSIX-draft ACL on a UFS File
2178 $ ls -v file.4
2179 -rw-r--r--+ 1 marks staff 0 Oct 9 16:21 file.4
2180 0:user::rw-
2181 1:user:lp:rwx #effective:r--
2182 2:group::r-- #effective:r--
2183 3:mask:r--
2184 4:other:r--
2191 Now, change the permission on \fBlp\fR from \fBrwx\fR to \fBr--\fR:
2196 $ chmod A1=user:lp:r-- file.4
2198 $ ls -v file
2199 -rw-r--r--+ 1 marks staff 0 Oct 9 16:21 file.4
2200 0:user::rw-
2201 1:user:lp:r-- #effective:r--
2202 2:group::r-- #effective:r--
2203 3:mask:r--
2204 4:other:r--
2226 $ ls -dv test.dir
2227 drwxr-xr-x+ 2 marks staff 2 Aug 23 09:08 test.dir/
2252 $ ls -v test.dir/file.test
2253 -rw-r--r--+ 1 marks staff 0 Oct 9 16:29 test.dir/file.test
2320 $ chmod S=c{AHRSa-i--u--} file1
2344 $ chmod -@ '..' S=cAHRSaiu file1
2367 $ chmod S-a file1
2379 $ chmod -@ '..' S-a file1
2386 Assuming appropriate privileges, all boolean read-write system attributes are
2400 $ chmod -@ myattr S+vhidden file1
2421 $ chmod -@ '*' S+a file1
2437 $ chmod -@ '..' -@ '*' S+vhidden file1
2458 $ chmod -R -@ '..' -@ '*' S+a directory1
2516 $ chmod S+c{-H-S--------} file1
2528 $ chmod S-v{nohidden,nosystem} file1
2540 $ chmod S-v{hidden,system},+v{hidden,system} file1
2554 $ chmod S-a file1
2591 In this example, the clear attributes operation (\fB-a\fR) clears all system
2597 $ chmod S+vhidden,+vsystem,-a file1
2603 \fBExample 28 \fRSetting the Values of All Boolean read-write System Attributes
2607 The following example sets the values of all boolean read-write system
2608 attributes of a file to the same as the boolean read-write system attributes of
2614 $ chmod S=v`ls -/v file1|sed -n '2s/.*{/{/p'` file2
2684 Absolute changes do not work for the set-group-\fBID\fR bit of a directory. You
2685 must use \fBg+s\fR or \fBg-s\fR.
2702 \fBls\fR(1) command to make sure the appropriate permissions are set for all