1 Each file has a set of @dfn{permissions} that control the kinds of
2 access that users have to that file. The permissions for a file are
3 also called its @dfn{access mode}. They can be represented either in
4 symbolic form or as an octal number.
7 * Mode Structure:: Structure of file permissions.
8 * Symbolic Modes:: Mnemonic permissions representation.
9 * Numeric Modes:: Permissions as octal numbers.
13 @section Structure of File Permissions
15 There are three kinds of permissions that a user can have for a file:
19 @cindex read permission
20 permission to read the file. For directories, this means permission to
21 list the contents of the directory.
23 @cindex write permission
24 permission to write to (change) the file. For directories, this means
25 permission to create and remove files in the directory.
27 @cindex execute permission
28 permission to execute the file (run it as a program). For directories,
29 this means permission to access files in the directory.
32 There are three categories of users who may have different permissions
33 to perform any of the above operations on a file:
39 other users who are in the file's group;
44 @cindex owner, default
45 @cindex group owner, default
46 Files are given an owner and group when they are created. Usually the
47 owner is the current user and the group is the group of the directory
48 the file is in, but this varies with the operating system, the
49 file system the file is created on, and the way the file is created. You
50 can change the owner and group of a file by using the @command{chown} and
51 @command{chgrp} commands.
53 In addition to the three sets of three permissions listed above, a
54 file's permissions have three special components, which affect only
55 executable files (programs) and, on some systems, directories:
60 Set the process's effective user ID to that of the file upon execution
61 (called the @dfn{setuid bit}). No effect on directories.
64 Set the process's effective group ID to that of the file upon execution
65 (called the @dfn{setgid bit}). For directories on some systems, put
66 files created in the directory into the same group as the directory, no
67 matter what group the user who creates them is in.
70 @cindex swap space, saving text image in
71 @cindex text image, saving in swap space
72 @cindex restricted deletion flag
73 prevent users from removing or renaming a file in a directory
74 unless they own the file or the directory; this is called the
75 @dfn{restricted deletion flag} for the directory.
76 For regular files on some systems, save the program's text image on the
77 swap device so it will load more quickly when run; this is called the
81 In addition to the permissions listed above, there may be file attributes
82 specific to the file system, e.g: access control lists (ACLs), whether a
83 file is compressed, whether a file can be modified (immutability), whether
84 a file can be dumped. These are usually set using programs
85 specific to the file system. For example:
86 @c should probably say a lot more about ACLs... someday
90 On @acronym{GNU} and @acronym{GNU}/Linux the file permissions
91 (``attributes'') specific to
92 the ext2 file system are set using @command{chattr}.
95 On FreeBSD the file permissions (``flags'') specific to the FFS
96 file system are set using @command{chrflags}.
99 Although a file's permission ``bits'' allow an operation on that file,
100 that operation may still fail, because:
104 the file-system-specific permissions do not permit it;
107 the file system is mounted as read-only.
110 For example, if the immutable attribute is set on a file,
111 it cannot be modified, regardless of the fact that you
112 may have just run @code{chmod a+w FILE}.
115 @section Symbolic Modes
117 @cindex symbolic modes
118 @dfn{Symbolic modes} represent changes to files' permissions as
119 operations on single-character symbols. They allow you to modify either
120 all or selected parts of files' permissions, optionally based on
121 their previous values, and perhaps on the current @code{umask} as well
122 (@pxref{Umask and Protection}).
124 The format of symbolic modes is:
127 @r{[}ugoa@dots{}@r{][}+-=@r{]}@var{perms}@dots{}@r{[},@dots{}@r{]}
131 where @var{perms} is either zero or more letters from the set
132 @samp{rwxXst}, or a single letter from the set @samp{ugo}.
134 The following sections describe the operators and other details of
138 * Setting Permissions:: Basic operations on permissions.
139 * Copying Permissions:: Copying existing permissions.
140 * Changing Special Permissions:: Special permissions.
141 * Conditional Executability:: Conditionally affecting executability.
142 * Multiple Changes:: Making multiple changes.
143 * Umask and Protection:: The effect of the umask.
146 @node Setting Permissions
147 @subsection Setting Permissions
149 The basic symbolic operations on a file's permissions are adding,
150 removing, and setting the permission that certain users have to read,
151 write, and execute the file. These operations have the following
155 @var{users} @var{operation} @var{permissions}
159 The spaces between the three parts above are shown for readability only;
160 symbolic modes cannot contain spaces.
162 The @var{users} part tells which users' access to the file is changed.
163 It consists of one or more of the following letters (or it can be empty;
164 @pxref{Umask and Protection}, for a description of what happens then). When
165 more than one of these letters is given, the order that they are in does
170 @cindex owner of file, permissions for
171 the user who owns the file;
173 @cindex group, permissions for
174 other users who are in the file's group;
176 @cindex other permissions
179 all users; the same as @samp{ugo}.
182 The @var{operation} part tells how to change the affected users' access
183 to the file, and is one of the following symbols:
187 @cindex adding permissions
188 to add the @var{permissions} to whatever permissions the @var{users}
189 already have for the file;
191 @cindex removing permissions
192 @cindex subtracting permissions
193 to remove the @var{permissions} from whatever permissions the
194 @var{users} already have for the file;
196 @cindex setting permissions
197 to make the @var{permissions} the only permissions that the @var{users}
201 The @var{permissions} part tells what kind of access to the file should
202 be changed; it is normally zero or more of the following letters. As with the
203 @var{users} part, the order does not matter when more than one letter is
204 given. Omitting the @var{permissions} part is useful only with the
205 @samp{=} operation, where it gives the specified @var{users} no access
210 @cindex read permission, symbolic
211 the permission the @var{users} have to read the file;
213 @cindex write permission, symbolic
214 the permission the @var{users} have to write to the file;
216 @cindex execute permission, symbolic
217 the permission the @var{users} have to execute the file.
220 For example, to give everyone permission to read and write a file,
221 but not to execute it, use:
227 To remove write permission for all users other than the file's
235 The above command does not affect the access that the owner of
236 the file has to it, nor does it affect whether other users can
237 read or execute the file.
239 To give everyone except a file's owner no permission to do anything with
240 that file, use the mode below. Other users could still remove the file,
241 if they have write permission on the directory it is in.
248 Another way to specify the same thing is:
254 @node Copying Permissions
255 @subsection Copying Existing Permissions
257 @cindex copying existing permissions
258 @cindex permissions, copying existing
259 You can base a file's permissions on its existing permissions. To do
260 this, instead of using a series of @samp{r}, @samp{w}, or @samp{x}
262 operator, you use the letter @samp{u}, @samp{g}, or @samp{o}. For
270 adds the permissions for users who are in a file's group to the
271 permissions that other users have for the file. Thus, if the file
272 started out as mode 664 (@samp{rw-rw-r--}), the above mode would change
273 it to mode 666 (@samp{rw-rw-rw-}). If the file had started out as mode
274 741 (@samp{rwxr----x}), the above mode would change it to mode 745
275 (@samp{rwxr--r-x}). The @samp{-} and @samp{=} operations work
278 @node Changing Special Permissions
279 @subsection Changing Special Permissions
281 @cindex changing special permissions
282 In addition to changing a file's read, write, and execute permissions,
283 you can change its special permissions. @xref{Mode Structure}, for a
284 summary of these permissions.
286 To change a file's permission to set the user ID on execution, use
287 @samp{u} in the @var{users} part of the symbolic mode and
288 @samp{s} in the @var{permissions} part.
290 To change a file's permission to set the group ID on execution, use
291 @samp{g} in the @var{users} part of the symbolic mode and
292 @samp{s} in the @var{permissions} part.
294 To change a file's permission to set the restricted deletion flag or sticky bit,
295 omit the @var{users} part of the symbolic mode (or use @samp{a}) and put
296 @samp{t} in the @var{permissions} part.
298 For example, to add set-user-ID permission to a program,
299 you can use the mode:
305 To remove both set-user-ID and set-group-ID permission from
306 it, you can use the mode:
312 To set the restricted deletion flag or sticky bit, you can use
319 The combination @samp{o+s} has no effect. On @acronym{GNU} systems
320 the combinations @samp{u+t} and @samp{g+t} have no effect, and
321 @samp{o+t} acts like plain @samp{+t}.
323 The @samp{=} operator is not very useful with special permissions; for
331 does set the restricted deletion flag or sticky bit, but it also
332 removes all read, write, and execute permissions that users not in the
333 file's group might have had for it.
335 @node Conditional Executability
336 @subsection Conditional Executability
338 @cindex conditional executability
339 There is one more special type of symbolic permission: if you use
340 @samp{X} instead of @samp{x}, execute permission is affected only if the
341 file is a directory or already had execute permission.
343 For example, this mode:
350 gives all users permission to search directories, or to execute files if
351 anyone could execute them before.
353 @node Multiple Changes
354 @subsection Making Multiple Changes
356 @cindex multiple changes to permissions
357 The format of symbolic modes is actually more complex than described
358 above (@pxref{Setting Permissions}). It provides two ways to make
359 multiple changes to files' permissions.
361 The first way is to specify multiple @var{operation} and
362 @var{permissions} parts after a @var{users} part in the symbolic mode.
364 For example, the mode:
371 gives users other than the owner of the file read permission and, if
372 it is a directory or if someone already had execute permission
373 to it, gives them execute permission; and it also denies them write
374 permission to the file. It does not affect the permission that the
375 owner of the file has for it. The above mode is equivalent to
383 The second way to make multiple changes is to specify more than one
384 simple symbolic mode, separated by commas. For example, the mode:
391 gives everyone permission to read the file and removes write
392 permission on it for all users except its owner. Another example:
399 sets all of the non-special permissions for the file explicitly. (It
400 gives users who are not in the file's group no permission at all for
403 The two methods can be combined. The mode:
410 gives all users permission to read the file, and gives users who are in
411 the file's group permission to execute it, as well, but not permission
412 to write to it. The above mode could be written in several different
419 @node Umask and Protection
420 @subsection The Umask and Protection
422 @cindex umask and modes
423 @cindex modes and umask
424 If the @var{users} part of a symbolic mode is omitted, it defaults to
425 @samp{a} (affect all users), except that any permissions that are
426 @emph{set} in the system variable @code{umask} are @emph{not affected}.
427 The value of @code{umask} can be set using the
428 @code{umask} command. Its default value varies from system to system.
430 @cindex giving away permissions
431 Omitting the @var{users} part of a symbolic mode is generally not useful
432 with operations other than @samp{+}. It is useful with @samp{+} because
433 it allows you to use @code{umask} as an easily customizable protection
434 against giving away more permission to files than you intended to.
436 As an example, if @code{umask} has the value 2, which removes write
437 permission for users who are not in the file's group, then the mode:
444 adds permission to write to the file to its owner and to other users who
445 are in the file's group, but @emph{not} to other users. In contrast,
453 ignores @code{umask}, and @emph{does} give write permission for
454 the file to all users.
457 @section Numeric Modes
459 @cindex numeric modes
460 @cindex file permissions, numeric
461 @cindex octal numbers for file modes
463 alternative to giving a symbolic mode, you can give an octal (base 8)
464 number that represents the new mode.
465 This number is always interpreted in octal; you do not have to add a
466 leading 0, as you do in C. Mode 0055 is the same as mode 55.
468 A numeric mode is usually shorter than the corresponding symbolic
469 mode, but it is limited in that it cannot take into account a file's
470 previous permissions; it can only set them absolutely.
472 The permissions granted to the user,
473 to other users in the file's group,
474 and to other users not in the file's group each require three
475 bits, which are represented as one octal digit. The three special
476 permissions also require one bit each, and they are as a group
477 represented as another octal digit. Here is how the bits are arranged,
478 starting with the lowest valued bit:
481 Value in Corresponding
484 Other users not in the file's group:
489 Other users in the file's group:
500 1000 Restricted deletion flag or sticky bit
501 2000 Set group ID on execution
502 4000 Set user ID on execution
505 For example, numeric mode 4755 corresponds to symbolic mode
506 @samp{u=rwxs,go=rx}, and numeric mode 664 corresponds to symbolic mode
507 @samp{ug=rw,o=r}. Numeric mode 0 corresponds to symbolic mode