1 .\" Copyright (c) 2006, 2008, Michael Kerrisk <mtk.manpages@gmail.com>
2 .\" (A few fragments remain from an earlier (1992) version written in
3 .\" 1992 by Drew Eckhardt <drew@cs.colorado.edu>.)
5 .\" %%%LICENSE_START(VERBATIM)
6 .\" Permission is granted to make and distribute verbatim copies of this
7 .\" manual provided the copyright notice and this permission notice are
8 .\" preserved on all copies.
10 .\" Permission is granted to copy and distribute modified versions of this
11 .\" manual under the conditions for verbatim copying, provided that the
12 .\" entire resulting derived work is distributed under the terms of a
13 .\" permission notice identical to this one.
15 .\" Since the Linux kernel and libraries are constantly changing, this
16 .\" manual page may be incorrect or out-of-date. The author(s) assume no
17 .\" responsibility for errors or omissions, or for damages resulting from
18 .\" the use of the information contained herein. The author(s) may not
19 .\" have taken the same level of care in the production of this manual,
20 .\" which is licensed free of charge, as they might when working
23 .\" Formatted or processed versions of this manual, if unaccompanied by
24 .\" the source, must acknowledge the copyright and authors of this work.
27 .\" Modified by Michael Haardt <michael@moria.de>
28 .\" Modified Sat Jul 24 12:51:53 1993 by Rik Faith <faith@cs.unc.edu>
29 .\" Modified Tue Oct 22 22:39:04 1996 by Eric S. Raymond <esr@thyrsus.com>
30 .\" Modified Thu May 1 06:05:54 UTC 1997 by Nicolás Lichtmaier
31 .\" <nick@debian.com> with Lars Wirzenius <liw@iki.fi> suggestion
32 .\" 2006-05-13, mtk, substantial rewrite of description of 'mask'
33 .\" 2008-01-09, mtk, a few rewrites and additions.
34 .TH UMASK 2 2021-03-22 "Linux" "Linux Programmer's Manual"
36 umask \- set file mode creation mask
39 .B #include <sys/stat.h>
41 .BI "mode_t umask(mode_t " mask );
45 sets the calling process's file mode creation mask (umask) to
47 & 0777 (i.e., only the file permission bits of
49 are used), and returns the previous value of the mask.
54 and other system calls that create files
55 .\" e.g., mkfifo(), creat(), mknod(), sem_open(), mq_open(), shm_open()
56 .\" but NOT the System V IPC *get() calls
57 to modify the permissions placed on newly created files or directories.
58 Specifically, permissions in the umask are turned off from
66 Alternatively, if the parent directory has a default ACL (see
68 the umask is ignored, the default ACL is inherited,
69 the permission bits are set based on the inherited ACL,
70 and permission bits absent in the
72 argument are turned off.
73 For example, the following default ACL is equivalent to a umask of 022:
77 Combining the effect of this default ACL with a
79 argument of 0666 (rw-rw-rw-), the resulting file permissions would be 0644
82 The constants that should be used to specify
87 The typical default value for the process umask is
88 .I S_IWGRP\ |\ S_IWOTH
90 In the usual case where the
98 S_IRUSR | S_IWUSR | S_IRGRP | S_IWGRP | S_IROTH | S_IWOTH
102 (octal 0666) when creating a new file, the permissions on the
103 resulting file will be:
107 S_IRUSR | S_IWUSR | S_IRGRP | S_IROTH
111 (because 0666 & \(ti022 = 0644; i.e., rw\-r\-\-r\-\-).
113 This system call always succeeds and the previous value of the mask
116 POSIX.1-2001, POSIX.1-2008, SVr4, 4.3BSD.
118 A child process created via
120 inherits its parent's umask.
121 The umask is left unchanged by
124 It is impossible to use
126 to fetch a process's umask without at the same time changing it.
129 would then be needed to restore the umask.
130 The nonatomicity of these two steps provides the potential
131 for races in multithreaded programs.
133 Since Linux 4.7, the umask of any process can be viewed via the
136 .IR /proc/[pid]/status .
137 Inspecting this field in
138 .IR /proc/self/status
139 allows a process to retrieve its umask without at the same time changing it.
141 The umask setting also affects the permissions assigned to POSIX IPC objects
147 and UNIX domain sockets
149 created by the process.
150 The umask does not affect the permissions assigned
151 to System\ V IPC objects created by the process (using