Original author(s) | AT&T Bell Laboratories |
---|---|
Developer(s) | Various open-source and commercial developers |
Initial release | 3 November 1971 |
Written in | Plan 9: C |
Operating system | Unix, Unix-like, Plan 9, Inferno, IBM i |
Platform | Cross-platform |
Type | Command |
License | coreutils: GPLv3 Plan 9: MIT License |
In Unix and Unix-like operating systems, chmod is the command and system call used to change the access permissions and the special mode flags (the setuid, setgid, and sticky flags) of file system objects (files and directories). Collectively these were originally called its modes, [1] and the name chmod was chosen as an abbreviation of change mode. [2]
A chmod command first appeared in AT&T Unix version 1, along with the chmod system call.
As systems grew in number and types of users, access-control lists [3] were added to many file systems in addition to these most basic modes to increase flexibility.
The version of chmod bundled in GNU coreutils was written by David MacKenzie and Jim Meyering. [4] The command is available as a separate package for Microsoft Windows as part of the UnxUtils collection of native Win32 ports of common GNU Unix-like utilities. [5] The chmod command has also been ported to the IBM i operating system. [6]
Throughout this section, user refers to the owner of the file, as a reminder that the symbolic form of the command uses "u", to avoid confusion with "other".
Note that only the user or the superuser (root) is able to change file permissions.
chmod [options] mode[,mode] file1 [file2 ...]
[7]
Usually implemented options include:
-R
Recursive, i.e. include objects in subdirectories.-v
verbose, show objects changed (unchanged objects are not shown).If a symbolic link is specified, the target object is affected. File modes directly associated with symbolic links themselves are typically not used.
To view the file mode, the ls
or stat
commands may be used:
$ ls-lfindPhoneNumbers.sh -rwxr-xr-- 1 dgerman staff 823 Dec 16 15:03 findPhoneNumbers.sh$ stat-c%afindPhoneNumbers.sh 754
The r
, w
, and x
specify the read, write, and execute access respectively. The first character of the ls -l display denotes the object type; a hyphen represents a plain file. The script findPhoneNumbers.sh can be read, written to, and executed by the user dgerman; read and executed by members of the staff group; and only read by any other users.
The main parts of the chmod permissions:
For example: rwxr-x---
Each group of three characters define permissions for each class :
rwx
, define permissions for the User class (i.e. the file owner).r-x
, define permissions for the Group class (i.e. the group owning the file)---
, define permissions for the Others class. In this example, users who are not the owner of the file and who are not members of the Group (and, thus, are in the Others class) have no permission to access the file.The chmod numerical format accepts up to four digits. The three rightmost digits define permissions for the file user, the group, and others. The optional leading digit, when 4 digits are given, specifies the special setuid , setgid , and sticky flags. Each digit of the three rightmost digits represents a binary value, which controls the "read", "write" and "execute" permissions respectively. A value of 1 means a class is allowed that action, while a 0 means it is disallowed.
# | Sum | rwx | Permission |
---|---|---|---|
7 | 4(r) + 2(w) + 1(x) | rwx | read, write and execute |
6 | 4(r) + 2(w) | rw- | read and write |
5 | 4(r) + 1(x) | r-x | read and execute |
4 | 4(r) | r-- | read only |
3 | 2(w) + 1(x) | -wx | write and execute |
2 | 2(w) | -w- | write only |
1 | 1(x) | --x | execute only |
0 | 0 | --- | none |
For example, 754
would allow:
A numerical code permits execution if and only if it is odd (i.e. 1
, 3
, 5
, or 7
). A numerical code permits "read" if and only if it is greater than or equal to 4
(i.e. 4
, 5
, 6
, or 7
). A numerical code permits "write" if and only if it is 2
, 3
, 6
, or 7
.
Change permissions to permit the programmers update of a file:
$ ls-lFile -rw-r--r-- 1 jsmith programmers 57 Jul 3 10:13 File$ chmod664File $ ls-lFile -rw-rw-r-- 1 jsmith programmers 57 Jul 3 10:13 File
Since the setuid, setgid and sticky bits are not specified, this is equivalent to:
$ chmod0664File
The chmod command also accepts a finer-grained symbolic notation, [8] which allows modifying specific modes while leaving other modes untouched. The symbolic mode is composed of three components, which are combined to form a single string of text:
$chmod[references][operator][modes]file...
Classes of users are used to distinguish to whom the permissions apply. If no classes are specified "all" is implied. The classes are represented by one or more of the following letters:
Reference | Class | Description |
---|---|---|
u | user | file owner |
g | group | members of the file's group |
o | others | users who are neither the file's owner nor members of the file's group |
a | all | all three of the above, same as ugo |
(empty) | default | same as "all", except that bits in the umask will be unchanged |
The chmod program uses an operator to specify how the modes of a file should be adjusted. The following operators are accepted:
Operator | Description |
---|---|
+ | adds the specified modes to the specified classes |
- | removes the specified modes from the specified classes |
= | the modes specified are to be made the exact modes for the specified classes |
The modes indicate which permissions are to be granted or removed from the specified classes. There are three basic modes which correspond to the basic permissions:
Mode | Name | Description |
---|---|---|
r | read | read a file or list a directory's contents |
w | write | write to a file or directory |
x | execute | execute a file or recurse a directory tree |
X | special execute | which is not a permission in itself but rather can be used instead of x. It applies execute permissions to directories regardless of their current permissions and applies execute permissions to a file which already has at least one execute permission bit already set (either User, Group or Others). It is only really useful when used with + and usually in combination with the -R flag for giving Group or Others access to a big directory tree without setting execute permission on normal files (such as text files), which would normally happen if you just used chmod -R a+rx . , whereas with X you can do chmod -R a+rX . instead |
s | setuid/gid | |
t | sticky |
Multiple changes can be specified by separating multiple symbolic modes with commas (without spaces). If a user is not specified, chmod
will check the umask and the effect will be as if "a" was specified except bits that are set in the umask are not affected. [9]
$ ls-lddir# show access modes before chmoddrwxr-xr-x 2 jsmitt northregion 96 Apr 8 12:53 shared_dir$ chmodg+wdir $ ls-lddir# show access modes after chmoddrwxrwxr-x 2 jsmitt northregion 96 Apr 8 12:53 shared_dir
$ ls-lourBestReferenceFile -rw-rw-r-- 2 tmiller northregion 96 Apr 8 12:53 ourBestReferenceFile$ chmoda-wourBestReferenceFile $ ls-lourBestReferenceFile -r--r--r-- 2 tmiller northregion 96 Apr 8 12:53 ourBestReferenceFile
$ ls-ldreferenceLib drwxr----- 2 ebowman northregion 96 Apr 8 12:53 referenceLib$ chmodug=rxreferenceLib $ ls-ldreferenceLib dr-xr-x--- 2 ebowman northregion 96 Apr 8 12:53 referenceLib
$ chmodug+rwsample $ ls-ldsample drw-rw---- 2 rsanchez budget 96 Dec 8 12:53 sample
$ chmoda-rwxsample $ ls-lsample ---------- 2 rswven planning 96 Dec 8 12:53 sample
$ # Sample file permissions before command$ ls-ldsample drw-rw---- 2 oschultz warehousing 96 Dec 8 12:53 NY_DBs$ chmodug=rxsample $ ls-ldsample dr-xr-x--- 2 oschultz warehousing 96 Dec 8 12:53 NJ_DBs
$ chmodu=rw,go=rsample $ ls-ldsample drw-r--r-- 2 oschultz warehousing 96 Dec 8 12:53 sample
The chmod command is also capable of changing the additional permissions or special modes of a file or directory. The symbolic modes use 's' to represent the setuid and setgid modes, and 't' to represent the sticky mode. The modes are only applied to the appropriate classes, regardless of whether or not other classes are specified.
Most operating systems support the specification of special modes numerically, particularly in octal, but some do not. On these systems, only the symbolic modes can be used.
Command | Explanation |
---|---|
chmod a+r publicComments.txt | Adds read permission for all classes (i.e. user, Group and Others) |
chmod a-x publicComments.txt | Removes execute permission for all classes |
chmod a+rx viewer.sh | Adds read and execute permissions for all classes |
chmod u=rw,g=r,o= internalPlan.txt | Sets read and write permission for user, sets read for Group, and denies access for Others |
chmod -R u+w,go-w docs | Adds write permission to the directory docs and all its contents (i.e. Recursively) for owner, and removes write permission for group and others |
chmod ug=rw groupAgreements.txt | Sets read and write permissions for user and Group |
chmod 664 global.txt | Sets read and write permissions for user and Group, and provides read to Others. |
chmod 744 Show_myCV.sh | sets read, write, and execute permissions for user, and sets read permission for Group and Others |
chmod 1755 findReslts.sh | Sets sticky bit (this suggests that the script be retained in memory), sets read, write, and execute permissions for owner, and sets read and execute permissions for group and others |
chmod 4755 setCtrls.sh | Sets UID , sets read, write, and execute permissions for user, and sets read and execute permissions for Group and Others |
chmod 2755 setCtrls.sh | sets GID , Sets read, write, and execute permissions for user, and sets read and execute permissions for Group and Others |
chmod -R u+rw,g-,o-rx privateStuff | Recursively (i.e. on all files and directories in privateStuff) adds read, write permissions for user, removes read, write, and execution permissions for Group, and removes read and execution permissions for Others |
chmod -R a-x+X publicDocs | Recursively (i.e. on all files and directories in publicDocs) removes execute permission for all classes and adds special execution permission for all classes |
chattr
, the command used to change the attributes of a file or directory on Linux systems chown
, the command used to change the owner of a file or directory on Unix-like systems chgrp
, the command used to change the group of a file or directory on Unix-like systems cacls
, a command used on Windows NT and its derivatives to modify the access control lists associated with a file or directory attrib
umask
, restricts mode (permissions) at file or directory creation on Unix-like systemsIn computing, ls
is a command to list computer files and directories in Unix and Unix-like operating systems. It is specified by POSIX and the Single UNIX Specification.
In computing, dir
(directory) is a command in various computer operating systems used for computer file and directory listing. It is one of the basic commands to help navigate the file system. The command is usually implemented as an internal command in the command-line interpreter (shell). On some systems, a more graphical representation of the directory structure can be displayed using the tree
command.
In computing, a symbolic link is a file whose purpose is to point to a file or directory by specifying a path thereto.
fstab is a system file commonly found in the directory /etc
on Unix and Unix-like computer systems. In Linux, it is part of the util-linux package. The fstab file typically lists all available disk partitions and other types of file systems and data sources that may not necessarily be disk-based, and indicates how they are to be initialized or otherwise integrated into the larger file system structure.
split
is a utility on Unix, Plan 9, and Unix-like operating systems most commonly used to split a computer file into two or more smaller files.
In computing, umask
is a command that determines the settings of a mask that controls how file permissions are set for newly created files. It may also affect how the file permissions are changed explicitly. umask
is also a function that sets the mask, or it may refer to the mask itself, which is formally known as the file mode creation mask. The mask is a grouping of bits, each of which restricts how its corresponding permission is set for newly created files. The bits in the mask may be changed by invoking the umask
command.
The Unix and Linux access rights flags setuid and setgid allow users to run an executable with the file system permissions of the executable's owner or group respectively and to change behaviour in directories. They are often used to allow users on a computer system to run programs with temporarily elevated privileges to perform a specific task. While the assumed user id or group id privileges provided are not always elevated, at a minimum they are specific.
In Unix-like systems, multiple users can be put into groups. POSIX and conventional Unix file system permissions are organized into three classes, user, group, and others. The use of groups allows additional abilities to be delegated in an organized fashion, such as access to disks, printers, and other peripherals. This method, among others, also enables the superuser to delegate some administrative tasks to normal users, similar to the Administrators group on Microsoft Windows NT and its derivatives.
Most file systems include attributes of files and directories that control the ability of users to read, change, navigate, and execute the contents of the file system. In some cases, menu options or functions may be made visible or hidden depending on a user's permission level; this kind of user interface is referred to as permission-driven.
The seven standard Unix file types are regular, directory, symbolic link, FIFO special, block special, character special, and socket as defined by POSIX. Different OS-specific implementations allow more types than what POSIX requires. A file's type can be identified by the ls -l
command, which displays the type in the first character of the file-system permissions field.
In Unix-like operating systems, find
is a command-line utility that locates files based on some user-specified criteria and either prints the pathname of each matched object or, if another action is requested, performs that action on each matched object.
rm
is a basic command on Unix and Unix-like operating systems used to remove objects such as computer files, directories and symbolic links from file systems and also special files such as device nodes, pipes and sockets, similar to the del
command in MS-DOS, OS/2, and Microsoft Windows. The command is also available in the EFI shell.
A command shell is a command-line interface to interact with and manipulate a computer's operating system.
The chgrp command may be used by unprivileged users on various operating systems to change the group associated with a file system object to one of which they are a member. A file system object has 3 sets of access permissions, one set for the owner, one set for the group and one set for others. Changing the group of an object could be used to change which users can write to a file.
File attributes are a type of metadata that describe and may modify how files and/or directories in a filesystem behave. Typical file attributes may, for example, indicate or specify whether a file is visible, modifiable, compressed, or encrypted. The availability of most file attributes depends on support by the underlying filesystem where attribute data must be stored along with other control structures. Each attribute can have one of two states: set and cleared. Attributes are considered distinct from other metadata, such as dates and times, filename extensions or file system permissions. In addition to files, folders, volumes and other file system objects may have attributes.
In computing, the sticky bit is a user ownership access right flag that can be assigned to files and directories on Unix-like systems.
In computing, alias is a command in various command-line interpreters (shells), which enables a replacement of a word by another string. It is mainly used for abbreviating a system command, or for adding default arguments to a regularly used command. alias
is available in Unix shells, AmigaDOS, 4DOS/4NT, FreeDOS, KolibriOS, Windows PowerShell, ReactOS, and the EFI shell. Aliasing functionality in the MS-DOS and Microsoft Windows operating systems is provided by the DOSKey command-line utility.
chattr is the command in Linux that allows a user to set certain attributes of a file. lsattr is the command that displays the attributes of a file.
Qshell is an optional command-line interpreter (shell) for the IBM i operating system. Qshell is based on POSIX and X/Open standards. It is a Bourne-like shell that also includes features of KornShell. The utilities are external programs that provide additional functions. The development team of Qshell had to deal with platform-specific issues such as translating between ASCII and EBCDIC. The shell supports interactive mode as well as batch processing and can run shell scripts from Unix-like operating systems with few or no modifications.
bs is a programming language and a compiler/interpreter for modest-sized programs on UNIX systems. The bs command can be invoked either for interactive programming or with a file containing a program, optionally taking arguments, via a Unix shell, e.g., using a Shebang (Unix) #!/usr/bin/bs.
chmod
— manual page from GNU coreutils.