亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關(guān)于我們
? 蟲蟲下載站

?? library_13.html

?? Glibc的中文手冊
?? HTML
?? 第 1 頁 / 共 5 頁
字號:
The return value from <CODE>fchown</CODE> is <CODE>0</CODE> on success and <CODE>-1</CODE>
on failure.  The following <CODE>errno</CODE> error codes are defined for this
function:
<P>
<DL COMPACT>
<DT><CODE>EBADF</CODE>
<DD>The <VAR>filedes</VAR> argument is not a valid file descriptor.
<P>
<DT><CODE>EINVAL</CODE>
<DD>The <VAR>filedes</VAR> argument corresponds to a pipe or socket, not an ordinary
file.
<P>
<DT><CODE>EPERM</CODE>
<DD>This process lacks permission to make the requested change.  For
details, see <CODE>chmod</CODE>, above.
<P>
<DT><CODE>EROFS</CODE>
<DD>The file resides on a read-only file system.
</DL>
<P>
<H3><A NAME="SEC205" HREF="library_toc.html#SEC205" tppabs="http://www.cs.utah.edu/dept/old/texinfo/glibc-manual-0.02/library_toc.html#SEC205">The Mode Bits for Access Permission</A></H3>
<P>
The <DFN>file mode</DFN>, stored in the <CODE>st_mode</CODE> field of the file
attributes, contains two kinds of information: the file type code, and
the access permission bits.  This section discusses only the access
permission bits, which control who can read or write the file.
See section <A HREF="library_13.html#SEC203" tppabs="http://www.cs.utah.edu/dept/old/texinfo/glibc-manual-0.02/library_13.html#SEC203">Testing the Type of a File</A>, for information about the file type code.
<P>
All of the symbols listed in this section are defined in the header file
<TT>`sys/stat.h'</TT>.
<A NAME="IDX817"></A>
<A NAME="IDX818"></A>
<P>
These symbolic constants are defined for the file mode bits that control
access permission for the file:
<P>
<DL COMPACT>
<A NAME="IDX819"></A>
<DT><CODE>S_IRUSR</CODE>
<DD><A NAME="IDX820"></A>
<DT><CODE>S_IREAD</CODE>
<DD>Read permission bit for the owner of the file.  On many systems, this
bit is 0400.  <CODE>S_IREAD</CODE> is an obsolete synonym provided for BSD
compatibility.
<P>
<A NAME="IDX821"></A>
<DT><CODE>S_IWUSR</CODE>
<DD><A NAME="IDX822"></A>
<DT><CODE>S_IWRITE</CODE>
<DD>Write permission bit for the owner of the file.  Usually 0200.
<CODE>S_IWRITE</CODE> is an obsolete synonym provided for BSD compatibility.
<P>
<A NAME="IDX823"></A>
<DT><CODE>S_IXUSR</CODE>
<DD><A NAME="IDX824"></A>
<DT><CODE>S_IEXEC</CODE>
<DD>Execute (for ordinary files) or search (for directories) permission bit
for the owner of the file.  Usually 0100.  <CODE>S_IEXEC</CODE> is an obsolete
synonym provided for BSD compatibility.
<P>
<A NAME="IDX825"></A>
<DT><CODE>S_IRWXU</CODE>
<DD>This is equivalent to <SAMP>`(S_IRUSR | S_IWUSR | S_IXUSR)'</SAMP>.
<P>
<A NAME="IDX826"></A>
<DT><CODE>S_IRGRP</CODE>
<DD>Read permission bit for the group owner of the file.  Usually 040.
<P>
<A NAME="IDX827"></A>
<DT><CODE>S_IWGRP</CODE>
<DD>Write permission bit for the group owner of the file.  Usually 020.
<P>
<A NAME="IDX828"></A>
<DT><CODE>S_IXGRP</CODE>
<DD>Execute or search permission bit for the group owner of the file.
Usually 010.
<P>
<A NAME="IDX829"></A>
<DT><CODE>S_IRWXG</CODE>
<DD>This is equivalent to <SAMP>`(S_IRGRP | S_IWGRP | S_IXGRP)'</SAMP>.
<P>
<A NAME="IDX830"></A>
<DT><CODE>S_IROTH</CODE>
<DD>Read permission bit for other users.  Usually 04.
<P>
<A NAME="IDX831"></A>
<DT><CODE>S_IWOTH</CODE>
<DD>Write permission bit for other users.  Usually 02.
<P>
<A NAME="IDX832"></A>
<DT><CODE>S_IXOTH</CODE>
<DD>Execute or search permission bit for other users.  Usually 01.
<P>
<A NAME="IDX833"></A>
<DT><CODE>S_IRWXO</CODE>
<DD>This is equivalent to <SAMP>`(S_IROTH | S_IWOTH | S_IXOTH)'</SAMP>.
<P>
<A NAME="IDX834"></A>
<DT><CODE>S_ISUID</CODE>
<DD>This is the set-user-ID on execute bit, usually 04000. 
See section <A HREF="library_25.html#SEC433" tppabs="http://www.cs.utah.edu/dept/old/texinfo/glibc-manual-0.02/library_25.html#SEC433">How an Application Can Change Persona</A>.
<P>
<A NAME="IDX835"></A>
<DT><CODE>S_ISGID</CODE>
<DD>This is the set-group-ID on execute bit, usually 02000.
See section <A HREF="library_25.html#SEC433" tppabs="http://www.cs.utah.edu/dept/old/texinfo/glibc-manual-0.02/library_25.html#SEC433">How an Application Can Change Persona</A>.
<A NAME="IDX836"></A>
<P>
<A NAME="IDX837"></A>
<DT><CODE>S_ISVTX</CODE>
<DD>This is the <DFN>sticky</DFN> bit, usually 01000.
<P>
On an executable file, it modifies the swapping policies of the system.
Normally, when a program terminates, its pages in core are immediately
freed and reused.  If the sticky bit is set on the executable file, the
system keeps the pages in core for a while as if the program were still
running.  This is advantageous for a program that is likely to be run
many times in succession.
<P>
On a directory, the sticky bit gives permission to delete a file in the
directory if you can write the contents of that file.  Ordinarily, a
user either can delete all the files in the directory or cannot delete
any of them (based on whether the user has write permission for the
directory).  The sticky bit makes it possible to control deletion for
individual files.
</DL>
<P>
The actual bit values of the symbols are listed in the table above
so you can decode file mode values when debugging your programs.
These bit values are correct for most systems, but they are not
guaranteed.
<P>
<STRONG>Warning:</STRONG> Writing explicit numbers for file permissions is bad
practice.  It is not only nonportable, it also requires everyone who
reads your program to remember what the bits mean.  To make your
program clean, use the symbolic names.
<P>
<A NAME="IDX838"></A>
<A NAME="IDX839"></A>
<A NAME="IDX840"></A>
<H3><A NAME="SEC206" HREF="library_toc.html#SEC206" tppabs="http://www.cs.utah.edu/dept/old/texinfo/glibc-manual-0.02/library_toc.html#SEC206">How Your Access to a File is Decided</A></H3>
<P>
Recall that the operating system normally decides access permission for
a file based on the effective user and group IDs of the process, and its
supplementary group IDs, together with the file's owner, group and
permission bits.  These concepts are discussed in detail in
section <A HREF="library_25.html#SEC431" tppabs="http://www.cs.utah.edu/dept/old/texinfo/glibc-manual-0.02/library_25.html#SEC431">The Persona of a Process</A>.
<P>
If the effective user ID of the process matches the owner user ID of the
file, then permissions for read, write, and execute/search are
controlled by the corresponding "user" (or "owner") bits.  Likewise,
if any of the effective group ID or supplementary group IDs of the
process matches the group owner ID of the file, then permissions are
controlled by the "group" bits.  Otherwise, permissions are controlled
by the "other" bits.
<P>
Privileged users, like <SAMP>`root'</SAMP>, can access any file, regardless of
its file permission bits.  As a special case, for a file to be
executable even for a privileged user, at least one of its execute bits
must be set.
<P>
<H3><A NAME="SEC207" HREF="library_toc.html#SEC207" tppabs="http://www.cs.utah.edu/dept/old/texinfo/glibc-manual-0.02/library_toc.html#SEC207">Assigning File Permissions</A></H3>
<A NAME="IDX841"></A>
<A NAME="IDX842"></A>
<P>
The primitive functions for creating files (for example, <CODE>open</CODE> or
<CODE>mkdir</CODE>) take a <VAR>mode</VAR> argument, which specifies the file
permissions for the newly created file.  But the specified mode is
modified by the process's <DFN>file creation mask</DFN>, or <DFN>umask</DFN>,
before it is used.
<P>
The bits that are set in the file creation mask identify permissions
that are always to be disabled for newly created files.  For example, if
you set all the "other" access bits in the mask, then newly created
files are not accessible at all to processes in the "other"
category, even if the <VAR>mode</VAR> argument specified to the creation 
function would permit such access.  In other words, the file creation
mask is the complement of the ordinary access permissions you want to
grant.
<P>
Programs that create files typically specify a <VAR>mode</VAR> argument that
includes all the permissions that make sense for the particular file.
For an ordinary file, this is typically read and write permission for
all classes of users.  These permissions are then restricted as
specified by the individual user's own file creation mask.
<A NAME="IDX843"></A>
<P>
To change the permission of an existing file given its name, call
<CODE>chmod</CODE>.  This function ignores the file creation mask; it uses
exactly the specified permission bits.
<A NAME="IDX844"></A>
<P>
In normal use, the file creation mask is initialized in the user's login
shell (using the <CODE>umask</CODE> shell command), and inherited by all
subprocesses.  Application programs normally don't need to worry about
the file creation mask.  It will do automatically what it is supposed to
do.
<P>
When your program should create a file and bypass the umask for its
access permissions, the easiest way to do this is to use <CODE>fchmod</CODE>
after opening the file, rather than changing the umask.
<P>
In fact, changing the umask is usually done only by shells.  They use
the <CODE>umask</CODE> function.
<P>
The functions in this section are declared in <TT>`sys/stat.h'</TT>.
<A NAME="IDX845"></A>
<P>
<A NAME="IDX846"></A>
<U>Function:</U> mode_t <B>umask</B> <I>(mode_t <VAR>mask</VAR>)</I><P>
The <CODE>umask</CODE> function sets the file creation mask of the current
process to <VAR>mask</VAR>, and returns the previous value of the file
creation mask.
<P>
Here is an example showing how to read the mask with <CODE>umask</CODE>
without changing it permanently:
<P>
<PRE>
mode_t
read_umask (void)
{
  mask = umask (0);
  umask (mask);
}
</PRE>
<P>
However, it is better to use <CODE>getumask</CODE> if you just want to read
the mask value, because that is reentrant (at least if you use the GNU
operating system).
<P>
<A NAME="IDX847"></A>
<U>Function:</U> mode_t <B>getumask</B> <I>(void)</I><P>
Return the current value of the file creation mask for the current
process.  This function is a GNU extension.
<P>
<A NAME="IDX848"></A>
<U>Function:</U> int <B>chmod</B> <I>(const char *<VAR>filename</VAR>, mode_t <VAR>mode</VAR>)</I><P>
The <CODE>chmod</CODE> function sets the access permission bits for the file
named by <VAR>filename</VAR> to <VAR>mode</VAR>.
<P>
If the <VAR>filename</VAR> names a symbolic link, <CODE>chmod</CODE> changes the
permission of the file pointed to by the link, not those of the link
itself.  There is actually no way to set the mode of a link, which is
always <CODE>-1</CODE>.
<P>
This function returns <CODE>0</CODE> if successful and <CODE>-1</CODE> if not.  In
addition to the usual file name syntax errors (see section <A HREF="library_10.html#SEC115" tppabs="http://www.cs.utah.edu/dept/old/texinfo/glibc-manual-0.02/library_10.html#SEC115">File Name Errors</A>), the following <CODE>errno</CODE> error conditions are defined for
this function:
<P>
<DL COMPACT>
<DT><CODE>ENOENT</CODE>
<DD>The named file doesn't exist.
<P>
<DT><CODE>EPERM</CODE>
<DD>This process does not have permission to change the access permission of
this file.  Only the file's owner (as judged by the effective user ID of
the process) or a privileged user can change them.
<P>
<DT><CODE>EROFS</CODE>
<DD>The file resides on a read-only file system.
</DL>
<P>
<A NAME="IDX849"></A>
<U>Function:</U> int <B>fchmod</B> <I>(int <VAR>filedes</VAR>, int <VAR>mode</VAR>)</I><P>
This is like <CODE>chmod</CODE>, except that it changes the permissions of
the file currently open via descriptor <VAR>filedes</VAR>.
<P>
The return value from <CODE>fchmod</CODE> is <CODE>0</CODE> on success and <CODE>-1</CODE>
on failure.  The following <CODE>errno</CODE> error codes are defined for this
function:
<P>
<DL 

?? 快捷鍵說明

復(fù)制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
亚洲黄色小视频| 91麻豆视频网站| 亚洲成人激情综合网| 日韩一区在线免费观看| 欧美国产日本视频| 国产精品三级av| 亚洲视频一区二区在线| 一区二区三区蜜桃| 香蕉乱码成人久久天堂爱免费| 一区二区免费看| 亚洲图片自拍偷拍| 麻豆成人综合网| 国产一区二区三区在线观看精品| 国产一区在线精品| k8久久久一区二区三区| 色域天天综合网| 欧美福利视频导航| 久久女同互慰一区二区三区| 中文字幕第一区二区| 依依成人综合视频| 美女久久久精品| 成人免费观看男女羞羞视频| 日本高清不卡在线观看| 56国语精品自产拍在线观看| 久久日韩精品一区二区五区| 国产女主播视频一区二区| 中文字幕在线播放不卡一区| 一区二区三区.www| 精品一区二区三区免费视频| 成人激情校园春色| 69久久夜色精品国产69蝌蚪网| 精品人伦一区二区色婷婷| 国产精品视频yy9299一区| 亚洲制服丝袜av| 黄网站免费久久| 色综合欧美在线视频区| 日韩欧美国产1| 亚洲毛片av在线| 久久99精品久久只有精品| 一本到三区不卡视频| 精品美女一区二区| 亚洲图片自拍偷拍| a亚洲天堂av| 精品人在线二区三区| 亚洲成人精品影院| 91美女片黄在线观看91美女| 精品国产一区二区三区不卡 | 欧美成人精品二区三区99精品| 久久久精品综合| 首页亚洲欧美制服丝腿| 国产suv精品一区二区三区| 欧美精品色一区二区三区| 国产精品久久久久久久久免费樱桃 | 欧美日韩一区二区三区视频| xvideos.蜜桃一区二区| 亚洲1区2区3区视频| 99在线精品观看| 国产丝袜欧美中文另类| 欧美aaaaaa午夜精品| 欧美在线免费观看亚洲| 国产欧美日韩另类一区| 日韩成人一区二区| 欧美日韩另类一区| 一区二区三区在线视频观看| 成人av电影免费在线播放| 精品国产免费一区二区三区四区| 天天综合日日夜夜精品| 日本道免费精品一区二区三区| 中文av一区二区| 国产精品一区二区久久精品爱涩| 日韩精品在线一区二区| 免播放器亚洲一区| 4438成人网| 亚洲高清一区二区三区| 欧美性三三影院| 亚洲在线视频一区| 欧美性做爰猛烈叫床潮| 依依成人精品视频| 国产夜色精品一区二区av| 免费的国产精品| 日韩一区二区三区视频在线观看| 午夜视黄欧洲亚洲| 欧美日韩国产另类不卡| 日韩专区欧美专区| 日韩免费高清电影| 九九九精品视频| 久久九九国产精品| 成人天堂资源www在线| 国产精品久久久久9999吃药| 成人在线综合网站| 亚洲少妇最新在线视频| 欧美久久高跟鞋激| 97se亚洲国产综合自在线 | 欧美一级生活片| 精品一区二区三区香蕉蜜桃| 国产午夜精品一区二区三区视频| 国产不卡视频一区| 亚洲欧洲99久久| 欧美伦理电影网| 国内精品国产三级国产a久久| 国产视频不卡一区| 色哟哟一区二区| 美女一区二区三区在线观看| 久久久精品中文字幕麻豆发布| 不卡的av在线| 天堂影院一区二区| 久久精品人人爽人人爽| 91丨九色丨蝌蚪丨老版| 婷婷成人综合网| 成人动漫视频在线| 亚洲一卡二卡三卡四卡无卡久久 | 亚洲国产日韩av| 日韩欧美国产电影| 91高清视频免费看| 欧美日韩一区二区在线观看| 久久精品视频一区二区| 在线免费观看不卡av| 久久97超碰色| 亚洲精品你懂的| 久久伊人蜜桃av一区二区| 色综合久久66| 国产精品正在播放| 爽爽淫人综合网网站| 国产精品乱人伦中文| 日韩视频在线你懂得| 91无套直看片红桃| 国产在线日韩欧美| 日韩黄色免费电影| 一区二区三区免费看视频| 欧美夫妻性生活| 一个色妞综合视频在线观看| 久久综合久久鬼色| 91精品国产手机| 欧美无砖专区一中文字| av在线播放一区二区三区| 激情综合一区二区三区| 欧美日韩精品一区二区| 91丨国产丨九色丨pron| 国产精品18久久久久| 免费成人美女在线观看.| 亚洲国产中文字幕| 亚洲情趣在线观看| 国产精品每日更新在线播放网址| 日韩精品中午字幕| 日韩一区二区三区视频在线观看| 91在线精品秘密一区二区| 国产成人自拍网| 国产成人亚洲综合a∨婷婷| 蜜桃久久av一区| 久久精品久久99精品久久| 婷婷综合在线观看| 天天av天天翘天天综合网| 亚洲图片欧美视频| 午夜精品在线视频一区| 午夜精品视频一区| 偷偷要91色婷婷| 欧美aaaaaa午夜精品| 另类欧美日韩国产在线| 久久福利资源站| 国产在线精品免费av| 国产一区啦啦啦在线观看| 国产精品自在欧美一区| 国产成人在线观看免费网站| 国产99久久精品| 91欧美一区二区| 亚洲自拍另类综合| 午夜精品久久久久久| 91免费国产在线| 日产欧产美韩系列久久99| 视频精品一区二区| 久久99国产精品成人| 成人综合婷婷国产精品久久蜜臀| 成人亚洲精品久久久久软件| av激情综合网| 欧美日韩在线播放一区| 国精产品一区一区三区mba桃花 | 中文字幕一区二区三区四区| 专区另类欧美日韩| 亚洲成人综合网站| 精品在线观看视频| 国产精品久久久久久久久免费樱桃| 久久久久久一级片| 亚洲免费电影在线| 免费成人结看片| 成人激情小说网站| 欧美日韩一区二区三区在线 | 欧美一区二区三区在线电影| 国产精品的网站| 丰满亚洲少妇av| 久久影视一区二区| 国产成人综合精品三级| 久久精子c满五个校花| 成人免费精品视频| 怡红院av一区二区三区| 精品久久国产97色综合| 成人在线视频首页| 国产精品久久一级| 欧美午夜电影网| 精品中文字幕一区二区| 亚洲国产成人午夜在线一区|