当前位置:网站首页>The solution of permission denied
The solution of permission denied
2022-07-04 12:23:00 【Programmer straw hat】
When debugging the startup file , The following error occurred :
Permission denied
The reason is that the permission of the file is not enough , The measured solutions are as follows :
// Be careful :777 Use permissions with caution For high permissions
$ sudo chmod -R xxx A directory
// Define your own xxx, Here's a description
among
-R Refers to cascading all subdirectories and files applied to the directory
750 Indicates that the file owner has read 、 Write 、 Executive authority , File group has read 、 Executive authority , Other users don't have permission
Belong to :rwx=4+2+1=7.
Generic group :r-x=4+0+1=5.
other :---=0+0+0=0
write in 、 Read and execute permissions have the following numerical values :
r ( read ) = 4
w ( Write ) = 2
x ( Executable ) = 1
No authority = 0
The permission number of a specific user class is the sum of the permission values of that class .
Solve the problem after operation ,OK!
边栏推荐
- Using terminal connection in different modes of virtual machine
- Local MySQL forget password modification method (Windows) [easy to understand]
- Recommend a cool geospatial data visualization tool with low code
- The most robust financial products in 2022
- A few words explain redis cache penetration, breakdown, avalanche, and redis sentinel
- Iptables cause heartbeat brain fissure
- How to use the mongodb ID array to get multiple documents- How to get multiple document using array of MongoDb id?
- Source code analysis of the implementation mechanism of multisets in guava class library
- Entitas learning [3] multi context system
- [Yunju entrepreneurial foundation notes] Chapter II entrepreneur test 10
猜你喜欢
Some summaries of the 21st postgraduate entrance examination 823 of network security major of Shanghai Jiaotong University and ideas on how to prepare for the 22nd postgraduate entrance examination pr
Detailed explanation of NPM installation and caching mechanism
[Yunju entrepreneurial foundation notes] Chapter II entrepreneur test 9
2020 Summary - Magic year, magic me
Summary of Shanghai Jiaotong University postgraduate entrance examination module firewall technology
Leetcode: 408 sliding window median
CSDN documentation specification
Application of slice
Hongke case study on storm impact in coastal areas of North Carolina using lidar
[Yunju entrepreneurial foundation notes] Chapter II entrepreneur test 17
随机推荐
Xiaobing · beauty appraisal
Using terminal connection in different modes of virtual machine
Foreach (system.out:: println) usage
[Yunju entrepreneurial foundation notes] Chapter II entrepreneur test 6
Clockwise rotation method of event arrangement -- PHP implementation
Star leap plan | new projects are continuously being recruited! MSR Asia MSR Redmond joint research program invites you to apply!
nn. Exploration and experiment of batchnorm2d principle
How to create a new virtual machine
MySQL advanced (Advanced) SQL statement
Clion configuration of opencv
Day01 preliminary packet capture
In 2022, financial products are not guaranteed?
[Yunju entrepreneurial foundation notes] Chapter II entrepreneur test 15
Leetcode: 408 sliding window median
[Yunju entrepreneurial foundation notes] Chapter II entrepreneur test 17
The detailed installation process of Ninja security penetration system (Ninjitsu OS V3). Both old and new VM versions can be installed through personal testing, with download sources
Practical dry goods: deploy mini version message queue based on redis6.0
2021-10-20
[the way of programmer training] - 2 Perfect number calculation
Memory computing integration: AI chip architecture in the post Moorish Era