当前位置:网站首页>The solution of permission denied
The solution of permission denied
2022-07-04 12:23:00 【Programmer straw hat】
When debugging the startup file , The following error occurred :
Permission deniedThe reason is that the permission of the file is not enough , The measured solutions are as follows :
// Be careful :777 Use permissions with caution For high permissions
$ sudo chmod -R xxx A directory
// Define your own xxx, Here's a description among
-R Refers to cascading all subdirectories and files applied to the directory
750 Indicates that the file owner has read 、 Write 、 Executive authority , File group has read 、 Executive authority , Other users don't have permission
Belong to :rwx=4+2+1=7.
Generic group :r-x=4+0+1=5.
other :---=0+0+0=0
write in 、 Read and execute permissions have the following numerical values :
r ( read ) = 4
w ( Write ) = 2
x ( Executable ) = 1
No authority = 0
The permission number of a specific user class is the sum of the permission values of that class .
Solve the problem after operation ,OK!
边栏推荐
- QQ get group member operation time
- Haproxy cluster
- Star leap plan | new projects are continuously being recruited! MSR Asia MSR Redmond joint research program invites you to apply!
- MySQL advanced (Advanced) SQL statement
- JD home programmers delete databases and run away. Talk about binlog, the killer of MySQL data backup
- Hongke case study on storm impact in coastal areas of North Carolina using lidar
- Openssl3.0 learning 20 provider KDF
- The frost peel off the purple dragon scale, and the xiariba people will talk about database SQL optimization and the principle of indexing (primary / secondary / clustered / non clustered)
- [Yunju entrepreneurial foundation notes] Chapter II entrepreneur test 24
- Here, the DDS tutorial you want | first experience of fastdds - source code compilation & Installation & Testing
猜你喜欢

MPLS experiment

Lecture 9

DDS-YYDS

Detailed explanation of classic process synchronization problems

Exness: positive I win, negative you lose

MySQL performance optimization index
![[Yunju entrepreneurial foundation notes] Chapter II entrepreneur test 19](/img/7c/f728e88ca36524f92c56213370399b.jpg)
[Yunju entrepreneurial foundation notes] Chapter II entrepreneur test 19

Process communication and thread explanation
![[Yunju entrepreneurial foundation notes] Chapter II entrepreneur test 12](/img/b1/926d9b3d7ce9c5104f3e81974eef07.jpg)
[Yunju entrepreneurial foundation notes] Chapter II entrepreneur test 12

(2021-08-20) web crawler learning 2
随机推荐
Force buckle 142 Circular linked list II
Hongke case study on storm impact in coastal areas of North Carolina using lidar
About the use of URL, href, SRC attributes
03_ Armv8 instruction set introduction load and store instructions
IPv6 experiment
13、 C window form technology and basic controls (3)
Login operation (for user name and password)
Classification and application of AI chips
[Yunju entrepreneurial foundation notes] Chapter II entrepreneur test 19
Clion configuration of opencv
Attributes and methods in math library
PKCs 5: password based cryptography specification version 2.1 Chinese Translation
Ternsort model integration summary
LVS load balancing cluster deployment - Dr direct routing mode
Four sorts: bubble, select, insert, count
Application of slice
[ES6] template string: `string`, a new symbol in es2015
A few words explain redis cache penetration, breakdown, avalanche, and redis sentinel
Exness: positive I win, negative you lose
Using terminal connection in different modes of virtual machine