O'Reilly logo

A Practical Guide to Red Hat® Linux® 8 by Mark G. Sobell

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

umask

Establishes the file-creation permissions mask

umask [mask]

The umask builtin specifies a mask that the system uses to set up access permissions when you create a file. This builtin works slightly differently in each of the shells.

Arguments

The mask can be a three-digit octal number or a symbolic value such as you would use with chmod (page 1103). The mask specifies the permissions that are not allowed.

When mask is an octal number, the digits correspond to permissions for the owner of the file, members of the group the file is associated ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required