What are file permissions in Linux and what does rwx mean?
Jul 20, 2025 am 02:08 AMR, w, and x in Linux file permissions represent read, write and execute permissions respectively. r (read) allows viewing file content or listing directory content; w (write) allows modifying files or adding or deleting files in directory; x (execute) allows running files as programs or entering directories. Permissions are divided into three categories: user (owner), group, and others, and each category can have rwx combinations. Use ls -l to view permissions, the chmod command can modify permissions, and supports symbolic mode and digital mode to set permissions. Common use cases include combinations such as 600, 644, 700, 755, etc. to control access security.
In Linux, file permissions determine who can read, write, or execute a file. Understanding them is key to managing security and access control on your system. The rwx part stands for read, write, and execute — the three basic types of permissions you'll encounter.

What Do r, w, and x Mean?
Each file and directory in Linux has a set of permissions that control access. These are broken down into three categories: user (owner) , group , and others . Each category can have a combination of:
- r (read) – allows viewing the contents of a file or listing the contents of a directory
- w (write) – allows modifying the file or adding/removing files in a directory
- x (execute) – allows running the file as a program or entering a directory
So when you see something like -rwxr-xr--
, it's telling you:

- The owner has full permissions (read, write, execute)
- The group can read and execute
- Others can only read
This is the basic structure and how permissions are displayed in the system.
How to Read Permission Symbols
When you run ls -l
, you'll see something like this:

-rw-r--r-- 1 user group 4096 Apr 5 10:00 filename.txt
The first part ( -rw-r--r--
) shows the permissions. Breaking it down:
- The first character indicates the file type (
-
for regular file,d
for directory) - The next 9 characters are in 3 groups of 3:
- First 3: user (owner)
- Second 3: group
- Third 3: others
Each group shows r, w, and x in that order. If a permission is missing, it shows a -
.
So -rw-r--r--
means:
- Owner: read and write
- Group: read only
- Others: read only
How to Change File Permissions with chmod
You can change permissions using the chmod
command. There are two common ways to use it:
Symbolic mode
This uses letters and symbols to add, remove, or set permissions:
-
-
removes a permission -
=
sets it explicitly
Examples:
-
chmod ux script.sh
– adds execute permission for the user -
chmod go-w file.txt
– removes write permission for group and others
Numeric (octal) mode
Each permission has a number:
- r = 4
- w = 2
- x = 1
You add them up for each category:
- 7 (4 2 1) = rwx
- 6 (4 2) = rw-
- 5 (4 1) = rx
So to set a file to -rwxr-xr--
, you'd use:
chmod 754 filename
This method is faster once you're used to it, especially when setting full permission sets at once.
Common Permission Use Cases
Some permission settings are used frequently:
- 600 (rw------) – Only the owner can read and write (eg, private config files)
- 644 (rw-r--r--) – Owner can edit, others can only read (standard for web files)
- 700 (rwx------) – Only the owner can do anything (private directories)
- 755 (rwxr-xr-x) – Owner has full access, others can run and see contents (common for scripts and public directories)
Be careful with 777
– it gives full access to everyone, which is a big security risk. Don't use it unless you really know what you're doing.
Basically that's it. Permissions in Linux might look confusing at first, but once you break them down into user/group/others and understand what r, w, and x mean, they become much more manageable.
The above is the detailed content of What are file permissions in Linux and what does rwx mean?. For more information, please follow other related articles on the PHP Chinese website!

Hot AI Tools

Undress AI Tool
Undress images for free

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

LXD is described as the next-generation container and virtual machine manager that offers an immersive for Linux systems running inside containers or as virtual machines. It provides images for an inordinate number of Linux distributions with support

When encountering DNS problems, first check the /etc/resolv.conf file to see if the correct nameserver is configured; secondly, you can manually add public DNS such as 8.8.8.8 for testing; then use nslookup and dig commands to verify whether DNS resolution is normal. If these tools are not installed, you can first install the dnsutils or bind-utils package; then check the systemd-resolved service status and configuration file /etc/systemd/resolved.conf, and set DNS and FallbackDNS as needed and restart the service; finally check the network interface status and firewall rules, confirm that port 53 is not

If you find that the server is running slowly or the memory usage is too high, you should check the cause before operating. First, you need to check the system resource usage, use top, htop, free-h, iostat, ss-antp and other commands to check CPU, memory, disk I/O and network connections; secondly, analyze specific process problems, and track the behavior of high-occupancy processes through tools such as ps, jstack, strace; then check logs and monitoring data, view OOM records, exception requests, slow queries and other clues; finally, targeted processing is carried out based on common reasons such as memory leaks, connection pool exhaustion, cache failure storms, and timing task conflicts, optimize code logic, set up a timeout retry mechanism, add current limit fuses, and regularly pressure measurement and evaluation resources.

As a system administrator, you may find yourself (today or in the future) working in an environment where Windows and Linux coexist. It is no secret that some big companies prefer (or have to) run some of their production services in Windows boxes an

Frankly speaking, I cannot recall the last time I used a PC with a CD/DVD drive. This is thanks to the ever-evolving tech industry which has seen optical disks replaced by USB drives and other smaller and compact storage media that offer more storage

In Linux systems, 1. Use ipa or hostname-I command to view private IP; 2. Use curlifconfig.me or curlipinfo.io/ip to obtain public IP; 3. The desktop version can view private IP through system settings, and the browser can access specific websites to view public IP; 4. Common commands can be set as aliases for quick call. These methods are simple and practical, suitable for IP viewing needs in different scenarios.

Built on Chrome’s V8 engine, Node.JS is an open-source, event-driven JavaScript runtime environment crafted for building scalable applications and backend APIs. NodeJS is known for being lightweight and efficient due to its non-blocking I/O model and

Data replication is the process of copying your data across multiple servers to improve data availability and enhance the reliability and performance of an application. In MySQL replication, data is copied from a database from the master server to ot
