Lack of any of the below modes implies "find" access to the object. The object can be listed and have its ownership, size, etc. information obtained, but cannot be read or modified.
This object can be opened for appending.
Allow creation of the file/directory.
Allow deletion of the file/directory.
Needed to mark the pipe used for communication with init to transfer the privilege of the persistent role; only valid within a persistent role. Transfer only occurs when the file is opened for writing.
This object is hidden.
This mode only applies to binaries. When the object is executed, it inherits the ACL of the subject in which it was contained.
Lowercase L. Allow a hardlink at this path. Hardlinking requires a minimum of c and l modes, and the target link cannot have any greater permission than the source file.
Allow creation of setuid/setgid files/directories and modification of files/directories to be setuid/setgid.
Reject all ptraces to this object.
This object can be opened for reading.
This object can be ptraced, but cannot modify the running task. This is referred to as a 'read-only ptrace'.
This object can be opened for writing or appending.
This object can be executed (or mmap'd with PROT_EXEC into a task).
Object Auditing Flags
Audit successful appends to this object.
Audit the creation of the file/directory.
Audit the deletion of the file/directory.
Audit successful finds of this object.
Audit successful ACL inherits of this object.
Audit link creation.
Audit the setuid/setgid creation/modification.
Audit successful reads to this object.
Audit successful writes to this object.
Audit successful execs of this object.
Other Object Flags
Logs will be suppressed for denied access to this object.