Skip to content

Commit

Permalink
Document that FUSE_CAP_POSIX_ACL turns on -o default_permissions
Browse files Browse the repository at this point in the history
  • Loading branch information
Nikratio committed Nov 23, 2016
1 parent 4175f96 commit 4fdf83f
Show file tree
Hide file tree
Showing 2 changed files with 11 additions and 4 deletions.
9 changes: 6 additions & 3 deletions doc/mount.fuse.8
Expand Up @@ -55,9 +55,12 @@ filesystem. The check by the kernel is done in addition to any
permission checks by the filesystem, and both have to succeed for an
operation to be allowed. The kernel performs a standard UNIX permission
check (based on mode bits and ownership of the directory entry, and
uid/gid of the client). If the filesystem supports extended
attributes and the kernel is sufficiently recent, it may also take
into account access control lists (ACLs).
uid/gid of the client).

This mount option is activated implicitly if the filesystem enables
ACL support during the initial feature negotiation when opening the
device fd. In this case, the kernel performs both ACL and standard
unix permission checking.

Filesystems that do not implement any permission checking should
generally add this option internally.
Expand Down
6 changes: 5 additions & 1 deletion include/fuse_common.h
Expand Up @@ -253,7 +253,7 @@ struct fuse_file_info {
#define FUSE_CAP_PARALLEL_DIROPS (1 << 18)

/**
* Indicates support for POSIX ACL.
* Indicates support for POSIX ACLs.
*
* If this feature is enabled, the kernel will cache and have
* responsibility for enforcing ACLs. ACL will be stored as xattrs and
Expand All @@ -263,6 +263,10 @@ struct fuse_file_info {
* created. Note that this requires that the file system is able to
* parse and interpret the xattr representation of ACLs.
*
* Enabling this feature implicitly turns on the
* ``default_permissions`` mount option (even if it was not passed to
* mount(2)).
*
* This feature is disabled by default.
*/
#define FUSE_CAP_POSIX_ACL (1 << 19)
Expand Down

0 comments on commit 4fdf83f

Please sign in to comment.