From owner-freebsd-hackers@FreeBSD.ORG Fri Sep 19 02:37:28 2003 Return-Path: Delivered-To: freebsd-hackers@freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 98B3816A4B3 for ; Fri, 19 Sep 2003 02:37:28 -0700 (PDT) Received: from lon1-mail-2.visp.demon.net (lon1-mail-2.visp.demon.net [193.195.70.5]) by mx1.FreeBSD.org (Postfix) with ESMTP id 7A0B143F75 for ; Fri, 19 Sep 2003 02:37:27 -0700 (PDT) (envelope-from lewiz@black.lewiz.org) Received: from mail.lewiz.org (host-74a-th-m-207.dial.beeb.net [62.56.20.207] (may be forged))3.2.1-GA) with ESMTP id AMM63657; Fri, 19 Sep 2003 10:36:35 +0100 (BST) Received: from black.lewiz.org ([192.168.0.12]) by mail.lewiz.org with smtp (Exim 4.20) id 1A0Hga-0009Sq-Qu for hackers@freebsd.org; Fri, 19 Sep 2003 10:36:20 +0100 Received: (nullmailer pid 10169 invoked by uid 4001); Fri, 19 Sep 2003 09:36:21 -0000 Date: Fri, 19 Sep 2003 10:36:21 +0100 From: Lewis Thompson To: FreeBSD-hackers Message-ID: <20030919093620.GC5850@lewiz.org> Mime-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha1; protocol="application/pgp-signature"; boundary="k+w/mQv8wyuph6w0" Content-Disposition: inline X-GPG-Fingerprint: 90A4 939E 3847 A3E4 8103 2A48 22DA B428 542F ED3F X-GPG-Info: http://www.westwood.karoo.net/pgpkey / horowitz.surfnet.nl User-Agent: Mutt/1.5.4i X-MailScanner-Information: Please contact the ISP for more information X-MailScanner: Found to be clean Subject: mount_unionfs directory permissions. X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.1 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 19 Sep 2003 09:37:28 -0000 --k+w/mQv8wyuph6w0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable Hi, This is the first time I've posted to -hackers and I apologise in advance since it's not strictly what I expect goes on here (and have read on Google Groups). However, the question I want to ask is best answered here, I think. I've been playing with mount_unionfs but get stuck when it comes to permissions. I'm using it in the context of a ``base'' jail. The mount_unionfs man page states: Filenames are looked up in the upper layer and then in the lower layer. If a directory is found in the lower layer, and there is no entry in the upper layer, then a shadow directory will be created in the upper layer. It will be owned by the user who originally did the union mount, with mode ``rwxrwxrwx'' (0777) modified by the umask in effect at that time. What I want to know is why? Could there not be an option to inherit the permissions of the file/directory? Thanks very much, -lewiz. --=20 I was so much older then, I'm younger than that now. --Bob Dylan, 1964. ------------------------------------------------------------------------ -| msn:purple@lewiz.net | jab:lewiz@jabber.org | url:http://lewiz.net |- --k+w/mQv8wyuph6w0 Content-Type: application/pgp-signature Content-Disposition: inline -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.3 (FreeBSD) iD8DBQE/as4UItq0KFQv7T8RAnZeAJ4rfdE6LwsR6F/cc+AmeuqPgCneigCggMOm /Qk+COtRwRQvB5nQwS8fI4w= =OtWB -----END PGP SIGNATURE----- --k+w/mQv8wyuph6w0--