All of lore.kernel.org
 help / color / mirror / Atom feed
* [PATCH 1/2] open.2: Clarify which create mode bits are relevant
@ 2015-04-13 17:38 Andreas Gruenbacher
       [not found] ` <fe89279fbad286454188b3146b311442cdb7401f.1428946673.git.andreas.gruenbacher-Re5JQEeQqe8AvxtiuMwx3w@public.gmane.org>
  0 siblings, 1 reply; 6+ messages in thread
From: Andreas Gruenbacher @ 2015-04-13 17:38 UTC (permalink / raw)
  To: mtk.manpages-Re5JQEeQqe8AvxtiuMwx3w
  Cc: linux-man-u79uwXL29TY76Z2rM5mHXA, Andreas Gruenbacher

Clarify that on Linux, the S_ISUID, S_ISGID, and S_IVTX bits in the create mode
are also honored.

Instead of repeating the S_I* definitions here, incompletely, refer to stat(2).

Signed-off-by: Andreas Gruenbacher <agruenba-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org>
---
 man2/open.2 | 51 +++++++++++----------------------------------------
 man2/stat.2 |  6 +++---
 2 files changed, 14 insertions(+), 43 deletions(-)

diff --git a/man2/open.2 b/man2/open.2
index 053bab1..96ee576 100644
--- a/man2/open.2
+++ b/man2/open.2
@@ -258,7 +258,12 @@ described in
 .RS
 .PP
 .I mode
-specifies the permissions to use in case a new file is created.
+specifies the permissions to use in case a new file is created; see
+the definition of the file permission mask values in
+.BR stat (2).
+When bits other than the file permission bits are set in
+.IR mode ,
+the effect is unspecified; for Linux, see below.
 This argument must be supplied when
 .B O_CREAT
 or
@@ -282,45 +287,6 @@ newly created file; the
 .BR open ()
 call that creates a read-only file may well return a read/write
 file descriptor.
-.PP
-The following symbolic constants are provided for
-.IR mode :
-.TP 9
-.B S_IRWXU
-00700 user (file owner) has read, write and execute permission
-.TP
-.B S_IRUSR
-00400 user has read permission
-.TP
-.B S_IWUSR
-00200 user has write permission
-.TP
-.B S_IXUSR
-00100 user has execute permission
-.TP
-.B S_IRWXG
-00070 group has read, write and execute permission
-.TP
-.B S_IRGRP
-00040 group has read permission
-.TP
-.B S_IWGRP
-00020 group has write permission
-.TP
-.B S_IXGRP
-00010 group has execute permission
-.TP
-.B S_IRWXO
-00007 others have read, write and execute permission
-.TP
-.B S_IROTH
-00004 others have read permission
-.TP
-.B S_IWOTH
-00002 others have write permission
-.TP
-.B S_IXOTH
-00001 others have execute permission
 .RE
 .TP
 .BR O_DIRECT " (since Linux 2.4.10)"
@@ -1489,6 +1455,11 @@ as a performance option which is disabled by default.
 interface is just stupid, and was probably designed by a deranged monkey
 on some serious mind-controlling substances."\(emLinus
 .RE
+.SH NOTES
+Under Linux, apart from the permission bits, the
+.BR S_ISUID ", " S_ISGID ", and " S_ISVTX
+.I mode
+bits are also honored.
 .SH BUGS
 Currently, it is not possible to enable signal-driven
 I/O by specifying
diff --git a/man2/stat.2 b/man2/stat.2
index a78ffaf..aa9494f 100644
--- a/man2/stat.2
+++ b/man2/stat.2
@@ -381,18 +381,18 @@ S_ISUID	0004000	set-user-ID bit
 S_ISGID	0002000	set-group-ID bit (see below)
 S_ISVTX	0001000	sticky bit (see below)
 
-S_IRWXU	  00700	mask for file owner permissions
+S_IRWXU	  00700	owner has read, write and execute permission
 S_IRUSR	  00400	owner has read permission
 S_IWUSR	  00200	owner has write permission
 S_IXUSR	  00100	owner has execute permission
 
-S_IRWXG	  00070	mask for group permissions
+S_IRWXG	  00070	group has read, write and execute permission
 S_IRGRP	  00040	group has read permission
 S_IWGRP	  00020	group has write permission
 S_IXGRP	  00010	group has execute permission
 
 S_IRWXO	  00007	T{
-mask for permissions for others (not in group)
+others (not in group) have read, write and execute permission
 T}
 S_IROTH	  00004	others have read permission
 S_IWOTH	  00002	others have write permission
-- 
2.1.0

--
To unsubscribe from this list: send the line "unsubscribe linux-man" in
the body of a message to majordomo-u79uwXL29TY76Z2rM5mHXA@public.gmane.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

^ permalink raw reply related	[flat|nested] 6+ messages in thread

* [PATCH 2/2] umask.2, open.2, mknod.2, mkdir.2: Explain what default acls do
       [not found] ` <fe89279fbad286454188b3146b311442cdb7401f.1428946673.git.andreas.gruenbacher-Re5JQEeQqe8AvxtiuMwx3w@public.gmane.org>
@ 2015-04-13 17:38   ` Andreas Gruenbacher
       [not found]     ` <3fa52386efe0d027409e803629c6b751e0b7b602.1428946673.git.andreas.gruenbacher-Re5JQEeQqe8AvxtiuMwx3w@public.gmane.org>
  2015-04-21 12:38   ` [PATCH 1/2] open.2: Clarify which create mode bits are relevant Michael Kerrisk (man-pages)
  1 sibling, 1 reply; 6+ messages in thread
From: Andreas Gruenbacher @ 2015-04-13 17:38 UTC (permalink / raw)
  To: mtk.manpages-Re5JQEeQqe8AvxtiuMwx3w
  Cc: linux-man-u79uwXL29TY76Z2rM5mHXA, Andreas Gruenbacher

Explain the effect that default acls have (instead of the umask) in umask.2.
Mention that default acls can have an affect in open.2, mknod.2, and mkdir.2.

Signed-off-by: Andreas Gruenbacher <agruenba-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org>
---
 man2/mkdir.2 |  5 ++---
 man2/mknod.2 |  5 +++--
 man2/open.2  |  3 ++-
 man2/umask.2 | 11 +++++++++++
 4 files changed, 18 insertions(+), 6 deletions(-)

diff --git a/man2/mkdir.2 b/man2/mkdir.2
index 41fad55..42fc26b 100644
--- a/man2/mkdir.2
+++ b/man2/mkdir.2
@@ -54,7 +54,8 @@ The argument
 specifies the permissions to use.
 It is modified by the process's
 .I umask
-in the usual way: the permissions of the created directory are
+in the usual way: in the absence of a default acl, the permissions of the
+created directory are
 .RI ( mode " & ~" umask " & 0777)."
 Other mode bits of the created directory depend on the operating system.
 For Linux, see below.
@@ -212,8 +213,6 @@ POSIX.1-2008.
 Under Linux, apart from the permission bits, only the
 .B S_ISVTX
 mode bit is honored.
-That is, under Linux the created directory actually gets mode
-.RI ( mode " & ~" umask " & 01777)."
 See also
 .BR stat (2).
 .PP
diff --git a/man2/mknod.2 b/man2/mknod.2
index e93c345..7a8dd1e 100644
--- a/man2/mknod.2
+++ b/man2/mknod.2
@@ -63,8 +63,9 @@ listed below and the permissions for the new node.
 
 The permissions are modified by the process's
 .I umask
-in the usual way: the permissions of the created node are
-.IR "(mode & ~umask)" .
+in the usual way: in the absence of a default acl, the permissions of the
+created node are
+.RI ( mode " & ~" umask ).
 
 The file type must be one of
 .BR S_IFREG ,
diff --git a/man2/open.2 b/man2/open.2
index 96ee576..7508222 100644
--- a/man2/open.2
+++ b/man2/open.2
@@ -280,7 +280,8 @@ is ignored.
 The effective permissions are modified by
 the process's
 .I umask
-in the usual way: The permissions of the created file are
+in the usual way: In the absence of a default acl, the permissions of the
+created file are
 .IR "(mode\ &\ ~umask)" .
 Note that this mode applies only to future accesses of the
 newly created file; the
diff --git a/man2/umask.2 b/man2/umask.2
index e5e5750..905f2cd 100644
--- a/man2/umask.2
+++ b/man2/umask.2
@@ -63,6 +63,17 @@ argument to
 and
 .BR mkdir (2).
 
+Alternatively, if the parent directory has a default acl (see
+.BR acl (5)),
+the umask is ignored, the default acl is inherited, the permission bits are set
+based on the inherited acl, and permission bits absent in the
+.I mode
+argument are turned off.  For example, the default acl
+u::rwx,g::r-x,o::r-x is equivalent to a umask of 022, and with a
+.I mode
+argument of 0666 (rw-rw-rw-), the resulting file permissions are 0644
+(rw-r--r--).
+
 The constants that should be used to specify
 .I mask
 are described under
-- 
2.1.0

--
To unsubscribe from this list: send the line "unsubscribe linux-man" in
the body of a message to majordomo-u79uwXL29TY76Z2rM5mHXA@public.gmane.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

^ permalink raw reply related	[flat|nested] 6+ messages in thread

* Re: [PATCH 1/2] open.2: Clarify which create mode bits are relevant
       [not found] ` <fe89279fbad286454188b3146b311442cdb7401f.1428946673.git.andreas.gruenbacher-Re5JQEeQqe8AvxtiuMwx3w@public.gmane.org>
  2015-04-13 17:38   ` [PATCH 2/2] umask.2, open.2, mknod.2, mkdir.2: Explain what default acls do Andreas Gruenbacher
@ 2015-04-21 12:38   ` Michael Kerrisk (man-pages)
       [not found]     ` <553644D4.2050905-Re5JQEeQqe8AvxtiuMwx3w@public.gmane.org>
  1 sibling, 1 reply; 6+ messages in thread
From: Michael Kerrisk (man-pages) @ 2015-04-21 12:38 UTC (permalink / raw)
  To: Andreas Gruenbacher
  Cc: mtk.manpages-Re5JQEeQqe8AvxtiuMwx3w,
	linux-man-u79uwXL29TY76Z2rM5mHXA, Andreas Gruenbacher

Hi Andreas,

On 04/13/2015 07:38 PM, Andreas Gruenbacher wrote:
> Clarify that on Linux, the S_ISUID, S_ISGID, and S_IVTX bits in the create mode
> are also honored.
> 
> Instead of repeating the S_I* definitions here, incompletely, refer to stat(2).

Thanks for the patch.

I'd have preferred it in three pieces, though, I think:

1) Improve stat(2)
2) Remove mode bits from open(92)
3) Explain that open(2) honors the S_ISVTX, S_ISUID, and S_ISGID.

What I did was to:

Accept (1).

Reject (2), since I'd rather save the reader of open(3) the trouble of 
consulting another page (and open(2) is likely a more often used man page 
than stat(2)).

Do (3) in a rather different way, that captures your intent. The changes are
already pushed to Git, in case you want to take a look.

Cheers,

Michael

> Signed-off-by: Andreas Gruenbacher <agruenba-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org>
> ---
>  man2/open.2 | 51 +++++++++++----------------------------------------
>  man2/stat.2 |  6 +++---
>  2 files changed, 14 insertions(+), 43 deletions(-)
> 
> diff --git a/man2/open.2 b/man2/open.2
> index 053bab1..96ee576 100644
> --- a/man2/open.2
> +++ b/man2/open.2
> @@ -258,7 +258,12 @@ described in
>  .RS
>  .PP
>  .I mode
> -specifies the permissions to use in case a new file is created.
> +specifies the permissions to use in case a new file is created; see
> +the definition of the file permission mask values in
> +.BR stat (2).
> +When bits other than the file permission bits are set in
> +.IR mode ,
> +the effect is unspecified; for Linux, see below.
>  This argument must be supplied when
>  .B O_CREAT
>  or
> @@ -282,45 +287,6 @@ newly created file; the
>  .BR open ()
>  call that creates a read-only file may well return a read/write
>  file descriptor.
> -.PP
> -The following symbolic constants are provided for
> -.IR mode :
> -.TP 9
> -.B S_IRWXU
> -00700 user (file owner) has read, write and execute permission
> -.TP
> -.B S_IRUSR
> -00400 user has read permission
> -.TP
> -.B S_IWUSR
> -00200 user has write permission
> -.TP
> -.B S_IXUSR
> -00100 user has execute permission
> -.TP
> -.B S_IRWXG
> -00070 group has read, write and execute permission
> -.TP
> -.B S_IRGRP
> -00040 group has read permission
> -.TP
> -.B S_IWGRP
> -00020 group has write permission
> -.TP
> -.B S_IXGRP
> -00010 group has execute permission
> -.TP
> -.B S_IRWXO
> -00007 others have read, write and execute permission
> -.TP
> -.B S_IROTH
> -00004 others have read permission
> -.TP
> -.B S_IWOTH
> -00002 others have write permission
> -.TP
> -.B S_IXOTH
> -00001 others have execute permission
>  .RE
>  .TP
>  .BR O_DIRECT " (since Linux 2.4.10)"
> @@ -1489,6 +1455,11 @@ as a performance option which is disabled by default.
>  interface is just stupid, and was probably designed by a deranged monkey
>  on some serious mind-controlling substances."\(emLinus
>  .RE
> +.SH NOTES
> +Under Linux, apart from the permission bits, the
> +.BR S_ISUID ", " S_ISGID ", and " S_ISVTX
> +.I mode
> +bits are also honored.
>  .SH BUGS
>  Currently, it is not possible to enable signal-driven
>  I/O by specifying
> diff --git a/man2/stat.2 b/man2/stat.2
> index a78ffaf..aa9494f 100644
> --- a/man2/stat.2
> +++ b/man2/stat.2
> @@ -381,18 +381,18 @@ S_ISUID	0004000	set-user-ID bit
>  S_ISGID	0002000	set-group-ID bit (see below)
>  S_ISVTX	0001000	sticky bit (see below)
>  
> -S_IRWXU	  00700	mask for file owner permissions
> +S_IRWXU	  00700	owner has read, write and execute permission
>  S_IRUSR	  00400	owner has read permission
>  S_IWUSR	  00200	owner has write permission
>  S_IXUSR	  00100	owner has execute permission
>  
> -S_IRWXG	  00070	mask for group permissions
> +S_IRWXG	  00070	group has read, write and execute permission
>  S_IRGRP	  00040	group has read permission
>  S_IWGRP	  00020	group has write permission
>  S_IXGRP	  00010	group has execute permission
>  
>  S_IRWXO	  00007	T{
> -mask for permissions for others (not in group)
> +others (not in group) have read, write and execute permission
>  T}
>  S_IROTH	  00004	others have read permission
>  S_IWOTH	  00002	others have write permission
> 


-- 
Michael Kerrisk
Linux man-pages maintainer; http://www.kernel.org/doc/man-pages/
Linux/UNIX System Programming Training: http://man7.org/training/
--
To unsubscribe from this list: send the line "unsubscribe linux-man" in
the body of a message to majordomo-u79uwXL29TY76Z2rM5mHXA@public.gmane.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

^ permalink raw reply	[flat|nested] 6+ messages in thread

* Re: [PATCH 2/2] umask.2, open.2, mknod.2, mkdir.2: Explain what default acls do
       [not found]     ` <3fa52386efe0d027409e803629c6b751e0b7b602.1428946673.git.andreas.gruenbacher-Re5JQEeQqe8AvxtiuMwx3w@public.gmane.org>
@ 2015-04-21 12:39       ` Michael Kerrisk (man-pages)
  0 siblings, 0 replies; 6+ messages in thread
From: Michael Kerrisk (man-pages) @ 2015-04-21 12:39 UTC (permalink / raw)
  To: Andreas Gruenbacher
  Cc: mtk.manpages-Re5JQEeQqe8AvxtiuMwx3w,
	linux-man-u79uwXL29TY76Z2rM5mHXA, Andreas Gruenbacher

Hi Andreas,

I applied, but fixed a little, including one important detail below.

On 04/13/2015 07:38 PM, Andreas Gruenbacher wrote:
> Explain the effect that default acls have (instead of the umask) in umask.2.
> Mention that default acls can have an affect in open.2, mknod.2, and mkdir.2.
> 
> Signed-off-by: Andreas Gruenbacher <agruenba-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org>
> ---
>  man2/mkdir.2 |  5 ++---
>  man2/mknod.2 |  5 +++--
>  man2/open.2  |  3 ++-
>  man2/umask.2 | 11 +++++++++++
>  4 files changed, 18 insertions(+), 6 deletions(-)
> 
> diff --git a/man2/mkdir.2 b/man2/mkdir.2
> index 41fad55..42fc26b 100644
> --- a/man2/mkdir.2
> +++ b/man2/mkdir.2
> @@ -54,7 +54,8 @@ The argument
>  specifies the permissions to use.
>  It is modified by the process's
>  .I umask
> -in the usual way: the permissions of the created directory are
> +in the usual way: in the absence of a default acl, the permissions of the
> +created directory are
>  .RI ( mode " & ~" umask " & 0777)."
>  Other mode bits of the created directory depend on the operating system.
>  For Linux, see below.
> @@ -212,8 +213,6 @@ POSIX.1-2008.
>  Under Linux, apart from the permission bits, only the
>  .B S_ISVTX
>  mode bit is honored.
> -That is, under Linux the created directory actually gets mode
> -.RI ( mode " & ~" umask " & 01777)."

You dropped a "1" from the expression here. I restored it.

Thanks for the patch!

Cheers,

Michael

-- 
Michael Kerrisk
Linux man-pages maintainer; http://www.kernel.org/doc/man-pages/
Linux/UNIX System Programming Training: http://man7.org/training/
--
To unsubscribe from this list: send the line "unsubscribe linux-man" in
the body of a message to majordomo-u79uwXL29TY76Z2rM5mHXA@public.gmane.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

^ permalink raw reply	[flat|nested] 6+ messages in thread

* Re: [PATCH 1/2] open.2: Clarify which create mode bits are relevant
       [not found]     ` <553644D4.2050905-Re5JQEeQqe8AvxtiuMwx3w@public.gmane.org>
@ 2015-04-21 13:02       ` Andreas Grünbacher
       [not found]         ` <CAHpGcMLAphV8v0yPsuoiDjtG6Vqfy8wvrFTk23_mjZNAqjpwzA-JsoAwUIsXosN+BqQ9rBEUg@public.gmane.org>
  0 siblings, 1 reply; 6+ messages in thread
From: Andreas Grünbacher @ 2015-04-21 13:02 UTC (permalink / raw)
  To: Michael Kerrisk (man-pages)
  Cc: linux-man-u79uwXL29TY76Z2rM5mHXA, Andreas Gruenbacher

Michael,

thanks for your further improvements. I agree with most of them, some
things didn't go so well though:


Commit "stat.2: Tighten wording: use 'mode bit' rather than
'permission bit'" is bad:

The stat man page distinguishes between the "file type component" and
"file permissions component" of the mode; now this distinction is
broken. Also, the second sentence now even makes less sense (not that
it did make much sense before):

"According to POSIX.1-2001, lstat() on a symbolic link need return
valid information only in the st_size field and the file-type
component of the st_mode field of the stat structure.  POSIX.1-2008
tightens the specification, requiring lstat() to return valid
information in all fields except the mode bits in st_mode."

My guess wuold be that POSIX.1-2008 actually requires valid permission
bits as well.


Commit "mkdir.2: Fix a small error added by Andreas's patch" is also bad:

The mkdir(2) man page was describing the general behavior under
DESCRIPTION and the Linux behavior under NOTES; it should still do so
but now it doesn't anymore.


Thanks,
Andreas
--
To unsubscribe from this list: send the line "unsubscribe linux-man" in
the body of a message to majordomo-u79uwXL29TY76Z2rM5mHXA@public.gmane.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

^ permalink raw reply	[flat|nested] 6+ messages in thread

* Re: [PATCH 1/2] open.2: Clarify which create mode bits are relevant
       [not found]         ` <CAHpGcMLAphV8v0yPsuoiDjtG6Vqfy8wvrFTk23_mjZNAqjpwzA-JsoAwUIsXosN+BqQ9rBEUg@public.gmane.org>
@ 2015-04-21 13:58           ` Michael Kerrisk (man-pages)
  0 siblings, 0 replies; 6+ messages in thread
From: Michael Kerrisk (man-pages) @ 2015-04-21 13:58 UTC (permalink / raw)
  To: Andreas Grünbacher
  Cc: mtk.manpages-Re5JQEeQqe8AvxtiuMwx3w,
	linux-man-u79uwXL29TY76Z2rM5mHXA, Andreas Gruenbacher

Hi Andreas,

On 04/21/2015 03:02 PM, Andreas Grünbacher wrote:
> Michael,
> 
> thanks for your further improvements. I agree with most of them, some
> things didn't go so well though:
> 
> 
> Commit "stat.2: Tighten wording: use 'mode bit' rather than
> 'permission bit'" is bad:
> 
> The stat man page distinguishes between the "file type component" and
> "file permissions component" of the mode; now this distinction is
> broken. Also, the second sentence now even makes less sense (not that
> it did make much sense before):

The thing is, POSIX goes into slightly finer granularity than that, 
and that's why I made these changes (though it may be that further
tweaks are still required).

POSIX breaks down st_mode as follows:

* File type
* File mode, which consists of:
    (1) The permissions bits
    (2) The three bits S_ISVTX, S_ISUID, S_ISGID

Quoting POSIX:

[[
3.169 File Mode Bits
A file's file permission bits, set-user-ID-on-execution bit 
(S_ISUID), set-group-ID-on-execution bit (S_ISGID), and, on
directories, the restricted deletion flag bit (S_ISVTX).

3.175 File Permission Bits
Information about a file that is used, along with other 
information, to determine whether a process has read, write, or
execute/search permission to a file. The bits are divided into three
parts: owner, group, and other. Each part is used with the 
corresponding file class of processes. These bits are contained in 
the file mode.
]]

I.e., the file mode bits are a superset of the filer permission bits.

And then in the specification of open(), POSIX says:

    When bits other than the file permission bits are set, 
    the effect is unspecified.

So, that's the impetus for my changes. And now I've added this text to stat(2):

       POSIX  refers  to the 12 st_mode bits corresponding to the mask
       07777 as the file mode bits and the least  significant  9  bits
       (00777) as the file permission bits.

With all of that said, does the changes to stat(2) (and other pages)
seem okay to you now?

> "According to POSIX.1-2001, lstat() on a symbolic link need return
> valid information only in the st_size field and the file-type
> component of the st_mode field of the stat structure.  POSIX.1-2008
> tightens the specification, requiring lstat() to return valid
> information in all fields except the mode bits in st_mode."
> 
> My guess wuold be that POSIX.1-2008 actually requires valid permission
> bits as well.

But it doesn't. The file type in st_mode is required to be valid, but the 
(12) file _mode_ bits are not. POSIX says:

       For symbolic links, the st_mode member shall contain meaningful
       information  when used with the file type macros. The file mode
       bits in st_mode are unspecified.

> Commit "mkdir.2: Fix a small error added by Andreas's patch" is also bad:
> 
> The mkdir(2) man page was describing the general behavior under
> DESCRIPTION and the Linux behavior under NOTES; it should still do so
> but now it doesn't anymore.

The problem I saw was that the page was somewhat contradictory. But I 
see that you're right, that I mushed things somewhat in trying to fix
this. I've reworked the text now. Hopefully you find it better. Thanks
for spotting the mess up.

Cheers,

Michael

-- 
Michael Kerrisk
Linux man-pages maintainer; http://www.kernel.org/doc/man-pages/
Linux/UNIX System Programming Training: http://man7.org/training/
--
To unsubscribe from this list: send the line "unsubscribe linux-man" in
the body of a message to majordomo-u79uwXL29TY76Z2rM5mHXA@public.gmane.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

^ permalink raw reply	[flat|nested] 6+ messages in thread

end of thread, other threads:[~2015-04-21 13:58 UTC | newest]

Thread overview: 6+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2015-04-13 17:38 [PATCH 1/2] open.2: Clarify which create mode bits are relevant Andreas Gruenbacher
     [not found] ` <fe89279fbad286454188b3146b311442cdb7401f.1428946673.git.andreas.gruenbacher-Re5JQEeQqe8AvxtiuMwx3w@public.gmane.org>
2015-04-13 17:38   ` [PATCH 2/2] umask.2, open.2, mknod.2, mkdir.2: Explain what default acls do Andreas Gruenbacher
     [not found]     ` <3fa52386efe0d027409e803629c6b751e0b7b602.1428946673.git.andreas.gruenbacher-Re5JQEeQqe8AvxtiuMwx3w@public.gmane.org>
2015-04-21 12:39       ` Michael Kerrisk (man-pages)
2015-04-21 12:38   ` [PATCH 1/2] open.2: Clarify which create mode bits are relevant Michael Kerrisk (man-pages)
     [not found]     ` <553644D4.2050905-Re5JQEeQqe8AvxtiuMwx3w@public.gmane.org>
2015-04-21 13:02       ` Andreas Grünbacher
     [not found]         ` <CAHpGcMLAphV8v0yPsuoiDjtG6Vqfy8wvrFTk23_mjZNAqjpwzA-JsoAwUIsXosN+BqQ9rBEUg@public.gmane.org>
2015-04-21 13:58           ` Michael Kerrisk (man-pages)

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.