libgocryptfs/internal/fusefrontend
Jakob Unterwurzacher 0115588680 main, fusefrontend: enable suid functionality
FUSE filesystems are mounted with "nosuid" by default. If we run as root,
we can use device files by passing the opposite mount option, "suid".

Also we have to use syscall.Chmod instead of os.Chmod because the
portability translation layer "syscallMode" messes up the sgid
and suid bits.

Fixes 70% of the failures in xfstests generic/193. The remaining are
related to truncate, but we err on the safe side:

    $ diff -u tests/generic/193.out /home/jakob/src/fuse-xfstests/results//generic/193.out.bad
    [...]
     check that suid/sgid bits are cleared after successful truncate...
     with no exec perm
     before: -rwSr-Sr--
    -after:  -rw-r-Sr--
    +after:  -rw-r--r--
2016-06-26 20:13:21 +02:00
..
args.go fusefronted: preserve owner if running as root 2016-06-26 19:18:13 +02:00
compat_darwin.go Move pathfs_frontend to internal/fusefrontend 2016-02-06 19:27:59 +01:00
compat_linux.go Rename internal "toggledlog" package to "tlog" 2016-06-15 23:30:44 +02:00
file_holes.go Rename internal "toggledlog" package to "tlog" 2016-06-15 23:30:44 +02:00
file.go main, fusefrontend: enable suid functionality 2016-06-26 20:13:21 +02:00
fs_dir.go Drop deprecated "-diriv" option 2016-06-23 21:38:59 +02:00
fs.go main, fusefrontend: enable suid functionality 2016-06-26 20:13:21 +02:00
names.go Drop deprecated "-diriv" option 2016-06-23 21:38:59 +02:00
write_lock.go fusefrontend: simplify wlockMap 2016-05-29 22:40:05 +02:00