aboutsummaryrefslogtreecommitdiff
path: root/doc/kernel.txt
diff options
context:
space:
mode:
Diffstat (limited to 'doc/kernel.txt')
-rw-r--r--doc/kernel.txt8
1 files changed, 4 insertions, 4 deletions
diff --git a/doc/kernel.txt b/doc/kernel.txt
index 7938aab..e73484f 100644
--- a/doc/kernel.txt
+++ b/doc/kernel.txt
@@ -39,7 +39,7 @@ What is FUSE?
FUSE is a userspace filesystem framework. It consists of a kernel
module (fuse.ko), a userspace library (libfuse.*) and a mount utility
-(fusermount).
+(fusermount3).
One of the most important features of FUSE is allowing secure,
non-privileged mounts. This opens up new possibilities for the use of
@@ -176,7 +176,7 @@ How do non-privileged mounts work?
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Since the mount() system call is a privileged operation, a helper
-program (fusermount) is needed, which is installed setuid root.
+program (fusermount3) is needed, which is installed setuid root.
The implication of providing non-privileged mounts is that the mount
owner must not be able to use this capability to compromise the
@@ -204,7 +204,7 @@ How are requirements fulfilled?
The solution is not to allow opening device files and ignore
setuid and setgid bits when executing programs. To ensure this
- fusermount always adds "nosuid" and "nodev" to the mount options
+ fusermount3 always adds "nosuid" and "nodev" to the mount options
for non-privileged mounts.
B) If another user is accessing files or directories in the
@@ -222,7 +222,7 @@ How are requirements fulfilled?
owner could otherwise not be able to modify (or could only
make limited modifications).
- This is solved in fusermount, by checking the access
+ This is solved in fusermount3, by checking the access
permissions on the mountpoint and only allowing the mount if
the mount owner can do unlimited modification (has write
access to the mountpoint, and mountpoint is not a "sticky"