1.\"- 2.\" Copyright (c) 2000-2001 Robert N. M. Watson 3.\" All rights reserved. 4.\" 5.\" This software was developed by Robert Watson for the TrustedBSD Project. 6.\" 7.\" Redistribution and use in source and binary forms, with or without 8.\" modification, are permitted provided that the following conditions 9.\" are met: 10.\" 1. Redistributions of source code must retain the above copyright 11.\" notice, this list of conditions and the following disclaimer. 12.\" 2. Redistributions in binary form must reproduce the above copyright 13.\" notice, this list of conditions and the following disclaimer in the 14.\" documentation and/or other materials provided with the distribution. 15.\" 16.\" THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND 17.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 18.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 19.\" ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE 20.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 21.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 22.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 23.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 24.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 25.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 26.\" SUCH DAMAGE. 27.\" 28.\" $FreeBSD$ 29.\" 30.\" Developed by the TrustedBSD Project. 31.\" Support for POSIX.1e access control lists. 32.\" 33.Dd March 30, 2000 34.Dt GETFACL 1 35.Os 36.Sh NAME 37.Nm getfacl 38.Nd get ACL information 39.Sh SYNOPSIS 40.Nm 41.Op Fl d 42.Op Ar 43.Sh DESCRIPTION 44The 45.Nm 46utility writes discretionary access control information associated with 47the specified file(s) to standard output. 48If the 49.Xr getconf 1 50utility indicates that 51.Eq { } Va _POSIX_ACL_EXTENDED 52is not in effect for a 53.Ar file 54then the standard discretionary access permissions are interpreted as 55an ACL containing only the required ACL entries. 56.Pp 57The following option is available: 58.Bl -tag -width indent 59.It Fl d 60The operation applies to the default ACL of a directory instead of the 61access ACL. 62An error is generated if a default ACL cannot be associated with 63.Ar file . 64.El 65.Pp 66The following operand is available: 67.Bl -tag -width indent 68.It Ar file 69A pathname of a file whose ACL shall be retrieved. 70If 71.Ar file 72is not specified, or a 73.Ar file 74is specified as 75.Fl , 76then 77.Nm 78reads a list of pathnames, each terminated by one newline character, 79from the standard input. 80.El 81.Sh EXAMPLES 82.Dl getfacl / 83.Pp 84Retrieve ACL for the directory 85.Pa / . 86.Pp 87.Dl getfacl -d / 88.Pp 89Retrieve the default ACL for the directory 90.Pa / , 91if any. 92.Sh SEE ALSO 93.Xr setfacl 1 , 94.Xr acl 3 , 95.Xr getextattr 8 , 96.Xr setextattr 8 , 97.Xr acl 9 , 98.Xr extattr 9 99.Sh STANDARDS 100The 101.Nm 102utility is expected to be 103.Tn IEEE 104Std 1003.2c compliant. 105.Sh HISTORY 106Extended Attribute and Access Control List support was developed as part 107of the 108.Tn TrustedBSD 109Project and introduced in 110.Fx 5.0 . 111.Sh AUTHORS 112.An Robert N M Watson 113