Nikolaus Rath [Tue, 6 Nov 2018 18:57:47 +0000 (18:57 +0000)]
Released 3.3.0
Nikolaus Rath [Tue, 6 Nov 2018 18:54:06 +0000 (18:54 +0000)]
Update CI build script
There is no gcc-6 package anymore.
Nikolaus Rath [Tue, 6 Nov 2018 18:52:15 +0000 (18:52 +0000)]
Revert "Do not include struct fuse_buf in struct fuse_worker"
This reverts commit
161983e2416bc6e26bbbe89664fff62c48c70858,
because this causes resource leaks when threads are terminated
by pthread_cancel().
Fixes: #313.
Kevin Vigor [Tue, 16 Oct 2018 23:23:07 +0000 (17:23 -0600)]
Avoid double unmount on normal unmount in auto_unmount mode.
If a fuse filesystem was mounted in auto_unmount mode on top of an
already mounted filesystem, we would end up doing a double-unmount
when the fuse filesystem was unmounted properly.
Make the auto_unmount code less eager: unmount only if the mounted
filesystem has proper type and is returning 'Transport endpoint not
connected'.
Nikolaus Rath [Tue, 6 Nov 2018 18:41:58 +0000 (18:41 +0000)]
Document when `fuse_lowlevel_notify_*` functions may block.
Valentin Plugaru [Fri, 19 Oct 2018 21:19:28 +0000 (23:19 +0200)]
Add SpectrumScale/GPFS and Lustre to FS whitelist
Fixes: #304
Signed-off-by: Valentin Plugaru <valentin.plugaru@uni.lu>
Ahmed Masud [Fri, 19 Oct 2018 21:17:48 +0000 (17:17 -0400)]
Do not fail "ninja test" when running as subproject
Nikolaus Rath [Tue, 16 Oct 2018 13:06:19 +0000 (06:06 -0700)]
Bump minimum Meson version
According to user reports (https://github.com/libfuse/libfuse/pull/300),
we need at least version 0.42.
Nikolaus Rath [Thu, 11 Oct 2018 07:52:31 +0000 (08:52 +0100)]
Clarified licensing terms.
Fixes: #213.
Nikolaus Rath [Mon, 1 Oct 2018 10:10:36 +0000 (11:10 +0100)]
Enable more tests for passthrough_ll
Miklos Szeredi [Wed, 15 Aug 2018 08:36:31 +0000 (10:36 +0200)]
passthrough_ll: initialize unused memory
For '.' and '..' entries only the file type in e.attr.st_mode and the inode
number in e.attr.st_ino are used. But it's prudent to at least initialize
the other fields of struct fuse_entry_param as well, instead of using
random values from the stack.
Miklos Szeredi [Tue, 14 Aug 2018 19:37:02 +0000 (21:37 +0200)]
passthrough_ll: allow configuring caching
Caching can be controlled with the following options:
"cache=never": disable caching
"cache=normal": enable caching but also refresh after the timeout
"cache=always": never refresh cache
The timeout can be controlled with the "timeout=SEC" option, where SEC is
the number of seconds and can be an arbitrary non-negative floating point
number.
Signed-off-by: Miklos Szeredi <mszeredi@redhat.com>
Miklos Szeredi [Tue, 14 Aug 2018 19:37:02 +0000 (21:37 +0200)]
passthrough_ll: add *xattr() operations
The extended attribute functionality is enabled with the "xattr" option
(default) and disabled with the "no_xatt" option.
New operations added:
- getxattr
- listxattr
- setxattr
- removexattr
Caveat: none of these operations will work on a symbolic link, because it's
difficult to implement that without races that can result in incorrect
operation.
Signed-off-by: Miklos Szeredi <mszeredi@redhat.com>
Miklos Szeredi [Tue, 14 Aug 2018 19:37:02 +0000 (21:37 +0200)]
passthrough_ll: add flock()
Conditionally enable flock() locking on underlying filesystem, based on the
flock/no_flock options. Default is "no_flock", meaning locking will be
local to the fuse filesystem and won't be propagated to the filesystem
passed through.
Signed-off-by: Miklos Szeredi <mszeredi@redhat.com>
Miklos Szeredi [Tue, 14 Aug 2018 19:37:02 +0000 (21:37 +0200)]
passthrough_ll: whitespace cleanup
Signed-off-by: Miklos Szeredi <mszeredi@redhat.com>
Vivek Goyal [Tue, 14 Aug 2018 19:37:02 +0000 (21:37 +0200)]
passthrough_ll: add forget_multi()
Add method forget_multi() to forget multiple inodes in a single message.
Signed-off-by: Vivek Goyal <vgoyal@redhat.com>
Signed-off-by: Miklos Szeredi <mszeredi@redhat.com>
Vivek Goyal [Tue, 14 Aug 2018 19:37:02 +0000 (21:37 +0200)]
passthrough_ll: add source option
Right now, passthrough_ll will use "/" as source directory for passthrough.
We need more flexibility where user can specify path of directory to be
passed through. Hence add an option "source=<source-dir>".
Signed-off-by: Vivek Goyal <vgoyal@redhat.com>
Signed-off-by: Miklos Szeredi <mszeredi@redhat.com>
Miklos Szeredi [Tue, 19 Jun 2018 18:33:21 +0000 (14:33 -0400)]
passthrough_ll: add some of the missing operations
New operations added:
- mkdir
- mknod
- symlink
- link
- unlink
- rmdir
- rename
- setattr
- fsyncdir
- flush
- fsync
- statfs
- fallocate
Caveats:
- The utimes(2) family of syscalls will fail on symlinks on 4.18 and
earlier kernels. Hoping to add support to later kernels.
- The link(2) and linkat(2) system calls will fail on symlinks unless running
with privileges (CAP_DAC_READ_SEARCH).
Signed-off-by: Vivek Goyal <vgoyal@redhat.com>
Signed-off-by: Miklos Szeredi <mszeredi@redhat.com>
Miklos Szeredi [Tue, 14 Aug 2018 19:37:02 +0000 (21:37 +0200)]
passthrough_ll: add is_symlink to lo_inode
Signed-off-by: Miklos Szeredi <mszeredi@redhat.com>
Miklos Szeredi [Tue, 14 Aug 2018 19:37:02 +0000 (21:37 +0200)]
passthrough_ll: set umask at startup
Like all the other passthrough examples.
Signed-off-by: Miklos Szeredi <mszeredi@redhat.com>
Miklos Szeredi [Tue, 14 Aug 2018 19:37:02 +0000 (21:37 +0200)]
passthrough_ll: fix refcount for "." and ".." entries
Kernel is not expecting an elevated lookup count for the "." and ".."
entries when doing READDIRPLUS.
Signed-off-by: Miklos Szeredi <mszeredi@redhat.com>
Miklos Szeredi [Tue, 14 Aug 2018 19:37:02 +0000 (21:37 +0200)]
passthrough_ll: add locking to inode cache
Otherwise it may crash when running multithreaded.
Signed-off-by: Miklos Szeredi <mszeredi@redhat.com>
Mattias Nissler [Fri, 31 Aug 2018 07:44:04 +0000 (09:44 +0200)]
Add unprivileged option in `mount.fuse3`
The unprivileged option allows to run the FUSE file system process
without privileges by dropping capabilities and preventing them from
being re-acquired via setuid / fscaps etc. To accomplish this,
mount.fuse sets up the `/dev/fuse` file descriptor and mount itself
and passes the file descriptor via the `/dev/fd/%u` mountpoint syntax
to the FUSE file system.
Mattias Nissler [Mon, 27 Aug 2018 13:17:57 +0000 (15:17 +0200)]
Allow passing `/dev/fuse` file descriptor from parent process
This adds support for a mode of operation in which a privileged parent
process opens `/dev/fuse` and takes care of mounting. The FUSE file
system daemon can then run as an unprivileged child that merely
processes requests on the FUSE file descriptor, which get passed using
the special `/dev/fd/%u` syntax for the mountpoint parameter.
The main benefit is that no privileged operations need to be performed
by the FUSE file system daemon itself directly or indirectly, so the
FUSE process can run with fully unprivileged and mechanisms like
securebits and no_new_privs can be used to prevent subprocesses from
re-acquiring privilege via setuid, fscaps, etc. This reduces risk in
case the FUSE file system gets exploited by malicious file system
data.
Below is an example that illustrates this. Note that I'm using shell
for presentation purposes, the expectation is that the parent process
will implement the equivalent of the `mount -i` and `capsh` commands.
```
\# example/hello can mount successfully with privilege
$ sudo sh -c "LD_LIBRARY_PATH=build/lib ./example/hello /mnt/tmp"
$ sudo cat /mnt/tmp/hello
Hello World!
$ sudo umount /mnt/tmp
\# example/hello fails to mount without privilege
$ sudo capsh --drop=all --secbits=0x2f -- -c 'LD_LIBRARY_PATH=build/lib ./example/hello -f /mnt/tmp'
fusermount3: mount failed: Operation not permitted
\# Passing FUSE file descriptor via /dev/fd/%u allows example/hello to work without privilege
$ sudo sh -c '
exec 17<>/dev/fuse
mount -i -o nodev,nosuid,noexec,fd=17,rootmode=40000,user_id=0,group_id=0 -t fuse hello /mnt/tmp
capsh --drop=all --secbits=0x2f -- -c "LD_LIBRARY_PATH=build/lib example/hello /dev/fd/17"
'
$ sudo cat /mnt/tmp/hello
Hello World!
$ sudo umount /mnt/tmp
```
Martin Blanchard [Thu, 6 Sep 2018 23:07:19 +0000 (00:07 +0100)]
Add build options for utils and examples
Allow skipping utils build & installation (-Dutils=false) and examples
build (-Dexamples=false). By default behaviour is unchanged (both are
true: utils and examples get build).
Scott Worley [Tue, 25 Sep 2018 23:05:16 +0000 (16:05 -0700)]
Fix unlink errno check
Nikolaus Rath [Thu, 20 Sep 2018 07:56:16 +0000 (08:56 +0100)]
Clarify what qualifies as a "related operation" for notify_inval_entry.
Nikolaus Rath [Mon, 17 Sep 2018 13:53:30 +0000 (14:53 +0100)]
Don't enable adaptive readdirplus unless fs has readdir() handler.
Nikolaus Rath [Mon, 17 Sep 2018 09:45:16 +0000 (10:45 +0100)]
Do not include struct fuse_buf in struct fuse_worker
This is only used in fuse_do_work(), so we can put it on
the stack.
Nikolaus Rath [Mon, 17 Sep 2018 09:35:50 +0000 (10:35 +0100)]
Don't special-case bulid of mount_util.c.
We already support out of source builds without this.
Nikolaus Rath [Fri, 31 Aug 2018 11:48:04 +0000 (13:48 +0200)]
Released 3.2.6
Nikolaus Rath [Fri, 31 Aug 2018 11:38:26 +0000 (13:38 +0200)]
Do not hardcode /etc/fuse.conf path.
Nikolaus Rath [Thu, 30 Aug 2018 19:03:21 +0000 (21:03 +0200)]
Updated ChangeLog with recent changes.
Oded Arbel [Wed, 29 Aug 2018 16:20:56 +0000 (19:20 +0300)]
return different non-zero error codes (#290)
Return different error codes from fuse_main()
Rostislav [Sat, 25 Aug 2018 20:50:40 +0000 (20:50 +0000)]
Fix memory leak of FUSE modules
Rostislav [Sat, 25 Aug 2018 18:52:53 +0000 (18:52 +0000)]
Fix invalid free of memory pointer in 'struct fuse_buf'
Martin Blanchard [Mon, 20 Aug 2018 19:32:10 +0000 (20:32 +0100)]
Make meson build scripts subprojects friendly
Multiple meson build scripts improvements including:
* Bump meson requirement to 0.40.1 (0.40 already required)
* Declare a dependency object for main library
* Stop using add_global_arguments()
* Various minor style fixes
Daniel Fullmer [Thu, 9 Aug 2018 01:24:44 +0000 (21:24 -0400)]
Add bcachefs to mountpoint file system whitelist
Benjamin Barenblat [Fri, 3 Aug 2018 15:22:37 +0000 (11:22 -0400)]
Add FAT to mountpoint file system whitelist
Benjamin Barenblat [Fri, 3 Aug 2018 15:22:32 +0000 (11:22 -0400)]
Realphabetize and re-document mountpoint file system whitelist
Robo Shimmer [Tue, 31 Jul 2018 14:20:56 +0000 (16:20 +0200)]
Add autofs to mountpoint file system whitelist
Rostislav Skudnov [Tue, 24 Jul 2018 19:56:34 +0000 (19:56 +0000)]
Remove unused member of 'struct fuse_dh'
Nikolaus Rath [Tue, 24 Jul 2018 06:45:33 +0000 (07:45 +0100)]
Released 3.2.5
Nikolaus Rath [Wed, 18 Jul 2018 19:35:46 +0000 (20:35 +0100)]
Added ChangeLog entry for hardening patches.
Rostislav Skudnov [Mon, 23 Jul 2018 07:31:00 +0000 (07:31 +0000)]
test_write_cache: Use fuse_session_exit() to stop filesystem thread
Using fuse_session_exit() followed by fuse_session_unmount() ensures
that a proper cleanup and shutdown is performed.
Rostislav Skudnov [Sat, 21 Jul 2018 21:14:19 +0000 (21:14 +0000)]
example/{hello,null}: Fix memory leaks
Rostislav Skudnov [Sat, 21 Jul 2018 21:14:13 +0000 (21:14 +0000)]
test_write_cache: Fix memory leaks
Rostislav Skudnov [Sat, 21 Jul 2018 21:14:06 +0000 (21:14 +0000)]
fusermount: Fix memory leaks
Rostislav [Sat, 21 Jul 2018 09:57:09 +0000 (12:57 +0300)]
Fix readdir() bug when a non-zero offset is specified in filler (#269)
The bug occurs when a filesystem client reads a directory until the end,
seeks using seekdir() to some valid non-zero position and calls
readdir(). A valid 'struct dirent *' is expected, but NULL is returned
instead. Pseudocode demonstrating the bug:
DIR *dp = opendir("some_dir");
struct dirent *de = readdir(dp);
/* Get offset of the second entry */
long offset = telldir(dp);
/* Read directory until the end */
while (de)
de = readdir(de);
seekdir(dp, offset);
de = readdir(dp);
/* de must contain the second entry, but NULL is returned instead */
The reason of the bug is that when the end of directory is reached, the
kernel calls FUSE_READDIR op with an offset at the end of directory, so
the filesystem's .readdir callback never calls the filler function, and
we end up with dh->filled set to 1. After seekdir(), FUSE_READDIR is
called again with a new offset, but this time the filesystem's .readdir
callback is never called, and an empty reply is returned.
Fix by setting dh->filled to 1 only when zero offsets are given to
filler function.
Jann Horn [Sat, 14 Jul 2018 11:37:41 +0000 (13:37 +0200)]
fusermount: whitelist known-good filesystems for mountpoints
Before:
$ _FUSE_COMMFD=1 priv_strace -s8000 -e trace=mount util/fusermount3 /proc/self/fd
mount("/dev/fuse", ".", "fuse", MS_NOSUID|MS_NODEV, "fd=3,rootmode=40000,user_id=379777,group_id=5001") = 0
sending file descriptor: Socket operation on non-socket
+++ exited with 1 +++
After:
$ _FUSE_COMMFD=1 priv_strace -s8000 -e trace=mount util/fusermount3 /proc/self/fd
util/fusermount3: mounting over filesystem type 0x009fa0 is forbidden
+++ exited with 1 +++
This patch could potentially have security
impact on some systems that are configured with allow_other;
see https://launchpad.net/bugs/
1530566 for an example of how a similar
issue in the ecryptfs mount helper was exploitable. However, the FUSE
mount helper performs slightly different security checks, so that exact
attack doesn't work with fusermount; I don't know of any specific attack
you could perform using this, apart from faking the SELinux context of your
process when someone's looking at a process listing. Potential targets for
overwrite are (looking on a system with a 4.9 kernel):
writable only for the current process:
/proc/self/{fd,map_files}
(Yes, "ls -l" claims that you don't have write access, but that's not true;
"find -writable" will show you what access you really have.)
writable also for other owned processes:
/proc/$pid/{sched,autogroup,comm,mem,clear_refs,attr/*,oom_adj,
oom_score_adj,loginuid,coredump_filter,uid_map,gid_map,projid_map,
setgroups,timerslack_ns}
Jann Horn [Sat, 14 Jul 2018 10:47:50 +0000 (03:47 -0700)]
fusermount: refuse unknown options
Blacklists are notoriously fragile; especially if the kernel wishes to add
some security-critical mount option at a later date, all existing systems
with older versions of fusermount installed will suddenly have a security
problem.
Additionally, if the kernel's option parsing became a tiny bit laxer, the
blacklist could probably be bypassed.
Whitelist known-harmless flags instead, even if it's slightly more
inconvenient.
Jann Horn [Fri, 13 Jul 2018 22:50:50 +0000 (15:50 -0700)]
fusermount: bail out on transient config read failure
If an attacker wishes to use the default configuration instead of the
system's actual configuration, they can attempt to trigger a failure in
read_conf(). This only permits increasing mount_max if it is lower than the
default, so it's not particularly interesting. Still, this should probably
be prevented robustly; bail out if funny stuff happens when we're trying to
read the config.
Note that the classic attack trick of opening so many files that the
system-wide limit is reached won't work here - because fusermount only
drops the fsuid, not the euid, the process is running with euid=0 and
CAP_SYS_ADMIN, so it bypasses the number-of-globally-open-files check in
get_empty_filp() (unless you're inside a user namespace).
Jann Horn [Fri, 13 Jul 2018 22:15:36 +0000 (15:15 -0700)]
fusermount: don't feed "escaped commas" into mount options
The old code permits the following behavior:
$ _FUSE_COMMFD=10000 priv_strace -etrace=mount -s200 fusermount -o 'foobar=\,allow_other' mount
mount("/dev/fuse", ".", "fuse", MS_NOSUID|MS_NODEV, "foobar=\\,allow_other,fd=3,rootmode=40000,user_id=1000,group_id=1000") = -1 EINVAL (Invalid argument)
However, backslashes do not have any special meaning for the kernel here.
As it happens, you can't abuse this because there is no FUSE mount option
that takes a string value that can contain backslashes; but this is very
brittle. Don't interpret "escape characters" in places where they don't
work.
Jann Horn [Fri, 13 Jul 2018 21:51:17 +0000 (14:51 -0700)]
fusermount: prevent silent truncation of mount options
Currently, in the kernel, copy_mount_options() copies in one page of
userspace memory (or less if some of that memory area is not mapped).
do_mount() then writes a null byte to the last byte of the copied page.
This means that mount option strings longer than PAGE_SIZE-1 bytes get
truncated silently.
Therefore, this can happen:
user@d9-ut:~$ _FUSE_COMMFD=10000 fusermount -o "$(perl -e 'print ","x4000')" mount
sending file descriptor: Bad file descriptor
user@d9-ut:~$ grep /mount /proc/mounts
/dev/fuse /home/user/mount fuse rw,nosuid,nodev,relatime,user_id=1000,group_id=1000 0 0
user@d9-ut:~$ fusermount -u mount
user@d9-ut:~$ _FUSE_COMMFD=10000 fusermount -o "$(perl -e 'print ","x4050')" mount
sending file descriptor: Bad file descriptor
user@d9-ut:~$ grep /mount /proc/mounts
/dev/fuse /home/user/mount fuse rw,nosuid,nodev,relatime,user_id=1000,group_id=100 0 0
user@d9-ut:~$ fusermount -u mount
user@d9-ut:~$ _FUSE_COMMFD=10000 fusermount -o "$(perl -e 'print ","x4051')" mount
sending file descriptor: Bad file descriptor
user@d9-ut:~$ grep /mount /proc/mounts
/dev/fuse /home/user/mount fuse rw,nosuid,nodev,relatime,user_id=1000,group_id=10 0 0
user@d9-ut:~$ fusermount -u mount
user@d9-ut:~$ _FUSE_COMMFD=10000 fusermount -o "$(perl -e 'print ","x4052')" mount
sending file descriptor: Bad file descriptor
user@d9-ut:~$ grep /mount /proc/mounts
/dev/fuse /home/user/mount fuse rw,nosuid,nodev,relatime,user_id=1000,group_id=1 0 0
user@d9-ut:~$ fusermount -u mount
I'm not aware of any context in which this is actually exploitable - you'd
still need the UIDs to fit, and you can't do it if the three GIDs of the
process don't match (in the case of a typical setgid binary), but it does
look like something that should be fixed.
I also plan to try to get this fixed on the kernel side.
Nikolaus Rath [Wed, 11 Jul 2018 09:34:38 +0000 (10:34 +0100)]
Released 3.2.4
Nikolaus Rath [Wed, 11 Jul 2018 09:33:16 +0000 (10:33 +0100)]
Don't assume sub-second resolution for st_atime/st_mtime.
Fixes: #224
Nikolaus Rath [Wed, 4 Jul 2018 18:43:23 +0000 (19:43 +0100)]
Use triple quotes for multiline string.
Single quotes will become an error in a future meson release.
Nikolaus Rath [Wed, 4 Jul 2018 18:40:20 +0000 (19:40 +0100)]
Document that access() is also called on chdir().
Source: Miklos Szeredi on fuse-devel, Wednesday, 4 July 2018 15:29.
Laszlo Boszormenyi (GCS) [Wed, 27 Jun 2018 15:02:07 +0000 (15:02 +0000)]
Source LSB init functions
Laszlo Boszormenyi (GCS) [Wed, 27 Jun 2018 14:59:19 +0000 (14:59 +0000)]
Fix manpage filename for mount.fuse3
William Woodruff [Mon, 2 Jul 2018 02:11:58 +0000 (22:11 -0400)]
fuse.h: fix typo (currenlty -> currently)
Carl Edquist [Tue, 22 May 2018 22:04:07 +0000 (17:04 -0500)]
fix documentation for opendir in fuse_operations
the filehandle from opendir is passed to releasedir - there is no
closedir function in fuse_operations
Bill Zissimooulos [Wed, 16 May 2018 19:36:19 +0000 (12:36 -0700)]
rename: perform user mode dir loop check when not done in kernel
Fix conditionals as per maintainer's request.
Bill Zissimopoulos [Wed, 16 May 2018 19:05:28 +0000 (12:05 -0700)]
changelog: add info on rename deadlock fix
Bill Zissimooulos [Sun, 13 May 2018 01:51:44 +0000 (18:51 -0700)]
rename: perform user mode dir loop check when not done in kernel
Linux performs the dir loop check (rename(a, a/b/c)
or rename(a/b/c, a), etc.) in kernel. Unfortunately
other systems do not perform this check (e.g. FreeBSD).
This results in a deadlock in get_path2, because libfuse
did not expect to handle such cases.
We add a check_dir_loop function that performs the dir
loop check in user mode and enable it on systems that
need it.
Nikolaus Rath [Fri, 11 May 2018 14:01:09 +0000 (15:01 +0100)]
Released 3.2.3
Nikolaus Rath [Fri, 11 May 2018 13:56:45 +0000 (14:56 +0100)]
add_arg(): check for overflow
Fixes: #222.
Tomohiro Kusumi [Tue, 8 May 2018 05:57:00 +0000 (22:57 -0700)]
Fix compile-time warnings on IGNORE_MTAB
Silence below warnings which appear if IGNORE_MTAB is defined.
[59/64] Compiling C object 'util/fusermount3@exe/fusermount.c.o'.
../util/fusermount.c:493:12: warning: function declaration isn't a prototype [-Wstrict-prototypes]
static int count_fuse_fs()
^~~~~~~~~~~~~
../util/fusermount.c: In function 'unmount_fuse':
../util/fusermount.c:508:46: warning: unused parameter 'quiet' [-Wunused-parameter]
static int unmount_fuse(const char *mnt, int quiet, int lazy)
^~~~~
Nikolaus Rath [Fri, 13 Apr 2018 17:28:27 +0000 (10:28 -0700)]
Fix path to pytest cache directory.
Tomohiro Kusumi [Wed, 11 Apr 2018 16:40:13 +0000 (01:40 +0900)]
Invert calloc(3) argument order (`nmemb` comes first)
No functional difference expected, but should still follow the standard.
http://pubs.opengroup.org/onlinepubs/
009695399/functions/calloc.html
Tomohiro Kusumi [Wed, 11 Apr 2018 16:39:46 +0000 (01:39 +0900)]
Drop unneeded void cast for actually used local variable
`int sig` is acutually used, so `(void) sig;` is unneeded.
Tomohiro Kusumi [Wed, 11 Apr 2018 16:39:27 +0000 (01:39 +0900)]
Drop redundant ; from FUSE_REGISTER_MODULE()
Callers do (and should) use ;.
Nikolaus Rath [Sat, 31 Mar 2018 12:33:05 +0000 (13:33 +0100)]
Travis: remove root-owned cache files.
Nikolaus Rath [Sat, 31 Mar 2018 12:21:08 +0000 (13:21 +0100)]
Fix Travis build environment
Newest Meson requires Python 3.5 which isn't available in Trusty.
Pip version pin no longer necessary.
Nikolaus Rath [Sat, 31 Mar 2018 12:16:48 +0000 (13:16 +0100)]
Fixed up duplicate ChangeLog entry.
Nikolaus Rath [Sat, 31 Mar 2018 12:08:08 +0000 (13:08 +0100)]
Released 3.2.2
admorgan [Wed, 28 Mar 2018 19:38:26 +0000 (14:38 -0500)]
Add example configuration file (#216)
Add a configuration file with all options disabled that includes
all valid options and their description.
Tomohiro Kusumi [Wed, 28 Mar 2018 19:32:59 +0000 (04:32 +0900)]
Fix build error on DragonFlyBSD (sync with other *BSD) (#240)
DragonFlyBSD has no "bsd" in uname, so add 'dragonfly' to conditionals.
-- e.g. uname(1) in DragonFlyBSD
[root@ ~]# uname
DragonFly
[root@ ~]# python -c "import sys; print(sys.platform)"
dragonfly5
Ashley Pittman [Fri, 9 Feb 2018 13:42:12 +0000 (13:42 +0000)]
Fix uninitialised read in fuse_new_30() (#231) (#234)
Ensure that conf is always zero before it's read from to prevent
sporadic failure at startup if higher layers were build against
version 3.0
Signed-off-by: Ashley Pittman <ashley.m.pittman@intel.com>
Mateusz Urbańczyk [Mon, 15 Jan 2018 20:45:54 +0000 (21:45 +0100)]
Fix typo in "passthrough" docstring (#229)
Josh Soref [Fri, 1 Dec 2017 19:18:49 +0000 (14:18 -0500)]
Handle mount ... -o nofail (#221)
Accept (and ignore) nofail mount option
divinity76 [Mon, 27 Nov 2017 19:53:09 +0000 (20:53 +0100)]
fix "Rath Consulting" link (#225)
Josh Soref [Mon, 27 Nov 2017 10:23:20 +0000 (05:23 -0500)]
Spelling (#223)
Fix spelling errors
Nikolaus Rath [Tue, 14 Nov 2017 20:48:15 +0000 (20:48 +0000)]
Released 3.2.1
Nikolaus Rath [Mon, 13 Nov 2017 20:10:13 +0000 (20:10 +0000)]
Updated professional support information.
Nikolaus Rath [Fri, 3 Nov 2017 10:51:06 +0000 (10:51 +0000)]
Backed out
d92bf83
This change is bogus. fuse_module_factory_t is already a pointer
type. Additionally, if dlsym returns NULL, then you will be
dereferencing it causing a segfault. In my testing, a segfault will
happen even if dlsym returns successfully.
Thanks to Michael Theall for spotting!
Nikolaus Rath [Fri, 20 Oct 2017 08:20:39 +0000 (09:20 +0100)]
Don't install manpages under *BSD
Were not installing the corresponding binaries either, since those
are provided by the BSD base system.
Nikolaus Rath [Fri, 20 Oct 2017 08:19:16 +0000 (09:19 +0100)]
Don't use Python mode for meson.build
Emacs now has a proper meson mode :-).
Joerg Thalheim [Thu, 19 Oct 2017 12:09:06 +0000 (13:09 +0100)]
make udevrulesdir configurable
on nixos we install fuse in its own hierarchy independent from systemd.
Sangwoo Moon [Wed, 27 Sep 2017 07:25:15 +0000 (16:25 +0900)]
Adding pointer dereferencing after calling dlsym()
dlsym() resolves the location of the loaded symbol,
therefore dlsym() returns the type (fuse_module_factory_t *), not (fuse_module_factory_t).
Added pinter dereferencing to correctly refer the factory function.
Nikolaus Rath [Mon, 25 Sep 2017 09:34:07 +0000 (10:34 +0100)]
fuse_lib_ioctl(): don't call memcpy with NULL argument
This was detected by using clang's undefined behavior sanitizer, but
didn't seem to cause problems in practice.
Nikolaus Rath [Mon, 25 Sep 2017 09:23:38 +0000 (10:23 +0100)]
Link with -lrt to support ancient libc
Fixes: #207.
Nikolaus Rath [Mon, 25 Sep 2017 09:17:11 +0000 (10:17 +0100)]
Removed unneccessary #include <config.h> from examples
Fixes: #208.
Nikolaus Rath [Wed, 20 Sep 2017 17:17:49 +0000 (18:17 +0100)]
Automatically print list of contributors when generating tarball
Nikolaus Rath [Wed, 20 Sep 2017 11:38:35 +0000 (12:38 +0100)]
Travis CI: Don't use deprecated environment
Travis support recommends to install specific pip
version to work around problems in new environment.
Nikolaus Rath [Tue, 19 Sep 2017 19:37:46 +0000 (20:37 +0100)]
Correctly define fusermount3 path.
Nikolaus Rath [Tue, 19 Sep 2017 19:33:26 +0000 (20:33 +0100)]
Make *_loop_mt() available in version 3.0 again
The old versions of these symbols were defined with version
tag FUSE_3.0, so this is what we have to use in the .symver
directive.
Nikolaus Rath [Tue, 19 Sep 2017 19:26:51 +0000 (20:26 +0100)]
Fix versioned symbols in version script
According to "How to Write Shared Libraries" by Ulrich Drepper
(https://www.akkadia.org/drepper/dsohowto.pdf), the version script
should contain the exported name of the versioned symbol once in each
tag for which it has been defined by .symver.
Nikolaus Rath [Tue, 19 Sep 2017 15:24:37 +0000 (16:24 +0100)]
Don't use external symbol names in internal files
The fuse_session_loop_mt() and fuse_loop_mt() symbols are only visible
when linking against the shared object. The code in lib/, however, is
compiled *into* the shared object and should thus use the internal
names of these functions.
Surprisingly enough, the code still worked before - but only when link
time optimization was disabled.
Unfortunately, we still can't compile with LTO because it seems that
enabling LTO somehow makes the tagged symbols vanish.
Without lto, we have:
$ nm lib/libfuse3.so | grep fuse_new
0000000000011070 T fuse_new_30
0000000000010a00 t fuse_new_31
0000000000011070 T fuse_new@FUSE_3.0
0000000000010a00 T fuse_new@@FUSE_3.1
and with LTO:
$ nm lib/libfuse3.so | grep fuse_new
0000000000019a70 T fuse_new_30
0000000000019270 t fuse_new_31
See also issue #198.
Nikolaus Rath [Sun, 17 Sep 2017 08:39:47 +0000 (09:39 +0100)]
Include source code in documentation.