Nikolaus Rath [Fri, 13 Jan 2023 10:33:35 +0000 (10:33 +0000)]
Released 3.13.0
Bernd Schubert [Wed, 23 Mar 2022 18:49:17 +0000 (19:49 +0100)]
passthrough_hp: Avoid a bit code dup in readdir
Just a slight code simplification.
Bernd Schubert [Tue, 22 Mar 2022 18:55:36 +0000 (19:55 +0100)]
passthrough_hp: Add options for clone_fd, max_threads, daemonize
This is useful for benchmarking.
Note: This changes behavior - passthrough_hp runs in background by default
now.
Goswin von Brederlow [Fri, 13 Jan 2023 09:36:52 +0000 (10:36 +0100)]
Fix loading of FUSE modules
dlsym returns the address of the module factory symbol, not the actual function (#722)
pointer. Change the type of `factory` to `fuse_module_factory_t*` to reflect
this and then dereference it when registering the module.
This is a followup to
d92bf83, which introduced a NULL pointer dereference
when dlsym returns NULL, and
8ec7fd9, which reverted it back to not
dereferencing the symbol at all.
Fixes: #721
Co-authored-by: Goswin von Brederlow <brederlo@q-leap.de>
Tofik Sonono [Tue, 10 Jan 2023 10:04:35 +0000 (10:04 +0000)]
Support application-defined I/O functions for FUSE fd
The io for FUSE requests and responses can now be further customized by allowing to write custom functions for reading/writing the responses. This includes overriding the splice io.
The reason for this addition is that having a custom file descriptor is not sufficient to allow custom io. Different types of file descriptor require different mechanisms of io interaction. For example, some file descriptor communication has boundaries (SOCK_DGRAM, EOF, etc...), while other types of fd:s might be unbounded (SOCK_STREAMS, ...). For unbounded communication, you have to read the header of the FUSE request first, and then read the remaining packet data. Furthermore, the one read call does not necessarily return all the data expected, requiring further
calls in a loop.
HereThereBeDragons [Fri, 6 Jan 2023 13:05:00 +0000 (14:05 +0100)]
Test for fuse_lowlevel_notify_expire_entry.
This test is too simple to check for all functionalities of notify_expire as it always successfully passes when libfuse supports the function (even if kernel does not support it - it just takes it as notify_inval)
HereThereBeDragons [Thu, 27 Oct 2022 15:52:10 +0000 (17:52 +0200)]
adding comments and capability discovery, enum for flags moved to top of file
HereThereBeDragons [Thu, 27 Oct 2022 15:52:10 +0000 (17:52 +0200)]
upgrade of fuse_kernel.h based on Miklos expire_only kernel patch https://git./linux/kernel/git/mszeredi/fuse.git/commit/?h=for-next&id=
53e949edb7692dce02220eba926c9d75ecbb47f7
HereThereBeDragons [Thu, 27 Oct 2022 15:52:10 +0000 (17:52 +0200)]
Initial patch provided by Miklos Szeredi <mszeredi@redhat.com>
Bernd Schubert [Tue, 3 Jan 2023 10:46:11 +0000 (11:46 +0100)]
Fixes when HAVE_LIBC_VERSIONED_SYMBOLS is not defined
fuse_loop_mt and fuse_new had not been defined when
HAVE_LIBC_VERSIONED_SYMBOLS had not been set and additionally,
fuse_new_31 was missing in the version script and was therefore
an unusable symbol.
This also adds a test for unset HAVE_LIBC_VERSIONED_SYMBOLS.
Bernd Schubert [Mon, 2 Jan 2023 21:53:54 +0000 (22:53 +0100)]
convert __APPLE__ and __ULIBC__ to HAVE_LIBC_VERSIONED_SYMBOLS
In fact only gnu-libc fully supports symbol versioning, so it is
better to have a generic macro for it. This also allows to manually
disable symbol version and allows to run tests with that
configuration on gnu-libc. That testing will still not catch compat
issues, but least ensures the code can compile.
Testing for __APPLE__ and __ULIBC__ is now done by meson. More of such
checks can be added by people using other libcs.
Bernd Schubert [Sun, 2 Oct 2022 20:39:52 +0000 (22:39 +0200)]
Fix ublic/apple build for the fuse_parse_cmdline ABI symbol
For __APPLE__ and __ULIBC__, which are assumed to not support
versioned symbols, helper.c has a compat ABI symbol for
fuse_parse_cmdline(). However that ABI symbol was conflicting
with the API macro (which redirects to the right API function
for recompilations against current libfuse).
Additionally the parameter 'opts' had a typo and was called
'out_opts'.
Kyle Lippincott [Mon, 12 Sep 2022 19:26:53 +0000 (12:26 -0700)]
Remove partial locking of paths when using high-level API
As described in https://github.com/libfuse/libfuse/issues/695 and below, partial
locking of paths can cause a deadlock. Partial locking was added to prevent
starvation, but it's unclear what specific cases of starvation were of concern.
As far as I was able to determine, since we support reader locks that give
priority to writers (to prevent starvation), this means that to starve the queue
element, we'd need a constant stream of queued requests that lock the path for
write. Write locks are used when the element is being (potentially) removed, so
this stream of requests that starve the `rename` or `lock` operations seems
unlikely.
### Summarizing issue #695
The high-level API handles locking of the node structures it maintains to
prevent concurrent requests from deleting nodes that are in use by other
requests. This means that requests that might remove these structs (`rmdir`,
`rename`, `unlink`, `link`) need to acquire an (internally managed - not
pthread) exclusive lock before doing so. In the case where the lock is already
held (for read or for write), the operation is placed onto a queue of waiters.
On every unlock, the queue is reinspected for any element that might now be able
to make progress.
Since `rename` and `link` involve two paths, when added to the queue, a single
queue entry requires that we lock two different paths. There was, prior to this
change, support for partially locking the first queue element if it had two
paths to lock. This partial locking can cause a deadlock:
- set up a situation where the first element in the queue is partially locked
(such as by holding a reader lock on one of the paths being renamed, but not
the other). For example: `/rmthis/foo/foo.txt` [not-yet-locked] and
`/rmthis/bar/bar.txt` [locked]
- add an `rmdir` for an ancestor directory of the not-yet-locked path to the
queue. In this example: `/rmthis`
After getting into this situation, we have the following `treelock` values:
- `/rmthis`: 1 current reader (due to the locked `/rmthis/bar/bar.txt`), one
waiting writer (`rmdir`): no new readers will acquire a read lock here.
- `/rmthis/bar`: 1 reader (the locked `/rmthis/bar/bar.txt`)
- `/rmthis/bar/bar.txt`: 1 writer (the locked `/rmthis/bar/bar.txt`)
This is deadlocked, because the partial lock will never be able to be completely
locked, as doing so would require adding a reader lock on `/rmthis`, and that
will be rejected due to write lock requests having priority -- until the writer
succeeds in locking it, no new readers can be added. However, the writer (the
`rmdir`) will never be able to acquire its write lock, as the reader lock will
never be dropped -- there's no support for downgrading a partially locked
element to be unlocked, the only state change that's allowed involves it
becoming completely locked.
Kyle Lippincott [Mon, 12 Sep 2022 19:26:53 +0000 (12:26 -0700)]
Move try_get_path2 earlier in the file
Nikolaus Rath [Mon, 2 Jan 2023 11:08:16 +0000 (11:08 +0000)]
Revert "libfuse custom communication interface"
This reverts commit
777663953382925c7403f0560c28ec9bbd14d7be.
Ciaran [Wed, 21 Dec 2022 00:44:50 +0000 (16:44 -0800)]
update mount.c, in order to pass through -n.
autofs uses automount, which calls fuse, during an sshfs call. fuse complains about -n being an unknown option (ref. https://github.com/libfuse/libfuse/issues/715)
this one line edit provides the command to be accepted, and pass through, allowing autofs-automount to operate on the mount, even though it is already in the mtab, given the nature of autofs/automount.
Zhansong Gao [Wed, 30 Nov 2022 08:01:50 +0000 (16:01 +0800)]
Make it work even if max_idle_threads is set to 0
It may happen that none of the worker threads are running
if max_idle_threads is set to 0 although few people will do this.
Adding a limit of keeping at least one worker thread will make
our code more rigorous.
Signed-off-by: Zhansong Gao <zhsgao@hotmail.com>
y [Mon, 14 Nov 2022 10:55:39 +0000 (11:55 +0100)]
libfuse custom communication interface
libfuse can now be used without having a mount interface.
Bernd Schubert [Sun, 11 Sep 2022 16:28:38 +0000 (18:28 +0200)]
Fix the fuse_parse_cmdline@FUSE_3.0 ABI compat symbol
There was a simple typo and sym1 didn't match the function name
with the older __asm__(".symver " sym1 "," sym2) way to define
ABI compatibility.
Witht the newer "__attribute__ ((symver (sym2)))" sym1 is not used
at all and in manual testing the issue didn't come up therefore.
Nikolaus Rath [Thu, 8 Sep 2022 10:02:45 +0000 (11:02 +0100)]
Released 3.12.0
Fina Wilke [Sat, 16 Jul 2022 22:15:42 +0000 (00:15 +0200)]
Add option to specify init script location
Also allows to disable the installation if desired
Frank Dinoff [Tue, 26 Jul 2022 19:49:01 +0000 (15:49 -0400)]
Use destroy_req instead of free to destroy fuse_req
If we get the interrupt before the fuse op, the fuse_req is deleted without
decrementing the refcount on the cloned file descriptor. This leads to a
leak of the cloned /dev/fuse file descriptor.
Bernd Schubert [Fri, 5 Aug 2022 18:51:51 +0000 (20:51 +0200)]
Add summary of changes regarding 'max_threads' to ChangeLog.rst
Update the change log file with the summary of API changes related
to the 'max_threads' changes.
Bernd Schubert [Mon, 11 Apr 2022 10:02:54 +0000 (12:02 +0200)]
fuse_session_loop_mt: Accept a NULL config - use defaults
If an application does not want to bother with the session
and wants to keep defaults, it can now just pass a NULL
as config parameter.
Bernd Schubert [Thu, 24 Mar 2022 11:19:57 +0000 (12:19 +0100)]
fuse-loop/fuse_do_work: Avoid lots of thread creations/destructions
On benchmarking metadata operations with a single threaded bonnie++
and "max_idle_threads" limited to 1, 'top' was showing suspicious
160% cpu usage.
Profiling the system with flame graphs showed that an astonishing
amount of CPU time was spent in thread creation and destruction.
After verifying the code it turned out that fuse_do_work() was
creating a new thread every time all existing idle threads
were already busy. And then just a few lines later after processing
the current request it noticed that it had created too many threads
and destructed the current thread. I.e. there was a thread
creation/destruction ping-pong.
Code is changed to only create new threads if the max number of
threads is not reached.
Furthermore, thread destruction is disabled, as creation/destruction
is expensive in general.
With this change cpu usage of passthrough_hp went from ~160% to
~80% (with different values of max_idle_threads). And bonnie
values got approximately faster by 90%. This is a with single
threaded bonnie++
bonnie++ -x 4 -q -s0 -d <path> -n 30:1:1:10 -r 0
Without this patch, using the default max_idle_threads=10 and just
a single bonnie++ the thread creation/destruction code path is not
triggered. Just one libfuse and one application thread is just
a corner case - the requirement for the issue was just
n-application-threads >= max_idle_threads.
Signed-off-by: Bernd Schubert <bschubert@ddn.com>
Bernd Schubert [Fri, 8 Apr 2022 20:30:27 +0000 (22:30 +0200)]
API update for fuse_loop_config additions
struct fuse_loop_config was passed as a plain struct, without any
version identifer. This had two implications
1) Any addition of new parameters required a FUSE_SYMVER for
fuse_session_loop_mt() and fuse_loop_mt() as otherwise a read
beyond end-of previous struct size might have happened.
2) Filesystems also might have been recompiled and the developer
might not have noticed the struct extensions and unexpected for
the developer (or people recomliling the code) uninitialized
parameters would have been passed.
Code is updated to have struct fuse_loop_config as an opaque/private
data type for file systems that want version 312
(FUSE_MAKE_VERSION(3, 12)). The deprecated fuse_loop_config_v1
is visible, but should not be used outside of internal
conversion functions
File systems that want version >= 32 < 312 get the previous
struct (through ifdefs) and the #define of fuse_loop_mt
and fuse_session_loop_mt ensures that these recompiled file
systems call into the previous API, which then converts
the struct. This is similar to existing compiled applications
when just libfuse updated, but binaries it is solved with
the FUSE_SYMVER ABI compact declarations.
Signed-off-by: Bernd Schubert <bschubert@ddn.com>
Nikolaus Rath [Sat, 2 Jul 2022 13:39:32 +0000 (14:39 +0100)]
Revert "Increase meson min version and avoid get_pkgconfig_variable warning (#682)"
This reverts commit
8db2ba06fef10f38f90b0f3213dd39ec07678e2f. This Meson version is not
yet generally available, so we do not want to depend on it..
Nozomi Miyamori [Sat, 2 Jul 2022 13:35:15 +0000 (22:35 +0900)]
Remove member m from fuse_fs (#684)
fuse_fs.m is no longer used. Modules are now managed by fuse_modules.
fix: free dangling pointer of module #683
Bernd Schubert [Mon, 20 Jun 2022 12:58:12 +0000 (14:58 +0200)]
Increase meson min version and avoid get_pkgconfig_variable warning (#682)
meson was complaining:
Build targets in project: 27
NOTICE: Future-deprecated features used:
* 0.56.0: {'Dependency.get_pkgconfig_variable'}
So change to .get_variable(pkgconfig : 'type' and also increase
the meson minimal version to be able to handle it.
Co-authored-by: Bernd Schubert <bschubert@ddn.com>
Bernd Schubert [Fri, 6 May 2022 13:42:56 +0000 (15:42 +0200)]
Fix a test strncpy compilation warning with recent gcc
meson configure -D buildtype=debugoptimized
meson configure -D b_sanitize=address,undefined
Results in '-fsanitize=address,undefined ... -O2 -g' that made
compilation to give errors with recent gcc versions.
bernd@t1700bs build-ubuntu>ninja -v
[1/2] ccache gcc -Itest/test_syscalls.p -Itest -I../test -Iinclude -I../include -Ilib -I../lib -I. -I.. -fdiagnostics-color=always -fsanitize=address,undefined -fno-omit-frame-pointer -pipe -D_FILE_OFFSET_BITS=64 -Wall -Winvalid-pch -Wextra -Werror -O2 -g -D_REENTRANT -DHAVE_CONFIG_H -Wno-sign-compare -Wstrict-prototypes -Wmissing-declarations -Wwrite-strings -fno-strict-aliasing -Wno-unused-result -DHAVE_SYMVER_ATTRIBUTE -MD -MQ test/test_syscalls.p/test_syscalls.c.o -MF test/test_syscalls.p/test_syscalls.c.o.d -o test/test_syscalls.p/test_syscalls.c.o -c ../test/test_syscalls.c
FAILED: test/test_syscalls.p/test_syscalls.c.o
ccache gcc -Itest/test_syscalls.p -Itest -I../test -Iinclude -I../include -Ilib -I../lib -I. -I.. -fdiagnostics-color=always -fsanitize=address,undefined -fno-omit-frame-pointer -pipe -D_FILE_OFFSET_BITS=64 -Wall -Winvalid-pch -Wextra -Werror -O2 -g -D_REENTRANT -DHAVE_CONFIG_H -Wno-sign-compare -Wstrict-prototypes -Wmissing-declarations -Wwrite-strings -fno-strict-aliasing -Wno-unused-result -DHAVE_SYMVER_ATTRIBUTE -MD -MQ test/test_syscalls.p/test_syscalls.c.o -MF test/test_syscalls.p/test_syscalls.c.o.d -o test/test_syscalls.p/test_syscalls.c.o -c ../test/test_syscalls.c
In file included from /usr/include/string.h:519,
from ../test/test_syscalls.c:7:
In function ‘strncpy’,
inlined from ‘test_socket’ at ../test/test_syscalls.c:1885:2,
inlined from ‘main’ at ../test/test_syscalls.c:2030:9:
/usr/include/x86_64-linux-gnu/bits/string_fortified.h:95:10: error: ‘__builtin_strncpy’ output may be truncated copying 107 bytes from a string of length 1023 [-Werror=stringop-truncation]
95 | return __builtin___strncpy_chk (__dest, __src, __len,
| ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
96 | __glibc_objsize (__dest));
| ~~~~~~~~~~~~~~~~~~~~~~~~~
I disagree a bit on the gcc sanity here, as the code was behaving
correctly and even already checked the string length. But sice
the string length is already verified, that length can be used
for the final strncpy.
Nikolaus Rath [Mon, 2 May 2022 09:11:41 +0000 (10:11 +0100)]
Released 3.11.0
André Schröder [Mon, 18 Apr 2022 21:28:27 +0000 (23:28 +0200)]
patch: document ignored fill parameter of readdir
Bernd Schubert [Mon, 11 Apr 2022 17:59:36 +0000 (19:59 +0200)]
Add missing kernel flags up to 1ULL << 33
Just a further sync with the in-kernel flags.
Bernd Schubert [Mon, 11 Apr 2022 18:39:41 +0000 (20:39 +0200)]
Set FUSE_INIT_EXT in fuse_init_out::flags
It is better to tell the kernel that libfuse knows
about the 64 bit flag extension.
Dharmendra singh [Fri, 8 Apr 2022 09:57:07 +0000 (09:57 +0000)]
Passthrough_ll should display cmd line options
Make passthrough_ll to display all its cmdline options
instead of keeping them hidden.
(I am not sure if these are intentionally kept hidden)
Dharmendra Singh [Mon, 28 Feb 2022 11:15:06 +0000 (11:15 +0000)]
Modify structures in libfuse to handle flags beyond 32 bits.
In fuse kernel, 'commit
53db28933e95 ("fuse: extend init flags")'
made the changes to handle flags going beyond 32 bits but i think
changes were not done in libfuse to handle the same.
This patch prepares the ground in libfuse for incoming FUSE kernel
patches (Atomic open + lookup) where flags went beyond 32 bits.
It makes struct same as in fuse kernel resulting in name change of
few fields.
Bernd Schubert [Wed, 23 Mar 2022 23:05:02 +0000 (00:05 +0100)]
passthrough_hp: Disable splice with the --nosplice option
passthrough_hp was not updated when splice got enabled by default in libfuse3.
I.e. the --nosplice option and condition on it was a noop.
Bernd Schubert [Tue, 22 Mar 2022 21:10:01 +0000 (22:10 +0100)]
passthrough_hp: Fix inode ref in sfs_unlink
sfs_unlink may call do_lookup(), which increases the inode ref count,
but since that function does not return attributes that lookup ref
count won't get automatically decreased.
Nikolaus Rath [Tue, 22 Mar 2022 08:46:33 +0000 (08:46 +0000)]
Merge pull request #649 from fdinoff/fix_clone_fd
Fix fd leak with clone_fd
Frank Dinoff [Mon, 21 Mar 2022 17:13:21 +0000 (13:13 -0400)]
Fix fd leak with clone_fd
do_interrupt would destroy_req on the request without decrementing the
channel's refcount. With clone_fd this could leak file descriptors if
the worker thread holding the cloned fd was destroyed. (Only
max_idle_threads are kept).
Nikolaus Rath [Mon, 14 Mar 2022 09:48:43 +0000 (09:48 +0000)]
Merge pull request #635 from amir73il/fopen_noflush
Add support for FOPEN_NOFLUSH flag
Nikolaus Rath [Mon, 14 Mar 2022 09:25:00 +0000 (09:25 +0000)]
Merge branch 'master' into fopen_noflush
David Galeano [Fri, 11 Feb 2022 20:07:00 +0000 (20:07 +0000)]
Removed duplicates code. (#642)
The cap for FUSE_CAP_WRITEBACK_CACHE was printed twice.
Jean-Pierre André [Wed, 9 Feb 2022 14:59:10 +0000 (15:59 +0100)]
Fixed returning an error condition to ioctl(2) (#641)
When returning a negative error code by ->ioctl() to the high level
interface, no error is propagated to the low level, and the reply
message to the kernel is shown as successful.
A negative result is however returned to kernel, so the kernel can
detect the bad condition, but this appears to not be the case since
kernel 5.15.
The proposed fix is more in line with the usual processing of errors
in fuse, taking into account that ioctl(2) always returns a non-negative
value in the absence of errors.
Co-authored-by: Jean-Pierre André <jpandre@users.sourceforge.net>
Andrew Gaul [Sun, 23 Jan 2022 10:17:03 +0000 (19:17 +0900)]
Fix ReST end-string nits (#638)
This makes the file more readable with syntax highlighting.
Ken Schalk [Tue, 11 Jan 2022 19:56:36 +0000 (14:56 -0500)]
Avoid ENOENT response when recently invalidated fuse_ino_t is received from the kernel (#636)
Amir Goldstein [Mon, 3 Jan 2022 08:49:46 +0000 (10:49 +0200)]
Add test for FOPEN_NOFLUSH flag
Simulate write() delay and verify that close(rofd) does not
block waiting on pending writes.
The support for the flag was added in kernel v5.16-rc1.
Signed-off-by: Amir Goldstein <amir73il@gmail.com>
Amir Goldstein [Sun, 5 Dec 2021 16:29:05 +0000 (18:29 +0200)]
Add no_rofd_flush mount option
To disable flush for read-only fd.
Signed-off-by: Amir Goldstein <amir73il@gmail.com>
Amir Goldstein [Sun, 24 Oct 2021 11:01:23 +0000 (14:01 +0300)]
Add support for FOPEN_NOFLUSH flag
Allow requesting from kernel to avoid flush on close at file open
time. If kernel does not support FOPEN_NOFLUSH flag, the request
will be ignored.
For passthrough_hp example, request to avoid flush on close when
writeback cache is disabled and file is opened O_RDONLY.
Signed-off-by: Amir Goldstein <amir73il@gmail.com>
Maximilian Heinzler [Sun, 12 Dec 2021 16:28:57 +0000 (17:28 +0100)]
Document possible NULL paths when directories are removed (#633)
When directories with open handles are removed, the releasedir and
fsyncdir operations might be called with a NULL path. That is because
there is no hiding behavior like for regular files and the nodes get
removed immediately.
Luis Henriques [Sat, 20 Nov 2021 10:09:25 +0000 (10:09 +0000)]
test/test_syscalls.c: allow EBADF in fcheck_stat() (#631)
Test test/test_examples.py::test_passthrough_hp[False] fails because, on
kernels >= 5.14, fstat() will return -EBADF:
3 [check_unlinked_testfile] fcheck_stat() - fstat: Bad file descriptor
4 [check_unlinked_testfile] fcheck_stat() - fstat: Bad file descriptor
5 [check_unlinked_testfile] fcheck_stat() - fstat: Bad file descriptor
9 [check_unlinked_testfile] fcheck_stat() - fstat: Bad file descriptor
...
This patch simply whitelists the EBADF errno code.
Signed-off-by: Luís Henriques <lhenriques@suse.de>
Co-authored-by: Luís Henriques <lhenriques@suse.de>
Nikolaus Rath [Mon, 6 Sep 2021 12:45:26 +0000 (13:45 +0100)]
Released 3.10.5
lixiaokeng [Mon, 6 Sep 2021 12:37:45 +0000 (20:37 +0800)]
Fix: fd and memory leak in mount.fuse.c (#614)
The command isn't freed and the fuse_fd isn't
closed if execl failed. Fix it.
Signed-off-by: Lixiaokeng <lixiaokeng@huawei.com>
a1346054 [Fri, 20 Aug 2021 17:50:14 +0000 (17:50 +0000)]
use same hashbang as in rest of repository
a1346054 [Fri, 20 Aug 2021 17:49:29 +0000 (17:49 +0000)]
fix spelling
a1346054 [Fri, 20 Aug 2021 17:47:43 +0000 (17:47 +0000)]
remove executable file mode bit from source files
Giulio Benetti [Tue, 3 Aug 2021 21:39:46 +0000 (23:39 +0200)]
meson.build: fix wrong .symver detection
As pointed here [1] __has_attribute() is broken for many attributes and
if it doesn't support the specific attribute it returns true, so we
can't really rely on that for this check. This lead to Buildroot
libfuse3 build failure [2] where that shows up with:
```
error: symver is only supported on ELF platforms
```
Indeed Microblaze doesn't support ELF since it doesn't include elfos.h,
but __has_attribute(symver) returns true.
So let's substitute the #ifdef __has_attribute() with a stronger test on
a function foo() with __attribute__((symver ("test@TEST"))).
[1]: https://gcc.gnu.org/bugzilla/show_bug.cgi?id=101766
[2]: http://autobuild.buildroot.net/results/d6c/
d6cfaf2aafaeda3c12d127f6a2d2e175b25e654f/build-end.log
Signed-off-by: Giulio Benetti <giulio.benetti@benettiengineering.com>
Nikolaus Rath [Thu, 24 Jun 2021 08:11:29 +0000 (09:11 +0100)]
Travis-CI: Make sure lsan supppressions file can be read by root.
Amir Goldstein [Tue, 22 Jun 2021 11:03:22 +0000 (14:03 +0300)]
Do not run unlinked files test on passthrough_hp with old kernels
test_syscalls unlinked testfiles check fails on passthourhg_hp without
the kernel commit "fuse: fix illegal access to inode with reused nodeid"
queued for kernel 5.14 [1].
Make this check opt-in and do not run it with kernel version before 5.14.
[1] https://lore.kernel.org/linux-fsdevel/CAJfpegtGKjeK8E5QsHKF0=re1J9wVHuGRVgg9NDJ_OOwQdCUNg@mail.gmail.com/
Signed-off-by: Amir Goldstein <amir73il@gmail.com>
lixiaokeng [Wed, 16 Jun 2021 08:57:16 +0000 (16:57 +0800)]
Fix: a potential crash on failure to setlocale
setlocale() can fail, returning NULL, which will lead
to a crash in iconv_new(). Fix it like in iconv_help().
Signed-off-by: Lixiaokeng <lixiaokeng@huawei.com>
Amir Goldstein [Sat, 12 Jun 2021 14:37:13 +0000 (17:37 +0300)]
passthrough_hp: excercise reusing inode numbers
Before last unlink() release the reference on inode.fd to allow reuse
of underlying fs inode number, mark the server inode "deleted" and bump
it's generation counter.
When same inode number is found on lookup(), the server inode object will
be reused as well.
Skip this when inode has an open file and when writeback cache is enabled.
This will be used to verify inode reuse bug fix in the kernel.
Signed-off-by: Amir Goldstein <amir73il@gmail.com>
Amir Goldstein [Wed, 9 Jun 2021 16:32:46 +0000 (19:32 +0300)]
test/test_syscalls.c: check unlinked testfiles at the end of the test
On some tests on regular files, open an O_PATH fd of the testfile and
record it along side the size and mode and inode.
At the end of all tests, use recorded testfiles info to re-check the size
mode and inode of the unlinked testfiles.
With O_PATH fd, the server does not have to keep the inode alive so FUSE
inode may be stale or bad. Therefore, ESTALE and EIO are valid results
for fstat() on the old testfile fd's, but returning the wrong size or
mode is an invalid result.
Signed-off-by: Amir Goldstein <amir73il@gmail.com>
Amir Goldstein [Wed, 9 Jun 2021 16:04:29 +0000 (19:04 +0300)]
test/test_syscalls.c: refactor fcheck_* helpers
Avoid multiple fstat() calls and consolidate all fcheck_* helpers
into fcheck_stat().
Signed-off-by: Amir Goldstein <amir73il@gmail.com>
Amir Goldstein [Wed, 9 Jun 2021 10:34:17 +0000 (13:34 +0300)]
test/test_syscalls.c: use unique filename per test
Generate unique filename per test (only for regular file for now).
Make sure to unlink the unique filename after each test.
realpath variable was renamed to basepath_r to fix build warning
on conflicting symbols with realpath() function.
Signed-off-by: Amir Goldstein <amir73il@gmail.com>
Nikolaus Rath [Wed, 9 Jun 2021 08:13:01 +0000 (09:13 +0100)]
Released 3.10.4
asafkahlon [Wed, 9 Jun 2021 08:07:25 +0000 (11:07 +0300)]
Add an option to disable building tests (#533)
Signed-off-by: Asaf Kahlon <asafka7@gmail.com>
Christian Menges [Wed, 9 Jun 2021 08:04:41 +0000 (10:04 +0200)]
Cuse example: Fix memory leak (#607)
* cuse example: fix memory leak
* Travis CI: re-enable leak checking
Sergey Fedoseev [Wed, 9 Jun 2021 08:04:08 +0000 (13:04 +0500)]
fix typo in man (#609)
Amir Goldstein [Wed, 2 Jun 2021 09:23:06 +0000 (12:23 +0300)]
test/test_syscalls.c: fix test failure on xfs src dir (#611)
rename dir loop test fails when test tmp dir is xfs with an error
test_rename_dir_loop() - rename : File exists
That is because xfs returns EEXIST for the case of renaming over
a non-empty directory.
According to rename(2) man page, EEXIST and ENOTEMPTY are both valid
error code in this case.
Signed-off-by: Amir Goldstein <amir73il@gmail.com>
Junichi Uekawa [Wed, 19 May 2021 08:32:14 +0000 (17:32 +0900)]
Define FUSE_USE_VERSION in Doxygen. (#608)
We currently do not pass anything in PREDEFINED and that means
FUSE_USE_VERSION is undefined.
Add that definition so that Doxygen built-in C pre-processor can use
FUSE_USE_VERSION value to find the correct comment to parse.
Christian Menges [Sun, 9 May 2021 10:12:01 +0000 (12:12 +0200)]
Fix memory leaks in examples (#604)
Christian Menges [Sun, 9 May 2021 09:00:57 +0000 (11:00 +0200)]
Bump cxxopts from 2.2.0 to 2.2.1 (#602)
rfjakob [Sat, 8 May 2021 13:15:55 +0000 (15:15 +0200)]
doc: Add "fuse (4)" to SEE ALSO sections in man pages (#601)
fuse (4) is an excellent introduction to the FUSE protocol,
and it lists fusermount (1) and mount.fuse (8) in its
SEE ALSO section.
I (the author of gocryptfs) was not aware of this man
page till March 2021, which suggest that it should be
made more discoverable.
So link back to fuse (4) in our SEE ALSO sections.
Junichi Uekawa [Fri, 7 May 2021 09:43:30 +0000 (18:43 +0900)]
Fix doxygen warnings. (#600)
Some parameters were undocumented, and @file does not mean to expand current file name.
Junichi Uekawa [Wed, 5 May 2021 09:51:08 +0000 (18:51 +0900)]
fusermount3.1: refer to mount.fuse3 (#599)
mount.fuse was renamed to mount.fuse3.
Manuel Jacob [Fri, 23 Apr 2021 07:31:37 +0000 (09:31 +0200)]
Add missing exceptions to fuse_reply_err() documentation. (#597)
Co-authored-by: Manuel Jacob <test>
Heiko Becker [Tue, 13 Apr 2021 17:54:10 +0000 (19:54 +0200)]
Fix a few meson warnings (#596)
* Use meson's warning_level instead of passing -Wflags
"-Wall" is included by default and level 2 adds "-Wextra". Avoids a
warning from meson.
Signed-off-by: Heiko Becker <heirecka@exherbo.org>
* Set the C++ language standard through a meson option
Avoids a warning from meson.
Signed-off-by: Heiko Becker <heirecka@exherbo.org>
Nikolaus Rath [Mon, 12 Apr 2021 10:21:11 +0000 (11:21 +0100)]
Added ChangeLog template for next release.
Nikolaus Rath [Mon, 12 Apr 2021 10:18:08 +0000 (11:18 +0100)]
Released 3.10.3
Hookey [Mon, 12 Apr 2021 10:08:50 +0000 (18:08 +0800)]
Remove unused fuse_worker bufsize (#590)
Not used since https://github.com/libfuse/libfuse/commit/
561d7054d856eea6c2d634093546d6af773dada9
Tobias Nießen [Tue, 30 Mar 2021 12:37:30 +0000 (14:37 +0200)]
Fix typo in fuse_lowlevel.h (#593)
Andrew Gaul [Thu, 25 Mar 2021 08:40:27 +0000 (17:40 +0900)]
Fix typos (#592)
Jean-Pierre André [Thu, 18 Mar 2021 09:52:30 +0000 (10:52 +0100)]
Fix returning d_ino and d_type by readdir(3) in non-plus mode
When not using the readdir_plus mode, the d_type was not returned,
and the use_ino flag was not used for returning d_ino.
This patch fixes the returned values for d_ino and d_type by readdir(3)
The test for the returned value of d_ino has been adjusted to also
take the d_type into consideration and to check the returned values in
both basic readdir and readdir_plus modes. This is done by executing
the passthrough test twice.
Co-authored-by: Jean-Pierre André <jpandre@users.sourceforge.net>
Nikolaus Rath [Fri, 5 Feb 2021 09:07:28 +0000 (09:07 +0000)]
Released 3.10.2
Martin Pärtel [Wed, 3 Feb 2021 09:53:21 +0000 (11:53 +0200)]
Fix returning inode numbers from readdir() in offset==0 mode. (#584)
- Test added for all passthrough examples.
- passthrough.c uses offset==0 mode. The others don't.
- passthrough.c changed to set FUSE_FILL_DIR_PLUS to make the test pass.
- This fixes #583.
Stephen Kitt [Thu, 28 Jan 2021 21:51:10 +0000 (22:51 +0100)]
Ignore "-o nonempty" (#582)
Commit
0bef21e8543d removed "-o nonempty" since mounting over
non-empty directories is always allowed. But this broke tools which
specify "-o nonempty". Since the expected behaviour is the same
anyway, ignoring the "nonempty" option seems safe, and allows programs
specifying "-o nonempty" to continue working with fusermount3.
This would fix https://bugs.debian.org/939767
Signed-off-by: Stephen Kitt <steve@sk2.org>
Laurent Bigonville [Sun, 17 Jan 2021 10:49:07 +0000 (11:49 +0100)]
Fix FTBFS on kfreebsd (#581)
kfreebsd is a FreeBSD kernel and a GNU libc
The only macro defined in that case is __FreeBSD_kernel__
Fix #580
John Baber-Lucero [Tue, 12 Jan 2021 10:41:35 +0000 (05:41 -0500)]
Fix a few typos in README.md. (#579)
* Fix a few typos in README.md.
* Change recommendation to mandate for meson and ninja
Co-authored-by: John Baber-Lucero <git@frundle.com>
Feverfew [Sun, 10 Jan 2021 11:50:28 +0000 (11:50 +0000)]
Fix typo (#578)
richardweinberger [Fri, 8 Jan 2021 10:07:02 +0000 (11:07 +0100)]
fusermount: Check for argv[0] being present (#577)
It is perfectly legal to execute a program with argc == 0 and therefore
no argv.
fusermount needs to check for this case, otherwise it will pass a NULL
poiunter to strdup() and cause undefined behavior.
Especially since fusermount is setuid root, we need to extra be careful.
Signed-off-by: Richard Weinberger <richard@nod.at>
Alan Somers [Fri, 1 Jan 2021 19:34:58 +0000 (12:34 -0700)]
Fix FUSE_COPY_FILE_RANGE in the passthrough example (#575)
Only close the file descriptors if they were just opened. Otherwise,
the second FUSE_COPY_FILE_RANGE operation on any given file will fail
with EBADF.
Sargun Dhillon [Sun, 27 Dec 2020 11:17:46 +0000 (03:17 -0800)]
util/fusermount.c: Assume the kernel supports UMOUNT_NOFOLLOW (#574)
UMOUNT_NOFOLLOW was added in Kernel 2.6.34. It's been 10 years since it's been added
Kernel 5.9, and 5.10 break this check mechanism[1]. Let's deprecate it.
[1]: https://lore.kernel.org/linux-fsdevel/
20201223102604.2078-1-sargun@sargun.me/
Signed-off-by: Sargun Dhillon <sargun@sargun.me>
Kangjing "Chaser" Huang [Sat, 19 Dec 2020 10:43:19 +0000 (05:43 -0500)]
Add exfat to whitelist (#573)
Nikolaus Rath [Mon, 7 Dec 2020 09:52:02 +0000 (09:52 +0000)]
Released 3.10.1
Rethan [Tue, 24 Nov 2020 09:28:13 +0000 (17:28 +0800)]
examples/cuse_client: add include file to eliminate compiler warning (#568)
Compiler warning about close(fd), add include file to fix.
Signed-off-by: haoyixing <haoyixing@kuaishou.com>
Co-authored-by: haoyixing <haoyixing@kuaishou.com>
human [Mon, 16 Nov 2020 17:11:09 +0000 (19:11 +0200)]
fix errno comparison
this affected `-o remember` in single-thread mode, it could prematurely
exit if a signal was received
# start an example filesystem from example/
./passthrough -f -s -o remember=5 ./mnt
# make the poll() call return with EINTR
pkill -PIPE passthrough
Zhiqiang Liu [Wed, 11 Nov 2020 02:00:23 +0000 (10:00 +0800)]
buffer.c: correct return value when buf is NULL
In commit
d614415a ("buffer.c: check whether buf is
NULL in fuse_bufvec_advance func"), if fuse_bufvec_current
func returns NULL, it returns 1 directly. Actually,
we should return 0 when buf is NULL.
Fixes: d614415a ("buffer.c: check whether buf is NULL in fuse_bufvec_advance func")
Signed-off-by: Zhiqiang Liu <liuzhiqiang26@huawei.com>
Signed-off-by: Haotian Li <lihaotian9@huawei.com>
Zhiqiang Liu [Thu, 5 Nov 2020 10:26:18 +0000 (18:26 +0800)]
test/test_syscalls.c: fix potential fd leakage problems
In test_syscalls.c, several funcs have potential fd leakage
problems. This patch will fix them.
Signed-off-by: Zhiqiang Liu <liuzhiqiang26@huawei.com>
Signed-off-by: Haotian Li <lihaotian9@huawei.com>
Zhiqiang Liu [Thu, 5 Nov 2020 10:16:58 +0000 (18:16 +0800)]
example/cuse_client.c: fix fd leakage problem
In cuse_client.c, fd should be closed before return.
Otherwise, it will cause fd leakage problem.
Signed-off-by: Zhiqiang Liu <liuzhiqiang26@huawei.com>
Signed-off-by: Haotian Li <lihaotian9@huawei.com>
Zhiqiang Liu [Thu, 5 Nov 2020 10:00:32 +0000 (18:00 +0800)]
ioctl_client.c: fix potential fd leakage problem
In ioctl_client.c, fd is not closed before return, thus
it will cause fd leakage problem.
Signed-off-by: Zhiqiang Liu <liuzhiqiang26@huawei.com>
Signed-off-by: Haotian Li <lihaotian9@huawei.com>