Nikolaus Rath [Mon, 12 Apr 2021 10:18:08 +0000 (11:18 +0100)]
Released 3.10.3
Hookey [Mon, 12 Apr 2021 10:08:50 +0000 (18:08 +0800)]
Remove unused fuse_worker bufsize (#590)
Not used since https://github.com/libfuse/libfuse/commit/
561d7054d856eea6c2d634093546d6af773dada9
Tobias Nießen [Tue, 30 Mar 2021 12:37:30 +0000 (14:37 +0200)]
Fix typo in fuse_lowlevel.h (#593)
Andrew Gaul [Thu, 25 Mar 2021 08:40:27 +0000 (17:40 +0900)]
Fix typos (#592)
Jean-Pierre André [Thu, 18 Mar 2021 09:52:30 +0000 (10:52 +0100)]
Fix returning d_ino and d_type by readdir(3) in non-plus mode
When not using the readdir_plus mode, the d_type was not returned,
and the use_ino flag was not used for returning d_ino.
This patch fixes the returned values for d_ino and d_type by readdir(3)
The test for the returned value of d_ino has been adjusted to also
take the d_type into consideration and to check the returned values in
both basic readdir and readdir_plus modes. This is done by executing
the passthrough test twice.
Co-authored-by: Jean-Pierre André <jpandre@users.sourceforge.net>
Nikolaus Rath [Fri, 5 Feb 2021 09:07:28 +0000 (09:07 +0000)]
Released 3.10.2
Martin Pärtel [Wed, 3 Feb 2021 09:53:21 +0000 (11:53 +0200)]
Fix returning inode numbers from readdir() in offset==0 mode. (#584)
- Test added for all passthrough examples.
- passthrough.c uses offset==0 mode. The others don't.
- passthrough.c changed to set FUSE_FILL_DIR_PLUS to make the test pass.
- This fixes #583.
Stephen Kitt [Thu, 28 Jan 2021 21:51:10 +0000 (22:51 +0100)]
Ignore "-o nonempty" (#582)
Commit
0bef21e8543d removed "-o nonempty" since mounting over
non-empty directories is always allowed. But this broke tools which
specify "-o nonempty". Since the expected behaviour is the same
anyway, ignoring the "nonempty" option seems safe, and allows programs
specifying "-o nonempty" to continue working with fusermount3.
This would fix https://bugs.debian.org/939767
Signed-off-by: Stephen Kitt <steve@sk2.org>
Laurent Bigonville [Sun, 17 Jan 2021 10:49:07 +0000 (11:49 +0100)]
Fix FTBFS on kfreebsd (#581)
kfreebsd is a FreeBSD kernel and a GNU libc
The only macro defined in that case is __FreeBSD_kernel__
Fix #580
John Baber-Lucero [Tue, 12 Jan 2021 10:41:35 +0000 (05:41 -0500)]
Fix a few typos in README.md. (#579)
* Fix a few typos in README.md.
* Change recommendation to mandate for meson and ninja
Co-authored-by: John Baber-Lucero <git@frundle.com>
Feverfew [Sun, 10 Jan 2021 11:50:28 +0000 (11:50 +0000)]
Fix typo (#578)
richardweinberger [Fri, 8 Jan 2021 10:07:02 +0000 (11:07 +0100)]
fusermount: Check for argv[0] being present (#577)
It is perfectly legal to execute a program with argc == 0 and therefore
no argv.
fusermount needs to check for this case, otherwise it will pass a NULL
poiunter to strdup() and cause undefined behavior.
Especially since fusermount is setuid root, we need to extra be careful.
Signed-off-by: Richard Weinberger <richard@nod.at>
Alan Somers [Fri, 1 Jan 2021 19:34:58 +0000 (12:34 -0700)]
Fix FUSE_COPY_FILE_RANGE in the passthrough example (#575)
Only close the file descriptors if they were just opened. Otherwise,
the second FUSE_COPY_FILE_RANGE operation on any given file will fail
with EBADF.
Sargun Dhillon [Sun, 27 Dec 2020 11:17:46 +0000 (03:17 -0800)]
util/fusermount.c: Assume the kernel supports UMOUNT_NOFOLLOW (#574)
UMOUNT_NOFOLLOW was added in Kernel 2.6.34. It's been 10 years since it's been added
Kernel 5.9, and 5.10 break this check mechanism[1]. Let's deprecate it.
[1]: https://lore.kernel.org/linux-fsdevel/
20201223102604.2078-1-sargun@sargun.me/
Signed-off-by: Sargun Dhillon <sargun@sargun.me>
Kangjing "Chaser" Huang [Sat, 19 Dec 2020 10:43:19 +0000 (05:43 -0500)]
Add exfat to whitelist (#573)
Nikolaus Rath [Mon, 7 Dec 2020 09:52:02 +0000 (09:52 +0000)]
Released 3.10.1
Rethan [Tue, 24 Nov 2020 09:28:13 +0000 (17:28 +0800)]
examples/cuse_client: add include file to eliminate compiler warning (#568)
Compiler warning about close(fd), add include file to fix.
Signed-off-by: haoyixing <haoyixing@kuaishou.com>
Co-authored-by: haoyixing <haoyixing@kuaishou.com>
human [Mon, 16 Nov 2020 17:11:09 +0000 (19:11 +0200)]
fix errno comparison
this affected `-o remember` in single-thread mode, it could prematurely
exit if a signal was received
# start an example filesystem from example/
./passthrough -f -s -o remember=5 ./mnt
# make the poll() call return with EINTR
pkill -PIPE passthrough
Zhiqiang Liu [Wed, 11 Nov 2020 02:00:23 +0000 (10:00 +0800)]
buffer.c: correct return value when buf is NULL
In commit
d614415a ("buffer.c: check whether buf is
NULL in fuse_bufvec_advance func"), if fuse_bufvec_current
func returns NULL, it returns 1 directly. Actually,
we should return 0 when buf is NULL.
Fixes: d614415a ("buffer.c: check whether buf is NULL in fuse_bufvec_advance func")
Signed-off-by: Zhiqiang Liu <liuzhiqiang26@huawei.com>
Signed-off-by: Haotian Li <lihaotian9@huawei.com>
Zhiqiang Liu [Thu, 5 Nov 2020 10:26:18 +0000 (18:26 +0800)]
test/test_syscalls.c: fix potential fd leakage problems
In test_syscalls.c, several funcs have potential fd leakage
problems. This patch will fix them.
Signed-off-by: Zhiqiang Liu <liuzhiqiang26@huawei.com>
Signed-off-by: Haotian Li <lihaotian9@huawei.com>
Zhiqiang Liu [Thu, 5 Nov 2020 10:16:58 +0000 (18:16 +0800)]
example/cuse_client.c: fix fd leakage problem
In cuse_client.c, fd should be closed before return.
Otherwise, it will cause fd leakage problem.
Signed-off-by: Zhiqiang Liu <liuzhiqiang26@huawei.com>
Signed-off-by: Haotian Li <lihaotian9@huawei.com>
Zhiqiang Liu [Thu, 5 Nov 2020 10:00:32 +0000 (18:00 +0800)]
ioctl_client.c: fix potential fd leakage problem
In ioctl_client.c, fd is not closed before return, thus
it will cause fd leakage problem.
Signed-off-by: Zhiqiang Liu <liuzhiqiang26@huawei.com>
Signed-off-by: Haotian Li <lihaotian9@huawei.com>
Zhiqiang Liu [Thu, 5 Nov 2020 09:24:12 +0000 (17:24 +0800)]
mount.fuse.c: fix potential memory leak in main func
In mount.fuse.c, there are several memory leak problems in
main func. For example, setuid_name is allocated by calling
xstrdup func, however it is not freed before calling execl func.
Signed-off-by: Zhiqiang Liu <liuzhiqiang26@huawei.com>
Signed-off-by: Haotian Li <lihaotian9@huawei.com>
Zhiqiang Liu [Thu, 5 Nov 2020 08:39:52 +0000 (16:39 +0800)]
mount.fuse.c: fix potential accessing NULL pointer
In mount.fuse.c, pwd is set by calling getpwnam func.
If the matching entry is not found or an error occurs in
getpwnam func, pwd will be NULL. So we need to check
whether pwd is NULL before accessing it.
Signed-off-by: Zhiqiang Liu <liuzhiqiang26@huawei.com>
Signed-off-by: Haotian Li <lihaotian9@huawei.com>
Zhiqiang Liu [Thu, 5 Nov 2020 08:33:22 +0000 (16:33 +0800)]
buffer.c: check whether buf is NULL in fuse_bufvec_advance func
In fuse_bufvec_advance func, calling fuse_bufvec_current func
may return NULL, so we should check whether buf is NULL before
using it.
Signed-off-by: Zhiqiang Liu <liuzhiqiang26@huawei.com>
Signed-off-by: Haotian Liu <lihaotian9@huawei.com>
Lilo Huang [Wed, 4 Nov 2020 18:32:54 +0000 (02:32 +0800)]
Fix incorrect date in Changelog
It should be 2020 rather than 2010. Thanks.
Rosen Penev [Thu, 29 Oct 2020 02:25:38 +0000 (19:25 -0700)]
remove fuse_mutex_init
This seems to have been added before 2006 to fix a uclibc bug. It
doesn't seem to be the case anymore so just get rid of it.
Signed-off-by: Rosen Penev <rosenp@gmail.com>
Rosen Penev [Thu, 29 Oct 2020 02:20:35 +0000 (19:20 -0700)]
remove old uclibc hack
This actually prevents sshfs linking to it as fuse_new becomes
unavailable.
According to the git history, this seems to predate 2006.
Signed-off-by: Rosen Penev <rosenp@gmail.com>
Nikolaus Rath [Fri, 9 Oct 2020 09:47:25 +0000 (10:47 +0100)]
Released 3.10.0
ferivoz [Sat, 3 Oct 2020 12:14:00 +0000 (12:14 +0000)]
Fix typo "retuned" -> "returned" (#553)
Etienne Dublé [Sun, 20 Sep 2020 18:08:15 +0000 (20:08 +0200)]
Allow caching symlinks in kernel page cache. (#551)
This commit defines a new capability called `FUSE_CAP_CACHE_SYMLINKS`.
It is off by default but you can now enable it by setting this flag in
in the `want` field of the `fuse_conn_info` structure.
When enabled, the kernel will save symlinks in its page cache,
by making use of the feature introduced in kernel 4.20:
https://github.com/torvalds/linux/commit/
5571f1e65486be025f73fa6aa30fb03725d362a2
Tom Callaway [Mon, 14 Sep 2020 08:45:02 +0000 (04:45 -0400)]
Fix compilation for compilers not supporting __has_attribute
Tom Callaway [Sat, 12 Sep 2020 08:28:27 +0000 (04:28 -0400)]
Update Travis to Ubuntu Bionic
Tom Callaway [Fri, 11 Sep 2020 09:15:43 +0000 (05:15 -0400)]
Implement GCC 10 style symbol versioning (#545)
AKowshik [Wed, 9 Sep 2020 19:17:06 +0000 (00:47 +0530)]
Updated example code to work with new API (#547)
Nikolaus Rath [Fri, 28 Aug 2020 19:19:43 +0000 (20:19 +0100)]
Added TSAN suppression file.
Nikolaus Rath [Fri, 28 Aug 2020 19:07:11 +0000 (20:07 +0100)]
Suppress some bogus thread sanitizer warnings.
Nikolaus Rath [Mon, 10 Aug 2020 18:39:27 +0000 (19:39 +0100)]
Remove pointer to professional consulting offers
I do not want to offer this actively anymore.
Nikolaus Rath [Sun, 9 Aug 2020 11:55:02 +0000 (12:55 +0100)]
Fix-up changelog.
Nikolaus Rath [Sun, 9 Aug 2020 11:49:17 +0000 (12:49 +0100)]
Released 3.9.4
Nikolaus Rath [Sun, 9 Aug 2020 11:39:07 +0000 (12:39 +0100)]
fuse_send_data_iov(): correctly calculate total buffer size.
Fixes: #538.
asafkahlon [Sun, 9 Aug 2020 11:37:26 +0000 (14:37 +0300)]
Define fuse_session_loop_mt as a macro on uclibc and MacOS (#532)
On uclibc and MacOS we don't use versioned symbols. Hence,
there's no definition for fuse_session_loop_mt on those cases
and the linker won't be able to resolve calls to fuse_session_loop_mt()
Signed-off-by: Asaf Kahlon <asafka7@gmail.com>
AKowshik [Sun, 9 Aug 2020 11:35:43 +0000 (17:05 +0530)]
Fixed typo in command to compile program (#536)
Junichi Uekawa [Sun, 9 Aug 2020 11:35:28 +0000 (20:35 +0900)]
Doc fixes (#537)
* Add fallocate to list of operations that may omit path.
* earlier versions is 10+ years old.
Document is not obvious how old it is. Add it.
* Update manpage link
Li-Wen Hsu [Sun, 9 Aug 2020 11:34:58 +0000 (19:34 +0800)]
Fix FreeBSD CI (#539)
Jérémie Galarneau [Fri, 10 Jul 2020 18:59:57 +0000 (14:59 -0400)]
Fix: crash on failure to set locale (#529)
setlocale() can fail, returning NULL, if the user has an invalid (or
missing) locale set in the LANG environment variable.
In my case, this happens when using VS Code's integrated terminal to
launch a fuse-based filesystem. A bug (fix upcoming) results in VS Code
setting an invalid locale.
iconv_help() currently passes the return value of setlocale(...)
directly to strdup() without checking if it is NULL, resulting in a
crash.
To reproduce, simply set LANG="something_invalid" and call
fuse_lib_help().
Stack trace when the process receives `SIGSEGV`:
(gdb) bt
#0 0x00007fabd0fcc4b5 in __strlen_avx2 () from /usr/lib/libc.so.6
#1 0x00007fabd0ef9233 in strdup () from /usr/lib/libc.so.6
#2 0x00007fabd13b8128 in iconv_help () at ../lib/modules/iconv.c:641
#3 0x00007fabd13b81a8 in iconv_opt_proc (data=0x55580a6ee850, arg=0x55580a6edfb0 "-h", key=0, outargs=0x7ffeeb1a8ec8) at ../lib/modules/iconv.c:658
#4 0x00007fabd13af7d5 in call_proc (ctx=0x7ffeeb1a8ea0, arg=0x55580a6edfb0 "-h", key=0, iso=0) at ../lib/fuse_opt.c:161
#5 0x00007fabd13afaf1 in process_opt (ctx=0x7ffeeb1a8ea0, opt=0x7fabd13c3d40 <iconv_opts>, sep=0, arg=0x55580a6edfb0 "-h", iso=0) at ../lib/fuse_opt.c:233
#6 0x00007fabd13afd5a in process_gopt (ctx=0x7ffeeb1a8ea0, arg=0x55580a6edfb0 "-h", iso=0) at ../lib/fuse_opt.c:285
#7 0x00007fabd13b0117 in process_one (ctx=0x7ffeeb1a8ea0, arg=0x55580a6edfb0 "-h") at ../lib/fuse_opt.c:368
#8 0x00007fabd13b0190 in opt_parse (ctx=0x7ffeeb1a8ea0) at ../lib/fuse_opt.c:379
#9 0x00007fabd13b03d3 in fuse_opt_parse (args=0x7ffeeb1a8f70, data=0x55580a6ee850, opts=0x7fabd13c3d40 <iconv_opts>, proc=0x7fabd13b8186 <iconv_opt_proc>)
at ../lib/fuse_opt.c:414
#10 0x00007fabd13b8226 in iconv_new (args=0x7ffeeb1a8f70, next=0x0) at ../lib/modules/iconv.c:680
#11 0x00007fabd13a5627 in print_module_help (name=0x7fabd13b9e1c "iconv", fac=0x7fabd13d48e0 <fuse_module_iconv_factory>) at ../lib/fuse.c:4692
#12 0x00007fabd13a56aa in fuse_lib_help (args=0x7ffeeb1a9238) at ../lib/fuse.c:4721
iconv_help() is modified to print an error when setlocale() fails.
It then carries on printing the iconv module's help.
Reading setlocale(3), it seems that the strdup() of the result was
not necessary.
Signed-off-by: Jérémie Galarneau <jeremie.galarneau@gmail.com>
winndows [Fri, 10 Jul 2020 18:58:07 +0000 (02:58 +0800)]
fuse_lowlevel: Move assert for se before dereferencing it with se->debug (#530)
Move assert for se before dereferencing it with se->debug.
Signed-off-by: Liao Pingfang <liao.pingfang@zte.com.cn>
Co-authored-by: Liao Pingfang <liao.pingfang@zte.com.cn>
Albert Chen [Fri, 3 Jul 2020 11:39:09 +0000 (04:39 -0700)]
Fixed minor print alignment issue in iconv_help(), replacing tab with space (#519)
winndows [Fri, 3 Jul 2020 11:30:40 +0000 (19:30 +0800)]
Fix the typo "filed" -> "field" in fuse manpage (#524)
Fix the typo "filed" -> "field" in fuse manpage.
Signed-off-by: Liao Pingfang <liao.pingfang@zte.com.cn>
Co-authored-by: Liao Pingfang <liao.pingfang@zte.com.cn>
winndows [Fri, 3 Jul 2020 11:29:48 +0000 (19:29 +0800)]
README: Correct the directory name from 'examples' to 'example' (#526)
Correct the directory name from 'examples' to 'example' in readme.
Signed-off-by: Liao Pingfang <liao.pingfang@zte.com.cn>
Co-authored-by: Liao Pingfang <liao.pingfang@zte.com.cn>
Craig Chi [Fri, 3 Jul 2020 11:28:05 +0000 (04:28 -0700)]
docs: Replace `mesonconf` with `meson configure` (#528)
Fixes #527
winndows [Wed, 1 Jul 2020 05:20:01 +0000 (13:20 +0800)]
libfuse: Assign NULL to "old" to avoid free it twice (#522)
Assign NULL to "old" at the first free(), to avoid the possible 2nd free() for it.
Signed-off-by: Liao Pingfang <liao.pingfang@zte.com.cn>
Co-authored-by: Liao Pingfang <liao.pingfang@zte.com.cn>
Seunghoon Yeon [Mon, 22 Jun 2020 05:27:58 +0000 (14:27 +0900)]
Typo fixed. (#520)
Nikolaus Rath [Fri, 12 Jun 2020 11:12:50 +0000 (12:12 +0100)]
Released 3.9.2
Rosen Penev [Fri, 15 May 2020 18:34:31 +0000 (11:34 -0700)]
fix format in test (#515)
Fixes warning under 32-bit.
Fabian Vogt [Fri, 15 May 2020 18:32:10 +0000 (20:32 +0200)]
Avoid closing se->fd twice in fuse_lowlevel.c (#516)
If fuse_session_unmount is called before fuse_session_destroy, both
would try to close(se->fd). Avoid that by resetting it in
fuse_session_unmount.
Miklos Szeredi [Thu, 14 May 2020 19:17:50 +0000 (21:17 +0200)]
passthrough_ll: remove symlink fallbacks (#514)
* passthrough_ll/hp: remove symlink fallbacks
Path lookup in the kernel has special rules for looking up magic symlinks
under /proc. If a filesystem operation is instructed to follow symlinks
(e.g. via AT_SYMLINK_FOLLOW or lack of AT_SYMLINK_NOFOLLOW), and the final
component is such a proc symlink, then the target of the magic symlink is
used for the operation, even if the target itself is a symlink. I.e. path
lookup is always terminated after following a final magic symlink.
I was erronously assuming that in the above case the target symlink would
also be followed, and so workarounds were added for a couple of operations
to handle the symlink case. Since the symlink can be handled simply by
following the proc symlink, these workardouds are not needed.
Signed-off-by: Miklos Szeredi <mszeredi@redhat.com>
Co-authored-by: Miklos Szeredi <mszeredi@redhat.com>
Fabrice Fontaine [Mon, 20 Apr 2020 19:20:19 +0000 (21:20 +0200)]
Do not require C++ compiler for building
Fixes:
- http://autobuild.buildroot.org/results/
a6e64213f2910b2b81e79cb1e96e558413d7f70a
Signed-off-by: Fabrice Fontaine <fontaine.fabrice@gmail.com>
Nikolaus Rath [Thu, 19 Mar 2020 20:00:41 +0000 (20:00 +0000)]
Released 3.9.1
Jean-Yves VET [Fri, 13 Mar 2020 19:02:41 +0000 (20:02 +0100)]
Fix issue preventing using splice with reads (#505)
Context: SPLICE_WRITE is not used with regular buffers
(i.e. when they are not file-descriptor backed buffers).
There is a bug which assumes file descriptors are used.
If the amount of data associated with those FD is lower
than twice the page size, SPLICE_WRITE is not utilized.
With regular buffers the aggregated size was always 0.
Because vmsplice (splice user pages to/from a pipe) is
called before splice in fuse_lowlevel.c, regular buffers
would also work with splice.
This patch prevents to fallback to non-splice enabled
copies when itheir is no FD involved.
Andrew Gaul [Fri, 13 Mar 2020 16:48:09 +0000 (01:48 +0900)]
Align help options (#500)
Dr. David Alan Gilbert [Fri, 13 Mar 2020 16:46:44 +0000 (16:46 +0000)]
State GPL version in comment (#485)
IN a bunch of comments we say 'under the terms of the GNU GPL', make
it clear this is GPLv2 (as LICENSE says).
Signed-off-by: Dr. David Alan Gilbert <dgilbert@redhat.com>
philmd [Mon, 24 Feb 2020 21:42:41 +0000 (22:42 +0100)]
passthrough_ll: Remove unneeded variable assignment (#501)
Fix warning reported by Clang static code analyzer:
example/passthrough_ll.c:390:5: warning: Value stored to 'saverr' is never read
saverr = ENOMEM;
^ ~~~~~~
Fixes: 4a92a82f2e2
Reported-by: Clang Static Analyzer
Reviewed-by: Ján Tomko <jtomko@redhat.com>
Signed-off-by: Philippe Mathieu-Daudé <philmd@redhat.com>
philmd [Mon, 24 Feb 2020 21:41:28 +0000 (22:41 +0100)]
Travis-CI: Fix ImportError: No module named 'zipp' (#502)
Upgrade pip to fix [*]:
[66/66] Linking target example/passthrough_hp.
Traceback (most recent call last):
File "/usr/lib/python3.5/runpy.py", line 174, in _run_module_as_main
mod_name, mod_spec, code = _get_module_details(mod_name, _Error)
File "/usr/lib/python3.5/runpy.py", line 133, in _get_module_details
return _get_module_details(pkg_main_name, error)
File "/usr/lib/python3.5/runpy.py", line 109, in _get_module_details
__import__(pkg_name)
File "/usr/local/lib/python3.5/dist-packages/pytest/__init__.py", line 6, in <module>
from _pytest.assertion import register_assert_rewrite
File "/usr/local/lib/python3.5/dist-packages/_pytest/assertion/__init__.py", line 7, in <module>
from _pytest.assertion import rewrite
File "/usr/local/lib/python3.5/dist-packages/_pytest/assertion/rewrite.py", line 24, in <module>
from _pytest.assertion import util
File "/usr/local/lib/python3.5/dist-packages/_pytest/assertion/util.py", line 14, in <module>
import _pytest._code
File "/usr/local/lib/python3.5/dist-packages/_pytest/_code/__init__.py", line 2, in <module>
from .code import Code # noqa
File "/usr/local/lib/python3.5/dist-packages/_pytest/_code/code.py", line 28, in <module>
import pluggy
File "/usr/local/lib/python3.5/dist-packages/pluggy/__init__.py", line 16, in <module>
from .manager import PluginManager, PluginValidationError
File "/usr/local/lib/python3.5/dist-packages/pluggy/manager.py", line 11, in <module>
import importlib_metadata
File "/usr/local/lib/python3.5/dist-packages/importlib_metadata/__init__.py", line 9, in <module>
import zipp
ImportError: No module named 'zipp'
The command "test/travis-build.sh" exited with 1.
[*] https://travis-ci.org/libfuse/libfuse/builds/
651523034
Signed-off-by: Philippe Mathieu-Daudé <philmd@redhat.com>
maxice8 [Tue, 4 Feb 2020 14:57:25 +0000 (15:57 +0100)]
Include limits.h because of PATH_MAX usage. (#498)
Fixes build with musl libc on Alpine Linux.
Florian Weimer [Fri, 31 Jan 2020 18:38:41 +0000 (19:38 +0100)]
Update comment for the copy_file_range operation (#497)
copy_file_range was first implemented with copy-based emulation in
glibc 2.27, but the emulation was subsequently removed again because
correct emulation depends on why the application attempted to make a
copy. Therefore, file systems cannot rely on low-level userspace
performing emulation.
zsugabubus [Thu, 30 Jan 2020 16:17:25 +0000 (16:17 +0000)]
examples: mark ops variables constant (#496)
zsugabubus [Mon, 27 Jan 2020 16:13:11 +0000 (16:13 +0000)]
Remove trailing comma in enums (#494)
They are illegal in C89/90.
Anthony Rebello [Sat, 25 Jan 2020 10:17:09 +0000 (04:17 -0600)]
Fixes 477, optional src_dir in tst_(rmdir,unlink) (#493)
tst_rmdir and tst_unlink now pass for passthrough_hp.
Previously, tst_rmdir and tst_unlink created the directory / file
using src_dir, causing the test to fail as the cache was stale.
Now, the src_dir is optional. When cache is enabled, tst_rmdir
and tst_unlink do not provide a src_dir, forcing the test to
use mnt_dir itself.
Misono Tomohiro [Fri, 24 Jan 2020 15:53:32 +0000 (00:53 +0900)]
passthrough_ll: Use cache_readdir for directory open (#492)
Upstreamed from:
https://www.redhat.com/archives/virtio-fs/2020-January/msg00106.html
Since keep_cache(FOPEN_KEEP_CACHE) has no effect for directory as
described in fuse_common.h, use cache_readdir(FOPEN_CACHE_DIR) for
diretory open when cache=always mode.
Signed-off-by: Misono Tomohiro <misono.tomohiro@jp.fujitsu.com>
Dr. David Alan Gilbert [Mon, 6 Jan 2020 20:32:51 +0000 (20:32 +0000)]
passthrough_ll: pass correct errno to fuse_reply_err()
fuse_reply_err() expects the error code, not its negative.
Upstreamed from https://www.redhat.com/archives/virtio-fs/2020-January/msg00000.html. Original commit message:
lo_copy_file_range() passes -errno to fuse_reply_err() and then fuse_reply_err()
changes it to errno again, so that subsequent fuse_send_reply_iov_nofree() catches
the wrong errno.(i.e. reports "fuse: bad error value: ...").
Make fuse_send_reply_iov_nofree() accept the correct -errno by passing errno
directly in lo_copy_file_range().
Signed-off-by: Xiao Yang <yangx.jy@cn.fujitsu.com>
Reviewed-by: Eryu Guan <eguan@linux.alibaba.com>
Co-authored-by: Xiao Yang <ice_yangxiao@163.com>
Nikolaus Rath [Thu, 2 Jan 2020 11:08:33 +0000 (11:08 +0000)]
Fixed up ChangeLog.rst
Last two changes were not part of the released version.
Bill Zissimopoulos [Thu, 2 Jan 2020 11:08:03 +0000 (03:08 -0800)]
Fixed memory leak in fuse_session_new()
Bill Zissimopoulos [Thu, 2 Jan 2020 11:06:18 +0000 (03:06 -0800)]
Fixed an issue with the linker version script. (#483)
Fixes #467.
Changli Gao [Tue, 31 Dec 2019 10:01:26 +0000 (18:01 +0800)]
Style: Fix an indention in comments (#480)
Nikolaus Rath [Tue, 31 Dec 2019 09:59:28 +0000 (09:59 +0000)]
Bump FUSE_MINOR_VERSION
This was forgotten over several releases.
Bill Zissimopoulos [Tue, 31 Dec 2019 09:58:57 +0000 (01:58 -0800)]
Make ioctl prototype conditional on FUSE_USE_VERSION. (#482)
Define FUSE_USE_VERSION < 35 to get old ioctl prototype
with int commands; define FUSE_USE_VERSION >= 35 to get
new ioctl prototype with unsigned int commands.
Fixes #463.
Nikolaus Rath [Sat, 14 Dec 2019 10:39:13 +0000 (10:39 +0000)]
Released 3.9.0
Dr. David Alan Gilbert [Fri, 29 Nov 2019 09:14:28 +0000 (09:14 +0000)]
Kill off some proto_major < 6 checks (#476)
fuse_init already refuses to start if we're on major < 7 ,
so we can kill off checks for old major versions.
Signed-off-by: Dr. David Alan Gilbert <dgilbert@redhat.com>
Albert Chen [Wed, 27 Nov 2019 09:36:30 +0000 (01:36 -0800)]
Added support for FUSE_EXPLICIT_INVAL_DATA to enable (#474)
Tomasz Kulasek [Wed, 20 Nov 2019 11:43:52 +0000 (12:43 +0100)]
fix memleak in cuse_lowlevel_setup (#472)
Local variable args is not freed on cuse_lowlevel_setup success.
Signed-off-by: Tomasz Kulasek <tomaszx.kulasek@intel.com>
Nikolaus Rath [Wed, 20 Nov 2019 11:38:33 +0000 (11:38 +0000)]
Invoke cleanup() with right arguments.
This currently causes hangs if the test fails, cf issue #459.
Nikolaus Rath [Sun, 3 Nov 2019 09:53:39 +0000 (09:53 +0000)]
Released 3.8.0
Yuri Per [Sun, 3 Nov 2019 09:44:31 +0000 (11:44 +0200)]
Implement lseek operation (#457)
Alan Somers [Sun, 3 Nov 2019 09:44:12 +0000 (02:44 -0700)]
Use the -o intr mount option on FreeBSD (#462)
FUSE file systems normally indicate their interruptibility by returning
ENOSYS to the first FUSE_INTERRUPT operation. But that causes two
problems for file systems that aren't interruptible:
1) A process may block on a signal, even if another thread could've
handled the signal. The kernel must know whether the FUSE thread is
interruptible before deciding which thread should receive a signal.
2) The protocol allows a FUSE daemon to simply ignore FUSE_INTERRUPT
operations. From the kernel's point of view, that is indistinguishable
from a FUSE_INTERRUPT operation arriving after the original operation
had already completed. Thus, the kernel can't interpret an ignored
FUSE_INTERRUPT as an indication that the daemon is non-interruptible.
With the -o nointr mount option, no FUSE_INTERRUPT operations will ever
be sent. Most FUSE file systems should require no modifications to take
advantage of this mount option.
Stefan Hajnoczi [Sun, 3 Nov 2019 09:43:43 +0000 (10:43 +0100)]
passthrough_ll: drop lo_dirp->fd field (#464)
fdopendir(3) takes ownership of the file descriptor. The presence of
the lo_dirp->fd field could lead to someone incorrectly adding a
close(d->fd) cleanup call in the future.
Do not store the file descriptor in struct lo_dirp since it is unused.
Signed-off-by: Stefan Hajnoczi <stefanha@redhat.com>
Reviewed-by: Dr. David Alan Gilbert <dgilbert@redhat.com>
Emily Herbert [Thu, 24 Oct 2019 21:46:19 +0000 (17:46 -0400)]
Update README.md (#465)
Nikolaus Rath [Fri, 27 Sep 2019 19:01:33 +0000 (20:01 +0100)]
Released 3.7.0
tenzap [Sun, 15 Sep 2019 15:56:56 +0000 (17:56 +0200)]
Whitelist UFSD (#451)
Stefan Hajnoczi [Tue, 10 Sep 2019 10:45:43 +0000 (12:45 +0200)]
passthrough_ll: use fuse_log() instead of err()/errx()
Send everything through fuse_log() instead of writing directly to
stderr.
Signed-off-by: Stefan Hajnoczi <stefanha@redhat.com>
Stefan Hajnoczi [Tue, 10 Sep 2019 10:39:34 +0000 (12:39 +0200)]
passthrough_ll: use fuse_log()
Make use of fuse_log() instead of printing directly to stderr. This
demonstrates unified logging and also caught the fact that I forgot to
add fuse_log APIs to lib/fuse_versionscript. So it's basically a test
case :).
Signed-off-by: Stefan Hajnoczi <stefanha@redhat.com>
Stefan Hajnoczi [Tue, 10 Sep 2019 10:36:56 +0000 (12:36 +0200)]
log: move fuse_log() to the public header file
Applications may wish to call fuse_log() for unified logging. This way
they don't need to define their own wrappers to invoke the log message
handler function installed by fuse_set_log_func().
Signed-off-by: Stefan Hajnoczi <stefanha@redhat.com>
Dr. David Alan Gilbert [Mon, 9 Sep 2019 09:14:02 +0000 (10:14 +0100)]
passthrough_ll: fix fallocate variant ifdefs (#449)
If fallocate isn't available we incorrectly check for the value of
HAVE_POSIX_FALLOCATE rather than it being defined.
We also fail to initialise 'err' in the case where neither are defined.
Fixes: 5fc562c90d7925963467 ("Add fallocate and use it instead of ...")
Signed-off-by: Dr. David Alan Gilbert <dgilbert@redhat.com>
Stefan Hajnoczi [Wed, 4 Sep 2019 14:59:18 +0000 (15:59 +0100)]
Introduce callback for logging
Introduce an API for custom log handler functions. This allows libfuse
applications to send messages to syslog(3) or other logging systems.
See include/fuse_log.h for details.
Convert libfuse from fprintf(stderr, ...) to log_fuse(level, ...). Most
messages are error messages with FUSE_LOG_ERR log level. There are also
some debug messages which now use the FUSE_LOG_DEBUG log level.
Note that lib/mount_util.c is used by both libfuse and fusermount3.
Since fusermount3 does not link against libfuse, we cannot call
fuse_log() from lib/mount_util.c. This file will continue to use
fprintf(stderr, ...) until someone figures out how to split it up.
Signed-off-by: Stefan Hajnoczi <stefanha@redhat.com>
Stefan Hajnoczi [Thu, 29 Aug 2019 19:28:29 +0000 (20:28 +0100)]
Avoid gcc 9.1 strncpy(3) warnings (#447)
Recent GCC releases have warnings related to common strncpy(3) bugs.
These warnings can be avoided by explicitly NUL-terminating the buffer
or using memcpy(3) when the intention is to copy just the characters
without the NUL terminator.
This commit fixes the following warnings:
[1/27] Compiling C object 'test/
9f86d08@@test_syscalls@exe/test_syscalls.c.o'.
In function ‘test_socket’,
inlined from ‘main’ at ../test/test_syscalls.c:1899:9:
../test/test_syscalls.c:1760:2: warning: ‘strncpy’ output may be truncated copying 108 bytes from a string of length 1023 [-Wstringop-truncation]
1760 | strncpy(su.sun_path, testsock, sizeof(su.sun_path));
| ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
[2/27] Compiling C object 'lib/
76b5a35@@fuse3@sha/fuse.c.o'.
../lib/fuse.c: In function ‘add_name’:
../lib/fuse.c:968:2: warning: ‘strncpy’ output truncated before terminating nul copying as many bytes from a string as its length [-Wstringop-truncation]
968 | strncpy(s, name, len);
| ^~~~~~~~~~~~~~~~~~~~~
../lib/fuse.c:944:15: note: length computed here
944 | size_t len = strlen(name);
| ^~~~~~~~~~~~
[3/27] Compiling C object 'lib/
76b5a35@@fuse3@sha/fuse_lowlevel.c.o'.
../lib/fuse_lowlevel.c: In function ‘fuse_add_direntry’:
../lib/fuse_lowlevel.c:288:2: warning: ‘strncpy’ output truncated before terminating nul copying as many bytes from a string as its length [-Wstringop-truncation]
288 | strncpy(dirent->name, name, namelen);
| ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
../lib/fuse_lowlevel.c:276:12: note: length computed here
276 | namelen = strlen(name);
| ^~~~~~~~~~~~
../lib/fuse_lowlevel.c: In function ‘fuse_add_direntry_plus’:
../lib/fuse_lowlevel.c:381:2: warning: ‘strncpy’ output truncated before terminating nul copying as many bytes from a string as its length [-Wstringop-truncation]
381 | strncpy(dirent->name, name, namelen);
| ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
../lib/fuse_lowlevel.c:366:12: note: length computed here
366 | namelen = strlen(name);
| ^~~~~~~~~~~~
Signed-off-by: Stefan Hajnoczi <stefanha@redhat.com>
Nikolaus Rath [Fri, 23 Aug 2019 19:58:54 +0000 (20:58 +0100)]
Shorten comment.
Nikolaus Rath [Sat, 13 Jul 2019 00:58:59 +0000 (17:58 -0700)]
Improve description of READDIRPLUS_AUTO.
AsumFace [Fri, 23 Aug 2019 19:58:06 +0000 (21:58 +0200)]
Clarify bitfield padding issue (#445)
* Clarify bitfield padding issue
* Add a more elaborate note to fuse_file_info
Giuseppe Scrivano [Tue, 23 Jul 2019 19:52:16 +0000 (21:52 +0200)]
fuse-lowlevel: set pipe size to max (#438)
on failure to set the pipe size, set it to the maximum allowed by the
kernel.
If the first request required more than the maximum allowed, the
can_grow flag would be reset thus preventing any further resize.
Grow the pipe to the maximum allowed to increase the likelihood of
using splice for successive requests instead of falling back to
read/write.
Signed-off-by: Giuseppe Scrivano <gscrivan@redhat.com>
Kirill Smelkov [Tue, 9 Jul 2019 20:54:09 +0000 (23:54 +0300)]
Sync fuse_kernel.h with Linux 5.2 (#433)