aboutsummaryrefslogtreecommitdiffstats
path: root/util/mount.fuse.c
AgeCommit message (Collapse)AuthorLines
2023-06-08util/mount.fuse.c: compile with linux headers < 3.5 (#798)wdlkmpx-0/+4
PR_SET_NO_NEW_PRIVS was added in linux 3.5 according to prtcl(2) man page https://elixir.bootlin.com/linux/v4.3/source/include/uapi/linux/prctl.h#L174
2023-01-28Install a the configure_file (config.h) and use in headersBernd Schubert-1/+1
This addresses: https://github.com/libfuse/libfuse/issues/724 HAVE_LIBC_VERSIONED_SYMBOLS configures the library if to use versioned symbols and is set at meson configuration time. External filesystems (the main target, actually) include fuse headers and the preprocessor then acts on HAVE_LIBC_VERSIONED_SYMBOLS. Problem was now that 'config.h' was not distributed with libfuse and so HAVE_LIBC_VERSIONED_SYMBOLS was never defined with external tools and the preprocessor did the wrong decision. This commit also increases the the minimal meson version, as this depends on meson feature only available in 0.50 <quote 'meson' > WARNING: Project specifies a minimum meson_ version '>= 0.42' but uses features which were added in newer versions: * 0.50.0: {'install arg in configure_file'} </quote> Additionally the config file has been renamed to "fuse_config.h" to avoid clashes - 'config.h' is not very specific.
2021-09-06Fix: fd and memory leak in mount.fuse.c (#614)lixiaokeng-1/+6
The command isn't freed and the fuse_fd isn't closed if execl failed. Fix it. Signed-off-by: Lixiaokeng <lixiaokeng@huawei.com>
2020-11-06mount.fuse.c: fix potential memory leak in main funcZhiqiang Liu-2/+11
In mount.fuse.c, there are several memory leak problems in main func. For example, setuid_name is allocated by calling xstrdup func, however it is not freed before calling execl func. Signed-off-by: Zhiqiang Liu <liuzhiqiang26@huawei.com> Signed-off-by: Haotian Li <lihaotian9@huawei.com>
2020-11-06mount.fuse.c: fix potential accessing NULL pointerZhiqiang Liu-1/+1
In mount.fuse.c, pwd is set by calling getpwnam func. If the matching entry is not found or an error occurs in getpwnam func, pwd will be NULL. So we need to check whether pwd is NULL before accessing it. Signed-off-by: Zhiqiang Liu <liuzhiqiang26@huawei.com> Signed-off-by: Haotian Li <lihaotian9@huawei.com>
2020-03-13State GPL version in comment (#485)Dr. David Alan Gilbert-1/+1
IN a bunch of comments we say 'under the terms of the GNU GPL', make it clear this is GPLv2 (as LICENSE says). Signed-off-by: Dr. David Alan Gilbert <dgilbert@redhat.com>
2019-05-05add defines for missing SECBITs on older kernels (#409)DrDaveD-0/+19
2019-03-09Correctly include config.h ("" vs <>)Nikolaus Rath-1/+1
This isn't a system header. Fixes: #349
2018-10-09Add unprivileged option in `mount.fuse3`Mattias Nissler-15/+194
The unprivileged option allows to run the FUSE file system process without privileges by dropping capabilities and preventing them from being re-acquired via setuid / fscaps etc. To accomplish this, mount.fuse sets up the `/dev/fuse` file descriptor and mount itself and passes the file descriptor via the `/dev/fd/%u` mountpoint syntax to the FUSE file system.
2018-05-11add_arg(): check for overflowNikolaus Rath-0/+5
Fixes: #222.
2017-12-01Handle mount ... -o nofail (#221)Josh Soref-0/+1
Accept (and ignore) nofail mount option
2013-07-24libfuse: remove "-D_FILE_OFFSET_BITS=64" from fuse.pcMiklos Szeredi-0/+2
add AC_SYS_LARGEFILE to your configure.ac instead.
2011-03-30Do not pass NULL to xstrdupLaszlo Papp-8/+12
2008-07-10Fix handling of (no)suid and (no)dev options...Miklos Szeredi-9/+27
2007-12-12change indentingMiklos Szeredi-168/+185
2007-06-21Add fs subtype support to mount.fuseMiklos Szeredi-15/+55
2007-04-18Replace utils/mount.fuse "sh" script with a "C" programMiklos Szeredi-0/+151