Go to file
2024-11-18 15:51:22 +01:00
.github build(deps): bump github/codeql-action from 3.27.0 to 3.27.1 2024-11-13 16:42:29 +01:00
dev-docs Released fuse-3.16.2 2023-10-10 08:38:49 +01:00
doc Correct arg documentation for FUSE_READLINK 2024-10-30 17:58:09 +01:00
example Add FUSE_CAP_NO_EXPORT and use it in passthrough_hp 2024-11-13 16:43:59 +01:00
include Add FUSE_CAP_NO_EXPORT and use it in passthrough_hp 2024-11-13 16:43:59 +01:00
lib Use fuse_session_{receive/process}_buf() instead of _int version 2024-11-18 15:51:22 +01:00
signify Added missing file, update release process docs. 2023-08-08 11:23:37 +01:00
test Use off_t instead of loff_t 2024-06-25 07:16:49 +02:00
util Add libfuse util strtol wrapper 2024-10-11 13:15:38 +02:00
xfstests xfstests: Add '-odev' to passthrough mount options 2024-07-09 18:04:43 +02:00
.ackrc Added .ackrc 2018-11-24 20:51:34 +00:00
.cirrus.yml Fix meson deprecation warning also in FreeBSD 2023-04-07 14:01:16 +01:00
.clang-format Add a .clang-format file (#952) 2024-05-27 10:18:19 +02:00
.codespellrc Fix typos and configure spellcheck for PRs 2023-03-29 19:47:13 +01:00
.dir-locals.el Added new example filesystem 2019-05-09 14:16:37 -05:00
.gitignore Added issue template. 2019-04-30 06:14:58 -07:00
AUTHORS Update AUTHORS 2024-06-22 14:14:53 +02:00
ChangeLog.rst Add syslog and fatal signal handler feature 2024-07-14 14:28:44 +02:00
GPL2.txt Clarified licensing terms. 2018-10-11 08:52:31 +01:00
LGPL2.txt Clarified licensing terms. 2018-10-11 08:52:31 +01:00
LICENSE Clarified licensing terms. 2018-10-11 08:52:31 +01:00
make_release_tarball.sh Don't attempt to put signify signature into gz header 2023-08-08 11:11:55 +01:00
meson_options.txt convert __APPLE__ and __ULIBC__ to HAVE_LIBC_VERSIONED_SYMBOLS 2023-01-04 15:27:21 +00:00
meson.build Use std=gnu11 (#940) 2024-04-27 14:25:48 +02:00
README.md Add final "meson setup --reconfigure" to README.md 2024-03-20 12:59:59 +01:00
requirements.txt Install all test/build python packages from requirements.txt 2024-03-27 17:26:14 +01:00
SECURITY.md Add security policy (#797) 2023-06-06 10:00:35 +01:00
tsan_suppressions.txt Added TSAN suppression file. 2020-08-28 20:19:57 +01:00

libfuse

About

FUSE (Filesystem in Userspace) is an interface for userspace programs to export a filesystem to the Linux kernel. The FUSE project consists of two components: the fuse kernel module (maintained in the regular kernel repositories) and the libfuse userspace library (maintained in this repository). libfuse provides the reference implementation for communicating with the FUSE kernel module.

A FUSE file system is typically implemented as a standalone application that links with libfuse. libfuse provides functions to mount the file system, unmount it, read requests from the kernel, and send responses back. libfuse offers two APIs: a "high-level", synchronous API, and a "low-level" asynchronous API. In both cases, incoming requests from the kernel are passed to the main program using callbacks. When using the high-level API, the callbacks may work with file names and paths instead of inodes, and processing of a request finishes when the callback function returns. When using the low-level API, the callbacks must work with inodes and responses must be sent explicitly using a separate set of API functions.

Development Status

libfuse is shipped by all major Linux distributions and has been in production use across a wide range of systems for many years. However, at present libfuse does not have any active, regular contributors. The current maintainer continues to apply pull requests and makes regular releases, but unfortunately has no capacity to do any development beyond addressing high-impact issues. When reporting bugs, please understand that unless you are including a pull request or are reporting a critical issue, you will probably not get a response. If you are using libfuse, please consider contributing to the project.

Supported Platforms

  • Linux (fully)
  • BSD (mostly/best-effort)
  • For OS-X, please use OSXFUSE

Installation

You can download libfuse from https://github.com/libfuse/libfuse/releases. To build and install, you must use Meson and Ninja. After downloading the tarball and .sig file, verify it using signify:

signify -V -m fuse-X.Y.Z.tar.gz -p fuse-X.Y.pub

The fuse-X.Y.pub file contains the signing key and needs to be obtained from a trustworthy source. Each libfuse release contains the signing key for the release after it in the signify directory, so you only need to manually acquire this file once when you install libfuse for the first time.

After you have validated the tarball, extract it, create a (temporary) build directory and run Meson:

$ tar xzf fuse-X.Y.Z.tar.gz; cd fuse-X.Y.Z
$ mkdir build; cd build
$ meson setup ..

Normally, the default build options will work fine. If you nevertheless want to adjust them, you can do so with the meson configure command:

$ meson configure # list options
$ meson configure -D disable-mtab=true # set an optionq

$ # ensure all meson options are applied to the final build system
$ meson setup --reconfigure ../

To build, test, and install libfuse, you then use Ninja:

$ ninja
$ sudo python3 -m pytest test/
$ sudo ninja install

Running the tests requires the py.test Python module. Instead of running the tests as root, the majority of tests can also be run as a regular user if util/fusermount3 is made setuid root first:

$ sudo chown root:root util/fusermount3
$ sudo chmod 4755 util/fusermount3
$ python3 -m pytest test/

Security implications

The fusermount3 program is installed setuid root. This is done to allow normal users to mount their own filesystem implementations.

To limit the harm that malicious users can do this way, fusermount3 enforces the following limitations:

  • The user can only mount on a mountpoint for which they have write permission

  • The mountpoint must not be a sticky directory which isn't owned by the user (like /tmp usually is)

  • No other user (including root) can access the contents of the mounted filesystem (though this can be relaxed by allowing the use of the allow_other and allow_root mount options in /etc/fuse.conf)

If you intend to use the allow_other mount options, be aware that FUSE has an unresolved security bug: if the default_permissions mount option is not used, the results of the first permission check performed by the file system for a directory entry will be re-used for subsequent accesses as long as the inode of the accessed entry is present in the kernel cache - even if the permissions have since changed, and even if the subsequent access is made by a different user. This is of little concern if the filesystem is accessible only to the mounting user (which has full access to the filesystem anyway), but becomes a security issue when other users are allowed to access the filesystem (since they can exploit this to perform operations on the filesystem that they do not actually have permissions for).

This bug needs to be fixed in the Linux kernel and has been known since 2006 but unfortunately no fix has been applied yet. If you depend on correct permission handling for FUSE file systems, the only workaround is to use default_permissions (which does not currently support ACLs), or to completely disable caching of directory entry attributes.

Building your own filesystem

FUSE comes with several example file systems in the example directory. For example, the passthrough examples mirror the contents of the root directory under the mountpoint. Start from there and adapt the code!

The documentation of the API functions and necessary callbacks is mostly contained in the files include/fuse.h (for the high-level API) and include/fuse_lowlevel.h (for the low-level API). An autogenerated html version of the API is available in the doc/html directory and at http://libfuse.github.io/doxygen.

Getting Help

If you need help, please ask on the fuse-devel@lists.sourceforge.net mailing list (subscribe at https://lists.sourceforge.net/lists/listinfo/fuse-devel).

Please report any bugs on the GitHub issue tracker at https://github.com/libfuse/libfuse/issues.