fuser
fuser copied to clipboard
Filesystem in Userspace (FUSE) for Rust
I've discovered this by mistake, by having an `unwrap()` fail in my implementation of `init()`. As soon as this happens, some bad things occur: - The process running the mount...
CUSE is "Character devices in user space", and the Linux cuse module (which depends on fuse) provides access to it via `/dev/cuse`, as well as the libfuse library providing an...
I am trying to use fuser on OpenBSD, and found that fuser v0.13.0 cannot be built on the OS. There are two problems. The first problem is some constants from...
I checked the calls I'm getting in `mkdir` and `create`, and it seems that the calling process's `umask` is already automatically applied to the `mode` argument and the additional `umask`...
In [0009aa184b9c91fbeacb6f364d28571192af70ae](https://github.com/cberner/fuser/commit/0009aa184b9c91fbeacb6f364d28571192af70ae) this code was added: ```rust let (file, mount) = Mount::new(mountpoint, options)?; // If AutoUnmount is requested, but not AllowRoot or AllowOther we enforce the ACL // ourself and...
We test ScyllaDB with ChaosMesh which uses `fuser` project under the hood to inject failures coming from filesystem. ScyllaDB uses asynchonous direct file I/O which requires `io_submit()` and `io_getevents()` support....
I wrote some unit tests that run some code using this crate. It worked so far, but when moving this into a sandboxed build, by building it with Nix, I...
https://github.com/cberner/fuser/pull/154 (**Ensure that Filesystem.destroy() is always called**) made `destroy()` an exactly once method for `Session`, but `BackgroundSession` still relies on the `ll::Operation::Destroy` request to be received from the kernel. We...
The current code can panic with filesystems that do not store times. Using checked arithmetic allows such filesystems to operate without panic.