aboutsummaryrefslogtreecommitdiff
path: root/tests/sys
Commit message (Collapse)AuthorAgeFilesLines
* Further normalize copyright noticesKyle Evans2019-09-261-1/+0
| | | | | | | | | | | - s/C/c/ where I've been inconsistent about it - +SPDX tags - Remove "All rights reserved" where possible Requested by: rgrimes (all rights reserved) Notes: svn path=/head/; revision=352757
* Add an shm_rename syscallDavid Bright2019-09-261-14/+276
| | | | | | | | | | | | | | | | | | | | | | | | | | Add an atomic shm rename operation, similar in spirit to a file rename. Atomically unlink an shm from a source path and link it to a destination path. If an existing shm is linked at the destination path, unlink it as part of the same atomic operation. The caller needs the same permissions as shm_unlink to the shm being renamed, and the same permissions for the shm at the destination which is being unlinked, if it exists. If those fail, EACCES is returned, as with the other shm_* syscalls. truss support is included; audit support will come later. This commit includes only the implementation; the sysent-generated bits will come in a follow-on commit. Submitted by: Matthew Bryan <matthew.bryan@isilon.com> Reviewed by: jilles (earlier revision) Reviewed by: brueffer (manpages, earlier revision) Relnotes: yes Sponsored by: Dell EMC Isilon Differential Revision: https://reviews.freebsd.org/D21423 Notes: svn path=/head/; revision=352747
* Add SPDX tags to recently added filesKyle Evans2019-09-251-0/+2
| | | | | | | Reported by: Pawel Biernacki Notes: svn path=/head/; revision=352727
* Add linux-compatible memfd_createKyle Evans2019-09-252-0/+277
| | | | | | | | | | | | | | | | | memfd_create is effectively a SHM_ANON shm_open(2) mapping with optional CLOEXEC and file sealing support. This is used by some mesa parts, some linux libs, and qemu can also take advantage of it and uses the sealing to prevent resizing the region. This reimplements shm_open in terms of shm_open2(2) at the same time. shm_open(2) will be moved to COMPAT12 shortly. Reviewed by: markj, kib Differential Revision: https://reviews.freebsd.org/D21393 Notes: svn path=/head/; revision=352703
* Fix coredump_phnum_test in case of kern.compress_user_cores=1Olivier Cochard2019-09-241-0/+2
| | | | | | | | | | | PR: 240783 Approved by: ngie, lwhsu MFC after: 1 month Sponsored by: Netflix Differential Revision: https://reviews.freebsd.org/D21776 Notes: svn path=/head/; revision=352653
* Add some tests for page fault signals and codesJilles Tjoelker2019-09-182-1/+186
| | | | | | | | | | | | | | | | | | It is useful to have some tests for page fault signals. More tests would be useful but creating the conditions (such as various kinds of running out of memory and I/O errors) is more complicated. The tests page_fault_signal__bus_objerr_1 and page_fault_signal__bus_objerr_2 depend on https://reviews.freebsd.org/D21566 before they can pass. PR: 211924 Reviewed by: kib Differential Revision: https://reviews.freebsd.org/D21624 Notes: svn path=/head/; revision=352495
* Temporarily skip sys.netpfil.common.tos.pf_tos on i386 CI as it always failsLi-Wen Hsu2019-09-171-0/+4
| | | | | | | | PR: 240086 Sponsored by: The FreeBSD Foundation Notes: svn path=/head/; revision=352463
* Temporarily skip sys.netpfil.common.forward.pf_v4 on i386 CI as it always failsLi-Wen Hsu2019-09-171-0/+4
| | | | | | | | PR: 240085 Sponsored by: The FreeBSD Foundation Notes: svn path=/head/; revision=352462
* fusefs: initialize C++ classes the Coverity wayAlan Somers2019-09-162-3/+6
| | | | | | | | | | | | | Coverity complained that I wasn't initializing some class members until the SetUp method. Do it in the constructor instead. Reported by: Coverity Coverity CIDs: 1404352, 1404378 MFC after: 2 weeks Sponsored by: The FreeBSD Foundation Notes: svn path=/head/; revision=352414
* fusefs: fix some minor Coverity CIDs in the testsAlan Somers2019-09-163-4/+4
| | | | | | | | | | | | | | Where open(2) is expected to fail, the tests should assert or expect that its return value is -1. These tests all accepted too much but happened to pass anyway. Reported by: Coverity Coverity CID: 1404512, 1404378, 1404504, 1404483 MFC after: 2 weeks Sponsored by: The FreeBSD Foundation Notes: svn path=/head/; revision=352413
* Introduce arb(3), the Array-based Red-Black Tree macros: similarEdward Tomasz Napierala2019-09-142-1/+116
| | | | | | | | | | | | | | | | | | | | | | | | to the traditional tree(3) RB trees, but using an array (preallocated, linear chunk of memory) to store the tree. This avoids allocation overhead, improves memory locality, and makes it trivially easy to share/transfer/copy the entire tree without the need for marshalling. The downside is that the size is fixed at initialization time; there is no mechanism to resize it. This is one of the dependencies for the new stats(3) framework (https://reviews.freebsd.org/D20477). Reviewed by: bcr (man pages), markj Discussed with: cem MFC after: 2 weeks Sponsored by: Klara Inc, Netflix Obtained from: Netflix Differential Revision: https://reviews.freebsd.org/D20324 Notes: svn path=/head/; revision=352337
* fusefs: Fix iosize for FUSE_WRITE in 7.8 compat modeAlan Somers2019-09-112-51/+92
| | | | | | | | | | | | | | | | | When communicating with a FUSE server that implements version 7.8 (or older) of the FUSE protocol, the FUSE_WRITE request structure is 16 bytes shorter than normal. The protocol version check wasn't applied universally, leading to an extra 16 bytes being sent to such servers. The extra bytes were allocated and bzero()d, so there was no information disclosure. Reviewed by: emaste MFC after: 3 days MFC-With: r350665 Sponsored by: The FreeBSD Foundation Differential Revision: https://reviews.freebsd.org/D21557 Notes: svn path=/head/; revision=352230
* Temporarily skip flakey test case sys.kern.ptrace_test.ptrace__getppidLi-Wen Hsu2019-09-111-0/+4
| | | | | | | | PR: 240510 Sponsored by: The FreeBSD Foundation Notes: svn path=/head/; revision=352219
* fusefs: suppress some Coverity resource leak CIDs in the testsAlan Somers2019-09-071-0/+1
| | | | | | | | | | | | | The fusefs tests deliberately leak file descriptors. To do otherwise would add extra complications to the tests' mock FUSE server. This annotation should hopefully convince Coverity to shut up about the leaks. Reviewed by: uqs MFC after: 4 days Sponsored by: The FreeBSD Foundation Notes: svn path=/head/; revision=352021
* fusefs: coverity cleanup in the testsAlan Somers2019-09-0618-33/+78
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Address the following defects reported by Coverity: * Structurally dead code (CID 1404366): set m_quit before FAIL, not after * Unchecked return value of sysctlbyname (CID 1404321) * Unchecked return value of stat(2) (CID 1404471) * Unchecked return value of open(2) (CID 1404402, 1404529) * Unchecked return value of dup(2) (CID 1404478) * Buffer overflows. These are all false positives caused by the fact that Coverity thinks I'm using a buffer to store strings, when in fact I'm really just using it to store a byte array that happens to be initialized with a string. I'm changing the type from char to uint8_t in the hopes that it will placate Coverity. (CID 1404338, 1404350, 1404367, 1404376, 1404379, 1404381, 1404388, 1404403, 1404425, 1404433, 1404434, 1404474, 1404480, 1404484, 1404503, 1404505) * False positive file descriptor leak. I'm going to try to fix this with Coverity modeling, but I'll also change an EXPECT to ASSERT so we don't perform meaningless assertions after the failure. (CID 1404320, 1404324, 1404440, 1404445). * Unannotated file descriptor leak. This will be followed up by a Coverity modeling change. (CID 1404326, 1404334, 1404336, 1404357, 1404361, 1404372, 1404391, 1404395, 1404409, 1404430, 1404448, 1404451, 1404455, 1404457, 1404458, 1404460) * Uninitialized variables in C++ constructors (CID 1404327, 1404346). In the case of m_maxphys, this actually led to part of the FUSE_INIT's response being set to stack garbage during the WriteCluster::clustering test. * Uninitialized sun_len field in struct sockaddr_un (CID 1404330, 1404371, 1404429). Reported by: Coverity Reviewed by: emaste MFC after: 3 days Sponsored by: The FreeBSD Foundation Differential Revision: https://reviews.freebsd.org/D21457 Notes: svn path=/head/; revision=351963
* Set required program for all acl testsKristof Provost2019-09-051-3/+3
| | | | | | | | | | | | | | r339782 re-enabled acl test 00 and 02, which were disabled in r336617 due to PR 229930. When the tests were disabled the code to set their required programs was disabled as well, but this was not reinstated when r339782 re-enabled them. Do so now. Sponsored by: Axiado Notes: svn path=/head/; revision=351884
* pkgbase: Put the sys/common test into the tests packageEmmanuel Vadot2019-09-051-1/+1
| | | | | | | | | | Every other test is there so do the same for those. Reviewed by: bapt, gjb Differential Revision: https://reviews.freebsd.org/D21504 Notes: svn path=/head/; revision=351856
* Temporarily skip sys.sys.qmath_test.qdivq_s64q in CI because it is unstableLi-Wen Hsu2019-09-031-0/+4
| | | | | | | | | PR: 240219 Discussed with: trasz Sponsored by: The FreeBSD Foundation Notes: svn path=/head/; revision=351739
* Fix qmath(3) build problems with GCC 8.Edward Tomasz Napierala2019-08-291-11/+5
| | | | | | | | | Discussed with: asomers Sponsored by: Klara Systems Differential Revision: https://reviews.freebsd.org/D21442 Notes: svn path=/head/; revision=351596
* fusefs: Fix some bugs regarding the size of the LISTXATTR listAlan Somers2019-08-282-40/+259
| | | | | | | | | | | | | | | | | | | | | | | | | | | | * A small error in r338152 let to the returned size always being exactly eight bytes too large. * The FUSE_LISTXATTR operation works like Linux's listxattr(2): if the caller does not provide enough space, then the server should return ERANGE rather than return a truncated list. That's true even though in FUSE's case the kernel doesn't provide space to the client at all; it simply requests a maximum size for the list. We previously weren't handling the case where the server returns ERANGE even though the kernel requested as much size as the server had told us it needs; that can happen due to a race. * We also need to ensure that a pathological server that always returns ERANGE no matter what size we request in FUSE_LISTXATTR won't cause an infinite loop in the kernel. As of this commit, it will instead cause an infinite loop that exits and enters the kernel on each iteration, allowing signals to be processed. Reviewed by: cem MFC after: 2 weeks Sponsored by: The FreeBSD Foundation Differential Revision: https://reviews.freebsd.org/D21287 Notes: svn path=/head/; revision=351560
* Fix build on 32 bit archs.Edward Tomasz Napierala2019-08-271-12/+12
| | | | Notes: svn path=/head/; revision=351545
* Introduce <sys/qmath.h>, a fixed-point math library from Netflix.
Edward Tomasz Napierala2019-08-272-1/+654
| | | | | | | | | | | | | | | | | | | | | | | | | | This makes it possible to perform mathematical operations
on fractional values without using floating point. It operates on Q numbers, which are integer-sized, opaque structures initialized to hold a chosen number of integer and fractional
bits.
 For a general description of the Q number system, see the "Fixed Point Representation & Fractional Math" whitepaper[1]; for the actual API see the qmath(3) man page. This is one of dependencies for the upcoming stats(3) framework[2] that will be applied to the TCP stack in a later commit. 1. https://www.superkits.net/whitepapers/Fixed%20Point%20Representation%20&%20Fractional%20Math.pdf 2. https://reviews.freebsd.org/D20477 Reviewed by: bcr (man pages, earlier version), sef (earlier version) Discussed with: cem, dteske, imp, lstewart Sponsored By: Klara Inc, Netflix Obtained from: Netflix Differential Revision: https://reviews.freebsd.org/D20116 Notes: svn path=/head/; revision=351544
* tests: shm_open(2): Verify FD_CLOEXECKyle Evans2019-08-251-0/+22
| | | | | | | | | | Motivated by the fact that I'm messing around near the implementation and wanting to ensure this doesn't get messed up in the process. MFC after: 1 week Notes: svn path=/head/; revision=351469
* Fix failure test cases after r351423 due to ping6(8) options changedLi-Wen Hsu2019-08-242-13/+13
| | | | | | | | | | | | Failure test cases: sys.netpfil.common.pass_block.pf_v6 sys.netpfil.pf.pass_block.noalias sys.netpfil.pf.pass_block.v6 Sponsored by: The FreeBSD Foundation Notes: svn path=/head/; revision=351450
* netpfil tests: Add forward test for the three firewallsKristof Provost2019-08-232-1/+103
| | | | | | | | | | Submitted by: Ahsan Barkati Reviewed by: kp Sponsored by: Google, Inc. (GSoC 2019) Differential Revision: https://reviews.freebsd.org/D21321 Notes: svn path=/head/; revision=351421
* mips: hide regnum definitions behind _KERNEL/_WANT_MIPS_REGNUMKyle Evans2019-08-221-0/+1
| | | | | | | | | | | | | | | | | | | machine/regnum.h ends up being included by sys/procfs.h and sys/ptrace.h via machine/reg.h. Many of the regnum definitions are too short and too generic to be exposing to any userland application including one of these two headers. Moreover, these actively cause build failures in googletest (template <typename T1 ...> expanding to template <typename 9 ...>). Hide the definitions behind _KERNEL or _WANT_MIPS_REGNUM, and patch all of the userland consumers to define as needed. Discussed with: imp, jhb Reviewed by: imp, jhb MFC after: 1 week Differential Revision: https://reviews.freebsd.org/D21330 Notes: svn path=/head/; revision=351409
* Fix the build with WITHOUT_GOOGLETESTKyle Evans2019-08-221-1/+3
| | | | | | | | | | | | | Attempting to build the fusefs tests WITHOUT_GOOGLETEST will result in an error if the host system or sysroot doesn't already have googletest headers in /usr/include/private (e.g. host built/installed WITHOUT_GOOGLETEST, clean cross-buildworld WITHOUT_GOOGLETEST). Reviewed by: asomers Differential Revision: https://reviews.freebsd.org/D21367 Notes: svn path=/head/; revision=351399
* Fix path issues after r351212Li-Wen Hsu2019-08-222-2/+5
| | | | | | | | | | This fixes sys.netpfil.pf.forward.v4 and sys.netpfil.pf.icmp.cve_2019_5598 failures in CI system. Sponsored by: The FreeBSD Foundation Notes: svn path=/head/; revision=351391
* netpfil tests: Add too many fragments test for pf, ipfw and ipfKristof Provost2019-08-202-1/+82
| | | | | | | | | | | | | Add test for checking that the packets are dropped if it is fragmented into more than the defined value. Submitted by: Ahsan Barkati Reviewed by: kp Sponsored by: Google, Inc. (GSoC 2019) Differential Revision: https://reviews.freebsd.org/D21307 Notes: svn path=/head/; revision=351249
* netpfil tests: Add the set ToS test for ipfw and pfKristof Provost2019-08-202-1/+120
| | | | | | | | | | | | | | | | | This test tests the following: - The firewall is able to set the tos bits - The firewall is able to set the DSCP bits when EN bits is already set and the EN bits remains unchanged. - The firewall is able to drop the packets based on ToS value Submitted by: Ahsan Barkati Reviewed by: kp Sponsored by: Google, Inc. (GSoC 2019) Differential Revision: https://reviews.freebsd.org/D21305 Notes: svn path=/head/; revision=351248
* netpfil tests: Move pft_ping.py and sniffer.py to the common test directoryKristof Provost2019-08-196-18/+23
| | | | | | | | | | | | | | The pft_ping.py and sniffer.py tool is moved from tests/sys/netpfil/pf to tests/sys/netpfil/common directory because these tools are to be used in common for all the firewalls. Submitted by: Ahsan Barkati Reviewed by: kp, thj Sponsored by: Google, Inc. (GSoC 2019) Differential Revision: https://reviews.freebsd.org/D21276 Notes: svn path=/head/; revision=351212
* sys.kern.pdeathsig.signal_delivered_ptrace: fix startup.Konstantin Belousov2019-08-191-0/+9
| | | | | | | | | | | | | | | Inform D that C executed procctl(PROC_PDEATHSIG_CTL). Otherwise D might allow B to exit before C is set up to receive a signal on the parent exit. In this case, C waits forever for the signal and test hangs. PR: 237657 Reported and tested by: lwhsu Sponsored by: The FreeBSD Foundation MFC after: 1 week Notes: svn path=/head/; revision=351211
* sys.kern.pdeathsig.signal_delivered_ptrace: fix debugger detachKonstantin Belousov2019-08-191-1/+3
| | | | | | | | | | | | | | | | | ptrace(PT_DETACH) requires stopped debuggee, otherwise it fails. When the call fails, the C process is left as debuggee of the process D, and might be killed too early if process D exits occurs fast enough. Since pipes are not closed in the forked children, this resulted in the test hanging, since no write occured from C to wake A. PR: 237657 Reported and tested by: lwhsu Sponsored by: The FreeBSD Foundation MFC after: 1 week Notes: svn path=/head/; revision=351210
* Add basic NAT test for pf, ipf and ipfwTom Jones2019-08-173-7/+176
| | | | | | | | | | | | | | | Add common firewall NAT tests for pf, ipf and ipfw (using both in-kernel and userspace NAT). Submitted by: Ahsan Barkati Sponsored by: Google, Inc. (GSoC 2019) Reviewed by: kp Approved by: bz (mentor) MFC after: 2 weeks Differential Revision: https://reviews.freebsd.org/D21199 Notes: svn path=/head/; revision=351165
* fusefs: don't send the namespace during listextattrAlan Somers2019-08-161-6/+3
| | | | | | | | | | | | | | | | | | The FUSE_LISTXATTR operation always returns the full list of a file's extended attributes, in all namespaces. There's no way to filter the list server-side. However, currently FreeBSD's fusefs driver sends a namespace string with the FUSE_LISTXATTR request. That behavior was probably copied from fuse_vnop_getextattr, which has an attribute name argument. It's been there ever since extended attribute support was added in r324620. This commit removes it. Reviewed by: cem MFC after: 2 weeks Sponsored by: The FreeBSD Foundation Differential Revision: https://reviews.freebsd.org/D21280 Notes: svn path=/head/; revision=351113
* pf tests: Fix accidental duplication of contentMateusz Piotrowski2019-08-151-65/+0
| | | | | | | | | | | | | Some files got their contented duplicated in r345409. Some mistakes where fixed in r345430. The only file that was left with a duplicated content was CVE-2019-5598.py. Reviewed by: kp Approved by: src (kp) Differential Revision: https://reviews.freebsd.org/D21267 Notes: svn path=/head/; revision=351068
* fusefs: fix conditional from r351061Alan Somers2019-08-151-2/+1
| | | | | | | | | | | | | | | The entirety of r351061 was a copy/paste error. I'm sorry I've been comitting so hastily. Reported by: rpokala Reviewed by: rpokala MFC after: 2 weeks MFC-With: 351061 Sponsored by: The FreeBSD Foundation Differential Revision: https://reviews.freebsd.org/D21265 Notes: svn path=/head/; revision=351066
* fusefs: fix the 32-bit build after 351042Alan Somers2019-08-151-1/+2
| | | | | | | | | | Reported by: jhb MFC after: 2 weeks MFC-With: 351042 Sponsored by: The FreeBSD Foundation Notes: svn path=/head/; revision=351061
* fusefs: Fix the size of fuse_getattr_inAlan Somers2019-08-143-0/+160
| | | | | | | | | | | | | | | | | | In FUSE protocol 7.9, the size of the FUSE_GETATTR request has increased. However, the fusefs driver is currently not sending the additional fields. In our implementation, the additional fields are always zero, so I there haven't been any test failures until now. But fusefs-lkl requires the request's length to be correct. Fix this bug, and also enhance the test suite to catch similar bugs. PR: 239830 MFC after: 2 weeks MFC-With: 350665 Sponsored by: The FreeBSD Foundation Notes: svn path=/head/; revision=351042
* fusefs: fix intermittency in the default_permissions.Unlink.ok testAlan Somers2019-08-141-0/+8
| | | | | | | | | | | | | The test needs to expect a FUSE_FORGET operation. Most of the time the test would pass anyway, because by chance FUSE_FORGET would arrive after the unmount. MFC after: 2 weeks MFC-With: 350665 Sponsored by: The FreeBSD Foundation Notes: svn path=/head/; revision=351039
* fusefs: skip some tests when unsafe aio is disabledAlan Somers2019-08-136-21/+38
|\ | | | | | | | | | | | | | | | | MFC after: 15 days MFC-With: r350665 Sponsored by: The FreeBSD Foundation Notes: svn path=/head/; revision=350992
| * fusefs: skip some tests when unsafe aio is disabledAlan Somers2019-08-126-21/+38
| | | | | | | | | | | | | | | | | | MFC after: 16 days MFC-With: r350665 Sponsored by: The FreeBSD Foundation Notes: svn path=/projects/fuse2/; revision=350955
* | fusefs: add SVN Keywords to the test filesAlan Somers2019-08-1343-0/+86
| | | | | | | | | | | | | | | | | | | | Reported by: SVN pre-commit hooks MFC after: 15 days MFC-With: r350665 Sponsored by: The FreeBSD Foundation Notes: svn path=/head/; revision=350990
* | tests/sys/opencrypto: enable armv8crypto on aarch64Enji Cooper2019-08-102-3/+16
| | | | | | | | | | | | | | | | | | | | | | | | | | | | This change makes required modifications in runtests to also only require the aesni module on Intel (i386/amd64) platforms, as it is an Intel specific module. MFC after: 1 month MFC to: ^/stable/12 (support not present on ^/stable/11) Submitted by: Greg V <greg@unrelenting.technology> Differential Revision: https://reviews.freebsd.org/D21018 Notes: svn path=/head/; revision=350837
* | Don't add -Wno-class-memaccess with older gcc.Brooks Davis2019-08-091-1/+6
| | | | | | | | | | | | | | | | | | | | | | | | | | This is a gcc 8.0+ warning which needed to be silenced on for the riscv build. amd64-xtoolchain-gcc still uses gcc 6.4.0 and does not understand this flag. Reviewed by: asomers Feedback from: imp Differential Revision: https://reviews.freebsd.org/D21195 Notes: svn path=/head/; revision=350827
* | Get configuration variable with default value for not breaking default settingLi-Wen Hsu2019-08-071-5/+5
| | | | | | | | | | | | | | | | Reported by: markj Sponsored by: The FreeBSD Foundation Notes: svn path=/head/; revision=350700
* | fusefs: merge from projects/fuse2Alan Somers2019-08-0745-0/+16128
|\| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | This commit imports the new fusefs driver. It raises the protocol level from 7.8 to 7.23, fixes many bugs, adds a test suite for the driver, and adds many new features. New features include: * Optional kernel-side permissions checks (-o default_permissions) * Implement VOP_MKNOD, VOP_BMAP, and VOP_ADVLOCK * Allow interrupting FUSE operations * Support named pipes and unix-domain sockets in fusefs file systems * Forward UTIME_NOW during utimensat(2) to the daemon * kqueue support for /dev/fuse * Allow updating mounts with "mount -u" * Allow exporting fusefs file systems over NFS * Server-initiated invalidation of the name cache or data cache * Respect RLIMIT_FSIZE * Try to support servers as old as protocol 7.4 Performance enhancements include: * Implement FUSE's FOPEN_KEEP_CACHE and FUSE_ASYNC_READ flags * Cache file attributes * Cache lookup entries, both positive and negative * Server-selectable cache modes: writethrough, writeback, or uncached * Write clustering * Readahead * Use counter(9) for statistical reporting PR: 199934 216391 233783 234581 235773 235774 235775 PR: 236226 236231 236236 236291 236329 236381 236405 PR: 236327 236466 236472 236473 236474 236530 236557 PR: 236560 236844 237052 237181 237588 238565 Reviewed by: bcr (man pages) Reviewed by: cem, ngie, rpokala, glebius, kib, bde, emaste (post-commit review on project branch) MFC after: 3 weeks Relnotes: yes Sponsored by: The FreeBSD Foundation Pull Request: https://reviews.freebsd.org/D21110 Notes: svn path=/head/; revision=350665
| * fusefs: fix building tests with GCC 8Alan Somers2019-07-301-1/+1
| | | | | | | | | | | | | | | | | | GCC 8 objected to including C++-only flags in CWARNFLAGS Sponsored by: The FreeBSD Foundation Notes: svn path=/projects/fuse2/; revision=350455
| * fusefs: nul-terminate some strings in the readdir testAlan Somers2019-07-301-8/+8
| | | | | | | | | | | | | | | | Reported by: GCC 8 Sponsored by: The FreeBSD Foundation Notes: svn path=/projects/fuse2/; revision=350452
| * fusefs: fix panic when writing with O_DIRECT and using writeback cacheAlan Somers2019-07-281-0/+126
| | | | | | | | | | | | | | | | | | | | | | | | When a fusefs file system is mounted using the writeback cache, the cache may still be bypassed by opening a file with O_DIRECT. When writing with O_DIRECT, the cache must be invalidated for the affected portion of the file. Fix some panics caused by inadvertently invalidating too much. Sponsored by: The FreeBSD Foundation Notes: svn path=/projects/fuse2/; revision=350388