Miklos Szeredi | 8cffdb9 | 2001-11-09 14:49:18 +0000 | [diff] [blame] | 1 | General Information |
| 2 | =================== |
| 3 | |
| 4 | FUSE (Filesystem in USErspace) is a simple interface for userspace |
| 5 | programs to export a virtual filesystem to the linux kernel. FUSE |
| 6 | also aims to provide a secure method for non privileged users to |
| 7 | create and mount their own filesystem implementations. |
| 8 | |
| 9 | You can download the source code releases from |
| 10 | |
| 11 | http://sourceforge.net/projects/avf |
| 12 | |
| 13 | or alternatively you can use CVS to get the very latest development |
Miklos Szeredi | 0a7077f | 2001-11-11 18:20:17 +0000 | [diff] [blame^] | 14 | version by setting the cvsroot to |
Miklos Szeredi | 8cffdb9 | 2001-11-09 14:49:18 +0000 | [diff] [blame] | 15 | |
| 16 | :pserver:anonymous@cvs.avf.sourceforge.net:/cvsroot/avf |
| 17 | |
Miklos Szeredi | 0a7077f | 2001-11-11 18:20:17 +0000 | [diff] [blame^] | 18 | and checking out the 'fuse' module. |
Miklos Szeredi | 8cffdb9 | 2001-11-09 14:49:18 +0000 | [diff] [blame] | 19 | |
| 20 | Installation |
| 21 | ============ |
| 22 | |
| 23 | See the file 'INSTALL' |
| 24 | |
| 25 | IMPORTANT NOTE: If you run a system with untrusted users, installing |
| 26 | this program is not recommended, as it could be used to breach |
| 27 | security (see the 'Security' section for explanation). |
| 28 | |
| 29 | How To Use |
| 30 | ========== |
| 31 | |
| 32 | FUSE is made up of three main parts: |
| 33 | |
| 34 | - A kernel filesystem module (kernel/fuse.o) |
| 35 | |
| 36 | - A userspace library (lib/libfuse.a) |
| 37 | |
| 38 | - A mount/unmount program (util/fusermount) |
| 39 | |
| 40 | |
| 41 | Here's how to create your very own virtual filesystem in five easy |
| 42 | steps: |
| 43 | |
| 44 | 1) Edit the file example/fusexmp.c to do whatever you want... |
| 45 | |
| 46 | 2) Build the fusexmp program |
| 47 | |
| 48 | 3) run 'util/fusermount /mnt/whatever example/fusexmp -d' |
| 49 | |
| 50 | 4) ls -al /mnt/whatever |
| 51 | |
Miklos Szeredi | 0a7077f | 2001-11-11 18:20:17 +0000 | [diff] [blame^] | 52 | 5) Be glad |
Miklos Szeredi | 8cffdb9 | 2001-11-09 14:49:18 +0000 | [diff] [blame] | 53 | |
Miklos Szeredi | 0a7077f | 2001-11-11 18:20:17 +0000 | [diff] [blame^] | 54 | If it doesn't work out, please ask! Also see the file 'include/fuse.h' for |
| 55 | detailed documentation of the library interface. |
Miklos Szeredi | 8cffdb9 | 2001-11-09 14:49:18 +0000 | [diff] [blame] | 56 | |
| 57 | |
| 58 | Security |
| 59 | ======== |
| 60 | |
| 61 | If you run 'make install', the fusermount program is installed |
| 62 | set-user-id to root. This is done to allow normal users to mount |
| 63 | their own filesystem implementations. |
| 64 | |
Miklos Szeredi | 0a7077f | 2001-11-11 18:20:17 +0000 | [diff] [blame^] | 65 | There must however be some limitations, in order to prevent Bad User from |
| 66 | doing nasty things. Currently those limitations are: |
Miklos Szeredi | 8cffdb9 | 2001-11-09 14:49:18 +0000 | [diff] [blame] | 67 | |
| 68 | - The user can only mount on a mountpoint, for which it has write |
| 69 | permission |
| 70 | |
| 71 | - The mountpoint is not a sticky directory which isn't owned by the |
| 72 | user (like /tmp usually is) |
| 73 | |
Miklos Szeredi | 0a7077f | 2001-11-11 18:20:17 +0000 | [diff] [blame^] | 74 | - No other user (including root) can access the contents of the mounted |
Miklos Szeredi | 8cffdb9 | 2001-11-09 14:49:18 +0000 | [diff] [blame] | 75 | filesystem. |
| 76 | |
Miklos Szeredi | 0a7077f | 2001-11-11 18:20:17 +0000 | [diff] [blame^] | 77 | When linux will have private namespaces (as soon as version 2.5 comes out |
| 78 | hopefully) then this third condition is useless and can be gotten rid of. |
Miklos Szeredi | 8cffdb9 | 2001-11-09 14:49:18 +0000 | [diff] [blame] | 79 | |
Miklos Szeredi | 0a7077f | 2001-11-11 18:20:17 +0000 | [diff] [blame^] | 80 | Currently the first two conditions are checked by the fusermount program |
| 81 | before doing the mount. This has the nice feature, that it's totally |
| 82 | useless. Here's why: |
Miklos Szeredi | 8cffdb9 | 2001-11-09 14:49:18 +0000 | [diff] [blame] | 83 | |
| 84 | - user creates /tmp/mydir |
| 85 | - user starts fusermount |
| 86 | - user removes /tmp/mydir just after fusermount checked that it is OK |
| 87 | - user creates symlink: ln -s / /tmp/mydir |
| 88 | - fusermount actually mounts user's filesystem on '/' |
| 89 | - this is bad :( |
| 90 | |
| 91 | So to make this secure, the checks must be done by the kernel. And so |
| 92 | there is a patch (patch/ms_permission.patch) which does exactly this. |
| 93 | This is against 2.4.14, but applies to some earlier kernels (not too |
Miklos Szeredi | 0a7077f | 2001-11-11 18:20:17 +0000 | [diff] [blame^] | 94 | much earlier though), and possibly some later. |
Miklos Szeredi | 8cffdb9 | 2001-11-09 14:49:18 +0000 | [diff] [blame] | 95 | |