diff --git a/deny.toml b/deny.toml index 3d2d5efc..ed385d65 100644 --- a/deny.toml +++ b/deny.toml @@ -41,7 +41,9 @@ version = 2 yanked = "warn" # A list of advisory IDs to ignore. Note that ignored advisories will still # output a note when they are encountered. -ignore = [] +ignore = [ + { id = "RUSTSEC-2025-0141", reason = "No safe upgrade is available! The team considers version 1.3.3 a complete version of bincode that is not in need of any updates" }, +] # Threshold for security vulnerabilities, any vulnerability with a CVSS score # lower than the range specified will be ignored. Note that ignored advisories # will still output a note when they are encountered. diff --git a/src/overlayfs/sync_io.rs b/src/overlayfs/sync_io.rs index e81c8c9e..fc6ab1d0 100644 --- a/src/overlayfs/sync_io.rs +++ b/src/overlayfs/sync_io.rs @@ -80,7 +80,7 @@ impl FileSystem for OverlayFs { trace!("LOOKUP: parent: {}, name: {}\n", parent, tmp); let result = self.do_lookup(ctx, parent, tmp.as_str()); if result.is_ok() { - trace!("LOOKUP result: {:?}", result.as_ref().unwrap()); + trace!("LOOKUP result: {:?}", result.as_ref()); } //self.debug_print_all_inodes(); result diff --git a/src/passthrough/sync_io.rs b/src/passthrough/sync_io.rs index d795f308..e092e6d5 100644 --- a/src/passthrough/sync_io.rs +++ b/src/passthrough/sync_io.rs @@ -237,12 +237,12 @@ impl PassthroughFs { // kernel sends 0 as handle in case of no_open, and it depends on fuse server to handle // this case correctly. - let st = if !self.no_open.load(Ordering::Relaxed) && handle.is_some() { - // Safe as we just checked handle - let hd = self.handle_map.get(handle.unwrap(), inode)?; - stat_fd(hd.get_file(), None) - } else { - data.handle.stat() + let st = match (!self.no_open.load(Ordering::Relaxed), handle) { + (true, Some(h)) => { + let hd = self.handle_map.get(h, inode)?; + stat_fd(hd.get_file(), None) + } + _ => data.handle.stat(), }; let st = st.map_err(|e| {