<feed xmlns='http://www.w3.org/2005/Atom'>
<title>gocryptfs/internal/fusefrontend, branch flaggy</title>
<subtitle>Mirror of gocryptfs source code on Github</subtitle>
<id>http://nuetzlich.net/cgit/gocryptfs/atom?h=flaggy</id>
<link rel='self' href='http://nuetzlich.net/cgit/gocryptfs/atom?h=flaggy'/>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/'/>
<updated>2021-08-02T18:01:26+00:00</updated>
<entry>
<title>fusefrontend: add quirks for MacOS ExFAT</title>
<updated>2021-08-02T18:01:26+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2021-08-02T18:01:26+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=c3c9513e6504276698ed1f50a259d4333476acf8'/>
<id>urn:sha1:c3c9513e6504276698ed1f50a259d4333476acf8</id>
<content type='text'>
This also moves the quirks logic into fusefrontend.

Fixes https://github.com/rfjakob/gocryptfs/issues/585
</content>
</entry>
<entry>
<title>fusefrontend: -sharedstorage: present stable inode numbers</title>
<updated>2021-07-31T11:24:25+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2021-07-31T11:24:25+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=1bc1db620b061aabf59469a5eb4fb60e3e1701a3'/>
<id>urn:sha1:1bc1db620b061aabf59469a5eb4fb60e3e1701a3</id>
<content type='text'>
Use the Gen field (inode generation) to distinguish hard links
while passing the real inode numbers to userspace.

Fixes https://github.com/rfjakob/gocryptfs/issues/584
</content>
</entry>
<entry>
<title>fusefrontend: prepareAtSyscall: handle error when opening ourselves</title>
<updated>2021-07-31T08:53:32+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2021-07-31T08:53:32+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=1dfd6b7b765c82c4c9cf6d41ec6d6ed5f6cb2a79'/>
<id>urn:sha1:1dfd6b7b765c82c4c9cf6d41ec6d6ed5f6cb2a79</id>
<content type='text'>
Error handling was missing here, so we would later get confusing
EBADF errors due to dirfd being -1.
</content>
</entry>
<entry>
<title>fusefrontend: implement fsync on directories</title>
<updated>2021-07-29T18:39:50+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2021-07-29T18:39:50+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=0ca302f12aa8be391d6b8e7081b5c75fbec2e872'/>
<id>urn:sha1:0ca302f12aa8be391d6b8e7081b5c75fbec2e872</id>
<content type='text'>
Fixes https://github.com/rfjakob/gocryptfs/issues/587
</content>
</entry>
<entry>
<title>fusefrontend: delete openBackingDir</title>
<updated>2021-06-26T16:49:54+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2021-06-26T16:45:21+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=4fd95b718b9f7b022c1960711fc7dfe7b5350c15'/>
<id>urn:sha1:4fd95b718b9f7b022c1960711fc7dfe7b5350c15</id>
<content type='text'>
</content>
</entry>
<entry>
<title>fusefrontend: convert last callers from openBackingDir to prepareAtSyscall</title>
<updated>2021-06-26T16:49:54+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2021-06-26T16:44:52+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=5306fc345be41371820ea50a3f64efab08f2e74c'/>
<id>urn:sha1:5306fc345be41371820ea50a3f64efab08f2e74c</id>
<content type='text'>
</content>
</entry>
<entry>
<title>fusefrontend: ctlsock: get rid of unneccessary wrapper function</title>
<updated>2021-06-26T16:49:54+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2021-06-26T16:42:36+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=45648e567ae5e6d40bb42ae954406c8762fc577f'/>
<id>urn:sha1:45648e567ae5e6d40bb42ae954406c8762fc577f</id>
<content type='text'>
</content>
</entry>
<entry>
<title>fusefrontend: convert ctlsock from openBackingDir to prepareAtSyscall</title>
<updated>2021-06-26T16:49:54+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2021-06-26T16:39:23+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=f9f4bd214f772b88233d55c2cf270726bfa603c6'/>
<id>urn:sha1:f9f4bd214f772b88233d55c2cf270726bfa603c6</id>
<content type='text'>
openBackingDir will be removed.

Also, remove leftover debug printfs.
</content>
</entry>
<entry>
<title>fusefrontend: convert openBackingDir tests to prepareAtSyscall</title>
<updated>2021-06-26T14:28:30+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2021-06-26T14:22:37+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=ee59b5269be45154107dc6840c7bf810aed18ae2'/>
<id>urn:sha1:ee59b5269be45154107dc6840c7bf810aed18ae2</id>
<content type='text'>
openBackingDir will be removed.
</content>
</entry>
<entry>
<title>fusefrontend: implement recursive diriv caching</title>
<updated>2021-06-25T11:56:53+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2021-06-25T09:33:18+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=84e702126ac4f017e12150532bfaed675dee2927'/>
<id>urn:sha1:84e702126ac4f017e12150532bfaed675dee2927</id>
<content type='text'>
The new contrib/maxlen.bash showed that we have exponential
runtime with respect to directory depth.

The new recursive diriv caching is a lot smarter as it caches
intermediate lookups. maxlen.bash now completes in a few seconds.

xfstests results same as
https://github.com/rfjakob/fuse-xfstests/blob/2d158e4c82be85c15269af77498e353f928f4fab/screenlog.0 :

  Failures: generic/035 generic/062 generic/080 generic/093 generic/099 generic/215 generic/285 generic/319 generic/426 generic/444 generic/467 generic/477 generic/523
  Failed 13 of 580 tests

benchmark.bash results are identical:

  $ ./benchmark.bash
  Testing gocryptfs at /tmp/benchmark.bash.BdQ: gocryptfs v2.0.1-17-g6b09bc0; go-fuse v2.1.1-0.20210611132105-24a1dfe6b4f8; 2021-06-25 go1.16.5 linux/amd64
  /tmp/benchmark.bash.BdQ.mnt is a mountpoint
  WRITE: 262144000 bytes (262 MB, 250 MiB) copied, 0,4821 s, 544 MB/s
  READ:  262144000 bytes (262 MB, 250 MiB) copied, 0,266061 s, 985 MB/s
  UNTAR: 8,280
  MD5:   4,564
  LS:    1,745
  RM:    2,244
</content>
</entry>
</feed>
