<feed xmlns='http://www.w3.org/2005/Atom'>
<title>gocryptfs/internal/fusefrontend, branch nfc_v2</title>
<subtitle>Mirror of gocryptfs source code on Github</subtitle>
<id>http://nuetzlich.net/cgit/gocryptfs/atom?h=nfc_v2</id>
<link rel='self' href='http://nuetzlich.net/cgit/gocryptfs/atom?h=nfc_v2'/>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/'/>
<updated>2025-11-22T20:24:20+00:00</updated>
<entry>
<title>Xattrs support in reverse mode</title>
<updated>2025-11-22T20:24:20+00:00</updated>
<author>
<name>Aleksey Vasenev</name>
</author>
<published>2024-11-17T20:14:36+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=ed1c5e4a9f5ce1921f3ec03b32e591ce828ec5b9'/>
<id>urn:sha1:ed1c5e4a9f5ce1921f3ec03b32e591ce828ec5b9</id>
<content type='text'>
Fixes https://github.com/rfjakob/gocryptfs/issues/827
</content>
</entry>
<entry>
<title>fusefrontend: Mkdir: Stat after fixing permissions</title>
<updated>2025-10-02T19:42:39+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2025-10-02T19:36:23+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=8b33c0d6763f25be4ee5f100bbb1c67f7d485ee4'/>
<id>urn:sha1:8b33c0d6763f25be4ee5f100bbb1c67f7d485ee4</id>
<content type='text'>
Fixes https://github.com/rfjakob/gocryptfs/issues/964
</content>
</entry>
<entry>
<title>fusefronted: report correct directory size in fstat</title>
<updated>2025-08-03T19:25:24+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2025-08-03T19:22:10+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=ddcc7405e68e6be2cce02dddde3fa6e019c62951'/>
<id>urn:sha1:ddcc7405e68e6be2cce02dddde3fa6e019c62951</id>
<content type='text'>
Fixes https://github.com/rfjakob/gocryptfs/issues/951
</content>
</entry>
<entry>
<title>remove redundant contentEnc reference from file</title>
<updated>2025-07-10T18:06:34+00:00</updated>
<author>
<name>Lars Quentin</name>
</author>
<published>2025-07-10T14:33:26+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=844f339befe67a3f8573f98c23559fd7c1a6e507'/>
<id>urn:sha1:844f339befe67a3f8573f98c23559fd7c1a6e507</id>
<content type='text'>
</content>
</entry>
<entry>
<title>Fix all staticcheck errors in gocryptfs codebase</title>
<updated>2025-07-08T17:54:14+00:00</updated>
<author>
<name>copilot-swe-agent[bot]</name>
</author>
<published>2025-07-07T18:18:12+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=386232f39ede046d6453a0990ad40f2d86a26f53'/>
<id>urn:sha1:386232f39ede046d6453a0990ad40f2d86a26f53</id>
<content type='text'>
Co-authored-by: rfjakob &lt;286847+rfjakob@users.noreply.github.com&gt;

Add staticcheck to test.bash for continuous static analysis

Co-authored-by: rfjakob &lt;286847+rfjakob@users.noreply.github.com&gt;

Fix nil pointer dereference in timesToTimespec function

The previous fix for deprecated fuse.UtimeToTimespec caused a panic
because unix.TimeToTimespec doesn't handle nil pointers. This fix
properly handles nil pointers by using unix.UTIME_OMIT while still
using the non-deprecated unix.TimeToTimespec function.

Co-authored-by: rfjakob &lt;286847+rfjakob@users.noreply.github.com&gt;

Undo SA6002 changes and add staticcheck ignore directive instead

Co-authored-by: rfjakob &lt;286847+rfjakob@users.noreply.github.com&gt;
</content>
</entry>
<entry>
<title>Fix a bunch of staticcheck errors</title>
<updated>2025-07-07T17:59:35+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2025-07-07T17:54:48+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=8f5df19b353e02ffba842fd1b15ccf93da7ee3b4'/>
<id>urn:sha1:8f5df19b353e02ffba842fd1b15ccf93da7ee3b4</id>
<content type='text'>
Tool-assisted.
</content>
</entry>
<entry>
<title>fusefronted: fake fstat for deleted fifos</title>
<updated>2025-06-15T18:11:06+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2025-06-15T17:52:21+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=4ef2678917ddc26ab8e5f64a3158720da6e0a5d1'/>
<id>urn:sha1:4ef2678917ddc26ab8e5f64a3158720da6e0a5d1</id>
<content type='text'>
git test suite t9300-fast-import.sh test 245 does the equivalent of this:

	mkfifo fifo
	exec 8&lt;&gt;fifo
	rm fifo
	cat /dev/null &gt;&amp;8

This used to fail with

	cat: standard output: No such file or directory

because cat tries to fstat stdout.

The open() on the fifo does not reach the filesystem, so we don't
have an fd open for the delted file, hence no way to access it.

Fake fstat success as good as we can to make cat happy.

Fixes https://github.com/rfjakob/gocryptfs/issues/929
</content>
</entry>
<entry>
<title>fusefronted: comment syscall.S_IFMT masking</title>
<updated>2025-06-15T11:12:00+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2025-06-15T11:12:00+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=17524d373c388b2d2510662aa8aefb633bae674e'/>
<id>urn:sha1:17524d373c388b2d2510662aa8aefb633bae674e</id>
<content type='text'>
</content>
</entry>
<entry>
<title>idleMonitor: switch to the new atomic.Bool api</title>
<updated>2025-05-29T19:38:25+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2025-05-29T19:30:53+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=2609c72beee098c6afe4bbc3344a1fcee06df94b'/>
<id>urn:sha1:2609c72beee098c6afe4bbc3344a1fcee06df94b</id>
<content type='text'>
</content>
</entry>
<entry>
<title>Switch to the new atomic Uint64.Add api</title>
<updated>2025-05-06T07:11:49+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2025-05-06T07:11:49+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=9b6e47fc0a2ed65d462424152a13f995a8d7dd9a'/>
<id>urn:sha1:9b6e47fc0a2ed65d462424152a13f995a8d7dd9a</id>
<content type='text'>
The new api guarantees that the value is aligned, preventing
stuff like this on 32 bit platforms:

	goroutine 26 [running]:
	internal/runtime/atomic.panicUnaligned()
		/usr/lib/go-1.24/src/internal/runtime/atomic/unaligned.go:8 +0x24
	internal/runtime/atomic.Xadd64(0x2496c74, 0x1)
		/usr/lib/go-1.24/src/internal/runtime/atomic/atomic_arm.s:318 +0x14
	github.com/rfjakob/gocryptfs/internal/inomap.(*InoMap).NextSpillIno(0x2496c60)

Fixes https://github.com/rfjakob/gocryptfs/issues/912
</content>
</entry>
</feed>
