<feed xmlns='http://www.w3.org/2005/Atom'>
<title>gocryptfs/internal/fusefrontend_reverse/rfile.go, branch xattr_user_buffer</title>
<subtitle>Mirror of gocryptfs source code on Github</subtitle>
<id>http://nuetzlich.net/cgit/gocryptfs/atom?h=xattr_user_buffer</id>
<link rel='self' href='http://nuetzlich.net/cgit/gocryptfs/atom?h=xattr_user_buffer'/>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/'/>
<updated>2020-08-01T19:14:10+00:00</updated>
<entry>
<title>v2api/reverse: move old fusefrontend_reverse out of the way</title>
<updated>2020-08-01T19:14:10+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2020-08-01T18:47:59+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=13dc7657ba0aac4da3f4b80ba231a919fdfae0f5'/>
<id>urn:sha1:13dc7657ba0aac4da3f4b80ba231a919fdfae0f5</id>
<content type='text'>
fusefrontend_reverse -&gt; fusefrontend_reverse_v1api
</content>
</entry>
<entry>
<title>Update go-fuse import path to github.com/hanwen/go-fuse/v2</title>
<updated>2020-05-17T12:23:47+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2020-05-17T12:18:23+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=ec74d1d2f4217a9a337d1db9902f32ae2aecaf33'/>
<id>urn:sha1:ec74d1d2f4217a9a337d1db9902f32ae2aecaf33</id>
<content type='text'>
We need
https://github.com/hanwen/go-fuse/commit/fd7328faf9fdf75709f7ba7df7072aaf4eeb18b3
to fix a crash reported in https://github.com/rfjakob/gocryptfs/issues/430 :

  2019/10/30 17:14:16 Unknown opcode 2016
  panic: runtime error: invalid memory address or nil pointer dereference
  [signal SIGSEGV: segmentation violation code=0x1 addr=0x20 pc=0x508d38]

This patch is only in the v2.x.x branch. Upgrade to v2, as the
old API is also supported there.

Running

  git grep hanwen/go-fuse | grep -v hanwen/go-fuse/v2

to check for forgotten references comes back clean.
</content>
</entry>
<entry>
<title>reverse mode: support wildcard exclude (--exclude-wildcard)</title>
<updated>2019-03-26T19:56:37+00:00</updated>
<author>
<name>Eduardo M KALINOWSKI</name>
</author>
<published>2019-02-16T20:55:54+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=3bc100aeb3f0763f78c8b3a70165b9f8aaa52db5'/>
<id>urn:sha1:3bc100aeb3f0763f78c8b3a70165b9f8aaa52db5</id>
<content type='text'>
This adds support for gitignore-like wildcards and exclude patters in
reverse mode. It (somewhat) fixes #273: no regexp support, but the
syntax should be powerful enough to satisfy most needs.

Also, since adding a lot of --exclude options can be tedious, it adds
the --exclude-from option to read patterns from a file (or files).
</content>
</entry>
<entry>
<title>syscallcompat: untangle OpenNofollow and rename to OpenDirNofollow</title>
<updated>2018-09-08T15:41:17+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2018-09-08T15:41:17+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=9ec9d0c49cfbdc9ceba10d7534b77e527c0a3cdc'/>
<id>urn:sha1:9ec9d0c49cfbdc9ceba10d7534b77e527c0a3cdc</id>
<content type='text'>
The function used to do two things:

1) Walk the directory tree in a manner safe from symlink attacks
2) Open the final component in the mode requested by the caller

This change drops (2), which was only used once, and lets the caller
handle it. This simplifies the function and makes it fit for reuse in
forward mode in openBackingPath(), and for using O_PATH on Linux.
</content>
</entry>
<entry>
<title>reverse mode: add --exclude option</title>
<updated>2018-08-11T21:26:49+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2018-08-11T21:26:49+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=ec2fdc19cf9358ae7ba09c528a5807b6b0760f9b'/>
<id>urn:sha1:ec2fdc19cf9358ae7ba09c528a5807b6b0760f9b</id>
<content type='text'>
https://github.com/rfjakob/gocryptfs/issues/235
</content>
</entry>
<entry>
<title>fusefrontend_reverse: Reject access to device nodes in newFile function</title>
<updated>2017-12-11T08:55:16+00:00</updated>
<author>
<name>Sebastian Lackner</name>
</author>
<published>2017-12-11T02:56:31+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=96dc2ca70906c831b60be1c6ed3a27dbf7628e72'/>
<id>urn:sha1:96dc2ca70906c831b60be1c6ed3a27dbf7628e72</id>
<content type='text'>
Steps to reproduce:

* Create a regular reverse mount point
* Create a file "test" in the original directory
* Access the corresponding encrypted directory in the mount point (ls &lt;encrypted dir&gt;)
* Quickly delete the file in the original data - instead create a device node
* Access the file again, it will access the device node and attempt to read from it

Fixes https://github.com/rfjakob/gocryptfs/issues/187
</content>
</entry>
<entry>
<title>fusefrontend_reverse: secure Open against symlink races</title>
<updated>2017-12-02T20:07:56+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2017-12-02T20:01:47+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=316b916358b8830b53fec9e16b325735aa850b14'/>
<id>urn:sha1:316b916358b8830b53fec9e16b325735aa850b14</id>
<content type='text'>
...using the new syscallcompat.OpenNofollow helper.

This change secures Open() against symlink race attacks
as described in https://github.com/rfjakob/gocryptfs/issues/165
</content>
</entry>
<entry>
<title>pathiv: move block IV algorithm into this package</title>
<updated>2017-05-30T15:04:46+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2017-05-28T18:43:48+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=9a217ce786581ee7ec18b27e46f0096763c85f9e'/>
<id>urn:sha1:9a217ce786581ee7ec18b27e46f0096763c85f9e</id>
<content type='text'>
This was implemented in fusefrontend_reverse, but we need it
in fusefrontend as well. Move the algorithm into pathiv.BlockIV().
</content>
</entry>
<entry>
<title>pathiv: move derivedIVContainer into the package</title>
<updated>2017-05-30T15:04:46+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2017-05-28T16:33:05+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=d202a456f56ec9923626ef6839254d40f2c8ee37'/>
<id>urn:sha1:d202a456f56ec9923626ef6839254d40f2c8ee37</id>
<content type='text'>
...under the new name "FileIVs".

This will also be used by forward mode.
</content>
</entry>
<entry>
<title>fusefrontend_reverse: move pathiv to its own package</title>
<updated>2017-05-30T15:04:46+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2017-05-28T16:09:02+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=857507e8b100626ae0471fae793efc52bf552821'/>
<id>urn:sha1:857507e8b100626ae0471fae793efc52bf552821</id>
<content type='text'>
We will also need it in forward mode.
</content>
</entry>
</feed>
