summaryrefslogtreecommitdiff
path: root/Documentation
diff options
context:
space:
mode:
Diffstat (limited to 'Documentation')
-rw-r--r--Documentation/MANPAGE.md4
-rw-r--r--Documentation/XFSTESTS.md14
2 files changed, 9 insertions, 9 deletions
diff --git a/Documentation/MANPAGE.md b/Documentation/MANPAGE.md
index bc7a798..7371fc2 100644
--- a/Documentation/MANPAGE.md
+++ b/Documentation/MANPAGE.md
@@ -191,7 +191,7 @@ Show all invalid filenames:
Create a control socket at the specified location. The socket can be
used to decrypt and encrypt paths inside the filesystem. When using
this option, make sure that the directory you place the socket in is
-not world-accessible. For example, `/run/user/UID/my.socket` would
+not world-accessible. For example, `/run/user/UID/my.socket` would
be suitable.
#### -dev, -nodev
@@ -257,7 +257,7 @@ filesystem that doesn't properly support UNIX ownership and permissions.
#### -forcedecode
Force decode of encrypted files even if the integrity check fails, instead of
-failing with an IO error. Warning messages are still printed to syslog if corrupted
+failing with an IO error. Warning messages are still printed to syslog if corrupted
files are encountered.
It can be useful to recover files from disks with bad sectors or other corrupted
media. It shall not be used if the origin of corruption is unknown, specially
diff --git a/Documentation/XFSTESTS.md b/Documentation/XFSTESTS.md
index bbf19e7..d5421cc 100644
--- a/Documentation/XFSTESTS.md
+++ b/Documentation/XFSTESTS.md
@@ -61,7 +61,7 @@ Needs further analysis: `Too many open files`
## Full Test Output
```
-0 jakob@brikett:~/code/fuse-xfstests$ sudo ./check-gocryptfs
+0 jakob@brikett:~/code/fuse-xfstests$ sudo ./check-gocryptfs
gocryptfs v1.7.1; go-fuse v2.0.2-4-g8458b8a; 2019-10-10 go1.12.9 linux/amd64
fuse-xfstests nlink0/dff383ab
Thu 10 Oct 2019 08:31:43 PM UTC
@@ -146,12 +146,12 @@ generic/062 - output mismatch (see /home/jakob.donotbackup/code/fuse-xfstests/re
--- tests/generic/062.out 2018-01-20 14:29:39.067451950 +0100
+++ /home/jakob.donotbackup/code/fuse-xfstests/results//generic/062.out.bad 2019-10-10 22:34:34.290196880 +0200
@@ -13,7 +13,7 @@
-
+
*** set/get one initially empty attribute
# file: SCRATCH_MNT/reg
-user.name
+user.name=""
-
+
*** overwrite empty, set several new attributes
...
(Run 'diff -u tests/generic/062.out /home/jakob.donotbackup/code/fuse-xfstests/results//generic/062.out.bad' to see the entire diff)
@@ -190,7 +190,7 @@ generic/093 - output mismatch (see /home/jakob.donotbackup/code/fuse-xfstests/re
+++ /home/jakob.donotbackup/code/fuse-xfstests/results//generic/093.out.bad 2019-10-10 22:45:22.194059446 +0200
@@ -1,15 +1,22 @@
QA output created by 093
-
+
**** Verifying that appending to file clears capabilities ****
-file = cap_chown+ep
+Failed to set capabilities on file '/var/tmp/check-gocryptfs/testdir/093.file' (Operation not supported)
@@ -206,12 +206,12 @@ generic/097 - output mismatch (see /home/jakob.donotbackup/code/fuse-xfstests/re
+++ /home/jakob.donotbackup/code/fuse-xfstests/results//generic/097.out.bad 2019-10-10 22:45:23.382064979 +0200
@@ -110,18 +110,16 @@
*** Test out the trusted namespace ***
-
+
set EA <trusted:colour,marone>:
+setfattr: TEST_DIR/foo: Operation not supported
-
+
set EA <user:colour,beige>:
-
+
...
(Run 'diff -u tests/generic/097.out /home/jakob.donotbackup/code/fuse-xfstests/results//generic/097.out.bad' to see the entire diff)
generic/098 1s ... 0s