diff options
Diffstat (limited to 'internal/fusefrontend')
| -rw-r--r-- | internal/fusefrontend/args.go | 2 | ||||
| -rw-r--r-- | internal/fusefrontend/node_xattr.go | 4 | 
2 files changed, 3 insertions, 3 deletions
| diff --git a/internal/fusefrontend/args.go b/internal/fusefrontend/args.go index 8e28d14..4aedf2e 100644 --- a/internal/fusefrontend/args.go +++ b/internal/fusefrontend/args.go @@ -40,7 +40,7 @@ type Args struct {  	// Suid is true if the filesystem has been mounted with the "-suid" flag.  	// If it is false, we can ignore the GETXATTR "security.capability" calls,  	// which are a performance problem for writes. See -	// https://github.com/rfjakob/gocryptfs/v2/issues/515 for details. +	// https://github.com/rfjakob/gocryptfs/issues/515 for details.  	Suid bool  	// Enable the FUSE kernel_cache option  	KernelCache bool diff --git a/internal/fusefrontend/node_xattr.go b/internal/fusefrontend/node_xattr.go index d5d8c5b..09ee5ef 100644 --- a/internal/fusefrontend/node_xattr.go +++ b/internal/fusefrontend/node_xattr.go @@ -24,7 +24,7 @@ var xattrNameIV = []byte("xattr_name_iv_xx")  var xattrStorePrefix = "user.gocryptfs."  // We get one read of this xattr for each write - -// see https://github.com/rfjakob/gocryptfs/v2/issues/515 for details. +// see https://github.com/rfjakob/gocryptfs/issues/515 for details.  var xattrCapability = "security.capability"  // isAcl returns true if the attribute name is for storing ACLs @@ -41,7 +41,7 @@ func (n *Node) Getxattr(ctx context.Context, attr string, dest []byte) (uint32,  	rn := n.rootNode()  	// If we are not mounted with -suid, reading the capability xattr does not  	// make a lot of sense, so reject the request and gain a massive speedup. -	// See https://github.com/rfjakob/gocryptfs/v2/issues/515 . +	// See https://github.com/rfjakob/gocryptfs/issues/515 .  	if !rn.args.Suid && attr == xattrCapability {  		// Returning EOPNOTSUPP is what we did till  		// ca9e912a28b901387e1dbb85f6c531119f2d5ef2 "fusefrontend: drop xattr user namespace restriction" | 
