diff options
Diffstat (limited to 'internal')
| -rw-r--r-- | internal/fusefrontend/args.go | 5 | ||||
| -rw-r--r-- | internal/fusefrontend/node_xattr.go | 13 | ||||
| -rw-r--r-- | internal/syscallcompat/mem.prof | bin | 0 -> 902 bytes | |||
| -rw-r--r-- | internal/syscallcompat/mem2.prof | bin | 0 -> 1015 bytes | |||
| -rw-r--r-- | internal/syscallcompat/new.txt | 6 | ||||
| -rw-r--r-- | internal/syscallcompat/old.txt | 6 | ||||
| -rw-r--r-- | internal/syscallcompat/prof | bin | 0 -> 6499 bytes | |||
| -rw-r--r-- | internal/syscallcompat/prof2 | bin | 0 -> 5831 bytes | 
8 files changed, 30 insertions, 0 deletions
| diff --git a/internal/fusefrontend/args.go b/internal/fusefrontend/args.go index 646d6c4..f822650 100644 --- a/internal/fusefrontend/args.go +++ b/internal/fusefrontend/args.go @@ -39,4 +39,9 @@ type Args struct {  	// ExcludeFrom is a list of files from which to read exclusion patterns  	// (with wildcard syntax)  	ExcludeFrom []string +	// Suid is true if the filesystem has been mounted with the "-suid" flag. +	// If it is false, we can ignore the GETXATTR "security.capability" calls, +	// which are a performance problem for writes. See +	// https://github.com/rfjakob/gocryptfs/issues/515 for details. +	Suid bool  } diff --git a/internal/fusefrontend/node_xattr.go b/internal/fusefrontend/node_xattr.go index de40915..cbc5804 100644 --- a/internal/fusefrontend/node_xattr.go +++ b/internal/fusefrontend/node_xattr.go @@ -18,11 +18,24 @@ var xattrNameIV = []byte("xattr_name_iv_xx")  // encrypted original name.  var xattrStorePrefix = "user.gocryptfs." +// We get one read of this xattr for each write - +// see https://github.com/rfjakob/gocryptfs/issues/515 for details. +var xattrCapability = "security.capability" +  // GetXAttr - FUSE call. Reads the value of extended attribute "attr".  //  // This function is symlink-safe through Fgetxattr.  func (n *Node) Getxattr(ctx context.Context, attr string, dest []byte) (uint32, syscall.Errno) {  	rn := n.rootNode() +	// If we are not mounted with -suid, reading the capability xattr does not +	// make a lot of sense, so reject the request and gain a massive speedup. +	// See https://github.com/rfjakob/gocryptfs/issues/515 . +	if !rn.args.Suid && attr == xattrCapability { +		// Returning EOPNOTSUPP is what we did till +		// ca9e912a28b901387e1dbb85f6c531119f2d5ef2 "fusefrontend: drop xattr user namespace restriction" +		// and it did not cause trouble. Seems cleaner than saying ENODATA. +		return 0, syscall.EOPNOTSUPP +	}  	cAttr := rn.encryptXattrName(attr)  	cData, errno := n.getXAttr(cAttr)  	if errno != 0 { diff --git a/internal/syscallcompat/mem.prof b/internal/syscallcompat/mem.profBinary files differ new file mode 100644 index 0000000..052fcc6 --- /dev/null +++ b/internal/syscallcompat/mem.prof diff --git a/internal/syscallcompat/mem2.prof b/internal/syscallcompat/mem2.profBinary files differ new file mode 100644 index 0000000..e0f73aa --- /dev/null +++ b/internal/syscallcompat/mem2.prof diff --git a/internal/syscallcompat/new.txt b/internal/syscallcompat/new.txt new file mode 100644 index 0000000..df3a0ea --- /dev/null +++ b/internal/syscallcompat/new.txt @@ -0,0 +1,6 @@ +goos: linux +goarch: amd64 +pkg: github.com/rfjakob/gocryptfs/internal/syscallcompat +BenchmarkLgetxattr-4   	  594607	      1799 ns/op +PASS +ok  	github.com/rfjakob/gocryptfs/internal/syscallcompat	1.108s diff --git a/internal/syscallcompat/old.txt b/internal/syscallcompat/old.txt new file mode 100644 index 0000000..0020b27 --- /dev/null +++ b/internal/syscallcompat/old.txt @@ -0,0 +1,6 @@ +goos: linux +goarch: amd64 +pkg: github.com/rfjakob/gocryptfs/internal/syscallcompat +BenchmarkLgetxattr-4   	   77743	     15183 ns/op +PASS +ok  	github.com/rfjakob/gocryptfs/internal/syscallcompat	1.360s diff --git a/internal/syscallcompat/prof b/internal/syscallcompat/profBinary files differ new file mode 100644 index 0000000..4eb4f40 --- /dev/null +++ b/internal/syscallcompat/prof diff --git a/internal/syscallcompat/prof2 b/internal/syscallcompat/prof2Binary files differ new file mode 100644 index 0000000..54fad10 --- /dev/null +++ b/internal/syscallcompat/prof2 | 
