From 7c2255be9027551a1df54b3cb58ea9493857d391 Mon Sep 17 00:00:00 2001 From: a1346054 Date: Tue, 31 Aug 2021 17:05:38 +0000 Subject: *: trim trailing whitespace --- Documentation/MANPAGE.md | 4 ++-- Documentation/XFSTESTS.md | 14 +++++++------- 2 files changed, 9 insertions(+), 9 deletions(-) (limited to 'Documentation') diff --git a/Documentation/MANPAGE.md b/Documentation/MANPAGE.md index bc7a798..7371fc2 100644 --- a/Documentation/MANPAGE.md +++ b/Documentation/MANPAGE.md @@ -191,7 +191,7 @@ Show all invalid filenames: Create a control socket at the specified location. The socket can be used to decrypt and encrypt paths inside the filesystem. When using this option, make sure that the directory you place the socket in is -not world-accessible. For example, `/run/user/UID/my.socket` would +not world-accessible. For example, `/run/user/UID/my.socket` would be suitable. #### -dev, -nodev @@ -257,7 +257,7 @@ filesystem that doesn't properly support UNIX ownership and permissions. #### -forcedecode Force decode of encrypted files even if the integrity check fails, instead of -failing with an IO error. Warning messages are still printed to syslog if corrupted +failing with an IO error. Warning messages are still printed to syslog if corrupted files are encountered. It can be useful to recover files from disks with bad sectors or other corrupted media. It shall not be used if the origin of corruption is unknown, specially diff --git a/Documentation/XFSTESTS.md b/Documentation/XFSTESTS.md index bbf19e7..d5421cc 100644 --- a/Documentation/XFSTESTS.md +++ b/Documentation/XFSTESTS.md @@ -61,7 +61,7 @@ Needs further analysis: `Too many open files` ## Full Test Output ``` -0 jakob@brikett:~/code/fuse-xfstests$ sudo ./check-gocryptfs +0 jakob@brikett:~/code/fuse-xfstests$ sudo ./check-gocryptfs gocryptfs v1.7.1; go-fuse v2.0.2-4-g8458b8a; 2019-10-10 go1.12.9 linux/amd64 fuse-xfstests nlink0/dff383ab Thu 10 Oct 2019 08:31:43 PM UTC @@ -146,12 +146,12 @@ generic/062 - output mismatch (see /home/jakob.donotbackup/code/fuse-xfstests/re --- tests/generic/062.out 2018-01-20 14:29:39.067451950 +0100 +++ /home/jakob.donotbackup/code/fuse-xfstests/results//generic/062.out.bad 2019-10-10 22:34:34.290196880 +0200 @@ -13,7 +13,7 @@ - + *** set/get one initially empty attribute # file: SCRATCH_MNT/reg -user.name +user.name="" - + *** overwrite empty, set several new attributes ... (Run 'diff -u tests/generic/062.out /home/jakob.donotbackup/code/fuse-xfstests/results//generic/062.out.bad' to see the entire diff) @@ -190,7 +190,7 @@ generic/093 - output mismatch (see /home/jakob.donotbackup/code/fuse-xfstests/re +++ /home/jakob.donotbackup/code/fuse-xfstests/results//generic/093.out.bad 2019-10-10 22:45:22.194059446 +0200 @@ -1,15 +1,22 @@ QA output created by 093 - + **** Verifying that appending to file clears capabilities **** -file = cap_chown+ep +Failed to set capabilities on file '/var/tmp/check-gocryptfs/testdir/093.file' (Operation not supported) @@ -206,12 +206,12 @@ generic/097 - output mismatch (see /home/jakob.donotbackup/code/fuse-xfstests/re +++ /home/jakob.donotbackup/code/fuse-xfstests/results//generic/097.out.bad 2019-10-10 22:45:23.382064979 +0200 @@ -110,18 +110,16 @@ *** Test out the trusted namespace *** - + set EA : +setfattr: TEST_DIR/foo: Operation not supported - + set EA : - + ... (Run 'diff -u tests/generic/097.out /home/jakob.donotbackup/code/fuse-xfstests/results//generic/097.out.bad' to see the entire diff) generic/098 1s ... 0s -- cgit v1.2.3