Comments (2)
Bizarre. I saw this crash, but after a git clean -dxff
I don't.
$ ./build.bash
gocryptfs v2.4.0-2-gb362b11; go-fuse v2.3.0; 2023-09-15 go1.21.1 linux/amd64
$ ./gocryptfs -speed
gocryptfs v2.4.0-4-g7fff33a without_openssl; go-fuse v2.3.0; 2023-09-15 go1.21.1 linux/amd64
cpu: Intel(R) Core(TM) i5-3470 CPU @ 3.20GHz; with AES acceleration
AES-GCM-256-OpenSSL panic: runtime error: invalid memory address or nil pointer dereference
[signal SIGSEGV: segmentation violation code=0x1 addr=0x0 pc=0x5a5de0]
goroutine 7 [running]:
testing.(*common).decorate(0x40d625?, {0xc00001c180, 0x2a}, 0x830601?)
testing/testing.go:772 +0xa0
testing.(*common).logDepth(0xc00012e280, {0xc00001c180, 0x2a}, 0x3)
testing/testing.go:1035 +0x1dd
testing.(*common).log(...)
testing/testing.go:1004
testing.(*common).Skip(0xc00012e280, {0xc000044f08?, 0x48874f?, 0xc000044f18?})
testing/testing.go:1089 +0x4a
github.com/rfjakob/gocryptfs/v2/internal/speed.bStupidGCM(0xc00012e280)
github.com/rfjakob/gocryptfs/v2/internal/speed/speed.go:129 +0x45
testing.(*B).runN(0xc00012e280, 0x1)
testing/benchmark.go:193 +0x102
testing.(*B).run1.func1()
testing/benchmark.go:233 +0x4e
created by testing.(*B).run1 in goroutine 1
testing/benchmark.go:226 +0x90
$ git clean -dxff
Removing Documentation/gocryptfs-xray.1
Removing Documentation/gocryptfs.1
Removing Documentation/statfs.1
Removing a/
Removing contrib/atomicrename/atomicrename
Removing contrib/findholes/findholes
Removing contrib/statfs/statfs
Removing gocryptfs
Removing gocryptfs-xray/gocryptfs-xray
Removing gocryptfs_v2.4.0_linux-static_amd64.tar.gz
Removing gocryptfs_v2.4.0_linux-static_amd64.tar.gz.asc
Removing gocryptfs_v2.4.0_src-deps.tar.gz
Removing gocryptfs_v2.4.0_src-deps.tar.gz.asc
Removing gocryptfs_v2.4.0_src.tar.gz
Removing gocryptfs_v2.4.0_src.tar.gz.asc
Removing internal/configfile/config_test/tmp.conf
Removing tests/cli/cli.test
Removing tests/cluster/cluster.test
Removing tests/fsck/mnt/
Removing tests/root_test/root_test.test
$ ./build.bash
gocryptfs v2.4.0-4-g7fff33a; go-fuse v2.3.0; 2023-09-15 go1.21.1 linux/amd64
$ ./gocryptfs -speed
gocryptfs v2.4.0-4-g7fff33a; go-fuse v2.3.0; 2023-09-15 go1.21.1 linux/amd64
cpu: Intel(R) Core(TM) i5-3470 CPU @ 3.20GHz; with AES acceleration
AES-GCM-256-OpenSSL 689.38 MB/s
AES-GCM-256-Go 993.14 MB/s (selected in auto mode)
AES-SIV-512-Go 159.37 MB/s
XChaCha20-Poly1305-OpenSSL 554.66 MB/s
XChaCha20-Poly1305-Go 844.00 MB/s (selected in auto mode)
from gocryptfs.
Looks like it explodes when built without openssl.
$ ./build-without-openssl.bash
gocryptfs v2.4.0-4-g7fff33a without_openssl; go-fuse v2.3.0; 2023-09-15 go1.21.1 linux/amd64
$ ./gocryptfs -speed
gocryptfs v2.4.0-4-g7fff33a without_openssl; go-fuse v2.3.0; 2023-09-15 go1.21.1 linux/amd64
cpu: Intel(R) Core(TM) i5-3470 CPU @ 3.20GHz; with AES acceleration
AES-GCM-256-OpenSSL panic: runtime error: invalid memory address or nil pointer dereference
[signal SIGSEGV: segmentation violation code=0x1 addr=0x0 pc=0x5a5de0]
goroutine 7 [running]:
testing.(*common).decorate(0x40d625?, {0xc00001c180, 0x2a}, 0x830601?)
testing/testing.go:772 +0xa0
testing.(*common).logDepth(0xc00012e280, {0xc00001c180, 0x2a}, 0x3)
testing/testing.go:1035 +0x1dd
testing.(*common).log(...)
testing/testing.go:1004
testing.(*common).Skip(0xc00012e280, {0xc000044f08?, 0x48874f?, 0xc000044f18?})
testing/testing.go:1089 +0x4a
github.com/rfjakob/gocryptfs/v2/internal/speed.bStupidGCM(0xc00012e280)
github.com/rfjakob/gocryptfs/v2/internal/speed/speed.go:129 +0x45
testing.(*B).runN(0xc00012e280, 0x1)
testing/benchmark.go:193 +0x102
testing.(*B).run1.func1()
testing/benchmark.go:233 +0x4e
created by testing.(*B).run1 in goroutine 1
testing/benchmark.go:226 +0x90
from gocryptfs.
Related Issues (20)
- https://github.com/rfjakob/gocryptfs.wiki.gitv2.3
- Glenn HOT 1
- An idea
- Unmount before upload to the cloud
- 2.4.0 on MacPorts HOT 1
- Huge speed drop when file size exceeds around 300-500 GB over SSHFS HOT 1
- Inconsistent content of gocryptfs.diriv HOT 4
- Protection against active adversaries, Mallory case HOT 1
- Error compile in fedora HOT 1
- macos: can't remove empty directory, ._gocryptfs.diriv problem
- feat: Add support for masking symlinks
- force_owner not working in reverse mode
- [Feature Request] Add an option to unmount
- Horribly fragmented files HOT 4
- Test failures on Fedora 39: TestFileHoleCopy, TestAccessVirtualDirIV HOT 1
- Encrypted folder does not unmount when user logs out from KDE (SDDM)
- Fedora Silverblue deletig folder content! HOT 8
- I can't access the contents of my encrypted files HOT 3
- Feature request: export files directly to disk (without FUSE mount) HOT 2
- chown not working in mounted sub-folder HOT 3
Recommend Projects
-
React
A declarative, efficient, and flexible JavaScript library for building user interfaces.
-
Vue.js
🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.
-
Typescript
TypeScript is a superset of JavaScript that compiles to clean JavaScript output.
-
TensorFlow
An Open Source Machine Learning Framework for Everyone
-
Django
The Web framework for perfectionists with deadlines.
-
Laravel
A PHP framework for web artisans
-
D3
Bring data to life with SVG, Canvas and HTML. 📊📈🎉
-
Recommend Topics
-
javascript
JavaScript (JS) is a lightweight interpreted programming language with first-class functions.
-
web
Some thing interesting about web. New door for the world.
-
server
A server is a program made to process requests and deliver data to clients.
-
Machine learning
Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.
-
Visualization
Some thing interesting about visualization, use data art
-
Game
Some thing interesting about game, make everyone happy.
Recommend Org
-
Facebook
We are working to build community through open source technology. NB: members must have two-factor auth.
-
Microsoft
Open source projects and samples from Microsoft.
-
Google
Google ❤️ Open Source for everyone.
-
Alibaba
Alibaba Open Source for everyone
-
D3
Data-Driven Documents codes.
-
Tencent
China tencent open source team.
from gocryptfs.