rfjakob / gocryptfs

Encrypted overlay filesystem written in Go
https://nuetzlich.net/gocryptfs/
MIT License
3.57k stars 253 forks source link

Multiple test failures on MacOS 12 (Monterey) Apple Silicon M1 Max #625

Open slonik-az opened 2 years ago

slonik-az commented 2 years ago

Opening a new issue since #623 has been already closed. The commit a48d6c3 fixed the tests breakage, so that the tests can run. But unfortunately, quite a few of them still fail. Moreover, the test suite leaves behind several dozens of test directories mounted as gocryptfs file systems. I had to reboot the machine to cleanup the mess. Here are the details.

Setup

Build

Compiling latest master (hash=a48d6c3...) with

$ ./build-without-openssl.bash

completes OK and without errors.

Test

$ ./test-without-openssl.bash

results in multiple test failures. Here is the output:
test.log

rfjakob commented 2 years ago

Last commit should fix the

-wpanic turns this warning into a panic: Openat: O_NOFOLLOW missing: flags = 0x4

which are most of the failures

slonik-az commented 2 years ago

No luck so far. Compiled the latest master (bd1ecf5) without openSSL as before. Running tests produces failures and also it hangs. I had to kill the process after 3 minutes gocryptfs spinning the wheels.

The output from my test session (terminated by ^C after 3 minutes wait): test.log

rfjakob commented 2 years ago

Can you try

./test-without-openssl.bash -v

?

slonik-az commented 2 years ago

Reran tests with

./test-without-openssl.bash -v

as you suggested. It hangs as before. After waiting few minutes watching nothing happening I killed the job with ^C. Here is the captured output: test-v.log Hope it helps.

MarcelBochtler commented 2 years ago

Can you try

./test-without-openssl.bash -v

?

These tests also fail for me. Additionally the tests create files with multiple hundreds of GB in size:

/private/var/folders/_x/5t9ddfn94s9cx9ln43smhrw80000gn/T/gocryptfs-test-parent-501/3692329624
❯ du -d 1 -h | sort -h
0   ./TestCtlSock.2606075678.mnt
0   ./TestCtlSockDecrypt.3361523765.mnt
0   ./TestCtlSockDecryptCrash.2334803329.mnt
8.0K    ./TestCtlSock.2606075678
8.0K    ./TestCtlSockDecrypt.3361523765
8.0K    ./TestCtlSockDecryptCrash.2334803329
350G    ./default-plain
353G    ./default-cipher
703G    .

/private/var/folders/_x/5t9ddfn94s9cx9ln43smhrw80000gn/T/gocryptfs-test-parent-501/3692329624
❯ ls -lha default-plain
total 350G
drwxr-xr-x 13 marcel staff  416 Dec 24 13:34 .
drwxr-xr-x 13 marcel staff  416 Dec 24 13:34 ..
drwx------  4 marcel staff  128 Dec 24 13:34 TestDirIVRace_Dir2
-rw-r--r--  1 marcel staff    0 Jan  2  1980 1980.txt
-rw-------  1 marcel staff    3 Dec 24 13:34 TestCpWarnings
-rw-------  1 marcel staff    0 Dec 24 13:34 TestMvWarnings
-rw-r--r--  1 marcel staff 350G Dec 24 13:39 TestSeekData
-rw-r--r--  1 marcel staff    3 Dec 24 13:52 TestTruncateWrite
-rw-------  1 marcel staff    0 Dec 24 13:34 TestWORead
--w-------  1 marcel staff   10 Dec 24 13:34 TestWrite0200File
-rw-------  1 marcel staff    0 Dec 24 13:34 TestXattrOverflow
-rw-r--r--  1 marcel staff   10 Dec 24 13:34 TestXfs124
slonik-az commented 2 years ago

Confirming that running the test on Apple Silicon creates huge files > 300GB in size. Had to kill the process when 50% of my SSD got filled.

rfjakob commented 2 years ago

TestSeekData tries to create a 1 TiB sparse file, but because it's sparse, it should only take up a few kiB. Looks like this does not work here. On the other hand, maybe the tests are not really hanging, but still in the procress of writing 1 TiB of data?

rfjakob commented 2 years ago

Can you try again? I have now

(1) improved the output of test.bash -v so we should see where it hangs (if it hangs)

(2) Limited TestSeekData to 1 GiB to not fill up the disk when sparse files don't work

MarcelBochtler commented 2 years ago

It does not hang anymore.

Results:

Click to expand! ``` ~/workspace/gocryptfs master ❯ ./test-without-openssl.bash Using TMPDIR=/var/folders/_x/5t9ddfn94s9cx9ln43smhrw80000gn/T/ flock is not available, skipping gocryptfs v2.2.1-22-gc23a7f2 without_openssl; go-fuse v2.1.1-0.20211219085202-934a183ed914; 2022-01-04 go1.17.5 darwin/arm64 shellcheck not installed - skipping ok github.com/rfjakob/gocryptfs/v2 0.201s ? github.com/rfjakob/gocryptfs/v2/contrib/atomicrename [no test files] ? github.com/rfjakob/gocryptfs/v2/contrib/findholes [no test files] ? github.com/rfjakob/gocryptfs/v2/contrib/findholes/holes [no test files] ? github.com/rfjakob/gocryptfs/v2/contrib/getdents-debug/readdirnames [no test files] ? github.com/rfjakob/gocryptfs/v2/contrib/statfs [no test files] ? github.com/rfjakob/gocryptfs/v2/contrib/statvsfstat [no test files] ? github.com/rfjakob/gocryptfs/v2/ctlsock [no test files] ? github.com/rfjakob/gocryptfs/v2/gocryptfs-xray [no test files] test_helpers: warning: testParentDir "/var/folders/_x/5t9ddfn94s9cx9ln43smhrw80000gn/T//gocryptfs-test-parent-501" does not reside on ext4, we will miss failures caused by ino reuse ctlsock: listen unix /var/folders/_x/5t9ddfn94s9cx9ln43smhrw80000gn/T/gocryptfs-test-parent-501/2939188401/TestEncryptPaths.3469923414.sock: bind: invalid argument --- FAIL: TestEncryptPaths (0.04s) xray_test.go:68: mount failed: exit status 20 FAIL FAIL github.com/rfjakob/gocryptfs/v2/gocryptfs-xray/xray_tests 0.261s ok github.com/rfjakob/gocryptfs/v2/internal/configfile 0.767s ok github.com/rfjakob/gocryptfs/v2/internal/contentenc 0.293s ok github.com/rfjakob/gocryptfs/v2/internal/cryptocore 0.343s ok github.com/rfjakob/gocryptfs/v2/internal/ctlsocksrv 0.118s ? github.com/rfjakob/gocryptfs/v2/internal/ensurefds012 [no test files] ? github.com/rfjakob/gocryptfs/v2/internal/exitcodes [no test files] ? github.com/rfjakob/gocryptfs/v2/internal/fido2 [no test files] ok github.com/rfjakob/gocryptfs/v2/internal/fusefrontend 0.528s ok github.com/rfjakob/gocryptfs/v2/internal/fusefrontend_reverse 0.383s ok github.com/rfjakob/gocryptfs/v2/internal/inomap 0.346s ok github.com/rfjakob/gocryptfs/v2/internal/nametransform 0.432s ? github.com/rfjakob/gocryptfs/v2/internal/openfiletable [no test files] ok github.com/rfjakob/gocryptfs/v2/internal/pathiv 0.397s ok github.com/rfjakob/gocryptfs/v2/internal/readpassword 0.408s ok github.com/rfjakob/gocryptfs/v2/internal/siv_aead 0.377s ok github.com/rfjakob/gocryptfs/v2/internal/speed 0.366s [no tests to run] ? github.com/rfjakob/gocryptfs/v2/internal/stupidgcm [no test files] ok github.com/rfjakob/gocryptfs/v2/internal/syscallcompat 0.374s ok github.com/rfjakob/gocryptfs/v2/internal/tlog 0.389s test_helpers: warning: testParentDir "/var/folders/_x/5t9ddfn94s9cx9ln43smhrw80000gn/T//gocryptfs-test-parent-501" does not reside on ext4, we will miss failures caused by ino reuse fs.Mount failed: read-only file system --- FAIL: TestRo (0.05s) cli_test.go:333: mount failed: exit status 19 warning: haveFusermount2: fork/exec /bin/fusermount: no such file or directory -wpanic turns this warning into a panic: warning: haveFusermount2: fork/exec /bin/fusermount: no such file or directory panic: -wpanic turns this warning into a panic: warning: haveFusermount2: fork/exec /bin/fusermount: no such file or directory goroutine 1 [running]: log.(*Logger).Panic(0x140000ca1e0, {0x1400029d618, 0x1, 0x1}) log/log.go:224 +0x90 github.com/rfjakob/gocryptfs/v2/internal/tlog.(*toggledLogger).Printf(0x1400009a780, {0x102b10d99, 0x1c}, {0x1400029d698, 0x1, 0x1}) github.com/rfjakob/gocryptfs/v2/internal/tlog/log.go:78 +0x168 main.haveFusermount2() github.com/rfjakob/gocryptfs/v2/mount.go:499 +0x148 main.initGoFuse({0x102bb5330, 0x140000c9400}, 0x1400029dd98) github.com/rfjakob/gocryptfs/v2/mount.go:414 +0x418 main.doMount(0x1400029dd98) github.com/rfjakob/gocryptfs/v2/mount.go:115 +0x74c main.main() github.com/rfjakob/gocryptfs/v2/main.go:305 +0xbe0 --- FAIL: TestNonempty (0.05s) cli_test.go:364: mount failed: exit status 2 --- FAIL: TestMountPasswordIncorrect (0.04s) cli_test.go:410: want=12, got=20 --- FAIL: TestMountPasswordEmpty (0.03s) cli_test.go:427: want=9, got=20 OpenDir ".": invalid entry "QkVY6qekGdjbSanw73BYvgwrongPattern": bad message decryptName "mzaZRF9_0IU-_5vv2wPC_i": unPad16 error: Padding too long, padLen=49 > 16 decryptName "mzaZRF9_0IU-_5vv2wP_in": unPad16 error: Padding too long, padLen=97 > 16 Invalid cipherdir: directory /var/folders/_x/5t9ddfn94s9cx9ln43smhrw80000gn/T/gocryptfs-test-parent-501/3844326226/TestInitNotEmpty not empty FAIL FAIL github.com/rfjakob/gocryptfs/v2/tests/cli 5.566s test_helpers: warning: testParentDir "/var/folders/_x/5t9ddfn94s9cx9ln43smhrw80000gn/T//gocryptfs-test-parent-501" does not reside on ext4, we will miss failures caused by ino reuse ctlsock: listen unix /var/folders/_x/5t9ddfn94s9cx9ln43smhrw80000gn/T/gocryptfs-test-parent-501/927888140/TestCtlSock.65591754.sock: bind: invalid argument --- FAIL: TestCtlSock (0.06s) ctlsock_test.go:16: mount failed: exit status 20 ctlsock: listen unix /var/folders/_x/5t9ddfn94s9cx9ln43smhrw80000gn/T/gocryptfs-test-parent-501/927888140/TestCtlSockDecrypt.3997374888.sock: bind: invalid argument --- FAIL: TestCtlSockDecrypt (0.05s) ctlsock_test.go:46: mount failed: exit status 20 ctlsock: listen unix /var/folders/_x/5t9ddfn94s9cx9ln43smhrw80000gn/T/gocryptfs-test-parent-501/927888140/TestCtlSockDecryptCrash.2021484923.sock: bind: invalid argument --- FAIL: TestCtlSockDecryptCrash (0.04s) ctlsock_test.go:96: mount failed: exit status 20 --- FAIL: TestSeekData (1.12s) main_test.go:294: seek /var/folders/_x/5t9ddfn94s9cx9ln43smhrw80000gn/T/gocryptfs-test-parent-501/927888140/default-plain/TestSeekData: invalid argument umount(/private/var/folders/_x/5t9ddfn94s9cx9ln43smhrw80000gn/T/gocryptfs-test-parent-501/927888140/default-plain): Resource busy -- try 'diskutil unmount' UnmountErr: got exit code 1, retrying (1/10) umount(/private/var/folders/_x/5t9ddfn94s9cx9ln43smhrw80000gn/T/gocryptfs-test-parent-501/927888140/default-plain): Resource busy -- try 'diskutil unmount' UnmountErr: got exit code 1, retrying (2/10) umount(/private/var/folders/_x/5t9ddfn94s9cx9ln43smhrw80000gn/T/gocryptfs-test-parent-501/927888140/default-plain): Resource busy -- try 'diskutil unmount' UnmountErr: got exit code 1, retrying (3/10) umount(/private/var/folders/_x/5t9ddfn94s9cx9ln43smhrw80000gn/T/gocryptfs-test-parent-501/927888140/default-plain): Resource busy -- try 'diskutil unmount' UnmountErr: got exit code 1, retrying (4/10) umount(/private/var/folders/_x/5t9ddfn94s9cx9ln43smhrw80000gn/T/gocryptfs-test-parent-501/927888140/default-plain): Resource busy -- try 'diskutil unmount' UnmountErr: got exit code 1, retrying (5/10) umount(/private/var/folders/_x/5t9ddfn94s9cx9ln43smhrw80000gn/T/gocryptfs-test-parent-501/927888140/default-plain): Resource busy -- try 'diskutil unmount' UnmountErr: got exit code 1, retrying (6/10) umount(/private/var/folders/_x/5t9ddfn94s9cx9ln43smhrw80000gn/T/gocryptfs-test-parent-501/927888140/default-plain): Resource busy -- try 'diskutil unmount' UnmountErr: got exit code 1, retrying (7/10) umount(/private/var/folders/_x/5t9ddfn94s9cx9ln43smhrw80000gn/T/gocryptfs-test-parent-501/927888140/default-plain): Resource busy -- try 'diskutil unmount' UnmountErr: got exit code 1, retrying (8/10) umount(/private/var/folders/_x/5t9ddfn94s9cx9ln43smhrw80000gn/T/gocryptfs-test-parent-501/927888140/default-plain): Resource busy -- try 'diskutil unmount' UnmountErr: got exit code 1, retrying (9/10) umount(/private/var/folders/_x/5t9ddfn94s9cx9ln43smhrw80000gn/T/gocryptfs-test-parent-501/927888140/default-plain): Resource busy -- try 'diskutil unmount' UnmountErr: got exit code 1, retrying (10/10) UnmountPanic: exit status 1. Running lsof /var/folders/_x/5t9ddfn94s9cx9ln43smhrw80000gn/T//gocryptfs-test-parent-501/927888140/default-plain --- FAIL: TestMd5sumMaintainers (11.22s) panic: UnmountPanic: unmount failed: exit status 1 [recovered] panic: UnmountPanic: unmount failed: exit status 1 goroutine 28 [running]: testing.tRunner.func1.2({0x102e6b820, 0x140002860d0}) /opt/local/lib/go/src/testing/testing.go:1209 +0x258 testing.tRunner.func1(0x14000083040) /opt/local/lib/go/src/testing/testing.go:1212 +0x284 panic({0x102e6b820, 0x140002860d0}) /opt/local/lib/go/src/runtime/panic.go:1038 +0x21c github.com/rfjakob/gocryptfs/v2/tests/test_helpers.UnmountPanic({0x14000144070, 0x63}) /Users/marcel/workspace/gocryptfs/tests/test_helpers/mount_unmount.go:144 +0x268 github.com/rfjakob/gocryptfs/v2/tests/defaults.TestMd5sumMaintainers(0x14000083040) /Users/marcel/workspace/gocryptfs/tests/defaults/main_test.go:361 +0x1a8 testing.tRunner(0x14000083040, 0x102ea1db8) /opt/local/lib/go/src/testing/testing.go:1259 +0x104 created by testing.(*T).Run /opt/local/lib/go/src/testing/testing.go:1306 +0x328 FAIL github.com/rfjakob/gocryptfs/v2/tests/defaults 14.661s ok github.com/rfjakob/gocryptfs/v2/tests/deterministic_names 0.444s test_helpers: warning: testParentDir "/var/folders/_x/5t9ddfn94s9cx9ln43smhrw80000gn/T//gocryptfs-test-parent-501" does not reside on ext4, we will miss failures caused by ino reuse Skipping OpenSSL tests, I have been compiled without openssl support fs.Mount failed: read-only file system --- FAIL: TestExampleFSv11reverse (0.03s) example_filesystems_test.go:201: mount failed: exit status 19 fs.Mount failed: read-only file system --- FAIL: TestExampleFSv11reversePlaintextnames (0.03s) example_filesystems_test.go:238: mount failed: exit status 19 fs.Mount failed: read-only file system --- FAIL: TestExampleFSv13reverse (0.15s) example_filesystems_test.go:337: mount failed: exit status 19 FAIL FAIL github.com/rfjakob/gocryptfs/v2/tests/example_filesystems 1.897s test_helpers: warning: testParentDir "/var/folders/_x/5t9ddfn94s9cx9ln43smhrw80000gn/T//gocryptfs-test-parent-501" does not reside on ext4, we will miss failures caused by ino reuse --- FAIL: TestBrokenFsV14 (0.14s) fsck_test.go:45: Reading password from extpass program "echo", arguments: ["test"] Decrypting master key fs.Mount failed: read-only file system Maybe you should run: /Library/Filesystems/osxfuse.fs/Contents/Resources/load_osxfuse fsck_test.go:48: wrong exit code, have=19 want=26 --- FAIL: TestExampleFses (0.44s) fsck_test.go:75: Checking "v0.4" fsck_test.go:75: Checking "v2.2-xchacha" fsck_test.go:85: Reading password from extpass program "echo", arguments: ["test"] Decrypting master key fs.Mount failed: read-only file system Maybe you should run: /Library/Filesystems/osxfuse.fs/Contents/Resources/load_osxfuse fsck_test.go:86: fsck returned code 19 but fs should be clean fsck_test.go:75: Checking "v0.5" fsck_test.go:75: Checking "v0.7-plaintextnames" fsck_test.go:85: Reading password from extpass program "echo", arguments: ["test"] Decrypting master key fs.Mount failed: read-only file system Maybe you should run: /Library/Filesystems/osxfuse.fs/Contents/Resources/load_osxfuse fsck_test.go:86: fsck returned code 19 but fs should be clean fsck_test.go:75: Checking "v2.2-xchacha-deterministic-names" fsck_test.go:85: Reading password from extpass program "echo", arguments: ["test"] Decrypting master key fs.Mount failed: read-only file system Maybe you should run: /Library/Filesystems/osxfuse.fs/Contents/Resources/load_osxfuse fsck_test.go:86: fsck returned code 19 but fs should be clean fsck_test.go:75: Checking "v0.7" fsck_test.go:85: Reading password from extpass program "echo", arguments: ["test"] Decrypting master key fs.Mount failed: read-only file system Maybe you should run: /Library/Filesystems/osxfuse.fs/Contents/Resources/load_osxfuse fsck_test.go:86: fsck returned code 19 but fs should be clean fsck_test.go:75: Checking "v0.9" fsck_test.go:85: Reading password from extpass program "echo", arguments: ["test"] Decrypting master key fs.Mount failed: read-only file system Maybe you should run: /Library/Filesystems/osxfuse.fs/Contents/Resources/load_osxfuse fsck_test.go:86: fsck returned code 19 but fs should be clean fsck_test.go:75: Checking "v0.6-plaintextnames" fsck_test.go:75: Checking "v0.6" fsck_test.go:75: Checking "v2.2-deterministic-names" fsck_test.go:85: Reading password from extpass program "echo", arguments: ["test"] Decrypting master key fs.Mount failed: read-only file system Maybe you should run: /Library/Filesystems/osxfuse.fs/Contents/Resources/load_osxfuse fsck_test.go:86: fsck returned code 19 but fs should be clean fsck_test.go:75: Checking "v1.1-aessiv" fsck_test.go:85: Reading password from extpass program "echo", arguments: ["test"] Decrypting master key fs.Mount failed: read-only file system Maybe you should run: /Library/Filesystems/osxfuse.fs/Contents/Resources/load_osxfuse fsck_test.go:86: fsck returned code 19 but fs should be clean fsck_test.go:75: Checking "v1.3" fsck_test.go:85: Reading password from extpass program "echo", arguments: ["test"] Decrypting master key fs.Mount failed: read-only file system Maybe you should run: /Library/Filesystems/osxfuse.fs/Contents/Resources/load_osxfuse fsck_test.go:86: fsck returned code 19 but fs should be clean FAIL FAIL github.com/rfjakob/gocryptfs/v2/tests/fsck 0.892s ok github.com/rfjakob/gocryptfs/v2/tests/hkdf_sanity 0.464s test_helpers: warning: testParentDir "/var/folders/_x/5t9ddfn94s9cx9ln43smhrw80000gn/T//gocryptfs-test-parent-501" does not reside on ext4, we will miss failures caused by ino reuse PASS PASS PASS --- FAIL: TestPwd (0.01s) matrix_test.go:929: pwd: couldn't find directory entry in ‘../../../../../../../../..’ with matching i-node matrix_test.go:930: dir "/var/folders/_x/5t9ddfn94s9cx9ln43smhrw80000gn/T//gocryptfs-test-parent-501/2330697319/default-plain": exit status 1 FAIL TestMain: matrix[5] = matrix.testcaseMatrix{plaintextnames:false, openssl:"auto", aessiv:true, raw64:false, extraArgs:[]string(nil)} failed FAIL github.com/rfjakob/gocryptfs/v2/tests/matrix 8.101s test_helpers: warning: testParentDir "/var/folders/_x/5t9ddfn94s9cx9ln43smhrw80000gn/T//gocryptfs-test-parent-501" does not reside on ext4, we will miss failures caused by ino reuse --- FAIL: TestFileHoleCopy (0.04s) --- FAIL: TestFileHoleCopy/c0 (0.04s) file_holes_test.go:26: invalid argument file_holes_test.go:137: aborting further subtests FAIL FAIL github.com/rfjakob/gocryptfs/v2/tests/plaintextnames 0.611s test_helpers: warning: testParentDir "/var/folders/_x/5t9ddfn94s9cx9ln43smhrw80000gn/T//gocryptfs-test-parent-501" does not reside on ext4, we will miss failures caused by ino reuse fs.Mount failed: read-only file system mount failed: exit status 19 FAIL github.com/rfjakob/gocryptfs/v2/tests/reverse 0.496s test_helpers: warning: testParentDir "/var/folders/_x/5t9ddfn94s9cx9ln43smhrw80000gn/T//gocryptfs-test-parent-501" does not reside on ext4, we will miss failures caused by ino reuse go-fuse: 16:53:17.454704 warning: rawBridge.getattr: overriding ino 40371807 with 40371804 --- FAIL: TestDirUnlink (1.29s) sharedstorage_test.go:45: newTestCase: sharedstorage=false cipherdir="/var/folders/_x/5t9ddfn94s9cx9ln43smhrw80000gn/T//gocryptfs-test-parent-501/3428603064/TestDirUnlink.65987316" sharedstorage_test.go:94: operation not permitted FAIL --- FAIL: TestDirUnlink (0.10s) sharedstorage_test.go:45: newTestCase: sharedstorage=true cipherdir="/var/folders/_x/5t9ddfn94s9cx9ln43smhrw80000gn/T//gocryptfs-test-parent-501/3428603064/TestDirUnlink.3173183004" sharedstorage_test.go:89: operation not permitted FAIL FAIL github.com/rfjakob/gocryptfs/v2/tests/sharedstorage 3.216s ? github.com/rfjakob/gocryptfs/v2/tests/symlink_race [no test files] ? github.com/rfjakob/gocryptfs/v2/tests/test_helpers [no test files] test_helpers: warning: testParentDir "/var/folders/_x/5t9ddfn94s9cx9ln43smhrw80000gn/T//gocryptfs-test-parent-501" does not reside on ext4, we will miss failures caused by ino reuse DecryptBlock: Block is too short: 3 bytes DecryptBlock: Block is too short: 2 bytes GetXAttr: Block is too short GetXAttr: cipher: message authentication failed GetXAttr: cipher: message authentication failed GetXAttr: cipher: message authentication failed --- FAIL: TestList0000File (0.00s) xattr_integration_test.go:298: xattr.list /var/folders/_x/5t9ddfn94s9cx9ln43smhrw80000gn/T//gocryptfs-test-parent-501/322940193/default-plain/TestList0000File : permission denied --- FAIL: TestList0000Dir (0.00s) xattr_integration_test.go:325: xattr.list /var/folders/_x/5t9ddfn94s9cx9ln43smhrw80000gn/T//gocryptfs-test-parent-501/322940193/default-plain/TestList0000Dir : permission denied --- FAIL: TestSet0200Dir (0.00s) xattr_integration_test.go:339: xattr.LSet /var/folders/_x/5t9ddfn94s9cx9ln43smhrw80000gn/T//gocryptfs-test-parent-501/322940193/default-plain/TestSet0200Dir user.foo: bad file descriptor FAIL FAIL github.com/rfjakob/gocryptfs/v2/tests/xattr 0.398s FAIL ```

With -v:

Click to expand! ``` ~/workspace/gocryptfs master ❯ ./test-without-openssl.bash -v + break + [[ -z /var/folders/_x/5t9ddfn94s9cx9ln43smhrw80000gn/T/ ]] + echo 'Using TMPDIR=/var/folders/_x/5t9ddfn94s9cx9ln43smhrw80000gn/T/' Using TMPDIR=/var/folders/_x/5t9ddfn94s9cx9ln43smhrw80000gn/T/ ++ dirname ./test.bash + cd . + export GO111MODULE=on + GO111MODULE=on ++ basename ./test.bash + MYNAME=test.bash + TESTDIR=/var/folders/_x/5t9ddfn94s9cx9ln43smhrw80000gn/T//gocryptfs-test-parent-501 + mkdir -p /var/folders/_x/5t9ddfn94s9cx9ln43smhrw80000gn/T//gocryptfs-test-parent-501 + LOCKFILE=/var/folders/_x/5t9ddfn94s9cx9ln43smhrw80000gn/T//gocryptfs-test-parent-501/test.bash.lock + command -v flock + echo 'flock is not available, skipping' flock is not available, skipping + unmount_leftovers + RET=0 ++ mount ++ grep /var/folders/_x/5t9ddfn94s9cx9ln43smhrw80000gn/T//gocryptfs-test-parent-501 ++ cut -f3 '-d ' + return 0 + ./build-without-openssl.bash gocryptfs v2.2.1-22-gc23a7f2 without_openssl; go-fuse v2.1.1-0.20211219085202-934a183ed914; 2022-01-04 go1.17.5 darwin/arm64 + [[ -tags without_openssl -v != *without_openssl* ]] + go tool + grep vet + [[ -d vendor ]] + go vet ./... + command -v shellcheck + echo 'shellcheck not installed - skipping' shellcheck not installed - skipping + EXTRA_ARGS= + [[ 1 -eq 1 ]] + EXTRA_ARGS='-p 1' + go test -count 1 -p 1 ./... -tags without_openssl -v === RUN TestPrefixOArgs --- PASS: TestPrefixOArgs (0.00s) === RUN TestConvertToDoubleDash --- PASS: TestConvertToDoubleDash (0.00s) === RUN TestParseCliOpts --- PASS: TestParseCliOpts (0.00s) PASS ok github.com/rfjakob/gocryptfs/v2 0.160s ? github.com/rfjakob/gocryptfs/v2/contrib/atomicrename [no test files] ? github.com/rfjakob/gocryptfs/v2/contrib/findholes [no test files] ? github.com/rfjakob/gocryptfs/v2/contrib/findholes/holes [no test files] ? github.com/rfjakob/gocryptfs/v2/contrib/getdents-debug/readdirnames [no test files] ? github.com/rfjakob/gocryptfs/v2/contrib/statfs [no test files] ? github.com/rfjakob/gocryptfs/v2/contrib/statvsfstat [no test files] ? github.com/rfjakob/gocryptfs/v2/ctlsock [no test files] ? github.com/rfjakob/gocryptfs/v2/gocryptfs-xray [no test files] test_helpers: warning: testParentDir "/var/folders/_x/5t9ddfn94s9cx9ln43smhrw80000gn/T//gocryptfs-test-parent-501" does not reside on ext4, we will miss failures caused by ino reuse === RUN TestAesgcmXray --- PASS: TestAesgcmXray (0.15s) === RUN TestAessivXray --- PASS: TestAessivXray (0.00s) === RUN TestDumpmasterkey --- PASS: TestDumpmasterkey (0.01s) === RUN TestEncryptPaths ctlsock: listen unix /var/folders/_x/5t9ddfn94s9cx9ln43smhrw80000gn/T/gocryptfs-test-parent-501/4018669996/TestEncryptPaths.667377915.sock: bind: invalid argument xray_test.go:68: mount failed: exit status 20 --- FAIL: TestEncryptPaths (0.19s) FAIL FAIL github.com/rfjakob/gocryptfs/v2/gocryptfs-xray/xray_tests 0.501s === RUN TestLoadV1 Unsupported on-disk format 1 --- PASS: TestLoadV1 (0.00s) === RUN TestLoadV2 --- PASS: TestLoadV2 (0.13s) === RUN TestLoadV2PwdError failed to unlock master key: cipher: message authentication failed --- PASS: TestLoadV2PwdError (0.11s) === RUN TestLoadV2Feature --- PASS: TestLoadV2Feature (0.00s) === RUN TestLoadV2StrangeFeature Unknown feature flag "StrangeFeatureFlag" --- PASS: TestLoadV2StrangeFeature (0.00s) === RUN TestCreateConfDefault Not running on a terminal, suppressing master key display --- PASS: TestCreateConfDefault (0.03s) === RUN TestCreateConfPlaintextnames Not running on a terminal, suppressing master key display --- PASS: TestCreateConfPlaintextnames (0.02s) === RUN TestCreateConfFileAESSIV Not running on a terminal, suppressing master key display --- PASS: TestCreateConfFileAESSIV (0.02s) === RUN TestCreateConfLongNameMax Not running on a terminal, suppressing master key display --- PASS: TestCreateConfLongNameMax (0.02s) === RUN TestIsFeatureFlagKnown --- PASS: TestIsFeatureFlagKnown (0.00s) PASS ok github.com/rfjakob/gocryptfs/v2/internal/configfile 0.498s === RUN TestSplitRange --- PASS: TestSplitRange (0.00s) === RUN TestCiphertextRange --- PASS: TestCiphertextRange (0.00s) === RUN TestBlockNo --- PASS: TestBlockNo (0.00s) === RUN TestSizeToSize cipherSize 1 < header size 18: corrupt file cipherSize 2 < header size 18: corrupt file cipherSize 3 < header size 18: corrupt file cipherSize 4 < header size 18: corrupt file cipherSize 5 < header size 18: corrupt file cipherSize 6 < header size 18: corrupt file cipherSize 7 < header size 18: corrupt file cipherSize 8 < header size 18: corrupt file cipherSize 9 < header size 18: corrupt file cipherSize 10 < header size 18: corrupt file cipherSize 11 < header size 18: corrupt file cipherSize 12 < header size 18: corrupt file cipherSize 13 < header size 18: corrupt file cipherSize 14 < header size 18: corrupt file cipherSize 15 < header size 18: corrupt file cipherSize 16 < header size 18: corrupt file cipherSize 17 < header size 18: corrupt file cipherSize 19: incomplete last block (1 bytes), padding to 51 bytes cipherSize 20: incomplete last block (2 bytes), padding to 51 bytes cipherSize 21: incomplete last block (3 bytes), padding to 51 bytes cipherSize 22: incomplete last block (4 bytes), padding to 51 bytes cipherSize 23: incomplete last block (5 bytes), padding to 51 bytes cipherSize 24: incomplete last block (6 bytes), padding to 51 bytes cipherSize 25: incomplete last block (7 bytes), padding to 51 bytes cipherSize 26: incomplete last block (8 bytes), padding to 51 bytes cipherSize 27: incomplete last block (9 bytes), padding to 51 bytes cipherSize 28: incomplete last block (10 bytes), padding to 51 bytes cipherSize 29: incomplete last block (11 bytes), padding to 51 bytes cipherSize 30: incomplete last block (12 bytes), padding to 51 bytes cipherSize 31: incomplete last block (13 bytes), padding to 51 bytes cipherSize 32: incomplete last block (14 bytes), padding to 51 bytes cipherSize 33: incomplete last block (15 bytes), padding to 51 bytes cipherSize 34: incomplete last block (16 bytes), padding to 51 bytes cipherSize 35: incomplete last block (17 bytes), padding to 51 bytes cipherSize 36: incomplete last block (18 bytes), padding to 51 bytes cipherSize 37: incomplete last block (19 bytes), padding to 51 bytes cipherSize 38: incomplete last block (20 bytes), padding to 51 bytes cipherSize 39: incomplete last block (21 bytes), padding to 51 bytes cipherSize 40: incomplete last block (22 bytes), padding to 51 bytes cipherSize 41: incomplete last block (23 bytes), padding to 51 bytes cipherSize 42: incomplete last block (24 bytes), padding to 51 bytes cipherSize 43: incomplete last block (25 bytes), padding to 51 bytes cipherSize 44: incomplete last block (26 bytes), padding to 51 bytes cipherSize 45: incomplete last block (27 bytes), padding to 51 bytes cipherSize 46: incomplete last block (28 bytes), padding to 51 bytes cipherSize 47: incomplete last block (29 bytes), padding to 51 bytes cipherSize 48: incomplete last block (30 bytes), padding to 51 bytes cipherSize 49: incomplete last block (31 bytes), padding to 51 bytes cipherSize 50: incomplete last block (32 bytes), padding to 51 bytes cipherSize 4147: incomplete last block (1 bytes), padding to 4179 bytes cipherSize 4148: incomplete last block (2 bytes), padding to 4179 bytes cipherSize 4149: incomplete last block (3 bytes), padding to 4179 bytes cipherSize 4150: incomplete last block (4 bytes), padding to 4179 bytes cipherSize 4151: incomplete last block (5 bytes), padding to 4179 bytes cipherSize 4152: incomplete last block (6 bytes), padding to 4179 bytes cipherSize 4153: incomplete last block (7 bytes), padding to 4179 bytes cipherSize 4154: incomplete last block (8 bytes), padding to 4179 bytes cipherSize 4155: incomplete last block (9 bytes), padding to 4179 bytes cipherSize 4156: incomplete last block (10 bytes), padding to 4179 bytes cipherSize 4157: incomplete last block (11 bytes), padding to 4179 bytes cipherSize 4158: incomplete last block (12 bytes), padding to 4179 bytes cipherSize 4159: incomplete last block (13 bytes), padding to 4179 bytes cipherSize 4160: incomplete last block (14 bytes), padding to 4179 bytes cipherSize 4161: incomplete last block (15 bytes), padding to 4179 bytes cipherSize 4162: incomplete last block (16 bytes), padding to 4179 bytes cipherSize 4163: incomplete last block (17 bytes), padding to 4179 bytes cipherSize 4164: incomplete last block (18 bytes), padding to 4179 bytes cipherSize 4165: incomplete last block (19 bytes), padding to 4179 bytes cipherSize 4166: incomplete last block (20 bytes), padding to 4179 bytes cipherSize 4167: incomplete last block (21 bytes), padding to 4179 bytes cipherSize 4168: incomplete last block (22 bytes), padding to 4179 bytes cipherSize 4169: incomplete last block (23 bytes), padding to 4179 bytes cipherSize 4170: incomplete last block (24 bytes), padding to 4179 bytes cipherSize 4171: incomplete last block (25 bytes), padding to 4179 bytes cipherSize 4172: incomplete last block (26 bytes), padding to 4179 bytes cipherSize 4173: incomplete last block (27 bytes), padding to 4179 bytes cipherSize 4174: incomplete last block (28 bytes), padding to 4179 bytes cipherSize 4175: incomplete last block (29 bytes), padding to 4179 bytes cipherSize 4176: incomplete last block (30 bytes), padding to 4179 bytes cipherSize 4177: incomplete last block (31 bytes), padding to 4179 bytes cipherSize 4178: incomplete last block (32 bytes), padding to 4179 bytes cipherSize 8275: incomplete last block (1 bytes), padding to 8307 bytes cipherSize 8276: incomplete last block (2 bytes), padding to 8307 bytes cipherSize 8277: incomplete last block (3 bytes), padding to 8307 bytes cipherSize 8278: incomplete last block (4 bytes), padding to 8307 bytes cipherSize 8279: incomplete last block (5 bytes), padding to 8307 bytes cipherSize 8280: incomplete last block (6 bytes), padding to 8307 bytes cipherSize 8281: incomplete last block (7 bytes), padding to 8307 bytes cipherSize 8282: incomplete last block (8 bytes), padding to 8307 bytes cipherSize 8283: incomplete last block (9 bytes), padding to 8307 bytes cipherSize 8284: incomplete last block (10 bytes), padding to 8307 bytes cipherSize 8285: incomplete last block (11 bytes), padding to 8307 bytes cipherSize 8286: incomplete last block (12 bytes), padding to 8307 bytes cipherSize 8287: incomplete last block (13 bytes), padding to 8307 bytes cipherSize 8288: incomplete last block (14 bytes), padding to 8307 bytes cipherSize 8289: incomplete last block (15 bytes), padding to 8307 bytes cipherSize 8290: incomplete last block (16 bytes), padding to 8307 bytes cipherSize 8291: incomplete last block (17 bytes), padding to 8307 bytes cipherSize 8292: incomplete last block (18 bytes), padding to 8307 bytes cipherSize 8293: incomplete last block (19 bytes), padding to 8307 bytes cipherSize 8294: incomplete last block (20 bytes), padding to 8307 bytes cipherSize 8295: incomplete last block (21 bytes), padding to 8307 bytes cipherSize 8296: incomplete last block (22 bytes), padding to 8307 bytes cipherSize 8297: incomplete last block (23 bytes), padding to 8307 bytes cipherSize 8298: incomplete last block (24 bytes), padding to 8307 bytes cipherSize 8299: incomplete last block (25 bytes), padding to 8307 bytes cipherSize 8300: incomplete last block (26 bytes), padding to 8307 bytes cipherSize 8301: incomplete last block (27 bytes), padding to 8307 bytes cipherSize 8302: incomplete last block (28 bytes), padding to 8307 bytes cipherSize 8303: incomplete last block (29 bytes), padding to 8307 bytes cipherSize 8304: incomplete last block (30 bytes), padding to 8307 bytes cipherSize 8305: incomplete last block (31 bytes), padding to 8307 bytes cipherSize 8306: incomplete last block (32 bytes), padding to 8307 bytes x CipherSizeToPlainSize PlainSizeToCipherSize PlainOffToCipherOff 0 0 0 50 1 0 51 51 18 0 68 68 51 1 101 101 4096 4046 4146 4178 4097 4047 4179 4179 4179 4097 4261 4261 8192 8110 8274 8306 8193 8111 8307 8307 8307 8193 8421 8421 9999 9885 10113 10113 --- PASS: TestSizeToSize (0.00s) PASS ok github.com/rfjakob/gocryptfs/v2/internal/contentenc 0.152s === RUN TestCryptoCoreNew --- PASS: TestCryptoCoreNew (0.00s) === RUN TestNewPanic 2022/01/04 16:48:44 Unsupported key length of 16 bytes --- PASS: TestNewPanic (0.00s) === RUN TestHkdfDerive --- PASS: TestHkdfDerive (0.00s) === RUN TestRandPrefetch --- PASS: TestRandPrefetch (0.10s) PASS ok github.com/rfjakob/gocryptfs/v2/internal/cryptocore 0.260s === RUN TestSanitizePath --- PASS: TestSanitizePath (0.00s) PASS ok github.com/rfjakob/gocryptfs/v2/internal/ctlsocksrv 0.151s ? github.com/rfjakob/gocryptfs/v2/internal/ensurefds012 [no test files] ? github.com/rfjakob/gocryptfs/v2/internal/exitcodes [no test files] ? github.com/rfjakob/gocryptfs/v2/internal/fido2 [no test files] test_helpers: warning: testParentDir "/var/folders/_x/5t9ddfn94s9cx9ln43smhrw80000gn/T//gocryptfs-test-parent-501" does not reside on ext4, we will miss failures caused by ino reuse === RUN TestPrepareAtSyscall prepare_syscall_test.go:18: cipherdir = "/var/folders/_x/5t9ddfn94s9cx9ln43smhrw80000gn/T//gocryptfs-test-parent-501/3519337656/TestPrepareAtSyscall.1459048245" --- PASS: TestPrepareAtSyscall (0.04s) === RUN TestPrepareAtSyscallPlaintextnames --- PASS: TestPrepareAtSyscallPlaintextnames (0.03s) === RUN TestEncryptDecryptXattrName Could not stat backing directory "": no such file or directory DetectQuirks: Statfs on "" failed: no such file or directory xattr_unit_test.go:40: cAttr=user.gocryptfs.22EILvJ6YPKH9RSSHlPZR3aG0I4fyay43G3MUVQNi6c --- PASS: TestEncryptDecryptXattrName (0.00s) PASS ok github.com/rfjakob/gocryptfs/v2/internal/fusefrontend 0.231s === RUN TestShouldPrefixExcludeValuesWithSlash --- PASS: TestShouldPrefixExcludeValuesWithSlash (0.00s) === RUN TestShouldReadExcludePatternsFromFiles --- PASS: TestShouldReadExcludePatternsFromFiles (0.00s) === RUN TestShouldReturnFalseIfThereAreNoExclusions --- PASS: TestShouldReturnFalseIfThereAreNoExclusions (0.00s) PASS ok github.com/rfjakob/gocryptfs/v2/internal/fusefrontend_reverse 0.151s === RUN TestTranslate --- PASS: TestTranslate (0.00s) === RUN TestTranslateStress InoMap: opening spillMap for {{12345 0} 281474976710656} --- PASS: TestTranslateStress (0.00s) === RUN TestSpill --- PASS: TestSpill (0.00s) === RUN TestUniqueness --- PASS: TestUniqueness (0.00s) PASS ok github.com/rfjakob/gocryptfs/v2/internal/inomap 0.170s === RUN TestIsLongName --- PASS: TestIsLongName (0.00s) === RUN TestRemoveLongNameSuffix --- PASS: TestRemoveLongNameSuffix (0.00s) === RUN TestLongNameMax EncryptName "": invalid plainName: empty input --- PASS: TestLongNameMax (0.00s) === RUN TestPad16 --- PASS: TestPad16 (0.00s) === RUN TestUnpad16Garbage --- PASS: TestUnpad16Garbage (0.00s) === RUN TestIsValidName --- PASS: TestIsValidName (0.00s) === RUN TestIsValidXattrName --- PASS: TestIsValidXattrName (0.00s) PASS ok github.com/rfjakob/gocryptfs/v2/internal/nametransform 0.157s ? github.com/rfjakob/gocryptfs/v2/internal/openfiletable [no test files] === RUN TestBlockIV --- PASS: TestBlockIV (0.00s) PASS ok github.com/rfjakob/gocryptfs/v2/internal/pathiv 0.188s === RUN TestExtpass --- PASS: TestExtpass (0.00s) === RUN TestOnceExtpass --- PASS: TestOnceExtpass (0.00s) === RUN TestOnceExtpass2 --- PASS: TestOnceExtpass2 (0.00s) === RUN TestOnceExtpass3 --- PASS: TestOnceExtpass3 (0.00s) === RUN TestOnceExtpassSpaces --- PASS: TestOnceExtpassSpaces (0.00s) === RUN TestTwiceExtpass --- PASS: TestTwiceExtpass (0.00s) === RUN TestExtpassEmpty --- PASS: TestExtpassEmpty (0.00s) === RUN TestPassfile warning: passfile: ignoring trailing garbage (8 bytes) after first line warning: passfile: ignoring trailing garbage (8 bytes) after first line --- PASS: TestPassfile (0.00s) === RUN TestPassfileEmpty --- PASS: TestPassfileEmpty (0.00s) === RUN TestPassfileNewline --- PASS: TestPassfileNewline (0.00s) === RUN TestPassfileEmptyFirstLine --- PASS: TestPassfileEmptyFirstLine (0.00s) === RUN TestPassFileConcatenate warning: passfile: ignoring trailing garbage (8 bytes) after first line --- PASS: TestPassFileConcatenate (0.00s) === RUN TestStdin --- PASS: TestStdin (0.00s) === RUN TestStdinEof --- PASS: TestStdinEof (0.00s) === RUN TestStdinEmpty --- PASS: TestStdinEmpty (0.00s) PASS ok github.com/rfjakob/gocryptfs/v2/internal/readpassword 0.176s === RUN TestKeyLens --- PASS: TestKeyLens (0.00s) === RUN TestK32 --- PASS: TestK32 (0.00s) === RUN TestK64 --- PASS: TestK64 (0.00s) PASS ok github.com/rfjakob/gocryptfs/v2/internal/siv_aead 0.161s testing: warning: no tests to run PASS ok github.com/rfjakob/gocryptfs/v2/internal/speed 0.160s [no tests to run] ? github.com/rfjakob/gocryptfs/v2/internal/stupidgcm [no test files] === RUN TestEmulateMknodat --- PASS: TestEmulateMknodat (0.00s) === RUN TestOpenNofollow --- PASS: TestOpenNofollow (0.00s) === RUN TestReadlinkat sys_common_test.go:21: skipping targetLen=4000: file name too long --- PASS: TestReadlinkat (0.00s) === RUN TestOpenat --- PASS: TestOpenat (0.00s) === RUN TestRenameat --- PASS: TestRenameat (0.00s) === RUN TestUnlinkat --- PASS: TestUnlinkat (0.00s) === RUN TestFchmodatNofollow --- PASS: TestFchmodatNofollow (0.00s) === RUN TestSymlinkat --- PASS: TestSymlinkat (0.00s) === RUN TestMkdirat --- PASS: TestMkdirat (0.00s) === RUN TestFstatat --- PASS: TestFstatat (0.00s) PASS ok github.com/rfjakob/gocryptfs/v2/internal/syscallcompat 0.159s === RUN TestTrimNewline --- PASS: TestTrimNewline (0.00s) PASS ok github.com/rfjakob/gocryptfs/v2/internal/tlog 0.164s test_helpers: warning: testParentDir "/var/folders/_x/5t9ddfn94s9cx9ln43smhrw80000gn/T//gocryptfs-test-parent-501" does not reside on ext4, we will miss failures caused by ino reuse === RUN TestInit --- PASS: TestInit (0.04s) === RUN TestInitFilePerms --- PASS: TestInitFilePerms (0.03s) === RUN TestInitDevRandom --- PASS: TestInitDevRandom (0.03s) === RUN TestInitAessiv --- PASS: TestInitAessiv (0.04s) === RUN TestInitReverse --- PASS: TestInitReverse (0.03s) === RUN TestPasswd --- PASS: TestPasswd (0.20s) === RUN TestPasswdMasterkey --- PASS: TestPasswdMasterkey (0.12s) === RUN TestPasswdMasterkeyStdin --- PASS: TestPasswdMasterkeyStdin (0.12s) === RUN TestPasswdReverse --- PASS: TestPasswdReverse (0.09s) === RUN TestPasswdScryptn --- PASS: TestPasswdScryptn (0.09s) === RUN TestInitConfig --- PASS: TestInitConfig (0.06s) === RUN TestRo fs.Mount failed: read-only file system cli_test.go:333: mount failed: exit status 19 --- FAIL: TestRo (0.05s) === RUN TestNonempty warning: haveFusermount2: fork/exec /bin/fusermount: no such file or directory -wpanic turns this warning into a panic: warning: haveFusermount2: fork/exec /bin/fusermount: no such file or directory panic: -wpanic turns this warning into a panic: warning: haveFusermount2: fork/exec /bin/fusermount: no such file or directory goroutine 1 [running]: log.(*Logger).Panic(0x140000ca1e0, {0x1400031b618, 0x1, 0x1}) log/log.go:224 +0x90 github.com/rfjakob/gocryptfs/v2/internal/tlog.(*toggledLogger).Printf(0x1400009a780, {0x1024e0d99, 0x1c}, {0x1400031b698, 0x1, 0x1}) github.com/rfjakob/gocryptfs/v2/internal/tlog/log.go:78 +0x168 main.haveFusermount2() github.com/rfjakob/gocryptfs/v2/mount.go:499 +0x148 main.initGoFuse({0x102585330, 0x140000c9400}, 0x1400031bd98) github.com/rfjakob/gocryptfs/v2/mount.go:414 +0x418 main.doMount(0x1400031bd98) github.com/rfjakob/gocryptfs/v2/mount.go:115 +0x74c main.main() github.com/rfjakob/gocryptfs/v2/main.go:305 +0xbe0 cli_test.go:364: mount failed: exit status 2 --- FAIL: TestNonempty (0.04s) === RUN TestNofail --- PASS: TestNofail (0.06s) === RUN TestShadows --- PASS: TestShadows (0.06s) === RUN TestMountPasswordIncorrect cli_test.go:410: want=12, got=20 --- FAIL: TestMountPasswordIncorrect (0.03s) === RUN TestMountPasswordEmpty cli_test.go:427: want=9, got=20 --- FAIL: TestMountPasswordEmpty (0.03s) === RUN TestPasswdPasswordIncorrect --- PASS: TestPasswdPasswordIncorrect (0.03s) === RUN TestMountBackground --- PASS: TestMountBackground (0.06s) === RUN TestMultipleOperationFlags --- PASS: TestMultipleOperationFlags (0.03s) === RUN TestNoexec --- PASS: TestNoexec (0.06s) === RUN TestMissingOArg --- PASS: TestMissingOArg (0.00s) === RUN TestExcludeForward cli_test.go:578: exit status 29 --- PASS: TestExcludeForward (0.03s) === RUN TestConfigPipe --- PASS: TestConfigPipe (0.06s) === RUN TestComma --- PASS: TestComma (0.06s) === RUN TestIdle --- PASS: TestIdle (0.06s) === RUN TestNotIdle --- PASS: TestNotIdle (2.22s) === RUN TestSymlinkedCipherdir --- PASS: TestSymlinkedCipherdir (0.07s) === RUN TestBadname OpenDir ".": invalid entry "p2Z-4XU8kYrKQ9yKoCzgzAwrongPattern": bad message decryptName "mzaZRF9_0IU-_5vv2wPC_i": unPad16 error: Padding too long, padLen=85 > 16 decryptName "mzaZRF9_0IU-_5vv2wP_in": unPad16 error: Padding too long, padLen=119 > 16 --- PASS: TestBadname (0.09s) === RUN TestPassfile --- PASS: TestPassfile (0.06s) === RUN TestPassfileX2 --- PASS: TestPassfileX2 (0.06s) === RUN TestInitNotEmpty Invalid cipherdir: directory /var/folders/_x/5t9ddfn94s9cx9ln43smhrw80000gn/T/gocryptfs-test-parent-501/1127588411/TestInitNotEmpty not empty --- PASS: TestInitNotEmpty (0.00s) === RUN TestSharedstorage --- PASS: TestSharedstorage (0.06s) === RUN TestMountCreat --- PASS: TestMountCreat (0.09s) === RUN TestLongnamemax100 --- PASS: TestLongnamemax100 (0.19s) === RUN TestInitXchacha --- PASS: TestInitXchacha (0.03s) === RUN TestXchacha --- PASS: TestXchacha (0.07s) === RUN TestZerokey --- PASS: TestZerokey (0.14s) FAIL FAIL github.com/rfjakob/gocryptfs/v2/tests/cli 4.789s test_helpers: warning: testParentDir "/var/folders/_x/5t9ddfn94s9cx9ln43smhrw80000gn/T//gocryptfs-test-parent-501" does not reside on ext4, we will miss failures caused by ino reuse === RUN TestCpA --- PASS: TestCpA (0.04s) === RUN TestAcl543 acl_test.go:105: exec: "setfacl": executable file not found in $PATH --- SKIP: TestAcl543 (0.00s) === RUN TestXattrOverflow --- PASS: TestXattrOverflow (0.00s) === RUN TestCtlSock ctlsock: listen unix /var/folders/_x/5t9ddfn94s9cx9ln43smhrw80000gn/T/gocryptfs-test-parent-501/282042376/TestCtlSock.3272906676.sock: bind: invalid argument ctlsock_test.go:16: mount failed: exit status 20 --- FAIL: TestCtlSock (0.03s) === RUN TestCtlSockDecrypt ctlsock: listen unix /var/folders/_x/5t9ddfn94s9cx9ln43smhrw80000gn/T/gocryptfs-test-parent-501/282042376/TestCtlSockDecrypt.2873659527.sock: bind: invalid argument ctlsock_test.go:46: mount failed: exit status 20 --- FAIL: TestCtlSockDecrypt (0.03s) === RUN TestCtlSockDecryptCrash ctlsock: listen unix /var/folders/_x/5t9ddfn94s9cx9ln43smhrw80000gn/T/gocryptfs-test-parent-501/282042376/TestCtlSockDecryptCrash.1254687497.sock: bind: invalid argument ctlsock_test.go:96: mount failed: exit status 20 --- FAIL: TestCtlSockDecryptCrash (0.03s) === RUN TestDirIVRace --- PASS: TestDirIVRace (0.00s) === RUN Test1980Tar --- PASS: Test1980Tar (0.03s) === RUN TestOpenTruncateRead --- PASS: TestOpenTruncateRead (0.00s) === RUN TestWORead --- PASS: TestWORead (0.00s) === RUN TestXfs124 --- PASS: TestXfs124 (0.37s) === RUN TestWrite0200File --- PASS: TestWrite0200File (0.00s) === RUN TestMvWarnings --- PASS: TestMvWarnings (0.01s) === RUN TestMvWarningSymlink --- PASS: TestMvWarningSymlink (0.00s) === RUN TestCpWarnings --- PASS: TestCpWarnings (0.00s) === RUN TestSeekData main_test.go:294: seek /var/folders/_x/5t9ddfn94s9cx9ln43smhrw80000gn/T/gocryptfs-test-parent-501/282042376/default-plain/TestSeekData: invalid argument --- FAIL: TestSeekData (0.94s) === RUN TestMd5sumMaintainers umount(/private/var/folders/_x/5t9ddfn94s9cx9ln43smhrw80000gn/T/gocryptfs-test-parent-501/282042376/default-plain): Resource busy -- try 'diskutil unmount' UnmountErr: got exit code 1, retrying (1/10) umount(/private/var/folders/_x/5t9ddfn94s9cx9ln43smhrw80000gn/T/gocryptfs-test-parent-501/282042376/default-plain): Resource busy -- try 'diskutil unmount' UnmountErr: got exit code 1, retrying (2/10) umount(/private/var/folders/_x/5t9ddfn94s9cx9ln43smhrw80000gn/T/gocryptfs-test-parent-501/282042376/default-plain): Resource busy -- try 'diskutil unmount' UnmountErr: got exit code 1, retrying (3/10) umount(/private/var/folders/_x/5t9ddfn94s9cx9ln43smhrw80000gn/T/gocryptfs-test-parent-501/282042376/default-plain): Resource busy -- try 'diskutil unmount' UnmountErr: got exit code 1, retrying (4/10) umount(/private/var/folders/_x/5t9ddfn94s9cx9ln43smhrw80000gn/T/gocryptfs-test-parent-501/282042376/default-plain): Resource busy -- try 'diskutil unmount' UnmountErr: got exit code 1, retrying (5/10) umount(/private/var/folders/_x/5t9ddfn94s9cx9ln43smhrw80000gn/T/gocryptfs-test-parent-501/282042376/default-plain): Resource busy -- try 'diskutil unmount' UnmountErr: got exit code 1, retrying (6/10) umount(/private/var/folders/_x/5t9ddfn94s9cx9ln43smhrw80000gn/T/gocryptfs-test-parent-501/282042376/default-plain): Resource busy -- try 'diskutil unmount' UnmountErr: got exit code 1, retrying (7/10) umount(/private/var/folders/_x/5t9ddfn94s9cx9ln43smhrw80000gn/T/gocryptfs-test-parent-501/282042376/default-plain): Resource busy -- try 'diskutil unmount' UnmountErr: got exit code 1, retrying (8/10) umount(/private/var/folders/_x/5t9ddfn94s9cx9ln43smhrw80000gn/T/gocryptfs-test-parent-501/282042376/default-plain): Resource busy -- try 'diskutil unmount' UnmountErr: got exit code 1, retrying (9/10) umount(/private/var/folders/_x/5t9ddfn94s9cx9ln43smhrw80000gn/T/gocryptfs-test-parent-501/282042376/default-plain): Resource busy -- try 'diskutil unmount' UnmountErr: got exit code 1, retrying (10/10) UnmountPanic: exit status 1. Running lsof /var/folders/_x/5t9ddfn94s9cx9ln43smhrw80000gn/T//gocryptfs-test-parent-501/282042376/default-plain timeout!--- FAIL: TestMd5sumMaintainers (17.20s) panic: UnmountPanic: unmount failed: exit status 1 [recovered] panic: UnmountPanic: unmount failed: exit status 1 goroutine 50 [running]: testing.tRunner.func1.2({0x104f57820, 0x1400005e9c0}) /opt/local/lib/go/src/testing/testing.go:1209 +0x258 testing.tRunner.func1(0x14000083860) /opt/local/lib/go/src/testing/testing.go:1212 +0x284 panic({0x104f57820, 0x1400005e9c0}) /opt/local/lib/go/src/runtime/panic.go:1038 +0x21c github.com/rfjakob/gocryptfs/v2/tests/test_helpers.UnmountPanic({0x14000152000, 0x63}) /Users/marcel/workspace/gocryptfs/tests/test_helpers/mount_unmount.go:144 +0x268 github.com/rfjakob/gocryptfs/v2/tests/defaults.TestMd5sumMaintainers(0x14000083860) /Users/marcel/workspace/gocryptfs/tests/defaults/main_test.go:361 +0x1a8 testing.tRunner(0x14000083860, 0x104f8ddb8) /opt/local/lib/go/src/testing/testing.go:1259 +0x104 created by testing.(*T).Run /opt/local/lib/go/src/testing/testing.go:1306 +0x328 FAIL github.com/rfjakob/gocryptfs/v2/tests/defaults 19.027s test_helpers: warning: testParentDir "/var/folders/_x/5t9ddfn94s9cx9ln43smhrw80000gn/T//gocryptfs-test-parent-501" does not reside on ext4, we will miss failures caused by ino reuse === RUN TestDeterministicNames --- PASS: TestDeterministicNames (0.00s) PASS ok github.com/rfjakob/gocryptfs/v2/tests/deterministic_names 0.236s test_helpers: warning: testParentDir "/var/folders/_x/5t9ddfn94s9cx9ln43smhrw80000gn/T//gocryptfs-test-parent-501" does not reside on ext4, we will miss failures caused by ino reuse Skipping OpenSSL tests, I have been compiled without openssl support example_filesystems: testing with "-openssl=false" === RUN TestExampleFSv04 --- PASS: TestExampleFSv04 (0.00s) === RUN TestExampleFSv05 --- PASS: TestExampleFSv05 (0.00s) === RUN TestExampleFSv06 --- PASS: TestExampleFSv06 (0.00s) === RUN TestExampleFSv06PlaintextNames --- PASS: TestExampleFSv06PlaintextNames (0.00s) === RUN TestExampleFSv07 --- PASS: TestExampleFSv07 (0.07s) === RUN TestExampleFSv07PlaintextNames --- PASS: TestExampleFSv07PlaintextNames (0.06s) === RUN TestExampleFSv09 --- PASS: TestExampleFSv09 (0.07s) === RUN TestExampleFSv11 --- PASS: TestExampleFSv11 (0.07s) === RUN TestExampleFSv11reverse fs.Mount failed: read-only file system example_filesystems_test.go:201: mount failed: exit status 19 --- FAIL: TestExampleFSv11reverse (0.02s) === RUN TestExampleFSv11reversePlaintextnames fs.Mount failed: read-only file system example_filesystems_test.go:238: mount failed: exit status 19 --- FAIL: TestExampleFSv11reversePlaintextnames (0.02s) === RUN TestExampleFSv13 --- PASS: TestExampleFSv13 (0.07s) === RUN TestExampleFSv13MasterkeyStdin --- PASS: TestExampleFSv13MasterkeyStdin (0.04s) === RUN TestExampleFSv13reverse fs.Mount failed: read-only file system example_filesystems_test.go:337: mount failed: exit status 19 --- FAIL: TestExampleFSv13reverse (0.13s) === RUN TestExampleFSv22deterministicNames --- PASS: TestExampleFSv22deterministicNames (0.07s) === RUN TestExampleFSv22xchacha --- PASS: TestExampleFSv22xchacha (0.07s) === RUN TestExampleFSv22xchachaDeterministicNames --- PASS: TestExampleFSv22xchachaDeterministicNames (0.07s) FAIL FAIL github.com/rfjakob/gocryptfs/v2/tests/example_filesystems 0.936s test_helpers: warning: testParentDir "/var/folders/_x/5t9ddfn94s9cx9ln43smhrw80000gn/T//gocryptfs-test-parent-501" does not reside on ext4, we will miss failures caused by ino reuse === RUN TestBrokenFsV14 fsck_test.go:45: Reading password from extpass program "echo", arguments: ["test"] Decrypting master key fs.Mount failed: read-only file system Maybe you should run: /Library/Filesystems/osxfuse.fs/Contents/Resources/load_osxfuse fsck_test.go:48: wrong exit code, have=19 want=26 --- FAIL: TestBrokenFsV14 (0.14s) === RUN TestExampleFses fsck_test.go:75: Checking "v0.4" fsck_test.go:75: Checking "v2.2-xchacha" fsck_test.go:85: Reading password from extpass program "echo", arguments: ["test"] Decrypting master key fs.Mount failed: read-only file system Maybe you should run: /Library/Filesystems/osxfuse.fs/Contents/Resources/load_osxfuse fsck_test.go:86: fsck returned code 19 but fs should be clean fsck_test.go:75: Checking "v0.5" fsck_test.go:75: Checking "v0.7-plaintextnames" fsck_test.go:85: Reading password from extpass program "echo", arguments: ["test"] Decrypting master key fs.Mount failed: read-only file system Maybe you should run: /Library/Filesystems/osxfuse.fs/Contents/Resources/load_osxfuse fsck_test.go:86: fsck returned code 19 but fs should be clean fsck_test.go:75: Checking "v2.2-xchacha-deterministic-names" fsck_test.go:85: Reading password from extpass program "echo", arguments: ["test"] Decrypting master key fs.Mount failed: read-only file system Maybe you should run: /Library/Filesystems/osxfuse.fs/Contents/Resources/load_osxfuse fsck_test.go:86: fsck returned code 19 but fs should be clean fsck_test.go:75: Checking "v0.7" fsck_test.go:85: Reading password from extpass program "echo", arguments: ["test"] Decrypting master key fs.Mount failed: read-only file system Maybe you should run: /Library/Filesystems/osxfuse.fs/Contents/Resources/load_osxfuse fsck_test.go:86: fsck returned code 19 but fs should be clean fsck_test.go:75: Checking "v0.9" fsck_test.go:85: Reading password from extpass program "echo", arguments: ["test"] Decrypting master key fs.Mount failed: read-only file system Maybe you should run: /Library/Filesystems/osxfuse.fs/Contents/Resources/load_osxfuse fsck_test.go:86: fsck returned code 19 but fs should be clean fsck_test.go:75: Checking "v0.6-plaintextnames" fsck_test.go:75: Checking "v0.6" fsck_test.go:75: Checking "v2.2-deterministic-names" fsck_test.go:85: Reading password from extpass program "echo", arguments: ["test"] Decrypting master key fs.Mount failed: read-only file system Maybe you should run: /Library/Filesystems/osxfuse.fs/Contents/Resources/load_osxfuse fsck_test.go:86: fsck returned code 19 but fs should be clean fsck_test.go:75: Checking "v1.1-aessiv" fsck_test.go:85: Reading password from extpass program "echo", arguments: ["test"] Decrypting master key fs.Mount failed: read-only file system Maybe you should run: /Library/Filesystems/osxfuse.fs/Contents/Resources/load_osxfuse fsck_test.go:86: fsck returned code 19 but fs should be clean fsck_test.go:75: Checking "v1.3" fsck_test.go:85: Reading password from extpass program "echo", arguments: ["test"] Decrypting master key fs.Mount failed: read-only file system Maybe you should run: /Library/Filesystems/osxfuse.fs/Contents/Resources/load_osxfuse fsck_test.go:86: fsck returned code 19 but fs should be clean --- FAIL: TestExampleFses (0.14s) === RUN TestTerabyteFile fsck_test.go:96: Only linux supports SEEK_DATA --- SKIP: TestTerabyteFile (0.00s) FAIL FAIL github.com/rfjakob/gocryptfs/v2/tests/fsck 0.445s test_helpers: warning: testParentDir "/var/folders/_x/5t9ddfn94s9cx9ln43smhrw80000gn/T//gocryptfs-test-parent-501" does not reside on ext4, we will miss failures caused by ino reuse === RUN TestBrokenContent doRead 33225765: corrupt block #0: cipher: message authentication failed --- PASS: TestBrokenContent (0.04s) === RUN TestBrokenNames --- PASS: TestBrokenNames (0.03s) PASS ok github.com/rfjakob/gocryptfs/v2/tests/hkdf_sanity 0.246s test_helpers: warning: testParentDir "/var/folders/_x/5t9ddfn94s9cx9ln43smhrw80000gn/T//gocryptfs-test-parent-501" does not reside on ext4, we will miss failures caused by ino reuse matrix: testcase = matrix.testcaseMatrix{plaintextnames:false, openssl:"auto", aessiv:false, raw64:false, extraArgs:[]string(nil)} === RUN TestConcurrentReadWrite --- PASS: TestConcurrentReadWrite (0.05s) === RUN TestConcurrentReadCreate --- PASS: TestConcurrentReadCreate (0.04s) === RUN TestInoReuse --- PASS: TestInoReuse (0.44s) === RUN TestMkdirRmdir --- PASS: TestMkdirRmdir (0.00s) === RUN TestDirOverwrite --- PASS: TestDirOverwrite (0.00s) === RUN TestRmdirPerms --- PASS: TestRmdirPerms (0.01s) === RUN TestHaveDotdot --- PASS: TestHaveDotdot (0.00s) === RUN TestFallocate fallocate_test.go:39: OSX does not support fallocate --- SKIP: TestFallocate (0.00s) === RUN TestWrite10 --- PASS: TestWrite10 (0.00s) === RUN TestWrite100 --- PASS: TestWrite100 (0.00s) === RUN TestWrite1M --- PASS: TestWrite1M (0.02s) === RUN TestWrite100x100 --- PASS: TestWrite100x100 (0.01s) === RUN TestWrite10Tight --- PASS: TestWrite10Tight (0.05s) === RUN TestTruncate --- PASS: TestTruncate (0.10s) === RUN TestAppend --- PASS: TestAppend (0.14s) === RUN TestFileHoles --- PASS: TestFileHoles (0.00s) === RUN TestRmwRace --- PASS: TestRmwRace (0.17s) === RUN TestFiltered --- PASS: TestFiltered (0.00s) === RUN TestFilenameEncryption --- PASS: TestFilenameEncryption (0.00s) === RUN TestRename --- PASS: TestRename (0.00s) === RUN TestNameLengths --- PASS: TestNameLengths (0.19s) === RUN TestLongNames --- PASS: TestLongNames (0.01s) === RUN TestLongLink --- PASS: TestLongLink (0.00s) === RUN TestLchown --- PASS: TestLchown (0.00s) === RUN TestUtimesNanoSymlink matrix_test.go:656: MacOS "touch" does not support "--no-dereference" --- SKIP: TestUtimesNanoSymlink (0.00s) === RUN TestUtimesNano --- PASS: TestUtimesNano (0.00s) === RUN TestUtimesNanoFd matrix_test.go:753: MacOS does not have /proc --- SKIP: TestUtimesNanoFd (0.00s) === RUN TestMkfifo --- PASS: TestMkfifo (0.00s) === RUN TestMagicNames matrix_test.go:788: Testing n="warmup1" matrix_test.go:788: Testing n="warmup2" matrix_test.go:788: Testing n="gocryptfs.longname.QhUr5d9FHerwEs--muUs6_80cy6JRp89c1otLwp92Cs" matrix_test.go:788: Testing n="gocryptfs.diriv" --- PASS: TestMagicNames (0.01s) === RUN TestChmod --- PASS: TestChmod (0.00s) === RUN TestAccess --- PASS: TestAccess (0.00s) === RUN TestStatfs --- PASS: TestStatfs (0.00s) === RUN TestSymlinkSize --- PASS: TestSymlinkSize (0.00s) === RUN TestPwd --- PASS: TestPwd (0.17s) PASS matrix: run took 1.421339333s matrix: testcase = matrix.testcaseMatrix{plaintextnames:false, openssl:"false", aessiv:false, raw64:false, extraArgs:[]string(nil)} === RUN TestConcurrentReadWrite --- PASS: TestConcurrentReadWrite (0.04s) === RUN TestConcurrentReadCreate --- PASS: TestConcurrentReadCreate (0.04s) === RUN TestInoReuse --- PASS: TestInoReuse (0.48s) === RUN TestMkdirRmdir --- PASS: TestMkdirRmdir (0.00s) === RUN TestDirOverwrite --- PASS: TestDirOverwrite (0.00s) === RUN TestRmdirPerms --- PASS: TestRmdirPerms (0.01s) === RUN TestHaveDotdot --- PASS: TestHaveDotdot (0.00s) === RUN TestFallocate fallocate_test.go:39: OSX does not support fallocate --- SKIP: TestFallocate (0.00s) === RUN TestWrite10 --- PASS: TestWrite10 (0.00s) === RUN TestWrite100 --- PASS: TestWrite100 (0.00s) === RUN TestWrite1M --- PASS: TestWrite1M (0.02s) === RUN TestWrite100x100 --- PASS: TestWrite100x100 (0.01s) === RUN TestWrite10Tight --- PASS: TestWrite10Tight (0.05s) === RUN TestTruncate --- PASS: TestTruncate (0.10s) === RUN TestAppend --- PASS: TestAppend (0.14s) === RUN TestFileHoles --- PASS: TestFileHoles (0.00s) === RUN TestRmwRace --- PASS: TestRmwRace (0.17s) === RUN TestFiltered --- PASS: TestFiltered (0.00s) === RUN TestFilenameEncryption --- PASS: TestFilenameEncryption (0.00s) === RUN TestRename --- PASS: TestRename (0.00s) === RUN TestNameLengths --- PASS: TestNameLengths (0.19s) === RUN TestLongNames --- PASS: TestLongNames (0.01s) === RUN TestLongLink --- PASS: TestLongLink (0.00s) === RUN TestLchown --- PASS: TestLchown (0.00s) === RUN TestUtimesNanoSymlink matrix_test.go:656: MacOS "touch" does not support "--no-dereference" --- SKIP: TestUtimesNanoSymlink (0.00s) === RUN TestUtimesNano --- PASS: TestUtimesNano (0.00s) === RUN TestUtimesNanoFd matrix_test.go:753: MacOS does not have /proc --- SKIP: TestUtimesNanoFd (0.00s) === RUN TestMkfifo --- PASS: TestMkfifo (0.00s) === RUN TestMagicNames matrix_test.go:788: Testing n="warmup1" matrix_test.go:788: Testing n="warmup2" matrix_test.go:788: Testing n="gocryptfs.longname.QhUr5d9FHerwEs--muUs6_80cy6JRp89c1otLwp92Cs" matrix_test.go:788: Testing n="gocryptfs.diriv" --- PASS: TestMagicNames (0.01s) === RUN TestChmod --- PASS: TestChmod (0.00s) === RUN TestAccess --- PASS: TestAccess (0.00s) === RUN TestStatfs --- PASS: TestStatfs (0.00s) === RUN TestSymlinkSize --- PASS: TestSymlinkSize (0.00s) === RUN TestPwd --- PASS: TestPwd (0.01s) PASS matrix: run took 1.295181666s matrix: testcase = matrix.testcaseMatrix{plaintextnames:true, openssl:"false", aessiv:false, raw64:false, extraArgs:[]string(nil)} === RUN TestConcurrentReadWrite --- PASS: TestConcurrentReadWrite (0.04s) === RUN TestConcurrentReadCreate --- PASS: TestConcurrentReadCreate (0.05s) === RUN TestInoReuse --- PASS: TestInoReuse (0.45s) === RUN TestMkdirRmdir --- PASS: TestMkdirRmdir (0.01s) === RUN TestDirOverwrite --- PASS: TestDirOverwrite (0.00s) === RUN TestRmdirPerms --- PASS: TestRmdirPerms (0.00s) === RUN TestHaveDotdot --- PASS: TestHaveDotdot (0.00s) === RUN TestFallocate fallocate_test.go:39: OSX does not support fallocate --- SKIP: TestFallocate (0.00s) === RUN TestWrite10 --- PASS: TestWrite10 (0.00s) === RUN TestWrite100 --- PASS: TestWrite100 (0.00s) === RUN TestWrite1M --- PASS: TestWrite1M (0.02s) === RUN TestWrite100x100 --- PASS: TestWrite100x100 (0.01s) === RUN TestWrite10Tight --- PASS: TestWrite10Tight (0.04s) === RUN TestTruncate --- PASS: TestTruncate (0.10s) === RUN TestAppend --- PASS: TestAppend (0.14s) === RUN TestFileHoles --- PASS: TestFileHoles (0.00s) === RUN TestRmwRace --- PASS: TestRmwRace (0.18s) === RUN TestFiltered --- PASS: TestFiltered (0.00s) === RUN TestFilenameEncryption --- PASS: TestFilenameEncryption (0.00s) === RUN TestRename --- PASS: TestRename (0.00s) === RUN TestNameLengths --- PASS: TestNameLengths (0.19s) === RUN TestLongNames --- PASS: TestLongNames (0.01s) === RUN TestLongLink --- PASS: TestLongLink (0.00s) === RUN TestLchown --- PASS: TestLchown (0.00s) === RUN TestUtimesNanoSymlink matrix_test.go:656: MacOS "touch" does not support "--no-dereference" --- SKIP: TestUtimesNanoSymlink (0.00s) === RUN TestUtimesNano --- PASS: TestUtimesNano (0.00s) === RUN TestUtimesNanoFd matrix_test.go:753: MacOS does not have /proc --- SKIP: TestUtimesNanoFd (0.00s) === RUN TestMkfifo --- PASS: TestMkfifo (0.00s) === RUN TestMagicNames matrix_test.go:788: Testing n="warmup1" matrix_test.go:788: Testing n="warmup2" matrix_test.go:788: Testing n="gocryptfs.longname.QhUr5d9FHerwEs--muUs6_80cy6JRp89c1otLwp92Cs" matrix_test.go:788: Testing n="gocryptfs.diriv" --- PASS: TestMagicNames (0.01s) === RUN TestChmod --- PASS: TestChmod (0.00s) === RUN TestAccess --- PASS: TestAccess (0.00s) === RUN TestStatfs --- PASS: TestStatfs (0.00s) === RUN TestSymlinkSize --- PASS: TestSymlinkSize (0.00s) === RUN TestPwd --- PASS: TestPwd (0.01s) PASS matrix: run took 1.281553875s matrix: testcase = matrix.testcaseMatrix{plaintextnames:false, openssl:"auto", aessiv:true, raw64:false, extraArgs:[]string(nil)} === RUN TestConcurrentReadWrite --- PASS: TestConcurrentReadWrite (0.05s) === RUN TestConcurrentReadCreate --- PASS: TestConcurrentReadCreate (0.05s) === RUN TestInoReuse --- PASS: TestInoReuse (0.47s) === RUN TestMkdirRmdir --- PASS: TestMkdirRmdir (0.00s) === RUN TestDirOverwrite --- PASS: TestDirOverwrite (0.00s) === RUN TestRmdirPerms --- PASS: TestRmdirPerms (0.00s) === RUN TestHaveDotdot --- PASS: TestHaveDotdot (0.00s) === RUN TestFallocate fallocate_test.go:39: OSX does not support fallocate --- SKIP: TestFallocate (0.00s) === RUN TestWrite10 --- PASS: TestWrite10 (0.00s) === RUN TestWrite100 --- PASS: TestWrite100 (0.00s) === RUN TestWrite1M --- PASS: TestWrite1M (0.02s) === RUN TestWrite100x100 --- PASS: TestWrite100x100 (0.01s) === RUN TestWrite10Tight --- PASS: TestWrite10Tight (0.05s) === RUN TestTruncate --- PASS: TestTruncate (0.10s) === RUN TestAppend --- PASS: TestAppend (0.16s) === RUN TestFileHoles --- PASS: TestFileHoles (0.00s) === RUN TestRmwRace --- PASS: TestRmwRace (0.20s) === RUN TestFiltered --- PASS: TestFiltered (0.00s) === RUN TestFilenameEncryption --- PASS: TestFilenameEncryption (0.00s) === RUN TestRename --- PASS: TestRename (0.00s) === RUN TestNameLengths --- PASS: TestNameLengths (0.20s) === RUN TestLongNames --- PASS: TestLongNames (0.01s) === RUN TestLongLink --- PASS: TestLongLink (0.00s) === RUN TestLchown --- PASS: TestLchown (0.00s) === RUN TestUtimesNanoSymlink matrix_test.go:656: MacOS "touch" does not support "--no-dereference" --- SKIP: TestUtimesNanoSymlink (0.00s) === RUN TestUtimesNano --- PASS: TestUtimesNano (0.00s) === RUN TestUtimesNanoFd matrix_test.go:753: MacOS does not have /proc --- SKIP: TestUtimesNanoFd (0.00s) === RUN TestMkfifo --- PASS: TestMkfifo (0.00s) === RUN TestMagicNames matrix_test.go:788: Testing n="warmup1" matrix_test.go:788: Testing n="warmup2" matrix_test.go:788: Testing n="gocryptfs.longname.QhUr5d9FHerwEs--muUs6_80cy6JRp89c1otLwp92Cs" matrix_test.go:788: Testing n="gocryptfs.diriv" --- PASS: TestMagicNames (0.01s) === RUN TestChmod --- PASS: TestChmod (0.00s) === RUN TestAccess --- PASS: TestAccess (0.00s) === RUN TestStatfs --- PASS: TestStatfs (0.00s) === RUN TestSymlinkSize --- PASS: TestSymlinkSize (0.00s) === RUN TestPwd --- PASS: TestPwd (0.01s) PASS matrix: run took 1.3656695s matrix: testcase = matrix.testcaseMatrix{plaintextnames:true, openssl:"auto", aessiv:true, raw64:false, extraArgs:[]string(nil)} === RUN TestConcurrentReadWrite --- PASS: TestConcurrentReadWrite (0.05s) === RUN TestConcurrentReadCreate --- PASS: TestConcurrentReadCreate (0.05s) === RUN TestInoReuse --- PASS: TestInoReuse (0.45s) === RUN TestMkdirRmdir --- PASS: TestMkdirRmdir (0.00s) === RUN TestDirOverwrite --- PASS: TestDirOverwrite (0.00s) === RUN TestRmdirPerms --- PASS: TestRmdirPerms (0.01s) === RUN TestHaveDotdot --- PASS: TestHaveDotdot (0.01s) === RUN TestFallocate fallocate_test.go:39: OSX does not support fallocate --- SKIP: TestFallocate (0.00s) === RUN TestWrite10 --- PASS: TestWrite10 (0.00s) === RUN TestWrite100 --- PASS: TestWrite100 (0.00s) === RUN TestWrite1M --- PASS: TestWrite1M (0.02s) === RUN TestWrite100x100 --- PASS: TestWrite100x100 (0.01s) === RUN TestWrite10Tight --- PASS: TestWrite10Tight (0.05s) === RUN TestTruncate --- PASS: TestTruncate (0.10s) === RUN TestAppend --- PASS: TestAppend (0.16s) === RUN TestFileHoles --- PASS: TestFileHoles (0.00s) === RUN TestRmwRace --- PASS: TestRmwRace (0.20s) === RUN TestFiltered --- PASS: TestFiltered (0.00s) === RUN TestFilenameEncryption --- PASS: TestFilenameEncryption (0.00s) === RUN TestRename --- PASS: TestRename (0.00s) === RUN TestNameLengths --- PASS: TestNameLengths (0.16s) === RUN TestLongNames --- PASS: TestLongNames (0.01s) === RUN TestLongLink --- PASS: TestLongLink (0.00s) === RUN TestLchown --- PASS: TestLchown (0.00s) === RUN TestUtimesNanoSymlink matrix_test.go:656: MacOS "touch" does not support "--no-dereference" --- SKIP: TestUtimesNanoSymlink (0.00s) === RUN TestUtimesNano --- PASS: TestUtimesNano (0.00s) === RUN TestUtimesNanoFd matrix_test.go:753: MacOS does not have /proc --- SKIP: TestUtimesNanoFd (0.00s) === RUN TestMkfifo --- PASS: TestMkfifo (0.00s) === RUN TestMagicNames matrix_test.go:788: Testing n="warmup1" matrix_test.go:788: Testing n="warmup2" matrix_test.go:788: Testing n="gocryptfs.longname.QhUr5d9FHerwEs--muUs6_80cy6JRp89c1otLwp92Cs" matrix_test.go:788: Testing n="gocryptfs.diriv" --- PASS: TestMagicNames (0.01s) === RUN TestChmod --- PASS: TestChmod (0.00s) === RUN TestAccess --- PASS: TestAccess (0.00s) === RUN TestStatfs --- PASS: TestStatfs (0.00s) === RUN TestSymlinkSize --- PASS: TestSymlinkSize (0.00s) === RUN TestPwd --- PASS: TestPwd (0.01s) PASS matrix: run took 1.295453792s matrix: testcase = matrix.testcaseMatrix{plaintextnames:false, openssl:"auto", aessiv:false, raw64:true, extraArgs:[]string(nil)} === RUN TestConcurrentReadWrite --- PASS: TestConcurrentReadWrite (0.04s) === RUN TestConcurrentReadCreate --- PASS: TestConcurrentReadCreate (0.04s) === RUN TestInoReuse --- PASS: TestInoReuse (0.54s) === RUN TestMkdirRmdir --- PASS: TestMkdirRmdir (0.00s) === RUN TestDirOverwrite --- PASS: TestDirOverwrite (0.00s) === RUN TestRmdirPerms --- PASS: TestRmdirPerms (0.01s) === RUN TestHaveDotdot --- PASS: TestHaveDotdot (0.00s) === RUN TestFallocate fallocate_test.go:39: OSX does not support fallocate --- SKIP: TestFallocate (0.00s) === RUN TestWrite10 --- PASS: TestWrite10 (0.00s) === RUN TestWrite100 --- PASS: TestWrite100 (0.00s) === RUN TestWrite1M --- PASS: TestWrite1M (0.02s) === RUN TestWrite100x100 --- PASS: TestWrite100x100 (0.01s) === RUN TestWrite10Tight --- PASS: TestWrite10Tight (0.04s) === RUN TestTruncate --- PASS: TestTruncate (0.10s) === RUN TestAppend --- PASS: TestAppend (0.15s) === RUN TestFileHoles --- PASS: TestFileHoles (0.00s) === RUN TestRmwRace --- PASS: TestRmwRace (0.17s) === RUN TestFiltered --- PASS: TestFiltered (0.00s) === RUN TestFilenameEncryption --- PASS: TestFilenameEncryption (0.00s) === RUN TestRename --- PASS: TestRename (0.00s) === RUN TestNameLengths --- PASS: TestNameLengths (0.20s) === RUN TestLongNames --- PASS: TestLongNames (0.01s) === RUN TestLongLink --- PASS: TestLongLink (0.00s) === RUN TestLchown --- PASS: TestLchown (0.00s) === RUN TestUtimesNanoSymlink matrix_test.go:656: MacOS "touch" does not support "--no-dereference" --- SKIP: TestUtimesNanoSymlink (0.00s) === RUN TestUtimesNano --- PASS: TestUtimesNano (0.00s) === RUN TestUtimesNanoFd matrix_test.go:753: MacOS does not have /proc --- SKIP: TestUtimesNanoFd (0.00s) === RUN TestMkfifo --- PASS: TestMkfifo (0.00s) === RUN TestMagicNames matrix_test.go:788: Testing n="warmup1" matrix_test.go:788: Testing n="warmup2" matrix_test.go:788: Testing n="gocryptfs.longname.QhUr5d9FHerwEs--muUs6_80cy6JRp89c1otLwp92Cs" matrix_test.go:788: Testing n="gocryptfs.diriv" --- PASS: TestMagicNames (0.01s) === RUN TestChmod --- PASS: TestChmod (0.00s) === RUN TestAccess --- PASS: TestAccess (0.00s) === RUN TestStatfs --- PASS: TestStatfs (0.00s) === RUN TestSymlinkSize --- PASS: TestSymlinkSize (0.00s) === RUN TestPwd --- PASS: TestPwd (0.01s) PASS matrix: run took 1.367934s matrix: testcase = matrix.testcaseMatrix{plaintextnames:false, openssl:"auto", aessiv:false, raw64:false, extraArgs:[]string{"-serialize_reads"}} === RUN TestConcurrentReadWrite --- PASS: TestConcurrentReadWrite (0.04s) === RUN TestConcurrentReadCreate --- PASS: TestConcurrentReadCreate (0.04s) === RUN TestInoReuse --- PASS: TestInoReuse (0.48s) === RUN TestMkdirRmdir --- PASS: TestMkdirRmdir (0.00s) === RUN TestDirOverwrite --- PASS: TestDirOverwrite (0.00s) === RUN TestRmdirPerms --- PASS: TestRmdirPerms (0.01s) === RUN TestHaveDotdot --- PASS: TestHaveDotdot (0.00s) === RUN TestFallocate fallocate_test.go:39: OSX does not support fallocate --- SKIP: TestFallocate (0.00s) === RUN TestWrite10 --- PASS: TestWrite10 (0.00s) === RUN TestWrite100 --- PASS: TestWrite100 (0.00s) === RUN TestWrite1M --- PASS: TestWrite1M (0.02s) === RUN TestWrite100x100 --- PASS: TestWrite100x100 (0.01s) === RUN TestWrite10Tight --- PASS: TestWrite10Tight (0.05s) === RUN TestTruncate --- PASS: TestTruncate (0.10s) === RUN TestAppend --- PASS: TestAppend (0.15s) === RUN TestFileHoles --- PASS: TestFileHoles (0.00s) === RUN TestRmwRace --- PASS: TestRmwRace (0.17s) === RUN TestFiltered --- PASS: TestFiltered (0.00s) === RUN TestFilenameEncryption --- PASS: TestFilenameEncryption (0.00s) === RUN TestRename --- PASS: TestRename (0.00s) === RUN TestNameLengths --- PASS: TestNameLengths (0.20s) === RUN TestLongNames --- PASS: TestLongNames (0.01s) === RUN TestLongLink --- PASS: TestLongLink (0.00s) === RUN TestLchown --- PASS: TestLchown (0.00s) === RUN TestUtimesNanoSymlink matrix_test.go:656: MacOS "touch" does not support "--no-dereference" --- SKIP: TestUtimesNanoSymlink (0.00s) === RUN TestUtimesNano --- PASS: TestUtimesNano (0.00s) === RUN TestUtimesNanoFd matrix_test.go:753: MacOS does not have /proc --- SKIP: TestUtimesNanoFd (0.00s) === RUN TestMkfifo --- PASS: TestMkfifo (0.00s) === RUN TestMagicNames matrix_test.go:788: Testing n="warmup1" matrix_test.go:788: Testing n="warmup2" matrix_test.go:788: Testing n="gocryptfs.longname.QhUr5d9FHerwEs--muUs6_80cy6JRp89c1otLwp92Cs" matrix_test.go:788: Testing n="gocryptfs.diriv" --- PASS: TestMagicNames (0.01s) === RUN TestChmod --- PASS: TestChmod (0.00s) === RUN TestAccess --- PASS: TestAccess (0.00s) === RUN TestStatfs --- PASS: TestStatfs (0.00s) === RUN TestSymlinkSize --- PASS: TestSymlinkSize (0.00s) === RUN TestPwd --- PASS: TestPwd (0.01s) PASS matrix: run took 1.308468083s matrix: testcase = matrix.testcaseMatrix{plaintextnames:false, openssl:"auto", aessiv:false, raw64:false, extraArgs:[]string{"-sharedstorage"}} === RUN TestConcurrentReadWrite --- PASS: TestConcurrentReadWrite (0.05s) === RUN TestConcurrentReadCreate --- PASS: TestConcurrentReadCreate (0.06s) === RUN TestInoReuse --- PASS: TestInoReuse (0.49s) === RUN TestMkdirRmdir --- PASS: TestMkdirRmdir (0.00s) === RUN TestDirOverwrite --- PASS: TestDirOverwrite (0.00s) === RUN TestRmdirPerms --- PASS: TestRmdirPerms (0.00s) === RUN TestHaveDotdot --- PASS: TestHaveDotdot (0.00s) === RUN TestFallocate fallocate_test.go:39: OSX does not support fallocate --- SKIP: TestFallocate (0.00s) === RUN TestWrite10 --- PASS: TestWrite10 (0.00s) === RUN TestWrite100 --- PASS: TestWrite100 (0.00s) === RUN TestWrite1M --- PASS: TestWrite1M (0.02s) === RUN TestWrite100x100 --- PASS: TestWrite100x100 (0.01s) === RUN TestWrite10Tight --- PASS: TestWrite10Tight (0.07s) === RUN TestTruncate --- PASS: TestTruncate (0.10s) === RUN TestAppend --- PASS: TestAppend (0.18s) === RUN TestFileHoles --- PASS: TestFileHoles (0.00s) === RUN TestRmwRace --- PASS: TestRmwRace (0.21s) === RUN TestFiltered --- PASS: TestFiltered (0.00s) === RUN TestFilenameEncryption --- PASS: TestFilenameEncryption (0.00s) === RUN TestRename --- PASS: TestRename (0.00s) === RUN TestNameLengths --- PASS: TestNameLengths (0.27s) === RUN TestLongNames --- PASS: TestLongNames (0.02s) === RUN TestLongLink --- PASS: TestLongLink (0.00s) === RUN TestLchown --- PASS: TestLchown (0.00s) === RUN TestUtimesNanoSymlink matrix_test.go:656: MacOS "touch" does not support "--no-dereference" --- SKIP: TestUtimesNanoSymlink (0.00s) === RUN TestUtimesNano --- PASS: TestUtimesNano (0.00s) === RUN TestUtimesNanoFd matrix_test.go:753: MacOS does not have /proc --- SKIP: TestUtimesNanoFd (0.00s) === RUN TestMkfifo --- PASS: TestMkfifo (0.00s) === RUN TestMagicNames matrix_test.go:788: Testing n="warmup1" matrix_test.go:788: Testing n="warmup2" matrix_test.go:788: Testing n="gocryptfs.longname.QhUr5d9FHerwEs--muUs6_80cy6JRp89c1otLwp92Cs" matrix_test.go:788: Testing n="gocryptfs.diriv" --- PASS: TestMagicNames (0.02s) === RUN TestChmod --- PASS: TestChmod (0.00s) === RUN TestAccess --- PASS: TestAccess (0.00s) === RUN TestStatfs --- PASS: TestStatfs (0.00s) === RUN TestSymlinkSize --- PASS: TestSymlinkSize (0.00s) === RUN TestPwd matrix_test.go:929: pwd: couldn't find directory entry in ‘../../../../../../../../..’ with matching i-node matrix_test.go:930: dir "/var/folders/_x/5t9ddfn94s9cx9ln43smhrw80000gn/T//gocryptfs-test-parent-501/363614627/default-plain": exit status 1 --- FAIL: TestPwd (0.01s) FAIL matrix: run took 1.5220355s TestMain: matrix[9] = matrix.testcaseMatrix{plaintextnames:false, openssl:"auto", aessiv:false, raw64:false, extraArgs:[]string{"-sharedstorage"}} failed FAIL github.com/rfjakob/gocryptfs/v2/tests/matrix 11.346s test_helpers: warning: testParentDir "/var/folders/_x/5t9ddfn94s9cx9ln43smhrw80000gn/T//gocryptfs-test-parent-501" does not reside on ext4, we will miss failures caused by ino reuse === RUN TestFileHoleCopy === RUN TestFileHoleCopy/c0 file_holes_test.go:26: invalid argument === CONT TestFileHoleCopy file_holes_test.go:137: aborting further subtests --- FAIL: TestFileHoleCopy (0.00s) --- FAIL: TestFileHoleCopy/c0 (0.00s) === RUN TestFlags --- PASS: TestFlags (0.00s) === RUN TestDirIV --- PASS: TestDirIV (0.00s) === RUN TestFiltered --- PASS: TestFiltered (0.00s) === RUN TestInoReuseEvil plaintextnames_test.go:112: dir ino = 40370026 plaintextnames_test.go:125: file ino = 40370027 plaintextnames_test.go:112: dir ino = 40370028 plaintextnames_test.go:125: file ino = 40370029 --- PASS: TestInoReuseEvil (0.00s) FAIL FAIL github.com/rfjakob/gocryptfs/v2/tests/plaintextnames 0.249s test_helpers: warning: testParentDir "/var/folders/_x/5t9ddfn94s9cx9ln43smhrw80000gn/T//gocryptfs-test-parent-501" does not reside on ext4, we will miss failures caused by ino reuse fs.Mount failed: read-only file system mount failed: exit status 19 FAIL github.com/rfjakob/gocryptfs/v2/tests/reverse 0.208s test_helpers: warning: testParentDir "/var/folders/_x/5t9ddfn94s9cx9ln43smhrw80000gn/T//gocryptfs-test-parent-501" does not reside on ext4, we will miss failures caused by ino reuse === RUN TestDirUnlink sharedstorage_test.go:45: newTestCase: sharedstorage=false cipherdir="/var/folders/_x/5t9ddfn94s9cx9ln43smhrw80000gn/T//gocryptfs-test-parent-501/2698881601/TestDirUnlink.1138921193" go-fuse: 16:49:28.854602 warning: rawBridge.getattr: overriding ino 40370085 with 40370083 sharedstorage_test.go:94: operation not permitted --- FAIL: TestDirUnlink (1.23s) === RUN TestStaleHardlinks sharedstorage_test.go:45: newTestCase: sharedstorage=false cipherdir="/var/folders/_x/5t9ddfn94s9cx9ln43smhrw80000gn/T//gocryptfs-test-parent-501/2698881601/TestStaleHardlinks.121597077" --- PASS: TestStaleHardlinks (1.21s) FAIL === RUN TestDirUnlink sharedstorage_test.go:45: newTestCase: sharedstorage=true cipherdir="/var/folders/_x/5t9ddfn94s9cx9ln43smhrw80000gn/T//gocryptfs-test-parent-501/2698881601/TestDirUnlink.412522887" sharedstorage_test.go:89: operation not permitted --- FAIL: TestDirUnlink (0.10s) === RUN TestStaleHardlinks sharedstorage_test.go:45: newTestCase: sharedstorage=true cipherdir="/var/folders/_x/5t9ddfn94s9cx9ln43smhrw80000gn/T//gocryptfs-test-parent-501/2698881601/TestStaleHardlinks.3883010951" --- PASS: TestStaleHardlinks (0.11s) FAIL FAIL github.com/rfjakob/gocryptfs/v2/tests/sharedstorage 2.808s ? github.com/rfjakob/gocryptfs/v2/tests/symlink_race [no test files] ? github.com/rfjakob/gocryptfs/v2/tests/test_helpers [no test files] test_helpers: warning: testParentDir "/var/folders/_x/5t9ddfn94s9cx9ln43smhrw80000gn/T//gocryptfs-test-parent-501" does not reside on ext4, we will miss failures caused by ino reuse === RUN TestSetGetRmRegularFile --- PASS: TestSetGetRmRegularFile (0.00s) === RUN TestSetGetRmFifo --- PASS: TestSetGetRmFifo (0.00s) === RUN TestSetGetRmDir --- PASS: TestSetGetRmDir (0.00s) === RUN TestXattrSetEmpty --- PASS: TestXattrSetEmpty (0.00s) === RUN TestXattrList --- PASS: TestXattrList (0.00s) === RUN TestBase64XattrRead DecryptBlock: Block is too short: 3 bytes DecryptBlock: Block is too short: 2 bytes GetXAttr: Block is too short GetXAttr: cipher: message authentication failed GetXAttr: cipher: message authentication failed GetXAttr: cipher: message authentication failed --- PASS: TestBase64XattrRead (0.03s) === RUN TestList0000File xattr_integration_test.go:298: xattr.list /var/folders/_x/5t9ddfn94s9cx9ln43smhrw80000gn/T//gocryptfs-test-parent-501/1148391599/default-plain/TestList0000File : permission denied --- FAIL: TestList0000File (0.00s) === RUN TestSet0200File --- PASS: TestSet0200File (0.00s) === RUN TestList0000Dir xattr_integration_test.go:325: xattr.list /var/folders/_x/5t9ddfn94s9cx9ln43smhrw80000gn/T//gocryptfs-test-parent-501/1148391599/default-plain/TestList0000Dir : permission denied --- FAIL: TestList0000Dir (0.00s) === RUN TestSet0200Dir xattr_integration_test.go:339: xattr.LSet /var/folders/_x/5t9ddfn94s9cx9ln43smhrw80000gn/T//gocryptfs-test-parent-501/1148391599/default-plain/TestSet0200Dir user.foo: bad file descriptor --- FAIL: TestSet0200Dir (0.00s) === RUN TestAcl --- PASS: TestAcl (0.00s) === RUN TestSlashInName --- PASS: TestSlashInName (0.00s) FAIL FAIL github.com/rfjakob/gocryptfs/v2/tests/xattr 0.255s FAIL ```