public inbox for linux-ext4@vger.kernel.org
 help / color / mirror / Atom feed
* SECRM, UNRM, COMPR flags
@ 2016-09-26  9:11 Jan Kara
  2016-09-26 15:06 ` Theodore Ts'o
  0 siblings, 1 reply; 5+ messages in thread
From: Jan Kara @ 2016-09-26  9:11 UTC (permalink / raw)
  To: linux-ext4

Hi,

in ext4 we have these SECRM, UNRM, COMPR flags which users can set, they
can read them, but which actually don't do anything. This is actually
somewhat confusing - e.g. I've just got report about one tool which
apparently sets SECRM flag on a file in a hope that it is somehow safer.
Also this is a waste of flags.

I've checked other filesystems (xfs, btrfs) and they report EOPNOTSUPP if
these flags are not really supported. Should not we do the same in ext4? I
know there is a concern about breaking userspace but since other major
filesystems already behave this way I think there is a good chance tools
handle this reasonably... What do people thing?

								Honza

-- 
Jan Kara <jack@suse.com>
SUSE Labs, CR

^ permalink raw reply	[flat|nested] 5+ messages in thread

end of thread, other threads:[~2016-09-29  1:17 UTC | newest]

Thread overview: 5+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2016-09-26  9:11 SECRM, UNRM, COMPR flags Jan Kara
2016-09-26 15:06 ` Theodore Ts'o
2016-09-27  8:35   ` Jan Kara
2016-09-27 11:45     ` Andreas Dilger
2016-09-28 23:30     ` Theodore Ts'o

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox