[PATCH] Ext4: Make file creation time, i_version and i_generation available by xattrs

Steve French smfrench at gmail.com
Mon Jun 28 13:41:02 MDT 2010


On Mon, Jun 28, 2010 at 2:38 PM, David Howells <dhowells at redhat.com> wrote:
> Andreas Dilger <adilger at dilger.ca> wrote:
>
>> - I'd prefer calling these "file.generation" and "file.version".
>>   I don't think there is value in the "i_" prefix adds anything,
>>   and it seems more like an internal detail to me
>
> That's reasonable.
>
>> - why not expose the ".version" field for regular files?  It seems
>>   that all of them are applicable for all file types.
>
> Because Ext4 doesn't support it for anything other than directories.
>
>> - it would be good to not introduce a new xattr namespace, since
>>   tools like tar (even the RHEL-patched one) will not backup and
>>   restore these namespaces.  Using "trusted." would allow them to
>>   be backed up and restored using existing xattr-patched GNU tar
>>   by root, but wouldn't allow them to be modified by regular users.
>>   I think this is important for proper backup/restore of a filesystem,
>>   but can have correctness implications and shouldn't be accessible
>>   to regular users.
>
> Does backing them up make sense, though?  They are filesystem structural
> attributes.  Can you restore the inode number, for example?  If not, then you
> can't restore i_generation either.  Restoring i_version might make sense, but
> what if it winds i_version backwards whilst maintaining i_ino and i_generation,
> that means there'll be a time in the future where the three values are once
> again what might have been already published - and may already be in someone's
> persistent cache.

I think backing them up makes sense, even if they can't easily
be restored (ie just for reporting).

Are there security differences between the "trusted" namespace that
would make it harder for an app to read them (the man page did not list
the security differences between trusted and user xattrs).


-- 
Thanks,

Steve


More information about the samba-technical mailing list