Kconfig 1.8 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253
  1. config F2FS_FS
  2. tristate "F2FS filesystem support (EXPERIMENTAL)"
  3. depends on BLOCK
  4. help
  5. F2FS is based on Log-structured File System (LFS), which supports
  6. versatile "flash-friendly" features. The design has been focused on
  7. addressing the fundamental issues in LFS, which are snowball effect
  8. of wandering tree and high cleaning overhead.
  9. Since flash-based storages show different characteristics according to
  10. the internal geometry or flash memory management schemes aka FTL, F2FS
  11. and tools support various parameters not only for configuring on-disk
  12. layout, but also for selecting allocation and cleaning algorithms.
  13. If unsure, say N.
  14. config F2FS_STAT_FS
  15. bool "F2FS Status Information"
  16. depends on F2FS_FS && DEBUG_FS
  17. default y
  18. help
  19. /sys/kernel/debug/f2fs/ contains information about all the partitions
  20. mounted as f2fs. Each file shows the whole f2fs information.
  21. /sys/kernel/debug/f2fs/status includes:
  22. - major file system information managed by f2fs currently
  23. - average SIT information about whole segments
  24. - current memory footprint consumed by f2fs.
  25. config F2FS_FS_XATTR
  26. bool "F2FS extended attributes"
  27. depends on F2FS_FS
  28. default y
  29. help
  30. Extended attributes are name:value pairs associated with inodes by
  31. the kernel or by users (see the attr(5) manual page, or visit
  32. <http://acl.bestbits.at/> for details).
  33. If unsure, say N.
  34. config F2FS_FS_POSIX_ACL
  35. bool "F2FS Access Control Lists"
  36. depends on F2FS_FS_XATTR
  37. select FS_POSIX_ACL
  38. default y
  39. help
  40. Posix Access Control Lists (ACLs) support permissions for users and
  41. gourps beyond the owner/group/world scheme.
  42. To learn more about Access Control Lists, visit the POSIX ACLs for
  43. Linux website <http://acl.bestbits.at/>.
  44. If you don't know what Access Control Lists are, say N