-
Notifications
You must be signed in to change notification settings - Fork 33
udflabel: Implement --mark-ro operation
#62
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
This patch implements a new operation/switch, "--mark-ro", which will set the DOMAIN_FLAGS_SOFT_WRITE_PROTECT flag on both the UDF FSD and LVD (which is what `mkudffs` does when instructed to create a read-only UDF file system). Using that, users may "seal" a UDF-formatted mass storage device (e.g., a USB thumb drive) once it has been populated with data. A resulting UDF 2.01-compliant file system has been verified to mount read-only on both Microsoft Windows 10, as well as GNU/Linux with kernel 6.2.
|
udflabel tool is for setting filesystem label and other label-like identifiers. Really not for changing write-protection of existing filesystem. Such functionality should be in different tool, e.g. udftune. |
|
Thanks for your feedback, @pali - I can see and understand where you are coming from! If you bear with me for a few paragraphs and hear me out, I would very much like to try changing your mind about it :) There is no Furthermore, when coming from other filesystems, there's sometimes two utils in their administrative stack of tools: some executable to tune, another one to label the file system (e. g., Now, I would argue that labels in xfs and e2fs et al. take on a less important role than what they appear to be in UDF (I am not familiar with OSTA standards - but just comparing the amount of metadata concerning the whole file system - as opposed to an indivudual file contained by it - authorship or a distributor or an implementation that write to the fs, etc. - paints a pretty clear picture for me). Therefore, interacting with the different UDF labels is a much more intricate job than interacting with the single label of, say, an ext4 image. This also shows in the implementation complexity of Therefore, I think it would have been fair to have called the current At this point, I think we're getting into a debate over minor semantics - is it really such a problem to have And once there's more functionality that warrants having a dedicated Thanks very much for having the patience to engage with my train of thought, and also for maintaining udftools! :) |
|
I take it I could not convince you of my point of view then? :-\ |
|
I have looked at other fs tools specialized for setting fs label and none of them can change write-protection attribute or any other non-label related on existing fs. tune2fs or xfs_admin is not an argument as these tools are general purpose tool, not specific for manipulating labels. Setting some random attribute of the udf fs is really for general-purpose udf fs manipulation tool - e.g. udftune. And no, udflabel is not it, I would not accept extending label tool for unrelated things... with this reasoning somebody else can come and say that want to add ability for e.g. erasing whole disk into udflabel. This is a mess and I'm not interested in hacks. |
This patch implements a new operation/switch, "--mark-ro", which will set the DOMAIN_FLAGS_SOFT_WRITE_PROTECT flag on both the UDF FSD and LVD (which is what
mkudffsdoes when instructed to create a read-only UDF file system).Using that, users may "seal" a UDF-formatted mass storage device (e.g., a USB thumb drive) once it has been populated with data.
A resulting UDF 2.01-compliant file system has been verified to mount read-only on both Microsoft Windows 10, as well as GNU/Linux with kernel 6.2.