Sage Weil | 9030aaf | 2009-10-06 11:31:15 -0700 | [diff] [blame] | 1 | config CEPH_FS |
Kees Cook | 1b6a78a | 2012-10-02 11:19:19 -0700 | [diff] [blame] | 2 | tristate "Ceph distributed file system" |
| 3 | depends on INET |
Yehuda Sadeh | 3d14c5d | 2010-04-06 15:14:15 -0700 | [diff] [blame] | 4 | select CEPH_LIB |
Sage Weil | 9030aaf | 2009-10-06 11:31:15 -0700 | [diff] [blame] | 5 | select LIBCRC32C |
Robert P. J. Day | 25848b3 | 2010-07-24 06:41:18 -0400 | [diff] [blame] | 6 | select CRYPTO_AES |
Sage Weil | be4f104 | 2010-09-17 12:30:31 -0700 | [diff] [blame] | 7 | select CRYPTO |
Yehuda Sadeh | 3d14c5d | 2010-04-06 15:14:15 -0700 | [diff] [blame] | 8 | default n |
Sage Weil | 9030aaf | 2009-10-06 11:31:15 -0700 | [diff] [blame] | 9 | help |
| 10 | Choose Y or M here to include support for mounting the |
| 11 | experimental Ceph distributed file system. Ceph is an extremely |
| 12 | scalable file system designed to provide high performance, |
| 13 | reliable access to petabytes of storage. |
| 14 | |
| 15 | More information at http://ceph.newdream.net/. |
| 16 | |
| 17 | If unsure, say N. |
| 18 | |
Milosz Tanski | 99ccbd2 | 2013-08-21 17:29:54 -0400 | [diff] [blame] | 19 | if CEPH_FS |
| 20 | config CEPH_FSCACHE |
| 21 | bool "Enable Ceph client caching support" |
| 22 | depends on CEPH_FS=m && FSCACHE || CEPH_FS=y && FSCACHE=y |
| 23 | help |
| 24 | Choose Y here to enable persistent, read-only local |
| 25 | caching support for Ceph clients using FS-Cache |
| 26 | |
| 27 | endif |
Guangliang Zhao | 7221fe4 | 2013-11-11 15:18:03 +0800 | [diff] [blame] | 28 | |
| 29 | config CEPH_FS_POSIX_ACL |
| 30 | bool "Ceph POSIX Access Control Lists" |
| 31 | depends on CEPH_FS |
| 32 | select FS_POSIX_ACL |
| 33 | help |
| 34 | POSIX Access Control Lists (ACLs) support permissions for users and |
| 35 | groups beyond the owner/group/world scheme. |
| 36 | |
| 37 | To learn more about Access Control Lists, visit the POSIX ACLs for |
| 38 | Linux website <http://acl.bestbits.at/>. |
| 39 | |
| 40 | If you don't know what Access Control Lists are, say N |