Received: by 2002:a05:7412:419a:b0:f3:1519:9f41 with SMTP id i26csp3681970rdh; Tue, 28 Nov 2023 00:19:45 -0800 (PST) X-Google-Smtp-Source: AGHT+IG+rBQrt0+FwyoSrq1XfrIn4c6DnZ7hhDdI7Usyi4if3YNKL1iS5ZGhnjcznTeqEbYjsi8+ X-Received: by 2002:a05:6830:213:b0:6d6:43e7:b0bc with SMTP id em19-20020a056830021300b006d643e7b0bcmr16490215otb.16.1701159584856; Tue, 28 Nov 2023 00:19:44 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1701159584; cv=none; d=google.com; s=arc-20160816; b=BUtL5mulWgATbpiPJ7oAn+7WUk6VpKR+btEUdUD3+/B4iWA5Rp36IHM2w9TG1J8wsy by+hXoM5hggFtIuQ3zoH7wc6GdGwJoD+uOHypE5Y3RGJ9EkjcmA2DIllRbrQGSELvAtw MpufHhIEdIHZzp7wyKmn84jch+PnVGcTCOKd1+votXTmrM7FoMZFfrRRGvcxA6BYM38v nbXM9s9pc52kpL46YUbiYFnYXAit9Ja3pMFp+sgpuc0b/JbkX4y/km/BtbVxeekC8oKG Uej3gaZgNL4t2k1p/DMDpVStrMV1Qvt4YNK8rXSAaP3KEeU3FmwtfN0dX7W/usG9rNHM dxKg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date; bh=xhtMDEPVeCkzMMr9t+QFUn/frIx4jqPqIJXFe1KAaNs=; fh=NpMLSEStnU01ujRBCh73t4GvMOt4t5pCAhHIgGpJBHE=; b=0VvxCURTCy6kkPYJDm89mII9cZEBqUnpL7WKr6mqFOWuMGllCOk7UP+rfQQ9qwZx21 97wEOLe/BuBgN/EKRYuekubs7pzZPoR8dIpi49Cy0ZtWgje0oTTrJhG3MaOfQaW4ki1D yO8W4BKNxgdXucE5Lg80LBYpgWRWx1iKcn/L4kVfMYbqHlqRx74jGYadA/2ZUuBTyeQS dnSb+Y2sY4spfYDsAzY96TAVIldWCdYnRPC3NsP117GLcRW8Wk0rhT3MrvyCyDgAGOJ2 HvNFqVorfTdt25680uelTUaeoR5HBYaYjfcUYX7esnQhZt0gMrA+urov517JadxMWr6T OXrg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.37 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=suse.de Return-Path: Received: from snail.vger.email (snail.vger.email. [23.128.96.37]) by mx.google.com with ESMTPS id e20-20020a656794000000b005c1b59f008bsi10816856pgr.617.2023.11.28.00.19.44 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 28 Nov 2023 00:19:44 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.37 as permitted sender) client-ip=23.128.96.37; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.37 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=suse.de Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by snail.vger.email (Postfix) with ESMTP id 9F1648077992; Tue, 28 Nov 2023 00:19:43 -0800 (PST) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.11 at snail.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1344086AbjK1IT3 (ORCPT + 99 others); Tue, 28 Nov 2023 03:19:29 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:38598 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1344049AbjK1IT1 (ORCPT ); Tue, 28 Nov 2023 03:19:27 -0500 Received: from smtp-out1.suse.de (smtp-out1.suse.de [195.135.223.130]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id B6DB5DB for ; Tue, 28 Nov 2023 00:19:33 -0800 (PST) Received: from imap2.dmz-prg2.suse.org (imap2.dmz-prg2.suse.org [IPv6:2a07:de40:b281:104:10:150:64:98]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by smtp-out1.suse.de (Postfix) with ESMTPS id 52CEC2195A; Tue, 28 Nov 2023 08:19:32 +0000 (UTC) Received: from imap2.dmz-prg2.suse.org (localhost [127.0.0.1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by imap2.dmz-prg2.suse.org (Postfix) with ESMTPS id 3F0DE133B5; Tue, 28 Nov 2023 08:19:32 +0000 (UTC) Received: from dovecot-director2.suse.de ([10.150.64.162]) by imap2.dmz-prg2.suse.org with ESMTPSA id hMfuDZSiZWWbPQAAn2gu4w (envelope-from ); Tue, 28 Nov 2023 08:19:32 +0000 Date: Tue, 28 Nov 2023 09:21:45 +0100 From: Daniel Wagner To: Keith Busch Cc: Christoph Hellwig , linux-nvme@lists.infradead.org, linux-kernel@vger.kernel.org, Sagi Grimberg , Hannes Reinecke Subject: Re: [RFC v1] nvme: add cse, ds, ms, nsze and nuse to sysfs Message-ID: References: <20231127103208.25748-1-dwagner@suse.de> <20231127141857.GA25833@lst.de> <20231127155649.GA1403@lst.de> <20231127163333.GA2273@lst.de> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: X-Spam-Level: Authentication-Results: smtp-out1.suse.de; none X-Rspamd-Server: rspamd2 X-Spamd-Result: default: False [-4.00 / 50.00]; REPLY(-4.00)[] X-Spam-Score: -4.00 X-Rspamd-Queue-Id: 52CEC2195A X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00, RCVD_IN_DNSWL_BLOCKED,SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (snail.vger.email [0.0.0.0]); Tue, 28 Nov 2023 00:19:43 -0800 (PST) On Mon, Nov 27, 2023 at 09:46:43AM -0700, Keith Busch wrote: > On Mon, Nov 27, 2023 at 05:33:33PM +0100, Christoph Hellwig wrote: > > On Mon, Nov 27, 2023 at 09:30:14AM -0700, Keith Busch wrote: > > > > > Should this even be an nvme specific attribute? I thought we should have > > > > > blk-integrity.c report its 'tuple_size' attribute instead. That should > > > > > work as long as we're not dealing with extended metadata at least, but > > > > > that's kind of a special format that doesn't have block layer support. > > > > > > > > Reporting the tuple size is a good idea. But is that enough for > > > > the existing nvme-cli use case? 'nvme list' is just listening the block size and the meta size in the 'Format' field. So nothing really crazy going on: Usage Format -------------------------- ---------------- 343.33 GB / 512.11 GB 512 B + 0 B nvme-cli commands like 'nmve ns-id' etc will always issue a command so that is not a concern. It's just the libnvme nvme_scan_topology() call which should stop issuing any commands. I'll add the missing tuple_size to the integrity sysfs dir in this case. > > > nvme-cli currently queries with admin passthrough identify command, so > > > adding a new attribute won't break that. I assume Daniel would have it > > > fallback to that same command for backward compatibilty if a desired > > > sysfs attribute doesn't exist. Yes, a fallback will exist. There is no need to break existing users. In summary, the only missing entries are - csi - tuple_size - nuse