Received: by 2002:a05:7208:3228:b0:82:47:81bb with SMTP id cb40csp2637521rbb; Tue, 16 Apr 2024 07:28:46 -0700 (PDT) X-Forwarded-Encrypted: i=3; AJvYcCXytAvxBhEE4wsTyjEjwJGVwpYXoVA2KWdVG0jNV7ZIszUVPcr2hiGTmTNK8n/i7SAV4gmZInEAMDzfKMb1Cve2/sWPxd4J+GA2zVVqlA== X-Google-Smtp-Source: AGHT+IHNro4mU8sijpnza7m0JiXc1kInfR0bf/gbB571zH4n5g7b0h5Gl5kF4sVQXaG80wx7xJrv X-Received: by 2002:a54:410e:0:b0:3c6:d64:41df with SMTP id l14-20020a54410e000000b003c60d6441dfmr14306758oic.16.1713277726549; Tue, 16 Apr 2024 07:28:46 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1713277726; cv=pass; d=google.com; s=arc-20160816; b=wSpjZVdmXm4hRUrt00Qdc7l9Dxtky10xpeO5IsKt8eADqckp95jD3AvOtttDQNqOBK gT9p69MwEuj3EtZnJ76Oa/qp/28kdkuzt2MamcG/EvLvVniPde1nlbGzGnLzooyR223v Yns6Qx1j85GEta1LDgJJIeIsPo+kDCSfiyloo5unTt4otxQsO4TZMD3QdZnlGYaqfkCw Hoe4pDuqbQ/ZiemZF/hn5P8nrKAj5aRGfJah0WIIl+7Uwc8eNWMRKiM3dfVZB6yUY+ue WLcy4H2C+zWYZdlD5ckjBjBRdDl85ZRvWDg+flfaEVled20hu0rzamjDXkCNiZAgH6xL VAvQ== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=in-reply-to:content-disposition:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:references:message-id:subject:cc :to:from:date; bh=pOQt3dXThtLrpx13fS8AtVSjlLUqU/46Lslb/M1Ucjk=; fh=FWKGrpIJ/mVGum51EZF33+ul/ztCAPc8vZwtDDWUm9g=; b=WRBhMf4gMp5TtKuKgULuc1RAy7ntam9IgtcNctERmk7ybfKLD/6mTa9ooeVy6f68TZ fbIFPlLmlHINGtnE8/3uAGu5t2rgkMt2FYsLHo7TEyQht1GkD+JZv+rbEoIvBdmJN/4k vdXXQPYm9MUlGzBOXkH1jX1AKfa6bFTANMB8rO5K97rHNw1E2nF9ri66apntiYuUjCK3 9p1SQl49QBKNjPJ5n0TAuEjMt2eVcQuPIBh4N9DtpwumzGDilNJ0CO0nhqa0l9BHAZy/ 7KgFNZsmuAwT0uEFCKs0k7vsrRNuY4phG9QUKyiEn65WF/YPkzgGoi+C5lWx7rUkYz+X hMZA==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; arc=pass (i=1 spf=pass spfdomain=0pointer.de); spf=pass (google.com: domain of linux-kernel+bounces-147012-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45d1:ec00::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-147012-linux.lists.archive=gmail.com@vger.kernel.org" Return-Path: Received: from ny.mirrors.kernel.org (ny.mirrors.kernel.org. [2604:1380:45d1:ec00::1]) by mx.google.com with ESMTPS id c14-20020a05622a058e00b0043664cde225si12562667qtb.350.2024.04.16.07.28.46 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 16 Apr 2024 07:28:46 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel+bounces-147012-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45d1:ec00::1 as permitted sender) client-ip=2604:1380:45d1:ec00::1; Authentication-Results: mx.google.com; arc=pass (i=1 spf=pass spfdomain=0pointer.de); spf=pass (google.com: domain of linux-kernel+bounces-147012-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45d1:ec00::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-147012-linux.lists.archive=gmail.com@vger.kernel.org" Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ny.mirrors.kernel.org (Postfix) with ESMTPS id 3CF691C20316 for ; Tue, 16 Apr 2024 14:28:46 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 14CD5133421; Tue, 16 Apr 2024 14:25:47 +0000 (UTC) Received: from gardel.0pointer.net (gardel.0pointer.net [85.214.157.71]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 56DD812DDBC; Tue, 16 Apr 2024 14:25:45 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=85.214.157.71 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1713277546; cv=none; b=rjBpHPkrSdUF0EtjcEdNUWRYz+mAjdFKIxMwaN+h0y0YUhMlEACeZSvyC3BDs3l/vUoy3L2sDDRA57TjlzR/2LhO/krTDG4QYTlP1IDhWlfz3b7gWg1bn/pkDy71+HzYe6wqmE6wz2KqVBNaFC7cc98xTPCvGdvLen9ztchrNNE= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1713277546; c=relaxed/simple; bh=BgCWqjuUV/U6yFMacmAdrh5euU57EkQYY0MpxO+2sTs=; h=Date:From:To:Cc:Subject:Message-ID:References:MIME-Version: Content-Type:Content-Disposition:In-Reply-To; b=Trga4mJe1h2fxhJyqGJeRIMfqyUldCugYHvl86Re9miGK2NYxdSNZQw/D8CETO98P1yRjwMxGVLi9T/0O+TgkC2E93uNiGx7GJyIPWDoSVpLpeiR1EcnM0lDufsbbBeBHX6J45BGZlPP8+pZePFc+QkpA5cBkD77MGv+K+AJHjs= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=none (p=none dis=none) header.from=0pointer.de; spf=pass smtp.mailfrom=0pointer.de; arc=none smtp.client-ip=85.214.157.71 Authentication-Results: smtp.subspace.kernel.org; dmarc=none (p=none dis=none) header.from=0pointer.de Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=0pointer.de Received: from gardel-login.0pointer.net (gardel-mail [IPv6:2a01:238:43ed:c300:10c3:bcf3:3266:da74]) by gardel.0pointer.net (Postfix) with ESMTP id 94132E803C0; Tue, 16 Apr 2024 16:25:43 +0200 (CEST) Received: by gardel-login.0pointer.net (Postfix, from userid 1000) id 596F41602F7; Tue, 16 Apr 2024 16:25:43 +0200 (CEST) Date: Tue, 16 Apr 2024 16:25:43 +0200 From: Lennart Poettering To: Jens Axboe Cc: Christoph Hellwig , Keith Busch , Linux regressions mailing list , linux-block@vger.kernel.org, LKML Subject: Re: API break, sysfs "capability" file Message-ID: References: <54e3c969-3ee8-40d8-91d9-9b9402001d27@leemhuis.info> <20240409141531.GB21514@lst.de> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: On Di, 16.04.24 08:22, Jens Axboe (axboe@kernel.dk) wrote: > On 4/16/24 8:18 AM, Lennart Poettering wrote: > > On Di, 09.04.24 09:17, Jens Axboe (axboe@kernel.dk) wrote: > > > >> On 4/9/24 8:15 AM, Christoph Hellwig wrote: > >>> On Tue, Apr 09, 2024 at 10:19:09AM +0200, Lennart Poettering wrote: > >>>> All I am looking for is a very simple test that returns me a boolean: > >>>> is there kernel-level partition scanning enabled on this device or > >>>> not. > >>> > >>> And we can add a trivial sysfs attribute for that. > >> > >> And I think we should. I don't know what was being smoked adding a sysfs > >> interface that exposed internal flag values - and honestly what was > >> being smoked to rely on that, but I think it's fair to say that the > >> majority of the fuckup here is on the kernel side. > > > > Yeah, it's a shitty interface, the kernel is rich in that. But it was > > excessively well documented, better in fact than almost all other > > kernel interfaces: > > > > ? https://www.kernel.org/doc/html/v5.16/block/capability.html ? > > > > If you document something on so much detail in the API docs, how do > > you expect this *not* to be relied on by userspace. > > This is _internal_ documentation, not user ABI documentation. The fact > that it's talking about internal flag values should make that clear, > though I can definitely see how that's just badly exposed along with > other things that document things that users/admins could care about. The text begins with: "This file documents the sysfs file block//capability." So it makes very clear this is about the sysfs interface. Are you saying that sysfs of the block layer should be considered an *internal* kernel API? That's a wild definition, if I may say so. Lennart -- Lennart Poettering, Berlin