From: Klaus Jensen <its@irrelevant.dk>
To: Dmitry Tihov <d.tihov@yadro.com>
Cc: qemu-block@nongnu.org, qemu-devel@nongnu.org, kbusch@kernel.org,
linux@yadro.com, m.malygin@yadro.com, a.buev@yadro.com,
ddtikhov@gmail.com, Kevin Wolf <kwolf@redhat.com>,
Hanna Reitz <hreitz@redhat.com>
Subject: Re: [RFC 0/5] Protection information pass-through for block devices
Date: Mon, 5 Dec 2022 13:47:01 +0100 [thread overview]
Message-ID: <Y43oRSSnr3ZCJkSX@cormorant.local> (raw)
In-Reply-To: <20221205090129.enmhx6lq34g2owkw@archlinux>
[-- Attachment #1: Type: text/plain, Size: 2864 bytes --]
On Dec 5 12:01, Dmitry Tihov wrote:
> On Fri, Nov 25, 2022 at 08:44:18, Klaus Jensen wrote:
> > +CC: block layer maintainers (Kevin, Hanna)
> >
> > On Nov 24 18:58, Dmitry Tihov wrote:
> > > This patch set allows using End-to-End Data Protection in NVMe subsystem
> > > with integrity capable host devices as the NVMe namespaces backend.
> > > The patch series is based on io-uring kernel interface feature not merged
> > > to kernel upstream yet:
> > > https://lore.kernel.org/linux-block/20220920144618.1111138-1-a.buev@yadro.com/
> > >
> > > The main advantage of this approach is that it allows using the
> > > same protection information enabled disks in multiple VMs
> > > concurrently. This may be useful in cluster setups.
> > >
> > > Please let me know what do you think, are this kind of changes appropriate
> > > for QEMU upstream, what should be changed, etc.
> > >
> > > Dmitry Tihov (5):
> > > docs/nvme: add new feature summary
> > > block: add transfer of protection information
> > > hw/nvme: add protection information pass parameter
> > > hw/nvme: implement pi pass read/write/wrz commands
> > > hw/nvme: extend pi pass capable commands
> > >
> > > block/file-posix.c | 130 ++++++++++++-
> > > block/io_uring.c | 109 ++++++++++-
> > > docs/system/devices/nvme.rst | 15 ++
> > > hw/nvme/ctrl.c | 361 ++++++++++++++++++++++++++++++++---
> > > hw/nvme/dif.c | 303 +++++++++++++++++++++++++++++
> > > hw/nvme/dif.h | 18 ++
> > > hw/nvme/ns.c | 59 +++++-
> > > hw/nvme/nvme.h | 2 +
> > > hw/nvme/trace-events | 6 +
> > > include/block/block-common.h | 2 +
> > > include/block/raw-aio.h | 3 +-
> > > include/qemu/iov.h | 6 +
> > > util/iov.c | 24 +++
> > > 13 files changed, 992 insertions(+), 46 deletions(-)
> > >
> > > --
> > > 2.38.1
> > >
> >
> > Hi Dmitry,
> >
> > Neat.
> >
> > But this is largely depending on how the API turns out in block/ and I
> > am not the right one to comment on that. It's great that you have an
> > example device to utilize the API, but this needs comments from the
> > block layer maintainers before we consider it in hw/nvme.
>
> You mean API in QEMU block layer right? Specifically the second patch
> of this series. Should I send it in a distinct RFC for review by block
> layer maintainers?
>
Yes, basically the block/ stuff.
Given the RFC status of this series, I see no problem in keeping it
as-is. Having it showing how it is potentially used in a device is good.
I CC'ed the block maintainers to let them comment on it when they have
time. We are right up on a release, so expect some feedback as we start
the next development cycle post-release :)
[-- Attachment #2: signature.asc --]
[-- Type: application/pgp-signature, Size: 488 bytes --]
prev parent reply other threads:[~2022-12-05 12:48 UTC|newest]
Thread overview: 9+ messages / expand[flat|nested] mbox.gz Atom feed top
2022-11-24 15:58 [RFC 0/5] Protection information pass-through for block devices Dmitry Tihov
2022-11-24 15:58 ` [RFC 1/5] docs/nvme: add new feature summary Dmitry Tihov
2022-11-24 15:58 ` [RFC 2/5] block: add transfer of protection information Dmitry Tihov
2022-11-24 15:58 ` [RFC 3/5] hw/nvme: add protection information pass parameter Dmitry Tihov
2022-11-24 15:58 ` [RFC 4/5] hw/nvme: implement pi pass read/write/wrz commands Dmitry Tihov
2022-11-24 15:58 ` [RFC 5/5] hw/nvme: extend pi pass capable commands Dmitry Tihov
2022-11-25 7:44 ` [RFC 0/5] Protection information pass-through for block devices Klaus Jensen
2022-12-05 9:01 ` Dmitry Tihov
2022-12-05 12:47 ` Klaus Jensen [this message]
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=Y43oRSSnr3ZCJkSX@cormorant.local \
--to=its@irrelevant.dk \
--cc=a.buev@yadro.com \
--cc=d.tihov@yadro.com \
--cc=ddtikhov@gmail.com \
--cc=hreitz@redhat.com \
--cc=kbusch@kernel.org \
--cc=kwolf@redhat.com \
--cc=linux@yadro.com \
--cc=m.malygin@yadro.com \
--cc=qemu-block@nongnu.org \
--cc=qemu-devel@nongnu.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).