All of lore.kernel.org
 help / color / mirror / Atom feed
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: Eric Biggers <ebiggers@kernel.org>
Cc: Bart Van Assche <bvanassche@acm.org>,
	linux-block@vger.kernel.org, linux-kernel@vger.kernel.org,
	linux-api@vger.kernel.org, linux-scsi@vger.kernel.org,
	linux-mmc@vger.kernel.org, Hannes Reinecke <hare@suse.de>
Subject: Re: [PATCH v3 3/3] blk-crypto: show crypto capabilities in sysfs
Date: Fri, 10 Dec 2021 07:42:01 +0100	[thread overview]
Message-ID: <YbL2uUqV0GWFOitE@kroah.com> (raw)
In-Reply-To: <YbKT/lcp6iZ+lD4n@sol.localdomain>

On Thu, Dec 09, 2021 at 03:40:46PM -0800, Eric Biggers wrote:
> On Thu, Dec 09, 2021 at 02:51:59PM -0800, Bart Van Assche wrote:
> > On 12/7/21 5:35 PM, Eric Biggers wrote:
> > > +What:		/sys/block/<disk>/queue/crypto/modes/<mode>
> > > +Date:		December 2021
> > > +Contact:	linux-block@vger.kernel.org
> > > +Description:
> > > +		[RO] For each crypto mode (i.e., encryption/decryption
> > > +		algorithm) the device supports with inline encryption, a file
> > > +		will exist at this location.  It will contain a hexadecimal
> > > +		number that is a bitmask of the supported data unit sizes, in
> > > +		bytes, for that crypto mode.
> > > +
> > > +		Currently, the crypto modes that may be supported are:
> > > +
> > > +		   * AES-256-XTS
> > > +		   * AES-128-CBC-ESSIV
> > > +		   * Adiantum
> > > +
> > > +		For example, if a device supports AES-256-XTS inline encryption
> > > +		with data unit sizes of 512 and 4096 bytes, the file
> > > +		/sys/block/<disk>/queue/crypto/modes/AES-256-XTS will exist and
> > > +		will contain "0x1200".
> > 
> > So a bitmask is used to combine multiple values into a single number?
> 
> You could think of it that way, yes.
> 
> > Has it been considered to report each value separately, e.g. 512\n4096\n
> > instead of 0x1200\n?  I think the former approach is more friendly for shell
> > scripts.

No multi-line outputs in sysfs please.  If you have to do a "selection
from an array", that is not how to do it.

Look at the output of /sys/power/pm_test/ as one way you can do it if
you have to choose one option from a list:
$ cat /sys/power/pm_test
[none] core processors platform devices freezer

But I don't think that applies here, right?

> I don't think that would be acceptable to the sysfs folks, as they only allow
> one value per file.  I suppose a bitmask could be viewed as unacceptable too,
> but it seemed to make sense here, given that the data unit sizes are always
> powers of 2, and the hardware reports them as bitmasks.
> 
> Greg already reviewed this patch, but maybe he wasn't looking at this part.
> 
> Greg, any opinion on the best way to report a set of power-of-2 values via
> sysfs?

A single hex value makes sense to me.

thanks,

greg k-h

  parent reply	other threads:[~2021-12-10  6:42 UTC|newest]

Thread overview: 19+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2021-12-08  1:35 [PATCH v3 0/3] block: show crypto capabilities in sysfs Eric Biggers
2021-12-08  1:35 ` [PATCH v3 1/3] block: simplify calling convention of elv_unregister_queue() Eric Biggers
2021-12-09 19:00   ` Bart Van Assche
2021-12-08  1:35 ` [PATCH v3 2/3] block: don't delete queue kobject before its children Eric Biggers
2021-12-09 22:38   ` Bart Van Assche
2021-12-09 23:17     ` Eric Biggers
2021-12-09 23:26       ` Bart Van Assche
2021-12-08  1:35 ` [PATCH v3 3/3] blk-crypto: show crypto capabilities in sysfs Eric Biggers
2021-12-09 22:51   ` Bart Van Assche
2021-12-09 23:40     ` Eric Biggers
2021-12-10  0:02       ` Bart Van Assche
2021-12-10  0:12         ` Eric Biggers
2021-12-10  6:42       ` Greg Kroah-Hartman [this message]
2021-12-10 17:29         ` Bart Van Assche
2021-12-10 17:45           ` Eric Biggers
2021-12-11 10:50           ` Greg Kroah-Hartman
2021-12-14  5:04             ` Bart Van Assche
2021-12-14  7:23               ` Chaitanya Kulkarni
2021-12-14  7:29               ` Greg Kroah-Hartman

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=YbL2uUqV0GWFOitE@kroah.com \
    --to=gregkh@linuxfoundation.org \
    --cc=bvanassche@acm.org \
    --cc=ebiggers@kernel.org \
    --cc=hare@suse.de \
    --cc=linux-api@vger.kernel.org \
    --cc=linux-block@vger.kernel.org \
    --cc=linux-kernel@vger.kernel.org \
    --cc=linux-mmc@vger.kernel.org \
    --cc=linux-scsi@vger.kernel.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.