Continuing the discussion from BTRFS as default filesystem was a bad idea:
XFS - Atomic File Content Commit in Linux 6.13
inline hardware metadata space
nvme id-ns -H /dev/nvme1n1
IIUC for data-at-rest ie: in the TLC/QLD flash chips, self encryption protects data integrity. If a bit rots it will cause the decryption to fail and the devices always encrypt the data even when no passphrase is set.
For data-in-flight the nvme device has a built-in ARM Cortex R8 CPU and when the flash chips are accessed and the self encryption is decrypted it lands in the device’s SRAM ECC protected. When the transfer to the host occurs PCIe transfers are protected with ECC. Commands from the host also benefit from ECC.
As far as flash cell management goes, being nvme 2.0 indicates proper management with appropriate techniques such as wear leveling or other endurance features.
With the use of Flexible Data Placement (FDP) there is a constant write applification of 1 as well.
It seems there is benefit to these features without it but host software can receive additional benefits when applications are writted to leverage these features.
Support for all this is already in the kernel since 5.19.
Now to learn nvme-cli better to discover which features an nvme device on-hand implements. Also check into what Fedora has going for it in leveraging these features. Also more DIF/DIX understanding is desired.
My understanding may not be fully correct but overall, data is well protected with these newer devices. If using a filesystem with data block checksumming, turn it off as it is redundant and reduces performance.
There were some relatively recent updates that allow for dm-integrity and T10-PI hardware to be used in powerful ways.
dm-integrity under dm-crypt enables authenticated encryption
Pretty cool. Add dm-raid and it becomes self-healing.
All at the device block level so many options open up.
With the capabilities in fio it should be possible to explore and test well. Just need appropriate hardware before the fun begins.
It looks like filesystems can leverage this integrity metadata.