* [PATCH] tcm_vhost: Multi-target support
@ 2013-01-31 7:33 Asias He
0 siblings, 0 replies; 8+ messages in thread
From: Asias He @ 2013-01-31 7:33 UTC (permalink / raw)
To: Nicholas Bellinger
Cc: kvm, Michael S. Tsirkin, virtualization, target-devel,
Stefan Hajnoczi, Paolo Bonzini
In order to take advantages of Paolo's multi-queue virito-scsi, we need
multi-target support in tcm_vhost first. Otherwise all the requests go
to one queue and other queues are idle.
This patch makes:
1. All the targets under the wwpn is seen and can be used by guest.
2. No need to pass the tpgt number in struct vhost_scsi_target to
tcm_vhost.ko. Only wwpn is needed.
3. We can always pass max_target = 255 to guest now, since we abort the
request who's target id does not exist.
Signed-off-by: Asias He <asias@redhat.com>
---
drivers/vhost/tcm_vhost.c | 115 ++++++++++++++++++++++++++++------------------
drivers/vhost/tcm_vhost.h | 4 +-
2 files changed, 74 insertions(+), 45 deletions(-)
diff --git a/drivers/vhost/tcm_vhost.c b/drivers/vhost/tcm_vhost.c
index 218deb6..d50cb95 100644
--- a/drivers/vhost/tcm_vhost.c
+++ b/drivers/vhost/tcm_vhost.c
@@ -59,13 +59,18 @@ enum {
VHOST_SCSI_VQ_IO = 2,
};
+#define VHOST_SCSI_MAX_TARGET 256
+
struct vhost_scsi {
- struct tcm_vhost_tpg *vs_tpg; /* Protected by vhost_scsi->dev.mutex */
+ /* Protected by vhost_scsi->dev.mutex */
+ struct tcm_vhost_tpg *vs_tpg[VHOST_SCSI_MAX_TARGET];
struct vhost_dev dev;
struct vhost_virtqueue vqs[3];
struct vhost_work vs_completion_work; /* cmd completion work item */
struct llist_head vs_completion_list; /* cmd completion queue */
+ char vs_vhost_wwpn[TRANSPORT_IQN_LEN];
+ int vs_num_target;
};
/* Local pointer to allocated TCM configfs fabric module */
@@ -564,13 +569,7 @@ static void vhost_scsi_handle_vq(struct vhost_scsi *vs)
u32 exp_data_len, data_first, data_num, data_direction;
unsigned out, in, i;
int head, ret;
-
- /* Must use ioctl VHOST_SCSI_SET_ENDPOINT */
- tv_tpg = vs->vs_tpg;
- if (unlikely(!tv_tpg)) {
- pr_err("%s endpoint not set\n", __func__);
- return;
- }
+ u8 target;
mutex_lock(&vq->mutex);
vhost_disable_notify(&vs->dev, vq);
@@ -637,6 +636,35 @@ static void vhost_scsi_handle_vq(struct vhost_scsi *vs)
break;
}
+ /* Extract the tpgt */
+ target = v_req.lun[1];
+
+ /* Target does not exit, fail the request */
+ if (unlikely(target >= vs->vs_num_target)) {
+ struct virtio_scsi_cmd_resp __user *resp;
+ struct virtio_scsi_cmd_resp rsp;
+
+ memset(&rsp, 0, sizeof(rsp));
+ rsp.response = VIRTIO_SCSI_S_BAD_TARGET;
+ resp = vq->iov[out].iov_base;
+ ret = copy_to_user(resp, &rsp, sizeof(rsp));
+ if (!ret)
+ vhost_add_used_and_signal(&vs->dev,
+ &vs->vqs[2], head, 0);
+ else
+ pr_err("Faulted on virtio_scsi_cmd_resp\n");
+
+ continue;
+ }
+
+ tv_tpg = vs->vs_tpg[target];
+ if (unlikely(!tv_tpg)) {
+ /* Must use ioctl VHOST_SCSI_SET_ENDPOINT */
+ pr_err("endpoint not set, target = %d\n", target);
+ vhost_discard_vq_desc(vq, 1);
+ break;
+ }
+
exp_data_len = 0;
for (i = 0; i < data_num; i++)
exp_data_len += vq->iov[data_first + i].iov_len;
@@ -771,14 +799,11 @@ static int vhost_scsi_set_endpoint(
}
tv_tport = tv_tpg->tport;
- if (!strcmp(tv_tport->tport_name, t->vhost_wwpn) &&
- (tv_tpg->tport_tpgt == t->vhost_tpgt)) {
+ if (!strcmp(tv_tport->tport_name, t->vhost_wwpn)) {
tv_tpg->tv_tpg_vhost_count++;
- mutex_unlock(&tv_tpg->tv_tpg_mutex);
- mutex_unlock(&tcm_vhost_mutex);
mutex_lock(&vs->dev.mutex);
- if (vs->vs_tpg) {
+ if (vs->vs_tpg[tv_tpg->tport_tpgt - 1]) {
mutex_unlock(&vs->dev.mutex);
mutex_lock(&tv_tpg->tv_tpg_mutex);
tv_tpg->tv_tpg_vhost_count--;
@@ -786,15 +811,17 @@ static int vhost_scsi_set_endpoint(
return -EEXIST;
}
- vs->vs_tpg = tv_tpg;
+ vs->vs_tpg[tv_tpg->tport_tpgt - 1] = tv_tpg;
smp_mb__after_atomic_inc();
+ if (!vs->vs_num_target++)
+ memcpy(vs->vs_vhost_wwpn, t->vhost_wwpn,
+ sizeof(vs->vs_vhost_wwpn));
mutex_unlock(&vs->dev.mutex);
- return 0;
}
mutex_unlock(&tv_tpg->tv_tpg_mutex);
}
mutex_unlock(&tcm_vhost_mutex);
- return -EINVAL;
+ return 0;
}
static int vhost_scsi_clear_endpoint(
@@ -803,7 +830,8 @@ static int vhost_scsi_clear_endpoint(
{
struct tcm_vhost_tport *tv_tport;
struct tcm_vhost_tpg *tv_tpg;
- int index, ret;
+ int index, ret, i;
+ u8 target;
mutex_lock(&vs->dev.mutex);
/* Verify that ring has been setup correctly. */
@@ -813,27 +841,32 @@ static int vhost_scsi_clear_endpoint(
goto err;
}
}
+ for (i = 0; i < vs->vs_num_target; i++) {
+ target = i;
- if (!vs->vs_tpg) {
- ret = -ENODEV;
- goto err;
- }
- tv_tpg = vs->vs_tpg;
- tv_tport = tv_tpg->tport;
-
- if (strcmp(tv_tport->tport_name, t->vhost_wwpn) ||
- (tv_tpg->tport_tpgt != t->vhost_tpgt)) {
- pr_warn("tv_tport->tport_name: %s, tv_tpg->tport_tpgt: %hu"
- " does not match t->vhost_wwpn: %s, t->vhost_tpgt: %hu\n",
- tv_tport->tport_name, tv_tpg->tport_tpgt,
- t->vhost_wwpn, t->vhost_tpgt);
- ret = -EINVAL;
- goto err;
+ tv_tpg = vs->vs_tpg[target];
+ if (!tv_tpg) {
+ ret = -ENODEV;
+ goto err;
+ }
+ tv_tport = tv_tpg->tport;
+ if (!tv_tport) {
+ ret = -ENODEV;
+ goto err;
+ }
+
+ if (strcmp(tv_tport->tport_name, t->vhost_wwpn)) {
+ pr_warn("tv_tport->tport_name: %s, tv_tpg->tport_tpgt: %hu"
+ " does not match t->vhost_wwpn: %s, t->vhost_tpgt: %hu\n",
+ tv_tport->tport_name, tv_tpg->tport_tpgt,
+ t->vhost_wwpn, t->vhost_tpgt);
+ ret = -EINVAL;
+ goto err;
+ }
+ tv_tpg->tv_tpg_vhost_count--;
+ vs->vs_tpg[target] = NULL;
}
- tv_tpg->tv_tpg_vhost_count--;
- vs->vs_tpg = NULL;
mutex_unlock(&vs->dev.mutex);
-
return 0;
err:
@@ -868,16 +901,10 @@ static int vhost_scsi_open(struct inode *inode, struct file *f)
static int vhost_scsi_release(struct inode *inode, struct file *f)
{
struct vhost_scsi *s = f->private_data;
+ struct vhost_scsi_target t;
- if (s->vs_tpg && s->vs_tpg->tport) {
- struct vhost_scsi_target backend;
-
- memcpy(backend.vhost_wwpn, s->vs_tpg->tport->tport_name,
- sizeof(backend.vhost_wwpn));
- backend.vhost_tpgt = s->vs_tpg->tport_tpgt;
- vhost_scsi_clear_endpoint(s, &backend);
- }
-
+ memcpy(t.vhost_wwpn, s->vs_vhost_wwpn, sizeof(t.vhost_wwpn));
+ vhost_scsi_clear_endpoint(s, &t);
vhost_dev_stop(&s->dev);
vhost_dev_cleanup(&s->dev, false);
kfree(s);
diff --git a/drivers/vhost/tcm_vhost.h b/drivers/vhost/tcm_vhost.h
index 47ee80b..519a550 100644
--- a/drivers/vhost/tcm_vhost.h
+++ b/drivers/vhost/tcm_vhost.h
@@ -93,9 +93,11 @@ struct tcm_vhost_tport {
*
* ABI Rev 0: July 2012 version starting point for v3.6-rc merge candidate +
* RFC-v2 vhost-scsi userspace. Add GET_ABI_VERSION ioctl usage
+ * ABI Rev 1: January 2013. Ignore vhost_tpgt filed in struct vhost_scsi_target.
+ * All the targets under vhost_wwpn can be seen and used by guset.
*/
-#define VHOST_SCSI_ABI_VERSION 0
+#define VHOST_SCSI_ABI_VERSION 1
struct vhost_scsi_target {
int abi_version;
--
1.8.1
^ permalink raw reply related [flat|nested] 8+ messages in thread
* Re: [PATCH] tcm_vhost: Multi-target support
[not found] <1359617636-20339-1-git-send-email-asias@redhat.com>
@ 2013-01-31 9:28 ` Asias He
2013-01-31 11:13 ` Michael S. Tsirkin
` (3 more replies)
0 siblings, 4 replies; 8+ messages in thread
From: Asias He @ 2013-01-31 9:28 UTC (permalink / raw)
To: Nicholas Bellinger
Cc: kvm, Michael S. Tsirkin, virtualization, target-devel,
Stefan Hajnoczi, Paolo Bonzini
Hello Nicholas,
On 01/31/2013 03:33 PM, Asias He wrote:
> In order to take advantages of Paolo's multi-queue virito-scsi, we need
> multi-target support in tcm_vhost first. Otherwise all the requests go
> to one queue and other queues are idle.
>
> This patch makes:
>
> 1. All the targets under the wwpn is seen and can be used by guest.
> 2. No need to pass the tpgt number in struct vhost_scsi_target to
> tcm_vhost.ko. Only wwpn is needed.
> 3. We can always pass max_target = 255 to guest now, since we abort the
> request who's target id does not exist.
>
> Signed-off-by: Asias He <asias@redhat.com>
> ---
> drivers/vhost/tcm_vhost.c | 115 ++++++++++++++++++++++++++++------------------
> drivers/vhost/tcm_vhost.h | 4 +-
> 2 files changed, 74 insertions(+), 45 deletions(-)
>
> diff --git a/drivers/vhost/tcm_vhost.c b/drivers/vhost/tcm_vhost.c
> index 218deb6..d50cb95 100644
> --- a/drivers/vhost/tcm_vhost.c
> +++ b/drivers/vhost/tcm_vhost.c
> @@ -59,13 +59,18 @@ enum {
> VHOST_SCSI_VQ_IO = 2,
> };
>
> +#define VHOST_SCSI_MAX_TARGET 256
> +
> struct vhost_scsi {
> - struct tcm_vhost_tpg *vs_tpg; /* Protected by vhost_scsi->dev.mutex */
> + /* Protected by vhost_scsi->dev.mutex */
> + struct tcm_vhost_tpg *vs_tpg[VHOST_SCSI_MAX_TARGET];
> struct vhost_dev dev;
> struct vhost_virtqueue vqs[3];
>
> struct vhost_work vs_completion_work; /* cmd completion work item */
> struct llist_head vs_completion_list; /* cmd completion queue */
> + char vs_vhost_wwpn[TRANSPORT_IQN_LEN];
> + int vs_num_target;
> };
>
> /* Local pointer to allocated TCM configfs fabric module */
> @@ -564,13 +569,7 @@ static void vhost_scsi_handle_vq(struct vhost_scsi *vs)
> u32 exp_data_len, data_first, data_num, data_direction;
> unsigned out, in, i;
> int head, ret;
> -
> - /* Must use ioctl VHOST_SCSI_SET_ENDPOINT */
> - tv_tpg = vs->vs_tpg;
> - if (unlikely(!tv_tpg)) {
> - pr_err("%s endpoint not set\n", __func__);
> - return;
> - }
> + u8 target;
>
> mutex_lock(&vq->mutex);
> vhost_disable_notify(&vs->dev, vq);
> @@ -637,6 +636,35 @@ static void vhost_scsi_handle_vq(struct vhost_scsi *vs)
> break;
> }
>
> + /* Extract the tpgt */
> + target = v_req.lun[1];
> +
> + /* Target does not exit, fail the request */
> + if (unlikely(target >= vs->vs_num_target)) {
> + struct virtio_scsi_cmd_resp __user *resp;
> + struct virtio_scsi_cmd_resp rsp;
> +
> + memset(&rsp, 0, sizeof(rsp));
> + rsp.response = VIRTIO_SCSI_S_BAD_TARGET;
> + resp = vq->iov[out].iov_base;
> + ret = copy_to_user(resp, &rsp, sizeof(rsp));
> + if (!ret)
> + vhost_add_used_and_signal(&vs->dev,
> + &vs->vqs[2], head, 0);
> + else
> + pr_err("Faulted on virtio_scsi_cmd_resp\n");
> +
> + continue;
> + }
> +
> + tv_tpg = vs->vs_tpg[target];
> + if (unlikely(!tv_tpg)) {
> + /* Must use ioctl VHOST_SCSI_SET_ENDPOINT */
> + pr_err("endpoint not set, target = %d\n", target);
> + vhost_discard_vq_desc(vq, 1);
> + break;
> + }
> +
> exp_data_len = 0;
> for (i = 0; i < data_num; i++)
> exp_data_len += vq->iov[data_first + i].iov_len;
> @@ -771,14 +799,11 @@ static int vhost_scsi_set_endpoint(
> }
> tv_tport = tv_tpg->tport;
>
> - if (!strcmp(tv_tport->tport_name, t->vhost_wwpn) &&
> - (tv_tpg->tport_tpgt == t->vhost_tpgt)) {
> + if (!strcmp(tv_tport->tport_name, t->vhost_wwpn)) {
> tv_tpg->tv_tpg_vhost_count++;
> - mutex_unlock(&tv_tpg->tv_tpg_mutex);
> - mutex_unlock(&tcm_vhost_mutex);
>
> mutex_lock(&vs->dev.mutex);
> - if (vs->vs_tpg) {
> + if (vs->vs_tpg[tv_tpg->tport_tpgt - 1]) {
> mutex_unlock(&vs->dev.mutex);
> mutex_lock(&tv_tpg->tv_tpg_mutex);
> tv_tpg->tv_tpg_vhost_count--;
> @@ -786,15 +811,17 @@ static int vhost_scsi_set_endpoint(
> return -EEXIST;
> }
>
> - vs->vs_tpg = tv_tpg;
> + vs->vs_tpg[tv_tpg->tport_tpgt - 1] = tv_tpg;
tv_tpg->tport_tpgt starts from 0, right? I thought it starts from 1,
because I always got it starts from 1 in targetcli.
o- vhost
o- naa.6001405bd4e8476d
o- tpg1
o- luns
o- lun0
o- tpg2
o- luns
o- lun0
o- tpg3
o- luns
o- lun0
o- tpg4
o- luns
o- lun0
If it is true. I will cook v2 of this patch.
Also, the tv_tpg->tport_tpgt can be none-continuous. e.g.
o- vhost
o- naa.6001405bd4e8476d
o- tpg1
o- luns
o- lun0
o- tpg2
o- luns
o- lun0
o- tpg4
o- luns
o- lun0
I will handle this in v2.
And we need to fix another problem mentioned by Paolo.
Otherwise we can not use this to tell if a target exists or the endpoint
is not setup.
target = v_req.lun[1];
tv_tpg = vs->vs_tpg[target];
if (tv_tpg)
/* target exist */
else
/* target does not exist*/
""" from paolo
Another small bug I found is an ordering problem between
VHOST_SET_VRING_KICK and VHOST_SCSI_SET_ENDPOINT. Starting the vq
causes a "vhost_scsi_handle_vq endpoint not set" error in dmesg.
Because of this I added the first two patches, which let me do
VHOST_SCSI_SET_ENDPOINT before VHOST_SET_VRING_KICK but after setting
up the vring.
"""
> smp_mb__after_atomic_inc();
> + if (!vs->vs_num_target++)
> + memcpy(vs->vs_vhost_wwpn, t->vhost_wwpn,
> + sizeof(vs->vs_vhost_wwpn));
> mutex_unlock(&vs->dev.mutex);
> - return 0;
> }
> mutex_unlock(&tv_tpg->tv_tpg_mutex);
> }
> mutex_unlock(&tcm_vhost_mutex);
> - return -EINVAL;
> + return 0;
> }
>
> static int vhost_scsi_clear_endpoint(
> @@ -803,7 +830,8 @@ static int vhost_scsi_clear_endpoint(
> {
> struct tcm_vhost_tport *tv_tport;
> struct tcm_vhost_tpg *tv_tpg;
> - int index, ret;
> + int index, ret, i;
> + u8 target;
>
> mutex_lock(&vs->dev.mutex);
> /* Verify that ring has been setup correctly. */
> @@ -813,27 +841,32 @@ static int vhost_scsi_clear_endpoint(
> goto err;
> }
> }
> + for (i = 0; i < vs->vs_num_target; i++) {
> + target = i;
>
> - if (!vs->vs_tpg) {
> - ret = -ENODEV;
> - goto err;
> - }
> - tv_tpg = vs->vs_tpg;
> - tv_tport = tv_tpg->tport;
> -
> - if (strcmp(tv_tport->tport_name, t->vhost_wwpn) ||
> - (tv_tpg->tport_tpgt != t->vhost_tpgt)) {
> - pr_warn("tv_tport->tport_name: %s, tv_tpg->tport_tpgt: %hu"
> - " does not match t->vhost_wwpn: %s, t->vhost_tpgt: %hu\n",
> - tv_tport->tport_name, tv_tpg->tport_tpgt,
> - t->vhost_wwpn, t->vhost_tpgt);
> - ret = -EINVAL;
> - goto err;
> + tv_tpg = vs->vs_tpg[target];
> + if (!tv_tpg) {
> + ret = -ENODEV;
> + goto err;
> + }
> + tv_tport = tv_tpg->tport;
> + if (!tv_tport) {
> + ret = -ENODEV;
> + goto err;
> + }
> +
> + if (strcmp(tv_tport->tport_name, t->vhost_wwpn)) {
> + pr_warn("tv_tport->tport_name: %s, tv_tpg->tport_tpgt: %hu"
> + " does not match t->vhost_wwpn: %s, t->vhost_tpgt: %hu\n",
> + tv_tport->tport_name, tv_tpg->tport_tpgt,
> + t->vhost_wwpn, t->vhost_tpgt);
> + ret = -EINVAL;
> + goto err;
> + }
> + tv_tpg->tv_tpg_vhost_count--;
> + vs->vs_tpg[target] = NULL;
> }
> - tv_tpg->tv_tpg_vhost_count--;
> - vs->vs_tpg = NULL;
> mutex_unlock(&vs->dev.mutex);
> -
> return 0;
>
> err:
> @@ -868,16 +901,10 @@ static int vhost_scsi_open(struct inode *inode, struct file *f)
> static int vhost_scsi_release(struct inode *inode, struct file *f)
> {
> struct vhost_scsi *s = f->private_data;
> + struct vhost_scsi_target t;
>
> - if (s->vs_tpg && s->vs_tpg->tport) {
> - struct vhost_scsi_target backend;
> -
> - memcpy(backend.vhost_wwpn, s->vs_tpg->tport->tport_name,
> - sizeof(backend.vhost_wwpn));
> - backend.vhost_tpgt = s->vs_tpg->tport_tpgt;
> - vhost_scsi_clear_endpoint(s, &backend);
> - }
> -
> + memcpy(t.vhost_wwpn, s->vs_vhost_wwpn, sizeof(t.vhost_wwpn));
> + vhost_scsi_clear_endpoint(s, &t);
> vhost_dev_stop(&s->dev);
> vhost_dev_cleanup(&s->dev, false);
> kfree(s);
> diff --git a/drivers/vhost/tcm_vhost.h b/drivers/vhost/tcm_vhost.h
> index 47ee80b..519a550 100644
> --- a/drivers/vhost/tcm_vhost.h
> +++ b/drivers/vhost/tcm_vhost.h
> @@ -93,9 +93,11 @@ struct tcm_vhost_tport {
> *
> * ABI Rev 0: July 2012 version starting point for v3.6-rc merge candidate +
> * RFC-v2 vhost-scsi userspace. Add GET_ABI_VERSION ioctl usage
> + * ABI Rev 1: January 2013. Ignore vhost_tpgt filed in struct vhost_scsi_target.
> + * All the targets under vhost_wwpn can be seen and used by guset.
> */
>
> -#define VHOST_SCSI_ABI_VERSION 0
> +#define VHOST_SCSI_ABI_VERSION 1
>
> struct vhost_scsi_target {
> int abi_version;
>
--
Asias
^ permalink raw reply [flat|nested] 8+ messages in thread
* Re: [PATCH] tcm_vhost: Multi-target support
2013-01-31 9:28 ` [PATCH] tcm_vhost: Multi-target support Asias He
@ 2013-01-31 11:13 ` Michael S. Tsirkin
2013-01-31 20:59 ` Nicholas A. Bellinger
` (2 subsequent siblings)
3 siblings, 0 replies; 8+ messages in thread
From: Michael S. Tsirkin @ 2013-01-31 11:13 UTC (permalink / raw)
To: Asias He
Cc: kvm, virtualization, target-devel, Stefan Hajnoczi, Paolo Bonzini
On Thu, Jan 31, 2013 at 05:28:21PM +0800, Asias He wrote:
> Hello Nicholas,
>
> On 01/31/2013 03:33 PM, Asias He wrote:
> > In order to take advantages of Paolo's multi-queue virito-scsi, we need
> > multi-target support in tcm_vhost first. Otherwise all the requests go
> > to one queue and other queues are idle.
> >
> > This patch makes:
> >
> > 1. All the targets under the wwpn is seen and can be used by guest.
> > 2. No need to pass the tpgt number in struct vhost_scsi_target to
> > tcm_vhost.ko. Only wwpn is needed.
> > 3. We can always pass max_target = 255 to guest now, since we abort the
> > request who's target id does not exist.
> >
> > Signed-off-by: Asias He <asias@redhat.com>
> > ---
> > drivers/vhost/tcm_vhost.c | 115 ++++++++++++++++++++++++++++------------------
> > drivers/vhost/tcm_vhost.h | 4 +-
> > 2 files changed, 74 insertions(+), 45 deletions(-)
> >
> > diff --git a/drivers/vhost/tcm_vhost.c b/drivers/vhost/tcm_vhost.c
> > index 218deb6..d50cb95 100644
> > --- a/drivers/vhost/tcm_vhost.c
> > +++ b/drivers/vhost/tcm_vhost.c
> > @@ -59,13 +59,18 @@ enum {
> > VHOST_SCSI_VQ_IO = 2,
> > };
> >
> > +#define VHOST_SCSI_MAX_TARGET 256
> > +
> > struct vhost_scsi {
> > - struct tcm_vhost_tpg *vs_tpg; /* Protected by vhost_scsi->dev.mutex */
> > + /* Protected by vhost_scsi->dev.mutex */
> > + struct tcm_vhost_tpg *vs_tpg[VHOST_SCSI_MAX_TARGET];
> > struct vhost_dev dev;
> > struct vhost_virtqueue vqs[3];
> >
> > struct vhost_work vs_completion_work; /* cmd completion work item */
> > struct llist_head vs_completion_list; /* cmd completion queue */
> > + char vs_vhost_wwpn[TRANSPORT_IQN_LEN];
> > + int vs_num_target;
> > };
> >
> > /* Local pointer to allocated TCM configfs fabric module */
> > @@ -564,13 +569,7 @@ static void vhost_scsi_handle_vq(struct vhost_scsi *vs)
> > u32 exp_data_len, data_first, data_num, data_direction;
> > unsigned out, in, i;
> > int head, ret;
> > -
> > - /* Must use ioctl VHOST_SCSI_SET_ENDPOINT */
> > - tv_tpg = vs->vs_tpg;
> > - if (unlikely(!tv_tpg)) {
> > - pr_err("%s endpoint not set\n", __func__);
> > - return;
> > - }
> > + u8 target;
> >
> > mutex_lock(&vq->mutex);
> > vhost_disable_notify(&vs->dev, vq);
> > @@ -637,6 +636,35 @@ static void vhost_scsi_handle_vq(struct vhost_scsi *vs)
> > break;
> > }
> >
> > + /* Extract the tpgt */
> > + target = v_req.lun[1];
> > +
> > + /* Target does not exit, fail the request */
> > + if (unlikely(target >= vs->vs_num_target)) {
> > + struct virtio_scsi_cmd_resp __user *resp;
> > + struct virtio_scsi_cmd_resp rsp;
> > +
> > + memset(&rsp, 0, sizeof(rsp));
> > + rsp.response = VIRTIO_SCSI_S_BAD_TARGET;
> > + resp = vq->iov[out].iov_base;
> > + ret = copy_to_user(resp, &rsp, sizeof(rsp));
> > + if (!ret)
> > + vhost_add_used_and_signal(&vs->dev,
> > + &vs->vqs[2], head, 0);
> > + else
> > + pr_err("Faulted on virtio_scsi_cmd_resp\n");
> > +
> > + continue;
> > + }
> > +
> > + tv_tpg = vs->vs_tpg[target];
> > + if (unlikely(!tv_tpg)) {
> > + /* Must use ioctl VHOST_SCSI_SET_ENDPOINT */
> > + pr_err("endpoint not set, target = %d\n", target);
> > + vhost_discard_vq_desc(vq, 1);
> > + break;
> > + }
> > +
> > exp_data_len = 0;
> > for (i = 0; i < data_num; i++)
> > exp_data_len += vq->iov[data_first + i].iov_len;
> > @@ -771,14 +799,11 @@ static int vhost_scsi_set_endpoint(
> > }
> > tv_tport = tv_tpg->tport;
> >
> > - if (!strcmp(tv_tport->tport_name, t->vhost_wwpn) &&
> > - (tv_tpg->tport_tpgt == t->vhost_tpgt)) {
> > + if (!strcmp(tv_tport->tport_name, t->vhost_wwpn)) {
> > tv_tpg->tv_tpg_vhost_count++;
> > - mutex_unlock(&tv_tpg->tv_tpg_mutex);
> > - mutex_unlock(&tcm_vhost_mutex);
> >
> > mutex_lock(&vs->dev.mutex);
> > - if (vs->vs_tpg) {
> > + if (vs->vs_tpg[tv_tpg->tport_tpgt - 1]) {
> > mutex_unlock(&vs->dev.mutex);
> > mutex_lock(&tv_tpg->tv_tpg_mutex);
> > tv_tpg->tv_tpg_vhost_count--;
> > @@ -786,15 +811,17 @@ static int vhost_scsi_set_endpoint(
> > return -EEXIST;
> > }
> >
> > - vs->vs_tpg = tv_tpg;
> > + vs->vs_tpg[tv_tpg->tport_tpgt - 1] = tv_tpg;
>
>
> tv_tpg->tport_tpgt starts from 0, right? I thought it starts from 1,
> because I always got it starts from 1 in targetcli.
>
> o- vhost
> o- naa.6001405bd4e8476d
> o- tpg1
> o- luns
> o- lun0
> o- tpg2
> o- luns
> o- lun0
> o- tpg3
> o- luns
> o- lun0
> o- tpg4
> o- luns
> o- lun0
>
> If it is true. I will cook v2 of this patch.
>
> Also, the tv_tpg->tport_tpgt can be none-continuous. e.g.
>
> o- vhost
> o- naa.6001405bd4e8476d
> o- tpg1
> o- luns
> o- lun0
> o- tpg2
> o- luns
> o- lun0
> o- tpg4
> o- luns
> o- lun0
>
> I will handle this in v2.
>
>
> And we need to fix another problem mentioned by Paolo.
> Otherwise we can not use this to tell if a target exists or the endpoint
> is not setup.
>
> target = v_req.lun[1];
> tv_tpg = vs->vs_tpg[target];
> if (tv_tpg)
> /* target exist */
> else
> /* target does not exist*/
>
Why should there be a difference?
> """ from paolo
> Another small bug I found is an ordering problem between
> VHOST_SET_VRING_KICK and VHOST_SCSI_SET_ENDPOINT. Starting the vq
> causes a "vhost_scsi_handle_vq endpoint not set" error in dmesg.
> Because of this I added the first two patches, which let me do
> VHOST_SCSI_SET_ENDPOINT before VHOST_SET_VRING_KICK but after setting
> up the vring.
> """
>
>
> > smp_mb__after_atomic_inc();
> > + if (!vs->vs_num_target++)
> > + memcpy(vs->vs_vhost_wwpn, t->vhost_wwpn,
> > + sizeof(vs->vs_vhost_wwpn));
> > mutex_unlock(&vs->dev.mutex);
> > - return 0;
> > }
> > mutex_unlock(&tv_tpg->tv_tpg_mutex);
> > }
> > mutex_unlock(&tcm_vhost_mutex);
> > - return -EINVAL;
> > + return 0;
> > }
> >
> > static int vhost_scsi_clear_endpoint(
> > @@ -803,7 +830,8 @@ static int vhost_scsi_clear_endpoint(
> > {
> > struct tcm_vhost_tport *tv_tport;
> > struct tcm_vhost_tpg *tv_tpg;
> > - int index, ret;
> > + int index, ret, i;
> > + u8 target;
> >
> > mutex_lock(&vs->dev.mutex);
> > /* Verify that ring has been setup correctly. */
> > @@ -813,27 +841,32 @@ static int vhost_scsi_clear_endpoint(
> > goto err;
> > }
> > }
> > + for (i = 0; i < vs->vs_num_target; i++) {
> > + target = i;
> >
> > - if (!vs->vs_tpg) {
> > - ret = -ENODEV;
> > - goto err;
> > - }
> > - tv_tpg = vs->vs_tpg;
> > - tv_tport = tv_tpg->tport;
> > -
> > - if (strcmp(tv_tport->tport_name, t->vhost_wwpn) ||
> > - (tv_tpg->tport_tpgt != t->vhost_tpgt)) {
> > - pr_warn("tv_tport->tport_name: %s, tv_tpg->tport_tpgt: %hu"
> > - " does not match t->vhost_wwpn: %s, t->vhost_tpgt: %hu\n",
> > - tv_tport->tport_name, tv_tpg->tport_tpgt,
> > - t->vhost_wwpn, t->vhost_tpgt);
> > - ret = -EINVAL;
> > - goto err;
> > + tv_tpg = vs->vs_tpg[target];
> > + if (!tv_tpg) {
> > + ret = -ENODEV;
> > + goto err;
> > + }
> > + tv_tport = tv_tpg->tport;
> > + if (!tv_tport) {
> > + ret = -ENODEV;
> > + goto err;
> > + }
> > +
> > + if (strcmp(tv_tport->tport_name, t->vhost_wwpn)) {
> > + pr_warn("tv_tport->tport_name: %s, tv_tpg->tport_tpgt: %hu"
> > + " does not match t->vhost_wwpn: %s, t->vhost_tpgt: %hu\n",
> > + tv_tport->tport_name, tv_tpg->tport_tpgt,
> > + t->vhost_wwpn, t->vhost_tpgt);
> > + ret = -EINVAL;
> > + goto err;
> > + }
> > + tv_tpg->tv_tpg_vhost_count--;
> > + vs->vs_tpg[target] = NULL;
> > }
> > - tv_tpg->tv_tpg_vhost_count--;
> > - vs->vs_tpg = NULL;
> > mutex_unlock(&vs->dev.mutex);
> > -
> > return 0;
> >
> > err:
> > @@ -868,16 +901,10 @@ static int vhost_scsi_open(struct inode *inode, struct file *f)
> > static int vhost_scsi_release(struct inode *inode, struct file *f)
> > {
> > struct vhost_scsi *s = f->private_data;
> > + struct vhost_scsi_target t;
> >
> > - if (s->vs_tpg && s->vs_tpg->tport) {
> > - struct vhost_scsi_target backend;
> > -
> > - memcpy(backend.vhost_wwpn, s->vs_tpg->tport->tport_name,
> > - sizeof(backend.vhost_wwpn));
> > - backend.vhost_tpgt = s->vs_tpg->tport_tpgt;
> > - vhost_scsi_clear_endpoint(s, &backend);
> > - }
> > -
> > + memcpy(t.vhost_wwpn, s->vs_vhost_wwpn, sizeof(t.vhost_wwpn));
> > + vhost_scsi_clear_endpoint(s, &t);
> > vhost_dev_stop(&s->dev);
> > vhost_dev_cleanup(&s->dev, false);
> > kfree(s);
> > diff --git a/drivers/vhost/tcm_vhost.h b/drivers/vhost/tcm_vhost.h
> > index 47ee80b..519a550 100644
> > --- a/drivers/vhost/tcm_vhost.h
> > +++ b/drivers/vhost/tcm_vhost.h
> > @@ -93,9 +93,11 @@ struct tcm_vhost_tport {
> > *
> > * ABI Rev 0: July 2012 version starting point for v3.6-rc merge candidate +
> > * RFC-v2 vhost-scsi userspace. Add GET_ABI_VERSION ioctl usage
> > + * ABI Rev 1: January 2013. Ignore vhost_tpgt filed in struct vhost_scsi_target.
> > + * All the targets under vhost_wwpn can be seen and used by guset.
> > */
> >
> > -#define VHOST_SCSI_ABI_VERSION 0
> > +#define VHOST_SCSI_ABI_VERSION 1
> >
> > struct vhost_scsi_target {
> > int abi_version;
> >
>
>
> --
> Asias
^ permalink raw reply [flat|nested] 8+ messages in thread
* Re: [PATCH] tcm_vhost: Multi-target support
2013-01-31 9:28 ` [PATCH] tcm_vhost: Multi-target support Asias He
2013-01-31 11:13 ` Michael S. Tsirkin
@ 2013-01-31 20:59 ` Nicholas A. Bellinger
[not found] ` <20130131111355.GC520@redhat.com>
[not found] ` <1359665976.6300.43.camel@haakon2.linux-iscsi.org>
3 siblings, 0 replies; 8+ messages in thread
From: Nicholas A. Bellinger @ 2013-01-31 20:59 UTC (permalink / raw)
To: Asias He
Cc: kvm, Michael S. Tsirkin, virtualization, target-devel,
Stefan Hajnoczi, Paolo Bonzini
On Thu, 2013-01-31 at 17:28 +0800, Asias He wrote:
> Hello Nicholas,
>
> On 01/31/2013 03:33 PM, Asias He wrote:
> > In order to take advantages of Paolo's multi-queue virito-scsi, we need
> > multi-target support in tcm_vhost first. Otherwise all the requests go
> > to one queue and other queues are idle.
> >
> > This patch makes:
> >
> > 1. All the targets under the wwpn is seen and can be used by guest.
> > 2. No need to pass the tpgt number in struct vhost_scsi_target to
> > tcm_vhost.ko. Only wwpn is needed.
> > 3. We can always pass max_target = 255 to guest now, since we abort the
> > request who's target id does not exist.
> >
> > Signed-off-by: Asias He <asias@redhat.com>
> > ---
> > drivers/vhost/tcm_vhost.c | 115 ++++++++++++++++++++++++++++------------------
> > drivers/vhost/tcm_vhost.h | 4 +-
> > 2 files changed, 74 insertions(+), 45 deletions(-)
> >
> > diff --git a/drivers/vhost/tcm_vhost.c b/drivers/vhost/tcm_vhost.c
> > index 218deb6..d50cb95 100644
> > --- a/drivers/vhost/tcm_vhost.c
> > +++ b/drivers/vhost/tcm_vhost.c
> > @@ -59,13 +59,18 @@ enum {
> > VHOST_SCSI_VQ_IO = 2,
> > };
> >
> > +#define VHOST_SCSI_MAX_TARGET 256
> > +
> > struct vhost_scsi {
> > - struct tcm_vhost_tpg *vs_tpg; /* Protected by vhost_scsi->dev.mutex */
> > + /* Protected by vhost_scsi->dev.mutex */
> > + struct tcm_vhost_tpg *vs_tpg[VHOST_SCSI_MAX_TARGET];
> > struct vhost_dev dev;
> > struct vhost_virtqueue vqs[3];
> >
> > struct vhost_work vs_completion_work; /* cmd completion work item */
> > struct llist_head vs_completion_list; /* cmd completion queue */
> > + char vs_vhost_wwpn[TRANSPORT_IQN_LEN];
> > + int vs_num_target;
> > };
> >
> > /* Local pointer to allocated TCM configfs fabric module */
> > @@ -564,13 +569,7 @@ static void vhost_scsi_handle_vq(struct vhost_scsi *vs)
> > u32 exp_data_len, data_first, data_num, data_direction;
> > unsigned out, in, i;
> > int head, ret;
> > -
> > - /* Must use ioctl VHOST_SCSI_SET_ENDPOINT */
> > - tv_tpg = vs->vs_tpg;
> > - if (unlikely(!tv_tpg)) {
> > - pr_err("%s endpoint not set\n", __func__);
> > - return;
> > - }
> > + u8 target;
> >
> > mutex_lock(&vq->mutex);
> > vhost_disable_notify(&vs->dev, vq);
> > @@ -637,6 +636,35 @@ static void vhost_scsi_handle_vq(struct vhost_scsi *vs)
> > break;
> > }
> >
> > + /* Extract the tpgt */
> > + target = v_req.lun[1];
> > +
> > + /* Target does not exit, fail the request */
> > + if (unlikely(target >= vs->vs_num_target)) {
> > + struct virtio_scsi_cmd_resp __user *resp;
> > + struct virtio_scsi_cmd_resp rsp;
> > +
> > + memset(&rsp, 0, sizeof(rsp));
> > + rsp.response = VIRTIO_SCSI_S_BAD_TARGET;
> > + resp = vq->iov[out].iov_base;
> > + ret = copy_to_user(resp, &rsp, sizeof(rsp));
> > + if (!ret)
> > + vhost_add_used_and_signal(&vs->dev,
> > + &vs->vqs[2], head, 0);
> > + else
> > + pr_err("Faulted on virtio_scsi_cmd_resp\n");
> > +
> > + continue;
> > + }
> > +
> > + tv_tpg = vs->vs_tpg[target];
> > + if (unlikely(!tv_tpg)) {
> > + /* Must use ioctl VHOST_SCSI_SET_ENDPOINT */
> > + pr_err("endpoint not set, target = %d\n", target);
> > + vhost_discard_vq_desc(vq, 1);
> > + break;
> > + }
> > +
> > exp_data_len = 0;
> > for (i = 0; i < data_num; i++)
> > exp_data_len += vq->iov[data_first + i].iov_len;
> > @@ -771,14 +799,11 @@ static int vhost_scsi_set_endpoint(
> > }
> > tv_tport = tv_tpg->tport;
> >
> > - if (!strcmp(tv_tport->tport_name, t->vhost_wwpn) &&
> > - (tv_tpg->tport_tpgt == t->vhost_tpgt)) {
> > + if (!strcmp(tv_tport->tport_name, t->vhost_wwpn)) {
> > tv_tpg->tv_tpg_vhost_count++;
> > - mutex_unlock(&tv_tpg->tv_tpg_mutex);
> > - mutex_unlock(&tcm_vhost_mutex);
> >
> > mutex_lock(&vs->dev.mutex);
> > - if (vs->vs_tpg) {
> > + if (vs->vs_tpg[tv_tpg->tport_tpgt - 1]) {
> > mutex_unlock(&vs->dev.mutex);
> > mutex_lock(&tv_tpg->tv_tpg_mutex);
> > tv_tpg->tv_tpg_vhost_count--;
> > @@ -786,15 +811,17 @@ static int vhost_scsi_set_endpoint(
> > return -EEXIST;
> > }
> >
> > - vs->vs_tpg = tv_tpg;
> > + vs->vs_tpg[tv_tpg->tport_tpgt - 1] = tv_tpg;
>
>
> tv_tpg->tport_tpgt starts from 0, right? I thought it starts from 1,
> because I always got it starts from 1 in targetcli.
>
> o- vhost
> o- naa.6001405bd4e8476d
> o- tpg1
> o- luns
> o- lun0
> o- tpg2
> o- luns
> o- lun0
> o- tpg3
> o- luns
> o- lun0
> o- tpg4
> o- luns
> o- lun0
>
So at least with iscsi-target, we start from tpgt=1 to avoid some legacy
initiators that have issues handling tgpt=0.
Given that rtslib/targetcli currently expect this with the "tpgs"
feature is enabled, starting from tpgt=1 with tcm_vhost probably makes
the most sense.
> If it is true. I will cook v2 of this patch.
>
> Also, the tv_tpg->tport_tpgt can be none-continuous. e.g.
>
> o- vhost
> o- naa.6001405bd4e8476d
> o- tpg1
> o- luns
> o- lun0
> o- tpg2
> o- luns
> o- lun0
> o- tpg4
> o- luns
> o- lun0
>
> I will handle this in v2.
>
Correct, tpgt values may be optionally non-contiguous up to unsigned
short.
--nab
^ permalink raw reply [flat|nested] 8+ messages in thread
* Re: [PATCH] tcm_vhost: Multi-target support
[not found] ` <20130131111355.GC520@redhat.com>
@ 2013-02-01 3:58 ` Asias He
0 siblings, 0 replies; 8+ messages in thread
From: Asias He @ 2013-02-01 3:58 UTC (permalink / raw)
To: Michael S. Tsirkin
Cc: kvm, virtualization, target-devel, Stefan Hajnoczi, Paolo Bonzini
On 01/31/2013 07:13 PM, Michael S. Tsirkin wrote:
> On Thu, Jan 31, 2013 at 05:28:21PM +0800, Asias He wrote:
>> Hello Nicholas,
>>
>> On 01/31/2013 03:33 PM, Asias He wrote:
>>> In order to take advantages of Paolo's multi-queue virito-scsi, we need
>>> multi-target support in tcm_vhost first. Otherwise all the requests go
>>> to one queue and other queues are idle.
>>>
>>> This patch makes:
>>>
>>> 1. All the targets under the wwpn is seen and can be used by guest.
>>> 2. No need to pass the tpgt number in struct vhost_scsi_target to
>>> tcm_vhost.ko. Only wwpn is needed.
>>> 3. We can always pass max_target = 255 to guest now, since we abort the
>>> request who's target id does not exist.
>>>
>>> Signed-off-by: Asias He <asias@redhat.com>
>>> ---
>>> drivers/vhost/tcm_vhost.c | 115 ++++++++++++++++++++++++++++------------------
>>> drivers/vhost/tcm_vhost.h | 4 +-
>>> 2 files changed, 74 insertions(+), 45 deletions(-)
>>>
>>> diff --git a/drivers/vhost/tcm_vhost.c b/drivers/vhost/tcm_vhost.c
>>> index 218deb6..d50cb95 100644
>>> --- a/drivers/vhost/tcm_vhost.c
>>> +++ b/drivers/vhost/tcm_vhost.c
>>> @@ -59,13 +59,18 @@ enum {
>>> VHOST_SCSI_VQ_IO = 2,
>>> };
>>>
>>> +#define VHOST_SCSI_MAX_TARGET 256
>>> +
>>> struct vhost_scsi {
>>> - struct tcm_vhost_tpg *vs_tpg; /* Protected by vhost_scsi->dev.mutex */
>>> + /* Protected by vhost_scsi->dev.mutex */
>>> + struct tcm_vhost_tpg *vs_tpg[VHOST_SCSI_MAX_TARGET];
>>> struct vhost_dev dev;
>>> struct vhost_virtqueue vqs[3];
>>>
>>> struct vhost_work vs_completion_work; /* cmd completion work item */
>>> struct llist_head vs_completion_list; /* cmd completion queue */
>>> + char vs_vhost_wwpn[TRANSPORT_IQN_LEN];
>>> + int vs_num_target;
>>> };
>>>
>>> /* Local pointer to allocated TCM configfs fabric module */
>>> @@ -564,13 +569,7 @@ static void vhost_scsi_handle_vq(struct vhost_scsi *vs)
>>> u32 exp_data_len, data_first, data_num, data_direction;
>>> unsigned out, in, i;
>>> int head, ret;
>>> -
>>> - /* Must use ioctl VHOST_SCSI_SET_ENDPOINT */
>>> - tv_tpg = vs->vs_tpg;
>>> - if (unlikely(!tv_tpg)) {
>>> - pr_err("%s endpoint not set\n", __func__);
>>> - return;
>>> - }
>>> + u8 target;
>>>
>>> mutex_lock(&vq->mutex);
>>> vhost_disable_notify(&vs->dev, vq);
>>> @@ -637,6 +636,35 @@ static void vhost_scsi_handle_vq(struct vhost_scsi *vs)
>>> break;
>>> }
>>>
>>> + /* Extract the tpgt */
>>> + target = v_req.lun[1];
>>> +
>>> + /* Target does not exit, fail the request */
>>> + if (unlikely(target >= vs->vs_num_target)) {
>>> + struct virtio_scsi_cmd_resp __user *resp;
>>> + struct virtio_scsi_cmd_resp rsp;
>>> +
>>> + memset(&rsp, 0, sizeof(rsp));
>>> + rsp.response = VIRTIO_SCSI_S_BAD_TARGET;
>>> + resp = vq->iov[out].iov_base;
>>> + ret = copy_to_user(resp, &rsp, sizeof(rsp));
>>> + if (!ret)
>>> + vhost_add_used_and_signal(&vs->dev,
>>> + &vs->vqs[2], head, 0);
>>> + else
>>> + pr_err("Faulted on virtio_scsi_cmd_resp\n");
>>> +
>>> + continue;
>>> + }
>>> +
>>> + tv_tpg = vs->vs_tpg[target];
>>> + if (unlikely(!tv_tpg)) {
>>> + /* Must use ioctl VHOST_SCSI_SET_ENDPOINT */
>>> + pr_err("endpoint not set, target = %d\n", target);
>>> + vhost_discard_vq_desc(vq, 1);
>>> + break;
>>> + }
>>> +
>>> exp_data_len = 0;
>>> for (i = 0; i < data_num; i++)
>>> exp_data_len += vq->iov[data_first + i].iov_len;
>>> @@ -771,14 +799,11 @@ static int vhost_scsi_set_endpoint(
>>> }
>>> tv_tport = tv_tpg->tport;
>>>
>>> - if (!strcmp(tv_tport->tport_name, t->vhost_wwpn) &&
>>> - (tv_tpg->tport_tpgt == t->vhost_tpgt)) {
>>> + if (!strcmp(tv_tport->tport_name, t->vhost_wwpn)) {
>>> tv_tpg->tv_tpg_vhost_count++;
>>> - mutex_unlock(&tv_tpg->tv_tpg_mutex);
>>> - mutex_unlock(&tcm_vhost_mutex);
>>>
>>> mutex_lock(&vs->dev.mutex);
>>> - if (vs->vs_tpg) {
>>> + if (vs->vs_tpg[tv_tpg->tport_tpgt - 1]) {
>>> mutex_unlock(&vs->dev.mutex);
>>> mutex_lock(&tv_tpg->tv_tpg_mutex);
>>> tv_tpg->tv_tpg_vhost_count--;
>>> @@ -786,15 +811,17 @@ static int vhost_scsi_set_endpoint(
>>> return -EEXIST;
>>> }
>>>
>>> - vs->vs_tpg = tv_tpg;
>>> + vs->vs_tpg[tv_tpg->tport_tpgt - 1] = tv_tpg;
>>
>>
>> tv_tpg->tport_tpgt starts from 0, right? I thought it starts from 1,
>> because I always got it starts from 1 in targetcli.
>>
>> o- vhost
>> o- naa.6001405bd4e8476d
>> o- tpg1
>> o- luns
>> o- lun0
>> o- tpg2
>> o- luns
>> o- lun0
>> o- tpg3
>> o- luns
>> o- lun0
>> o- tpg4
>> o- luns
>> o- lun0
>>
>> If it is true. I will cook v2 of this patch.
>>
>> Also, the tv_tpg->tport_tpgt can be none-continuous. e.g.
>>
>> o- vhost
>> o- naa.6001405bd4e8476d
>> o- tpg1
>> o- luns
>> o- lun0
>> o- tpg2
>> o- luns
>> o- lun0
>> o- tpg4
>> o- luns
>> o- lun0
>>
>> I will handle this in v2.
>>
>>
>> And we need to fix another problem mentioned by Paolo.
>> Otherwise we can not use this to tell if a target exists or the endpoint
>> is not setup.
>>
>> target = v_req.lun[1];
>> tv_tpg = vs->vs_tpg[target];
>> if (tv_tpg)
>> /* target exist */
>> else
>> /* target does not exist*/
>>
>
> Why should there be a difference?
With multi-target, if tv_tpg is NULL, there might be two reasons:
1. backend is not setup
2. this target does not exist.
we need another flag to indicate if the endpoint is setup or not.
Set/Clear it in vhost_scsi_set_endpoint()/vhost_scsi_clear_endpoint(),
Test it in vhost_scsi_handle_vq().
>
>> """ from paolo
>> Another small bug I found is an ordering problem between
>> VHOST_SET_VRING_KICK and VHOST_SCSI_SET_ENDPOINT. Starting the vq
>> causes a "vhost_scsi_handle_vq endpoint not set" error in dmesg.
>> Because of this I added the first two patches, which let me do
>> VHOST_SCSI_SET_ENDPOINT before VHOST_SET_VRING_KICK but after setting
>> up the vring.
>> """
>>
>>
>>> smp_mb__after_atomic_inc();
>>> + if (!vs->vs_num_target++)
>>> + memcpy(vs->vs_vhost_wwpn, t->vhost_wwpn,
>>> + sizeof(vs->vs_vhost_wwpn));
>>> mutex_unlock(&vs->dev.mutex);
>>> - return 0;
>>> }
>>> mutex_unlock(&tv_tpg->tv_tpg_mutex);
>>> }
>>> mutex_unlock(&tcm_vhost_mutex);
>>> - return -EINVAL;
>>> + return 0;
>>> }
>>>
>>> static int vhost_scsi_clear_endpoint(
>>> @@ -803,7 +830,8 @@ static int vhost_scsi_clear_endpoint(
>>> {
>>> struct tcm_vhost_tport *tv_tport;
>>> struct tcm_vhost_tpg *tv_tpg;
>>> - int index, ret;
>>> + int index, ret, i;
>>> + u8 target;
>>>
>>> mutex_lock(&vs->dev.mutex);
>>> /* Verify that ring has been setup correctly. */
>>> @@ -813,27 +841,32 @@ static int vhost_scsi_clear_endpoint(
>>> goto err;
>>> }
>>> }
>>> + for (i = 0; i < vs->vs_num_target; i++) {
>>> + target = i;
>>>
>>> - if (!vs->vs_tpg) {
>>> - ret = -ENODEV;
>>> - goto err;
>>> - }
>>> - tv_tpg = vs->vs_tpg;
>>> - tv_tport = tv_tpg->tport;
>>> -
>>> - if (strcmp(tv_tport->tport_name, t->vhost_wwpn) ||
>>> - (tv_tpg->tport_tpgt != t->vhost_tpgt)) {
>>> - pr_warn("tv_tport->tport_name: %s, tv_tpg->tport_tpgt: %hu"
>>> - " does not match t->vhost_wwpn: %s, t->vhost_tpgt: %hu\n",
>>> - tv_tport->tport_name, tv_tpg->tport_tpgt,
>>> - t->vhost_wwpn, t->vhost_tpgt);
>>> - ret = -EINVAL;
>>> - goto err;
>>> + tv_tpg = vs->vs_tpg[target];
>>> + if (!tv_tpg) {
>>> + ret = -ENODEV;
>>> + goto err;
>>> + }
>>> + tv_tport = tv_tpg->tport;
>>> + if (!tv_tport) {
>>> + ret = -ENODEV;
>>> + goto err;
>>> + }
>>> +
>>> + if (strcmp(tv_tport->tport_name, t->vhost_wwpn)) {
>>> + pr_warn("tv_tport->tport_name: %s, tv_tpg->tport_tpgt: %hu"
>>> + " does not match t->vhost_wwpn: %s, t->vhost_tpgt: %hu\n",
>>> + tv_tport->tport_name, tv_tpg->tport_tpgt,
>>> + t->vhost_wwpn, t->vhost_tpgt);
>>> + ret = -EINVAL;
>>> + goto err;
>>> + }
>>> + tv_tpg->tv_tpg_vhost_count--;
>>> + vs->vs_tpg[target] = NULL;
>>> }
>>> - tv_tpg->tv_tpg_vhost_count--;
>>> - vs->vs_tpg = NULL;
>>> mutex_unlock(&vs->dev.mutex);
>>> -
>>> return 0;
>>>
>>> err:
>>> @@ -868,16 +901,10 @@ static int vhost_scsi_open(struct inode *inode, struct file *f)
>>> static int vhost_scsi_release(struct inode *inode, struct file *f)
>>> {
>>> struct vhost_scsi *s = f->private_data;
>>> + struct vhost_scsi_target t;
>>>
>>> - if (s->vs_tpg && s->vs_tpg->tport) {
>>> - struct vhost_scsi_target backend;
>>> -
>>> - memcpy(backend.vhost_wwpn, s->vs_tpg->tport->tport_name,
>>> - sizeof(backend.vhost_wwpn));
>>> - backend.vhost_tpgt = s->vs_tpg->tport_tpgt;
>>> - vhost_scsi_clear_endpoint(s, &backend);
>>> - }
>>> -
>>> + memcpy(t.vhost_wwpn, s->vs_vhost_wwpn, sizeof(t.vhost_wwpn));
>>> + vhost_scsi_clear_endpoint(s, &t);
>>> vhost_dev_stop(&s->dev);
>>> vhost_dev_cleanup(&s->dev, false);
>>> kfree(s);
>>> diff --git a/drivers/vhost/tcm_vhost.h b/drivers/vhost/tcm_vhost.h
>>> index 47ee80b..519a550 100644
>>> --- a/drivers/vhost/tcm_vhost.h
>>> +++ b/drivers/vhost/tcm_vhost.h
>>> @@ -93,9 +93,11 @@ struct tcm_vhost_tport {
>>> *
>>> * ABI Rev 0: July 2012 version starting point for v3.6-rc merge candidate +
>>> * RFC-v2 vhost-scsi userspace. Add GET_ABI_VERSION ioctl usage
>>> + * ABI Rev 1: January 2013. Ignore vhost_tpgt filed in struct vhost_scsi_target.
>>> + * All the targets under vhost_wwpn can be seen and used by guset.
>>> */
>>>
>>> -#define VHOST_SCSI_ABI_VERSION 0
>>> +#define VHOST_SCSI_ABI_VERSION 1
>>>
>>> struct vhost_scsi_target {
>>> int abi_version;
>>>
>>
>>
>> --
>> Asias
--
Asias
^ permalink raw reply [flat|nested] 8+ messages in thread
* Re: [PATCH] tcm_vhost: Multi-target support
[not found] ` <1359665976.6300.43.camel@haakon2.linux-iscsi.org>
@ 2013-02-01 4:03 ` Asias He
2013-02-01 7:38 ` Nicholas A. Bellinger
[not found] ` <1359704307.6300.84.camel@haakon2.linux-iscsi.org>
0 siblings, 2 replies; 8+ messages in thread
From: Asias He @ 2013-02-01 4:03 UTC (permalink / raw)
To: Nicholas A. Bellinger
Cc: kvm, Michael S. Tsirkin, virtualization, target-devel,
Stefan Hajnoczi, Paolo Bonzini
On 02/01/2013 04:59 AM, Nicholas A. Bellinger wrote:
> On Thu, 2013-01-31 at 17:28 +0800, Asias He wrote:
>> Hello Nicholas,
>>
>> On 01/31/2013 03:33 PM, Asias He wrote:
>>> In order to take advantages of Paolo's multi-queue virito-scsi, we need
>>> multi-target support in tcm_vhost first. Otherwise all the requests go
>>> to one queue and other queues are idle.
>>>
>>> This patch makes:
>>>
>>> 1. All the targets under the wwpn is seen and can be used by guest.
>>> 2. No need to pass the tpgt number in struct vhost_scsi_target to
>>> tcm_vhost.ko. Only wwpn is needed.
>>> 3. We can always pass max_target = 255 to guest now, since we abort the
>>> request who's target id does not exist.
>>>
>>> Signed-off-by: Asias He <asias@redhat.com>
>>> ---
>>> drivers/vhost/tcm_vhost.c | 115 ++++++++++++++++++++++++++++------------------
>>> drivers/vhost/tcm_vhost.h | 4 +-
>>> 2 files changed, 74 insertions(+), 45 deletions(-)
>>>
>>> diff --git a/drivers/vhost/tcm_vhost.c b/drivers/vhost/tcm_vhost.c
>>> index 218deb6..d50cb95 100644
>>> --- a/drivers/vhost/tcm_vhost.c
>>> +++ b/drivers/vhost/tcm_vhost.c
>>> @@ -59,13 +59,18 @@ enum {
>>> VHOST_SCSI_VQ_IO = 2,
>>> };
>>>
>>> +#define VHOST_SCSI_MAX_TARGET 256
>>> +
>>> struct vhost_scsi {
>>> - struct tcm_vhost_tpg *vs_tpg; /* Protected by vhost_scsi->dev.mutex */
>>> + /* Protected by vhost_scsi->dev.mutex */
>>> + struct tcm_vhost_tpg *vs_tpg[VHOST_SCSI_MAX_TARGET];
>>> struct vhost_dev dev;
>>> struct vhost_virtqueue vqs[3];
>>>
>>> struct vhost_work vs_completion_work; /* cmd completion work item */
>>> struct llist_head vs_completion_list; /* cmd completion queue */
>>> + char vs_vhost_wwpn[TRANSPORT_IQN_LEN];
>>> + int vs_num_target;
>>> };
>>>
>>> /* Local pointer to allocated TCM configfs fabric module */
>>> @@ -564,13 +569,7 @@ static void vhost_scsi_handle_vq(struct vhost_scsi *vs)
>>> u32 exp_data_len, data_first, data_num, data_direction;
>>> unsigned out, in, i;
>>> int head, ret;
>>> -
>>> - /* Must use ioctl VHOST_SCSI_SET_ENDPOINT */
>>> - tv_tpg = vs->vs_tpg;
>>> - if (unlikely(!tv_tpg)) {
>>> - pr_err("%s endpoint not set\n", __func__);
>>> - return;
>>> - }
>>> + u8 target;
>>>
>>> mutex_lock(&vq->mutex);
>>> vhost_disable_notify(&vs->dev, vq);
>>> @@ -637,6 +636,35 @@ static void vhost_scsi_handle_vq(struct vhost_scsi *vs)
>>> break;
>>> }
>>>
>>> + /* Extract the tpgt */
>>> + target = v_req.lun[1];
>>> +
>>> + /* Target does not exit, fail the request */
>>> + if (unlikely(target >= vs->vs_num_target)) {
>>> + struct virtio_scsi_cmd_resp __user *resp;
>>> + struct virtio_scsi_cmd_resp rsp;
>>> +
>>> + memset(&rsp, 0, sizeof(rsp));
>>> + rsp.response = VIRTIO_SCSI_S_BAD_TARGET;
>>> + resp = vq->iov[out].iov_base;
>>> + ret = copy_to_user(resp, &rsp, sizeof(rsp));
>>> + if (!ret)
>>> + vhost_add_used_and_signal(&vs->dev,
>>> + &vs->vqs[2], head, 0);
>>> + else
>>> + pr_err("Faulted on virtio_scsi_cmd_resp\n");
>>> +
>>> + continue;
>>> + }
>>> +
>>> + tv_tpg = vs->vs_tpg[target];
>>> + if (unlikely(!tv_tpg)) {
>>> + /* Must use ioctl VHOST_SCSI_SET_ENDPOINT */
>>> + pr_err("endpoint not set, target = %d\n", target);
>>> + vhost_discard_vq_desc(vq, 1);
>>> + break;
>>> + }
>>> +
>>> exp_data_len = 0;
>>> for (i = 0; i < data_num; i++)
>>> exp_data_len += vq->iov[data_first + i].iov_len;
>>> @@ -771,14 +799,11 @@ static int vhost_scsi_set_endpoint(
>>> }
>>> tv_tport = tv_tpg->tport;
>>>
>>> - if (!strcmp(tv_tport->tport_name, t->vhost_wwpn) &&
>>> - (tv_tpg->tport_tpgt == t->vhost_tpgt)) {
>>> + if (!strcmp(tv_tport->tport_name, t->vhost_wwpn)) {
>>> tv_tpg->tv_tpg_vhost_count++;
>>> - mutex_unlock(&tv_tpg->tv_tpg_mutex);
>>> - mutex_unlock(&tcm_vhost_mutex);
>>>
>>> mutex_lock(&vs->dev.mutex);
>>> - if (vs->vs_tpg) {
>>> + if (vs->vs_tpg[tv_tpg->tport_tpgt - 1]) {
>>> mutex_unlock(&vs->dev.mutex);
>>> mutex_lock(&tv_tpg->tv_tpg_mutex);
>>> tv_tpg->tv_tpg_vhost_count--;
>>> @@ -786,15 +811,17 @@ static int vhost_scsi_set_endpoint(
>>> return -EEXIST;
>>> }
>>>
>>> - vs->vs_tpg = tv_tpg;
>>> + vs->vs_tpg[tv_tpg->tport_tpgt - 1] = tv_tpg;
>>
>>
>> tv_tpg->tport_tpgt starts from 0, right? I thought it starts from 1,
>> because I always got it starts from 1 in targetcli.
>>
>> o- vhost
>> o- naa.6001405bd4e8476d
>> o- tpg1
>> o- luns
>> o- lun0
>> o- tpg2
>> o- luns
>> o- lun0
>> o- tpg3
>> o- luns
>> o- lun0
>> o- tpg4
>> o- luns
>> o- lun0
>>
>
> So at least with iscsi-target, we start from tpgt=1 to avoid some legacy
> initiators that have issues handling tgpt=0.
>
> Given that rtslib/targetcli currently expect this with the "tpgs"
> feature is enabled, starting from tpgt=1 with tcm_vhost probably makes
> the most sense.
Okay. But tgpt can be 0, right?
I saw this setup:
cd /sys/kernel/config/target
mkdir -p core/fileio_0/fileio
echo 'fd_dev_name=/home/pbonzini/test.img,fd_dev_size=5905580032' >
core/fileio_0/fileio/control
echo 1 > core/fileio_0/fileio/enable
mkdir -p vhost/naa.600140554cf3a18e/tpgt_0/lun/lun_0
cd vhost/naa.600140554cf3a18e/tpgt_0
ln -sf ../../../../../core/fileio_0/fileio/ lun/lun_0/virtual_scsi_port
echo naa.60014053226f0388 > nexus
And this:
** Setup wwpn and tpgt
$ wwpn="naa.0"
$ tpgt=/sys/kernel/config/target/vhost/$wwpn/tpgt_0
$ nexus=$tpgt/nexus
$ mkdir -p $tpgt
$ echo -n $wwpn > $nexus
>> If it is true. I will cook v2 of this patch.
>>
>> Also, the tv_tpg->tport_tpgt can be none-continuous. e.g.
>>
>> o- vhost
>> o- naa.6001405bd4e8476d
>> o- tpg1
>> o- luns
>> o- lun0
>> o- tpg2
>> o- luns
>> o- lun0
>> o- tpg4
>> o- luns
>> o- lun0
>>
>> I will handle this in v2.
>>
>
> Correct, tpgt values may be optionally non-contiguous up to unsigned
> short.
ok.
> --nab
>
>
--
Asias
^ permalink raw reply [flat|nested] 8+ messages in thread
* Re: [PATCH] tcm_vhost: Multi-target support
2013-02-01 4:03 ` Asias He
@ 2013-02-01 7:38 ` Nicholas A. Bellinger
[not found] ` <1359704307.6300.84.camel@haakon2.linux-iscsi.org>
1 sibling, 0 replies; 8+ messages in thread
From: Nicholas A. Bellinger @ 2013-02-01 7:38 UTC (permalink / raw)
To: Asias He
Cc: kvm, Michael S. Tsirkin, virtualization, target-devel,
Stefan Hajnoczi, Paolo Bonzini
On Fri, 2013-02-01 at 12:03 +0800, Asias He wrote:
> On 02/01/2013 04:59 AM, Nicholas A. Bellinger wrote:
> > On Thu, 2013-01-31 at 17:28 +0800, Asias He wrote:
> >> Hello Nicholas,
> >>
> >> On 01/31/2013 03:33 PM, Asias He wrote:
> >>> In order to take advantages of Paolo's multi-queue virito-scsi, we need
> >>> multi-target support in tcm_vhost first. Otherwise all the requests go
> >>> to one queue and other queues are idle.
> >>>
<SNIP>
> >>> @@ -771,14 +799,11 @@ static int vhost_scsi_set_endpoint(
> >>> }
> >>> tv_tport = tv_tpg->tport;
> >>>
> >>> - if (!strcmp(tv_tport->tport_name, t->vhost_wwpn) &&
> >>> - (tv_tpg->tport_tpgt == t->vhost_tpgt)) {
> >>> + if (!strcmp(tv_tport->tport_name, t->vhost_wwpn)) {
> >>> tv_tpg->tv_tpg_vhost_count++;
> >>> - mutex_unlock(&tv_tpg->tv_tpg_mutex);
> >>> - mutex_unlock(&tcm_vhost_mutex);
> >>>
> >>> mutex_lock(&vs->dev.mutex);
> >>> - if (vs->vs_tpg) {
> >>> + if (vs->vs_tpg[tv_tpg->tport_tpgt - 1]) {
> >>> mutex_unlock(&vs->dev.mutex);
> >>> mutex_lock(&tv_tpg->tv_tpg_mutex);
> >>> tv_tpg->tv_tpg_vhost_count--;
> >>> @@ -786,15 +811,17 @@ static int vhost_scsi_set_endpoint(
> >>> return -EEXIST;
> >>> }
> >>>
> >>> - vs->vs_tpg = tv_tpg;
> >>> + vs->vs_tpg[tv_tpg->tport_tpgt - 1] = tv_tpg;
> >>
> >>
> >> tv_tpg->tport_tpgt starts from 0, right? I thought it starts from 1,
> >> because I always got it starts from 1 in targetcli.
> >>
> >> o- vhost
> >> o- naa.6001405bd4e8476d
> >> o- tpg1
> >> o- luns
> >> o- lun0
> >> o- tpg2
> >> o- luns
> >> o- lun0
> >> o- tpg3
> >> o- luns
> >> o- lun0
> >> o- tpg4
> >> o- luns
> >> o- lun0
> >>
> >
> > So at least with iscsi-target, we start from tpgt=1 to avoid some legacy
> > initiators that have issues handling tgpt=0.
> >
> > Given that rtslib/targetcli currently expect this with the "tpgs"
> > feature is enabled, starting from tpgt=1 with tcm_vhost probably makes
> > the most sense.
>
> Okay. But tgpt can be 0, right?
>
Most certainly, in the end it's totally up to the fabric. ;)
> I saw this setup:
>
> cd /sys/kernel/config/target
> mkdir -p core/fileio_0/fileio
> echo 'fd_dev_name=/home/pbonzini/test.img,fd_dev_size=5905580032' >
> core/fileio_0/fileio/control
> echo 1 > core/fileio_0/fileio/enable
> mkdir -p vhost/naa.600140554cf3a18e/tpgt_0/lun/lun_0
> cd vhost/naa.600140554cf3a18e/tpgt_0
> ln -sf ../../../../../core/fileio_0/fileio/ lun/lun_0/virtual_scsi_port
> echo naa.60014053226f0388 > nexus
>
> And this:
>
> ** Setup wwpn and tpgt
> $ wwpn="naa.0"
> $ tpgt=/sys/kernel/config/target/vhost/$wwpn/tpgt_0
> $ nexus=$tpgt/nexus
> $ mkdir -p $tpgt
> $ echo -n $wwpn > $nexus
>
>
OK, I think you'll want to avoid the extra vs->vs_tpg[tpgt - 1] offset
above to properly support this.
--nab
>
> >> If it is true. I will cook v2 of this patch.
> >>
> >> Also, the tv_tpg->tport_tpgt can be none-continuous. e.g.
> >>
> >> o- vhost
> >> o- naa.6001405bd4e8476d
> >> o- tpg1
> >> o- luns
> >> o- lun0
> >> o- tpg2
> >> o- luns
> >> o- lun0
> >> o- tpg4
> >> o- luns
> >> o- lun0
> >>
> >> I will handle this in v2.
> >>
> >
> > Correct, tpgt values may be optionally non-contiguous up to unsigned
> > short.
>
> ok.
>
> > --nab
> >
> >
>
>
^ permalink raw reply [flat|nested] 8+ messages in thread
* Re: [PATCH] tcm_vhost: Multi-target support
[not found] ` <1359704307.6300.84.camel@haakon2.linux-iscsi.org>
@ 2013-02-01 8:26 ` Asias He
0 siblings, 0 replies; 8+ messages in thread
From: Asias He @ 2013-02-01 8:26 UTC (permalink / raw)
To: Nicholas A. Bellinger
Cc: kvm, Michael S. Tsirkin, virtualization, target-devel,
Stefan Hajnoczi, Paolo Bonzini
On 02/01/2013 03:38 PM, Nicholas A. Bellinger wrote:
> On Fri, 2013-02-01 at 12:03 +0800, Asias He wrote:
>> On 02/01/2013 04:59 AM, Nicholas A. Bellinger wrote:
>>> On Thu, 2013-01-31 at 17:28 +0800, Asias He wrote:
>>>> Hello Nicholas,
>>>>
>>>> On 01/31/2013 03:33 PM, Asias He wrote:
>>>>> In order to take advantages of Paolo's multi-queue virito-scsi, we need
>>>>> multi-target support in tcm_vhost first. Otherwise all the requests go
>>>>> to one queue and other queues are idle.
>>>>>
>
> <SNIP>
>
>>>>> @@ -771,14 +799,11 @@ static int vhost_scsi_set_endpoint(
>>>>> }
>>>>> tv_tport = tv_tpg->tport;
>>>>>
>>>>> - if (!strcmp(tv_tport->tport_name, t->vhost_wwpn) &&
>>>>> - (tv_tpg->tport_tpgt == t->vhost_tpgt)) {
>>>>> + if (!strcmp(tv_tport->tport_name, t->vhost_wwpn)) {
>>>>> tv_tpg->tv_tpg_vhost_count++;
>>>>> - mutex_unlock(&tv_tpg->tv_tpg_mutex);
>>>>> - mutex_unlock(&tcm_vhost_mutex);
>>>>>
>>>>> mutex_lock(&vs->dev.mutex);
>>>>> - if (vs->vs_tpg) {
>>>>> + if (vs->vs_tpg[tv_tpg->tport_tpgt - 1]) {
>>>>> mutex_unlock(&vs->dev.mutex);
>>>>> mutex_lock(&tv_tpg->tv_tpg_mutex);
>>>>> tv_tpg->tv_tpg_vhost_count--;
>>>>> @@ -786,15 +811,17 @@ static int vhost_scsi_set_endpoint(
>>>>> return -EEXIST;
>>>>> }
>>>>>
>>>>> - vs->vs_tpg = tv_tpg;
>>>>> + vs->vs_tpg[tv_tpg->tport_tpgt - 1] = tv_tpg;
>>>>
>>>>
>>>> tv_tpg->tport_tpgt starts from 0, right? I thought it starts from 1,
>>>> because I always got it starts from 1 in targetcli.
>>>>
>>>> o- vhost
>>>> o- naa.6001405bd4e8476d
>>>> o- tpg1
>>>> o- luns
>>>> o- lun0
>>>> o- tpg2
>>>> o- luns
>>>> o- lun0
>>>> o- tpg3
>>>> o- luns
>>>> o- lun0
>>>> o- tpg4
>>>> o- luns
>>>> o- lun0
>>>>
>>>
>>> So at least with iscsi-target, we start from tpgt=1 to avoid some legacy
>>> initiators that have issues handling tgpt=0.
>>>
>>> Given that rtslib/targetcli currently expect this with the "tpgs"
>>> feature is enabled, starting from tpgt=1 with tcm_vhost probably makes
>>> the most sense.
>>
>> Okay. But tgpt can be 0, right?
>>
>
> Most certainly, in the end it's totally up to the fabric. ;)
okay.
>
>> I saw this setup:
>>
>> cd /sys/kernel/config/target
>> mkdir -p core/fileio_0/fileio
>> echo 'fd_dev_name=/home/pbonzini/test.img,fd_dev_size=5905580032' >
>> core/fileio_0/fileio/control
>> echo 1 > core/fileio_0/fileio/enable
>> mkdir -p vhost/naa.600140554cf3a18e/tpgt_0/lun/lun_0
>> cd vhost/naa.600140554cf3a18e/tpgt_0
>> ln -sf ../../../../../core/fileio_0/fileio/ lun/lun_0/virtual_scsi_port
>> echo naa.60014053226f0388 > nexus
>>
>> And this:
>>
>> ** Setup wwpn and tpgt
>> $ wwpn="naa.0"
>> $ tpgt=/sys/kernel/config/target/vhost/$wwpn/tpgt_0
>> $ nexus=$tpgt/nexus
>> $ mkdir -p $tpgt
>> $ echo -n $wwpn > $nexus
>>
>>
>
> OK, I think you'll want to avoid the extra vs->vs_tpg[tpgt - 1] offset
> above to properly support this.
Yes. Already did that.
> --nab
>
>>
>>>> If it is true. I will cook v2 of this patch.
>>>>
>>>> Also, the tv_tpg->tport_tpgt can be none-continuous. e.g.
>>>>
>>>> o- vhost
>>>> o- naa.6001405bd4e8476d
>>>> o- tpg1
>>>> o- luns
>>>> o- lun0
>>>> o- tpg2
>>>> o- luns
>>>> o- lun0
>>>> o- tpg4
>>>> o- luns
>>>> o- lun0
>>>>
>>>> I will handle this in v2.
>>>>
>>>
>>> Correct, tpgt values may be optionally non-contiguous up to unsigned
>>> short.
>>
>> ok.
>>
>>> --nab
>>>
>>>
>>
>>
>
>
--
Asias
^ permalink raw reply [flat|nested] 8+ messages in thread
end of thread, other threads:[~2013-02-01 8:26 UTC | newest]
Thread overview: 8+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
[not found] <1359617636-20339-1-git-send-email-asias@redhat.com>
2013-01-31 9:28 ` [PATCH] tcm_vhost: Multi-target support Asias He
2013-01-31 11:13 ` Michael S. Tsirkin
2013-01-31 20:59 ` Nicholas A. Bellinger
[not found] ` <20130131111355.GC520@redhat.com>
2013-02-01 3:58 ` Asias He
[not found] ` <1359665976.6300.43.camel@haakon2.linux-iscsi.org>
2013-02-01 4:03 ` Asias He
2013-02-01 7:38 ` Nicholas A. Bellinger
[not found] ` <1359704307.6300.84.camel@haakon2.linux-iscsi.org>
2013-02-01 8:26 ` Asias He
2013-01-31 7:33 Asias He
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).