diff mbox

tcm_vhost: Multi-target support

Message ID 1359617636-20339-1-git-send-email-asias@redhat.com (mailing list archive)
State New, archived
Headers show

Commit Message

Asias He Jan. 31, 2013, 7:33 a.m. UTC
In order to take advantages of Paolo's multi-queue virito-scsi, we need
multi-target support in tcm_vhost first. Otherwise all the requests go
to one queue and other queues are idle.

This patch makes:

1. All the targets under the wwpn is seen and can be used by guest.
2. No need to pass the tpgt number in struct vhost_scsi_target to
   tcm_vhost.ko. Only wwpn is needed.
3. We can always pass max_target = 255 to guest now, since we abort the
   request who's target id does not exist.

Signed-off-by: Asias He <asias@redhat.com>
---
 drivers/vhost/tcm_vhost.c | 115 ++++++++++++++++++++++++++++------------------
 drivers/vhost/tcm_vhost.h |   4 +-
 2 files changed, 74 insertions(+), 45 deletions(-)

Comments

Asias He Jan. 31, 2013, 9:28 a.m. UTC | #1
Hello Nicholas,

On 01/31/2013 03:33 PM, Asias He wrote:
> In order to take advantages of Paolo's multi-queue virito-scsi, we need
> multi-target support in tcm_vhost first. Otherwise all the requests go
> to one queue and other queues are idle.
> 
> This patch makes:
> 
> 1. All the targets under the wwpn is seen and can be used by guest.
> 2. No need to pass the tpgt number in struct vhost_scsi_target to
>    tcm_vhost.ko. Only wwpn is needed.
> 3. We can always pass max_target = 255 to guest now, since we abort the
>    request who's target id does not exist.
> 
> Signed-off-by: Asias He <asias@redhat.com>
> ---
>  drivers/vhost/tcm_vhost.c | 115 ++++++++++++++++++++++++++++------------------
>  drivers/vhost/tcm_vhost.h |   4 +-
>  2 files changed, 74 insertions(+), 45 deletions(-)
> 
> diff --git a/drivers/vhost/tcm_vhost.c b/drivers/vhost/tcm_vhost.c
> index 218deb6..d50cb95 100644
> --- a/drivers/vhost/tcm_vhost.c
> +++ b/drivers/vhost/tcm_vhost.c
> @@ -59,13 +59,18 @@ enum {
>  	VHOST_SCSI_VQ_IO = 2,
>  };
>  
> +#define VHOST_SCSI_MAX_TARGET 256
> +
>  struct vhost_scsi {
> -	struct tcm_vhost_tpg *vs_tpg;	/* Protected by vhost_scsi->dev.mutex */
> +	/* Protected by vhost_scsi->dev.mutex */
> +	struct tcm_vhost_tpg *vs_tpg[VHOST_SCSI_MAX_TARGET];
>  	struct vhost_dev dev;
>  	struct vhost_virtqueue vqs[3];
>  
>  	struct vhost_work vs_completion_work; /* cmd completion work item */
>  	struct llist_head vs_completion_list; /* cmd completion queue */
> +	char vs_vhost_wwpn[TRANSPORT_IQN_LEN];
> +	int vs_num_target;
>  };
>  
>  /* Local pointer to allocated TCM configfs fabric module */
> @@ -564,13 +569,7 @@ static void vhost_scsi_handle_vq(struct vhost_scsi *vs)
>  	u32 exp_data_len, data_first, data_num, data_direction;
>  	unsigned out, in, i;
>  	int head, ret;
> -
> -	/* Must use ioctl VHOST_SCSI_SET_ENDPOINT */
> -	tv_tpg = vs->vs_tpg;
> -	if (unlikely(!tv_tpg)) {
> -		pr_err("%s endpoint not set\n", __func__);
> -		return;
> -	}
> +	u8 target;
>  
>  	mutex_lock(&vq->mutex);
>  	vhost_disable_notify(&vs->dev, vq);
> @@ -637,6 +636,35 @@ static void vhost_scsi_handle_vq(struct vhost_scsi *vs)
>  			break;
>  		}
>  
> +		/* Extract the tpgt */
> +		target = v_req.lun[1];
> +
> +		/* Target does not exit, fail the request */
> +		if (unlikely(target >= vs->vs_num_target)) {
> +			struct virtio_scsi_cmd_resp __user *resp;
> +			struct virtio_scsi_cmd_resp rsp;
> +
> +			memset(&rsp, 0, sizeof(rsp));
> +			rsp.response = VIRTIO_SCSI_S_BAD_TARGET;
> +			resp = vq->iov[out].iov_base;
> +			ret = copy_to_user(resp, &rsp, sizeof(rsp));
> +			if (!ret)
> +				vhost_add_used_and_signal(&vs->dev,
> +						&vs->vqs[2], head, 0);
> +			else
> +				pr_err("Faulted on virtio_scsi_cmd_resp\n");
> +
> +			continue;
> +		}
> +
> +		tv_tpg = vs->vs_tpg[target];
> +		if (unlikely(!tv_tpg)) {
> +			/* Must use ioctl VHOST_SCSI_SET_ENDPOINT */
> +			pr_err("endpoint not set, target = %d\n", target);
> +			vhost_discard_vq_desc(vq, 1);
> +			break;
> +		}
> +
>  		exp_data_len = 0;
>  		for (i = 0; i < data_num; i++)
>  			exp_data_len += vq->iov[data_first + i].iov_len;
> @@ -771,14 +799,11 @@ static int vhost_scsi_set_endpoint(
>  		}
>  		tv_tport = tv_tpg->tport;
>  
> -		if (!strcmp(tv_tport->tport_name, t->vhost_wwpn) &&
> -		    (tv_tpg->tport_tpgt == t->vhost_tpgt)) {
> +		if (!strcmp(tv_tport->tport_name, t->vhost_wwpn)) {
>  			tv_tpg->tv_tpg_vhost_count++;
> -			mutex_unlock(&tv_tpg->tv_tpg_mutex);
> -			mutex_unlock(&tcm_vhost_mutex);
>  
>  			mutex_lock(&vs->dev.mutex);
> -			if (vs->vs_tpg) {
> +			if (vs->vs_tpg[tv_tpg->tport_tpgt - 1]) {
>  				mutex_unlock(&vs->dev.mutex);
>  				mutex_lock(&tv_tpg->tv_tpg_mutex);
>  				tv_tpg->tv_tpg_vhost_count--;
> @@ -786,15 +811,17 @@ static int vhost_scsi_set_endpoint(
>  				return -EEXIST;
>  			}
>  
> -			vs->vs_tpg = tv_tpg;
> +			vs->vs_tpg[tv_tpg->tport_tpgt - 1] = tv_tpg;


tv_tpg->tport_tpgt starts from 0, right? I thought it starts from 1,
because I always got it starts from 1 in targetcli.

o- vhost
   o- naa.6001405bd4e8476d
      o- tpg1
         o- luns
            o- lun0
      o- tpg2
         o- luns
            o- lun0
      o- tpg3
         o- luns
            o- lun0
      o- tpg4
         o- luns
            o- lun0

If it is true. I will cook v2 of this patch.

Also, the tv_tpg->tport_tpgt can be none-continuous. e.g.

o- vhost
   o- naa.6001405bd4e8476d
      o- tpg1
         o- luns
            o- lun0
      o- tpg2
         o- luns
            o- lun0
      o- tpg4
         o- luns
            o- lun0

I will handle this in v2.


And we need to fix another problem mentioned by Paolo.
Otherwise we can not use this to tell if a target exists or the endpoint
is not setup.

   target = v_req.lun[1];
   tv_tpg = vs->vs_tpg[target];
   if (tv_tpg)
      /* target exist */
   else
      /* target does not exist*/


""" from paolo
Another small bug I found is an ordering problem between
VHOST_SET_VRING_KICK and VHOST_SCSI_SET_ENDPOINT.  Starting the vq
causes a "vhost_scsi_handle_vq endpoint not set" error in dmesg.
Because of this I added the first two patches, which let me do
VHOST_SCSI_SET_ENDPOINT before VHOST_SET_VRING_KICK but after setting
up the vring.
"""


>  			smp_mb__after_atomic_inc();
> +			if (!vs->vs_num_target++)
> +				memcpy(vs->vs_vhost_wwpn, t->vhost_wwpn,
> +				       sizeof(vs->vs_vhost_wwpn));
>  			mutex_unlock(&vs->dev.mutex);
> -			return 0;
>  		}
>  		mutex_unlock(&tv_tpg->tv_tpg_mutex);
>  	}
>  	mutex_unlock(&tcm_vhost_mutex);
> -	return -EINVAL;
> +	return 0;
>  }
>  
>  static int vhost_scsi_clear_endpoint(
> @@ -803,7 +830,8 @@ static int vhost_scsi_clear_endpoint(
>  {
>  	struct tcm_vhost_tport *tv_tport;
>  	struct tcm_vhost_tpg *tv_tpg;
> -	int index, ret;
> +	int index, ret, i;
> +	u8 target;
>  
>  	mutex_lock(&vs->dev.mutex);
>  	/* Verify that ring has been setup correctly. */
> @@ -813,27 +841,32 @@ static int vhost_scsi_clear_endpoint(
>  			goto err;
>  		}
>  	}
> +	for (i = 0; i < vs->vs_num_target; i++) {
> +		target = i;
>  
> -	if (!vs->vs_tpg) {
> -		ret = -ENODEV;
> -		goto err;
> -	}
> -	tv_tpg = vs->vs_tpg;
> -	tv_tport = tv_tpg->tport;
> -
> -	if (strcmp(tv_tport->tport_name, t->vhost_wwpn) ||
> -	    (tv_tpg->tport_tpgt != t->vhost_tpgt)) {
> -		pr_warn("tv_tport->tport_name: %s, tv_tpg->tport_tpgt: %hu"
> -			" does not match t->vhost_wwpn: %s, t->vhost_tpgt: %hu\n",
> -			tv_tport->tport_name, tv_tpg->tport_tpgt,
> -			t->vhost_wwpn, t->vhost_tpgt);
> -		ret = -EINVAL;
> -		goto err;
> +		tv_tpg = vs->vs_tpg[target];
> +		if (!tv_tpg) {
> +			ret = -ENODEV;
> +			goto err;
> +		}
> +		tv_tport = tv_tpg->tport;
> +		if (!tv_tport) {
> +			ret = -ENODEV;
> +			goto err;
> +		}
> +
> +		if (strcmp(tv_tport->tport_name, t->vhost_wwpn)) {
> +			pr_warn("tv_tport->tport_name: %s, tv_tpg->tport_tpgt: %hu"
> +				" does not match t->vhost_wwpn: %s, t->vhost_tpgt: %hu\n",
> +				tv_tport->tport_name, tv_tpg->tport_tpgt,
> +				t->vhost_wwpn, t->vhost_tpgt);
> +			ret = -EINVAL;
> +			goto err;
> +		}
> +		tv_tpg->tv_tpg_vhost_count--;
> +		vs->vs_tpg[target] = NULL;
>  	}
> -	tv_tpg->tv_tpg_vhost_count--;
> -	vs->vs_tpg = NULL;
>  	mutex_unlock(&vs->dev.mutex);
> -
>  	return 0;
>  
>  err:
> @@ -868,16 +901,10 @@ static int vhost_scsi_open(struct inode *inode, struct file *f)
>  static int vhost_scsi_release(struct inode *inode, struct file *f)
>  {
>  	struct vhost_scsi *s = f->private_data;
> +	struct vhost_scsi_target t;
>  
> -	if (s->vs_tpg && s->vs_tpg->tport) {
> -		struct vhost_scsi_target backend;
> -
> -		memcpy(backend.vhost_wwpn, s->vs_tpg->tport->tport_name,
> -				sizeof(backend.vhost_wwpn));
> -		backend.vhost_tpgt = s->vs_tpg->tport_tpgt;
> -		vhost_scsi_clear_endpoint(s, &backend);
> -	}
> -
> +	memcpy(t.vhost_wwpn, s->vs_vhost_wwpn, sizeof(t.vhost_wwpn));
> +	vhost_scsi_clear_endpoint(s, &t);
>  	vhost_dev_stop(&s->dev);
>  	vhost_dev_cleanup(&s->dev, false);
>  	kfree(s);
> diff --git a/drivers/vhost/tcm_vhost.h b/drivers/vhost/tcm_vhost.h
> index 47ee80b..519a550 100644
> --- a/drivers/vhost/tcm_vhost.h
> +++ b/drivers/vhost/tcm_vhost.h
> @@ -93,9 +93,11 @@ struct tcm_vhost_tport {
>   *
>   * ABI Rev 0: July 2012 version starting point for v3.6-rc merge candidate +
>   *            RFC-v2 vhost-scsi userspace.  Add GET_ABI_VERSION ioctl usage
> + * ABI Rev 1: January 2013. Ignore vhost_tpgt filed in struct vhost_scsi_target.
> + *            All the targets under vhost_wwpn can be seen and used by guset.
>   */
>  
> -#define VHOST_SCSI_ABI_VERSION	0
> +#define VHOST_SCSI_ABI_VERSION	1
>  
>  struct vhost_scsi_target {
>  	int abi_version;
>
Michael S. Tsirkin Jan. 31, 2013, 11:13 a.m. UTC | #2
On Thu, Jan 31, 2013 at 05:28:21PM +0800, Asias He wrote:
> Hello Nicholas,
> 
> On 01/31/2013 03:33 PM, Asias He wrote:
> > In order to take advantages of Paolo's multi-queue virito-scsi, we need
> > multi-target support in tcm_vhost first. Otherwise all the requests go
> > to one queue and other queues are idle.
> > 
> > This patch makes:
> > 
> > 1. All the targets under the wwpn is seen and can be used by guest.
> > 2. No need to pass the tpgt number in struct vhost_scsi_target to
> >    tcm_vhost.ko. Only wwpn is needed.
> > 3. We can always pass max_target = 255 to guest now, since we abort the
> >    request who's target id does not exist.
> > 
> > Signed-off-by: Asias He <asias@redhat.com>
> > ---
> >  drivers/vhost/tcm_vhost.c | 115 ++++++++++++++++++++++++++++------------------
> >  drivers/vhost/tcm_vhost.h |   4 +-
> >  2 files changed, 74 insertions(+), 45 deletions(-)
> > 
> > diff --git a/drivers/vhost/tcm_vhost.c b/drivers/vhost/tcm_vhost.c
> > index 218deb6..d50cb95 100644
> > --- a/drivers/vhost/tcm_vhost.c
> > +++ b/drivers/vhost/tcm_vhost.c
> > @@ -59,13 +59,18 @@ enum {
> >  	VHOST_SCSI_VQ_IO = 2,
> >  };
> >  
> > +#define VHOST_SCSI_MAX_TARGET 256
> > +
> >  struct vhost_scsi {
> > -	struct tcm_vhost_tpg *vs_tpg;	/* Protected by vhost_scsi->dev.mutex */
> > +	/* Protected by vhost_scsi->dev.mutex */
> > +	struct tcm_vhost_tpg *vs_tpg[VHOST_SCSI_MAX_TARGET];
> >  	struct vhost_dev dev;
> >  	struct vhost_virtqueue vqs[3];
> >  
> >  	struct vhost_work vs_completion_work; /* cmd completion work item */
> >  	struct llist_head vs_completion_list; /* cmd completion queue */
> > +	char vs_vhost_wwpn[TRANSPORT_IQN_LEN];
> > +	int vs_num_target;
> >  };
> >  
> >  /* Local pointer to allocated TCM configfs fabric module */
> > @@ -564,13 +569,7 @@ static void vhost_scsi_handle_vq(struct vhost_scsi *vs)
> >  	u32 exp_data_len, data_first, data_num, data_direction;
> >  	unsigned out, in, i;
> >  	int head, ret;
> > -
> > -	/* Must use ioctl VHOST_SCSI_SET_ENDPOINT */
> > -	tv_tpg = vs->vs_tpg;
> > -	if (unlikely(!tv_tpg)) {
> > -		pr_err("%s endpoint not set\n", __func__);
> > -		return;
> > -	}
> > +	u8 target;
> >  
> >  	mutex_lock(&vq->mutex);
> >  	vhost_disable_notify(&vs->dev, vq);
> > @@ -637,6 +636,35 @@ static void vhost_scsi_handle_vq(struct vhost_scsi *vs)
> >  			break;
> >  		}
> >  
> > +		/* Extract the tpgt */
> > +		target = v_req.lun[1];
> > +
> > +		/* Target does not exit, fail the request */
> > +		if (unlikely(target >= vs->vs_num_target)) {
> > +			struct virtio_scsi_cmd_resp __user *resp;
> > +			struct virtio_scsi_cmd_resp rsp;
> > +
> > +			memset(&rsp, 0, sizeof(rsp));
> > +			rsp.response = VIRTIO_SCSI_S_BAD_TARGET;
> > +			resp = vq->iov[out].iov_base;
> > +			ret = copy_to_user(resp, &rsp, sizeof(rsp));
> > +			if (!ret)
> > +				vhost_add_used_and_signal(&vs->dev,
> > +						&vs->vqs[2], head, 0);
> > +			else
> > +				pr_err("Faulted on virtio_scsi_cmd_resp\n");
> > +
> > +			continue;
> > +		}
> > +
> > +		tv_tpg = vs->vs_tpg[target];
> > +		if (unlikely(!tv_tpg)) {
> > +			/* Must use ioctl VHOST_SCSI_SET_ENDPOINT */
> > +			pr_err("endpoint not set, target = %d\n", target);
> > +			vhost_discard_vq_desc(vq, 1);
> > +			break;
> > +		}
> > +
> >  		exp_data_len = 0;
> >  		for (i = 0; i < data_num; i++)
> >  			exp_data_len += vq->iov[data_first + i].iov_len;
> > @@ -771,14 +799,11 @@ static int vhost_scsi_set_endpoint(
> >  		}
> >  		tv_tport = tv_tpg->tport;
> >  
> > -		if (!strcmp(tv_tport->tport_name, t->vhost_wwpn) &&
> > -		    (tv_tpg->tport_tpgt == t->vhost_tpgt)) {
> > +		if (!strcmp(tv_tport->tport_name, t->vhost_wwpn)) {
> >  			tv_tpg->tv_tpg_vhost_count++;
> > -			mutex_unlock(&tv_tpg->tv_tpg_mutex);
> > -			mutex_unlock(&tcm_vhost_mutex);
> >  
> >  			mutex_lock(&vs->dev.mutex);
> > -			if (vs->vs_tpg) {
> > +			if (vs->vs_tpg[tv_tpg->tport_tpgt - 1]) {
> >  				mutex_unlock(&vs->dev.mutex);
> >  				mutex_lock(&tv_tpg->tv_tpg_mutex);
> >  				tv_tpg->tv_tpg_vhost_count--;
> > @@ -786,15 +811,17 @@ static int vhost_scsi_set_endpoint(
> >  				return -EEXIST;
> >  			}
> >  
> > -			vs->vs_tpg = tv_tpg;
> > +			vs->vs_tpg[tv_tpg->tport_tpgt - 1] = tv_tpg;
> 
> 
> tv_tpg->tport_tpgt starts from 0, right? I thought it starts from 1,
> because I always got it starts from 1 in targetcli.
> 
> o- vhost
>    o- naa.6001405bd4e8476d
>       o- tpg1
>          o- luns
>             o- lun0
>       o- tpg2
>          o- luns
>             o- lun0
>       o- tpg3
>          o- luns
>             o- lun0
>       o- tpg4
>          o- luns
>             o- lun0
> 
> If it is true. I will cook v2 of this patch.
> 
> Also, the tv_tpg->tport_tpgt can be none-continuous. e.g.
> 
> o- vhost
>    o- naa.6001405bd4e8476d
>       o- tpg1
>          o- luns
>             o- lun0
>       o- tpg2
>          o- luns
>             o- lun0
>       o- tpg4
>          o- luns
>             o- lun0
> 
> I will handle this in v2.
> 
> 
> And we need to fix another problem mentioned by Paolo.
> Otherwise we can not use this to tell if a target exists or the endpoint
> is not setup.
> 
>    target = v_req.lun[1];
>    tv_tpg = vs->vs_tpg[target];
>    if (tv_tpg)
>       /* target exist */
>    else
>       /* target does not exist*/
> 

Why should there be a difference?


> """ from paolo
> Another small bug I found is an ordering problem between
> VHOST_SET_VRING_KICK and VHOST_SCSI_SET_ENDPOINT.  Starting the vq
> causes a "vhost_scsi_handle_vq endpoint not set" error in dmesg.
> Because of this I added the first two patches, which let me do
> VHOST_SCSI_SET_ENDPOINT before VHOST_SET_VRING_KICK but after setting
> up the vring.
> """
> 
> 
> >  			smp_mb__after_atomic_inc();
> > +			if (!vs->vs_num_target++)
> > +				memcpy(vs->vs_vhost_wwpn, t->vhost_wwpn,
> > +				       sizeof(vs->vs_vhost_wwpn));
> >  			mutex_unlock(&vs->dev.mutex);
> > -			return 0;
> >  		}
> >  		mutex_unlock(&tv_tpg->tv_tpg_mutex);
> >  	}
> >  	mutex_unlock(&tcm_vhost_mutex);
> > -	return -EINVAL;
> > +	return 0;
> >  }
> >  
> >  static int vhost_scsi_clear_endpoint(
> > @@ -803,7 +830,8 @@ static int vhost_scsi_clear_endpoint(
> >  {
> >  	struct tcm_vhost_tport *tv_tport;
> >  	struct tcm_vhost_tpg *tv_tpg;
> > -	int index, ret;
> > +	int index, ret, i;
> > +	u8 target;
> >  
> >  	mutex_lock(&vs->dev.mutex);
> >  	/* Verify that ring has been setup correctly. */
> > @@ -813,27 +841,32 @@ static int vhost_scsi_clear_endpoint(
> >  			goto err;
> >  		}
> >  	}
> > +	for (i = 0; i < vs->vs_num_target; i++) {
> > +		target = i;
> >  
> > -	if (!vs->vs_tpg) {
> > -		ret = -ENODEV;
> > -		goto err;
> > -	}
> > -	tv_tpg = vs->vs_tpg;
> > -	tv_tport = tv_tpg->tport;
> > -
> > -	if (strcmp(tv_tport->tport_name, t->vhost_wwpn) ||
> > -	    (tv_tpg->tport_tpgt != t->vhost_tpgt)) {
> > -		pr_warn("tv_tport->tport_name: %s, tv_tpg->tport_tpgt: %hu"
> > -			" does not match t->vhost_wwpn: %s, t->vhost_tpgt: %hu\n",
> > -			tv_tport->tport_name, tv_tpg->tport_tpgt,
> > -			t->vhost_wwpn, t->vhost_tpgt);
> > -		ret = -EINVAL;
> > -		goto err;
> > +		tv_tpg = vs->vs_tpg[target];
> > +		if (!tv_tpg) {
> > +			ret = -ENODEV;
> > +			goto err;
> > +		}
> > +		tv_tport = tv_tpg->tport;
> > +		if (!tv_tport) {
> > +			ret = -ENODEV;
> > +			goto err;
> > +		}
> > +
> > +		if (strcmp(tv_tport->tport_name, t->vhost_wwpn)) {
> > +			pr_warn("tv_tport->tport_name: %s, tv_tpg->tport_tpgt: %hu"
> > +				" does not match t->vhost_wwpn: %s, t->vhost_tpgt: %hu\n",
> > +				tv_tport->tport_name, tv_tpg->tport_tpgt,
> > +				t->vhost_wwpn, t->vhost_tpgt);
> > +			ret = -EINVAL;
> > +			goto err;
> > +		}
> > +		tv_tpg->tv_tpg_vhost_count--;
> > +		vs->vs_tpg[target] = NULL;
> >  	}
> > -	tv_tpg->tv_tpg_vhost_count--;
> > -	vs->vs_tpg = NULL;
> >  	mutex_unlock(&vs->dev.mutex);
> > -
> >  	return 0;
> >  
> >  err:
> > @@ -868,16 +901,10 @@ static int vhost_scsi_open(struct inode *inode, struct file *f)
> >  static int vhost_scsi_release(struct inode *inode, struct file *f)
> >  {
> >  	struct vhost_scsi *s = f->private_data;
> > +	struct vhost_scsi_target t;
> >  
> > -	if (s->vs_tpg && s->vs_tpg->tport) {
> > -		struct vhost_scsi_target backend;
> > -
> > -		memcpy(backend.vhost_wwpn, s->vs_tpg->tport->tport_name,
> > -				sizeof(backend.vhost_wwpn));
> > -		backend.vhost_tpgt = s->vs_tpg->tport_tpgt;
> > -		vhost_scsi_clear_endpoint(s, &backend);
> > -	}
> > -
> > +	memcpy(t.vhost_wwpn, s->vs_vhost_wwpn, sizeof(t.vhost_wwpn));
> > +	vhost_scsi_clear_endpoint(s, &t);
> >  	vhost_dev_stop(&s->dev);
> >  	vhost_dev_cleanup(&s->dev, false);
> >  	kfree(s);
> > diff --git a/drivers/vhost/tcm_vhost.h b/drivers/vhost/tcm_vhost.h
> > index 47ee80b..519a550 100644
> > --- a/drivers/vhost/tcm_vhost.h
> > +++ b/drivers/vhost/tcm_vhost.h
> > @@ -93,9 +93,11 @@ struct tcm_vhost_tport {
> >   *
> >   * ABI Rev 0: July 2012 version starting point for v3.6-rc merge candidate +
> >   *            RFC-v2 vhost-scsi userspace.  Add GET_ABI_VERSION ioctl usage
> > + * ABI Rev 1: January 2013. Ignore vhost_tpgt filed in struct vhost_scsi_target.
> > + *            All the targets under vhost_wwpn can be seen and used by guset.
> >   */
> >  
> > -#define VHOST_SCSI_ABI_VERSION	0
> > +#define VHOST_SCSI_ABI_VERSION	1
> >  
> >  struct vhost_scsi_target {
> >  	int abi_version;
> > 
> 
> 
> -- 
> Asias
--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to majordomo@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Nicholas A. Bellinger Jan. 31, 2013, 8:59 p.m. UTC | #3
On Thu, 2013-01-31 at 17:28 +0800, Asias He wrote:
> Hello Nicholas,
> 
> On 01/31/2013 03:33 PM, Asias He wrote:
> > In order to take advantages of Paolo's multi-queue virito-scsi, we need
> > multi-target support in tcm_vhost first. Otherwise all the requests go
> > to one queue and other queues are idle.
> > 
> > This patch makes:
> > 
> > 1. All the targets under the wwpn is seen and can be used by guest.
> > 2. No need to pass the tpgt number in struct vhost_scsi_target to
> >    tcm_vhost.ko. Only wwpn is needed.
> > 3. We can always pass max_target = 255 to guest now, since we abort the
> >    request who's target id does not exist.
> > 
> > Signed-off-by: Asias He <asias@redhat.com>
> > ---
> >  drivers/vhost/tcm_vhost.c | 115 ++++++++++++++++++++++++++++------------------
> >  drivers/vhost/tcm_vhost.h |   4 +-
> >  2 files changed, 74 insertions(+), 45 deletions(-)
> > 
> > diff --git a/drivers/vhost/tcm_vhost.c b/drivers/vhost/tcm_vhost.c
> > index 218deb6..d50cb95 100644
> > --- a/drivers/vhost/tcm_vhost.c
> > +++ b/drivers/vhost/tcm_vhost.c
> > @@ -59,13 +59,18 @@ enum {
> >  	VHOST_SCSI_VQ_IO = 2,
> >  };
> >  
> > +#define VHOST_SCSI_MAX_TARGET 256
> > +
> >  struct vhost_scsi {
> > -	struct tcm_vhost_tpg *vs_tpg;	/* Protected by vhost_scsi->dev.mutex */
> > +	/* Protected by vhost_scsi->dev.mutex */
> > +	struct tcm_vhost_tpg *vs_tpg[VHOST_SCSI_MAX_TARGET];
> >  	struct vhost_dev dev;
> >  	struct vhost_virtqueue vqs[3];
> >  
> >  	struct vhost_work vs_completion_work; /* cmd completion work item */
> >  	struct llist_head vs_completion_list; /* cmd completion queue */
> > +	char vs_vhost_wwpn[TRANSPORT_IQN_LEN];
> > +	int vs_num_target;
> >  };
> >  
> >  /* Local pointer to allocated TCM configfs fabric module */
> > @@ -564,13 +569,7 @@ static void vhost_scsi_handle_vq(struct vhost_scsi *vs)
> >  	u32 exp_data_len, data_first, data_num, data_direction;
> >  	unsigned out, in, i;
> >  	int head, ret;
> > -
> > -	/* Must use ioctl VHOST_SCSI_SET_ENDPOINT */
> > -	tv_tpg = vs->vs_tpg;
> > -	if (unlikely(!tv_tpg)) {
> > -		pr_err("%s endpoint not set\n", __func__);
> > -		return;
> > -	}
> > +	u8 target;
> >  
> >  	mutex_lock(&vq->mutex);
> >  	vhost_disable_notify(&vs->dev, vq);
> > @@ -637,6 +636,35 @@ static void vhost_scsi_handle_vq(struct vhost_scsi *vs)
> >  			break;
> >  		}
> >  
> > +		/* Extract the tpgt */
> > +		target = v_req.lun[1];
> > +
> > +		/* Target does not exit, fail the request */
> > +		if (unlikely(target >= vs->vs_num_target)) {
> > +			struct virtio_scsi_cmd_resp __user *resp;
> > +			struct virtio_scsi_cmd_resp rsp;
> > +
> > +			memset(&rsp, 0, sizeof(rsp));
> > +			rsp.response = VIRTIO_SCSI_S_BAD_TARGET;
> > +			resp = vq->iov[out].iov_base;
> > +			ret = copy_to_user(resp, &rsp, sizeof(rsp));
> > +			if (!ret)
> > +				vhost_add_used_and_signal(&vs->dev,
> > +						&vs->vqs[2], head, 0);
> > +			else
> > +				pr_err("Faulted on virtio_scsi_cmd_resp\n");
> > +
> > +			continue;
> > +		}
> > +
> > +		tv_tpg = vs->vs_tpg[target];
> > +		if (unlikely(!tv_tpg)) {
> > +			/* Must use ioctl VHOST_SCSI_SET_ENDPOINT */
> > +			pr_err("endpoint not set, target = %d\n", target);
> > +			vhost_discard_vq_desc(vq, 1);
> > +			break;
> > +		}
> > +
> >  		exp_data_len = 0;
> >  		for (i = 0; i < data_num; i++)
> >  			exp_data_len += vq->iov[data_first + i].iov_len;
> > @@ -771,14 +799,11 @@ static int vhost_scsi_set_endpoint(
> >  		}
> >  		tv_tport = tv_tpg->tport;
> >  
> > -		if (!strcmp(tv_tport->tport_name, t->vhost_wwpn) &&
> > -		    (tv_tpg->tport_tpgt == t->vhost_tpgt)) {
> > +		if (!strcmp(tv_tport->tport_name, t->vhost_wwpn)) {
> >  			tv_tpg->tv_tpg_vhost_count++;
> > -			mutex_unlock(&tv_tpg->tv_tpg_mutex);
> > -			mutex_unlock(&tcm_vhost_mutex);
> >  
> >  			mutex_lock(&vs->dev.mutex);
> > -			if (vs->vs_tpg) {
> > +			if (vs->vs_tpg[tv_tpg->tport_tpgt - 1]) {
> >  				mutex_unlock(&vs->dev.mutex);
> >  				mutex_lock(&tv_tpg->tv_tpg_mutex);
> >  				tv_tpg->tv_tpg_vhost_count--;
> > @@ -786,15 +811,17 @@ static int vhost_scsi_set_endpoint(
> >  				return -EEXIST;
> >  			}
> >  
> > -			vs->vs_tpg = tv_tpg;
> > +			vs->vs_tpg[tv_tpg->tport_tpgt - 1] = tv_tpg;
> 
> 
> tv_tpg->tport_tpgt starts from 0, right? I thought it starts from 1,
> because I always got it starts from 1 in targetcli.
> 
> o- vhost
>    o- naa.6001405bd4e8476d
>       o- tpg1
>          o- luns
>             o- lun0
>       o- tpg2
>          o- luns
>             o- lun0
>       o- tpg3
>          o- luns
>             o- lun0
>       o- tpg4
>          o- luns
>             o- lun0
> 

So at least with iscsi-target, we start from tpgt=1 to avoid some legacy
initiators that have issues handling tgpt=0.

Given that rtslib/targetcli currently expect this with the "tpgs"
feature is enabled, starting from tpgt=1 with tcm_vhost probably makes
the most sense.

> If it is true. I will cook v2 of this patch.
> 
> Also, the tv_tpg->tport_tpgt can be none-continuous. e.g.
> 
> o- vhost
>    o- naa.6001405bd4e8476d
>       o- tpg1
>          o- luns
>             o- lun0
>       o- tpg2
>          o- luns
>             o- lun0
>       o- tpg4
>          o- luns
>             o- lun0
> 
> I will handle this in v2.
> 

Correct, tpgt values may be optionally non-contiguous up to unsigned
short.

--nab


--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to majordomo@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Asias He Feb. 1, 2013, 3:58 a.m. UTC | #4
On 01/31/2013 07:13 PM, Michael S. Tsirkin wrote:
> On Thu, Jan 31, 2013 at 05:28:21PM +0800, Asias He wrote:
>> Hello Nicholas,
>>
>> On 01/31/2013 03:33 PM, Asias He wrote:
>>> In order to take advantages of Paolo's multi-queue virito-scsi, we need
>>> multi-target support in tcm_vhost first. Otherwise all the requests go
>>> to one queue and other queues are idle.
>>>
>>> This patch makes:
>>>
>>> 1. All the targets under the wwpn is seen and can be used by guest.
>>> 2. No need to pass the tpgt number in struct vhost_scsi_target to
>>>    tcm_vhost.ko. Only wwpn is needed.
>>> 3. We can always pass max_target = 255 to guest now, since we abort the
>>>    request who's target id does not exist.
>>>
>>> Signed-off-by: Asias He <asias@redhat.com>
>>> ---
>>>  drivers/vhost/tcm_vhost.c | 115 ++++++++++++++++++++++++++++------------------
>>>  drivers/vhost/tcm_vhost.h |   4 +-
>>>  2 files changed, 74 insertions(+), 45 deletions(-)
>>>
>>> diff --git a/drivers/vhost/tcm_vhost.c b/drivers/vhost/tcm_vhost.c
>>> index 218deb6..d50cb95 100644
>>> --- a/drivers/vhost/tcm_vhost.c
>>> +++ b/drivers/vhost/tcm_vhost.c
>>> @@ -59,13 +59,18 @@ enum {
>>>  	VHOST_SCSI_VQ_IO = 2,
>>>  };
>>>  
>>> +#define VHOST_SCSI_MAX_TARGET 256
>>> +
>>>  struct vhost_scsi {
>>> -	struct tcm_vhost_tpg *vs_tpg;	/* Protected by vhost_scsi->dev.mutex */
>>> +	/* Protected by vhost_scsi->dev.mutex */
>>> +	struct tcm_vhost_tpg *vs_tpg[VHOST_SCSI_MAX_TARGET];
>>>  	struct vhost_dev dev;
>>>  	struct vhost_virtqueue vqs[3];
>>>  
>>>  	struct vhost_work vs_completion_work; /* cmd completion work item */
>>>  	struct llist_head vs_completion_list; /* cmd completion queue */
>>> +	char vs_vhost_wwpn[TRANSPORT_IQN_LEN];
>>> +	int vs_num_target;
>>>  };
>>>  
>>>  /* Local pointer to allocated TCM configfs fabric module */
>>> @@ -564,13 +569,7 @@ static void vhost_scsi_handle_vq(struct vhost_scsi *vs)
>>>  	u32 exp_data_len, data_first, data_num, data_direction;
>>>  	unsigned out, in, i;
>>>  	int head, ret;
>>> -
>>> -	/* Must use ioctl VHOST_SCSI_SET_ENDPOINT */
>>> -	tv_tpg = vs->vs_tpg;
>>> -	if (unlikely(!tv_tpg)) {
>>> -		pr_err("%s endpoint not set\n", __func__);
>>> -		return;
>>> -	}
>>> +	u8 target;
>>>  
>>>  	mutex_lock(&vq->mutex);
>>>  	vhost_disable_notify(&vs->dev, vq);
>>> @@ -637,6 +636,35 @@ static void vhost_scsi_handle_vq(struct vhost_scsi *vs)
>>>  			break;
>>>  		}
>>>  
>>> +		/* Extract the tpgt */
>>> +		target = v_req.lun[1];
>>> +
>>> +		/* Target does not exit, fail the request */
>>> +		if (unlikely(target >= vs->vs_num_target)) {
>>> +			struct virtio_scsi_cmd_resp __user *resp;
>>> +			struct virtio_scsi_cmd_resp rsp;
>>> +
>>> +			memset(&rsp, 0, sizeof(rsp));
>>> +			rsp.response = VIRTIO_SCSI_S_BAD_TARGET;
>>> +			resp = vq->iov[out].iov_base;
>>> +			ret = copy_to_user(resp, &rsp, sizeof(rsp));
>>> +			if (!ret)
>>> +				vhost_add_used_and_signal(&vs->dev,
>>> +						&vs->vqs[2], head, 0);
>>> +			else
>>> +				pr_err("Faulted on virtio_scsi_cmd_resp\n");
>>> +
>>> +			continue;
>>> +		}
>>> +
>>> +		tv_tpg = vs->vs_tpg[target];
>>> +		if (unlikely(!tv_tpg)) {
>>> +			/* Must use ioctl VHOST_SCSI_SET_ENDPOINT */
>>> +			pr_err("endpoint not set, target = %d\n", target);
>>> +			vhost_discard_vq_desc(vq, 1);
>>> +			break;
>>> +		}
>>> +
>>>  		exp_data_len = 0;
>>>  		for (i = 0; i < data_num; i++)
>>>  			exp_data_len += vq->iov[data_first + i].iov_len;
>>> @@ -771,14 +799,11 @@ static int vhost_scsi_set_endpoint(
>>>  		}
>>>  		tv_tport = tv_tpg->tport;
>>>  
>>> -		if (!strcmp(tv_tport->tport_name, t->vhost_wwpn) &&
>>> -		    (tv_tpg->tport_tpgt == t->vhost_tpgt)) {
>>> +		if (!strcmp(tv_tport->tport_name, t->vhost_wwpn)) {
>>>  			tv_tpg->tv_tpg_vhost_count++;
>>> -			mutex_unlock(&tv_tpg->tv_tpg_mutex);
>>> -			mutex_unlock(&tcm_vhost_mutex);
>>>  
>>>  			mutex_lock(&vs->dev.mutex);
>>> -			if (vs->vs_tpg) {
>>> +			if (vs->vs_tpg[tv_tpg->tport_tpgt - 1]) {
>>>  				mutex_unlock(&vs->dev.mutex);
>>>  				mutex_lock(&tv_tpg->tv_tpg_mutex);
>>>  				tv_tpg->tv_tpg_vhost_count--;
>>> @@ -786,15 +811,17 @@ static int vhost_scsi_set_endpoint(
>>>  				return -EEXIST;
>>>  			}
>>>  
>>> -			vs->vs_tpg = tv_tpg;
>>> +			vs->vs_tpg[tv_tpg->tport_tpgt - 1] = tv_tpg;
>>
>>
>> tv_tpg->tport_tpgt starts from 0, right? I thought it starts from 1,
>> because I always got it starts from 1 in targetcli.
>>
>> o- vhost
>>    o- naa.6001405bd4e8476d
>>       o- tpg1
>>          o- luns
>>             o- lun0
>>       o- tpg2
>>          o- luns
>>             o- lun0
>>       o- tpg3
>>          o- luns
>>             o- lun0
>>       o- tpg4
>>          o- luns
>>             o- lun0
>>
>> If it is true. I will cook v2 of this patch.
>>
>> Also, the tv_tpg->tport_tpgt can be none-continuous. e.g.
>>
>> o- vhost
>>    o- naa.6001405bd4e8476d
>>       o- tpg1
>>          o- luns
>>             o- lun0
>>       o- tpg2
>>          o- luns
>>             o- lun0
>>       o- tpg4
>>          o- luns
>>             o- lun0
>>
>> I will handle this in v2.
>>
>>
>> And we need to fix another problem mentioned by Paolo.
>> Otherwise we can not use this to tell if a target exists or the endpoint
>> is not setup.
>>
>>    target = v_req.lun[1];
>>    tv_tpg = vs->vs_tpg[target];
>>    if (tv_tpg)
>>       /* target exist */
>>    else
>>       /* target does not exist*/
>>
> 
> Why should there be a difference?

With multi-target, if tv_tpg is NULL, there might be two reasons:
1. backend is not setup
2. this target does not exist.

we need another flag to indicate if the endpoint is setup or not.
Set/Clear it in vhost_scsi_set_endpoint()/vhost_scsi_clear_endpoint(),
Test it in vhost_scsi_handle_vq().

> 
>> """ from paolo
>> Another small bug I found is an ordering problem between
>> VHOST_SET_VRING_KICK and VHOST_SCSI_SET_ENDPOINT.  Starting the vq
>> causes a "vhost_scsi_handle_vq endpoint not set" error in dmesg.
>> Because of this I added the first two patches, which let me do
>> VHOST_SCSI_SET_ENDPOINT before VHOST_SET_VRING_KICK but after setting
>> up the vring.
>> """
>>
>>
>>>  			smp_mb__after_atomic_inc();
>>> +			if (!vs->vs_num_target++)
>>> +				memcpy(vs->vs_vhost_wwpn, t->vhost_wwpn,
>>> +				       sizeof(vs->vs_vhost_wwpn));
>>>  			mutex_unlock(&vs->dev.mutex);
>>> -			return 0;
>>>  		}
>>>  		mutex_unlock(&tv_tpg->tv_tpg_mutex);
>>>  	}
>>>  	mutex_unlock(&tcm_vhost_mutex);
>>> -	return -EINVAL;
>>> +	return 0;
>>>  }
>>>  
>>>  static int vhost_scsi_clear_endpoint(
>>> @@ -803,7 +830,8 @@ static int vhost_scsi_clear_endpoint(
>>>  {
>>>  	struct tcm_vhost_tport *tv_tport;
>>>  	struct tcm_vhost_tpg *tv_tpg;
>>> -	int index, ret;
>>> +	int index, ret, i;
>>> +	u8 target;
>>>  
>>>  	mutex_lock(&vs->dev.mutex);
>>>  	/* Verify that ring has been setup correctly. */
>>> @@ -813,27 +841,32 @@ static int vhost_scsi_clear_endpoint(
>>>  			goto err;
>>>  		}
>>>  	}
>>> +	for (i = 0; i < vs->vs_num_target; i++) {
>>> +		target = i;
>>>  
>>> -	if (!vs->vs_tpg) {
>>> -		ret = -ENODEV;
>>> -		goto err;
>>> -	}
>>> -	tv_tpg = vs->vs_tpg;
>>> -	tv_tport = tv_tpg->tport;
>>> -
>>> -	if (strcmp(tv_tport->tport_name, t->vhost_wwpn) ||
>>> -	    (tv_tpg->tport_tpgt != t->vhost_tpgt)) {
>>> -		pr_warn("tv_tport->tport_name: %s, tv_tpg->tport_tpgt: %hu"
>>> -			" does not match t->vhost_wwpn: %s, t->vhost_tpgt: %hu\n",
>>> -			tv_tport->tport_name, tv_tpg->tport_tpgt,
>>> -			t->vhost_wwpn, t->vhost_tpgt);
>>> -		ret = -EINVAL;
>>> -		goto err;
>>> +		tv_tpg = vs->vs_tpg[target];
>>> +		if (!tv_tpg) {
>>> +			ret = -ENODEV;
>>> +			goto err;
>>> +		}
>>> +		tv_tport = tv_tpg->tport;
>>> +		if (!tv_tport) {
>>> +			ret = -ENODEV;
>>> +			goto err;
>>> +		}
>>> +
>>> +		if (strcmp(tv_tport->tport_name, t->vhost_wwpn)) {
>>> +			pr_warn("tv_tport->tport_name: %s, tv_tpg->tport_tpgt: %hu"
>>> +				" does not match t->vhost_wwpn: %s, t->vhost_tpgt: %hu\n",
>>> +				tv_tport->tport_name, tv_tpg->tport_tpgt,
>>> +				t->vhost_wwpn, t->vhost_tpgt);
>>> +			ret = -EINVAL;
>>> +			goto err;
>>> +		}
>>> +		tv_tpg->tv_tpg_vhost_count--;
>>> +		vs->vs_tpg[target] = NULL;
>>>  	}
>>> -	tv_tpg->tv_tpg_vhost_count--;
>>> -	vs->vs_tpg = NULL;
>>>  	mutex_unlock(&vs->dev.mutex);
>>> -
>>>  	return 0;
>>>  
>>>  err:
>>> @@ -868,16 +901,10 @@ static int vhost_scsi_open(struct inode *inode, struct file *f)
>>>  static int vhost_scsi_release(struct inode *inode, struct file *f)
>>>  {
>>>  	struct vhost_scsi *s = f->private_data;
>>> +	struct vhost_scsi_target t;
>>>  
>>> -	if (s->vs_tpg && s->vs_tpg->tport) {
>>> -		struct vhost_scsi_target backend;
>>> -
>>> -		memcpy(backend.vhost_wwpn, s->vs_tpg->tport->tport_name,
>>> -				sizeof(backend.vhost_wwpn));
>>> -		backend.vhost_tpgt = s->vs_tpg->tport_tpgt;
>>> -		vhost_scsi_clear_endpoint(s, &backend);
>>> -	}
>>> -
>>> +	memcpy(t.vhost_wwpn, s->vs_vhost_wwpn, sizeof(t.vhost_wwpn));
>>> +	vhost_scsi_clear_endpoint(s, &t);
>>>  	vhost_dev_stop(&s->dev);
>>>  	vhost_dev_cleanup(&s->dev, false);
>>>  	kfree(s);
>>> diff --git a/drivers/vhost/tcm_vhost.h b/drivers/vhost/tcm_vhost.h
>>> index 47ee80b..519a550 100644
>>> --- a/drivers/vhost/tcm_vhost.h
>>> +++ b/drivers/vhost/tcm_vhost.h
>>> @@ -93,9 +93,11 @@ struct tcm_vhost_tport {
>>>   *
>>>   * ABI Rev 0: July 2012 version starting point for v3.6-rc merge candidate +
>>>   *            RFC-v2 vhost-scsi userspace.  Add GET_ABI_VERSION ioctl usage
>>> + * ABI Rev 1: January 2013. Ignore vhost_tpgt filed in struct vhost_scsi_target.
>>> + *            All the targets under vhost_wwpn can be seen and used by guset.
>>>   */
>>>  
>>> -#define VHOST_SCSI_ABI_VERSION	0
>>> +#define VHOST_SCSI_ABI_VERSION	1
>>>  
>>>  struct vhost_scsi_target {
>>>  	int abi_version;
>>>
>>
>>
>> -- 
>> Asias
Asias He Feb. 1, 2013, 4:03 a.m. UTC | #5
On 02/01/2013 04:59 AM, Nicholas A. Bellinger wrote:
> On Thu, 2013-01-31 at 17:28 +0800, Asias He wrote:
>> Hello Nicholas,
>>
>> On 01/31/2013 03:33 PM, Asias He wrote:
>>> In order to take advantages of Paolo's multi-queue virito-scsi, we need
>>> multi-target support in tcm_vhost first. Otherwise all the requests go
>>> to one queue and other queues are idle.
>>>
>>> This patch makes:
>>>
>>> 1. All the targets under the wwpn is seen and can be used by guest.
>>> 2. No need to pass the tpgt number in struct vhost_scsi_target to
>>>    tcm_vhost.ko. Only wwpn is needed.
>>> 3. We can always pass max_target = 255 to guest now, since we abort the
>>>    request who's target id does not exist.
>>>
>>> Signed-off-by: Asias He <asias@redhat.com>
>>> ---
>>>  drivers/vhost/tcm_vhost.c | 115 ++++++++++++++++++++++++++++------------------
>>>  drivers/vhost/tcm_vhost.h |   4 +-
>>>  2 files changed, 74 insertions(+), 45 deletions(-)
>>>
>>> diff --git a/drivers/vhost/tcm_vhost.c b/drivers/vhost/tcm_vhost.c
>>> index 218deb6..d50cb95 100644
>>> --- a/drivers/vhost/tcm_vhost.c
>>> +++ b/drivers/vhost/tcm_vhost.c
>>> @@ -59,13 +59,18 @@ enum {
>>>  	VHOST_SCSI_VQ_IO = 2,
>>>  };
>>>  
>>> +#define VHOST_SCSI_MAX_TARGET 256
>>> +
>>>  struct vhost_scsi {
>>> -	struct tcm_vhost_tpg *vs_tpg;	/* Protected by vhost_scsi->dev.mutex */
>>> +	/* Protected by vhost_scsi->dev.mutex */
>>> +	struct tcm_vhost_tpg *vs_tpg[VHOST_SCSI_MAX_TARGET];
>>>  	struct vhost_dev dev;
>>>  	struct vhost_virtqueue vqs[3];
>>>  
>>>  	struct vhost_work vs_completion_work; /* cmd completion work item */
>>>  	struct llist_head vs_completion_list; /* cmd completion queue */
>>> +	char vs_vhost_wwpn[TRANSPORT_IQN_LEN];
>>> +	int vs_num_target;
>>>  };
>>>  
>>>  /* Local pointer to allocated TCM configfs fabric module */
>>> @@ -564,13 +569,7 @@ static void vhost_scsi_handle_vq(struct vhost_scsi *vs)
>>>  	u32 exp_data_len, data_first, data_num, data_direction;
>>>  	unsigned out, in, i;
>>>  	int head, ret;
>>> -
>>> -	/* Must use ioctl VHOST_SCSI_SET_ENDPOINT */
>>> -	tv_tpg = vs->vs_tpg;
>>> -	if (unlikely(!tv_tpg)) {
>>> -		pr_err("%s endpoint not set\n", __func__);
>>> -		return;
>>> -	}
>>> +	u8 target;
>>>  
>>>  	mutex_lock(&vq->mutex);
>>>  	vhost_disable_notify(&vs->dev, vq);
>>> @@ -637,6 +636,35 @@ static void vhost_scsi_handle_vq(struct vhost_scsi *vs)
>>>  			break;
>>>  		}
>>>  
>>> +		/* Extract the tpgt */
>>> +		target = v_req.lun[1];
>>> +
>>> +		/* Target does not exit, fail the request */
>>> +		if (unlikely(target >= vs->vs_num_target)) {
>>> +			struct virtio_scsi_cmd_resp __user *resp;
>>> +			struct virtio_scsi_cmd_resp rsp;
>>> +
>>> +			memset(&rsp, 0, sizeof(rsp));
>>> +			rsp.response = VIRTIO_SCSI_S_BAD_TARGET;
>>> +			resp = vq->iov[out].iov_base;
>>> +			ret = copy_to_user(resp, &rsp, sizeof(rsp));
>>> +			if (!ret)
>>> +				vhost_add_used_and_signal(&vs->dev,
>>> +						&vs->vqs[2], head, 0);
>>> +			else
>>> +				pr_err("Faulted on virtio_scsi_cmd_resp\n");
>>> +
>>> +			continue;
>>> +		}
>>> +
>>> +		tv_tpg = vs->vs_tpg[target];
>>> +		if (unlikely(!tv_tpg)) {
>>> +			/* Must use ioctl VHOST_SCSI_SET_ENDPOINT */
>>> +			pr_err("endpoint not set, target = %d\n", target);
>>> +			vhost_discard_vq_desc(vq, 1);
>>> +			break;
>>> +		}
>>> +
>>>  		exp_data_len = 0;
>>>  		for (i = 0; i < data_num; i++)
>>>  			exp_data_len += vq->iov[data_first + i].iov_len;
>>> @@ -771,14 +799,11 @@ static int vhost_scsi_set_endpoint(
>>>  		}
>>>  		tv_tport = tv_tpg->tport;
>>>  
>>> -		if (!strcmp(tv_tport->tport_name, t->vhost_wwpn) &&
>>> -		    (tv_tpg->tport_tpgt == t->vhost_tpgt)) {
>>> +		if (!strcmp(tv_tport->tport_name, t->vhost_wwpn)) {
>>>  			tv_tpg->tv_tpg_vhost_count++;
>>> -			mutex_unlock(&tv_tpg->tv_tpg_mutex);
>>> -			mutex_unlock(&tcm_vhost_mutex);
>>>  
>>>  			mutex_lock(&vs->dev.mutex);
>>> -			if (vs->vs_tpg) {
>>> +			if (vs->vs_tpg[tv_tpg->tport_tpgt - 1]) {
>>>  				mutex_unlock(&vs->dev.mutex);
>>>  				mutex_lock(&tv_tpg->tv_tpg_mutex);
>>>  				tv_tpg->tv_tpg_vhost_count--;
>>> @@ -786,15 +811,17 @@ static int vhost_scsi_set_endpoint(
>>>  				return -EEXIST;
>>>  			}
>>>  
>>> -			vs->vs_tpg = tv_tpg;
>>> +			vs->vs_tpg[tv_tpg->tport_tpgt - 1] = tv_tpg;
>>
>>
>> tv_tpg->tport_tpgt starts from 0, right? I thought it starts from 1,
>> because I always got it starts from 1 in targetcli.
>>
>> o- vhost
>>    o- naa.6001405bd4e8476d
>>       o- tpg1
>>          o- luns
>>             o- lun0
>>       o- tpg2
>>          o- luns
>>             o- lun0
>>       o- tpg3
>>          o- luns
>>             o- lun0
>>       o- tpg4
>>          o- luns
>>             o- lun0
>>
> 
> So at least with iscsi-target, we start from tpgt=1 to avoid some legacy
> initiators that have issues handling tgpt=0.
> 
> Given that rtslib/targetcli currently expect this with the "tpgs"
> feature is enabled, starting from tpgt=1 with tcm_vhost probably makes
> the most sense.

Okay. But tgpt can be 0, right?

I saw this setup:

  cd /sys/kernel/config/target
  mkdir -p core/fileio_0/fileio
  echo 'fd_dev_name=/home/pbonzini/test.img,fd_dev_size=5905580032' >
core/fileio_0/fileio/control
  echo 1 > core/fileio_0/fileio/enable
  mkdir -p vhost/naa.600140554cf3a18e/tpgt_0/lun/lun_0
  cd vhost/naa.600140554cf3a18e/tpgt_0
  ln -sf ../../../../../core/fileio_0/fileio/ lun/lun_0/virtual_scsi_port
  echo naa.60014053226f0388 > nexus

And this:

       ** Setup wwpn and tpgt
       $ wwpn="naa.0"
       $ tpgt=/sys/kernel/config/target/vhost/$wwpn/tpgt_0
       $ nexus=$tpgt/nexus
       $ mkdir -p $tpgt
       $ echo -n $wwpn > $nexus



>> If it is true. I will cook v2 of this patch.
>>
>> Also, the tv_tpg->tport_tpgt can be none-continuous. e.g.
>>
>> o- vhost
>>    o- naa.6001405bd4e8476d
>>       o- tpg1
>>          o- luns
>>             o- lun0
>>       o- tpg2
>>          o- luns
>>             o- lun0
>>       o- tpg4
>>          o- luns
>>             o- lun0
>>
>> I will handle this in v2.
>>
> 
> Correct, tpgt values may be optionally non-contiguous up to unsigned
> short.

ok.

> --nab
> 
>
Nicholas A. Bellinger Feb. 1, 2013, 7:38 a.m. UTC | #6
On Fri, 2013-02-01 at 12:03 +0800, Asias He wrote:
> On 02/01/2013 04:59 AM, Nicholas A. Bellinger wrote:
> > On Thu, 2013-01-31 at 17:28 +0800, Asias He wrote:
> >> Hello Nicholas,
> >>
> >> On 01/31/2013 03:33 PM, Asias He wrote:
> >>> In order to take advantages of Paolo's multi-queue virito-scsi, we need
> >>> multi-target support in tcm_vhost first. Otherwise all the requests go
> >>> to one queue and other queues are idle.
> >>>

<SNIP>

> >>> @@ -771,14 +799,11 @@ static int vhost_scsi_set_endpoint(
> >>>  		}
> >>>  		tv_tport = tv_tpg->tport;
> >>>  
> >>> -		if (!strcmp(tv_tport->tport_name, t->vhost_wwpn) &&
> >>> -		    (tv_tpg->tport_tpgt == t->vhost_tpgt)) {
> >>> +		if (!strcmp(tv_tport->tport_name, t->vhost_wwpn)) {
> >>>  			tv_tpg->tv_tpg_vhost_count++;
> >>> -			mutex_unlock(&tv_tpg->tv_tpg_mutex);
> >>> -			mutex_unlock(&tcm_vhost_mutex);
> >>>  
> >>>  			mutex_lock(&vs->dev.mutex);
> >>> -			if (vs->vs_tpg) {
> >>> +			if (vs->vs_tpg[tv_tpg->tport_tpgt - 1]) {
> >>>  				mutex_unlock(&vs->dev.mutex);
> >>>  				mutex_lock(&tv_tpg->tv_tpg_mutex);
> >>>  				tv_tpg->tv_tpg_vhost_count--;
> >>> @@ -786,15 +811,17 @@ static int vhost_scsi_set_endpoint(
> >>>  				return -EEXIST;
> >>>  			}
> >>>  
> >>> -			vs->vs_tpg = tv_tpg;
> >>> +			vs->vs_tpg[tv_tpg->tport_tpgt - 1] = tv_tpg;
> >>
> >>
> >> tv_tpg->tport_tpgt starts from 0, right? I thought it starts from 1,
> >> because I always got it starts from 1 in targetcli.
> >>
> >> o- vhost
> >>    o- naa.6001405bd4e8476d
> >>       o- tpg1
> >>          o- luns
> >>             o- lun0
> >>       o- tpg2
> >>          o- luns
> >>             o- lun0
> >>       o- tpg3
> >>          o- luns
> >>             o- lun0
> >>       o- tpg4
> >>          o- luns
> >>             o- lun0
> >>
> > 
> > So at least with iscsi-target, we start from tpgt=1 to avoid some legacy
> > initiators that have issues handling tgpt=0.
> > 
> > Given that rtslib/targetcli currently expect this with the "tpgs"
> > feature is enabled, starting from tpgt=1 with tcm_vhost probably makes
> > the most sense.
> 
> Okay. But tgpt can be 0, right?
> 

Most certainly, in the end it's totally up to the fabric.  ;)
 
> I saw this setup:
> 
>   cd /sys/kernel/config/target
>   mkdir -p core/fileio_0/fileio
>   echo 'fd_dev_name=/home/pbonzini/test.img,fd_dev_size=5905580032' >
> core/fileio_0/fileio/control
>   echo 1 > core/fileio_0/fileio/enable
>   mkdir -p vhost/naa.600140554cf3a18e/tpgt_0/lun/lun_0
>   cd vhost/naa.600140554cf3a18e/tpgt_0
>   ln -sf ../../../../../core/fileio_0/fileio/ lun/lun_0/virtual_scsi_port
>   echo naa.60014053226f0388 > nexus
> 
> And this:
> 
>        ** Setup wwpn and tpgt
>        $ wwpn="naa.0"
>        $ tpgt=/sys/kernel/config/target/vhost/$wwpn/tpgt_0
>        $ nexus=$tpgt/nexus
>        $ mkdir -p $tpgt
>        $ echo -n $wwpn > $nexus
> 
> 

OK, I think you'll want to avoid the extra vs->vs_tpg[tpgt - 1] offset
above to properly support this.

--nab

> 
> >> If it is true. I will cook v2 of this patch.
> >>
> >> Also, the tv_tpg->tport_tpgt can be none-continuous. e.g.
> >>
> >> o- vhost
> >>    o- naa.6001405bd4e8476d
> >>       o- tpg1
> >>          o- luns
> >>             o- lun0
> >>       o- tpg2
> >>          o- luns
> >>             o- lun0
> >>       o- tpg4
> >>          o- luns
> >>             o- lun0
> >>
> >> I will handle this in v2.
> >>
> > 
> > Correct, tpgt values may be optionally non-contiguous up to unsigned
> > short.
> 
> ok.
> 
> > --nab
> > 
> > 
> 
> 


--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to majordomo@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Asias He Feb. 1, 2013, 8:26 a.m. UTC | #7
On 02/01/2013 03:38 PM, Nicholas A. Bellinger wrote:
> On Fri, 2013-02-01 at 12:03 +0800, Asias He wrote:
>> On 02/01/2013 04:59 AM, Nicholas A. Bellinger wrote:
>>> On Thu, 2013-01-31 at 17:28 +0800, Asias He wrote:
>>>> Hello Nicholas,
>>>>
>>>> On 01/31/2013 03:33 PM, Asias He wrote:
>>>>> In order to take advantages of Paolo's multi-queue virito-scsi, we need
>>>>> multi-target support in tcm_vhost first. Otherwise all the requests go
>>>>> to one queue and other queues are idle.
>>>>>
> 
> <SNIP>
> 
>>>>> @@ -771,14 +799,11 @@ static int vhost_scsi_set_endpoint(
>>>>>  		}
>>>>>  		tv_tport = tv_tpg->tport;
>>>>>  
>>>>> -		if (!strcmp(tv_tport->tport_name, t->vhost_wwpn) &&
>>>>> -		    (tv_tpg->tport_tpgt == t->vhost_tpgt)) {
>>>>> +		if (!strcmp(tv_tport->tport_name, t->vhost_wwpn)) {
>>>>>  			tv_tpg->tv_tpg_vhost_count++;
>>>>> -			mutex_unlock(&tv_tpg->tv_tpg_mutex);
>>>>> -			mutex_unlock(&tcm_vhost_mutex);
>>>>>  
>>>>>  			mutex_lock(&vs->dev.mutex);
>>>>> -			if (vs->vs_tpg) {
>>>>> +			if (vs->vs_tpg[tv_tpg->tport_tpgt - 1]) {
>>>>>  				mutex_unlock(&vs->dev.mutex);
>>>>>  				mutex_lock(&tv_tpg->tv_tpg_mutex);
>>>>>  				tv_tpg->tv_tpg_vhost_count--;
>>>>> @@ -786,15 +811,17 @@ static int vhost_scsi_set_endpoint(
>>>>>  				return -EEXIST;
>>>>>  			}
>>>>>  
>>>>> -			vs->vs_tpg = tv_tpg;
>>>>> +			vs->vs_tpg[tv_tpg->tport_tpgt - 1] = tv_tpg;
>>>>
>>>>
>>>> tv_tpg->tport_tpgt starts from 0, right? I thought it starts from 1,
>>>> because I always got it starts from 1 in targetcli.
>>>>
>>>> o- vhost
>>>>    o- naa.6001405bd4e8476d
>>>>       o- tpg1
>>>>          o- luns
>>>>             o- lun0
>>>>       o- tpg2
>>>>          o- luns
>>>>             o- lun0
>>>>       o- tpg3
>>>>          o- luns
>>>>             o- lun0
>>>>       o- tpg4
>>>>          o- luns
>>>>             o- lun0
>>>>
>>>
>>> So at least with iscsi-target, we start from tpgt=1 to avoid some legacy
>>> initiators that have issues handling tgpt=0.
>>>
>>> Given that rtslib/targetcli currently expect this with the "tpgs"
>>> feature is enabled, starting from tpgt=1 with tcm_vhost probably makes
>>> the most sense.
>>
>> Okay. But tgpt can be 0, right?
>>
> 
> Most certainly, in the end it's totally up to the fabric.  ;)

okay.

>  
>> I saw this setup:
>>
>>   cd /sys/kernel/config/target
>>   mkdir -p core/fileio_0/fileio
>>   echo 'fd_dev_name=/home/pbonzini/test.img,fd_dev_size=5905580032' >
>> core/fileio_0/fileio/control
>>   echo 1 > core/fileio_0/fileio/enable
>>   mkdir -p vhost/naa.600140554cf3a18e/tpgt_0/lun/lun_0
>>   cd vhost/naa.600140554cf3a18e/tpgt_0
>>   ln -sf ../../../../../core/fileio_0/fileio/ lun/lun_0/virtual_scsi_port
>>   echo naa.60014053226f0388 > nexus
>>
>> And this:
>>
>>        ** Setup wwpn and tpgt
>>        $ wwpn="naa.0"
>>        $ tpgt=/sys/kernel/config/target/vhost/$wwpn/tpgt_0
>>        $ nexus=$tpgt/nexus
>>        $ mkdir -p $tpgt
>>        $ echo -n $wwpn > $nexus
>>
>>
> 
> OK, I think you'll want to avoid the extra vs->vs_tpg[tpgt - 1] offset
> above to properly support this.

Yes. Already did that.

> --nab
> 
>>
>>>> If it is true. I will cook v2 of this patch.
>>>>
>>>> Also, the tv_tpg->tport_tpgt can be none-continuous. e.g.
>>>>
>>>> o- vhost
>>>>    o- naa.6001405bd4e8476d
>>>>       o- tpg1
>>>>          o- luns
>>>>             o- lun0
>>>>       o- tpg2
>>>>          o- luns
>>>>             o- lun0
>>>>       o- tpg4
>>>>          o- luns
>>>>             o- lun0
>>>>
>>>> I will handle this in v2.
>>>>
>>>
>>> Correct, tpgt values may be optionally non-contiguous up to unsigned
>>> short.
>>
>> ok.
>>
>>> --nab
>>>
>>>
>>
>>
> 
>
diff mbox

Patch

diff --git a/drivers/vhost/tcm_vhost.c b/drivers/vhost/tcm_vhost.c
index 218deb6..d50cb95 100644
--- a/drivers/vhost/tcm_vhost.c
+++ b/drivers/vhost/tcm_vhost.c
@@ -59,13 +59,18 @@  enum {
 	VHOST_SCSI_VQ_IO = 2,
 };
 
+#define VHOST_SCSI_MAX_TARGET 256
+
 struct vhost_scsi {
-	struct tcm_vhost_tpg *vs_tpg;	/* Protected by vhost_scsi->dev.mutex */
+	/* Protected by vhost_scsi->dev.mutex */
+	struct tcm_vhost_tpg *vs_tpg[VHOST_SCSI_MAX_TARGET];
 	struct vhost_dev dev;
 	struct vhost_virtqueue vqs[3];
 
 	struct vhost_work vs_completion_work; /* cmd completion work item */
 	struct llist_head vs_completion_list; /* cmd completion queue */
+	char vs_vhost_wwpn[TRANSPORT_IQN_LEN];
+	int vs_num_target;
 };
 
 /* Local pointer to allocated TCM configfs fabric module */
@@ -564,13 +569,7 @@  static void vhost_scsi_handle_vq(struct vhost_scsi *vs)
 	u32 exp_data_len, data_first, data_num, data_direction;
 	unsigned out, in, i;
 	int head, ret;
-
-	/* Must use ioctl VHOST_SCSI_SET_ENDPOINT */
-	tv_tpg = vs->vs_tpg;
-	if (unlikely(!tv_tpg)) {
-		pr_err("%s endpoint not set\n", __func__);
-		return;
-	}
+	u8 target;
 
 	mutex_lock(&vq->mutex);
 	vhost_disable_notify(&vs->dev, vq);
@@ -637,6 +636,35 @@  static void vhost_scsi_handle_vq(struct vhost_scsi *vs)
 			break;
 		}
 
+		/* Extract the tpgt */
+		target = v_req.lun[1];
+
+		/* Target does not exit, fail the request */
+		if (unlikely(target >= vs->vs_num_target)) {
+			struct virtio_scsi_cmd_resp __user *resp;
+			struct virtio_scsi_cmd_resp rsp;
+
+			memset(&rsp, 0, sizeof(rsp));
+			rsp.response = VIRTIO_SCSI_S_BAD_TARGET;
+			resp = vq->iov[out].iov_base;
+			ret = copy_to_user(resp, &rsp, sizeof(rsp));
+			if (!ret)
+				vhost_add_used_and_signal(&vs->dev,
+						&vs->vqs[2], head, 0);
+			else
+				pr_err("Faulted on virtio_scsi_cmd_resp\n");
+
+			continue;
+		}
+
+		tv_tpg = vs->vs_tpg[target];
+		if (unlikely(!tv_tpg)) {
+			/* Must use ioctl VHOST_SCSI_SET_ENDPOINT */
+			pr_err("endpoint not set, target = %d\n", target);
+			vhost_discard_vq_desc(vq, 1);
+			break;
+		}
+
 		exp_data_len = 0;
 		for (i = 0; i < data_num; i++)
 			exp_data_len += vq->iov[data_first + i].iov_len;
@@ -771,14 +799,11 @@  static int vhost_scsi_set_endpoint(
 		}
 		tv_tport = tv_tpg->tport;
 
-		if (!strcmp(tv_tport->tport_name, t->vhost_wwpn) &&
-		    (tv_tpg->tport_tpgt == t->vhost_tpgt)) {
+		if (!strcmp(tv_tport->tport_name, t->vhost_wwpn)) {
 			tv_tpg->tv_tpg_vhost_count++;
-			mutex_unlock(&tv_tpg->tv_tpg_mutex);
-			mutex_unlock(&tcm_vhost_mutex);
 
 			mutex_lock(&vs->dev.mutex);
-			if (vs->vs_tpg) {
+			if (vs->vs_tpg[tv_tpg->tport_tpgt - 1]) {
 				mutex_unlock(&vs->dev.mutex);
 				mutex_lock(&tv_tpg->tv_tpg_mutex);
 				tv_tpg->tv_tpg_vhost_count--;
@@ -786,15 +811,17 @@  static int vhost_scsi_set_endpoint(
 				return -EEXIST;
 			}
 
-			vs->vs_tpg = tv_tpg;
+			vs->vs_tpg[tv_tpg->tport_tpgt - 1] = tv_tpg;
 			smp_mb__after_atomic_inc();
+			if (!vs->vs_num_target++)
+				memcpy(vs->vs_vhost_wwpn, t->vhost_wwpn,
+				       sizeof(vs->vs_vhost_wwpn));
 			mutex_unlock(&vs->dev.mutex);
-			return 0;
 		}
 		mutex_unlock(&tv_tpg->tv_tpg_mutex);
 	}
 	mutex_unlock(&tcm_vhost_mutex);
-	return -EINVAL;
+	return 0;
 }
 
 static int vhost_scsi_clear_endpoint(
@@ -803,7 +830,8 @@  static int vhost_scsi_clear_endpoint(
 {
 	struct tcm_vhost_tport *tv_tport;
 	struct tcm_vhost_tpg *tv_tpg;
-	int index, ret;
+	int index, ret, i;
+	u8 target;
 
 	mutex_lock(&vs->dev.mutex);
 	/* Verify that ring has been setup correctly. */
@@ -813,27 +841,32 @@  static int vhost_scsi_clear_endpoint(
 			goto err;
 		}
 	}
+	for (i = 0; i < vs->vs_num_target; i++) {
+		target = i;
 
-	if (!vs->vs_tpg) {
-		ret = -ENODEV;
-		goto err;
-	}
-	tv_tpg = vs->vs_tpg;
-	tv_tport = tv_tpg->tport;
-
-	if (strcmp(tv_tport->tport_name, t->vhost_wwpn) ||
-	    (tv_tpg->tport_tpgt != t->vhost_tpgt)) {
-		pr_warn("tv_tport->tport_name: %s, tv_tpg->tport_tpgt: %hu"
-			" does not match t->vhost_wwpn: %s, t->vhost_tpgt: %hu\n",
-			tv_tport->tport_name, tv_tpg->tport_tpgt,
-			t->vhost_wwpn, t->vhost_tpgt);
-		ret = -EINVAL;
-		goto err;
+		tv_tpg = vs->vs_tpg[target];
+		if (!tv_tpg) {
+			ret = -ENODEV;
+			goto err;
+		}
+		tv_tport = tv_tpg->tport;
+		if (!tv_tport) {
+			ret = -ENODEV;
+			goto err;
+		}
+
+		if (strcmp(tv_tport->tport_name, t->vhost_wwpn)) {
+			pr_warn("tv_tport->tport_name: %s, tv_tpg->tport_tpgt: %hu"
+				" does not match t->vhost_wwpn: %s, t->vhost_tpgt: %hu\n",
+				tv_tport->tport_name, tv_tpg->tport_tpgt,
+				t->vhost_wwpn, t->vhost_tpgt);
+			ret = -EINVAL;
+			goto err;
+		}
+		tv_tpg->tv_tpg_vhost_count--;
+		vs->vs_tpg[target] = NULL;
 	}
-	tv_tpg->tv_tpg_vhost_count--;
-	vs->vs_tpg = NULL;
 	mutex_unlock(&vs->dev.mutex);
-
 	return 0;
 
 err:
@@ -868,16 +901,10 @@  static int vhost_scsi_open(struct inode *inode, struct file *f)
 static int vhost_scsi_release(struct inode *inode, struct file *f)
 {
 	struct vhost_scsi *s = f->private_data;
+	struct vhost_scsi_target t;
 
-	if (s->vs_tpg && s->vs_tpg->tport) {
-		struct vhost_scsi_target backend;
-
-		memcpy(backend.vhost_wwpn, s->vs_tpg->tport->tport_name,
-				sizeof(backend.vhost_wwpn));
-		backend.vhost_tpgt = s->vs_tpg->tport_tpgt;
-		vhost_scsi_clear_endpoint(s, &backend);
-	}
-
+	memcpy(t.vhost_wwpn, s->vs_vhost_wwpn, sizeof(t.vhost_wwpn));
+	vhost_scsi_clear_endpoint(s, &t);
 	vhost_dev_stop(&s->dev);
 	vhost_dev_cleanup(&s->dev, false);
 	kfree(s);
diff --git a/drivers/vhost/tcm_vhost.h b/drivers/vhost/tcm_vhost.h
index 47ee80b..519a550 100644
--- a/drivers/vhost/tcm_vhost.h
+++ b/drivers/vhost/tcm_vhost.h
@@ -93,9 +93,11 @@  struct tcm_vhost_tport {
  *
  * ABI Rev 0: July 2012 version starting point for v3.6-rc merge candidate +
  *            RFC-v2 vhost-scsi userspace.  Add GET_ABI_VERSION ioctl usage
+ * ABI Rev 1: January 2013. Ignore vhost_tpgt filed in struct vhost_scsi_target.
+ *            All the targets under vhost_wwpn can be seen and used by guset.
  */
 
-#define VHOST_SCSI_ABI_VERSION	0
+#define VHOST_SCSI_ABI_VERSION	1
 
 struct vhost_scsi_target {
 	int abi_version;