Received: by 2002:a25:1985:0:0:0:0:0 with SMTP id 127csp3922204ybz; Mon, 20 Apr 2020 11:57:01 -0700 (PDT) X-Google-Smtp-Source: APiQypLhNy+r29TREjPIyuNOf0DoYy/OgxW+zDtNTtEmSE6mTfwk08dIs4k4wrHpMJtIdXKoiNyW X-Received: by 2002:a50:cf05:: with SMTP id c5mr15644998edk.330.1587409021513; Mon, 20 Apr 2020 11:57:01 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1587409021; cv=none; d=google.com; s=arc-20160816; b=Yv9fSVPhj/2MM3XycPVfMePxbVTHxjn/LPM+MAvHuhEdua/QgM6wSmUtwS10xtRstC TVcVWVhvx6784Y7918WW/fiZULgUVtc9WbY7wZcNPe+7mvXBupTgbbxqCXl82sYZN30z 54LiRLonq3z/es0PkRYyNswLbBEZaQCtyOt0ibIsj5ZHUkD5XZBaHvKEsNxpJgVBLni3 fhJIquv6/sYg74Jy0K7mRZtKU7Noyp1JYYL2LuD4GYxJpM4Tn/uE7xxGWvj8x7YtJOD1 I6I7EXd4xxy9dl1PlRSXpW5Z9nXa6hbkq4tlGF5Gv9WIuyxzCivV1OsOGkEtzg2Y1Gvu PbvQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:subject:content-transfer-encoding :mime-version:references:in-reply-to:message-id:date:cc:to:from; bh=rMJUcVGNWLIJY0G7OoGPCJqNKPeLMhaDnH1tX6HeWzU=; b=B+va7yQxiT02ZxeMNeuacsjnnJxN9d0RqkFEyw3GhaeKW2214h0Zd9BENvIUG0W7Cb KkFQpCPXmwJKYoCkhQc7YaNDPufNspfQkKs6jDDHGfiL7drfOW0bapc5VZz7+8bBSGD9 x80Gy9v1X7Z8/6rSD3Ls5PxeTfNchu/XINeQgu4sy8BWWNAlM5zOE71BOrcXpy7gxY1R L9S3PUQwAFcjs65ORcs3xECAeIcPwrqX4+CGQTGMHpO2f7THwTFvT1K0dDOXfby5eVrW CkLjaITDcE7r7Bx+QwY+fuJcmfNJtB8Zjt7wf3JDhFTC8ERaxiJE/QROH46i60eM9l0q Bdsg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id p22si63002ejw.220.2020.04.20.11.56.38; Mon, 20 Apr 2020 11:57:01 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726563AbgDTQrW (ORCPT + 99 others); Mon, 20 Apr 2020 12:47:22 -0400 Received: from ale.deltatee.com ([207.54.116.67]:43064 "EHLO ale.deltatee.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726486AbgDTQrS (ORCPT ); Mon, 20 Apr 2020 12:47:18 -0400 Received: from cgy1-donard.priv.deltatee.com ([172.16.1.31]) by ale.deltatee.com with esmtps (TLS1.3:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.92) (envelope-from ) id 1jQZZb-0008F4-BR; Mon, 20 Apr 2020 10:47:12 -0600 Received: from gunthorp by cgy1-donard.priv.deltatee.com with local (Exim 4.92) (envelope-from ) id 1jQZZa-0005dl-63; Mon, 20 Apr 2020 10:47:06 -0600 From: Logan Gunthorpe To: linux-kernel@vger.kernel.org, linux-nvme@lists.infradead.org Cc: Christoph Hellwig , Sagi Grimberg , Keith Busch , Jens Axboe , Chaitanya Kulkarni , Max Gurtovoy , Stephen Bates , Chaitanya Kulkarni , Logan Gunthorpe Date: Mon, 20 Apr 2020 10:46:55 -0600 Message-Id: <20200420164700.21620-5-logang@deltatee.com> X-Mailer: git-send-email 2.20.1 In-Reply-To: <20200420164700.21620-1-logang@deltatee.com> References: <20200420164700.21620-1-logang@deltatee.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-SA-Exim-Connect-IP: 172.16.1.31 X-SA-Exim-Rcpt-To: linux-kernel@vger.kernel.org, linux-nvme@lists.infradead.org, hch@lst.de, sagi@grimberg.me, kbusch@kernel.org, axboe@fb.com, maxg@mellanox.com, sbates@raithlin.com, Chaitanya.Kulkarni@wdc.com, chaitanya.kulkarni@wdc.com, logang@deltatee.com X-SA-Exim-Mail-From: gunthorp@deltatee.com X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on ale.deltatee.com X-Spam-Level: X-Spam-Status: No, score=-6.7 required=5.0 tests=ALL_TRUSTED,BAYES_00, MYRULES_NO_TEXT autolearn=no autolearn_force=no version=3.4.2 Subject: [PATCH v12 4/9] nvmet-passthru: Introduce NVMet passthru Kconfig option X-SA-Exim-Version: 4.2.1 (built Wed, 08 May 2019 21:11:16 +0000) X-SA-Exim-Scanned: Yes (on ale.deltatee.com) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Chaitanya Kulkarni This patch updates KConfig file for the NVMeOF target where we add new option so that user can selectively enable/disable passthru code. Signed-off-by: Chaitanya Kulkarni [logang@deltatee.com: fixed some of the wording in the help message] Signed-off-by: Logan Gunthorpe --- drivers/nvme/target/Kconfig | 12 ++++++++++++ 1 file changed, 12 insertions(+) diff --git a/drivers/nvme/target/Kconfig b/drivers/nvme/target/Kconfig index d7f48c0fb311..1ef775fa0048 100644 --- a/drivers/nvme/target/Kconfig +++ b/drivers/nvme/target/Kconfig @@ -15,6 +15,18 @@ config NVME_TARGET To configure the NVMe target you probably want to use the nvmetcli tool from http://git.infradead.org/users/hch/nvmetcli.git. +config NVME_TARGET_PASSTHRU + bool "NVMe Target Passthrough support" + depends on NVME_CORE + depends on NVME_TARGET + help + This enables target side NVMe passthru controller support for the + NVMe Over Fabrics protocol. It allows for hosts to manage and + directly access an actual NVMe controller residing on the target + side, incuding executing Vendor Unique Commands. + + If unsure, say N. + config NVME_TARGET_LOOP tristate "NVMe loopback device support" depends on NVME_TARGET -- 2.20.1