Received: by 2002:a25:868d:0:0:0:0:0 with SMTP id z13csp1498679ybk; Thu, 14 May 2020 10:25:15 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzQ//UI4wNlwx7UM9KrM6xe6SwDee/90KLOm7wjvXigRiuqSAeux3rR05Asx90v0bl+EvT/ X-Received: by 2002:a05:6402:1adc:: with SMTP id ba28mr5019704edb.336.1589477114997; Thu, 14 May 2020 10:25:14 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1589477114; cv=none; d=google.com; s=arc-20160816; b=iQn1NoOlcZpFtvzON7zZBowaCZxUIxT2+1qLvQoHiMVN1q4g03aXjdMiRw2+yJhM63 SfbOykQi/0zxBBnI7Ng3atd1xdRbNISb5ltC1tEE6jetCysIGXwG7dqabvB+tk3FIFct WEVXb6nwZJWWXB2mv6iMEKnbzgtTUQgVa5nL7thfwxoZpejFBPZNl50Ck3Yl9JzSW9mg HSpCaoJ+DPNSyozkLiXU17Z57ck7vk1OQ9pEeb5iEh8eWxGrxuSWOvyJawbKHhwrKoGR wuLGjFXhuwuiUqDZtL9tFN6QDsiUS4JnkfxaZ2EMRyw1GjVdVz4GeoRmngB67bm6YHCa iG1w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:subject:content-transfer-encoding :mime-version:references:in-reply-to:message-id:date:cc:to:from; bh=3rWSmh9rPg8i5kemHABy0qT0x9ZOfwgg5YoODOhzS/Y=; b=hiqLtb3nf5aUMMbT+nznedrvturMI749dMSpFVTFa5uKZTWIcEWE3ImQgqTP9sYCpB DEpxCySznNPvp6f+gijzigEzJbxGPEI4VzJpLVuANU+xS8NkuMrtebpEXzaIPwoW096b PJKGG9MWXuG09WE+bidc4uG21U0PJ6mLMgcBwj0dTX/4cltrjxLmwCDIDDViNPRHiZpN F1kDuXEuqOc/UEtIzGoqj7grAkJNhJj4rUixw3oycBvpNTstS1Sy81FZiRBe2kfeHPXs +ENk9Ns6sEfmaO2ZQWAOEiaSo10g5wkp/KwNEcnOjExLG5F6NJ/CbFVZ9F8RbFPKsJoH JR/Q== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id j23si2226530eja.168.2020.05.14.10.24.51; Thu, 14 May 2020 10:25:14 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726090AbgENRXV (ORCPT + 99 others); Thu, 14 May 2020 13:23:21 -0400 Received: from ale.deltatee.com ([207.54.116.67]:46940 "EHLO ale.deltatee.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726165AbgENRXN (ORCPT ); Thu, 14 May 2020 13:23:13 -0400 Received: from cgy1-donard.priv.deltatee.com ([172.16.1.31]) by ale.deltatee.com with esmtps (TLS1.3:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.92) (envelope-from ) id 1jZHZV-00021q-U6; Thu, 14 May 2020 11:23:12 -0600 Received: from gunthorp by cgy1-donard.priv.deltatee.com with local (Exim 4.92) (envelope-from ) id 1jZHZU-0001h0-Ip; Thu, 14 May 2020 11:23:00 -0600 From: Logan Gunthorpe To: linux-kernel@vger.kernel.org, linux-nvme@lists.infradead.org Cc: Christoph Hellwig , Sagi Grimberg , Keith Busch , Jens Axboe , Chaitanya Kulkarni , Max Gurtovoy , Stephen Bates , Chaitanya Kulkarni , Logan Gunthorpe Date: Thu, 14 May 2020 11:22:48 -0600 Message-Id: <20200514172253.6445-5-logang@deltatee.com> X-Mailer: git-send-email 2.20.1 In-Reply-To: <20200514172253.6445-1-logang@deltatee.com> References: <20200514172253.6445-1-logang@deltatee.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-SA-Exim-Connect-IP: 172.16.1.31 X-SA-Exim-Rcpt-To: linux-kernel@vger.kernel.org, linux-nvme@lists.infradead.org, hch@lst.de, sagi@grimberg.me, kbusch@kernel.org, axboe@fb.com, maxg@mellanox.com, sbates@raithlin.com, Chaitanya.Kulkarni@wdc.com, chaitanya.kulkarni@wdc.com, logang@deltatee.com X-SA-Exim-Mail-From: gunthorp@deltatee.com X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on ale.deltatee.com X-Spam-Level: X-Spam-Status: No, score=-6.7 required=5.0 tests=ALL_TRUSTED,BAYES_00, MYRULES_NO_TEXT,URIBL_BLOCKED autolearn=no autolearn_force=no version=3.4.2 Subject: [PATCH v13 4/9] nvmet-passthru: Introduce NVMet passthru Kconfig option X-SA-Exim-Version: 4.2.1 (built Wed, 08 May 2019 21:11:16 +0000) X-SA-Exim-Scanned: Yes (on ale.deltatee.com) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Chaitanya Kulkarni This patch updates KConfig file for the NVMeOF target where we add new option so that user can selectively enable/disable passthru code. Signed-off-by: Chaitanya Kulkarni [logang@deltatee.com: fixed some of the wording in the help message] Signed-off-by: Logan Gunthorpe Reviewed-by: Sagi Grimberg --- drivers/nvme/target/Kconfig | 12 ++++++++++++ 1 file changed, 12 insertions(+) diff --git a/drivers/nvme/target/Kconfig b/drivers/nvme/target/Kconfig index d7f48c0fb311..1ef775fa0048 100644 --- a/drivers/nvme/target/Kconfig +++ b/drivers/nvme/target/Kconfig @@ -15,6 +15,18 @@ config NVME_TARGET To configure the NVMe target you probably want to use the nvmetcli tool from http://git.infradead.org/users/hch/nvmetcli.git. +config NVME_TARGET_PASSTHRU + bool "NVMe Target Passthrough support" + depends on NVME_CORE + depends on NVME_TARGET + help + This enables target side NVMe passthru controller support for the + NVMe Over Fabrics protocol. It allows for hosts to manage and + directly access an actual NVMe controller residing on the target + side, incuding executing Vendor Unique Commands. + + If unsure, say N. + config NVME_TARGET_LOOP tristate "NVMe loopback device support" depends on NVME_TARGET -- 2.20.1