[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] [RFC PATCH] blkif.h: document scsi/0x12/0x83 node



On 22/03/16 14:10, Konrad Rzeszutek Wilk wrote:
> On Tue, Mar 22, 2016 at 01:41:43PM +0000, David Vrabel wrote:
>> On 22/03/16 12:55, Bob Liu wrote:
>>>
>>> On 03/17/2016 07:12 PM, Ian Jackson wrote:
>>>> David Vrabel writes ("Re: [Xen-devel] [RFC PATCH] blkif.h: document 
>>>> scsi/0x12/0x83 node"):
>>>>> On 16/03/16 13:59, Bob Liu wrote:
>>>>>> But we'd like to get the VPD information(of underlying storage device) 
>>>>>> also in Linux blkfront, even blkfront is not a SCSI device.
>>>>>
>>>>> Why does blkback/blkfront need to involved here?  This is just some
>>>>> xenstore keys that can be written by the toolstack and directly read by
>>>>> the relevant application in the guest.
>>>>
>>>
>>> They want a more generic way because the application may run on all kinds 
>>> of environment including baremetal.
>>> So they prefers to just call ioctl(SG_IO) against a storage device.
>>>
>>>> I'm getting rather a different picture here than at first.  Previously
>>>> I thought you had some 3rd-party application, not under your control,
>>>> which expected to see this VPD data.
>>>>
>>>> But now I think that you're saying the application is under your own
>>>> control.  I don't understand why synthetic VPD data is the best way to
>>>> give your application the information it needs.
>>>>
>>>> What is the application doing with this VPD data ?  I mean,
>>>> which specific application functions, and how do they depend on the
>>>> VPD data ?
>>>>
>>>
>>> From the feedbacks I just got, they do *not* want the details to be in 
>>> public.
>>
>> It is difficult to suggest how it should be done correctly without this
>> information.
> 
> Just think of it as a black box.

This isn't sufficient.

You are presenting a solution but have not properly described the
problem so no one can evaluate whether the solution is appropriate.

>> I also find it difficult to see a use case where running the storage
>> software in the guest (instead of in the backend) is sensible or desirable.
> 
> Are you suggesting that doing backend drivers is not sensible?

I do not understand your question.

>>> Anyway, I think this is not a block of this patch.
>>> In Windows PV block driver, we already use the same way to get the raw 
>>> INQUIRY data.
>>>  * The Windows PV block driver accepts ioctl(SG_IO).
>>>  * Then it reads this /scsi/0x12/0x83 node.
>>>  * Then return the raw INQURIY data back to ioctl.
>>>
>>> Since Linux guest also wants to do the same thing, let's making this 
>>> mechanism to be a generic interface!
>>> I'll post a patch adding ioctl(SG_IO) support to xen-blkfront together with 
>>> a updated version of this patch soon.
>>
>> I do not think this feature is generally useful outside of this
>> unspecified use case.  I do not think that supplying details about
>> underlying storage device (beyond generic properties) to guests is
>> sensible (e.g., what if the guest snapshot is restored on different
>> storage?).
> 
> The restore process (xl) can update the XenStore key with the new storage.

And how is this going to be communicated to the application using the data?

>> And thus I do not not think we should either: a) make this part of the
>> blkif ABI; or b) add support to xen-blkfront or xen-blkback.
> 
> It is already coded in Windows PV drivers so I am not following why
> codyfing this in the blkif.h is harmful?

My understanding was that this was a legacy hack that should be removed
(we do not currently make use of it).

David

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel

 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.