Re: [PATCH V2] VFIO driver: Non-privileged user level PCI drivers

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Tue, 08 Jun 2010 14:21:52 -0700 Tom Lyon wrote:

one missing piece (again):

 Documentation/ioctl/ioctl-number.txt |    1 
 Documentation/vfio.txt               |  177 +++++++
 MAINTAINERS                          |    7 
 drivers/Kconfig                      |    2 
 drivers/Makefile                     |    1 
 drivers/vfio/Kconfig                 |   18 
 drivers/vfio/Makefile                |    6 
 drivers/vfio/uiommu.c                |  126 +++++
 drivers/vfio/vfio_dma.c              |  324 ++++++++++++
 drivers/vfio/vfio_intrs.c            |  191 +++++++
 drivers/vfio/vfio_main.c             |  624 +++++++++++++++++++++++++
 drivers/vfio/vfio_pci_config.c       |  554 ++++++++++++++++++++++
 drivers/vfio/vfio_rdwr.c             |  147 +++++
 drivers/vfio/vfio_sysfs.c            |  153 ++++++
 include/linux/uiommu.h               |   62 ++
 include/linux/vfio.h                 |  200 ++++++++
 16 files changed, 2593 insertions(+)


> diff -uprN linux-2.6.34/drivers/vfio/Kconfig vfio-linux-2.6.34/drivers/vfio/Kconfig
> --- linux-2.6.34/drivers/vfio/Kconfig	1969-12-31 16:00:00.000000000 -0800
> +++ vfio-linux-2.6.34/drivers/vfio/Kconfig	2010-06-07 15:28:14.000000000 -0700
> @@ -0,0 +1,18 @@
> +menuconfig VFIO
> +	tristate "Non-Priv User Space PCI drivers"

	          Non-privileged
(again)

> +	depends on UIOMMU && PCI && IOMMU_API
> +	help
> +	  Driver to allow advanced user space drivers for PCI, PCI-X,
> +	  and PCIe devices.  Requires IOMMU to allow non-privilged

	                                             non-privileged
(again)  :(

> +	  processes to directly control the PCI devices.
> +
> +	  If you don't know what to do here, say N.
> +
> +menuconfig UIOMMU
> +	tristate "User level manipulation of IOMMU"
> +	help
> +	  Device driver to allow user level programs to
> +	  manipulate IOMMU domains

	                   domains.

> +
> +	  If you don't know what to do here, say N.
> +


---
~Randy
*** Remember to use Documentation/SubmitChecklist when testing your code ***
--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html


[Index of Archives]     [KVM ARM]     [KVM ia64]     [KVM ppc]     [Virtualization Tools]     [Spice Development]     [Libvirt]     [Libvirt Users]     [Linux USB Devel]     [Linux Audio Users]     [Yosemite Questions]     [Linux Kernel]     [Linux SCSI]     [XFree86]
  Powered by Linux