On 06/09/2010 12:21 AM, Tom Lyon wrote:
The VFIO "driver" is used to allow privileged AND non-privileged processes to implement user-level device drivers for any well-behaved PCI, PCI-X, and PCIe devices. Signed-off-by: Tom Lyon<pugs@xxxxxxxxx> --- This version now requires an IOMMU domain to be set before any access to device registers is granted (except that config space may be read). In addition, the VFIO_DMA_MAP_ANYWHERE is dropped - it used the dma_map_sg API which does not have sufficient controls around IOMMU usage. The IOMMU domain is obtained from the 'uiommu' driver which is included in this patch. Various locking, security, and documentation issues have also been fixed. Please commit - it or me! But seriously, who gets to commit this? Avi for KVM?
Definitely not me.
or GregKH for drivers?
I guess. -- error compiling committee.c: too many arguments to function -- To unsubscribe from this list: send the line "unsubscribe kvm" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html