[systemd-devel] PATCH: src/udev/ata_id/ata_id.c: WWN recognition fails on big-endian systems

2015-09-18 Thread Tom Lyon
--- a/src/udev/ata_id/ata_id.c +++ b/src/udev/ata_id/ata_id.c @@ -485,6 +485,10 @@ int main(int argc, char *argv[]) disk_identify_fixup_uint16(identify.byte, 90); /* time required for enhanced SECURITY ERASE UNIT */ disk_identify_fixup_uint16(identify.byte, 9

Re: BUG: virtio_mmio multi-queue competely broken -- virtio *registers* considered harmful

2013-05-02 Thread Tom Lyon
On 05/02/2013 04:37 AM, Pawel Moll wrote: Hi Tom, On Thu, 2013-05-02 at 04:40 +0100, Tom Lyon wrote: Virtiio_mmio attempts to mimic the layout of some control registers from virtio_pci. These registers, in particular VIRTIO_MMIO_QUEUE_SEL and VIRTIO_PCI_QUEUE_SEL, are active in nature, and

Re: BUG: virtio_mmio multi-queue competely broken -- virtio *registers* considered harmful

2013-05-02 Thread Tom Lyon
On 05/01/2013 10:25 PM, Michael S. Tsirkin wrote: On Wed, May 01, 2013 at 08:40:54PM -0700, Tom Lyon wrote: Virtiio_mmio attempts to mimic the layout of some control registers from virtio_pci. These registers, in particular VIRTIO_MMIO_QUEUE_SEL and VIRTIO_PCI_QUEUE_SEL, are active in nature

BUG: virtio_mmio multi-queue competely broken -- virtio *registers* considered harmful

2013-05-02 Thread Tom Lyon
Virtiio_mmio attempts to mimic the layout of some control registers from virtio_pci. These registers, in particular VIRTIO_MMIO_QUEUE_SEL and VIRTIO_PCI_QUEUE_SEL, are active in nature, and not just passive like a normal memory location. Thus, the host side must react immediately upon write of

Re: BUG: virtio_mmio multi-queue competely broken -- virtio *registers* considered harmful

2013-05-02 Thread Tom Lyon
On 05/02/2013 04:37 AM, Pawel Moll wrote: Hi Tom, On Thu, 2013-05-02 at 04:40 +0100, Tom Lyon wrote: Virtiio_mmio attempts to mimic the layout of some control registers from virtio_pci. These registers, in particular VIRTIO_MMIO_QUEUE_SEL and VIRTIO_PCI_QUEUE_SEL, are active in nature, and

Re: BUG: virtio_mmio multi-queue competely broken -- virtio *registers* considered harmful

2013-05-02 Thread Tom Lyon
On 05/01/2013 10:25 PM, Michael S. Tsirkin wrote: On Wed, May 01, 2013 at 08:40:54PM -0700, Tom Lyon wrote: Virtiio_mmio attempts to mimic the layout of some control registers from virtio_pci. These registers, in particular VIRTIO_MMIO_QUEUE_SEL and VIRTIO_PCI_QUEUE_SEL, are active in nature

BUG: virtio_mmio multi-queue competely broken -- virtio *registers* considered harmful

2013-05-01 Thread Tom Lyon
Virtiio_mmio attempts to mimic the layout of some control registers from virtio_pci. These registers, in particular VIRTIO_MMIO_QUEUE_SEL and VIRTIO_PCI_QUEUE_SEL, are active in nature, and not just passive like a normal memory location. Thus, the host side must react immediately upon write of

Re: [Qemu-devel] [PATCH] vfio: Fix free in dma mapping error path

2011-05-04 Thread Tom Lyon
On Friday, April 29, 2011 03:05:54 pm Alex Williamson wrote: > This is allocated via vmalloc, so needs vfree, not kfree. > > Signed-off-by: Alex Williamson > --- > > drivers/vfio/vfio_dma.c |2 +- > 1 files changed, 1 insertions(+), 1 deletions(-) > > diff --git a/drivers/vfio/vfio_dma.c b

Re: [Qemu-devel] [PATCH] vfio: Add an ioctl to reset the device

2011-04-19 Thread Tom Lyon
On Tuesday, April 19, 2011 01:32:59 pm Alex Williamson wrote: > When using VFIO to assign a device to a guest, we want to make sure > the device is quiesced on VM reset to stop all DMA within the guest > mapped memory. Add an ioctl which just calls pci_reset_function() > and returns whether it suc

Re: [ANNOUNCE] VFIO V6 & public VFIO repositories

2010-12-21 Thread Tom Lyon
> Cheers, > Ben. > > On Tue, 2010-12-21 at 16:29 +1100, Benjamin Herrenschmidt wrote: > > On Mon, 2010-11-22 at 15:21 -0800, Tom Lyon wrote: > > > VFIO "driver" development has moved to a publicly accessible > > > respository > > > > > >

change of email address: p...@cisco.com -> p...@ieee.org

2010-12-16 Thread Tom Lyon
eom -- To unsubscribe from this list: send the line "unsubscribe kvm" in the body of a message to majord...@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html

[ANNOUNCE] VFIO V6 & public VFIO repositories

2010-11-22 Thread Tom Lyon
VFIO "driver" development has moved to a publicly accessible respository on github: git://github.com/pugs/vfio-linux-2.6.git This is a clone of the Linux-2.6 tree with all VFIO changes on the vfio branch (which is the default). There is a tag 'vfio-v6' marking the latest "release" of VFI

Re: [PATCH] vfio: fix config virtualization, esp command byte

2010-11-16 Thread Tom Lyon
Applied. On Tuesday, November 16, 2010 10:57:27 am Alex Williamson wrote: > On Tue, 2010-11-16 at 10:54 -0700, Alex Williamson wrote: > > On Tue, 2010-11-09 at 17:09 -0800, Tom Lyon wrote: > > > Cleans up config space virtualization, especialy handling of bytes > > >

[PATCH] vfio: fix config virtualization, esp command byte

2010-11-09 Thread Tom Lyon
Cleans up config space virtualization, especialy handling of bytes which have some virtual and some real bits, like PCI_COMMAND. Alex, I hope you can test this with your setups. Signed-off-by: Tom Lyon --- drivers/vfio/vfio_pci_config.c | 166 +--- 1 files

Re: [PATCH 0/2] vfio: virtualize INTX_DISABLE

2010-11-09 Thread Tom Lyon
Alex - I am rejecting these 2 patches. For patch 1/2, I started with yours and found a couple of problems, but then I got into the spirit and did a buinch more cleaning up. My patch to follow. For patch 2/2, the INTX stuff, I don't really see the problem. If the user turns on the bit, it'll re

Re: [PATCH] vfio: Fix PCI 2.3 shared interrupt

2010-11-03 Thread Tom Lyon
Applied. On Wednesday, November 03, 2010 01:17:33 pm Alex Williamson wrote: > Trying to be too clever with setting the irq_disabled flag. PCI 2.3 > disabled devices can still share IRQs, which can lead to clearing > the irq_disabled flag, preventing the EOI from registering, and leaving > the dev

Re: [PATCH] vfio: Extended capability fixes

2010-11-02 Thread Tom Lyon
On Tuesday, November 02, 2010 12:11:08 pm Michael S. Tsirkin wrote: > On Mon, Nov 01, 2010 at 11:08:35PM -0600, Alex Williamson wrote: > > - Virtual channel position gets truncated as a u8 > > > > - Print the ecap that's unknown, not the last cap we saw > > - Print actual config offset, which pr

Re: [PATCH] vfio: Extended capability fixes

2010-11-02 Thread Tom Lyon
Applied. Thanks! On Monday, November 01, 2010 10:08:35 pm Alex Williamson wrote: > - Virtual channel position gets truncated as a u8 > - Print the ecap that's unknown, not the last cap we saw > - Print actual config offset, which provides enough info to make >some sense of the error. > > Si

Re: [PATCH 0/5] Fixes, non-PCI-2.3 support, EOI enhancements

2010-11-01 Thread Tom Lyon
I've applied all your patches. Thanks! On Saturday, October 30, 2010 09:58:55 am Alex Williamson wrote: > Hi Tom, > > I've updated some patches I've been working on to v5 and wanted to > see what you think. I also found a couple minor bugs, fixed in this > series. > > The main idea is that sinc

[PATCH 1/4] VFIO V5: export pci_user_{read,write}_config

2010-10-28 Thread Tom Lyon
Acked-by: Jesse Barnes Signed-off-by: Tom Lyon --- drivers/pci/access.c |6 -- drivers/pci/pci.h|7 --- include/linux/pci.h |8 3 files changed, 12 insertions(+), 9 deletions(-) diff --git a/drivers/pci/access.c b/drivers/pci/access.c index 531bc69

[PATCH 3/4] VFIO V5: uiommu driver - allow user progs to manipulate iommu domains

2010-10-28 Thread Tom Lyon
Signed-off-by: Tom Lyon --- drivers/Kconfig|2 + drivers/Makefile |1 + drivers/vfio/Kconfig |8 +++ drivers/vfio/Makefile |1 + drivers/vfio/uiommu.c | 126 include/linux/uiommu.h | 76

[PATCH 2/4] VFIO V5: additions to include/linux/pci_regs.h

2010-10-28 Thread Tom Lyon
Signed-off-by: Tom Lyon --- include/linux/pci_regs.h | 107 ++ 1 files changed, 98 insertions(+), 9 deletions(-) diff --git a/include/linux/pci_regs.h b/include/linux/pci_regs.h index 455b9cc..70addc9 100644 --- a/include/linux/pci_regs.h +++ b

[PATCH 0/4] VFIO V5: Non-privileged user level PCI drivers

2010-10-28 Thread Tom Lyon
written just to give user access to certain devices - but that will take time. Tom Lyon (4): VFIO V5: export pci_user_{read,write}_config VFIO V5: additions to include/linux/pci_regs.h VFIO V5: uiommu driver - allow user progs to manipulate iommu domains VFIO V5: Non-privileged user level

Re: [PATCH 3/3] VFIO V4: VFIO driver: Non-privileged user level PCI drivers

2010-10-15 Thread Tom Lyon
Michael & Alex et al - Sorry for going quiet; I've been digesting the comments and researching a lot more stuff. I plan to release V5 shortly after 2.6.36 is out, highlights will be: 1. Re-written pci config tables - using approach suggested by MST to clean things up. Looking much bet

Re: [PATCH 3/3] VFIO V4: VFIO driver: Non-privileged user level PCI drivers

2010-09-30 Thread Tom Lyon
On Monday, September 27, 2010 04:54:21 am Michael S. Tsirkin wrote: > On Wed, Sep 22, 2010 at 02:18:24PM -0700, Tom Lyon wrote: > > Signed-off-by: Tom Lyon > > Some comments on the pci bits: > > After going over them for the Nth time - something needs to be done > with t

[PATCH 2/3] VFIO V4: uiommu driver - allow user progs to manipulate iommu domains

2010-09-22 Thread Tom Lyon
Signed-off-by: Tom Lyon --- drivers/Kconfig|2 + drivers/Makefile |1 + drivers/vfio/Kconfig |8 +++ drivers/vfio/Makefile |1 + drivers/vfio/uiommu.c | 126 include/linux/uiommu.h | 76

[PATCH 1/3] VFIO V4: export pci_user_{read,write}_config

2010-09-22 Thread Tom Lyon
Signed-off-by: Tom Lyon --- drivers/pci/access.c |6 -- drivers/pci/pci.h|7 --- include/linux/pci.h |8 3 files changed, 12 insertions(+), 9 deletions(-) diff --git a/drivers/pci/access.c b/drivers/pci/access.c index 531bc69..96ed449 100644 --- a/drivers/pci

[PATCH 0/3] VFIO V4: VFIO driver: Non-privileged user level PCI drivers

2010-09-22 Thread Tom Lyon
ten just to give user access to certain devices - but that will take time. Tom Lyon (3): VFIO V4: export pci_user_{read,write}_config VFIO V4: uiommu driver - allow user progs to manipulate iommu domains VFIO V4: VFIO driver: Non-privileged user level PCI drivers Documentati

Re: [PATCH V3] VFIO driver: Non-privileged user level PCI drivers

2010-07-28 Thread Tom Lyon
On Tuesday, July 27, 2010 04:53:22 pm Michael S. Tsirkin wrote: > On Tue, Jul 27, 2010 at 03:13:14PM -0700, Tom Lyon wrote: > > [ Sorry for the long hiatus, I've been wrapped up in other issues.] > > > > I think the fundamental issue to resolve is to decide on the model

Re: [PATCH V3] VFIO driver: Non-privileged user level PCI drivers

2010-07-27 Thread Tom Lyon
[ Sorry for the long hiatus, I've been wrapped up in other issues.] I think the fundamental issue to resolve is to decide on the model which the VFIO driver presents to its users. Fundamentally, VFIO as part of the OS must protect the system from its users and also protect the users from each o

[PATCH V3] 2.6.34: simple IOMMU API extension to check safe interrupt remapping

2010-07-02 Thread Tom Lyon
This patch allows IOMMU users to determine whether the hardware and software support safe, isolated interrupt remapping. Not all Intel IOMMUs have the hardware, and the software for AMD is not there yet. Signed-off-by: Tom Lyon --- Version 3: shorter name requested by Joerg. Version 2

Re: [PATCH V2] 2.6.34: simple IOMMU API extension to check safe interrupt remapping

2010-07-02 Thread Tom Lyon
On Friday 02 July 2010 02:26:46 am Roedel, Joerg wrote: > On Thu, Jul 01, 2010 at 05:24:32PM -0400, Tom Lyon wrote: > > This patch allows IOMMU users to determine whether the hardware and software > > support safe, isolated interrupt remapping. Not all Intel IOMMUs have the > &

[PATCH V2] 2.6.34: simple IOMMU API extension to check safe interrupt remapping

2010-07-01 Thread Tom Lyon
This patch allows IOMMU users to determine whether the hardware and software support safe, isolated interrupt remapping. Not all Intel IOMMUs have the hardware, and the software for AMD is not there yet. Signed-off-by: Tom Lyon --- Version 2: previous ifdefs not needed. MST has

Re: [PATCH V2] VFIO driver: Non-privileged user level PCI drivers

2010-07-01 Thread Tom Lyon
On Thursday 01 July 2010 08:48:41 am Alex Williamson wrote: > On Thu, 2010-07-01 at 18:31 +0300, Michael S. Tsirkin wrote: > > On Thu, Jul 01, 2010 at 09:29:04AM -0600, Alex Williamson wrote: > > > On Tue, 2010-06-08 at 14:21 -0700, Tom Lyon wrote: > > > > +The VFIO

Re: [PATCH V2] VFIO driver: Non-privileged user level PCI drivers

2010-06-30 Thread Tom Lyon
On Wednesday 30 June 2010 09:16:23 pm Alex Williamson wrote: > On Tue, 2010-06-08 at 14:21 -0700, Tom Lyon wrote: > > +int vfio_dma_unmap_dm(struct vfio_listener *listener, struct vfio_dma_map > > *dmp) > > +{ > > + unsigned long start, npage; > > + struct

[PATCH] 2.6.34: simple IOMMU API extension to check safe interrupt remapping

2010-06-30 Thread Tom Lyon
This patch allows IOMMU users to determine whether the hardware and software support safe, isolated interrupt remapping. Not all Intel IOMMUs have the hardware, and the software for AMD is not there yet. Signed-off-by: Tom Lyon --- MST has convinced me that any user level driver for PCI

Re: [PATCH V2] VFIO driver: Non-privileged user level PCI drivers

2010-06-30 Thread Tom Lyon
On Wednesday 30 June 2010 03:32:56 pm Michael S. Tsirkin wrote: > On Wed, Jun 30, 2010 at 03:17:55PM -0700, Tom Lyon wrote: > > Thanks, Alex! > > Am incorporating... > > I get it there's no chance you'll drop the "virtualization" > from the driver then?

Re: [PATCH V2] VFIO driver: Non-privileged user level PCI drivers

2010-06-30 Thread Tom Lyon
Thanks, Alex! Am incorporating... On Tuesday 29 June 2010 11:14:12 pm Alex Williamson wrote: > On Tue, 2010-06-08 at 14:21 -0700, Tom Lyon wrote: > > The VFIO "driver" is used to allow privileged AND non-privileged processes > > to > > implement user-level devi

Re: [PATCH V2] VFIO driver: Non-privileged user level PCI drivers

2010-06-17 Thread Tom Lyon
On Sunday 13 June 2010 03:23:39 am Michael S. Tsirkin wrote: > On Fri, Jun 11, 2010 at 03:15:53PM -0700, Tom Lyon wrote: > > [ bunch of stuff about MSI-X checking and IOMMUs and config registers...] > > > > OK, here's the thing. The IOMMU API today does not do sq

Re: [PATCH V2] VFIO driver: Non-privileged user level PCI drivers

2010-06-11 Thread Tom Lyon
The inline comments are getting pretty hard to wade through, so I'm deleting some of the lesser stuff - but I am incorporating into the code. On Tuesday 08 June 2010 10:45:57 pm Michael S. Tsirkin wrote: > On Tue, Jun 08, 2010 at 04:54:43PM -0700, Tom Lyon wrote: > > On Tuesday 0

Re: [PATCH V2] VFIO driver: Non-privileged user level PCI drivers

2010-06-10 Thread Tom Lyon
On Thursday 10 June 2010 10:27:36 am Konrad Rzeszutek Wilk wrote: > > +EXPORT_SYMBOL(uiommu_fdget); > > EXPORT_SYMBOL_GPL > .. snip > > +EXPORT_SYMBOL(uiommu_put); > > ditto. > Is there a definitive explanation somewhere of when to use each? -- To unsubscribe from this list: send the line "unsu

Re: [PATCH V2] VFIO driver: Non-privileged user level PCI drivers

2010-06-08 Thread Tom Lyon
On Tuesday 08 June 2010 03:38:44 pm Michael S. Tsirkin wrote: > On Tue, Jun 08, 2010 at 02:21:52PM -0700, Tom Lyon wrote: > > The VFIO "driver" is used to allow privileged AND non-privileged processes > > to > > implement user-level device drivers for any well-be

Re: [PATCH] VFIO driver: Non-privileged user level PCI drivers

2010-06-07 Thread Tom Lyon
On Sunday 06 June 2010 02:54:51 am Michael S. Tsirkin wrote: > On Thu, Jun 03, 2010 at 02:41:38PM -0700, Tom Lyon wrote: > > OK, in the interest of making progress, I am about to embark on the > > following: > > > > 1. Create a user-iommu-domain driver - openi

Re: [PATCH] VFIO driver: Non-privileged user level PCI drivers

2010-06-03 Thread Tom Lyon
OK, in the interest of making progress, I am about to embark on the following: 1. Create a user-iommu-domain driver - opening it will give a new empty domain. Ultimately this can also populate sysfs with the state of its world, which would also be a good addition to the base iommu stuff.

Re: [PATCH] VFIO driver: Non-privileged user level PCI drivers

2010-06-02 Thread Tom Lyon
On Wednesday 02 June 2010 10:46:15 am Chris Wright wrote: > * Joerg Roedel (j...@8bytes.org) wrote: > > On Wed, Jun 02, 2010 at 02:21:00PM +0300, Michael S. Tsirkin wrote: > > > On Wed, Jun 02, 2010 at 01:12:25PM +0200, Joerg Roedel wrote: > > > > > > Even if it is bound to a domain the userspace

Re: [PATCH] VFIO driver: Non-privileged user level PCI drivers

2010-06-01 Thread Tom Lyon
On Tuesday 01 June 2010 09:29:47 pm Alex Williamson wrote: > On Tue, 2010-06-01 at 13:28 +0300, Avi Kivity wrote: > > On 06/01/2010 12:55 PM, Michael S. Tsirkin wrote: > > > > > >> It can't program the iommu. > > >> What > > >> the patch proposes is that userspace tells vfio about the needed > >

Re: [PATCH] VFIO driver: Non-privileged user level PCI drivers

2010-06-01 Thread Tom Lyon
On Monday 31 May 2010 10:17:35 am Alan Cox wrote: > > Does look like it needs a locking audit, some memory and error checks > reviewing and some further review of the ioctl security and > overflows/trusted values. Yes. Thanks for the detailed look. > > Rather a nice way of attacking the user spac

Re: [PATCH] VFIO driver: Non-privileged user level PCI drivers

2010-06-01 Thread Tom Lyon
On Tuesday 01 June 2010 03:46:51 am Michael S. Tsirkin wrote: > On Tue, Jun 01, 2010 at 01:28:48PM +0300, Avi Kivity wrote: > > On 06/01/2010 12:55 PM, Michael S. Tsirkin wrote: > >> > >>> It can't program the iommu. > >>> What > >>> the patch proposes is that userspace tells vfio about the neede

Re: [PATCH V3] drivers/uio/uio_pci_generic.c: allow access for non-privileged processes

2010-04-30 Thread Tom Lyon
and effectively the same iommu handling - but see my inline comments below. On Wednesday 21 April 2010 02:38:49 am Michael S. Tsirkin wrote: > On Mon, Apr 19, 2010 at 03:05:35PM -0700, Tom Lyon wrote: > > > > These are changes to uio_pci_generic.c to allow better use of the dr

[PATCH V3] drivers/uio/uio_pci_generic.c: allow access for non-privileged processes

2010-04-19 Thread Tom Lyon
, but not IRQ. Signed-off-by: Tom Lyon --- checkpatch.pl is happy with this one. --- linux-2.6.33/drivers/uio/uio_pci_generic.c 2010-02-24 10:52:17.0 -0800 +++ mylinux-2.6.33/drivers/uio/uio_pci_generic.c2010-04-19 14:57:21.0 -0700 @@ -14,9 +14,10 @@ * # ls -l

Re: [PATCH V2] drivers/uio/uio.c: DMA mapping, interrupt extensions, etc.

2010-04-17 Thread Tom Lyon
The current uio and uio_pci_generic allow multiple opens; I was just preserving that behavior. On Saturday 17 April 2010 03:43:09 am Joerg Roedel wrote: > On Thu, Apr 15, 2010 at 01:55:29PM -0700, Tom Lyon wrote: > > > + down(&idev->gate); > > +

[PATCH V2] drivers/uio/uio.c: DMA mapping, interrupt extensions, etc.

2010-04-15 Thread Tom Lyon
This is the second of 2 related, but independent, patches. This is for uio.c, the previous is for uio_pci_generic.c. The 2 patches were previously one large patch. Changes for this version: - uio_pci_generic.c just gets extensions so that a single fd can be used by non-privileged processes for

[PATCH V2] drivers/uio/uio_pci_generic.c: allow access for non-privileged processes

2010-04-15 Thread Tom Lyon
This is the firt of 2 related, but independent, patches. This is for uio_pci_generic.c, the next is for uio.c. The 2 patches were previously one large patch. Changes for this version: - uio_pci_generic.c just gets extensions so that a single fd can be used by non-privileged processes for interr

Re: [PATCH 1/1] uio_pci_generic: extensions to allow access for non-privileged processes

2010-04-09 Thread Tom Lyon
Mea culpa. On Friday 09 April 2010 02:08:55 am Joerg Roedel wrote: > Btw. This patch posting is broken. It suffers from line-wraps which make > it impossible to apply as-is. I was able to fix it but please consider > this in your next posting. > > On Wed, Mar 31, 2010 at 05:12:

Re: [PATCH 0/1] uio_pci_generic: extensions to allow access for non-privileged processes

2010-04-09 Thread Tom Lyon
On Friday 09 April 2010 02:58:19 am Avi Kivity wrote: > On 04/02/2010 08:05 PM, Greg KH wrote: > > > >> Currently kvm does device assignment with its own code, I'd like to unify > >> it with uio, not split it off. > >> > >> Separate notifications for msi-x interrupts are just as useful for uio as >

Re: [PATCH 0/1] uio_pci_generic: extensions to allow access for non-privileged processes

2010-04-01 Thread Tom Lyon
On Thursday 01 April 2010 08:54:14 am Avi Kivity wrote: > On 04/01/2010 06:39 PM, Tom Lyon wrote: > >>> - support for MSI and MSI-X interrupts (the intel 82599 VFs support > >>> only MSI-X) > >> > >> How does a userspace program receive those interrupts

Re: [PATCH 0/1] uio_pci_generic: extensions to allow access for non-privileged processes

2010-04-01 Thread Tom Lyon
On Thursday 01 April 2010 09:10:57 am Avi Kivity wrote: > On 04/01/2010 07:06 PM, Tom Lyon wrote: > > On Thursday 01 April 2010 08:54:14 am Avi Kivity wrote: > >> On 04/01/2010 06:39 PM, Tom Lyon wrote: > >>>>> - support for MSI and MSI-X interrupts (the intel

Re: [PATCH 0/1] uio_pci_generic: extensions to allow access for non-privileged processes

2010-04-01 Thread Tom Lyon
On Thursday 01 April 2010 09:07:47 am Joerg Roedel wrote: > On Thu, Apr 01, 2010 at 08:40:34AM -0700, Tom Lyon wrote: > > On Thursday 01 April 2010 05:52:18 am Joerg Roedel wrote: > > > > The point of this patch is to beef up the uio_pci_generic driver so > > > > t

Re: [PATCH 0/1] uio_pci_generic: extensions to allow access for non-privileged processes

2010-04-01 Thread Tom Lyon
On Thursday 01 April 2010 08:54:14 am Avi Kivity wrote: > On 04/01/2010 06:39 PM, Tom Lyon wrote: > >>> - support for MSI and MSI-X interrupts (the intel 82599 VFs support > >>> only MSI-X) > >> > >> How does a userspace program receive those interrupts

Re: [PATCH 0/1] uio_pci_generic: extensions to allow access for non-privileged processes

2010-04-01 Thread Tom Lyon
On Thursday 01 April 2010 07:25:04 am Michael S. Tsirkin wrote: > On Wed, Mar 31, 2010 at 05:08:38PM -0700, Tom Lyon wrote: > > uio_pci_generic has previously been discussed on the KVM list, but this > > patch has nothing to do with KVM, so it is also going to LKML. > > > &

Re: [PATCH 0/1] uio_pci_generic: extensions to allow access for non-privileged processes

2010-04-01 Thread Tom Lyon
On Thursday 01 April 2010 05:52:18 am Joerg Roedel wrote: > On Wed, Mar 31, 2010 at 05:08:38PM -0700, Tom Lyon wrote: > > uio_pci_generic has previously been discussed on the KVM list, but this > > patch has nothing to do with KVM, so it is also going to LKML. > > But since y

Re: [PATCH 0/1] uio_pci_generic: extensions to allow access for non-privileged processes

2010-04-01 Thread Tom Lyon
On Thursday 01 April 2010 02:09:09 am Avi Kivity wrote: > On 04/01/2010 03:08 AM, Tom Lyon wrote: > > uio_pci_generic has previously been discussed on the KVM list, but this > > patch has nothing to do with KVM, so it is also going to LKML. > > (needs to go to lkml e

[PATCH 1/1] uio_pci_generic: extensions to allow access for non-privileged processes

2010-03-31 Thread Tom Lyon
O driver for PCI 2.3 and PCIe devices + * + * Copyright (C) 2010 Cisco Systems, Inc. + * Extensions by Tom Lyon * * Copyright (C) 2009 Red Hat, Inc. * Author: Michael S. Tsirkin @@ -14,25 +17,35 @@ * # ls -l /sys/bus/pci/devices/:00:19.0/driver * .../:00:19.0/driver -&g

[PATCH 0/1] uio_pci_generic: extensions to allow access for non-privileged processes

2010-03-31 Thread Tom Lyon
uio_pci_generic has previously been discussed on the KVM list, but this patch has nothing to do with KVM, so it is also going to LKML. The point of this patch is to beef up the uio_pci_generic driver so that a non-privileged user process can run a user level driver for most PCIe devices. This c

Re: [BAWUG] T-Mobile (the cellular company)

2002-07-22 Thread Tom Lyon
T-Mobile aka VoiceStream is "sharing" the Cingular network, so coverage will be the same. At 07:29 PM 7/22/2002 -0700, Matt Peterson wrote: >T-Mobile (Deutsche Telekom) has made its west coast attack on Market St >in San Francisco recently. I briefly poked into the shop (previously a >computer s

Re: [BAWUG] Verizon CDPD?

2002-07-22 Thread Tom Lyon
The Verizon Express Network is not CDPD, it's CDMA 1xRTT. I've used it for a few months now, and I really get the 40-60K throughput everywhere in the country - EXCEPT the Bay Area (Aaarrrgh). I usually get 10-20K around here. At 01:08 PM 7/22/2002 -0700, Dave Hartzell wrote: >Hello- > >I was won

[e-smith-devinfo] 3ware naked boot: BUG

2001-08-14 Thread Tom Lyon
Hi, I've just been through the process of booting e-smith on a small DELL server with a 3ware 6200 controller with mirrored drives. It has been painful. The server was totally clean, no OS, no IDE drives. e-smith seems to really want to see /dev/hda since there were several timeout/error message