modify files in running vm

2010-06-30 Thread Vasiliy G Tolstov
Hello. I'm have two questions: 1) Is that possible to modify some files in already running virtual machine without login to it via ssh or something else? 2) If i create with qemu-img base qcow2 image install to it operation system with minimal packages. After that i create use image with -o

Re: [PATCH] device-assignment: Rework name of assigned pci device

2010-06-30 Thread Markus Armbruster
Summary: upstream qemu commit b560a9ab broke -pcidevice and pci_add host in two ways: * Use without options id and name is broken when option host contains ':'. That's because id defaults to host. I recommend to fix it incompatibly: don't default id to host. The alternative is to get

about page fault handler

2010-06-30 Thread jerry wu
i want to get details process about kvm handler page fault.help wanted.

[PATCH v3 1/11] KVM: MMU: fix writable sync sp mapping

2010-06-30 Thread Xiao Guangrong
While we sync many unsync sp at one time(in mmu_sync_children()), we may mapping the spte writable, it's dangerous, if one unsync sp's mapping gfn is another unsync page's gfn. For example: SP1.pte[0] = P SP2.gfn's pfn = P [SP1.pte[0] = SP2.gfn's pfn] First, we write protected SP1 and SP2, but

[PATCH v3 2/11] KVM: MMU: fix conflict access permissions in direct sp

2010-06-30 Thread Xiao Guangrong
In no-direct mapping, we mark sp is 'direct' when we mapping the guest's larger page, but its access is encoded form upper page-struct entire not include the last mapping, it will cause access conflict. For example, have this mapping: [W] / PDE1 - |---| P[W] | | LPA

[PATCH v3 3/11] KVM: MMU: fix direct sp's access corruptted

2010-06-30 Thread Xiao Guangrong
If the mapping is writable but the dirty flag is not set, we will find the read-only direct sp and setup the mapping, then if the write #PF occur, we will mark this mapping writable in the read-only direct sp, now, other real read-only mapping will happily write it without #PF. It may hurt

[PATCH v3 4/11] KVM: MMU: fix forgot to flush all vcpu's tlb

2010-06-30 Thread Xiao Guangrong
After remove a rmap, we should flush all vcpu's tlb Signed-off-by: Xiao Guangrong xiaoguangr...@cn.fujitsu.com --- arch/x86/kvm/mmu.c |2 ++ 1 files changed, 2 insertions(+), 0 deletions(-) diff --git a/arch/x86/kvm/mmu.c b/arch/x86/kvm/mmu.c index 24290f8..a0c5c31 100644 ---

[PATCH v3 5/11] KVM: MMU: cleanup FNAME(fetch)() functions

2010-06-30 Thread Xiao Guangrong
Cleanup this function that we are already get the direct sp's access Signed-off-by: Xiao Guangrong xiaoguangr...@cn.fujitsu.com --- arch/x86/kvm/paging_tmpl.h | 19 --- 1 files changed, 8 insertions(+), 11 deletions(-) diff --git a/arch/x86/kvm/paging_tmpl.h

[PATCH v3 6/11] KVM: MMU: introduce gfn_to_pfn_atomic() function

2010-06-30 Thread Xiao Guangrong
Introduce gfn_to_pfn_atomic(), it's the fast path and can used in atomic context, the later patch will use it Signed-off-by: Xiao Guangrong xiaoguangr...@cn.fujitsu.com --- arch/x86/mm/gup.c|2 ++ include/linux/kvm_host.h |1 + virt/kvm/kvm_main.c | 32

[PATCH v3 7/11] KVM: MMU: introduce gfn_to_hva_many() function

2010-06-30 Thread Xiao Guangrong
This function not only return the gfn's hva but also the page number after @gfn in the slot It's used in the later patch Signed-off-by: Xiao Guangrong xiaoguangr...@cn.fujitsu.com --- include/linux/kvm_host.h |1 + virt/kvm/kvm_main.c | 13 - 2 files changed, 13

[PATCH v3 8/11] KVM: MMU: introduce pte_prefetch_topup_memory_cache()

2010-06-30 Thread Xiao Guangrong
Introduce this function to topup prefetch cache Signed-off-by: Xiao Guangrong xiaoguangr...@cn.fujitsu.com --- arch/x86/kvm/mmu.c | 25 + 1 files changed, 21 insertions(+), 4 deletions(-) diff --git a/arch/x86/kvm/mmu.c b/arch/x86/kvm/mmu.c index a0c5c31..6673484

[PATCH v3 9/11] KVM: MMU: prefetch ptes when intercepted guest #PF

2010-06-30 Thread Xiao Guangrong
Support prefetch ptes when intercept guest #PF, avoid to #PF by later access If we meet any failure in the prefetch path, we will exit it and not try other ptes to avoid become heavy path Note: this speculative will mark page become dirty but it not really accessed, the same issue is in other

[PATCH 10/11] KVM: MMU: combine guest pte read between walk and pte prefetch

2010-06-30 Thread Xiao Guangrong
Combine guest pte read between guest pte walk and pte prefetch Signed-off-by: Xiao Guangrong xiaoguangr...@cn.fujitsu.com --- arch/x86/kvm/paging_tmpl.h | 48 ++- 1 files changed, 33 insertions(+), 15 deletions(-) diff --git a/arch/x86/kvm/paging_tmpl.h

[PATCH v3 11/11] KVM: MMU: trace pte prefetch

2010-06-30 Thread Xiao Guangrong
Trace pte prefetch, it can help us to improve the prefetch's performance Signed-off-by: Xiao Guangrong xiaoguangr...@cn.fujitsu.com --- arch/x86/kvm/mmu.c | 45 +-- arch/x86/kvm/mmutrace.h| 33

Re: Where is the entry of hypercalls in kvm?

2010-06-30 Thread Peter Teoh
Your questioned is answered here: http://www.spinics.net/lists/kvm/msg37526.html And check this paper out: http://ozlabs.org/~rusty/virtio-spec/virtio-paper.pdf The general concept to remember is that QEMU and KVM just execute the input as binary streamit does not know what functions it is

Re: Status update

2010-06-30 Thread Stefan Hajnoczi
On Tue, Jun 29, 2010 at 6:25 PM, Eduard - Gabriel Munteanu eduard.munte...@linux360.ro wrote: On the other hand, we could just leave it alone for now. Changing mappings during DMA is stupid anyway: I don't think the guest can recover the results of DMA safely, even though it might be used on

Re: Where is the entry of hypercalls in kvm?

2010-06-30 Thread Alexander Graf
On 30.06.2010, at 10:17, Peter Teoh wrote: Your questioned is answered here: http://www.spinics.net/lists/kvm/msg37526.html And check this paper out: http://ozlabs.org/~rusty/virtio-spec/virtio-paper.pdf The general concept to remember is that QEMU and KVM just execute the input as

Re: about page fault handler

2010-06-30 Thread Xiao Guangrong
jerry wu wrote: i want to get details process about kvm handler page fault.help wanted.N嫥叉靣笡y氊b瞂千v豝�)藓{.n�+壏ぞhФ洝塄}财爖�j:+v墾�珣赙zZ+€�+zf"穐殘啳嗃i�z�畐ア�?櫒璀��)撷fl=== Please sent mail with the correct encode, refer to: Documentation/email-clients.txt -- To unsubscribe from this list: send

Re: [PATCH] device-assignment: Rework name of assigned pci device

2010-06-30 Thread Hidetoshi Seto
(2010/06/30 15:53), Markus Armbruster wrote: Summary: upstream qemu commit b560a9ab broke -pcidevice and pci_add host in two ways: * Use without options id and name is broken when option host contains ':'. That's because id defaults to host. I recommend to fix it incompatibly: don't

[ kvm-Bugs-3022896 ] bad network performance with 10Gbit

2010-06-30 Thread SourceForge.net
Bugs item #3022896, was opened at 2010-06-29 18:39 Message generated for change (Comment added) made by jessorensen You can respond by visiting: https://sourceforge.net/tracker/?func=detailatid=893831aid=3022896group_id=180599 Please note that this message will contain a full copy of the comment

[PATCH 0/2] Faster MMU lookups for Book3s v3

2010-06-30 Thread Alexander Graf
Book3s suffered from my really bad shadow MMU implementation so far. So I finally got around to implement a combined hash and list mechanism that allows for much faster lookup of mapped pages. To show that it really is faster, I tried to run simple process spawning code inside the guest with and

[PATCH 2/2] KVM: PPC: Make use of hash based Shadow MMU

2010-06-30 Thread Alexander Graf
We just introduced generic functions to handle shadow pages on PPC. This patch makes the respective backends make use of them, getting rid of a lot of duplicate code along the way. Signed-off-by: Alexander Graf ag...@suse.de --- v2 - v3: - use hlist - use global kmem cache ---

[PATCH 1/2] KVM: PPC: Add generic hpte management functions

2010-06-30 Thread Alexander Graf
Currently the shadow paging code keeps an array of entries it knows about. Whenever the guest invalidates an entry, we loop through that entry, trying to invalidate matching parts. While this is a really simple implementation, it is probably the most ineffective one possible. So instead, let's

Re: [PATCH V2] VFIO driver: Non-privileged user level PCI drivers

2010-06-30 Thread Michael S. Tsirkin
On Wed, Jun 30, 2010 at 12:14:12AM -0600, Alex Williamson wrote: On Tue, 2010-06-08 at 14:21 -0700, Tom Lyon wrote: The VFIO driver is used to allow privileged AND non-privileged processes to implement user-level device drivers for any well-behaved PCI, PCI-X, and PCIe devices. Hi

Re: [PATCH V2] VFIO driver: Non-privileged user level PCI drivers

2010-06-30 Thread Alex Williamson
On Wed, 2010-06-30 at 16:36 +0300, Michael S. Tsirkin wrote: On Wed, Jun 30, 2010 at 12:14:12AM -0600, Alex Williamson wrote: On Tue, 2010-06-08 at 14:21 -0700, Tom Lyon wrote: The VFIO driver is used to allow privileged AND non-privileged processes to implement user-level device

[PATCH] Remove MSR_P6_{EVNTSEL0,PERFCTR0} from printk warning list.

2010-06-30 Thread Jes . Sorensen
From: Jes Sorensen jes.soren...@redhat.com MSR_P6_EVNTSEL0 and MSR_P6_PERFCTR0 are used to probe for the P6 PMU for older family 6 CPUs, which is also the default in QEMU. Ie. per default we get the noise of these warnings in dmesg, confusing users for no reason. Signed-off-by: Jes Sorensen

Re: Where is the entry of hypercalls in kvm?

2010-06-30 Thread Balachandar
On Wed, Jun 30, 2010 at 4:17 AM, Peter Teoh htmldevelo...@gmail.com wrote: Your questioned is answered here: http://www.spinics.net/lists/kvm/msg37526.html And check this paper out: http://ozlabs.org/~rusty/virtio-spec/virtio-paper.pdf The general concept to remember is that QEMU and KVM

Re: Where is the entry of hypercalls in kvm?

2010-06-30 Thread Balachandar
On Wed, Jun 30, 2010 at 10:59 AM, Balachandar bala1...@gmail.com wrote: On Wed, Jun 30, 2010 at 4:17 AM, Peter Teoh htmldevelo...@gmail.com wrote: Your questioned is answered here: http://www.spinics.net/lists/kvm/msg37526.html And check this paper out:

Re: Where is the entry of hypercalls in kvm?

2010-06-30 Thread Anthony Liguori
On 06/30/2010 03:56 AM, Alexander Graf wrote: On 30.06.2010, at 10:17, Peter Teoh wrote: Your questioned is answered here: http://www.spinics.net/lists/kvm/msg37526.html And check this paper out: http://ozlabs.org/~rusty/virtio-spec/virtio-paper.pdf The general concept to remember is

Re: Where is the entry of hypercalls in kvm?

2010-06-30 Thread Anthony Liguori
On 06/30/2010 10:02 AM, Balachandar wrote: On Wed, Jun 30, 2010 at 10:59 AM, Balachandarbala1...@gmail.com wrote: On Wed, Jun 30, 2010 at 4:17 AM, Peter Teohhtmldevelo...@gmail.com wrote: Your questioned is answered here: http://www.spinics.net/lists/kvm/msg37526.html And check

[PATCH] KVM test: Disable HPET on windows timedrift tests

2010-06-30 Thread Lucas Meneghel Rodrigues
By default, HPET is enabled on qemu and no time drift mitigation is being made for it. So, add -no-hpet if qemu supports it, during windows timedrift tests. Signed-off-by: Lucas Meneghel Rodrigues l...@redhat.com --- client/tests/kvm/kvm_vm.py |9 +

Re: Where is the entry of hypercalls in kvm?

2010-06-30 Thread Peter Teoh
Thank you Alex for the reply, very glad to know you!!! On Wed, Jun 30, 2010 at 4:56 PM, Alexander Graf ag...@suse.de wrote: On 30.06.2010, at 10:17, Peter Teoh wrote: Your questioned is answered here: http://www.spinics.net/lists/kvm/msg37526.html And check this paper out:

Re: Where is the entry of hypercalls in kvm?

2010-06-30 Thread Alexander Graf
On 30.06.2010, at 18:28, Peter Teoh wrote: Thank you Alex for the reply, very glad to know you!!! On Wed, Jun 30, 2010 at 4:56 PM, Alexander Graf ag...@suse.de wrote: On 30.06.2010, at 10:17, Peter Teoh wrote: Your questioned is answered here:

Re: Where is the entry of hypercalls in kvm?

2010-06-30 Thread Peter Teoh
just to clarify further. On Wed, Jun 30, 2010 at 11:10 PM, Anthony Liguori anth...@codemonkey.ws wrote: On 06/30/2010 03:56 AM, Alexander Graf wrote: On 30.06.2010, at 10:17, Peter Teoh wrote: Your questioned is answered here: http://www.spinics.net/lists/kvm/msg37526.html And check

Re: [PATCH] device-assignment: Clear assigned_dev irq type

2010-06-30 Thread Marcelo Tosatti
On Tue, Jun 29, 2010 at 11:51:54AM -0600, Alex Williamson wrote: Commit 96abccb5 cleared assigned_irq_data.flags when an irq is disabled, but what we really want is to clear assigned_dev-irq_requested_type. Signed-off-by: Alex Williamson alex.william...@redhat.com Found-by: Juan Quintela

Re: [PATCH v6 2/2] KVM: Using workqueue for WBINVD

2010-06-30 Thread Marcelo Tosatti
On Wed, Jun 30, 2010 at 12:25:16PM +0800, Sheng Yang wrote: It would buy us the ability to schedule compared to smp_call_function(). Signed-off-by: Sheng Yang sh...@linux.intel.com --- But I am not sure if it worth the complexity. Anyway WBINVD itself can't be interrupted, so the benefit

Re: [PATCH v6 1/2] KVM: VMX: Execute WBINVD to keep data consistency with assigned devices

2010-06-30 Thread Marcelo Tosatti
On Wed, Jun 30, 2010 at 12:25:15PM +0800, Sheng Yang wrote: Some guest device driver may leverage the Non-Snoop I/O, and explicitly WBINVD or CLFLUSH to a RAM space. Since migration may occur before WBINVD or CLFLUSH, we need to maintain data consistency either by: 1: flushing cache (wbinvd)

Re: random crash in post_kvm_run()

2010-06-30 Thread BuraphaLinux Server
Reply inline. On 6/29/10, Brian Jackson i...@theiggy.com wrote: On Monday, June 28, 2010 12:28:52 pm BuraphaLinux Server wrote: Hello, I have tried qemu_kvm 0.12.4 release and also git from about 1/2 an hour ago. In both cases, I crash in the post_kvm_run() function on the line about:

Re: random crash in post_kvm_run()

2010-06-30 Thread Anthony Liguori
On 06/28/2010 12:28 PM, BuraphaLinux Server wrote: Hello, I have tried qemu_kvm 0.12.4 release and also git from about 1/2 an hour ago. In both cases, I crash in the post_kvm_run() function on the line about: pthread_mutex_lock(qemu_mutex); The command I use to run qemu worked great

Re: random crash in post_kvm_run()

2010-06-30 Thread BuraphaLinux Server
On 6/29/10, Avi Kivity a...@redhat.com wrote: On 06/28/2010 08:28 PM, BuraphaLinux Server wrote: Hello, I have tried qemu_kvm 0.12.4 release and also git from about 1/2 an hour ago. In both cases, I crash in the post_kvm_run() function on the line about:

Re: random crash in post_kvm_run()

2010-06-30 Thread BuraphaLinux Server
On 7/1/10, Anthony Liguori anth...@codemonkey.ws wrote: On 06/28/2010 12:28 PM, BuraphaLinux Server wrote: Hello, I have tried qemu_kvm 0.12.4 release and also git from about 1/2 an hour ago. In both cases, I crash in the post_kvm_run() function on the line about:

Re: [PATCH v3 3/11] KVM: MMU: fix direct sp's access corruptted

2010-06-30 Thread Marcelo Tosatti
On Wed, Jun 30, 2010 at 04:03:28PM +0800, Xiao Guangrong wrote: If the mapping is writable but the dirty flag is not set, we will find the read-only direct sp and setup the mapping, then if the write #PF occur, we will mark this mapping writable in the read-only direct sp, now, other real

Re: [PATCH v3 9/11] KVM: MMU: prefetch ptes when intercepted guest #PF

2010-06-30 Thread Marcelo Tosatti
On Wed, Jun 30, 2010 at 04:08:05PM +0800, Xiao Guangrong wrote: Support prefetch ptes when intercept guest #PF, avoid to #PF by later access If we meet any failure in the prefetch path, we will exit it and not try other ptes to avoid become heavy path Note: this speculative will mark page

Re: [PATCHv2] vhost-net: add dhclient work-around from userspace

2010-06-30 Thread David Miller
From: Michael S. Tsirkin m...@redhat.com Date: Tue, 29 Jun 2010 16:04:39 +0300 Since using the module involves updating the management tools as well, if we go down this route it will be much less painful for everyone to do push it upstream. Ok, you can make your case to Patrick McHardy and if

Re: [Qemu-devel] [PATCH] QEMU: Update .gitignore

2010-06-30 Thread Aurelien Jarno
On Mon, Jun 21, 2010 at 06:14:17PM +0900, Hidetoshi Seto wrote: (2010/06/21 17:19), Avi Kivity wrote: On 06/21/2010 08:24 AM, Hidetoshi Seto wrote: I think some people have noticed that: $ ./configure $ make $ git status # On branch master # Untracked files: # (use git add

Re: [PATCHv2] vhost-net: add dhclient work-around from userspace

2010-06-30 Thread Anthony Liguori
On 06/29/2010 08:04 AM, Michael S. Tsirkin wrote: On Tue, Jun 29, 2010 at 12:36:47AM -0700, David Miller wrote: From: Michael S. Tsirkinm...@redhat.com Date: Mon, 28 Jun 2010 13:08:07 +0300 Userspace virtio server has the following hack so guests rely on it, and we have to replicate

Re: [PATCH V2] VFIO driver: Non-privileged user level PCI drivers

2010-06-30 Thread Tom Lyon
Thanks, Alex! Am incorporating... On Tuesday 29 June 2010 11:14:12 pm Alex Williamson wrote: On Tue, 2010-06-08 at 14:21 -0700, Tom Lyon wrote: The VFIO driver is used to allow privileged AND non-privileged processes to implement user-level device drivers for any well-behaved PCI, PCI-X,

Re: [PATCHv2] vhost-net: add dhclient work-around from userspace

2010-06-30 Thread Michael S. Tsirkin
On Wed, Jun 30, 2010 at 05:08:11PM -0500, Anthony Liguori wrote: On 06/29/2010 08:04 AM, Michael S. Tsirkin wrote: On Tue, Jun 29, 2010 at 12:36:47AM -0700, David Miller wrote: From: Michael S. Tsirkinm...@redhat.com Date: Mon, 28 Jun 2010 13:08:07 +0300 Userspace virtio server has the

Re: [PATCH V2] VFIO driver: Non-privileged user level PCI drivers

2010-06-30 Thread Michael S. Tsirkin
On Wed, Jun 30, 2010 at 03:17:55PM -0700, Tom Lyon wrote: Thanks, Alex! Am incorporating... I get it there's no chance you'll drop the virtualization from the driver then? -- MST -- To unsubscribe from this list: send the line unsubscribe kvm in the body of a message to

Re: [PATCH V2] VFIO driver: Non-privileged user level PCI drivers

2010-06-30 Thread Tom Lyon
On Wednesday 30 June 2010 03:32:56 pm Michael S. Tsirkin wrote: On Wed, Jun 30, 2010 at 03:17:55PM -0700, Tom Lyon wrote: Thanks, Alex! Am incorporating... I get it there's no chance you'll drop the virtualization from the driver then? I think it'll get a whole lot simpler by depending

[PATCH] 2.6.34: simple IOMMU API extension to check safe interrupt remapping

2010-06-30 Thread Tom Lyon
This patch allows IOMMU users to determine whether the hardware and software support safe, isolated interrupt remapping. Not all Intel IOMMUs have the hardware, and the software for AMD is not there yet. Signed-off-by: Tom Lyon p...@cisco.com --- MST has convinced me that any user level

Re: [PATCHv2] vhost-net: add dhclient work-around from userspace

2010-06-30 Thread Anthony Liguori
On 06/30/2010 05:31 PM, Michael S. Tsirkin wrote: On Wed, Jun 30, 2010 at 05:08:11PM -0500, Anthony Liguori wrote: On 06/29/2010 08:04 AM, Michael S. Tsirkin wrote: On Tue, Jun 29, 2010 at 12:36:47AM -0700, David Miller wrote: From: Michael S. Tsirkinm...@redhat.com Date:

Re: [PATCH v3 3/11] KVM: MMU: fix direct sp's access corruptted

2010-06-30 Thread Xiao Guangrong
Marcelo Tosatti wrote: -if (is_shadow_present_pte(*sptep) !is_large_pte(*sptep)) -continue; +if (is_shadow_present_pte(*sptep) !is_large_pte(*sptep)) { +struct kvm_mmu_page *child; +unsigned

Re: [PATCH v3 9/11] KVM: MMU: prefetch ptes when intercepted guest #PF

2010-06-30 Thread Xiao Guangrong
Marcelo Tosatti wrote: + +addr = gfn_to_hva_many(vcpu-kvm, gfn, entry); +if (kvm_is_error_hva(addr)) +return -1; + +entry = min(entry, (int)(end - start)); +ret = __get_user_pages_fast(addr, entry, 1, pages); +

[PATCH] Add QMP/qmp-commands.txt to .gitignore

2010-06-30 Thread Hidetoshi Seto
QMP/qmp-commands.txt is a generated file. Signed-off-by: Hidetoshi Seto seto.hideto...@jp.fujitsu.com --- .gitignore |1 + 1 files changed, 1 insertions(+), 0 deletions(-) diff --git a/.gitignore b/.gitignore index ce66ed5..a32b7c4 100644 --- a/.gitignore +++ b/.gitignore @@ -28,6 +28,7 @@

[PATCH] Add vapic.bin to .gitignore

2010-06-30 Thread Hidetoshi Seto
# This patch is for qemu-kvm.git The vapic.bin is a generated binary file. Signed-off-by: Hidetoshi Seto seto.hideto...@jp.fujitsu.com --- .gitignore |1 + 1 files changed, 1 insertions(+), 0 deletions(-) diff --git a/.gitignore b/.gitignore index ddc248b..26eba20 100644 --- a/.gitignore

Re: [Qemu-devel] [PATCH] QEMU: Update .gitignore

2010-06-30 Thread Hidetoshi Seto
(2010/07/01 6:33), Aurelien Jarno wrote: On Mon, Jun 21, 2010 at 06:14:17PM +0900, Hidetoshi Seto wrote: (2010/06/21 17:19), Avi Kivity wrote: On 06/21/2010 08:24 AM, Hidetoshi Seto wrote: I think some people have noticed that: $ ./configure $ make $ git status # On branch master #

Re: [PATCH V2] VFIO driver: Non-privileged user level PCI drivers

2010-06-30 Thread Alex Williamson
On Tue, 2010-06-08 at 14:21 -0700, Tom Lyon wrote: +int vfio_dma_unmap_dm(struct vfio_listener *listener, struct vfio_dma_map *dmp) +{ + unsigned long start, npage; + struct dma_map_page *mlp; + struct list_head *pos, *pos2; + int ret; + + start = dmp-vaddr

Re: [PATCH V2] VFIO driver: Non-privileged user level PCI drivers

2010-06-30 Thread Tom Lyon
On Wednesday 30 June 2010 09:16:23 pm Alex Williamson wrote: On Tue, 2010-06-08 at 14:21 -0700, Tom Lyon wrote: +int vfio_dma_unmap_dm(struct vfio_listener *listener, struct vfio_dma_map *dmp) +{ + unsigned long start, npage; + struct dma_map_page *mlp; + struct list_head *pos,

Re: [PATCH V2] VFIO driver: Non-privileged user level PCI drivers

2010-06-30 Thread Alex Williamson
On Wed, 2010-06-30 at 21:30 -0700, Tom Lyon wrote: On Wednesday 30 June 2010 09:16:23 pm Alex Williamson wrote: On Tue, 2010-06-08 at 14:21 -0700, Tom Lyon wrote: +int vfio_dma_unmap_dm(struct vfio_listener *listener, struct vfio_dma_map *dmp) +{ + unsigned long start, npage; +