From mboxrd@z Thu Jan 1 00:00:00 1970 From: Avi Kivity Subject: Re: [PATCH 0/4][VTD] kvm vt-d support kernel changes Date: Fri, 20 Jun 2008 21:00:34 +0300 Message-ID: <485BF042.2070400@qumranet.com> References: <1FE6DD409037234FAB833C420AA843EC018831C6@orsmsx424.amr.corp.intel.com> Mime-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit Cc: kvm@vger.kernel.org, Amit Shah , Muli Ben-Yehuda , Ben-Ami Yassour , Anthony Liguori , Chris Wright , "Han, Weidong" To: "Kay, Allen M" Return-path: Received: from il.qumranet.com ([212.179.150.194]:22704 "EHLO il.qumranet.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752722AbYFTSAg (ORCPT ); Fri, 20 Jun 2008 14:00:36 -0400 In-Reply-To: <1FE6DD409037234FAB833C420AA843EC018831C6@orsmsx424.amr.corp.intel.com> Sender: kvm-owner@vger.kernel.org List-ID: Kay, Allen M wrote: > Following four patches contains changes for enabling VT-d PCI > passthrough. The patches are located at: > > git.kernel.org/pub/scm/linux/kernel/git/amit/kvm.git vtd > > Please attach patches as text/plain or inline them. It's very annoying to review application/octet-stream patches. > I have incorporated most of the feedbacks from the last RFC submission. > It was tested with passthrough an E1000 NIC to a linux guest using > irqhook interrupt injection mechanism. > > 1) intel_iommu_move.patch: move intel-iommu.h/iova.h to include/linux. > 2) intel_iommu_mods.patch: kvm modifications to intel-iommu.c. > What's the upstream path for these (who's the subsystem maintainer)? -- I have a truly marvellous patch that fixes the bug which this signature is too narrow to contain.