checks if the device is a PF.
Signed-off-by: Andre Richter andre.o.rich...@gmail.com
---
drivers/vfio/pci/vfio_pci.c | 25 -
1 file changed, 20 insertions(+), 5 deletions(-)
diff --git a/drivers/vfio/pci/vfio_pci.c b/drivers/vfio/pci/vfio_pci.c
index f782533..2f6dfb3
...@redhat.com:
On Wed, 2014-10-01 at 15:38 +0200, Andre Richter wrote:
If a PCIe device bound to vfio-pci happens to be SR-IOV capabale,
there is no possibility to bring up/shutdown the device's VFs.
This patch adds a generic callback for the sysfs sriov_numvfs attribute.
The attribute will only
2013/10/2 Alex Williamson alex.william...@redhat.com:
On Wed, 2013-10-02 at 13:35 +0300, Gleb Natapov wrote:
On Wed, Oct 02, 2013 at 12:23:26PM +0200, Andre Richter wrote:
When KVM (de)assigns PCI(e) devices to VMs, a debug message is printed
including the BDF notation of the respective
Hi all,
I'm quite new to KVM/QEMU internals.
On recent x86 setups (Sandy/Ivy Bridge with vt-x and vt-d), if I
attach a PCI device via PCI-Passthrough to a VM,
I can directly do MMIO with the device's registers or whatsoever hides
behind it's BAR addresses.
I wonder if there is a way for the