014-10-01 at 15:38 +0200, Andre Richter wrote:
>> If a PCIe device bound to vfio-pci happens to be SR-IOV capabale,
>> there is no possibility to bring up/shutdown the device's VFs.
>>
>> This patch adds a generic callback for the sysfs sriov_numvfs attribute.
>>
ction checks if the device is a PF.
Signed-off-by: Andre Richter
---
drivers/vfio/pci/vfio_pci.c | 25 -
1 file changed, 20 insertions(+), 5 deletions(-)
diff --git a/drivers/vfio/pci/vfio_pci.c b/drivers/vfio/pci/vfio_pci.c
index f782533..2f6dfb3 100644
--- a/drivers/vfi
2013/10/2 Alex Williamson :
> On Wed, 2013-10-02 at 13:35 +0300, Gleb Natapov wrote:
>> On Wed, Oct 02, 2013 at 12:23:26PM +0200, Andre Richter wrote:
>> > When KVM (de)assigns PCI(e) devices to VMs, a debug message is printed
>> > including the BDF notation of the r
The patch fixes this by exchanging the printk(KERN_DEBUG ...) with dev_info()
and also inserts "kvm" into the debug message, so that it is obvious where
the message comes from. Also reduces LoC.
Signed-off-by: Andre Richter
---
virt/kvm/iommu.c | 12 ++--
1 file changed,
Hi all,
I'm quite new to KVM/QEMU internals.
On recent x86 setups (Sandy/Ivy Bridge with vt-x and vt-d), if I
attach a PCI device via PCI-Passthrough to a VM,
I can directly do MMIO with the device's registers or whatsoever hides
behind it's BAR addresses.
I wonder if there is a way for the Host/