Lines Matching refs:vfio

81 is created by simply opening the /dev/vfio/vfio character device.
90 VFIO group will appear for the group as /dev/vfio/$GROUP, where
100 the VFIO group character device (/dev/vfio/$GROUP) and using the
127 pci bus, therefore the user will make use of vfio-pci to manage the
130 # modprobe vfio-pci
132 Binding this device to the vfio-pci driver creates the VFIO group
138 # echo 1102 0002 > /sys/bus/pci/drivers/vfio-pci/new_id
156 bind this device to the vfio-pci driver (vfio-pci does not currently
160 unprivileged operation is desired (note that /dev/vfio/vfio provides
164 # chown user:user /dev/vfio/26
177 container = open("/dev/vfio/vfio", O_RDWR);
186 group = open("/dev/vfio/26", O_RDWR);
192 /* Group is not viable (ie, not all devices bound for vfio) */
250 vfio container and group model is intended to be deprecated.
257 also be accessed if the VFIO container interface, ie. /dev/vfio/vfio is
276 by directly opening a character device /dev/vfio/devices/vfioX where
294 vfio device cdev access is still bound by IOMMU group semantics, ie. there
297 kernel and vfio bus driver or other driver supporting the driver_managed_dma
306 $ ls /sys/bus/pci/devices/0000:6a:01.0/vfio-dev/
312 $ ls -l /dev/vfio/devices/vfio0
313 crw------- 1 root root 511, 0 Feb 16 01:22 /dev/vfio/devices/vfio0
314 $ cat /sys/bus/pci/devices/0000:6a:01.0/vfio-dev/vfio0/dev
317 lrwxrwxrwx 1 root root 21 Feb 16 01:22 /dev/char/511:0 -> ../vfio/devices/vfio0
322 $ chown user:user /dev/vfio/devices/vfio0
326 cdev_fd = open("/dev/vfio/devices/vfio0", O_RDWR);
376 Please see include/uapi/linux/vfio.h for complete API documentation.
381 VFIO bus drivers, such as vfio-pci make use of only a few interfaces
459 such as when trying to unbind the device from the vfio bus driver.
463 use of the vfio page pinning interface must implement this callback in