Lines Matching defs:devices
308 struct dmar_dev_scope *devices; /* target devices */
315 struct dmar_dev_scope *devices; /* target devices */
449 pr_info("Forcing DAC for PCI devices\n");
737 if (list_empty(&domain->devices))
740 list_for_each_entry(info, &domain->devices, link) {
745 * There could possibly be multiple device numa nodes as devices
928 for_each_active_dev_scope(drhd->devices,
933 * we could do this for all PCI devices; we only need to
939 *bus = drhd->devices[i].bus;
940 *devfn = drhd->devices[i].devfn;
1500 list_for_each_entry(info, &domain->devices, link)
1518 list_for_each_entry(info, &domain->devices, link) {
1562 undefined. So always enable PASID support on devices which
1620 list_for_each_entry(info, &domain->devices, link) {
1642 if (!list_empty(&domain->devices))
1953 INIT_LIST_HEAD(&domain->devices);
2074 /* Remove associated devices and clear attached or cached domains */
2601 list_for_each_entry_safe(info, tmp, &domain->devices, link)
2777 list_add(&info->link, &domain->devices);
2870 * Identity map the RMRRs so that devices with RMRRs could also use
2874 for_each_active_dev_scope(rmrr->devices, rmrr->devices_cnt,
2923 for_each_active_dev_scope(rmrr->devices,
2940 * We assume that PCI USB devices with RMRRs have them largely
2944 * The same exception is made for graphics devices, with the requirement that
2966 * devices associated with RMRRs. The first is when evaluating a device for
2967 * identity mapping because problems exist when devices are moved in and out
2975 * We therefore prevent devices associated with an RMRR from participating in
2978 * In both cases, devices which have relaxable RMRRs are not concerned by this
3274 * We can only free the PASID when all the devices are unbound.
4180 for_each_active_dev_scope(drhd->devices,
4183 /* ignore DMAR unit if no devices exist */
4193 for_each_active_dev_scope(drhd->devices,
4200 /* This IOMMU has *only* gfx devices. Either bypass it or
4376 rmrru->devices = dmar_alloc_dev_scope((void *)(rmrr + 1),
4379 if (rmrru->devices_cnt && rmrru->devices == NULL)
4436 atsru->devices = dmar_alloc_dev_scope((void *)(atsr + 1),
4439 if (atsru->devices_cnt && atsru->devices == NULL) {
4452 dmar_free_dev_scope(&atsru->devices, &atsru->devices_cnt);
4484 if (!atsru->include_all && atsru->devices && atsru->devices_cnt) {
4485 for_each_active_dev_scope(atsru->devices, atsru->devices_cnt,
4597 dmar_free_dev_scope(&rmrru->devices, &rmrru->devices_cnt);
4637 for_each_dev_scope(atsru->devices, atsru->devices_cnt, i, tmp)
4668 rmrr->segment, rmrru->devices,
4674 rmrru->devices, rmrru->devices_cnt);
4686 atsr->segment, atsru->devices,
4694 atsru->devices, atsru->devices_cnt))
4914 * map for all devices except those marked as being untrusted.
4934 for_each_active_dev_scope(drhd->devices,
5082 pr_warn("ACPI name space devices didn't probe correctly\n");
5118 * dependent devices. If multiple endpoints have intersecting dependent
5119 * devices, unbinding the driver from any one of them will possibly leave
5330 /* Setup the PASID entry for mediated devices: */
5485 * as a result of DMA or VFIO unmap. However, for assigned devices guest
5866 for_each_active_dev_scope(rmrr->devices, rmrr->devices_cnt,
6026 * for system software and tools to detect endpoint devices supporting the
6148 list_empty(&dmar_domain->devices)) {
6166 * marked as untrusted. Such devices should not be able to apply quirks and