WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
   
 
 
Xen 
 
Home Products Support Community News
 
   
 

xen-users

Re: [Xen-users] Xen 3.2.1 and PCI passthrough

To: Devdutt Patnaik <xendevid@xxxxxxxxx>
Subject: Re: [Xen-users] Xen 3.2.1 and PCI passthrough
From: "--[ UxBoD ]--" <uxbod@xxxxxxxxxxxx>
Date: Sun, 24 Aug 2008 10:20:56 +0100 (BST)
Cc: xen-users@xxxxxxxxxxxxxxxxxxx
Delivery-date: Sun, 24 Aug 2008 02:21:41 -0700
Envelope-to: www-data@xxxxxxxxxxxxxxxxxxx
In-reply-to: <15184ca00808231446k4ceb41ddj1cd279135d8e2546@xxxxxxxxxxxxxx>
List-help: <mailto:xen-users-request@lists.xensource.com?subject=help>
List-id: Xen user discussion <xen-users.lists.xensource.com>
List-post: <mailto:xen-users@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/mailman/listinfo/xen-users>, <mailto:xen-users-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/mailman/listinfo/xen-users>, <mailto:xen-users-request@lists.xensource.com?subject=unsubscribe>
Reply-to: uxbod@xxxxxxxxxxxx
Sender: xen-users-bounces@xxxxxxxxxxxxxxxxxxx
I see Xen 3.3.0 has been released so will give that a try to see if it handles 
it any better!

Regards,

-- 
--[ UxBoD ]--
// PGP Key: "curl -s http://www.splatnix.net/uxbod.asc | gpg --import"
// Fingerprint: F57A 0CBD DD19 79E9 1FCC A612 CB36 D89D 2C5A 3A84
// Keyserver: www.keyserver.net Key-ID: 0x2C5A3A84
// Phone: +44 845 869 2749 SIP Phone: uxbod@xxxxxxxxxxxxxxxx

----- "Devdutt Patnaik" <xendevid@xxxxxxxxx> wrote:

> I tried to hide my 2nd NIC too from Dom0 using Xen 3.2.1 with the
> appropriate entries in modprobe.conf but it didnt work.
> I reverted back to using Xen 3.1 where it worked fine.
> 
> I'd like to know how this goes with MailScanner warning: numerical
> links are often malicious: 3.2.1.
> 
> -Devdutt.
> 
> 
> On Fri, Aug 22, 2008 at 6:06 AM, --[ UxBoD ]-- < uxbod@xxxxxxxxxxxx >
> wrote:
> 
> 
> Hi,
> 
> Have just brought a Digium TDM400P card for my Asterisk server but
> appear to be having trouble getting it to be hidden from DOM-0. Here
> is what dmesg shows :-
> 
> pciback 0000:02:07.0: Driver tried to write to a read-only
> configuration space field at offset 0x44, size 2. This may be
> harmless, but if you have problems with your device:
> 1) see permissive attribute in sysfs
> 2) report problems to the xen-devel mailing list along with details of
> your device obtained from lspci.
> PCI: Enabling device 0000:02:07.0 (0000 -> 0003)
> ACPI: PCI Interrupt 0000:02:07.0[A] -> GSI 26 (level, low) -> IRQ 20
> ACPI: PCI interrupt for device 0000:02:07.0 disabled
> pciback: vpci: 0000:02:07.0: assign to virtual slot 0
> PCI: Enabling device 0000:02:07.0 (0000 -> 0003)
> 
> and from the lspci :-
> 
> 02:07.0 Network controller: Tiger Jet Network Inc. Tiger3XX Modem/ISDN
> interface
> Subsystem: Unknown device b100:0001
> Flags: bus master, medium devsel, latency 64, IRQ 20
> I/O ports at a800 [size=256]
> Memory at fc7ff000 (32-bit, non-prefetchable) [size=4K]
> Capabilities: [40] Power Management version 2
> 
> In my rc.local I have the following :-
> 
> modprobe pciback
> sleep 2
> SLOT=0000:02:07.0
> echo -n $SLOT > /sys/bus/pci/drivers/pciback/new_slot
> echo -n $SLOT > /sys/bus/pci/drivers/pciback/bind
> 
> Does this look okay ? or should I contact the devel list ?
> 
> 
> Regards,

-- 
This message has been scanned for viruses and
dangerous content by MailScanner, and is
believed to be clean.


_______________________________________________
Xen-users mailing list
Xen-users@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-users