This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
Home Products Support Community News


[Xen-devel] [PATCH 0/5] pciback: userspace PCI quirks & per-device permi

To: xen-devel@xxxxxxxxxxxxxxxxxxx
Subject: [Xen-devel] [PATCH 0/5] pciback: userspace PCI quirks & per-device permissive flag
From: Chris <hap10@xxxxxxxxxxxxxx>
Date: Mon, 17 Jul 2006 15:15:04 -0400
Delivery-date: Mon, 17 Jul 2006 12:15:31 -0700
Envelope-to: www-data@xxxxxxxxxxxxxxxxxx
List-help: <mailto:xen-devel-request@lists.xensource.com?subject=help>
List-id: Xen developer discussion <xen-devel.lists.xensource.com>
List-post: <mailto:xen-devel@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=unsubscribe>
Sender: xen-devel-bounces@xxxxxxxxxxxxxxxxxxx
User-agent: Thunderbird (X11/20060614)
Attached to the following emails are patches that give the PCI backend
finer control over quirky devices.  The patches should apply to
xen-unstable changeset 10711.  This is a follow-up submission to Ryan
Wilson's earlier per-device permissive flag patch. Each of the following
emails will contain a description of the corresponding attachment.

The PCI backend allows PCI devices to be given to unprivileged domains.
Some of those PCI devices (such as the Broadcom Tigon 3) require write
access to their configuration space to work properly.  When encountering
such a device, Xen currently uses a global toggle to grant/deny all PCI
devices write access to their entire configuration space.

The goal of this patch set is to eliminate unnecessary privilege by
controlling the PCI device(s) that have write access and also which
configuration space registers they are allowed to write.  This is
accomplished by the per-device permissive flag patch previously
submitted by Ryan and also two policy files in user-space that control
write access to configuration space registers for each quirky device.

The intended patch application order is (as sent):
1. pciback-uspace-quirks-linux.patch
2. pciback-per-device-permissive-flags.patch
3. pciback-uspace-quirks-xend.patch
4. pciback-uspace-quirks-policy.patch
5. pciback-uspace-quirks-doc.patch

I've done testing on the two tg3 devices that I have and It Works For
Me. Let me know if any of you have other devices that need additional

Signed-off-by: Chris Bookholt <hap10@xxxxxxxxxxxxxx>

Xen-devel mailing list

<Prev in Thread] Current Thread [Next in Thread>
  • [Xen-devel] [PATCH 0/5] pciback: userspace PCI quirks & per-device permissive flag, Chris <=