WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
   
 
 
Xen 
 
Home Products Support Community News
 
   
 

xen-users

Re: [Xen-users] Xen 3.2.1 and PCI passthrough

To: uxbod@xxxxxxxxxxxx
Subject: Re: [Xen-users] Xen 3.2.1 and PCI passthrough
From: "Devdutt Patnaik" <xendevid@xxxxxxxxx>
Date: Sat, 23 Aug 2008 17:46:21 -0400
Cc: xen-users@xxxxxxxxxxxxxxxxxxx
Delivery-date: Sat, 23 Aug 2008 14:47:04 -0700
Dkim-signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:received:received:message-id:date:from:to :subject:cc:in-reply-to:mime-version:content-type:references; bh=3UJntijxXTUOXxXIu2FlRBycflc1u++iNToHtPtU4yc=; b=gVD41cXzd105wwm0fmCYBVFAexb+b+A3Bkwku6U5o/TtBopN5fabo78NGIiFSfK2ef yNVoAUBkhHE7KFVmMk4ypvK/+toCewqiHqul1WnWsBNZi0w1kLq4PTqFCztJI4r66xRh DdiJt6msa9kXtqjVr5vHvY2fWqdaE6ndNxPh0=
Domainkey-signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=message-id:date:from:to:subject:cc:in-reply-to:mime-version :content-type:references; b=Ak20bA+HVkbJbkQWj3Ph4WHabQPvEn1kDrs/nnbfjy9+2UspeahCZwiIIRNUu1LGm8 jBdCsL2N2Gyqz9tkHhlJnI4nPVIaWp5ilCunGIX9pDW+lT+SlSxTyzcSAmGmiWMtDOHk 0/D2kh/MPmn+yNdojl523Nw0weZA69lHrbMK8=
Envelope-to: www-data@xxxxxxxxxxxxxxxxxxx
In-reply-to: <25459266.131219399570289.JavaMail.root@xxxxxxxxxxxxxxxxxxx>
List-help: <mailto:xen-users-request@lists.xensource.com?subject=help>
List-id: Xen user discussion <xen-users.lists.xensource.com>
List-post: <mailto:xen-users@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/mailman/listinfo/xen-users>, <mailto:xen-users-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/mailman/listinfo/xen-users>, <mailto:xen-users-request@lists.xensource.com?subject=unsubscribe>
References: <12133422.111219399241441.JavaMail.root@xxxxxxxxxxxxxxxxxxx> <25459266.131219399570289.JavaMail.root@xxxxxxxxxxxxxxxxxxx>
Sender: xen-users-bounces@xxxxxxxxxxxxxxxxxxx
I tried to hide my 2nd NIC too from Dom0 using Xen 3.2.1 with the appropriate entries in modprobe.conf but it didnt work.
I reverted back to using Xen 3.1 where it worked fine.

I'd like to know how this goes with 3.2.1.

-Devdutt.

On Fri, Aug 22, 2008 at 6:06 AM, --[ UxBoD ]-- <uxbod@xxxxxxxxxxxx> wrote:
Hi,

Have just brought a Digium TDM400P card for my Asterisk server but appear to be having trouble getting it to be hidden from DOM-0.  Here is what dmesg shows :-

pciback 0000:02:07.0: Driver tried to write to a read-only configuration space field at offset 0x44, size 2. This may be harmless, but if you have problems with your device:
1) see permissive attribute in sysfs
2) report problems to the xen-devel mailing list along with details of your device obtained from lspci.
PCI: Enabling device 0000:02:07.0 (0000 -> 0003)
ACPI: PCI Interrupt 0000:02:07.0[A] -> GSI 26 (level, low) -> IRQ 20
ACPI: PCI interrupt for device 0000:02:07.0 disabled
pciback: vpci: 0000:02:07.0: assign to virtual slot 0
PCI: Enabling device 0000:02:07.0 (0000 -> 0003)

and from the lspci :-

02:07.0 Network controller: Tiger Jet Network Inc. Tiger3XX Modem/ISDN interface
       Subsystem: Unknown device b100:0001
       Flags: bus master, medium devsel, latency 64, IRQ 20
       I/O ports at a800 [size=256]
       Memory at fc7ff000 (32-bit, non-prefetchable) [size=4K]
       Capabilities: [40] Power Management version 2

In my rc.local I have the following :-

modprobe pciback
sleep 2
SLOT=0000:02:07.0
echo -n $SLOT > /sys/bus/pci/drivers/pciback/new_slot
echo -n $SLOT > /sys/bus/pci/drivers/pciback/bind

Does this look okay ? or should I contact the devel list ?


Regards,

--
--[ UxBoD ]--
// PGP Key: "curl -s http://www.splatnix.net/uxbod.asc | gpg --import"
// Fingerprint: F57A 0CBD DD19 79E9 1FCC A612 CB36 D89D 2C5A 3A84
// Keyserver: www.keyserver.net Key-ID: 0x2C5A3A84
// Phone: +44 845 869 2749 SIP Phone: uxbod@xxxxxxxxxxxxxxxx

--
This message has been scanned for viruses and
dangerous content by MailScanner, and is
believed to be clean.


_______________________________________________
Xen-users mailing list
Xen-users@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-users

_______________________________________________
Xen-users mailing list
Xen-users@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-users