| .. | .. |
|---|
| 7 | 7 | the format of DDDD:BB:DD.F-REG:SIZE:MASK will allow the guest |
|---|
| 8 | 8 | to write and read from the PCI device. That is Domain:Bus: |
|---|
| 9 | 9 | Device.Function-Register:Size:Mask (Domain is optional). |
|---|
| 10 | | - For example: |
|---|
| 11 | | - #echo 00:19.0-E0:2:FF > /sys/bus/pci/drivers/pciback/quirks |
|---|
| 10 | + For example:: |
|---|
| 11 | + |
|---|
| 12 | + #echo 00:19.0-E0:2:FF > /sys/bus/pci/drivers/pciback/quirks |
|---|
| 13 | + |
|---|
| 12 | 14 | will allow the guest to read and write to the configuration |
|---|
| 13 | 15 | register 0x0E. |
|---|
| 16 | + |
|---|
| 17 | +What: /sys/bus/pci/drivers/pciback/allow_interrupt_control |
|---|
| 18 | +Date: Jan 2020 |
|---|
| 19 | +KernelVersion: 5.6 |
|---|
| 20 | +Contact: xen-devel@lists.xenproject.org |
|---|
| 21 | +Description: |
|---|
| 22 | + List of devices which can have interrupt control flag (INTx, |
|---|
| 23 | + MSI, MSI-X) set by a connected guest. It is meant to be set |
|---|
| 24 | + only when the guest is a stubdomain hosting device model (qemu) |
|---|
| 25 | + and the actual device is assigned to a HVM. It is not safe |
|---|
| 26 | + (similar to permissive attribute) to set for a devices assigned |
|---|
| 27 | + to a PV guest. The device is automatically removed from this |
|---|
| 28 | + list when the connected pcifront terminates. |
|---|