1*4882a593SmuzhiyunWhat: /sys/bus/pci/drivers/pciback/quirks 2*4882a593SmuzhiyunDate: Oct 2011 3*4882a593SmuzhiyunKernelVersion: 3.1 4*4882a593SmuzhiyunContact: xen-devel@lists.xenproject.org 5*4882a593SmuzhiyunDescription: 6*4882a593Smuzhiyun If the permissive attribute is set, then writing a string in 7*4882a593Smuzhiyun the format of DDDD:BB:DD.F-REG:SIZE:MASK will allow the guest 8*4882a593Smuzhiyun to write and read from the PCI device. That is Domain:Bus: 9*4882a593Smuzhiyun Device.Function-Register:Size:Mask (Domain is optional). 10*4882a593Smuzhiyun For example:: 11*4882a593Smuzhiyun 12*4882a593Smuzhiyun #echo 00:19.0-E0:2:FF > /sys/bus/pci/drivers/pciback/quirks 13*4882a593Smuzhiyun 14*4882a593Smuzhiyun will allow the guest to read and write to the configuration 15*4882a593Smuzhiyun register 0x0E. 16*4882a593Smuzhiyun 17*4882a593SmuzhiyunWhat: /sys/bus/pci/drivers/pciback/allow_interrupt_control 18*4882a593SmuzhiyunDate: Jan 2020 19*4882a593SmuzhiyunKernelVersion: 5.6 20*4882a593SmuzhiyunContact: xen-devel@lists.xenproject.org 21*4882a593SmuzhiyunDescription: 22*4882a593Smuzhiyun List of devices which can have interrupt control flag (INTx, 23*4882a593Smuzhiyun MSI, MSI-X) set by a connected guest. It is meant to be set 24*4882a593Smuzhiyun only when the guest is a stubdomain hosting device model (qemu) 25*4882a593Smuzhiyun and the actual device is assigned to a HVM. It is not safe 26*4882a593Smuzhiyun (similar to permissive attribute) to set for a devices assigned 27*4882a593Smuzhiyun to a PV guest. The device is automatically removed from this 28*4882a593Smuzhiyun list when the connected pcifront terminates. 29