[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH 1 of 3] IOMMU: Add command line param to disable sharing of IOMMU and hap tables
At 09:17 +0000 on 22 Mar (1332407837), Jan Beulich wrote: > >>> On 21.03.12 at 20:22, Andres Lagar-Cavilla <andres@xxxxxxxxxxxxxxxx> > wrote: > > The default is 1, and the command line parameter sets to 1. Disabling may be > > desired if the host will contain VMs that do paging, sharing or mem access, > > and > > won't be doing passthrough. These two features are mutually exclusive for > > AMD > > processors. > > > > Signed-off-by: Andres Lagar-Cavilla <andres@xxxxxxxxxxxxxxxx> > > > > diff -r d7e417afcbe4 -r 642c0e6a01c2 xen/drivers/passthrough/iommu.c > > --- a/xen/drivers/passthrough/iommu.c > > +++ b/xen/drivers/passthrough/iommu.c > > @@ -87,6 +87,8 @@ static void __init parse_iommu_param(cha > > iommu_dom0_strict = 1; > > else if ( !strcmp(s, "sharept") ) > > iommu_hap_pt_share = 1; > > + else if ( !strcmp(s, "no-sharept") ) > > + iommu_hap_pt_share = 0; > > Taking the description above into consideration - why not simply > replace the pointless enabling option with the disabling one? Let's just fix the whole function to handle 'no-' the way the main parser does: ----- IOMMU: clean up handling of 'foo' and 'no-foo' command-line options Signed-off-by: Tim Deegan <tim@xxxxxxx> diff -r 8180cb3895af xen/drivers/passthrough/iommu.c --- a/xen/drivers/passthrough/iommu.c Thu Mar 22 10:26:45 2012 +0000 +++ b/xen/drivers/passthrough/iommu.c Thu Mar 22 10:38:48 2012 +0000 @@ -57,36 +57,41 @@ DEFINE_PER_CPU(bool_t, iommu_dont_flush_ static void __init parse_iommu_param(char *s) { char *ss; + int val; do { + val = !!strncmp(s, "no-", 3); + if ( !val ) + s += 3; + ss = strchr(s, ','); if ( ss ) *ss = '\0'; if ( !parse_bool(s) ) - iommu_enabled = 0; + iommu_enabled = val; else if ( !strcmp(s, "force") || !strcmp(s, "required") ) - force_iommu = 1; + force_iommu = val; else if ( !strcmp(s, "workaround_bios_bug") ) iommu_workaround_bios_bug = 1; else if ( !strcmp(s, "verbose") ) - iommu_verbose = 1; - else if ( !strcmp(s, "no-snoop") ) - iommu_snoop = 0; - else if ( !strcmp(s, "no-qinval") ) - iommu_qinval = 0; - else if ( !strcmp(s, "no-intremap") ) - iommu_intremap = 0; + iommu_verbose = val; + else if ( !strcmp(s, "snoop") ) + iommu_snoop = val; + else if ( !strcmp(s, "qinval") ) + iommu_qinval = val; + else if ( !strcmp(s, "intremap") ) + iommu_intremap = val; else if ( !strcmp(s, "debug") ) - iommu_debug = 1; + iommu_debug = val; else if ( !strcmp(s, "amd-iommu-perdev-intremap") ) - amd_iommu_perdev_intremap = 1; + amd_iommu_perdev_intremap = val; else if ( !strcmp(s, "dom0-passthrough") ) - iommu_passthrough = 1; + iommu_passthrough = val; else if ( !strcmp(s, "dom0-strict") ) - iommu_dom0_strict = 1; + iommu_dom0_strict = val; else if ( !strcmp(s, "sharept") ) - iommu_hap_pt_share = 1; + iommu_hap_pt_share = val; s = ss + 1; } while ( ss ); _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |