From: Andrew Cooper Date: Tue, 31 Oct 2023 12:02:15 +0000 (+0000) Subject: docs: Fix IOMMU command line docs some more X-Git-Url: http://xenbits.xensource.com/gitweb?a=commitdiff_plain;h=850382254b78e07e7ccbf80010c3b43897a158f9;p=people%2Ftklengyel%2Fxen.git docs: Fix IOMMU command line docs some more Make the command line docs match the actual implementation, and state that the default behaviour is selected at compile time. Fixes: 980d6acf1517 ("IOMMU: make DMA containment of quarantined devices optional") Signed-off-by: Andrew Cooper Reviewed-by: Roger Pau Monné Release-acked-by: Henry Wang --- diff --git a/docs/misc/xen-command-line.pandoc b/docs/misc/xen-command-line.pandoc index 6b07d0f3a1..9a19a04157 100644 --- a/docs/misc/xen-command-line.pandoc +++ b/docs/misc/xen-command-line.pandoc @@ -1480,7 +1480,8 @@ detection of systems known to misbehave upon accesses to that port. > Default: `new` unless directed-EOI is supported ### iommu - = List of [ , verbose, debug, force, required, quarantine[=scratch-page], + = List of [ , verbose, debug, force, required, + quarantine=|scratch-page, sharept, superpages, intremap, intpost, crash-disable, snoop, qinval, igfx, amd-iommu-perdev-intremap, dom0-{passthrough,strict} ] @@ -1519,7 +1520,8 @@ boolean (e.g. `iommu=no`) can override this and leave the IOMMUs disabled. successfully. * The `quarantine` option can be used to control Xen's behavior when - de-assigning devices from guests. + de-assigning devices from guests. The default behaviour is chosen at + compile time, and is one of `CONFIG_IOMMU_QUARANTINE_{NONE,BASIC,SCRATCH_PAGE}`. When a PCI device is assigned to an untrusted domain, it is possible for that domain to program the device to DMA to an arbitrary address.