eal: factorise unsupported option handling
[dpdk.git] / lib / librte_eal / linuxapp / eal / eal.c
index 8640e55..bf63744 100644 (file)
@@ -1,13 +1,14 @@
 /*-
  *   BSD LICENSE
- * 
- *   Copyright(c) 2010-2013 Intel Corporation. All rights reserved.
+ *
+ *   Copyright(c) 2010-2014 Intel Corporation. All rights reserved.
+ *   Copyright(c) 2012-2014 6WIND S.A.
  *   All rights reserved.
- * 
+ *
  *   Redistribution and use in source and binary forms, with or without
  *   modification, are permitted provided that the following conditions
  *   are met:
- * 
+ *
  *     * Redistributions of source code must retain the above copyright
  *       notice, this list of conditions and the following disclaimer.
  *     * Redistributions in binary form must reproduce the above copyright
@@ -17,7 +18,7 @@
  *     * Neither the name of Intel Corporation nor the names of its
  *       contributors may be used to endorse or promote products derived
  *       from this software without specific prior written permission.
- * 
+ *
  *   THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
  *   "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
  *   LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
 #include <syslog.h>
 #include <getopt.h>
 #include <sys/file.h>
+#include <fcntl.h>
+#include <dlfcn.h>
 #include <stddef.h>
 #include <errno.h>
 #include <limits.h>
 #include <errno.h>
 #include <sys/mman.h>
 #include <sys/queue.h>
-#include <sys/user.h>
-#include <linux/binfmts.h>
+#include <sys/io.h>
 
 #include <rte_common.h>
 #include <rte_debug.h>
 #include <rte_cpuflags.h>
 #include <rte_interrupts.h>
 #include <rte_pci.h>
+#include <rte_devargs.h>
 #include <rte_common.h>
 #include <rte_version.h>
 #include <rte_atomic.h>
 #include <malloc_heap.h>
+#include <rte_eth_ring.h>
+#include <rte_dev.h>
 
 #include "eal_private.h"
 #include "eal_thread.h"
 #define OPT_NO_HUGE     "no-huge"
 #define OPT_FILE_PREFIX "file-prefix"
 #define OPT_SOCKET_MEM  "socket-mem"
-#define OPT_USE_DEVICE  "use-device"
+#define OPT_PCI_WHITELIST "pci-whitelist"
+#define OPT_PCI_BLACKLIST "pci-blacklist"
+#define OPT_VDEV        "vdev"
 #define OPT_SYSLOG      "syslog"
-
-#define RTE_EAL_BLACKLIST_SIZE 0x100
+#define OPT_LOG_LEVEL   "log-level"
+#define OPT_BASE_VIRTADDR   "base-virtaddr"
+#define OPT_XEN_DOM0    "xen-dom0"
+#define OPT_CREATE_UIO_DEV "create-uio-dev"
+#define OPT_VFIO_INTR    "vfio-intr"
 
 #define MEMSIZE_IF_NO_HUGE_PAGE (64ULL * 1024ULL * 1024ULL)
 
 #define SOCKET_MEM_STRLEN (RTE_MAX_NUMA_NODES * 10)
 
-#define BITS_PER_HEX 4
+#define HIGHEST_RPL 3
 
-#define GET_BLACKLIST_FIELD(in, fd, lim, dlm)                   \
-{                                                               \
-       unsigned long val;                                      \
-       char *end;                                              \
-       errno = 0;                                              \
-       val = strtoul((in), &end, 16);                          \
-       if (errno != 0 || end[0] != (dlm) || val > (lim))       \
-               return (-EINVAL);                               \
-       (fd) = (typeof (fd))val;                                \
-       (in) = end + 1;                                         \
-}
+#define BITS_PER_HEX 4
 
 /* Allow the application to print its usage message too if set */
 static rte_usage_hook_t        rte_application_usage_hook = NULL;
+
+TAILQ_HEAD(shared_driver_list, shared_driver);
+
+/* Definition for shared object drivers. */
+struct shared_driver {
+       TAILQ_ENTRY(shared_driver) next;
+
+       char    name[PATH_MAX];
+       void*   lib_handle;
+};
+
+/* List of external loadable drivers */
+static struct shared_driver_list solib_list =
+TAILQ_HEAD_INITIALIZER(solib_list);
+
 /* early configuration structure, when memory config is not mmapped */
 static struct rte_mem_config early_mem_config;
 
@@ -131,8 +146,6 @@ static struct rte_config rte_config = {
                .mem_config = &early_mem_config,
 };
 
-static struct rte_pci_addr eal_dev_blacklist[RTE_EAL_BLACKLIST_SIZE];
-
 /* internal configuration (per-core) */
 struct lcore_config lcore_config[RTE_MAX_LCORE];
 
@@ -198,6 +211,14 @@ rte_eal_config_create(void)
        if (internal_config.no_shconf)
                return;
 
+       /* map the config before hugepage address so that we don't waste a page */
+       if (internal_config.base_virtaddr != 0)
+               rte_mem_cfg_addr = (void *)
+                       RTE_ALIGN_FLOOR(internal_config.base_virtaddr -
+                       sizeof(struct rte_mem_config), sysconf(_SC_PAGE_SIZE));
+       else
+               rte_mem_cfg_addr = NULL;
+
        if (mem_cfg_fd < 0){
                mem_cfg_fd = open(pathname, O_RDWR | O_CREAT, 0660);
                if (mem_cfg_fd < 0)
@@ -217,7 +238,7 @@ rte_eal_config_create(void)
                                "process running?\n", pathname);
        }
 
-       rte_mem_cfg_addr = mmap(NULL, sizeof(*rte_config.mem_config),
+       rte_mem_cfg_addr = mmap(rte_mem_cfg_addr, sizeof(*rte_config.mem_config),
                                PROT_READ | PROT_WRITE, MAP_SHARED, mem_cfg_fd, 0);
 
        if (rte_mem_cfg_addr == MAP_FAILED){
@@ -225,13 +246,19 @@ rte_eal_config_create(void)
        }
        memcpy(rte_mem_cfg_addr, &early_mem_config, sizeof(early_mem_config));
        rte_config.mem_config = (struct rte_mem_config *) rte_mem_cfg_addr;
+
+       /* store address of the config in the config itself so that secondary
+        * processes could later map the config into this exact location */
+       rte_config.mem_config->mem_cfg_addr = (uintptr_t) rte_mem_cfg_addr;
+
 }
 
 /* attach to an existing shared memory config */
 static void
 rte_eal_config_attach(void)
 {
-       void *rte_mem_cfg_addr;
+       struct rte_mem_config *mem_config;
+
        const char *pathname = eal_runtime_config_path();
 
        if (internal_config.no_shconf)
@@ -243,13 +270,40 @@ rte_eal_config_attach(void)
                        rte_panic("Cannot open '%s' for rte_mem_config\n", pathname);
        }
 
-       rte_mem_cfg_addr = mmap(NULL, sizeof(*rte_config.mem_config), 
-                               PROT_READ | PROT_WRITE, MAP_SHARED, mem_cfg_fd, 0);
+       /* map it as read-only first */
+       mem_config = (struct rte_mem_config *) mmap(NULL, sizeof(*mem_config),
+                       PROT_READ, MAP_SHARED, mem_cfg_fd, 0);
+       if (mem_config == MAP_FAILED)
+               rte_panic("Cannot mmap memory for rte_config\n");
+
+       rte_config.mem_config = mem_config;
+}
+
+/* reattach the shared config at exact memory location primary process has it */
+static void
+rte_eal_config_reattach(void)
+{
+       struct rte_mem_config *mem_config;
+       void *rte_mem_cfg_addr;
+
+       if (internal_config.no_shconf)
+               return;
+
+       /* save the address primary process has mapped shared config to */
+       rte_mem_cfg_addr = (void *) (uintptr_t) rte_config.mem_config->mem_cfg_addr;
+
+       /* unmap original config */
+       munmap(rte_config.mem_config, sizeof(struct rte_mem_config));
+
+       /* remap the config at proper address */
+       mem_config = (struct rte_mem_config *) mmap(rte_mem_cfg_addr,
+                       sizeof(*mem_config), PROT_READ | PROT_WRITE, MAP_SHARED,
+                       mem_cfg_fd, 0);
        close(mem_cfg_fd);
-       if (rte_mem_cfg_addr == MAP_FAILED)
+       if (mem_config == MAP_FAILED || mem_config != rte_mem_cfg_addr)
                rte_panic("Cannot mmap memory for rte_config\n");
 
-       rte_config.mem_config = (struct rte_mem_config *) rte_mem_cfg_addr;
+       rte_config.mem_config = mem_config;
 }
 
 /* Detect if we are a primary or a secondary process */
@@ -276,8 +330,6 @@ eal_proc_type_detect(void)
 static void
 rte_config_init(void)
 {
-       /* set the magic in configuration structure */
-       rte_config.magic = RTE_MAGIC;
        rte_config.process_type = (internal_config.process_type == RTE_PROC_AUTO) ?
                        eal_proc_type_detect() : /* for auto, detect the type */
                        internal_config.process_type; /* otherwise use what's already set */
@@ -289,6 +341,7 @@ rte_config_init(void)
        case RTE_PROC_SECONDARY:
                rte_eal_config_attach();
                rte_eal_mcfg_wait_complete(rte_config.mem_config);
+               rte_eal_config_reattach();
                break;
        case RTE_PROC_AUTO:
        case RTE_PROC_INVALID:
@@ -305,13 +358,13 @@ eal_hugedirs_unlock(void)
        for (i = 0; i < MAX_HUGEPAGE_SIZES; i++)
        {
                /* skip uninitialized */
-               if (internal_config.hugepage_info[i].lock_descriptor == 0)
+               if (internal_config.hugepage_info[i].lock_descriptor < 0)
                        continue;
                /* unlock hugepage file */
                flock(internal_config.hugepage_info[i].lock_descriptor, LOCK_UN);
                close(internal_config.hugepage_info[i].lock_descriptor);
                /* reset the field */
-               internal_config.hugepage_info[i].lock_descriptor = 0;
+               internal_config.hugepage_info[i].lock_descriptor = -1;
        }
 }
 
@@ -325,22 +378,34 @@ eal_usage(const char *prgname)
               "  -c COREMASK  : A hexadecimal bitmask of cores to run on\n"
               "  -n NUM       : Number of memory channels\n"
                   "  -v           : Display version information on startup\n"
-              "  -b <domain:bus:devid.func>: to prevent EAL from using specified "
-           "PCI device\n"
-              "                 (multiple -b options are allowed)\n"
+              "  -d LIB.so    : add driver (can be used multiple times)\n"
               "  -m MB        : memory to allocate (see also --"OPT_SOCKET_MEM")\n"
               "  -r NUM       : force number of memory ranks (don't detect)\n"
+              "  --"OPT_XEN_DOM0" : support application running on Xen Domain0 "
+                          "without hugetlbfs\n"
               "  --"OPT_SYSLOG"     : set syslog facility\n"
-              "  --"OPT_SOCKET_MEM" : memory to allocate on specific \n"
+              "  --"OPT_LOG_LEVEL"  : set default log level\n"
+              "  --"OPT_SOCKET_MEM" : memory to allocate on specific\n"
                   "                 sockets (use comma separated values)\n"
               "  --"OPT_HUGE_DIR"   : directory where hugetlbfs is mounted\n"
               "  --"OPT_PROC_TYPE"  : type of this process\n"
               "  --"OPT_FILE_PREFIX": prefix for hugepage filenames\n"
-              "  --"OPT_USE_DEVICE": use the specified ethernet device(s) only."
-                          "Use comma-separate <[domain:]bus:devid.func> values.\n"
-              "               [NOTE: Cannot be used with -b option]\n"
-              "  --"OPT_VMWARE_TSC_MAP": use VMware TSC map instead of "
-                          "native RDTSC\n"
+              "  --"OPT_PCI_BLACKLIST", -b: add a PCI device in black list.\n"
+              "               Prevent EAL from using this PCI device. The argument\n"
+              "               format is <domain:bus:devid.func>.\n"
+              "  --"OPT_PCI_WHITELIST", -w: add a PCI device in white list.\n"
+              "               Only use the specified PCI devices. The argument format\n"
+              "               is <[domain:]bus:devid.func>. This option can be present\n"
+              "               several times (once per device).\n"
+              "               [NOTE: PCI whitelist cannot be used with -b option]\n"
+              "  --"OPT_VDEV": add a virtual device.\n"
+              "               The argument format is <driver><id>[,key=val,...]\n"
+              "               (ex: --vdev=eth_pcap0,iface=eth2).\n"
+              "  --"OPT_VMWARE_TSC_MAP": use VMware TSC map instead of native RDTSC\n"
+              "  --"OPT_BASE_VIRTADDR": specify base virtual address\n"
+              "  --"OPT_VFIO_INTR": specify desired interrupt mode for VFIO "
+                          "(legacy|msi|msix)\n"
+              "  --"OPT_CREATE_UIO_DEV": create /dev/uioX (usually done by hotplug)\n"
               "\nEAL options for DEBUG use only:\n"
               "  --"OPT_NO_HUGE"  : use malloc instead of hugetlbfs\n"
               "  --"OPT_NO_PCI"   : disable pci\n"
@@ -376,11 +441,11 @@ rte_set_application_usage_hook( rte_usage_hook_t usage_func )
 static int xdigit2val(unsigned char c)
 {
        int val;
-       if(isdigit(c)) 
+       if(isdigit(c))
                val = c - '0';
        else if(isupper(c))
                val = c - 'A' + 10;
-       else 
+       else
                val = c - 'a' + 10;
        return val;
 }
@@ -403,7 +468,7 @@ eal_parse_coremask(const char *coremask)
        if (coremask[0] == '0' && ((coremask[1] == 'x')
                ||  (coremask[1] == 'X')) )
                coremask += 2;
-       i = strnlen(coremask, MAX_ARG_STRLEN);
+       i = strnlen(coremask, PATH_MAX);
        while ((i > 0) && isblank(coremask[i - 1]))
                i--;
        if (i == 0)
@@ -418,6 +483,11 @@ eal_parse_coremask(const char *coremask)
                val = xdigit2val(c);
                for(j = 0; j < BITS_PER_HEX && idx < RTE_MAX_LCORE; j++, idx++) {
                        if((1 << j) & val) {
+                               if (!lcore_config[idx].detected) {
+                                       RTE_LOG(ERR, EAL, "lcore %u "
+                                               "unavailable\n", idx);
+                                       return -1;
+                               }
                                cfg->lcore_role[idx] = ROLE_RTE;
                                if(count == 0)
                                        cfg->master_lcore = idx;
@@ -434,6 +504,8 @@ eal_parse_coremask(const char *coremask)
                cfg->lcore_role[idx] = ROLE_OFF;
        if(count == 0)
                return -1;
+       /* Update the count of enabled logical cores of the EAL configuration */
+       cfg->lcore_count = count;
        return 0;
 }
 
@@ -476,6 +548,28 @@ eal_parse_syslog(const char *facility)
        return -1;
 }
 
+static int
+eal_parse_log_level(const char *level, uint32_t *log_level)
+{
+       char *end;
+       unsigned long tmp;
+
+       errno = 0;
+       tmp = strtoul(level, &end, 0);
+
+       /* check for errors */
+       if ((errno != 0) || (level[0] == '\0') ||
+           end == NULL || (*end != '\0'))
+               return -1;
+
+       /* log_level is a uint32_t */
+       if (tmp >= UINT32_MAX)
+               return -1;
+
+       *log_level = tmp;
+       return 0;
+}
+
 static int
 eal_parse_socket_mem(char *socket_mem)
 {
@@ -526,6 +620,54 @@ eal_parse_socket_mem(char *socket_mem)
        return 0;
 }
 
+static int
+eal_parse_base_virtaddr(const char *arg)
+{
+       char *end;
+       uint64_t addr;
+
+       errno = 0;
+       addr = strtoull(arg, &end, 16);
+
+       /* check for errors */
+       if ((errno != 0) || (arg[0] == '\0') || end == NULL || (*end != '\0'))
+               return -1;
+
+       /* make sure we don't exceed 32-bit boundary on 32-bit target */
+#ifndef RTE_ARCH_X86_64
+       if (addr >= UINTPTR_MAX)
+               return -1;
+#endif
+
+       /* align the addr on 2M boundary */
+       internal_config.base_virtaddr = RTE_PTR_ALIGN_CEIL((uintptr_t)addr,
+                                                          RTE_PGSIZE_2M);
+
+       return 0;
+}
+
+static int
+eal_parse_vfio_intr(const char *mode)
+{
+       unsigned i;
+       static struct {
+               const char *name;
+               enum rte_intr_mode value;
+       } map[] = {
+               { "legacy", RTE_INTR_MODE_LEGACY },
+               { "msi", RTE_INTR_MODE_MSI },
+               { "msix", RTE_INTR_MODE_MSIX },
+       };
+
+       for (i = 0; i < RTE_DIM(map); i++) {
+               if (!strcmp(mode, map[i].name)) {
+                       internal_config.vfio_intr_mode = map[i].value;
+                       return 0;
+               }
+       }
+       return -1;
+}
+
 static inline size_t
 eal_get_hugepage_mem_size(void)
 {
@@ -557,22 +699,6 @@ eal_parse_proc_type(const char *arg)
        return RTE_PROC_INVALID;
 }
 
-static ssize_t
-eal_parse_blacklist_opt(const char *optarg, size_t idx)
-{
-       if (idx >= sizeof (eal_dev_blacklist) / sizeof (eal_dev_blacklist[0])) {
-               RTE_LOG(ERR, EAL, "%s - too many devices to blacklist...\n", optarg);
-               return (-EINVAL);
-       } else if (eal_parse_pci_DomBDF(optarg, eal_dev_blacklist + idx) < 0 &&
-                       eal_parse_pci_BDF(optarg, eal_dev_blacklist + idx) < 0) {
-               RTE_LOG(ERR, EAL, "%s - invalid device to blacklist...\n", optarg);
-               return (-EINVAL);
-       }
-
-       idx += 1;
-       return (idx);
-}
-
 /* Parse the argument given in the command line of the application */
 static int
 eal_parse_args(int argc, char **argv)
@@ -581,7 +707,6 @@ eal_parse_args(int argc, char **argv)
        char **argvopt;
        int option_index;
        int coremask_ok = 0;
-       ssize_t blacklist_index = 0;
        char *prgname = argv[0];
        static struct option lgopts[] = {
                {OPT_NO_HUGE, 0, 0, 0},
@@ -593,10 +718,18 @@ eal_parse_args(int argc, char **argv)
                {OPT_PROC_TYPE, 1, 0, 0},
                {OPT_FILE_PREFIX, 1, 0, 0},
                {OPT_SOCKET_MEM, 1, 0, 0},
-               {OPT_USE_DEVICE, 1, 0, 0},
+               {OPT_PCI_WHITELIST, 1, 0, 0},
+               {OPT_PCI_BLACKLIST, 1, 0, 0},
+               {OPT_VDEV, 1, 0, 0},
                {OPT_SYSLOG, 1, NULL, 0},
+               {OPT_LOG_LEVEL, 1, NULL, 0},
+               {OPT_VFIO_INTR, 1, NULL, 0},
+               {OPT_BASE_VIRTADDR, 1, 0, 0},
+               {OPT_XEN_DOM0, 0, 0, 0},
+               {OPT_CREATE_UIO_DEV, 1, NULL, 0},
                {0, 0, 0, 0}
        };
+       struct shared_driver *solib;
 
        argvopt = argv;
 
@@ -607,6 +740,11 @@ eal_parse_args(int argc, char **argv)
        internal_config.hugepage_dir = NULL;
        internal_config.force_sockets = 0;
        internal_config.syslog_facility = LOG_DAEMON;
+       /* default value from build option */
+       internal_config.log_level = RTE_LOG_LEVEL;
+       internal_config.xen_dom0_support = 0;
+       /* if set to NONE, interrupt mode is determined automatically */
+       internal_config.vfio_intr_mode = RTE_INTR_MODE_NONE;
 #ifdef RTE_LIBEAL_USE_HPET
        internal_config.no_hpet = 0;
 #else
@@ -618,22 +756,31 @@ eal_parse_args(int argc, char **argv)
 
        /* zero out hugedir descriptors */
        for (i = 0; i < MAX_HUGEPAGE_SIZES; i++)
-               internal_config.hugepage_info[i].lock_descriptor = 0;
+               internal_config.hugepage_info[i].lock_descriptor = -1;
 
        internal_config.vmware_tsc_map = 0;
+       internal_config.base_virtaddr = 0;
 
-       while ((opt = getopt_long(argc, argvopt, "b:c:m:n:r:v",
+       while ((opt = getopt_long(argc, argvopt, "b:w:c:d:m:n:r:v",
                                  lgopts, &option_index)) != EOF) {
 
                switch (opt) {
                /* blacklist */
                case 'b':
-                       if ((blacklist_index = eal_parse_blacklist_opt(optarg,
-                           blacklist_index)) < 0) {
+                       if (rte_eal_devargs_add(RTE_DEVTYPE_BLACKLISTED_PCI,
+                                       optarg) < 0) {
                                eal_usage(prgname);
                                return (-1);
                        }
                        break;
+               /* whitelist */
+               case 'w':
+                       if (rte_eal_devargs_add(RTE_DEVTYPE_WHITELISTED_PCI,
+                                       optarg) < 0) {
+                               eal_usage(prgname);
+                               return -1;
+                       }
+                       break;
                /* coremask */
                case 'c':
                        if (eal_parse_coremask(optarg) < 0) {
@@ -643,6 +790,18 @@ eal_parse_args(int argc, char **argv)
                        }
                        coremask_ok = 1;
                        break;
+               /* force loading of external driver */
+               case 'd':
+                       solib = malloc(sizeof(*solib));
+                       if (solib == NULL) {
+                               RTE_LOG(ERR, EAL, "malloc(solib) failed\n");
+                               return -1;
+                       }
+                       memset(solib, 0, sizeof(*solib));
+                       strncpy(solib->name, optarg, PATH_MAX-1);
+                       solib->name[PATH_MAX-1] = 0;
+                       TAILQ_INSERT_TAIL(&solib_list, solib, next);
+                       break;
                /* size of memory */
                case 'm':
                        internal_config.memory = atoi(optarg);
@@ -681,6 +840,16 @@ eal_parse_args(int argc, char **argv)
                        if (!strcmp(lgopts[option_index].name, OPT_NO_HUGE)) {
                                internal_config.no_hugetlbfs = 1;
                        }
+                       if (!strcmp(lgopts[option_index].name, OPT_XEN_DOM0)) {
+               #ifdef RTE_LIBRTE_XEN_DOM0
+                               internal_config.xen_dom0_support = 1;
+               #else
+                               RTE_LOG(ERR, EAL, "Can't support DPDK app "
+                                       "running on Dom0, please configure"
+                                       " RTE_LIBRTE_XEN_DOM0=y\n");
+                               return -1;
+               #endif
+                       }
                        else if (!strcmp(lgopts[option_index].name, OPT_NO_PCI)) {
                                internal_config.no_pci = 1;
                        }
@@ -710,8 +879,26 @@ eal_parse_args(int argc, char **argv)
                                        return -1;
                                }
                        }
-                       else if (!strcmp(lgopts[option_index].name, OPT_USE_DEVICE)) {
-                               eal_dev_whitelist_add_entry(optarg);
+                       else if (!strcmp(lgopts[option_index].name, OPT_PCI_BLACKLIST)) {
+                               if (rte_eal_devargs_add(RTE_DEVTYPE_BLACKLISTED_PCI,
+                                               optarg) < 0) {
+                                       eal_usage(prgname);
+                                       return -1;
+                               }
+                       }
+                       else if (!strcmp(lgopts[option_index].name, OPT_PCI_WHITELIST)) {
+                               if (rte_eal_devargs_add(RTE_DEVTYPE_WHITELISTED_PCI,
+                                               optarg) < 0) {
+                                       eal_usage(prgname);
+                                       return -1;
+                               }
+                       }
+                       else if (!strcmp(lgopts[option_index].name, OPT_VDEV)) {
+                               if (rte_eal_devargs_add(RTE_DEVTYPE_VIRTUAL,
+                                               optarg) < 0) {
+                                       eal_usage(prgname);
+                                       return -1;
+                               }
                        }
                        else if (!strcmp(lgopts[option_index].name, OPT_SYSLOG)) {
                                if (eal_parse_syslog(optarg) < 0) {
@@ -720,6 +907,43 @@ eal_parse_args(int argc, char **argv)
                                        eal_usage(prgname);
                                        return -1;
                                }
+                       } else if (!strcmp(lgopts[option_index].name,
+                                        OPT_LOG_LEVEL)) {
+                               uint32_t log;
+
+                               if (eal_parse_log_level(optarg, &log) < 0) {
+                                       RTE_LOG(ERR, EAL,
+                                               "invalid parameters for --"
+                                               OPT_LOG_LEVEL "\n");
+                                       eal_usage(prgname);
+                                       return -1;
+                               }
+                               internal_config.log_level = log;
+                       }
+                       else if (!strcmp(lgopts[option_index].name, OPT_BASE_VIRTADDR)) {
+                               if (eal_parse_base_virtaddr(optarg) < 0) {
+                                       RTE_LOG(ERR, EAL, "invalid parameter for --"
+                                                       OPT_BASE_VIRTADDR "\n");
+                                       eal_usage(prgname);
+                                       return -1;
+                               }
+                       }
+                       else if (!strcmp(lgopts[option_index].name, OPT_VFIO_INTR)) {
+                               if (eal_parse_vfio_intr(optarg) < 0) {
+                                       RTE_LOG(ERR, EAL, "invalid parameters for --"
+                                                       OPT_VFIO_INTR "\n");
+                                       eal_usage(prgname);
+                                       return -1;
+                               }
+                       }
+                       else if (!strcmp(lgopts[option_index].name, OPT_CREATE_UIO_DEV)) {
+                               internal_config.create_uio_dev = 1;
+                       } else {
+                               RTE_LOG(ERR, EAL, "Option %s is not supported "
+                                       "on Linux\n",
+                                       lgopts[option_index].name);
+                               eal_usage(prgname);
+                               return -1;
                        }
                        break;
 
@@ -769,21 +993,20 @@ eal_parse_args(int argc, char **argv)
                eal_usage(prgname);
                return -1;
        }
+       /* --xen-dom0 doesn't make sense with --socket-mem */
+       if (internal_config.xen_dom0_support && internal_config.force_sockets == 1) {
+               RTE_LOG(ERR, EAL, "Options --socket-mem cannot be specified "
+                                       "together with --xen_dom0!\n");
+               eal_usage(prgname);
+               return -1;
+       }
 
-       /* if no blacklist, parse a whitelist */
-       if (blacklist_index > 0) {
-               if (eal_dev_whitelist_exists()) {
-                       RTE_LOG(ERR, EAL, "Error: blacklist [-b] and whitelist "
-                                       "[--use-device] options cannot be used at the same time\n");
-                       eal_usage(prgname);
-                       return -1;
-               }
-               rte_eal_pci_set_blacklist(eal_dev_blacklist, blacklist_index);
-       } else {
-               if (eal_dev_whitelist_exists() && eal_dev_whitelist_parse() < 0) {
-                       RTE_LOG(ERR,EAL, "Error parsing whitelist[--use-device] options\n");
-                       return -1;
-               }
+       if (rte_eal_devargs_type_count(RTE_DEVTYPE_WHITELISTED_PCI) != 0 &&
+               rte_eal_devargs_type_count(RTE_DEVTYPE_BLACKLISTED_PCI) != 0) {
+               RTE_LOG(ERR, EAL, "Error: blacklist [-b] and whitelist "
+                       "[-w] options cannot be used at the same time\n");
+               eal_usage(prgname);
+               return -1;
        }
 
        if (optind >= 0)
@@ -824,7 +1047,7 @@ sync_func(__attribute__((unused)) void *arg)
        return 0;
 }
 
-inline static void 
+inline static void
 rte_eal_mcfg_complete(void)
 {
        /* ALL shared mem_config related INIT DONE */
@@ -832,6 +1055,15 @@ rte_eal_mcfg_complete(void)
                rte_config.mem_config->magic = RTE_MAGIC;
 }
 
+/*
+ * Request iopl privilege for all RPL, returns 0 on success
+ */
+static int
+rte_eal_iopl_init(void)
+{
+       return iopl(HIGHEST_RPL);
+}
+
 /* Launch threads, called at application init(). */
 int
 rte_eal_init(int argc, char **argv)
@@ -839,21 +1071,33 @@ rte_eal_init(int argc, char **argv)
        int i, fctret, ret;
        pthread_t thread_id;
        static rte_atomic32_t run_once = RTE_ATOMIC32_INIT(0);
+       struct shared_driver *solib = NULL;
+       const char *logid;
 
        if (!rte_atomic32_test_and_set(&run_once))
                return -1;
 
+       logid = strrchr(argv[0], '/');
+       logid = strdup(logid ? logid + 1: argv[0]);
+
        thread_id = pthread_self();
 
        if (rte_eal_log_early_init() < 0)
                rte_panic("Cannot init early logs\n");
 
+       if (rte_eal_cpu_init() < 0)
+               rte_panic("Cannot detect lcores\n");
+
        fctret = eal_parse_args(argc, argv);
        if (fctret < 0)
                exit(1);
 
+       /* set log level as early as possible */
+       rte_set_log_level(internal_config.log_level);
+
        if (internal_config.no_hugetlbfs == 0 &&
                        internal_config.process_type != RTE_PROC_SECONDARY &&
+                       internal_config.xen_dom0_support == 0 &&
                        eal_hugepage_info_init() < 0)
                rte_panic("Cannot get hugepage information\n");
 
@@ -878,23 +1122,36 @@ rte_eal_init(int argc, char **argv)
        rte_srand(rte_rdtsc());
 
        rte_config_init();
-       
-       if (rte_eal_cpu_init() < 0)
-               rte_panic("Cannot detect lcores\n");
+
+       if (rte_eal_iopl_init() == 0)
+               rte_config.flags |= EAL_FLG_HIGH_IOPL;
+
+       if (rte_eal_pci_init() < 0)
+               rte_panic("Cannot init PCI\n");
+
+#ifdef RTE_LIBRTE_IVSHMEM
+       if (rte_eal_ivshmem_init() < 0)
+               rte_panic("Cannot init IVSHMEM\n");
+#endif
 
        if (rte_eal_memory_init() < 0)
                rte_panic("Cannot init memory\n");
 
        /* the directories are locked during eal_hugepage_info_init */
        eal_hugedirs_unlock();
-       
+
        if (rte_eal_memzone_init() < 0)
                rte_panic("Cannot init memzone\n");
 
        if (rte_eal_tailqs_init() < 0)
                rte_panic("Cannot init tail queues for objects\n");
 
-       if (rte_eal_log_init(argv[0], internal_config.syslog_facility) < 0)
+#ifdef RTE_LIBRTE_IVSHMEM
+       if (rte_eal_ivshmem_obj_init() < 0)
+               rte_panic("Cannot init IVSHMEM objects\n");
+#endif
+
+       if (rte_eal_log_init(logid, internal_config.syslog_facility) < 0)
                rte_panic("Cannot init logs\n");
 
        if (rte_eal_alarm_init() < 0)
@@ -906,15 +1163,24 @@ rte_eal_init(int argc, char **argv)
        if (rte_eal_timer_init() < 0)
                rte_panic("Cannot init HPET or TSC timers\n");
 
-       if (rte_eal_pci_init() < 0)
-               rte_panic("Cannot init PCI\n");
+       eal_check_mem_on_local_socket();
+
+       rte_eal_mcfg_complete();
+
+       TAILQ_FOREACH(solib, &solib_list, next) {
+               RTE_LOG(INFO, EAL, "open shared lib %s\n", solib->name);
+               solib->lib_handle = dlopen(solib->name, RTLD_NOW);
+               if (solib->lib_handle == NULL)
+                       RTE_LOG(WARNING, EAL, "%s\n", dlerror());
+       }
+
+       eal_thread_init_master(rte_config.master_lcore);
 
        RTE_LOG(DEBUG, EAL, "Master core %u is ready (tid=%x)\n",
                rte_config.master_lcore, (int)thread_id);
 
-       eal_check_mem_on_local_socket();
-
-       rte_eal_mcfg_complete();
+       if (rte_eal_dev_init(PMD_INIT_PRE_PCI_PROBE) < 0)
+               rte_panic("Cannot init pmd devices\n");
 
        RTE_LCORE_FOREACH_SLAVE(i) {
 
@@ -936,8 +1202,6 @@ rte_eal_init(int argc, char **argv)
                        rte_panic("Cannot create thread\n");
        }
 
-       eal_thread_init_master(rte_config.master_lcore);
-
        /*
         * Launch a dummy function on all slave lcores, so that master lcore
         * knows they are all ready when this function returns.
@@ -945,6 +1209,14 @@ rte_eal_init(int argc, char **argv)
        rte_eal_mp_remote_launch(sync_func, NULL, SKIP_MASTER);
        rte_eal_mp_wait_lcore();
 
+       /* Probe & Initialize PCI devices */
+       if (rte_eal_pci_probe())
+                       rte_panic("Cannot probe PCI\n");
+
+       /* Initialize any outstanding devices */
+       if (rte_eal_dev_init(PMD_INIT_POST_PCI_PROBE) < 0)
+               rte_panic("Cannot init pmd devices\n");
+
        return fctret;
 }
 
@@ -961,3 +1233,7 @@ rte_eal_process_type(void)
        return (rte_config.process_type);
 }
 
+int rte_eal_has_hugepages(void)
+{
+       return ! internal_config.no_hugetlbfs;
+}