ia64/xen-unstable

changeset 16063:4881f984e06e

This patch ensures xen vmm has exclusive access of vt-d hw by zapping
vt-d "DMAR" ACPI table signature after xen has finished using it.

Signed-off-by: Allen Kay <allen.m.kay@intel.com>
author Keir Fraser <keir@xensource.com>
date Thu Oct 04 09:40:31 2007 +0100 (2007-10-04)
parents 5a9c89cd5c7e
children 6903e3f3bdd6
files xen/arch/x86/hvm/vmx/vtd/dmar.c
line diff
     1.1 --- a/xen/arch/x86/hvm/vmx/vtd/dmar.c	Thu Oct 04 09:39:40 2007 +0100
     1.2 +++ b/xen/arch/x86/hvm/vmx/vtd/dmar.c	Thu Oct 04 09:40:31 2007 +0100
     1.3 @@ -483,6 +483,10 @@ acpi_parse_dmar(unsigned long phys_addr,
     1.4  
     1.5          entry_header = ((void *)entry_header + entry_header->length);
     1.6      }
     1.7 +
     1.8 +    /* Zap APCI DMAR signature to prevent dom0 using vt-d HW. */
     1.9 +    dmar->header.signature[0] = '\0';
    1.10 +
    1.11      return ret;
    1.12  }
    1.13