From 275c052dac52c397e933a01f80022e6472d5adf9 Mon Sep 17 00:00:00 2001 From: Keir Fraser Date: Thu, 11 Feb 2010 19:48:58 +0000 Subject: [PATCH] VT-d: ensure zapping ACPI DMAR signature in acpi_parse_dmar VT-d is owned by Xen hypervisor. Xen zaps ACPI DMAR signature to prevent dom0 to use VT-d. This patch changes the direct return when DMAR width is zero, instead zaps ACPI DMAR signature before return. Signed-off-by: Weidong Han --- xen/drivers/passthrough/vtd/dmar.c | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/xen/drivers/passthrough/vtd/dmar.c b/xen/drivers/passthrough/vtd/dmar.c index 544d0115b8..5ed4877b1d 100644 --- a/xen/drivers/passthrough/vtd/dmar.c +++ b/xen/drivers/passthrough/vtd/dmar.c @@ -623,7 +623,8 @@ static int __init acpi_parse_dmar(struct acpi_table_header *table) if ( !dmar->width ) { dprintk(XENLOG_WARNING VTDPREFIX, "Zero: Invalid DMAR width\n"); - return -EINVAL; + ret = -EINVAL; + goto out; } dmar_host_address_width = dmar->width + 1; -- 2.30.2