[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-changelog] [IA64] Remove unused variables. init_mm and swapper_pg_dir.



# HG changeset patch
# User awilliam@xxxxxxxxxxx
# Node ID bdb08c9ef3d1905721484c47634a019defb79abb
# Parent  f6e8c269f6afbfd7ea98b419e876e175803ea8e6
[IA64] Remove unused variables. init_mm and swapper_pg_dir.

Signed-off-by: Kouya Shimura <kouya@xxxxxxxxxxxxxx>

diff -r f6e8c269f6af -r bdb08c9ef3d1 xen/arch/ia64/linux-xen/head.S
--- a/xen/arch/ia64/linux-xen/head.S    Mon Apr 17 08:46:04 2006 -0600
+++ b/xen/arch/ia64/linux-xen/head.S    Mon Apr 17 08:46:52 2006 -0600
@@ -178,9 +178,11 @@ empty_zero_page:
 empty_zero_page:
        .skip PAGE_SIZE
 
+#ifndef XEN
        .global swapper_pg_dir
 swapper_pg_dir:
        .skip PAGE_SIZE
+#endif
 
 #if defined(XEN) && defined(CONFIG_VIRTUAL_FRAME_TABLE)
        .global frametable_pg_dir
diff -r f6e8c269f6af -r bdb08c9ef3d1 xen/arch/ia64/linux-xen/setup.c
--- a/xen/arch/ia64/linux-xen/setup.c   Mon Apr 17 08:46:04 2006 -0600
+++ b/xen/arch/ia64/linux-xen/setup.c   Mon Apr 17 08:46:52 2006 -0600
@@ -859,8 +859,8 @@ cpu_init (void)
        ia64_setreg(_IA64_REG_CR_DCR,  (  IA64_DCR_DP | IA64_DCR_DK | 
IA64_DCR_DX | IA64_DCR_DR
                                        | IA64_DCR_DA | IA64_DCR_DD | 
IA64_DCR_LC));
 #endif
+#ifndef XEN
        atomic_inc(&init_mm.mm_count);
-#ifndef XEN
        current->active_mm = &init_mm;
 #endif
 #ifdef XEN
diff -r f6e8c269f6af -r bdb08c9ef3d1 xen/arch/ia64/xen/idle0_task.c
--- a/xen/arch/ia64/xen/idle0_task.c    Mon Apr 17 08:46:04 2006 -0600
+++ b/xen/arch/ia64/xen/idle0_task.c    Mon Apr 17 08:46:52 2006 -0600
@@ -1,24 +1,12 @@
 #include <xen/config.h>
 #include <xen/sched.h>
 #include <asm/desc.h>
-
-#define INIT_MM(name) \
-{                                                              \
-       .pgd            = swapper_pg_dir,                       \
-       .mm_users       = ATOMIC_INIT(2),                       \
-       .mm_count       = ATOMIC_INIT(1),                       \
-       .page_table_lock =  SPIN_LOCK_UNLOCKED,                 \
-       .mmlist         = LIST_HEAD_INIT(name.mmlist),          \
-}
 
 #define IDLE_VCPU(_v)               \
 {                                    \
     processor:   0,                  \
     domain:      0                   \
 }
-
-struct mm_struct init_mm = INIT_MM(init_mm);
-EXPORT_SYMBOL(init_mm);
 
 /*
  * Initial task structure.
diff -r f6e8c269f6af -r bdb08c9ef3d1 xen/arch/ia64/xen/ivt.S
--- a/xen/arch/ia64/xen/ivt.S   Mon Apr 17 08:46:04 2006 -0600
+++ b/xen/arch/ia64/xen/ivt.S   Mon Apr 17 08:46:52 2006 -0600
@@ -116,6 +116,9 @@ ia64_ivt:
 // 0x0000 Entry 0 (size 64 bundles) VHPT Translation (8,20,47)
 ENTRY(vhpt_miss)
        DBG_FAULT(0)
+#ifdef XEN
+       FAULT(0)
+#else
        /*
         * The VHPT vector is invoked when the TLB entry for the virtual page 
table
         * is missing.  This happens only as a result of a previous
@@ -141,11 +144,7 @@ ENTRY(vhpt_miss)
        ;;
        rsm psr.dt                              // use physical addressing for 
data
        mov r31=pr                              // save the predicate registers
-#ifdef XEN
-       movl r19=THIS_CPU(cpu_kr)+IA64_KR_PT_BASE_OFFSET;;
-#else
        mov r19=IA64_KR(PT_BASE)                // get page table base address
-#endif
        shl r21=r16,3                           // shift bit 60 into sign bit
        shr.u r17=r16,61                        // get the region number into 
r17
        ;;
@@ -241,6 +240,7 @@ ENTRY(vhpt_miss)
 
        mov pr=r31,-1                           // restore predicate registers
        rfi
+#endif
 END(vhpt_miss)
 
        .org ia64_ivt+0x400
@@ -625,7 +625,7 @@ ENTRY(nested_dtlb_miss)
        mov b0=r30
        br.sptk.many b0                         // return to continuation point
        ;;
-#endif
+#else
        /*
         * In the absence of kernel bugs, we get here when the virtually mapped 
linear
         * page table is accessed non-speculatively (e.g., in the Dirty-bit, 
Instruction
@@ -649,11 +649,7 @@ ENTRY(nested_dtlb_miss)
         * Clobbered:   b0, r18, r19, r21, psr.dt (cleared)
         */
        rsm psr.dt                              // switch to using physical 
data addressing
-#ifdef XEN
-       movl r19=THIS_CPU(cpu_kr)+IA64_KR_PT_BASE_OFFSET;;
-#else
        mov r19=IA64_KR(PT_BASE)                // get the page table base 
address
-#endif
        shl r21=r16,3                           // shift bit 60 into sign bit
        ;;
        shr.u r17=r16,61                        // get the region number into 
r17
@@ -688,6 +684,7 @@ ENTRY(nested_dtlb_miss)
 (p6)   br.cond.spnt page_fault
        mov b0=r30
        br.sptk.many b0                         // return to continuation point
+#endif
 END(nested_dtlb_miss)
 
        .org ia64_ivt+0x1800

_______________________________________________
Xen-changelog mailing list
Xen-changelog@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-changelog


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.