[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-changelog] [IA64] remove remaining asm warnings



# HG changeset patch
# User awilliam@xxxxxxxxxxx
# Node ID 4174856876f953d82f084c54c6dfc494f4d1a9db
# Parent  fcfc614d3713dabfc625ec5e453ced4845d654d3
[IA64] remove remaining asm warnings

Fix all remaining warnings generated by gas.
Enforce the no gas warnings by using --fatal-warnings gas flag.

Signed-off-by: Tristan Gingold <tristan.gingold@xxxxxxxx>

diff -r fcfc614d3713 -r 4174856876f9 xen/arch/ia64/Rules.mk
--- a/xen/arch/ia64/Rules.mk    Wed Apr 26 12:44:45 2006 -0600
+++ b/xen/arch/ia64/Rules.mk    Wed Apr 26 12:50:42 2006 -0600
@@ -9,7 +9,7 @@ CROSS_COMPILE ?= /usr/local/sp_env/v2.2.
 CROSS_COMPILE ?= /usr/local/sp_env/v2.2.5/i686/bin/ia64-unknown-linux-
 endif
 AFLAGS  += -D__ASSEMBLY__ -nostdinc $(CPPFLAGS)
-AFLAGS  += -mconstant-gp
+AFLAGS  += -mconstant-gp -Wa,--fatal-warnings
 CPPFLAGS  += -I$(BASEDIR)/include -I$(BASEDIR)/include/asm-ia64        \
              -I$(BASEDIR)/include/asm-ia64/linux                       \
             -I$(BASEDIR)/include/asm-ia64/linux-xen                    \
@@ -17,7 +17,7 @@ CPPFLAGS  += -I$(BASEDIR)/include -I$(BA
              -I$(BASEDIR)/arch/ia64/linux -I$(BASEDIR)/arch/ia64/linux-xen
 
 CFLAGS  += -nostdinc -fno-builtin -fno-common -fno-strict-aliasing
-CFLAGS  += -mconstant-gp
+CFLAGS  += -mconstant-gp -Wa,--fatal-warnings
 #CFLAGS  += -O3                # -O3 over-inlines making debugging tough!
 CFLAGS  += -O2         # but no optimization causes compile errors!
 #CFLAGS  += -iwithprefix include -Wall -DMONITOR_BASE=$(MONITOR_BASE)
diff -r fcfc614d3713 -r 4174856876f9 xen/arch/ia64/linux-xen/entry.S
--- a/xen/arch/ia64/linux-xen/entry.S   Wed Apr 26 12:44:45 2006 -0600
+++ b/xen/arch/ia64/linux-xen/entry.S   Wed Apr 26 12:50:42 2006 -0600
@@ -899,6 +899,7 @@ GLOBAL_ENTRY(ia64_leave_kernel)
 #endif
 .work_processed_kernel:
 #ifdef XEN
+       ;;
 (pUStk) ssm psr.i
 (pUStk)    br.call.sptk.many b0=process_soft_irq
 (pUStk) rsm psr.i
diff -r fcfc614d3713 -r 4174856876f9 xen/arch/ia64/linux-xen/head.S
--- a/xen/arch/ia64/linux-xen/head.S    Wed Apr 26 12:44:45 2006 -0600
+++ b/xen/arch/ia64/linux-xen/head.S    Wed Apr 26 12:50:42 2006 -0600
@@ -363,8 +363,8 @@ 1:  // now we are in virtual mode
        ;;
        ssm psr.ic
        srlz.d
+#endif
        ;;
-#endif
        
 .load_current:
        // load the "current" pointer (r13) and ar.k6 with the current task
diff -r fcfc614d3713 -r 4174856876f9 xen/arch/ia64/linux-xen/unaligned.c
--- a/xen/arch/ia64/linux-xen/unaligned.c       Wed Apr 26 12:44:45 2006 -0600
+++ b/xen/arch/ia64/linux-xen/unaligned.c       Wed Apr 26 12:50:42 2006 -0600
@@ -921,8 +921,6 @@ setfpreg (unsigned long regnum, struct i
                regs->f##reg.u.bits[1] = fpval->u.bits[1] ;     \
                break
        switch(regnum) {
-               CASE_FIXED_FP(0);
-               CASE_FIXED_FP(1);
                CASE_FIXED_FP(2);
                CASE_FIXED_FP(3);
                CASE_FIXED_FP(4);
diff -r fcfc614d3713 -r 4174856876f9 xen/arch/ia64/vmx/vmx_ivt.S
--- a/xen/arch/ia64/vmx/vmx_ivt.S       Wed Apr 26 12:44:45 2006 -0600
+++ b/xen/arch/ia64/vmx/vmx_ivt.S       Wed Apr 26 12:50:42 2006 -0600
@@ -379,7 +379,7 @@ ENTRY(vmx_dirty_bit)
 ENTRY(vmx_dirty_bit)
     VMX_DBG_FAULT(8)
        VMX_REFLECT(8)
-END(vmx_idirty_bit)
+END(vmx_dirty_bit)
 
        .org vmx_ia64_ivt+0x2400
 
/////////////////////////////////////////////////////////////////////////////////////////
diff -r fcfc614d3713 -r 4174856876f9 xen/arch/ia64/vmx/vmx_phy_mode.c
--- a/xen/arch/ia64/vmx/vmx_phy_mode.c  Wed Apr 26 12:44:45 2006 -0600
+++ b/xen/arch/ia64/vmx/vmx_phy_mode.c  Wed Apr 26 12:50:42 2006 -0600
@@ -193,29 +193,38 @@ vmx_load_all_rr(VCPU *vcpu)
                phy_rr.ve = 1;
 
                ia64_set_rr((VRN0 << VRN_SHIFT), phy_rr.rrval);
+               ia64_dv_serialize_data();
                phy_rr.rrval = vcpu->arch.metaphysical_rr4;
                //phy_rr.ps = PAGE_SHIFT;
                phy_rr.ve = 1;
 
                ia64_set_rr((VRN4 << VRN_SHIFT), phy_rr.rrval);
+               ia64_dv_serialize_data();
        } else {
                ia64_set_rr((VRN0 << VRN_SHIFT),
                             vrrtomrr(vcpu, VMX(vcpu, vrr[VRN0])));
+               ia64_dv_serialize_data();
                ia64_set_rr((VRN4 << VRN_SHIFT),
                             vrrtomrr(vcpu, VMX(vcpu, vrr[VRN4])));
+               ia64_dv_serialize_data();
        }
 
        /* rr567 will be postponed to last point when resuming back to guest */
        ia64_set_rr((VRN1 << VRN_SHIFT),
                     vrrtomrr(vcpu, VMX(vcpu, vrr[VRN1])));
+       ia64_dv_serialize_data();
        ia64_set_rr((VRN2 << VRN_SHIFT),
                     vrrtomrr(vcpu, VMX(vcpu, vrr[VRN2])));
+       ia64_dv_serialize_data();
        ia64_set_rr((VRN3 << VRN_SHIFT),
                     vrrtomrr(vcpu, VMX(vcpu, vrr[VRN3])));
+       ia64_dv_serialize_data();
        ia64_set_rr((VRN5 << VRN_SHIFT),
                     vrrtomrr(vcpu, VMX(vcpu, vrr[VRN5])));
+       ia64_dv_serialize_data();
        ia64_set_rr((VRN6 << VRN_SHIFT),
                     vrrtomrr(vcpu, VMX(vcpu, vrr[VRN6])));
+       ia64_dv_serialize_data();
        vmx_switch_rr7(vrrtomrr(vcpu,VMX(vcpu, vrr[VRN7])),
                        (void *)vcpu->domain->shared_info,
                        (void *)vcpu->arch.privregs,
diff -r fcfc614d3713 -r 4174856876f9 xen/arch/ia64/xen/hyperprivop.S
--- a/xen/arch/ia64/xen/hyperprivop.S   Wed Apr 26 12:44:45 2006 -0600
+++ b/xen/arch/ia64/xen/hyperprivop.S   Wed Apr 26 12:50:42 2006 -0600
@@ -2087,7 +2087,6 @@ GLOBAL_ENTRY(fast_insert)
 (p6)   itc.d r22;;
 (p7)   itc.i r22;;
        dv_serialize_data
-       // FIXME: how do I make assembler warnings go away here?
        // vhpt_insert(r23=vaddr,r22=pte,r24=logps<<2)
        thash r28=r23
        or r26=1,r22;;
diff -r fcfc614d3713 -r 4174856876f9 xen/include/asm-ia64/config.h
--- a/xen/include/asm-ia64/config.h     Wed Apr 26 12:44:45 2006 -0600
+++ b/xen/include/asm-ia64/config.h     Wed Apr 26 12:50:42 2006 -0600
@@ -277,4 +277,8 @@ extern int ht_per_core;
 #define FORCE_CRASH    break.m 0;;
 #endif
 
+/* Allow .serialize.data/instruction in asm files.
+   Old as doesn't handle this.  */
+#define HAVE_SERIALIZE_DIRECTIVE
+
 #endif /* _IA64_CONFIG_H_ */

_______________________________________________
Xen-changelog mailing list
Xen-changelog@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-changelog


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.