[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-changelog] Remove definition of NR_PIRQS and replace all uses with
# HG changeset patch # User kaf24@xxxxxxxxxxxxxxxxxxxx # Node ID 0ee104bd65570382ac408ccaa480192d9d047452 # Parent 42a8e3101c6c45687d74a213abb3a2723f2cac62 Remove definition of NR_PIRQS and replace all uses with NR_IRQS. Allows removal of redundant check in pirq_guest_bind(). Signed-off-by: Keir Fraser <keir@xxxxxxxxxxxxx> diff -r 42a8e3101c6c -r 0ee104bd6557 xen/arch/ia64/xen/domain.c --- a/xen/arch/ia64/xen/domain.c Sun Apr 30 09:16:15 2006 +0100 +++ b/xen/arch/ia64/xen/domain.c Sun Apr 30 09:26:01 2006 +0100 @@ -1237,7 +1237,7 @@ static void physdev_init_dom0(struct dom { if (iomem_permit_access(d, 0UL, ~0UL)) BUG(); - if (irqs_permit_access(d, 0, NR_PIRQS-1)) + if (irqs_permit_access(d, 0, NR_IRQS-1)) BUG(); } diff -r 42a8e3101c6c -r 0ee104bd6557 xen/arch/ia64/xen/irq.c --- a/xen/arch/ia64/xen/irq.c Sun Apr 30 09:16:15 2006 +0100 +++ b/xen/arch/ia64/xen/irq.c Sun Apr 30 09:26:01 2006 +0100 @@ -435,9 +435,9 @@ int pirq_guest_unmask(struct domain *d) int irq; shared_info_t *s = d->shared_info; - for ( irq = find_first_bit(d->pirq_mask, NR_PIRQS); - irq < NR_PIRQS; - irq = find_next_bit(d->pirq_mask, NR_PIRQS, irq+1) ) + for ( irq = find_first_bit(d->pirq_mask, NR_IRQS); + irq < NR_IRQS; + irq = find_next_bit(d->pirq_mask, NR_IRQS, irq+1) ) { desc = &irq_desc[irq]; spin_lock_irq(&desc->lock); diff -r 42a8e3101c6c -r 0ee104bd6557 xen/arch/x86/domain_build.c --- a/xen/arch/x86/domain_build.c Sun Apr 30 09:16:15 2006 +0100 +++ b/xen/arch/x86/domain_build.c Sun Apr 30 09:26:01 2006 +0100 @@ -809,7 +809,7 @@ int construct_dom0(struct domain *d, /* DOM0 is permitted full I/O capabilities. */ rc |= ioports_permit_access(dom0, 0, 0xFFFF); rc |= iomem_permit_access(dom0, 0UL, ~0UL); - rc |= irqs_permit_access(dom0, 0, NR_PIRQS-1); + rc |= irqs_permit_access(dom0, 0, NR_IRQS-1); /* * Modify I/O port access permissions. diff -r 42a8e3101c6c -r 0ee104bd6557 xen/arch/x86/i8259.c --- a/xen/arch/x86/i8259.c Sun Apr 30 09:16:15 2006 +0100 +++ b/xen/arch/x86/i8259.c Sun Apr 30 09:26:01 2006 +0100 @@ -19,6 +19,7 @@ #include <asm/bitops.h> #include <xen/delay.h> #include <asm/apic.h> +#include <asm/asm_defns.h> #include <io_ports.h> /* diff -r 42a8e3101c6c -r 0ee104bd6557 xen/arch/x86/irq.c --- a/xen/arch/x86/irq.c Sun Apr 30 09:16:15 2006 +0100 +++ b/xen/arch/x86/irq.c Sun Apr 30 09:26:01 2006 +0100 @@ -356,9 +356,9 @@ int pirq_guest_unmask(struct domain *d) unsigned int irq; shared_info_t *s = d->shared_info; - for ( irq = find_first_bit(d->pirq_mask, NR_PIRQS); - irq < NR_PIRQS; - irq = find_next_bit(d->pirq_mask, NR_PIRQS, irq+1) ) + for ( irq = find_first_bit(d->pirq_mask, NR_IRQS); + irq < NR_IRQS; + irq = find_next_bit(d->pirq_mask, NR_IRQS, irq+1) ) { if ( !test_bit(d->pirq_to_evtchn[irq], s->evtchn_mask) ) __pirq_guest_eoi(d, irq); @@ -409,9 +409,6 @@ int pirq_guest_bind(struct vcpu *v, int unsigned long flags; int rc = 0; cpumask_t cpumask = CPU_MASK_NONE; - - if ( (irq < 0) || (irq >= NR_IRQS) ) - return -EINVAL; retry: vector = irq_to_vector(irq); diff -r 42a8e3101c6c -r 0ee104bd6557 xen/arch/x86/x86_32/traps.c --- a/xen/arch/x86/x86_32/traps.c Sun Apr 30 09:16:15 2006 +0100 +++ b/xen/arch/x86/x86_32/traps.c Sun Apr 30 09:26:01 2006 +0100 @@ -243,6 +243,7 @@ unsigned long do_iret(void) return regs->eax; } +#include <asm/asm_defns.h> BUILD_SMP_INTERRUPT(deferred_nmi, TRAP_deferred_nmi) fastcall void smp_deferred_nmi(struct cpu_user_regs *regs) { diff -r 42a8e3101c6c -r 0ee104bd6557 xen/common/dom0_ops.c --- a/xen/common/dom0_ops.c Sun Apr 30 09:16:15 2006 +0100 +++ b/xen/common/dom0_ops.c Sun Apr 30 09:26:01 2006 +0100 @@ -641,7 +641,7 @@ long do_dom0_op(XEN_GUEST_HANDLE(dom0_op unsigned int pirq = op->u.irq_permission.pirq; ret = -EINVAL; - if ( pirq >= NR_PIRQS ) + if ( pirq >= NR_IRQS ) break; ret = -ESRCH; diff -r 42a8e3101c6c -r 0ee104bd6557 xen/include/asm-x86/irq.h --- a/xen/include/asm-x86/irq.h Sun Apr 30 09:16:15 2006 +0100 +++ b/xen/include/asm-x86/irq.h Sun Apr 30 09:26:01 2006 +0100 @@ -5,7 +5,6 @@ #include <xen/config.h> #include <asm/atomic.h> -#include <asm/asm_defns.h> #include <irq_vectors.h> #define IO_APIC_IRQ(irq) (((irq) >= 16) || ((1<<(irq)) & io_apic_irqs)) diff -r 42a8e3101c6c -r 0ee104bd6557 xen/include/xen/sched.h --- a/xen/include/xen/sched.h Sun Apr 30 09:16:15 2006 +0100 +++ b/xen/include/xen/sched.h Sun Apr 30 09:26:01 2006 +0100 @@ -15,6 +15,7 @@ #include <xen/rangeset.h> #include <asm/domain.h> #include <xen/xenoprof.h> +#include <xen/irq.h> extern unsigned long volatile jiffies; extern rwlock_t domlist_lock; @@ -132,9 +133,8 @@ struct domain * domain's event-channel spinlock. Read accesses can also synchronise on * the lock, but races don't usually matter. */ -#define NR_PIRQS 256 /* Put this somewhere sane! */ - u16 pirq_to_evtchn[NR_PIRQS]; - DECLARE_BITMAP(pirq_mask, NR_PIRQS); + u16 pirq_to_evtchn[NR_IRQS]; + DECLARE_BITMAP(pirq_mask, NR_IRQS); /* I/O capabilities (access to IRQs and memory-mapped I/O). */ struct rangeset *iomem_caps; _______________________________________________ Xen-changelog mailing list Xen-changelog@xxxxxxxxxxxxxxxxxxx http://lists.xensource.com/xen-changelog
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |