[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-changelog] [xen-unstable] [IA64] Remove VALIDATE_VT code



# HG changeset patch
# User awilliam@xxxxxxxxxxxx
# Date 1169567319 25200
# Node ID b3c79bad5de0d9c9e70559e0277a6b11948e5cf4
# Parent  58637a0a7c7e66ecaeebb7608df44f6bbf0afc04
[IA64] Remove VALIDATE_VT code

Signed-off-by: Zhang Xin <xing.z.zhang@xxxxxxxxx>
---
 xen/arch/ia64/Rules.mk         |    4 ----
 xen/arch/ia64/linux-xen/head.S |   16 ----------------
 xen/arch/ia64/xen/domain.c     |   31 -------------------------------
 xen/include/asm-ia64/config.h  |    4 ----
 4 files changed, 55 deletions(-)

diff -r 58637a0a7c7e -r b3c79bad5de0 xen/arch/ia64/Rules.mk
--- a/xen/arch/ia64/Rules.mk    Wed Jan 17 21:45:34 2007 -0700
+++ b/xen/arch/ia64/Rules.mk    Tue Jan 23 08:48:39 2007 -0700
@@ -4,7 +4,6 @@ HAS_ACPI := y
 HAS_ACPI := y
 HAS_VGA  := y
 xenoprof := y
-VALIDATE_VT    ?= n
 no_warns ?= n
 xen_ia64_expose_p2m    ?= y
 xen_ia64_pervcpu_vhpt  ?= y
@@ -37,9 +36,6 @@ CFLAGS        += -ffixed-r13 -mfixed-range=f2-f
 CFLAGS += -ffixed-r13 -mfixed-range=f2-f5,f12-f127
 CFLAGS += -g
 #CFLAGS  += -DVTI_DEBUG
-ifeq ($(VALIDATE_VT),y)
-CFLAGS  += -DVALIDATE_VT
-endif
 ifeq ($(xen_ia64_expose_p2m),y)
 CFLAGS += -DCONFIG_XEN_IA64_EXPOSE_P2M
 endif
diff -r 58637a0a7c7e -r b3c79bad5de0 xen/arch/ia64/linux-xen/head.S
--- a/xen/arch/ia64/linux-xen/head.S    Wed Jan 17 21:45:34 2007 -0700
+++ b/xen/arch/ia64/linux-xen/head.S    Tue Jan 23 08:48:39 2007 -0700
@@ -267,13 +267,8 @@ start_ap:
        /*
         * Switch into virtual mode:
         */
-#if defined(XEN) && defined(VALIDATE_VT)
-       movl r16=(IA64_PSR_IT|IA64_PSR_IC|IA64_PSR_DT|IA64_PSR_RT|IA64_PSR_DFH\
-                 |IA64_PSR_DI)
-#else
        movl 
r16=(IA64_PSR_IT|IA64_PSR_IC|IA64_PSR_DT|IA64_PSR_RT|IA64_PSR_DFH|IA64_PSR_BN \
                  |IA64_PSR_DI)
-#endif
        ;;
        mov cr.ipsr=r16
        movl r17=1f
@@ -292,11 +287,7 @@ 1: // now we are in virtual mode
        ;;
 
        // set IVT entry point---can't access I/O ports without it
-#if defined(XEN) && defined(VALIDATE_VT)
-       movl r3=vmx_ia64_ivt
-#else
        movl r3=ia64_ivt
-#endif
        ;;
        mov cr.iva=r3
        movl r2=FPSR_DEFAULT
@@ -368,15 +359,8 @@ 1: // now we are in virtual mode
        
 .load_current:
        // load the "current" pointer (r13) and ar.k6 with the current task
-#if defined(XEN) && defined(VALIDATE_VT)
-       mov r21=r2
-       ;;
-       bsw.1
-       ;;
-#else
        mov IA64_KR(CURRENT)=r2         // virtual address
        mov IA64_KR(CURRENT_STACK)=r16
-#endif
        mov r13=r2
        /*
         * Reserve space at the top of the stack for "struct pt_regs".  Kernel
diff -r 58637a0a7c7e -r b3c79bad5de0 xen/arch/ia64/xen/domain.c
--- a/xen/arch/ia64/xen/domain.c        Wed Jan 17 21:45:34 2007 -0700
+++ b/xen/arch/ia64/xen/domain.c        Tue Jan 23 08:48:39 2007 -0700
@@ -996,12 +996,6 @@ int construct_dom0(struct domain *d,
        unsigned long bp_mpa;
        struct ia64_boot_param *bp;
 
-#ifdef VALIDATE_VT
-       unsigned int vmx_dom0 = 0;
-       unsigned long mfn;
-       struct page_info *page = NULL;
-#endif
-
 //printk("construct_dom0: starting\n");
 
        /* Sanity! */
@@ -1021,23 +1015,6 @@ int construct_dom0(struct domain *d,
        rc = parseelfimage(&dsi);
        if ( rc != 0 )
            return rc;
-
-#ifdef VALIDATE_VT
-       /* Temp workaround */
-       if (running_on_sim)
-           dsi.xen_section_string = (char *)1;
-
-       /* Check whether dom0 is vti domain */
-       if ((!vmx_enabled) && !dsi.xen_section_string) {
-           printk("Lack of hardware support for unmodified vmx dom0\n");
-           panic("");
-       }
-
-       if (vmx_enabled && !dsi.xen_section_string) {
-           printk("Dom0 is vmx domain!\n");
-           vmx_dom0 = 1;
-       }
-#endif
 
        p_start = dsi.v_start;
        pkern_start = dsi.v_kernstart;
@@ -1132,14 +1109,6 @@ int construct_dom0(struct domain *d,
 
        printk("Dom0: 0x%lx\n", (u64)dom0);
 
-#ifdef VALIDATE_VT
-       /* VMX specific construction for Dom0, if hardware supports VMX
-        * and Dom0 is unmodified image
-        */
-       if (vmx_dom0)
-           vmx_final_setup_guest(v);
-#endif
-
        set_bit(_VCPUF_initialised, &v->vcpu_flags);
 
        /* Build firmware.
diff -r 58637a0a7c7e -r b3c79bad5de0 xen/include/asm-ia64/config.h
--- a/xen/include/asm-ia64/config.h     Wed Jan 17 21:45:34 2007 -0700
+++ b/xen/include/asm-ia64/config.h     Tue Jan 23 08:48:39 2007 -0700
@@ -183,11 +183,7 @@ void sort_main_extable(void);
 #define find_first_set_bit(x)  (ffs(x)-1)      // FIXME: Is this right???
 
 // see drivers/char/console.c
-#ifndef VALIDATE_VT
 #define        OPT_CONSOLE_STR "com1"
-#else
-#define        OPT_CONSOLE_STR "com2"
-#endif
 
 #define __nocast
 

_______________________________________________
Xen-changelog mailing list
Xen-changelog@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-changelog


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.