[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-changelog] [xen-unstable] [IA64] Cleanup ivt.S
# HG changeset patch # User Alex Williamson <alex.williamson@xxxxxx> # Date 1180633058 21600 # Node ID 7476a0ea8ee4d21c083718d634d482e65ddb25ae # Parent b1b80a14d0238436d997123a09547d6cd0431583 [IA64] Cleanup ivt.S xen/ivt.S is full of #ifndef XEN conditionnal parts. However they are not maintained and there is no reason to update with linux ivt.S (very very different). To make the code more readable I remove the conditional parts. Signed-off-by: Tristan Gingold <tgingold@xxxxxxx> --- xen/arch/ia64/xen/ivt.S | 953 ------------------------------------------------ 1 files changed, 953 deletions(-) diff -r b1b80a14d023 -r 7476a0ea8ee4 xen/arch/ia64/xen/ivt.S --- a/xen/arch/ia64/xen/ivt.S Thu May 31 11:25:46 2007 -0600 +++ b/xen/arch/ia64/xen/ivt.S Thu May 31 11:37:38 2007 -0600 @@ -1,9 +1,7 @@ -#ifdef XEN #include <asm/debugger.h> #include <asm/vhpt.h> #include <public/arch-ia64.h> #include <asm/config.h> -#endif /* * arch/ia64/kernel/ivt.S * @@ -58,11 +56,7 @@ #include <asm/system.h> #include <asm/thread_info.h> #include <asm/unistd.h> -#ifdef XEN #include <xen/errno.h> -#else -#include <asm/errno.h> -#endif #if 1 # define PSR_DEFAULT_BITS psr.ac @@ -110,144 +104,7 @@ ia64_ivt: // 0x0000 Entry 0 (size 64 bundles) VHPT Translation (8,20,47) ENTRY(vhpt_miss) DBG_FAULT(0) -#ifdef XEN FAULT(0) -#else - /* - * The VHPT vector is invoked when the TLB entry for the virtual - * page table is missing. This happens only as a result of a - * previous (the "original") TLB miss, which may either be caused - * by an instruction fetch or a data access (or non-access). - * - * What we do here is normal TLB miss handing for the _original_ - * miss, followed by inserting the TLB entry for the virtual page - * table page that the VHPT walker was attempting to access. The - * latter gets inserted as long as both L1 and L2 have valid - * mappings for the faulting address. The TLB entry for the - * original miss gets inserted only if the L3 entry indicates - * that the page is present. - * - * do_page_fault gets invoked in the following cases: - * - the faulting virtual address uses unimplemented address bits - * - the faulting virtual address has no L1, L2, or L3 mapping - */ - mov r16=cr.ifa // get address that caused the TLB miss -#ifdef CONFIG_HUGETLB_PAGE - movl r18=PAGE_SHIFT - mov r25=cr.itir -#endif - ;; - rsm psr.dt // use physical addressing for data - mov r31=pr // save the predicate registers - mov r19=IA64_KR(PT_BASE) // get page table base address - shl r21=r16,3 // shift bit 60 into sign bit - shr.u r17=r16,61 // get the region number into r17 - ;; - shr r22=r21,3 -#ifdef CONFIG_HUGETLB_PAGE - extr.u r26=r25,2,6 - ;; - cmp.ne p8,p0=r18,r26 - sub r27=r26,r18 - ;; -(p8) dep r25=r18,r25,2,6 -(p8) shr r22=r22,r27 -#endif - ;; - cmp.eq p6,p7=5,r17 // is IFA pointing into to region 5? - shr.u r18=r22,PGDIR_SHIFT // get bits 33-63 of faulting address - ;; -(p7) dep r17=r17,r19,(PAGE_SHIFT-3),3 // put region number bits in place - - srlz.d - LOAD_PHYSICAL(p6, r19, swapper_pg_dir) // region 5 is rooted at - // swapper_pg_dir - - .pred.rel "mutex", p6, p7 -(p6) shr.u r21=r21,PGDIR_SHIFT+PAGE_SHIFT -(p7) shr.u r21=r21,PGDIR_SHIFT+PAGE_SHIFT-3 - ;; -(p6) dep r17=r18,r19,3,(PAGE_SHIFT-3) // r17=PTA + IFA(33,42)*8 -(p7) dep r17=r18,r17,3,(PAGE_SHIFT-6) // r17=PTA + - // (((IFA(61,63) << 7) | - // IFA(33,39))*8) - cmp.eq p7,p6=0,r21 // unused address bits all zero? - shr.u r18=r22,PMD_SHIFT // shift L2 index into position - ;; - ld8 r17=[r17] // fetch the L1 entry (may be 0) - ;; -(p7) cmp.eq p6,p7=r17,r0 // was L1 entry NULL? - dep r17=r18,r17,3,(PAGE_SHIFT-3) // compute address of L2 page - // table entry - ;; -(p7) ld8 r20=[r17] // fetch the L2 entry (may be 0) - shr.u r19=r22,PAGE_SHIFT // shift L3 index into position - ;; -(p7) cmp.eq.or.andcm p6,p7=r20,r0 // was L2 entry NULL? - dep r21=r19,r20,3,(PAGE_SHIFT-3) // compute address of L3 page - // table entry - ;; -(p7) ld8 r18=[r21] // read the L3 PTE - mov r19=cr.isr // cr.isr bit 0 tells us if - // this is an insn miss - ;; -(p7) tbit.z p6,p7=r18,_PAGE_P_BIT // page present bit cleared? - mov r22=cr.iha // get the VHPT address that - // caused the TLB miss - ;; // avoid RAW on p7 -(p7) tbit.nz.unc p10,p11=r19,32 // is it an instruction TLB - // miss? - dep r23=0,r20,0,PAGE_SHIFT // clear low bits to get page - // address - ;; -(p10) itc.i r18 // insert the instruction TLB - // entry -(p11) itc.d r18 // insert the data TLB entry -(p6) br.cond.spnt.many page_fault // handle bad address/page not - // present (page fault) - mov cr.ifa=r22 - -#ifdef CONFIG_HUGETLB_PAGE -(p8) mov cr.itir=r25 // change to default page-size - // for VHPT -#endif - - /* - * Now compute and insert the TLB entry for the virtual page table. - * We never execute in a page table page so there is no need to set - * the exception deferral bit. - */ - adds r24=__DIRTY_BITS_NO_ED|_PAGE_PL_0|_PAGE_AR_RW,r23 - ;; -(p7) itc.d r24 - ;; -#ifdef CONFIG_SMP - /* - * Tell the assemblers dependency-violation checker that the above - * "itc" instructions cannot possibly affect the following loads: - */ - dv_serialize_data - - /* - * Re-check L2 and L3 pagetable. If they changed, we may have - * received a ptc.g between reading the pagetable and the "itc". - * If so, flush the entry we inserted and retry. - */ - ld8 r25=[r21] // read L3 PTE again - ld8 r26=[r17] // read L2 entry again - ;; - cmp.ne p6,p7=r26,r20 // did L2 entry change - mov r27=PAGE_SHIFT<<2 - ;; -(p6) ptc.l r22,r27 // purge PTE page translation -(p7) cmp.ne.or.andcm p6,p7=r25,r18 // did L3 PTE change - ;; -(p6) ptc.l r16,r27 // purge translation -#endif - - mov pr=r31,-1 // restore predicate registers - rfi -#endif END(vhpt_miss) .org ia64_ivt+0x400 @@ -255,7 +112,6 @@ END(vhpt_miss) // 0x0400 Entry 1 (size 64 bundles) ITLB (21) ENTRY(itlb_miss) DBG_FAULT(1) -#ifdef XEN mov r16 = cr.ifa mov r31 = pr ;; @@ -273,7 +129,6 @@ ENTRY(itlb_miss) #ifdef VHPT_GLOBAL br.cond.sptk fast_tlb_miss_reflect ;; -#endif #endif /* * The ITLB handler accesses the L3 PTE via the virtually mapped linear @@ -320,7 +175,6 @@ END(itlb_miss) // 0x0800 Entry 2 (size 64 bundles) DTLB (9,48) ENTRY(dtlb_miss) DBG_FAULT(2) -#ifdef XEN mov r16=cr.ifa // get virtual address mov r31=pr ;; @@ -394,17 +248,6 @@ 2: ;; #endif mov r29=b0 // save b0 -#else - /* - * The DTLB handler accesses the L3 PTE via the virtually mapped linear - * page table. If a nested TLB miss occurs, we switch into physical - * mode, walk the page table, and then re-execute the L3 PTE read - * and go on normally after that. - */ - mov r16=cr.ifa // get virtual address - mov r29=b0 // save b0 - mov r31=pr // save predicates -#endif dtlb_fault: mov r17=cr.iha // get virtual address of L3 PTE movl r30=1f // load nested fault @@ -441,7 +284,6 @@ END(dtlb_miss) // 0x0c00 Entry 3 (size 64 bundles) Alt ITLB (19) ENTRY(alt_itlb_miss) DBG_FAULT(3) -#ifdef XEN mov r16=cr.ifa // get address that caused the TLB miss mov r31=pr ;; @@ -450,14 +292,6 @@ late_alt_itlb_miss: movl r17=PAGE_KERNEL movl r19=(((1 << IA64_MAX_PHYS_BITS) - 1) & ~0xfff) ;; -#else - mov r16=cr.ifa // get address that caused the TLB miss - movl r17=PAGE_KERNEL - mov r21=cr.ipsr - movl r19=(((1 << IA64_MAX_PHYS_BITS) - 1) & ~0xfff) - mov r31=pr - ;; -#endif #ifdef CONFIG_DISABLE_VHPT shr.u r22=r16,61 // get the region number into r21 ;; @@ -471,15 +305,9 @@ late_alt_itlb_miss: #endif extr.u r23=r21,IA64_PSR_CPL0_BIT,2 // extract psr.cpl and r19=r19,r16 // clear ed, reserved bits, and PTE control bits -#ifdef XEN shr.u r18=r16,55 // move address bit 59 to bit 4 ;; and r18=0x10,r18 // bit 4=address-bit(59) -#else - shr.u r18=r16,57 // move address bit 61 to bit 4 - ;; - andcm r18=0x10,r18 // bit 4=~address-bit(61) -#endif cmp.ne p8,p0=r0,r23 // psr.cpl != 0? or r19=r17,r19 // insert PTE control bits into r19 ;; @@ -497,7 +325,6 @@ END(alt_itlb_miss) // 0x1000 Entry 4 (size 64 bundles) Alt DTLB (7,46) ENTRY(alt_dtlb_miss) DBG_FAULT(4) -#ifdef XEN mov r16=cr.ifa // get address that caused the TLB miss mov r31=pr ;; @@ -507,7 +334,6 @@ late_alt_dtlb_miss: mov r21=cr.ipsr movl r19=(((1 << IA64_MAX_PHYS_BITS) - 1) & ~0xfff) ;; -#endif #ifdef CONFIG_DISABLE_VHPT shr.u r22=r16,61 // get the region into r22 ;; @@ -522,25 +348,15 @@ late_alt_dtlb_miss: extr.u r23=r21,IA64_PSR_CPL0_BIT,2 // extract psr.cpl and r22=IA64_ISR_CODE_MASK,r20 // get the isr.code field tbit.nz p6,p7=r20,IA64_ISR_SP_BIT // is speculation bit on? -#ifdef XEN shr.u r18=r16,55 // move address bit 59 to bit 4 and r19=r19,r16 // clear ed, reserved bits, and // PTE control bits tbit.nz p9,p0=r20,IA64_ISR_NA_BIT // is non-access bit on? ;; and r18=0x10,r18 // bit 4=address-bit(59) -#else - shr.u r18=r16,57 // move address bit 61 to bit 4 - and r19=r19,r16 // clear ed, reserved bits, and - // PTE control bits - tbit.nz p9,p0=r20,IA64_ISR_NA_BIT // is non-access bit on? - ;; - andcm r18=0x10,r18 // bit 4=~address-bit(61) -#endif cmp.ne p8,p0=r0,r23 (p9) cmp.eq.or.andcm p6,p7=IA64_ISR_CODE_LFETCH,r22 // check isr.code field (p8) br.cond.spnt page_fault -#ifdef XEN ;; #ifdef CONFIG_VIRTUAL_FRAME_TABLE shr r22=r16,56 // Test for the address of virtual frame_table @@ -560,8 +376,6 @@ late_alt_dtlb_miss: (p8) br.cond.sptk page_fault ;; 1: -#endif - dep r21=-1,r21,IA64_PSR_ED_BIT,1 or r19=r19,r17 // insert PTE control bits into r19 ;; @@ -644,76 +458,9 @@ END(ia64_frametable_probe) // 0x1400 Entry 5 (size 64 bundles) Data nested TLB (6,45) ENTRY(nested_dtlb_miss) DBG_FAULT(5) -#ifdef XEN mov b0=r30 br.sptk.many b0 // return to the continuation point ;; -#else - /* - * In the absence of kernel bugs, we get here when the virtually - * mapped linear page table is accessed non-speculatively (e.g., - * in the Dirty-bit, Instruction Access-bit, or Data Access-bit - * faults). If the DTLB entry for the virtual page table is missing, - * a nested TLB miss fault is triggered and control is transferred - * to this point. When this happens, we lookup the pte for the - * faulting address by walking the page table in physical mode - * and return to the continuation point passed in register r30 - * (or call page_fault if the address is not mapped). - * - * Input: r16: faulting address - * r29: saved b0 - * r30: continuation address - * r31: saved pr - * - * Output: r17: physical address of L3 PTE of faulting address - * r29: saved b0 - * r30: continuation address - * r31: saved pr - * - * Clobbered: b0, r18, r19, r21, psr.dt (cleared) - */ - rsm psr.dt // switch to using physical data - // addressing - mov r19=IA64_KR(PT_BASE) // get the page table base address - shl r21=r16,3 // shift bit 60 into sign bit - ;; - shr.u r17=r16,61 // get the region number into r17 - ;; - cmp.eq p6,p7=5,r17 // is faulting address in region 5? - shr.u r18=r16,PGDIR_SHIFT // get bits 33-63 of faulting address - ;; -(p7) dep r17=r17,r19,(PAGE_SHIFT-3),3 // put region number bits in place - - srlz.d - LOAD_PHYSICAL(p6, r19, swapper_pg_dir) // region 5 is rooted at - // swapper_pg_dir - - .pred.rel "mutex", p6, p7 -(p6) shr.u r21=r21,PGDIR_SHIFT+PAGE_SHIFT -(p7) shr.u r21=r21,PGDIR_SHIFT+PAGE_SHIFT-3 - ;; -(p6) dep r17=r18,r19,3,(PAGE_SHIFT-3) // r17=PTA + IFA(33,42)*8 -(p7) dep r17=r18,r17,3,(PAGE_SHIFT-6) // r17=PTA + (((IFA(61,63) << 7) | - // IFA(33,39))*8) - cmp.eq p7,p6=0,r21 // unused address bits all zeroes? - shr.u r18=r16,PMD_SHIFT // shift L2 index into position - ;; - ld8 r17=[r17] // fetch the L1 entry (may be 0) - ;; -(p7) cmp.eq p6,p7=r17,r0 // was L1 entry NULL? - dep r17=r18,r17,3,(PAGE_SHIFT-3) // compute address of L2 page table - // entry - ;; -(p7) ld8 r17=[r17] // fetch the L2 entry (may be 0) - shr.u r19=r16,PAGE_SHIFT // shift L3 index into position - ;; -(p7) cmp.eq.or.andcm p6,p7=r17,r0 // was L2 entry NULL? - dep r17=r19,r17,3,(PAGE_SHIFT-3) // compute address of L3 page table - // entry -(p6) br.cond.spnt page_fault - mov b0=r30 - br.sptk.many b0 // return to continuation point -#endif END(nested_dtlb_miss) .org ia64_ivt+0x1800 @@ -721,36 +468,22 @@ END(nested_dtlb_miss) // 0x1800 Entry 6 (size 64 bundles) Instruction Key Miss (24) ENTRY(ikey_miss) DBG_FAULT(6) -#ifdef XEN FAULT_OR_REFLECT(6) -#else - FAULT(6) -#endif END(ikey_miss) //---------------------------------------------------------------- // call do_page_fault (predicates are in r31, psr.dt may be off, // r16 is faulting address) -#ifdef XEN GLOBAL_ENTRY(page_fault) -#else -ENTRY(page_fault) -#endif ssm psr.dt ;; srlz.i ;; SAVE_MIN_WITH_COVER -#ifdef XEN alloc r15=ar.pfs,0,0,4,0 mov out0=cr.ifa mov out1=cr.isr mov out3=cr.itir -#else - alloc r15=ar.pfs,0,0,3,0 - mov out0=cr.ifa - mov out1=cr.isr -#endif adds r3=8,r2 // set up second base pointer ;; ssm psr.ic | PSR_DEFAULT_BITS @@ -773,11 +506,7 @@ END(page_fault) // 0x1c00 Entry 7 (size 64 bundles) Data Key Miss (12,51) ENTRY(dkey_miss) DBG_FAULT(7) -#ifdef XEN FAULT_OR_REFLECT(7) -#else - FAULT(7) -#endif END(dkey_miss) .org ia64_ivt+0x2000 @@ -785,7 +514,6 @@ END(dkey_miss) // 0x2000 Entry 8 (size 64 bundles) Dirty-bit (54) ENTRY(dirty_bit) DBG_FAULT(8) -#ifdef XEN mov r20=cr.ipsr mov r31=pr ;; @@ -830,67 +558,6 @@ ENTRY(dirty_bit) ;; mov rp=r14 br.call.sptk.many b6=ia64_shadow_fault -#else - /* - * What we do here is to simply turn on the dirty bit in the PTE. - * We need to update both the page-table and the TLB entry. To - * efficiently access the PTE, we address it through the virtual - * page table. Most likely, the TLB entry for the relevant virtual - * page table page is still present in the TLB so we can normally - * do this without additional TLB misses. In case the necessary - * virtual page table TLB entry isn't present, we take a nested - * TLB miss hit where we look up the physical address of the L3 - * PTE and then continue at label 1 below. - */ - mov r16=cr.ifa // get the address that caused the - // fault - movl r30=1f // load continuation point in case - // of nested fault - ;; - thash r17=r16 // compute virtual address of L3 PTE - mov r29=b0 // save b0 in case of nested fault - mov r31=pr // save pr -#ifdef CONFIG_SMP - mov r28=ar.ccv // save ar.ccv - ;; -1: ld8 r18=[r17] - ;; // avoid RAW on r18 - mov ar.ccv=r18 // set compare value for cmpxchg - or r25=_PAGE_D|_PAGE_A,r18 // set the dirty and accessed bits - ;; - cmpxchg8.acq r26=[r17],r25,ar.ccv - mov r24=PAGE_SHIFT<<2 - ;; - cmp.eq p6,p7=r26,r18 - ;; -(p6) itc.d r25 // install updated PTE - ;; - /* - * Tell the assemblers dependency-violation checker that the above - * "itc" instructions cannot possibly affect the following loads: - */ - dv_serialize_data - - ld8 r18=[r17] // read PTE again - ;; - cmp.eq p6,p7=r18,r25 // is it same as the newly installed - ;; -(p7) ptc.l r16,r24 - mov b0=r29 // restore b0 - mov ar.ccv=r28 -#else - ;; -1: ld8 r18=[r17] - ;; // avoid RAW on r18 - or r18=_PAGE_D|_PAGE_A,r18 // set the dirty and accessed bits - mov b0=r29 // restore b0 - ;; - st8 [r17]=r18 // store back updated PTE - itc.d r18 // install updated PTE -#endif - mov pr=r31,-1 // restore pr - rfi -#endif END(dirty_bit) .org ia64_ivt+0x2400 @@ -898,75 +565,12 @@ END(dirty_bit) // 0x2400 Entry 9 (size 64 bundles) Instruction Access-bit (27) ENTRY(iaccess_bit) DBG_FAULT(9) -#ifdef XEN mov r16=cr.isr mov r17=cr.ifa mov r31=pr mov r19=9 mov r20=0x2400 br.sptk.many fast_access_reflect;; -#else - // Like Entry 8, except for instruction access - mov r16=cr.ifa // get the address that caused the - // fault - movl r30=1f // load continuation point in case - // of nested fault - mov r31=pr // save predicates -#ifdef CONFIG_ITANIUM - /* - * Erratum 10 (IFA may contain incorrect address) has "NoFix" status. - */ - mov r17=cr.ipsr - ;; - mov r18=cr.iip - tbit.z p6,p0=r17,IA64_PSR_IS_BIT // IA64 instruction set? - ;; -(p6) mov r16=r18 // if so, use cr.iip instead of cr.ifa -#endif /* CONFIG_ITANIUM */ - ;; - thash r17=r16 // compute virtual address of L3 PTE - mov r29=b0 // save b0 in case of nested fault) -#ifdef CONFIG_SMP - mov r28=ar.ccv // save ar.ccv - ;; -1: ld8 r18=[r17] - ;; - mov ar.ccv=r18 // set compare value for cmpxchg - or r25=_PAGE_A,r18 // set the accessed bit - ;; - cmpxchg8.acq r26=[r17],r25,ar.ccv - mov r24=PAGE_SHIFT<<2 - ;; - cmp.eq p6,p7=r26,r18 - ;; -(p6) itc.i r25 // install updated PTE - ;; - /* - * Tell the assemblers dependency-violation checker that the above - * "itc" instructions cannot possibly affect the following loads: - */ - dv_serialize_data - - ld8 r18=[r17] // read PTE again - ;; - cmp.eq p6,p7=r18,r25 // is it same as the newly installed - ;; -(p7) ptc.l r16,r24 - mov b0=r29 // restore b0 - mov ar.ccv=r28 -#else /* !CONFIG_SMP */ - ;; -1: ld8 r18=[r17] - ;; - or r18=_PAGE_A,r18 // set the accessed bit - mov b0=r29 // restore b0 - ;; - st8 [r17]=r18 // store back updated PTE - itc.i r18 // install updated PTE -#endif /* !CONFIG_SMP */ - mov pr=r31,-1 - rfi -#endif END(iaccess_bit) .org ia64_ivt+0x2800 @@ -974,7 +578,6 @@ END(iaccess_bit) // 0x2800 Entry 10 (size 64 bundles) Data Access-bit (15,55) ENTRY(daccess_bit) DBG_FAULT(10) -#ifdef XEN mov r16=cr.isr mov r17=cr.ifa mov r31=pr @@ -982,55 +585,6 @@ ENTRY(daccess_bit) mov r20=0x2800 br.sptk.many fast_access_reflect ;; -#else - // Like Entry 8, except for data access - mov r16=cr.ifa // get the address that caused the - // fault - movl r30=1f // load continuation point in case - // of nested fault - ;; - thash r17=r16 // compute virtual address of L3 PTE - mov r31=pr - mov r29=b0 // save b0 in case of nested fault) -#ifdef CONFIG_SMP - mov r28=ar.ccv // save ar.ccv - ;; -1: ld8 r18=[r17] - ;; // avoid RAW on r18 - mov ar.ccv=r18 // set compare value for cmpxchg - or r25=_PAGE_A,r18 // set the dirty bit - ;; - cmpxchg8.acq r26=[r17],r25,ar.ccv - mov r24=PAGE_SHIFT<<2 - ;; - cmp.eq p6,p7=r26,r18 - ;; -(p6) itc.d r25 // install updated PTE - /* - * Tell the assemblers dependency-violation checker that the above - * "itc" instructions cannot possibly affect the following loads: - */ - dv_serialize_data - ;; - ld8 r18=[r17] // read PTE again - ;; - cmp.eq p6,p7=r18,r25 // is it same as the newly installed - ;; -(p7) ptc.l r16,r24 - mov ar.ccv=r28 -#else - ;; -1: ld8 r18=[r17] - ;; // avoid RAW on r18 - or r18=_PAGE_A,r18 // set the accessed bit - ;; - st8 [r17]=r18 // store back updated PTE - itc.d r18 // install updated PTE -#endif - mov b0=r29 // restore b0 - mov pr=r31,-1 - rfi -#endif END(daccess_bit) .org ia64_ivt+0x2c00 @@ -1307,7 +861,6 @@ ENTRY(interrupt) DBG_FAULT(12) mov r31=pr // prepare to save predicates ;; -#ifdef XEN mov r30=cr.ivr // pass cr.ivr as first arg // FIXME: this is a hack... use cpuinfo.ksoftirqd because its // not used anywhere else and we need a place to stash ivr and @@ -1326,7 +879,6 @@ ENTRY(interrupt) ;; slow_interrupt: mov rp=r29;; -#endif SAVE_MIN_WITH_COVER // uses r31; defines r2 and r3 ssm psr.ic | PSR_DEFAULT_BITS ;; @@ -1336,17 +888,9 @@ slow_interrupt: SAVE_REST ;; alloc r14=ar.pfs,0,0,2,0 // must be first in an insn group -#ifdef XEN movl out0=THIS_CPU(cpu_info)+IA64_CPUINFO_KSOFTIRQD_OFFSET;; ld8 out0=[out0];; -#else - mov out0=cr.ivr // pass cr.ivr as first arg -#endif add out1=16,sp // pass pointer to pt_regs as second arg -#ifndef XEN - ;; - srlz.d // make sure we see the effect of cr.ivr -#endif movl r14=ia64_leave_kernel ;; mov rp=r14 @@ -1359,7 +903,6 @@ END(interrupt) DBG_FAULT(13) FAULT(13) -#ifdef XEN // There is no particular reason for this code to be here, other // than that there happens to be space here that would go unused // otherwise. If this fault ever gets "unreserved", simply move @@ -1389,7 +932,6 @@ dispatch_break_fault_post_save: // br.sptk.many ia64_prepare_handle_break // TODO: why commented out? br.call.sptk.many b6=ia64_handle_break END(dispatch_break_fault) -#endif .org ia64_ivt+0x3800 ////////////////////////////////////////////////////////////////////////// @@ -1397,7 +939,6 @@ END(dispatch_break_fault) DBG_FAULT(14) FAULT(14) -#ifdef XEN // this code segment is from 2.6.16.13 /* @@ -1539,152 +1080,6 @@ GLOBAL_ENTRY(ia64_syscall_setup) br.ret.sptk.many b7 END(ia64_syscall_setup) - -#else - /* - * There is no particular reason for this code to be here, other - * than that there happens to be space here that would go unused - * otherwise. If this fault ever gets "unreserved", simply move - * the following code to a more suitable spot... - * - * ia64_syscall_setup() is a separate subroutine so that it can - * allocate stacked registers so it can safely demine any - * potential NaT values from the input registers. - * - * On entry: - * - executing on bank 0 or bank 1 register set (doesn't matter) - * - r1: stack pointer - * - r2: current task pointer - * - r3: preserved - * - r11: original contents (saved ar.pfs to be saved) - * - r12: original contents (sp to be saved) - * - r13: original contents (tp to be saved) - * - r15: original contents (syscall # to be saved) - * - r18: saved bsp (after switching to kernel stack) - * - r19: saved b6 - * - r20: saved r1 (gp) - * - r21: saved ar.fpsr - * - r22: kernel's register backing store base (krbs_base) - * - r23: saved ar.bspstore - * - r24: saved ar.rnat - * - r25: saved ar.unat - * - r26: saved ar.pfs - * - r27: saved ar.rsc - * - r28: saved cr.iip - * - r29: saved cr.ipsr - * - r31: saved pr - * - b0: original contents (to be saved) - * On exit: - * - executing on bank 1 registers - * - psr.ic enabled, interrupts restored - * - p10: TRUE if syscall is invoked with more than 8 out - * registers or r15's Nat is true - * - r1: kernel's gp - * - r3: preserved (same as on entry) - * - r8: -EINVAL if p10 is true - * - r12: points to kernel stack - * - r13: points to current task - * - p15: TRUE if interrupts need to be re-enabled - * - ar.fpsr: set to kernel settings - */ -GLOBAL_ENTRY(ia64_syscall_setup) -#ifndef XEN -#if PT(B6) != 0 -# error This code assumes that b6 is the first field in pt_regs. -#endif -#endif - st8 [r1]=r19 // save b6 - add r16=PT(CR_IPSR),r1 // initialize first base pointer - add r17=PT(R11),r1 // initialize second base pointer - ;; - alloc r19=ar.pfs,8,0,0,0 // ensure in0-in7 are writable - st8 [r16]=r29,PT(AR_PFS)-PT(CR_IPSR) // save cr.ipsr - tnat.nz p8,p0=in0 - - st8.spill [r17]=r11,PT(CR_IIP)-PT(R11) // save r11 - tnat.nz p9,p0=in1 -(pKStk) mov r18=r0 // make sure r18 isn't NaT - ;; - - st8 [r16]=r26,PT(CR_IFS)-PT(AR_PFS) // save ar.pfs - st8 [r17]=r28,PT(AR_UNAT)-PT(CR_IIP) // save cr.iip - mov r28=b0 // save b0 (2 cyc) - ;; - - st8 [r17]=r25,PT(AR_RSC)-PT(AR_UNAT) // save ar.unat - dep r19=0,r19,38,26 // clear all bits but 0..37 [I0] -(p8) mov in0=-1 - ;; - - st8 [r16]=r19,PT(AR_RNAT)-PT(CR_IFS) // store ar.pfs.pfm in cr.ifs - extr.u r11=r19,7,7 // I0 // get sol of ar.pfs - and r8=0x7f,r19 // A // get sof of ar.pfs - - st8 [r17]=r27,PT(AR_BSPSTORE)-PT(AR_RSC)// save ar.rsc - tbit.nz p15,p0=r29,IA64_PSR_I_BIT // I0 -(p9) mov in1=-1 - ;; - -(pUStk) sub r18=r18,r22 // r18=RSE.ndirty*8 - tnat.nz p10,p0=in2 - add r11=8,r11 - ;; -(pKStk) adds r16=PT(PR)-PT(AR_RNAT),r16 // skip over ar_rnat field -(pKStk) adds r17=PT(B0)-PT(AR_BSPSTORE),r17 // skip over ar_bspstore field - tnat.nz p11,p0=in3 - ;; -(p10) mov in2=-1 - tnat.nz p12,p0=in4 // [I0] -(p11) mov in3=-1 - ;; -(pUStk) st8 [r16]=r24,PT(PR)-PT(AR_RNAT) // save ar.rnat -(pUStk) st8 [r17]=r23,PT(B0)-PT(AR_BSPSTORE) // save ar.bspstore - shl r18=r18,16 // compute ar.rsc to be used - // for "loadrs" - ;; - st8 [r16]=r31,PT(LOADRS)-PT(PR) // save predicates - st8 [r17]=r28,PT(R1)-PT(B0) // save b0 - tnat.nz p13,p0=in5 // [I0] - ;; - st8 [r16]=r18,PT(R12)-PT(LOADRS) // save ar.rsc value for - // "loadrs" - st8.spill [r17]=r20,PT(R13)-PT(R1) // save original r1 -(p12) mov in4=-1 - ;; - -.mem.offset 0,0; st8.spill [r16]=r12,PT(AR_FPSR)-PT(R12) // save r12 -.mem.offset 8,0; st8.spill [r17]=r13,PT(R15)-PT(R13) // save r13 -(p13) mov in5=-1 - ;; - st8 [r16]=r21,PT(R8)-PT(AR_FPSR) // save ar.fpsr - tnat.nz p14,p0=in6 - cmp.lt p10,p9=r11,r8 // frame size can't be more than local+8 - ;; - stf8 [r16]=f1 // ensure pt_regs.r8 != 0 - // (see handle_syscall_error) -(p9) tnat.nz p10,p0=r15 - adds r12=-16,r1 // switch to kernel memory stack (with 16 - // bytes of scratch) - - st8.spill [r17]=r15 // save r15 - tnat.nz p8,p0=in7 - nop.i 0 - - mov r13=r2 // establish `current' - movl r1=__gp // establish kernel global pointer - ;; -(p14) mov in6=-1 -(p8) mov in7=-1 - nop.i 0 - - cmp.eq pSys,pNonSys=r0,r0 // set pSys=1, pNonSys=0 - movl r17=FPSR_DEFAULT - ;; - mov.m ar.fpsr=r17 // set ar.fpsr to kernel default value -(p10) mov r8=-EINVAL - br.ret.sptk.many b7 -END(ia64_syscall_setup) -#endif /* XEN */ .org ia64_ivt+0x3c00 ////////////////////////////////////////////////////////////////////////// @@ -1692,47 +1087,6 @@ END(ia64_syscall_setup) DBG_FAULT(15) FAULT(15) -#ifndef XEN - /* - * Squatting in this space ... - * - * This special case dispatcher for illegal operation faults - * allows preserved registers to be modified through a callback - * function (asm only) that is handed back from the fault handler - * in r8. Up to three arguments can be passed to the callback - * function by returning an aggregate with the callback as its - * first element, followed by the arguments. - */ -ENTRY(dispatch_illegal_op_fault) - SAVE_MIN_WITH_COVER - ssm psr.ic | PSR_DEFAULT_BITS - ;; - srlz.i // guarantee that interruption collection is on - ;; -(p15) ssm psr.i // restore psr.i - adds r3=8,r2 // set up second base pointer for SAVE_REST - ;; - alloc r14=ar.pfs,0,0,1,0 // must be first in insn group - mov out0=ar.ec - ;; - SAVE_REST - ;; - br.call.sptk.many rp=ia64_illegal_op_fault -.ret0: ;; - alloc r14=ar.pfs,0,0,3,0 // must be first in insn group - mov out0=r9 - mov out1=r10 - mov out2=r11 - movl r15=ia64_leave_kernel - ;; - mov rp=r15 - mov b6=r8 - ;; - cmp.ne p6,p0=0,r8 -(p6) br.call.dpnt.many b6=b6 // call returns to ia64_leave_kernel - br.sptk.many ia64_leave_kernel -END(dispatch_illegal_op_fault) -#endif .org ia64_ivt+0x4000 ////////////////////////////////////////////////////////////////////////// @@ -1740,7 +1094,6 @@ END(dispatch_illegal_op_fault) DBG_FAULT(16) FAULT(16) -#ifdef XEN // There is no particular reason for this code to be here, other // than that there happens to be space here that would go unused // otherwise. If this fault ever gets "unreserved", simply move @@ -1771,7 +1124,6 @@ ENTRY(dispatch_privop_fault) // br.sptk.many ia64_prepare_handle_privop // TODO: why commented out? br.call.sptk.many b6=ia64_handle_privop END(dispatch_privop_fault) -#endif .org ia64_ivt+0x4400 @@ -1780,34 +1132,6 @@ END(dispatch_privop_fault) DBG_FAULT(17) FAULT(17) -#ifndef XEN -ENTRY(non_syscall) - SAVE_MIN_WITH_COVER - - // There is no particular reason for this code to be here, other - // than that there happens to be space here that would go unused - // otherwise. If this fault ever gets "unreserved", simply move - // the following code to a more suitable spot... - - alloc r14=ar.pfs,0,0,2,0 - mov out0=cr.iim - add out1=16,sp - adds r3=8,r2 // set up second base pointer for SAVE_REST - - ssm psr.ic | PSR_DEFAULT_BITS - ;; - srlz.i // guarantee that interruption collection is on - ;; -(p15) ssm psr.i // restore psr.i - movl r15=ia64_leave_kernel - ;; - SAVE_REST - mov rp=r15 - ;; - br.call.sptk.many b6=ia64_bad_break // avoid WAW on CFM and - // ignore return addr -END(non_syscall) -#endif .org ia64_ivt+0x4800 ////////////////////////////////////////////////////////////////////////// @@ -1815,37 +1139,6 @@ END(non_syscall) DBG_FAULT(18) FAULT(18) -#ifndef XEN - /* - * There is no particular reason for this code to be here, other - * than that there happens to be space here that would go unused - * otherwise. If this fault ever gets "unreserved", simply move - * the following code to a more suitable spot... - */ -ENTRY(dispatch_unaligned_handler) - SAVE_MIN_WITH_COVER - ;; - alloc r14=ar.pfs,0,0,2,0 // now it's safe (must be first in - // insn group!) - mov out0=cr.ifa - adds out1=16,sp - - ssm psr.ic | PSR_DEFAULT_BITS - ;; - srlz.i // guarantee that interruption - // collection is on - ;; -(p15) ssm psr.i // restore psr.i - adds r3=8,r2 // set up second base pointer - ;; - SAVE_REST - movl r14=ia64_leave_kernel - ;; - mov rp=r14 -// br.sptk.many ia64_prepare_handle_unaligned // TODO: why commented out? - br.call.sptk.many b6=ia64_handle_unaligned -END(dispatch_unaligned_handler) -#endif .org ia64_ivt+0x4c00 ////////////////////////////////////////////////////////////////////////// @@ -1900,24 +1193,7 @@ END(dispatch_to_fault_handler) // 0x5000 Entry 20 (size 16 bundles) Page Not Present (10,22,49) ENTRY(page_not_present) DBG_FAULT(20) -#ifdef XEN FAULT_OR_REFLECT(20) -#else - mov r16=cr.ifa - rsm psr.dt - /* - * The Linux page fault handler doesn't expect non-present pages - * to be in the TLB. Flush the existing entry now, so we meet - * that expectation. - */ - mov r17=PAGE_SHIFT<<2 - ;; - ptc.l r16,r17 - ;; - mov r31=pr - srlz.d - br.sptk.many page_fault -#endif END(page_not_present) .org ia64_ivt+0x5100 @@ -1925,16 +1201,7 @@ END(page_not_present) // 0x5100 Entry 21 (size 16 bundles) Key Permission (13,25,52) ENTRY(key_permission) DBG_FAULT(21) -#ifdef XEN FAULT_OR_REFLECT(21) -#else - mov r16=cr.ifa - rsm psr.dt - mov r31=pr - ;; - srlz.d - br.sptk.many page_fault -#endif END(key_permission) .org ia64_ivt+0x5200 @@ -1942,16 +1209,7 @@ END(key_permission) // 0x5200 Entry 22 (size 16 bundles) Instruction Access Rights (26) ENTRY(iaccess_rights) DBG_FAULT(22) -#ifdef XEN FAULT_OR_REFLECT(22) -#else - mov r16=cr.ifa - rsm psr.dt - mov r31=pr - ;; - srlz.d - br.sptk.many page_fault -#endif END(iaccess_rights) .org ia64_ivt+0x5300 @@ -1959,7 +1217,6 @@ END(iaccess_rights) // 0x5300 Entry 23 (size 16 bundles) Data Access Rights (14,53) ENTRY(daccess_rights) DBG_FAULT(23) -#ifdef XEN mov r31=pr ;; mov r16=cr.isr @@ -1968,14 +1225,6 @@ ENTRY(daccess_rights) movl r20=0x5300 br.sptk.many fast_access_reflect ;; -#else - mov r16=cr.ifa - rsm psr.dt - mov r31=pr - ;; - srlz.d - br.sptk.many page_fault -#endif END(daccess_rights) .org ia64_ivt+0x5400 @@ -1986,15 +1235,10 @@ ENTRY(general_exception) mov r16=cr.isr mov r31=pr ;; -#ifdef XEN cmp4.ge p6,p0=0x20,r16 (p6) br.sptk.many dispatch_privop_fault ;; FAULT_OR_REFLECT(24) -#else - cmp4.eq p6,p0=0,r16 -(p6) br.sptk.many dispatch_illegal_op_fault -#endif ;; mov r19=24 // fault number br.sptk.many dispatch_to_fault_handler @@ -2005,7 +1249,6 @@ END(general_exception) // 0x5500 Entry 25 (size 16 bundles) Disabled FP-Register (35) ENTRY(disabled_fp_reg) DBG_FAULT(25) -#ifdef XEN #if 0 // TODO: can this be removed? mov r20=pr movl r16=0x2000000000000000 @@ -2028,7 +1271,6 @@ ENTRY(disabled_fp_reg) //floating_panic: // TODO: can this be removed? // br.sptk.many floating_panic ;; -#endif rsm psr.dfh // ensure we can access fph ;; srlz.d @@ -2054,42 +1296,8 @@ END(nat_consumption) // 0x5700 Entry 27 (size 16 bundles) Speculation (40) ENTRY(speculation_vector) DBG_FAULT(27) -#ifdef XEN // this probably need not reflect... FAULT_OR_REFLECT(27) -#else - /* - * A [f]chk.[as] instruction needs to take the branch to the - * recovery code but this part of the architecture is not - * implemented in hardware on some CPUs, such as Itanium. Thus, - * in general we need to emulate the behavior. IIM contains the - * relative target (not yet sign extended). So after sign extending - * it we simply add it to IIP. We also need to reset the EI field - * of the IPSR to zero, i.e., the slot to restart into. - * - * cr.imm contains zero_ext(imm21) - */ - mov r18=cr.iim - ;; - mov r17=cr.iip - shl r18=r18,43 // put sign bit in position (43=64-21) - ;; - - mov r16=cr.ipsr - shr r18=r18,39 // sign extend (39=43-4) - ;; - - add r17=r17,r18 // now add the offset - ;; - mov cr.iip=r17 - dep r16=0,r16,41,2 // clear EI - ;; - - mov cr.ipsr=r16 - ;; - - rfi // and go back -#endif END(speculation_vector) .org ia64_ivt+0x5800 @@ -2115,14 +1323,7 @@ END(debug_vector) // 0x5a00 Entry 30 (size 16 bundles) Unaligned Reference (57) ENTRY(unaligned_access) DBG_FAULT(30) -#ifdef XEN FAULT_OR_REFLECT(30) -#else - mov r16=cr.ipsr - mov r31=pr // prepare to save predicates - ;; - br.sptk.many dispatch_unaligned_handler -#endif END(unaligned_access) .org ia64_ivt+0x5b00 @@ -2130,11 +1331,7 @@ END(unaligned_access) // 0x5b00 Entry 31 (size 16 bundles) Unsupported Data Reference (57) ENTRY(unsupported_data_reference) DBG_FAULT(31) -#ifdef XEN FAULT_OR_REFLECT(31) -#else - FAULT(31) -#endif END(unsupported_data_reference) .org ia64_ivt+0x5c00 @@ -2142,11 +1339,7 @@ END(unsupported_data_reference) // 0x5c00 Entry 32 (size 16 bundles) Floating-Point Fault (64) ENTRY(floating_point_fault) DBG_FAULT(32) -#ifdef XEN FAULT_OR_REFLECT(32) -#else - FAULT(32) -#endif END(floating_point_fault) .org ia64_ivt+0x5d00 @@ -2154,11 +1347,7 @@ END(floating_point_fault) // 0x5d00 Entry 33 (size 16 bundles) Floating Point Trap (66) ENTRY(floating_point_trap) DBG_FAULT(33) -#ifdef XEN FAULT_OR_REFLECT(33) -#else - FAULT(33) -#endif END(floating_point_trap) .org ia64_ivt+0x5e00 @@ -2166,11 +1355,7 @@ END(floating_point_trap) // 0x5e00 Entry 34 (size 16 bundles) Lower Privilege Transfer Trap (66) ENTRY(lower_privilege_trap) DBG_FAULT(34) -#ifdef XEN FAULT_OR_REFLECT(34) -#else - FAULT(34) -#endif END(lower_privilege_trap) .org ia64_ivt+0x5f00 @@ -2178,11 +1363,7 @@ END(lower_privilege_trap) // 0x5f00 Entry 35 (size 16 bundles) Taken Branch Trap (68) ENTRY(taken_branch_trap) DBG_FAULT(35) -#ifdef XEN FAULT_OR_REFLECT(35) -#else - FAULT(35) -#endif END(taken_branch_trap) .org ia64_ivt+0x6000 @@ -2190,11 +1371,7 @@ END(taken_branch_trap) // 0x6000 Entry 36 (size 16 bundles) Single Step Trap (69) ENTRY(single_step_trap) DBG_FAULT(36) -#ifdef XEN FAULT_OR_REFLECT(36) -#else - FAULT(36) -#endif END(single_step_trap) .org ia64_ivt+0x6100 @@ -2252,11 +1429,7 @@ END(single_step_trap) // 73,75,76,77) ENTRY(ia32_exception) DBG_FAULT(45) -#ifdef XEN FAULT_OR_REFLECT(45) -#else - FAULT(45) -#endif END(ia32_exception) .org ia64_ivt+0x6a00 @@ -2264,33 +1437,7 @@ END(ia32_exception) // 0x6a00 Entry 46 (size 16 bundles) IA-32 Intercept (30,31,59,70,71) ENTRY(ia32_intercept) DBG_FAULT(46) -#ifdef XEN FAULT_OR_REFLECT(46) -#else -#ifdef CONFIG_IA32_SUPPORT - mov r31=pr - mov r16=cr.isr - ;; - extr.u r17=r16,16,8 // get ISR.code - mov r18=ar.eflag - mov r19=cr.iim // old eflag value - ;; - cmp.ne p6,p0=2,r17 -(p6) br.cond.spnt 1f // not a system flag fault - xor r16=r18,r19 - ;; - extr.u r17=r16,18,1 // get the eflags.ac bit - ;; - cmp.eq p6,p0=0,r17 -(p6) br.cond.spnt 1f // eflags.ac bit didn't change - ;; - mov pr=r31,-1 // restore predicate registers - rfi - -1: -#endif // CONFIG_IA32_SUPPORT - FAULT(46) -#endif END(ia32_intercept) .org ia64_ivt+0x6b00 @@ -2298,16 +1445,7 @@ END(ia32_intercept) // 0x6b00 Entry 47 (size 16 bundles) IA-32 Interrupt (74) ENTRY(ia32_interrupt) DBG_FAULT(47) -#ifdef XEN FAULT_OR_REFLECT(47) -#else -#ifdef CONFIG_IA32_SUPPORT - mov r31=pr - br.sptk.many dispatch_to_ia32_handler -#else - FAULT(47) -#endif -#endif END(ia32_interrupt) .org ia64_ivt+0x6c00 @@ -2430,7 +1568,6 @@ END(ia32_interrupt) DBG_FAULT(67) FAULT(67) -#ifdef XEN .org ia64_ivt+0x8000 GLOBAL_ENTRY(dispatch_reflection) /* @@ -2472,93 +1609,3 @@ GLOBAL_ENTRY(dispatch_slow_hyperprivop) ;; br.sptk.many dispatch_break_fault_post_save END(dispatch_slow_hyperprivop) -#endif - -#ifdef CONFIG_IA32_SUPPORT - - /* - * There is no particular reason for this code to be here, other - * than that there happens to be space here that would go unused - * otherwise. If this fault ever gets "unreserved", simply move - * the following code to a more suitable spot... - */ - - // IA32 interrupt entry point - -ENTRY(dispatch_to_ia32_handler) - SAVE_MIN - ;; - mov r14=cr.isr - ssm psr.ic | PSR_DEFAULT_BITS - ;; - srlz.i // guarantee that interruption collection is on - ;; -(p15) ssm psr.i - adds r3=8,r2 // Base pointer for SAVE_REST - ;; - SAVE_REST - ;; - mov r15=0x80 - shr r14=r14,16 // Get interrupt number - ;; - cmp.ne p6,p0=r14,r15 -(p6) br.call.dpnt.many b6=non_ia32_syscall - - adds r14=IA64_PT_REGS_R8_OFFSET + 16,sp // 16 byte hole per SW - // conventions - adds r15=IA64_PT_REGS_R1_OFFSET + 16,sp - ;; - cmp.eq pSys,pNonSys=r0,r0 // set pSys=1, pNonSys=0 - ld8 r8=[r14] // get r8 - ;; - st8 [r15]=r8 // save original EAX in r1 (IA32 procs - // don't use the GP) - ;; - alloc r15=ar.pfs,0,0,6,0 // must be first in an insn group - ;; - ld4 r8=[r14],8 // r8 == eax (syscall number) - mov r15=IA32_NR_syscalls - ;; - cmp.ltu.unc p6,p7=r8,r15 - ld4 out1=[r14],8 // r9 == ecx - ;; - ld4 out2=[r14],8 // r10 == edx - ;; - ld4 out0=[r14] // r11 == ebx - adds r14=(IA64_PT_REGS_R13_OFFSET) + 16,sp - ;; - ld4 out5=[r14],PT(R14)-PT(R13) // r13 == ebp - ;; - ld4 out3=[r14],PT(R15)-PT(R14) // r14 == esi - adds r2=TI_FLAGS+IA64_TASK_SIZE,r13 - ;; - ld4 out4=[r14] // r15 == edi - movl r16=ia32_syscall_table - ;; -(p6) shladd r16=r8,3,r16 // force ni_syscall if not valid syscall number - ld4 r2=[r2] // r2 = current_thread_info()->flags - ;; - ld8 r16=[r16] - and r2=_TIF_SYSCALL_TRACEAUDIT,r2 // mask trace or audit - ;; - mov b6=r16 - movl r15=ia32_ret_from_syscall - cmp.eq p8,p0=r2,r0 - ;; - mov rp=r15 -(p8) br.call.sptk.many b6=b6 - br.cond.sptk ia32_trace_syscall - -non_ia32_syscall: - alloc r15=ar.pfs,0,0,2,0 - mov out0=r14 // interrupt # - add out1=16,sp // pointer to pt_regs - ;; // avoid WAW on CFM - br.call.sptk.many rp=ia32_bad_interrupt -.ret1: movl r15=ia64_leave_kernel - ;; - mov rp=r15 - br.ret.sptk.many rp -END(dispatch_to_ia32_handler) - -#endif /* CONFIG_IA32_SUPPORT */ _______________________________________________ Xen-changelog mailing list Xen-changelog@xxxxxxxxxxxxxxxxxxx http://lists.xensource.com/xen-changelog
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |