[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-changelog] [linux-2.6.18-xen] update to latest interface version (4.4.0)
# HG changeset patch # User Jan Beulich <jbeulich@xxxxxxxx> # Date 1390917611 -3600 # Node ID ac24179a78750ed99a8bee90e523af7c28962b3f # Parent c5f5087bd3c729b875beba524f32e0f7e0ca3fb5 update to latest interface version (4.4.0) Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx --- diff -r c5f5087bd3c7 -r ac24179a7875 arch/ia64/xen/hypervisor.c --- a/arch/ia64/xen/hypervisor.c Tue Jan 28 14:08:04 2014 +0100 +++ b/arch/ia64/xen/hypervisor.c Tue Jan 28 15:00:11 2014 +0100 @@ -260,7 +260,7 @@ xen_limit_pages_to_max_mfn(struct page * #include <xen/interface/xen.h> #include <xen/gnttab.h> -void *arch_gnttab_alloc_shared(unsigned long *frames) +void *arch_gnttab_alloc_shared(xen_pfn_t *frames) { return __va(frames[0] << PAGE_SHIFT); } diff -r c5f5087bd3c7 -r ac24179a7875 arch/ia64/xen/xcom_hcall.c --- a/arch/ia64/xen/xcom_hcall.c Tue Jan 28 14:08:04 2014 +0100 +++ b/arch/ia64/xen/xcom_hcall.c Tue Jan 28 15:00:11 2014 +0100 @@ -721,9 +721,9 @@ xencomm_hypercall_kexec_op(int cmd, void case KEXEC_CMD_kexec_get_range: argsize = sizeof(xen_kexec_range_t); break; - case KEXEC_CMD_kexec_load: - case KEXEC_CMD_kexec_unload: - argsize = sizeof(xen_kexec_load_t); + case KEXEC_CMD_kexec_load_v1: + case KEXEC_CMD_kexec_unload_v1: + argsize = sizeof(xen_kexec_load_v1_t); break; case KEXEC_CMD_kexec: argsize = sizeof(xen_kexec_exec_t); diff -r c5f5087bd3c7 -r ac24179a7875 arch/powerpc/platforms/xen/gnttab.c --- a/arch/powerpc/platforms/xen/gnttab.c Tue Jan 28 14:08:04 2014 +0100 +++ b/arch/powerpc/platforms/xen/gnttab.c Tue Jan 28 15:00:11 2014 +0100 @@ -448,7 +448,7 @@ static void setup_grant_area(void) foreign_map_pgs = pgs; } -void *arch_gnttab_alloc_shared(unsigned long *frames) +void *arch_gnttab_alloc_shared(xen_pfn_t *frames) { void *shared; ulong pa = frames[0] << PAGE_SHIFT; diff -r c5f5087bd3c7 -r ac24179a7875 arch/powerpc/platforms/xen/hcall.c --- a/arch/powerpc/platforms/xen/hcall.c Tue Jan 28 14:08:04 2014 +0100 +++ b/arch/powerpc/platforms/xen/hcall.c Tue Jan 28 15:00:11 2014 +0100 @@ -242,11 +242,9 @@ int HYPERVISOR_kexec_op(unsigned long op case KEXEC_CMD_kexec_get_range: argsize = sizeof(struct xen_kexec_range); break; - case KEXEC_CMD_kexec_load: - argsize = sizeof(struct xen_kexec_load); - break; - case KEXEC_CMD_kexec_unload: - argsize = sizeof(struct xen_kexec_load); + case KEXEC_CMD_kexec_load_v1: + case KEXEC_CMD_kexec_unload_v1: + argsize = sizeof(struct xen_kexec_load_v1); break; case KEXEC_CMD_kexec: argsize = sizeof(struct xen_kexec_exec); diff -r c5f5087bd3c7 -r ac24179a7875 drivers/xen/Kconfig --- a/drivers/xen/Kconfig Tue Jan 28 14:08:04 2014 +0100 +++ b/drivers/xen/Kconfig Tue Jan 28 15:00:11 2014 +0100 @@ -10,7 +10,7 @@ config XEN if XEN config XEN_INTERFACE_VERSION hex - default 0x00040200 + default 0x00040400 menu "XEN" @@ -342,6 +342,12 @@ choice config XEN_COMPAT_040200_AND_LATER bool "4.2.0 and later" + config XEN_COMPAT_040300_AND_LATER + bool "4.3.0 and later" + + config XEN_COMPAT_040400_AND_LATER + bool "4.4.0 and later" + config XEN_COMPAT_LATEST_ONLY bool "no compatibility code" @@ -350,6 +356,8 @@ endchoice config XEN_COMPAT hex default 0xffffff if XEN_COMPAT_LATEST_ONLY + default 0x040400 if XEN_COMPAT_040400_AND_LATER + default 0x040300 if XEN_COMPAT_040300_AND_LATER default 0x040200 if XEN_COMPAT_040200_AND_LATER default 0x040100 if XEN_COMPAT_040100_AND_LATER default 0x040000 if XEN_COMPAT_040000_AND_LATER diff -r c5f5087bd3c7 -r ac24179a7875 drivers/xen/core/evtchn.c --- a/drivers/xen/core/evtchn.c Tue Jan 28 14:08:04 2014 +0100 +++ b/drivers/xen/core/evtchn.c Tue Jan 28 15:00:11 2014 +0100 @@ -54,8 +54,8 @@ static DEFINE_SPINLOCK(irq_mapping_update_lock); /* IRQ <-> event-channel mappings. */ -static int evtchn_to_irq[NR_EVENT_CHANNELS] = { - [0 ... NR_EVENT_CHANNELS-1] = -1 }; +static int evtchn_to_irq[EVTCHN_2L_NR_CHANNELS] = { + [0 ... EVTCHN_2L_NR_CHANNELS-1] = -1 }; /* Packed IRQ information: binding type, sub-type index, and event channel. */ static u32 irq_info[NR_IRQS]; @@ -85,7 +85,7 @@ static inline u32 mk_irq_info(u32 type, BUILD_BUG_ON(NR_IPIS > (1U << _INDEX_BITS)); BUG_ON(index >> _INDEX_BITS); - BUILD_BUG_ON(NR_EVENT_CHANNELS > (1U << _EVTCHN_BITS)); + BUILD_BUG_ON(EVTCHN_2L_NR_CHANNELS > (1U << _EVTCHN_BITS)); return ((type << (32 - _IRQT_BITS)) | (index << _EVTCHN_BITS) | evtchn); } @@ -126,8 +126,8 @@ static int irq_bindcount[NR_IRQS]; #ifdef CONFIG_SMP -static u8 cpu_evtchn[NR_EVENT_CHANNELS]; -static unsigned long cpu_evtchn_mask[NR_CPUS][NR_EVENT_CHANNELS/BITS_PER_LONG]; +static u8 cpu_evtchn[EVTCHN_2L_NR_CHANNELS]; +static unsigned long cpu_evtchn_mask[NR_CPUS][EVTCHN_2L_NR_CHANNELS/BITS_PER_LONG]; static inline unsigned long active_evtchns(unsigned int cpu, shared_info_t *sh, unsigned int idx) @@ -1006,7 +1006,7 @@ void disable_all_local_evtchn(void) unsigned i, cpu = smp_processor_id(); shared_info_t *s = HYPERVISOR_shared_info; - for (i = 0; i < NR_EVENT_CHANNELS; ++i) + for (i = 0; i < EVTCHN_2L_NR_CHANNELS; ++i) if (cpu_from_evtchn(i) == cpu) synch_set_bit(i, &s->evtchn_mask[0]); } @@ -1085,7 +1085,7 @@ void irq_resume(void) } /* New event-channel space is not 'live' yet. */ - for (evtchn = 0; evtchn < NR_EVENT_CHANNELS; evtchn++) + for (evtchn = 0; evtchn < EVTCHN_2L_NR_CHANNELS; evtchn++) mask_evtchn(evtchn); /* Check that no PIRQs are still bound. */ @@ -1095,7 +1095,7 @@ void irq_resume(void) /* No IRQ <-> event-channel mappings. */ for (irq = 0; irq < NR_IRQS; irq++) irq_info[irq] &= ~((1U << _EVTCHN_BITS) - 1); - for (evtchn = 0; evtchn < NR_EVENT_CHANNELS; evtchn++) + for (evtchn = 0; evtchn < EVTCHN_2L_NR_CHANNELS; evtchn++) evtchn_to_irq[evtchn] = -1; for_each_possible_cpu(cpu) { @@ -1181,7 +1181,7 @@ void __init xen_init_IRQ(void) pirq_eoi_does_unmask = 1; /* No event channels are 'live' right now. */ - for (i = 0; i < NR_EVENT_CHANNELS; i++) + for (i = 0; i < EVTCHN_2L_NR_CHANNELS; i++) mask_evtchn(i); /* No IRQ -> event-channel mappings. */ diff -r c5f5087bd3c7 -r ac24179a7875 drivers/xen/core/gnttab.c --- a/drivers/xen/core/gnttab.c Tue Jan 28 14:08:04 2014 +0100 +++ b/drivers/xen/core/gnttab.c Tue Jan 28 15:00:11 2014 +0100 @@ -542,7 +542,7 @@ static int unmap_pte_fn(pte_t *pte, stru return 0; } -void *arch_gnttab_alloc_shared(unsigned long *frames) +void *arch_gnttab_alloc_shared(xen_pfn_t *frames) { struct vm_struct *area; area = alloc_vm_area(PAGE_SIZE * max_nr_grant_frames()); @@ -554,11 +554,11 @@ void *arch_gnttab_alloc_shared(unsigned static int gnttab_map(unsigned int start_idx, unsigned int end_idx) { struct gnttab_setup_table setup; - unsigned long *frames; + xen_pfn_t *frames; unsigned int nr_gframes = end_idx + 1; int rc; - frames = kmalloc(nr_gframes * sizeof(unsigned long), GFP_ATOMIC); + frames = kmalloc(nr_gframes * sizeof(*frames), GFP_ATOMIC); if (!frames) return -ENOMEM; diff -r c5f5087bd3c7 -r ac24179a7875 drivers/xen/core/machine_kexec.c --- a/drivers/xen/core/machine_kexec.c Tue Jan 28 14:08:04 2014 +0100 +++ b/drivers/xen/core/machine_kexec.c Tue Jan 28 15:00:11 2014 +0100 @@ -186,12 +186,12 @@ static void setup_load_arg(xen_kexec_ima */ int xen_machine_kexec_load(struct kimage *image) { - xen_kexec_load_t xkl; + xen_kexec_load_v1_t xkl; memset(&xkl, 0, sizeof(xkl)); xkl.type = image->type; setup_load_arg(&xkl.image, image); - return HYPERVISOR_kexec_op(KEXEC_CMD_kexec_load, &xkl); + return HYPERVISOR_kexec_op(KEXEC_CMD_kexec_load_v1, &xkl); } /* @@ -202,11 +202,11 @@ int xen_machine_kexec_load(struct kimage */ void xen_machine_kexec_unload(struct kimage *image) { - xen_kexec_load_t xkl; + xen_kexec_load_v1_t xkl; memset(&xkl, 0, sizeof(xkl)); xkl.type = image->type; - WARN_ON(HYPERVISOR_kexec_op(KEXEC_CMD_kexec_unload, &xkl)); + WARN_ON(HYPERVISOR_kexec_op(KEXEC_CMD_kexec_unload_v1, &xkl)); } /* diff -r c5f5087bd3c7 -r ac24179a7875 drivers/xen/evtchn/evtchn.c --- a/drivers/xen/evtchn/evtchn.c Tue Jan 28 14:08:04 2014 +0100 +++ b/drivers/xen/evtchn/evtchn.c Tue Jan 28 15:00:11 2014 +0100 @@ -69,7 +69,7 @@ struct per_user_data { }; /* Who's bound to each port? */ -static struct per_user_data *port_user[NR_EVENT_CHANNELS]; +static struct per_user_data *port_user[EVTCHN_2L_NR_CHANNELS]; static spinlock_t port_user_lock; void evtchn_device_upcall(int port) @@ -115,7 +115,7 @@ static void evtchn_check_wrong_delivery( spin_lock_irq(&port_user_lock); - for (port = 0; port < NR_EVENT_CHANNELS; port++) + for (port = 0; port < EVTCHN_2L_NR_CHANNELS; port++) if (port_user[port] == u) rebind_evtchn_to_cpu(port, current_cpu); @@ -223,7 +223,7 @@ static ssize_t evtchn_write(struct file spin_lock_irq(&port_user_lock); for (i = 0; i < (count/sizeof(evtchn_port_t)); i++) - if ((kbuf[i] < NR_EVENT_CHANNELS) && (port_user[kbuf[i]] == u)) + if ((kbuf[i] < EVTCHN_2L_NR_CHANNELS) && (port_user[kbuf[i]] == u)) unmask_evtchn(kbuf[i]); spin_unlock_irq(&port_user_lock); @@ -338,7 +338,7 @@ static long evtchn_ioctl(struct file *fi break; rc = -EINVAL; - if (unbind.port >= NR_EVENT_CHANNELS) + if (unbind.port >= EVTCHN_2L_NR_CHANNELS) break; spin_lock_irq(&port_user_lock); @@ -370,7 +370,7 @@ static long evtchn_ioctl(struct file *fi if (copy_from_user(¬ify, uarg, sizeof(notify))) break; - if (notify.port >= NR_EVENT_CHANNELS) { + if (notify.port >= EVTCHN_2L_NR_CHANNELS) { rc = -EINVAL; } else if (port_user[notify.port] != u) { rc = -ENOTCONN; @@ -454,7 +454,7 @@ static int evtchn_release(struct inode * free_page((unsigned long)u->ring); - for (i = 0; i < NR_EVENT_CHANNELS; i++) { + for (i = 0; i < EVTCHN_2L_NR_CHANNELS; i++) { int ret; if (port_user[i] != u) continue; @@ -505,12 +505,12 @@ static int evtchn_cpu_notify(struct noti case CPU_DOWN_PREPARE: cpu_clear(hotcpu, map); spin_lock_irq(&port_user_lock); - for (i = 0; i < NR_EVENT_CHANNELS; i++) { + for (i = 0; i < EVTCHN_2L_NR_CHANNELS; i++) { u = port_user[i]; if ((u == NULL) || (u->bind_cpu != hotcpu)) continue; newcpu = next_bind_cpu(map); - for (j = i; j < NR_EVENT_CHANNELS; j++) + for (j = i; j < EVTCHN_2L_NR_CHANNELS; j++) if (port_user[j] == u) rebind_evtchn_to_cpu(j, newcpu); u->bind_cpu = newcpu; diff -r c5f5087bd3c7 -r ac24179a7875 include/asm-i386/acpi.h --- a/include/asm-i386/acpi.h Tue Jan 28 14:08:04 2014 +0100 +++ b/include/asm-i386/acpi.h Tue Jan 28 15:00:11 2014 +0100 @@ -161,16 +161,15 @@ extern int acpi_irq_balance_set(char *st #ifdef CONFIG_XEN static inline int acpi_notify_hypervisor_state(u8 sleep_state, - u32 pm1a_cnt_val, - u32 pm1b_cnt_val) + u32 val_a, u32 val_b) { struct xen_platform_op op = { .cmd = XENPF_enter_acpi_sleep, .interface_version = XENPF_INTERFACE_VERSION, .u = { .enter_acpi_sleep = { - .pm1a_cnt_val = pm1a_cnt_val, - .pm1b_cnt_val = pm1b_cnt_val, + .val_a = val_a, + .val_b = val_b, .sleep_state = sleep_state, }, }, diff -r c5f5087bd3c7 -r ac24179a7875 include/asm-i386/mach-xen/mach_traps.h --- a/include/asm-i386/mach-xen/mach_traps.h Tue Jan 28 14:08:04 2014 +0100 +++ b/include/asm-i386/mach-xen/mach_traps.h Tue Jan 28 15:00:11 2014 +0100 @@ -22,7 +22,7 @@ static inline unsigned char get_nmi_reas */ if (test_bit(_XEN_NMIREASON_io_error, &s->arch.nmi_reason)) reason |= 0x40; - if (test_bit(_XEN_NMIREASON_parity_error, &s->arch.nmi_reason)) + if (test_bit(_XEN_NMIREASON_pci_serr, &s->arch.nmi_reason)) reason |= 0x80; return reason; diff -r c5f5087bd3c7 -r ac24179a7875 include/asm-x86_64/acpi.h --- a/include/asm-x86_64/acpi.h Tue Jan 28 14:08:04 2014 +0100 +++ b/include/asm-x86_64/acpi.h Tue Jan 28 15:00:11 2014 +0100 @@ -134,16 +134,15 @@ extern int acpi_irq_balance_set(char *st #ifdef CONFIG_XEN static inline int acpi_notify_hypervisor_state(u8 sleep_state, - u32 pm1a_cnt_val, - u32 pm1b_cnt_val) + u32 val_a, u32 val_b) { struct xen_platform_op op = { .cmd = XENPF_enter_acpi_sleep, .interface_version = XENPF_INTERFACE_VERSION, .u = { .enter_acpi_sleep = { - .pm1a_cnt_val = pm1a_cnt_val, - .pm1b_cnt_val = pm1b_cnt_val, + .val_a = val_a, + .val_b = val_b, .sleep_state = sleep_state, }, }, diff -r c5f5087bd3c7 -r ac24179a7875 include/asm-x86_64/mach-xen/asm/nmi.h --- a/include/asm-x86_64/mach-xen/asm/nmi.h Tue Jan 28 14:08:04 2014 +0100 +++ b/include/asm-x86_64/mach-xen/asm/nmi.h Tue Jan 28 15:00:11 2014 +0100 @@ -62,7 +62,7 @@ static inline unsigned char get_nmi_reas */ if (test_bit(_XEN_NMIREASON_io_error, &s->arch.nmi_reason)) reason |= 0x40; - if (test_bit(_XEN_NMIREASON_parity_error, &s->arch.nmi_reason)) + if (test_bit(_XEN_NMIREASON_pci_serr, &s->arch.nmi_reason)) reason |= 0x80; return reason; diff -r c5f5087bd3c7 -r ac24179a7875 include/xen/gnttab.h --- a/include/xen/gnttab.h Tue Jan 28 14:08:04 2014 +0100 +++ b/include/xen/gnttab.h Tue Jan 28 15:00:11 2014 +0100 @@ -116,7 +116,7 @@ void gnttab_reset_grant_page(struct page int gnttab_suspend(void); int gnttab_resume(void); -void *arch_gnttab_alloc_shared(unsigned long *frames); +void *arch_gnttab_alloc_shared(xen_pfn_t *frames); static inline void gnttab_set_map_op(struct gnttab_map_grant_ref *map, maddr_t addr, _______________________________________________ Xen-changelog mailing list Xen-changelog@xxxxxxxxxxxxx http://lists.xensource.com/xen-changelog
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |