ia64/xen-unstable

changeset 9854:4174856876f9

[IA64] remove remaining asm warnings

Fix all remaining warnings generated by gas.
Enforce the no gas warnings by using --fatal-warnings gas flag.

Signed-off-by: Tristan Gingold <tristan.gingold@bull.net>
author awilliam@xenbuild.aw
date Wed Apr 26 12:50:42 2006 -0600 (2006-04-26)
parents fcfc614d3713
children 81e0f13bf33c
files xen/arch/ia64/Rules.mk xen/arch/ia64/linux-xen/entry.S xen/arch/ia64/linux-xen/head.S xen/arch/ia64/linux-xen/unaligned.c xen/arch/ia64/vmx/vmx_ivt.S xen/arch/ia64/vmx/vmx_phy_mode.c xen/arch/ia64/xen/hyperprivop.S xen/include/asm-ia64/config.h
line diff
     1.1 --- a/xen/arch/ia64/Rules.mk	Wed Apr 26 12:44:45 2006 -0600
     1.2 +++ b/xen/arch/ia64/Rules.mk	Wed Apr 26 12:50:42 2006 -0600
     1.3 @@ -9,7 +9,7 @@ ifneq ($(COMPILE_ARCH),$(TARGET_ARCH))
     1.4  CROSS_COMPILE ?= /usr/local/sp_env/v2.2.5/i686/bin/ia64-unknown-linux-
     1.5  endif
     1.6  AFLAGS  += -D__ASSEMBLY__ -nostdinc $(CPPFLAGS)
     1.7 -AFLAGS  += -mconstant-gp
     1.8 +AFLAGS  += -mconstant-gp -Wa,--fatal-warnings
     1.9  CPPFLAGS  += -I$(BASEDIR)/include -I$(BASEDIR)/include/asm-ia64 	\
    1.10               -I$(BASEDIR)/include/asm-ia64/linux 			\
    1.11  	     -I$(BASEDIR)/include/asm-ia64/linux-xen 			\
    1.12 @@ -17,7 +17,7 @@ CPPFLAGS  += -I$(BASEDIR)/include -I$(BA
    1.13               -I$(BASEDIR)/arch/ia64/linux -I$(BASEDIR)/arch/ia64/linux-xen
    1.14  
    1.15  CFLAGS  += -nostdinc -fno-builtin -fno-common -fno-strict-aliasing
    1.16 -CFLAGS  += -mconstant-gp
    1.17 +CFLAGS  += -mconstant-gp -Wa,--fatal-warnings
    1.18  #CFLAGS  += -O3		# -O3 over-inlines making debugging tough!
    1.19  CFLAGS  += -O2		# but no optimization causes compile errors!
    1.20  #CFLAGS  += -iwithprefix include -Wall -DMONITOR_BASE=$(MONITOR_BASE)
     2.1 --- a/xen/arch/ia64/linux-xen/entry.S	Wed Apr 26 12:44:45 2006 -0600
     2.2 +++ b/xen/arch/ia64/linux-xen/entry.S	Wed Apr 26 12:50:42 2006 -0600
     2.3 @@ -899,6 +899,7 @@ GLOBAL_ENTRY(ia64_leave_kernel)
     2.4  #endif
     2.5  .work_processed_kernel:
     2.6  #ifdef XEN
     2.7 +	;;
     2.8  (pUStk) ssm psr.i
     2.9  (pUStk)    br.call.sptk.many b0=process_soft_irq
    2.10  (pUStk) rsm psr.i
     3.1 --- a/xen/arch/ia64/linux-xen/head.S	Wed Apr 26 12:44:45 2006 -0600
     3.2 +++ b/xen/arch/ia64/linux-xen/head.S	Wed Apr 26 12:50:42 2006 -0600
     3.3 @@ -363,8 +363,8 @@ 1:	// now we are in virtual mode
     3.4  	;;
     3.5  	ssm psr.ic
     3.6  	srlz.d
     3.7 +#endif
     3.8    	;;
     3.9 -#endif
    3.10  	
    3.11  .load_current:
    3.12  	// load the "current" pointer (r13) and ar.k6 with the current task
     4.1 --- a/xen/arch/ia64/linux-xen/unaligned.c	Wed Apr 26 12:44:45 2006 -0600
     4.2 +++ b/xen/arch/ia64/linux-xen/unaligned.c	Wed Apr 26 12:50:42 2006 -0600
     4.3 @@ -921,8 +921,6 @@ setfpreg (unsigned long regnum, struct i
     4.4  		regs->f##reg.u.bits[1] = fpval->u.bits[1] ;	\
     4.5  		break
     4.6  	switch(regnum) {
     4.7 -		CASE_FIXED_FP(0);
     4.8 -		CASE_FIXED_FP(1);
     4.9  		CASE_FIXED_FP(2);
    4.10  		CASE_FIXED_FP(3);
    4.11  		CASE_FIXED_FP(4);
     5.1 --- a/xen/arch/ia64/vmx/vmx_ivt.S	Wed Apr 26 12:44:45 2006 -0600
     5.2 +++ b/xen/arch/ia64/vmx/vmx_ivt.S	Wed Apr 26 12:50:42 2006 -0600
     5.3 @@ -379,7 +379,7 @@ END(vmx_dkey_miss)
     5.4  ENTRY(vmx_dirty_bit)
     5.5      VMX_DBG_FAULT(8)
     5.6  	VMX_REFLECT(8)
     5.7 -END(vmx_idirty_bit)
     5.8 +END(vmx_dirty_bit)
     5.9  
    5.10  	.org vmx_ia64_ivt+0x2400
    5.11  /////////////////////////////////////////////////////////////////////////////////////////
     6.1 --- a/xen/arch/ia64/vmx/vmx_phy_mode.c	Wed Apr 26 12:44:45 2006 -0600
     6.2 +++ b/xen/arch/ia64/vmx/vmx_phy_mode.c	Wed Apr 26 12:50:42 2006 -0600
     6.3 @@ -193,29 +193,38 @@ vmx_load_all_rr(VCPU *vcpu)
     6.4  		phy_rr.ve = 1;
     6.5  
     6.6  		ia64_set_rr((VRN0 << VRN_SHIFT), phy_rr.rrval);
     6.7 +		ia64_dv_serialize_data();
     6.8  		phy_rr.rrval = vcpu->arch.metaphysical_rr4;
     6.9  		//phy_rr.ps = PAGE_SHIFT;
    6.10  		phy_rr.ve = 1;
    6.11  
    6.12  		ia64_set_rr((VRN4 << VRN_SHIFT), phy_rr.rrval);
    6.13 +		ia64_dv_serialize_data();
    6.14  	} else {
    6.15  		ia64_set_rr((VRN0 << VRN_SHIFT),
    6.16  			     vrrtomrr(vcpu, VMX(vcpu, vrr[VRN0])));
    6.17 +		ia64_dv_serialize_data();
    6.18  		ia64_set_rr((VRN4 << VRN_SHIFT),
    6.19  			     vrrtomrr(vcpu, VMX(vcpu, vrr[VRN4])));
    6.20 +		ia64_dv_serialize_data();
    6.21  	}
    6.22  
    6.23  	/* rr567 will be postponed to last point when resuming back to guest */
    6.24  	ia64_set_rr((VRN1 << VRN_SHIFT),
    6.25  		     vrrtomrr(vcpu, VMX(vcpu, vrr[VRN1])));
    6.26 +	ia64_dv_serialize_data();
    6.27  	ia64_set_rr((VRN2 << VRN_SHIFT),
    6.28  		     vrrtomrr(vcpu, VMX(vcpu, vrr[VRN2])));
    6.29 +	ia64_dv_serialize_data();
    6.30  	ia64_set_rr((VRN3 << VRN_SHIFT),
    6.31  		     vrrtomrr(vcpu, VMX(vcpu, vrr[VRN3])));
    6.32 +	ia64_dv_serialize_data();
    6.33  	ia64_set_rr((VRN5 << VRN_SHIFT),
    6.34  		     vrrtomrr(vcpu, VMX(vcpu, vrr[VRN5])));
    6.35 +	ia64_dv_serialize_data();
    6.36  	ia64_set_rr((VRN6 << VRN_SHIFT),
    6.37  		     vrrtomrr(vcpu, VMX(vcpu, vrr[VRN6])));
    6.38 +	ia64_dv_serialize_data();
    6.39  	vmx_switch_rr7(vrrtomrr(vcpu,VMX(vcpu, vrr[VRN7])),
    6.40  			(void *)vcpu->domain->shared_info,
    6.41  			(void *)vcpu->arch.privregs,
     7.1 --- a/xen/arch/ia64/xen/hyperprivop.S	Wed Apr 26 12:44:45 2006 -0600
     7.2 +++ b/xen/arch/ia64/xen/hyperprivop.S	Wed Apr 26 12:50:42 2006 -0600
     7.3 @@ -2087,7 +2087,6 @@ GLOBAL_ENTRY(fast_insert)
     7.4  (p6)	itc.d r22;;
     7.5  (p7)	itc.i r22;;
     7.6  	dv_serialize_data
     7.7 -	// FIXME: how do I make assembler warnings go away here?
     7.8  	// vhpt_insert(r23=vaddr,r22=pte,r24=logps<<2)
     7.9  	thash r28=r23
    7.10  	or r26=1,r22;;
     8.1 --- a/xen/include/asm-ia64/config.h	Wed Apr 26 12:44:45 2006 -0600
     8.2 +++ b/xen/include/asm-ia64/config.h	Wed Apr 26 12:50:42 2006 -0600
     8.3 @@ -277,4 +277,8 @@ extern int ht_per_core;
     8.4  #define FORCE_CRASH	break.m 0;;
     8.5  #endif
     8.6  
     8.7 +/* Allow .serialize.data/instruction in asm files.
     8.8 +   Old as doesn't handle this.  */
     8.9 +#define HAVE_SERIALIZE_DIRECTIVE
    8.10 +
    8.11  #endif	/* _IA64_CONFIG_H_ */