From owner-freebsd-sparc64@freebsd.org Mon Dec 14 19:47:06 2015 Return-Path: Delivered-To: freebsd-sparc64@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 09562A43F17; Mon, 14 Dec 2015 19:47:06 +0000 (UTC) (envelope-from swills@FreeBSD.org) Received: from mouf.net (mouf.net [IPv6:2607:fc50:0:4400:216:3eff:fe69:33b3]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client CN "mouf.net", Issuer "mouf.net" (not verified)) by mx1.freebsd.org (Postfix) with ESMTPS id DB4031EED; Mon, 14 Dec 2015 19:47:05 +0000 (UTC) (envelope-from swills@FreeBSD.org) Received: from [0.0.0.0] (cpe-071-065-239-148.nc.res.rr.com [71.65.239.148] (may be forged)) (authenticated bits=0) by mouf.net (8.14.9/8.14.9) with ESMTP id tBEJkhcb076002 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES128-SHA bits=128 verify=NOT); Mon, 14 Dec 2015 19:46:57 GMT (envelope-from swills@FreeBSD.org) Subject: Re: Testing an Open Firmware interrupt-map patch To: Andrew Turner , freebsd-ppc@FreeBSD.org, freebsd-sparc64@FreeBSD.org References: <20151214134625.79283652@zapp> From: Steve Wills Message-ID: <566F1CA4.6010804@FreeBSD.org> Date: Mon, 14 Dec 2015 14:46:44 -0500 User-Agent: Mozilla/5.0 (X11; FreeBSD amd64; rv:38.0) Gecko/20100101 Thunderbird/38.3.0 MIME-Version: 1.0 In-Reply-To: <20151214134625.79283652@zapp> Content-Type: text/plain; charset=windows-1252 Content-Transfer-Encoding: 7bit X-Greylist: Sender succeeded SMTP AUTH, not delayed by milter-greylist-4.4.3 (mouf.net [199.48.129.64]); Mon, 14 Dec 2015 19:46:59 +0000 (UTC) X-Spam-Status: No, score=2.6 required=4.5 tests=RCVD_ILLEGAL_IP,RDNS_NONE autolearn=no autolearn_force=no version=3.4.1 X-Spam-Level: ** X-Spam-Checker-Version: SpamAssassin 3.4.1 (2015-04-28) on mouf.net X-Virus-Scanned: clamav-milter 0.98.7 at mouf.net X-Virus-Status: Clean X-BeenThere: freebsd-sparc64@freebsd.org X-Mailman-Version: 2.1.20 Precedence: list List-Id: Porting FreeBSD to the Sparc List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 14 Dec 2015 19:47:06 -0000 On 12/14/2015 08:46, Andrew Turner wrote: > Hello, > > I'm looking for testers for a patch to update how we parse the > interrupt-map property to follow the ePAPR spec. This property is > commonly used with PCIe controllers. > > The current code doesn't take the parent address size property. When > this is non-zero we need to also read these values. This is needed on > an arm64 board I have as the interrupt parent has memory-mapped > children so needs this to be set. > > I have a patch at [1] to add this, however would like it if this could > be tested on other platforms using this code to check it doesn't break > these platforms before I commit it. > > I welcome feedback on this patch as I would like to commit this soon. Built a kernel with this and it booted fine. Though my kernel is a bit old (r290126) and has another minor change . Is there any other testing you're looking for? Steve