Displaying 20 results from an estimated 42 matches for "gdprintk".
Did you mean:
dprintk
2007 Dec 10
0
[PATCH] avoid duplication of domain ID in messages
...======================
--- 2007-12-10.orig/xen/arch/x86/hvm/hvm.c 2007-12-10 09:19:12.000000000 +0100
+++ 2007-12-10/xen/arch/x86/hvm/hvm.c 2007-12-10 09:22:53.000000000 +0100
@@ -533,8 +533,7 @@ static void hvm_vcpu_down(void)
struct domain *d = v->domain;
int online_count = 0;
- gdprintk(XENLOG_INFO, "DOM%d/VCPU%d: going offline.\n",
- d->domain_id, v->vcpu_id);
+ gdprintk(XENLOG_INFO, "VCPU%d: going offline.\n", v->vcpu_id);
/* Doesn''t halt us immediately, but we''ll never return to guest context. */
set_bit(_V...
2013 Nov 14
4
[PATCH] xen/arm: Allow balooning working with 1:1 memory mapping
...page = alloc_domheap_pages(d, a->extent_order, a->memflags);
+#ifdef CONFIG_ARM
+ if ( d == dom0 && platform_has_quirk(PLATFORM_QUIRK_DOM0_MAPPING_11) )
+ {
+ mfn = gpfn;
+ if (!mfn_valid(mfn))
+ {
+ gdprintk(XENLOG_INFO, "Invalid mfn 0x%"PRI_xen_pfn"\n",
+ mfn);
+ goto out;
+ }
+
+ page = mfn_to_page(mfn);
+ if ( !get_page(page, d) )
+ {
+ gdprintk(XENLOG_INF...
2007 Aug 27
3
[PATCH] Limit MCG Cap
Intercept guest reads of MSR_IA32_MCG_CAP and limit the number of memory banks reported to one.
This prevents us from trying to read status of non-existent banks when migrated to a machine
with fewer banks.
Signed-off-by: Ben Guthro
Signed-off-by: David Lively <dlively@virtualiron.com>
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xensource.com
2012 May 24
11
[PATCH 0/3] XEN: fix vmx exception mistake
This series of patches fix the mistake for debug exception(#DB), overflow
exception(#OF) and INT3(#BP), INTn instruction emulation.
Introduce new function vmx_inject_sw_exception() which deliver the software
excetion, software interrupt and privileged software exception. Split hardware
exception as a seperate function(old function vmx_inject_hw_exception()).
Also Passed down intruction length
2013 Feb 21
2
[PATCH v3] x86/nhvm: properly clean up after failure to set up all vCPU-s
...p;& hvm_funcs.nhvm_vcpu_destroy )
+ if ( hvm_funcs.nhvm_vcpu_destroy )
hvm_funcs.nhvm_vcpu_destroy(v);
}
--- a/xen/arch/x86/hvm/vmx/vvmx.c
+++ b/xen/arch/x86/hvm/vmx/vvmx.c
@@ -62,7 +62,7 @@ int nvmx_vcpu_initialise(struct vcpu *v)
if ( !nvcpu->nv_n2vmcx )
{
gdprintk(XENLOG_ERR, "nest: allocation for shadow vmcs failed\n");
- goto out;
+ return -ENOMEM;
}
/* non-root VMREAD/VMWRITE bitmap. */
@@ -75,7 +75,7 @@ int nvmx_vcpu_initialise(struct vcpu *v)
if ( !vmread_bitmap )
{
gdprintk(XENLOG_ERR, "n...
2007 Oct 03
0
[PATCH 3/3] TLB flushing and IO memory mapping
...)) ||
- unlikely(!((op->flags & GNTMAP_readonly) ?
- get_page(mfn_to_page(frame), rd) :
- get_page_and_type(mfn_to_page(frame), rd,
- PGT_writable_page))) )
- {
- if ( !rd->is_dying )
- gdprintk(XENLOG_WARNING, "Could not pin grant frame %lx\n",
frame);
- rc = GNTST_general_error;
- goto undo_out;
- }
-
- if ( op->flags & GNTMAP_host_map )
- {
- rc = create_grant_host_mapping(op->host_addr, frame, op-
>flags);
- if ( rc != GNTST_o...
2010 May 04
0
[PATCH] svm: support EFER.LMSLE for guests
...}
@@ -641,7 +642,8 @@ static int hvm_load_cpu_ctxt(struct doma
}
if ( !hvm_efer_valid(
- ctxt.msr_efer, EFER_FFXSE | EFER_LME | EFER_LMA | EFER_NX | EFER_SCE) )
+ ctxt.msr_efer,
+ EFER_FFXSE | EFER_LMSLE | EFER_LME | EFER_LMA | EFER_NX | EFER_SCE) )
{
gdprintk(XENLOG_ERR, "HVM restore: bad EFER 0x%"PRIx64"\n",
ctxt.msr_efer);
@@ -995,7 +997,8 @@ int hvm_set_efer(uint64_t value)
value &= ~EFER_LMA;
- if ( !hvm_efer_valid(value, EFER_FFXSE | EFER_LME | EFER_NX | EFER_SCE) )
+ if ( !hvm_efer_valid(val...
2012 May 25
0
[PATCH 3/3] gnttab: cleanup
...ts = 0;
@@ -525,7 +525,8 @@ __gnttab_map_grant_ref(
return;
}
- if ( unlikely((handle = get_maptrack_handle(ld->grant_table)) == -1) )
+ lgt = ld->grant_table;
+ if ( unlikely((handle = get_maptrack_handle(lgt)) == -1) )
{
rcu_unlock_domain(rd);
gdprintk(XENLOG_INFO, "Failed to obtain maptrack handle.\n");
@@ -533,26 +534,27 @@ __gnttab_map_grant_ref(
return;
}
- spin_lock(&rd->grant_table->lock);
+ rgt = rd->grant_table;
+ spin_lock(&rgt->lock);
- if ( rd->grant_table->gt_version ==...
2013 Nov 26
6
[PATCH v5] x86: properly handle MSI-X unmask operation from guests
...a/xen/arch/x86/hvm/io.c b/xen/arch/x86/hvm/io.c
index deb7b92..bd751d1 100644
--- a/xen/arch/x86/hvm/io.c
+++ b/xen/arch/x86/hvm/io.c
@@ -298,7 +298,11 @@ void hvm_io_assist(ioreq_t *p)
}
if ( p->state == STATE_IOREQ_NONE )
+ {
+ if ( !msix_post_handler(curr) )
+ gdprintk(XENLOG_WARNING, "msix_post_handler error\n");
vcpu_end_shutdown_deferral(curr);
+ }
}
static int dpci_ioport_read(uint32_t mport, ioreq_t *p)
diff --git a/xen/arch/x86/hvm/vmsi.c b/xen/arch/x86/hvm/vmsi.c
index 4826b4a..7178de9 100644
--- a/xen/arch/x86/hvm/vmsi.c
+++ b/xen...
2012 May 30
12
[PATCH v2 0/4] XEN: fix vmx exception mistake
Changes from v1:
- Define new struct hvm_trap to represent information of trap, include
instruction length.
- Renames hvm_inject_exception to hvm_inject_trap. Then define a couple of
wrappers around that function for existing callers, so that their parameter
lists actually *shrink*.
This series of patches fix the mistake for debug exception(#DB), overflow
exception(#OF) and INT3(#BP),
2013 Jan 07
9
[PATCH v2 0/3] nested vmx bug fixes
Changes from v1 to v2:
- Use a macro to replace the hardcode in patch 1/3.
This patchset fixes issues about IA32_VMX_MISC MSR emulation, VMCS guest area
synchronization about PAGE_FAULT_ERROR_CODE_MASK/PAGE_FAULT_ERROR_CODE_MATCH,
and CR0/CR4 emulation.
Please help to review and pull.
Thanks,
Dongxiao
Dongxiao Xu (3):
nested vmx: emulate IA32_VMX_MISC MSR
nested vmx: synchronize page
2013 Nov 22
10
[PATCH v4] x86: properly handle MSI-X unmask operation from guests
...30 insertions(+), 0 deletions(-)
diff --git a/xen/arch/x86/hvm/io.c b/xen/arch/x86/hvm/io.c
index deb7b92..6c83c25 100644
--- a/xen/arch/x86/hvm/io.c
+++ b/xen/arch/x86/hvm/io.c
@@ -297,6 +297,9 @@ void hvm_io_assist(ioreq_t *p)
break;
}
+ if ( msix_post_handler(curr) )
+ gdprintk(XENLOG_ERR, "msix_post_handler error\n");
+
if ( p->state == STATE_IOREQ_NONE )
vcpu_end_shutdown_deferral(curr);
}
diff --git a/xen/arch/x86/hvm/vmsi.c b/xen/arch/x86/hvm/vmsi.c
index 4826b4a..2cdd0dc 100644
--- a/xen/arch/x86/hvm/vmsi.c
+++ b/xen/arch/x86/hvm/vmsi.c
@@...
2007 Jan 31
7
[PATCH][SVM] remove FFXSR CPUID bit for AMD-V HVM guests
Remove visibility of the FFXSR CPUID bit to an HVM guest.
This patch allows HVM Windows x64 to install/boot on AMD-V platforms.
This patches applies cleanly to xen-unstable 13743.
Please apply to xen-unstable/3.0.5.
If possible, pls apply to xen-3.0.4-testing.
--Tom
thomas.woller@amd.com
AMD Corporation
5204 E. Ben White Blvd. UBC1
Austin, Texas 78741
+1-512-602-0059
2013 Dec 06
36
[V6 PATCH 0/7]: PVH dom0....
Hi,
V6: The only change from V5 is in patch #6:
- changed comment to reflect autoxlate
- removed a redundant ASSERT
- reworked logic a bit so that get_page_from_gfn() is called with NULL
for p2m type as before. arm has ASSERT wanting it to be NULL.
Tim: patch 4 needs your approval.
Daniel: patch 5 needs your approval.
These patches implement PVH dom0.
Patches 1 and 2
2010 Aug 05
3
[PATCH 08/14] Nested Virtualization: efer
Signed-off-by: Christoph Egger <Christoph.Egger@amd.com>
--
---to satisfy European Law for business letters:
Advanced Micro Devices GmbH
Einsteinring 24, 85609 Dornach b. Muenchen
Geschaeftsfuehrer: Alberto Bozzo, Andrew Bowd
Sitz: Dornach, Gemeinde Aschheim, Landkreis Muenchen
Registergericht Muenchen, HRB Nr. 43632
_______________________________________________
Xen-devel mailing list
2014 May 22
2
Bug#748052: [Xen-devel] dom0 USB failing with "ehci-pci: probe of 0000:00:1d.0 faile
...ugs/>...
Reading symbols from /root/xen-4.3.0/xen/xen-syms...done.
(gdb) list *0xffff82c4c0186ae1
0xffff82c4c0186ae1 is in do_general_protection (traps.c:2597).
2592 case MSR_EFER:
2593 rdmsr_normal:
2594 /* Everyone can read the MSR space. */
2595 /* gdprintk(XENLOG_WARNING,"Domain attempted RDMSR %p.\n",
2596 _p(regs->ecx));*/
2597 if ( rdmsr_safe(regs->ecx, msr_content) )
2598 goto fail;
2599 regs->eax = (uint32_t)msr_content;
2600 regs->ed...
2007 Nov 27
4
spurious warnings from get_page() via gnttab_copy() during frontend shutdown
...tab_copy() itself seems prepared for this situation, as failures
to grab the target page due to a dying domain are correctly handled:
if ( !get_page_and_type(mfn_to_page(d_frame), dd,
PGT_writable_page) )
{
if ( !test_bit(_DOMF_dying, &dd->domain_flags) )
gdprintk(XENLOG_WARNING, "Could not get dst frame %lx
\n", d_frame);
rc = GNTST_general_error;
goto error_out;
}
In our testing we believe that we''re following this path (_DOMF_dying
is set and rc == GNTST_general_error) and that we handle the failure
correctl...
2008 Feb 01
4
[PATCH] x86: adjust reserved bit page fault handling
...0
@@ -823,6 +823,17 @@ asmlinkage void do_machine_check(struct
machine_check_vector(regs, regs->error_code);
}
+static inline void reserved_bit_page_fault(int guest, unsigned long addr,
+ struct cpu_user_regs *regs)
+{
+ if ( guest )
+ gdprintk(XENLOG_ERR, "reserved bit in page table entry: ");
+ else
+ dprintk(XENLOG_ERR, "reserved bit in page table entry: ");
+ show_page_walk(addr);
+ show_execution_state(regs);
+}
+
void propagate_page_fault(unsigned long addr, u16 error_code)
{
struct trap_in...
2013 Oct 30
4
Re: Issue with ARM: Network doesn't work in the guest
2013/10/29, mail fetch <fetchmail.0104@gmail.com>:
> Hi all,
>
> I just saw a know bug from wiki that network doesn''t work in guest in
> arndale board :
>
> Network doesn''t work in the guest
>
> Contact: julien.grall@citrix.com
> Status: In progress
> Description: Network doesn''t work in the guest when an ehternet cable is
> plugged
2007 Jul 02
3
Walking an HVM''s shadow page tables and other memory management questions.
Hello,
I''m new to Xen and especially to the hypervisor code. I''m working off a
3.0.4.1 base and have the following questions regarding the memory
management code for an x86, 32-bit platform (capable of supporting PAE).
I''m doing some research into providing grant table hypercall support
from a Windows 2003 HVM. I have made all the necessary changes to allow
the