search for: xenlog_info

Displaying 20 results from an estimated 23 matches for "xenlog_info".

2007 Dec 10
0
[PATCH] avoid duplication of domain ID in messages
...============= --- 2007-12-10.orig/xen/arch/x86/hvm/hvm.c 2007-12-10 09:19:12.000000000 +0100 +++ 2007-12-10/xen/arch/x86/hvm/hvm.c 2007-12-10 09:22:53.000000000 +0100 @@ -533,8 +533,7 @@ static void hvm_vcpu_down(void) struct domain *d = v->domain; int online_count = 0; - gdprintk(XENLOG_INFO, "DOM%d/VCPU%d: going offline.\n", - d->domain_id, v->vcpu_id); + gdprintk(XENLOG_INFO, "VCPU%d: going offline.\n", v->vcpu_id); /* Doesn''t halt us immediately, but we''ll never return to guest context. */ set_bit(_VPF_down, &am...
2007 Jun 27
1
[PATCH 7/10] SMP support to Xen PM
...nd/resume */ -int enter_state(u32 state) -{ - struct domain *d, *pd = NULL; - unsigned long flags; - int error; - - if (state <= ACPI_STATE_S0 || state > ACPI_S_STATES_MAX) - return -EINVAL; - - /* Sync lazy state on ths cpu */ - __sync_lazy_execstate(); - pmprintk(XENLOG_INFO, "Flush lazy state\n"); - - if (!spin_trylock(&pm_lock)) - return -EBUSY; - +/* Record the last paused domain at freeze phase */ +static struct domain *pd; +static int freeze_domains(void) +{ + struct domain *d; + + pd = NULL; for_each_domain(d) if (d...
2013 Nov 14
4
[PATCH] xen/arm: Allow balooning working with 1:1 memory mapping
...loc_domheap_pages(d, a->extent_order, a->memflags); +#ifdef CONFIG_ARM + if ( d == dom0 && platform_has_quirk(PLATFORM_QUIRK_DOM0_MAPPING_11) ) + { + mfn = gpfn; + if (!mfn_valid(mfn)) + { + gdprintk(XENLOG_INFO, "Invalid mfn 0x%"PRI_xen_pfn"\n", + mfn); + goto out; + } + + page = mfn_to_page(mfn); + if ( !get_page(page, d) ) + { + gdprintk(XENLOG_INFO, +...
2012 Jan 09
1
[PATCH] VMX: print Pause Loop Exiting disabled message just once
...9,7 +249,8 @@ static int vmx_init_vmcs_config(void) if ( (_vmx_secondary_exec_control & SECONDARY_EXEC_PAUSE_LOOP_EXITING) && ple_gap == 0 ) { - printk("Disable Pause-Loop Exiting.\n"); + if ( !vmx_pin_based_exec_control ) + printk(XENLOG_INFO "Disable Pause-Loop Exiting.\n"); _vmx_secondary_exec_control &= ~ SECONDARY_EXEC_PAUSE_LOOP_EXITING; } _______________________________________________ Xen-devel mailing list Xen-devel@lists.xensource.com http://lists.xensource.com/xen-devel
2013 Jul 15
1
[PATCH] xen/cpuidle: Reduce logging level for unknown apic_ids
...ch/x86/acpi/cpu_idle.c +++ b/xen/arch/x86/acpi/cpu_idle.c @@ -1031,7 +1031,7 @@ long set_cx_pminfo(uint32_t cpu, struct xen_processor_power *power) cpu_id = get_cpu_id(cpu); if ( cpu_id == -1 ) { - printk(XENLOG_ERR "no cpu_id for acpi_id %d\n", cpu); + printk(XENLOG_INFO "no cpu_id for acpi_id %d\n", cpu); return -EINVAL; } -- 1.7.10.4
2007 Jun 27
0
[PATCH 1/10] Provide basic Xen PM infrastructure
...ecific suspend/resume */ +int enter_state(u32 state) +{ + struct domain *d; + unsigned long flags; + int error; + + if (state <= ACPI_STATE_S0 || state > ACPI_S_STATES_MAX) + return -EINVAL; + + /* Sync lazy state on ths cpu */ + __sync_lazy_execstate(); + pmprintk(XENLOG_INFO, "Flush lazy state\n"); + + if (!spin_trylock(&pm_lock)) + return -EBUSY; + + for_each_domain(d) + if (d->domain_id != 0) + domain_pause(d); + + pmprintk(XENLOG_INFO, "PM: Preparing system for %s sleep\n", + acpi_states[state])...
2012 May 25
0
[PATCH 3/3] gnttab: cleanup
...@ -525,7 +525,8 @@ __gnttab_map_grant_ref( return; } - if ( unlikely((handle = get_maptrack_handle(ld->grant_table)) == -1) ) + lgt = ld->grant_table; + if ( unlikely((handle = get_maptrack_handle(lgt)) == -1) ) { rcu_unlock_domain(rd); gdprintk(XENLOG_INFO, "Failed to obtain maptrack handle.\n"); @@ -533,26 +534,27 @@ __gnttab_map_grant_ref( return; } - spin_lock(&rd->grant_table->lock); + rgt = rd->grant_table; + spin_lock(&rgt->lock); - if ( rd->grant_table->gt_version == 0 ) + if...
2012 Jul 05
3
[PATCH] Xen/MCE: stick all 1's to MCi_CTL of vMCE
...if ( entry && (entry->bank == bank) ) @@ -523,22 +513,6 @@ int vmce_init(struct cpuinfo_x86 *c) { u64 value; - unsigned int i; - - if ( !h_mci_ctrl ) - { - h_mci_ctrl = xmalloc_array(uint64_t, nr_mce_banks); - if (!h_mci_ctrl) - { - dprintk(XENLOG_INFO, "Failed to alloc h_mci_ctrl\n"); - return -ENOMEM; - } - /* Don''t care banks before firstbank */ - memset(h_mci_ctrl, ~0, - min(firstbank, nr_mce_banks) * sizeof(*h_mci_ctrl)); - for (i = firstbank; i < nr_mce_banks; i++) -...
2013 Jan 15
14
[PATCH] VTD/Intremap: Disable Intremap on Chipset 5500/5520/X58 due to errata
...{ + /* Match on System Management Registers on Device 20 Function 0 */ + device = pci_conf_read32(0, bus, 20, 0, PCI_VENDOR_ID); + rev = pci_conf_read8(0, bus, 20, 0, PCI_REVISION_ID); + + if ( rev == 0x13 && device == 0x342e8086 ) + { + dprintk(XENLOG_INFO VTDPREFIX, + "Disabling Interrupt Remapping due to Intel 5500/5520/X58 Chipset errata #47, #53\n"); + iommu_intremap = 0; + break; + } + } +} + /* initialize platform identification flags */ void __init platform_quirks_init(void) { @@...
2007 May 24
2
d0 Error pfn 100
Hi! I see these messages from the xen-kernel: (XEN) /usr/src/xen-unstable.hg/xen/include/asm/mm.h:186:d0 Error pfn 100: rd=ffff8300df05c100, od=0000000000000000, caf=00000000, taf=0000000000000000 (XEN) mm.c:636:d0 Error getting mfn 100 (pfn 5555555555555555) from L1 entry 8000000000100125 for dom32753 (XEN) /usr/src/xen-unstable.hg/xen/include/asm/mm.h:186:d0 Error pfn 100:
2010 Mar 11
0
[PATCH] VT-d: various initialization fixes
...0 +0100 +++ 2010-03-02/xen/drivers/passthrough/vtd/iommu.c 2010-03-09 13:51:03.000000000 +0100 @@ -1068,9 +1068,21 @@ static int iommu_alloc(struct acpi_drhd_ iommu->cap = dmar_readq(iommu->reg, DMAR_CAP_REG); iommu->ecap = dmar_readq(iommu->reg, DMAR_ECAP_REG); - dprintk(XENLOG_INFO VTDPREFIX, - "drhd->address = %"PRIx64"\n", drhd->address); - dprintk(XENLOG_INFO VTDPREFIX, "iommu->reg = %p\n", iommu->reg); + drhd->iommu = iommu; + + dprintk(XENLOG_DEBUG VTDPREFIX, + "drhd->address = %"PR...
2013 Oct 30
4
Re: Issue with ARM: Network doesn't work in the guest
2013/10/29, mail fetch <fetchmail.0104@gmail.com>: > Hi all, > > I just saw a know bug from wiki that network doesn''t work in guest in > arndale board : > > Network doesn''t work in the guest > > Contact: julien.grall@citrix.com > Status: In progress > Description: Network doesn''t work in the guest when an ehternet cable is > plugged
2007 Nov 27
4
spurious warnings from get_page() via gnttab_copy() during frontend shutdown
In testing our implementation of the hypervisor copy based backend- >frontend networking changes, we see what I believe are spurious warning messages during the shutdown of the frontend domain: (XEN) /export/build/schuster/xvm-gate/xen.hg/xen/include/asm/mm.h: 189:d0 Error pfn 30e290: rd=ffff830000fcf100, od=ffff830000fcf100, caf=00000000, taf=0000000000000000 (XEN) Xen call trace:
2007 Aug 09
0
[PATCH] x86/hvm: miscellaneous CPUID handling changes
...RES_RESET_MASK; - } - else if ( input == 0x40000003 ) + if ( input == 0x40000003 ) { /* * NB. Unsupported interface for private use of VMXASSIST only. @@ -1360,37 +1354,52 @@ static void vmx_do_cpuid(struct cpu_user unmap_domain_page(p); gdprintk(XENLOG_INFO, "Output value is 0x%"PRIx64".\n", value); - ecx = (u32)value; - edx = (u32)(value >> 32); - } else { - hvm_cpuid(input, &eax, &ebx, &ecx, &edx); + regs->ecx = (u32)value; + regs->edx = (u32)(value >> 32); +...
2008 Oct 29
34
iommu: mapping reserved region failed - Q35 - VT-D Issue
Xen 3.4 xen-unstable.hg from yesterday with debian etch on 64bit arch Intel/Lenovo Q35 Mainboard with VT-d enabled Bootoptions iommu=1 vtd=1 pci.backhide for a PCI-E nvidia graphiccard xm dmesg Error messages includes: [VT-D] iommu.c: 1694:d32767 iommu: mapping reserved region failed [VT-D] iommu.c: 1542:d0 intel_iommu_add_device: context mapping failed If i try to start my HVM by xm create
2007 Mar 20
62
RFC: [0/2] Remove netloop by lazy copying in netback
Hi Keir: These two patches remove the need for netloop by performing the copying in netback and only if it is necessary. The rationale is that most packets will be processed without delay allowing them to be freed without copying at all. So instead of copying every packet destined to dom0 we''ll only copy those that linger longer than a specified amount of time (currently 0.5s). As it
2006 Dec 01
1
[PATCH 2/10] Add support for netfront/netback acceleration drivers
...hysaddr, unsigne unsigned long assign_domain_mmio_page(struct domain *d, - unsigned long mpaddr, unsigned long size) + unsigned long mpaddr, unsigned long size, + unsigned long flags) { if (size == 0) { gdprintk(XENLOG_INFO, "%s: domain %p mpaddr 0x%lx size = 0x%lx \n", @@ -1029,7 +1031,7 @@ assign_domain_mmio_page(struct domain *d #endif return -EINVAL; } - assign_domain_same_page(d, mpaddr, size, ASSIGN_writable | ASSIGN_nocache); + assign_domain_same_page(d, mpaddr, size, flags | ASSI...
2020 Jul 18
25
[PATCH 00/12] Bunch of patches for cross-compilatio + RP4
Initially out there as #965245. I strongly prefer to build ARM64 packages on non-ARM systems. Something about my main build machine having twice the cores and twice the clock speed. As such after many builds I've managed to generate a set of patches which appear to mostly function to get functioning cross-builds of Xen. These are NOT a 100% solution. Some packaging hacks were needed. In
2013 Feb 14
12
[PATCH v7 0/5] xen: ARM HDLCD video driver
Hi all, these are the remaining unapplied patches of the ARM HDLCD patch series. Changes in v7: - rebased on b61ed421d2c85b5b106c63f2c14f8aa162b282f0; - turn more printk and panic into early_printk and early_panic. Changes in v6: - rebased on 77d3a1db3196b1b5864469f8d3f41d496800c795; - remove useless initializations to NULL in lfb_init; - more compact checks in lfb_init. Changes in v5: - move
2012 May 30
12
[PATCH v2 0/4] XEN: fix vmx exception mistake
Changes from v1: - Define new struct hvm_trap to represent information of trap, include instruction length. - Renames hvm_inject_exception to hvm_inject_trap. Then define a couple of wrappers around that function for existing callers, so that their parameter lists actually *shrink*. This series of patches fix the mistake for debug exception(#DB), overflow exception(#OF) and INT3(#BP),