similar to: [patch] Control Machine Check Log output in XEN

Displaying 20 results from an estimated 30000 matches similar to: "[patch] Control Machine Check Log output in XEN"

2008 Dec 19
2
FW: [patch 0/4]Enable CMCI (Corrected Machine Check Error Interrupt) for Intel CPUs
Hi, All Following 4 patches are for enabling CMCI of Intel CPUs in XEN. --------------------------------------------------------------------------- Patch 1: remove_intel_mce_old.patch is to remove old p4/p6 files. The reason is that machine check architecture for Intel families including p4/p6/latest are similar. We need not keep duplicated codes. Patch 2: change_stop_machine_run.patch changes
2009 Sep 22
2
[pvops-dom0]Let PV ops guest could handle Machine Check trap
Hi, Jeremy and all This small patch lets pv ops guest handle machine check trap. When non fatal mce error happens, xen will inject vMCE# to the impacted pv ops guest. This patch allows pv ops guest could receive machine check trap and enter its own machine check handler. Thanks & Regards, Criping >From 5efc12fe8214d55e2becc2c4b6ec4a30531d7b60 Mon Sep 17 00:00:00 2001 From: Liping Ke
2008 Dec 04
6
[Doc] writeup for error handling usage in XEN
Hi, all Those days, we spent some efforts to check severe error handling (panic, BUG_ON, BUG, ASSERT) in XEN. We have several round internal discussions as well as several mail threads with Keir. Below is the discussion writeup. If agreed, after review, we want to place it in XEN document folder or XEN wiki since we think it might be helpful to developers. Thanks a lot for your help! Regards,
2008 Dec 22
0
[patch 3/3]Enable CMCI (Corrected Machine Check Error Interrupt) for Intel CPUs
Hi, all Patch3: Enable CMCI for Intel CPUs -- main patch for CMCI support This patch is the main patch for CMCI enabling in XEN. It removes the old p4/p6 mce files, adds those removed logic to intel common part. Also it adds the new CMCI/MCA intel specific init/interrupt processing, CMCI owner judge algorithm when (bring up CPUs /CPU hotplugs), as well as polling mechanisms, etc. Thanks &
2008 Dec 19
0
[patch 1/4]Enable CMCI (Corrected Machine Check Error Interrupt) for Intel CPUs
Hi,Keir This patch (Patch 1) is for removing old p4/p6 MCA files. P4/P6 and latest families actually have similar MCA architecture so we cleanup duplicated code. Thanks& Regards, Criping _______________________________________________ Xen-devel mailing list Xen-devel@lists.xensource.com http://lists.xensource.com/xen-devel
2008 Nov 14
2
[RFC][patch 0/7] Enable PCIE-AER support for XEN
Following 7 patches are for PCIE AER (Advanced Error Reporting) support for XEN. --------------------------------------------------------------------------- Patches 1~4 back port from Linux Kernel which enables kernel support to AER. Those patches enable DOM0 PCIE error handling capability. When a device sends a PCIE error message to the root port, it will trigger an interrupt. The irq handler
2008 Jul 23
28
[PATCH] ioemu-remote: ACPI S3 state wake up
ioemu-remote: The device model needs to write in the ACPI tables when it wakes up from S3 state. Signed-off-by: Jean Guyader <jean.guyader@eu.citrix.com> -- Jean Guyader _______________________________________________ Xen-devel mailing list Xen-devel@lists.xensource.com http://lists.xensource.com/xen-devel
2008 Nov 21
0
[patch 5/7][PCIE-AER]Enable PCIE-AER support for XEN
Patch 5 modify_pci: it provides small fix of aerdrv_core, add one new func of get_device by BDF Signed-off-by: Jiang Yunhong<yunhong.jiang@intel.com> Signed-off-by: Ke Liping<liping.ke@intel.com> Thanks& Regards, Criping _______________________________________________ Xen-devel mailing list Xen-devel@lists.xensource.com http://lists.xensource.com/xen-devel
2008 Nov 21
0
[patch 6/7][PCIE-AER]Enable PCIE-AER support for XEN
Patch 6 pciback_err_handler.patch: Implementation for enabling PCIE_AER support in XEN This patch is the main implementation for enabling PCIE_AER handling, adding related pci error handler in pciback and pcifront. When a device sends a PCIE error message to the root port, it will triger an interrupt. The irq handler will then collect roor error status register, then schedule a work to process
2011 Jul 25
0
[xen-unstable test] 8270: regressions - trouble: broken/fail/pass
flight 8270 xen-unstable real [real] http://www.chiark.greenend.org.uk/~xensrcts/logs/8270/ Regressions :-( Tests which did not succeed and are blocking: test-amd64-amd64-xl-pcipt-intel 5 xen-boot fail REGR. vs. 8256 test-amd64-i386-rhel6hvm-intel 3 host-install(3) broken test-amd64-amd64-win 3 host-install(3) broken test-amd64-i386-pv
2008 May 08
8
[Patch 4/4]: Xend interface for HVM S3
[Patch 4/4]: Xend interface for HVM S3 - extend "xm resume <domid>" to be able to S3 resume HVM domain. - when user issue "xm resume" command for HVM domain, xend will use xc lib API to call HVMOP_s3_resume hypercall. Note: it may not appropriate use xm resume for HVM s3, since xm resume is originally designed for save/restor purpose. It will be fine that
2012 Sep 18
6
[PATCH 2/5] Xen/MCE: vMCE injection
Xen/MCE: vMCE injection In our test for win8 guest mce, we find a bug that no matter what SRAO/SRAR error xen inject to win8 guest, it always reboot. The root cause is, current Xen vMCE logic inject vMCE# only to vcpu0, this is not correct for Intel MCE (Under Intel arch, h/w generate MCE# to all CPUs). This patch fix vMCE injection bug, injecting vMCE# to all vcpus. Signed-off-by: Liu,
2011 Dec 16
0
[xen-unstable test] 10504: regressions - FAIL
flight 10504 xen-unstable real [real] http://www.chiark.greenend.org.uk/~xensrcts/logs/10504/ Regressions :-( Tests which did not succeed and are blocking: test-amd64-amd64-xl-sedf 14 guest-localmigrate/x10 fail REGR. vs. 10491 test-amd64-i386-win 7 windows-install fail REGR. vs. 10491 test-amd64-amd64-xl-winxpsp3 7 windows-install fail REGR. vs. 10491
2012 Jul 05
3
[PATCH] Xen/MCE: stick all 1's to MCi_CTL of vMCE
Jan, This patch just used to stick all 1''s to MCi_CTL, it should not involve much argue, so I sent it separately. Thanks, Jinsong ==================== Xen/MCE: stick all 1''s to MCi_CTL of vMCE This patch is a middle-work patch, prepare for future new vMCE model. It remove mci_ctl array, and keep MCi_CTL all 1''s. Signed-off-by: Liu, Jinsong
2011 Dec 16
0
[xen-unstable test] 10511: regressions - FAIL
flight 10511 xen-unstable real [real] http://www.chiark.greenend.org.uk/~xensrcts/logs/10511/ Regressions :-( Tests which did not succeed and are blocking: test-amd64-amd64-xl-sedf 14 guest-localmigrate/x10 fail in 10504 REGR. vs. 10491 Tests which are failing intermittently (not blocking): test-amd64-amd64-xl-sedf 13 guest-localmigrate.2 fail pass in 10504 test-i386-i386-win
2007 May 16
0
FW: trap/interrupt gate for hypercall
Sorry, forget to join lists. Regards, Jinsong -----Original Message----- From: Liu, Jinsong Sent: 2007年5月16日 8:23 To: ''Keir Fraser''; Tian, Kevin; xen-devel@lists.xensource.com Subject: RE: [Xen-devel] trap/interrupt gate for hypercall In native linux, syscall (gate type 15) and its RESTORE_ALL code provides weak fixup mechanism when reload segment register, by sending 0
2005 Oct 22
1
[PATCH] Control panel changes for IA64/VTI
Hi, Keir, Attached are the necessary changes in control panel to support ia64/vti domain builder. One is in common side, and the other is in vti specific image builder. Please take a look, and if no objection, I''d like to ask Dan''s help to check into xen-ia64-unstable.hg first. Signed-off-by Ke Yu <ke.yu@intel.com> Signed-off-by Anthony Xu <anthony.xu@intel.com>
2008 Jul 04
0
[PATCH 1/2][XEN] Machine Check Support
Hi, This introduces send_guest_trap() as preparation for machine check support. send_guest_trap() is designed to inject any trap into a vcpu from NMI/MCE context. This patch makes NMI use of it. Signed-off-by: Christoph Egger <Christoph.Egger@amd.com> -- AMD Saxony, Dresden, Germany Operating System Research Center Legal Information: AMD Saxony Limited Liability Company & Co. KG
2015 Mar 05
0
"Machine Check Exception: 4 Bank 0: 9000000020000003" when boot CentOS 7, with Intel CPU E3845, and BIOS option "EIST" enable.
My hardware is: CPU: Intel(R) Atom(TM) CPU E3845 @ 1.91GHz and it supports EIST(Enhanced Intel SpeedStep Technology). OS: CentOS 7(kernel-3.10) When I set the BIOS options "CPU configuration >> EIST" to "enable", it appears a kernel panic when the system is starting up. Here is what I am seeing: ...... Fast TSC calibration failed. [Hardware Error] CPU 3: Machine Check
2006 Jun 07
2
[PATCH][RESEND][Builder] Check if v_end wraps around to 0
This patch adds a check to see if v_end in setup_guest() wraps around to 0 and lets the builder exit gracefully when it does. Signed-off-by: Aravindh Puthiyaparambil <aravindh.puthiyaparambil@unisys.com> > -----Original Message----- > From: Keir Fraser [mailto:Keir.Fraser@cl.cam.ac.uk] > Sent: Thursday, June 01, 2006 6:14 AM > To: Puthiyaparambil, Aravindh > Cc: