Displaying 20 results from an estimated 700 matches similar to: "ACPI-Tables corrupted?"
2011 Jan 21
11
[PATCH]x86:x2apic: Disable x2apic on x86-32 permanently
x86:x2apic: Disable x2apic on x86-32 permanently
x2apic initialization on x86_32 uses vcpu pointer before it is initialized. As x2apic is unlikely to be used on x86_32, this patch disables x2apic permanently on x86_32. It also asserts the sanity of vcpu pointer before dereference to prevent further misuse.
Signed-off-by: Fengzhe Zhang <fengzhe.zhang@intel.com>
diff -r 02c0af2bf280
2012 Oct 02
3
[PATCH] VT-d: make remap_entry_to_msi_msg() return consistent message
During debugging of another problem I found that in x2APIC mode, the
destination field of the low address value wasn''t passed back
correctly. While this is benign in most cases (as the value isn''t being
used anywhere), it can be confusing (and misguiding) when printing the
value read or when comparing it to the one previously passed into the
inverse function.
Signed-off-by: Jan
2011 May 09
1
Bug#625438: [PATCH] xen: ioapic: avoid gcc 4.6 warnings about uninitialised variables
# HG changeset patch
# User Ian Campbell <ian.campbell at citrix.com>
# Date 1304937815 -3600
# Node ID 35abcbcdf8bcabab6e0bbd929f69b613e167edfd
# Parent 4b0692880dfa557d4e1537c7a58c412c1286a416
xen: ioapic: avoid gcc 4.6 warnings about uninitialised variables
gcc 4.6 complains:
io_apic.c: In function 'restore_IO_APIC_setup':
2011 May 09
1
Bug#625438: [PATCH] xen: ioapic: avoid gcc 4.6 warnings about uninitialised variables
# HG changeset patch
# User Ian Campbell <ian.campbell at citrix.com>
# Date 1304937815 -3600
# Node ID 35abcbcdf8bcabab6e0bbd929f69b613e167edfd
# Parent 4b0692880dfa557d4e1537c7a58c412c1286a416
xen: ioapic: avoid gcc 4.6 warnings about uninitialised variables
gcc 4.6 complains:
io_apic.c: In function 'restore_IO_APIC_setup':
2013 Feb 21
6
Warning: Your BIOS is broken
I am getting the following on my 'new box' for my DNS server:
Date: Wed, 20 Feb 2013 13:58:04 -0500
From:
To:
Subject: [abrt] full crash report
User-Agent: Heirloom mailx 12.4 7/29/08
abrt_version: 2.0.8
cmdline: ro root=/dev/mapper/vg_onlo3-root_01 rd_NO_LUKS
rd_LVM_LV=vg_onlo3/root_01 LANG=en_US.UTF-8
+rd_NO_MD SYSFONT=latarcyrheb-sun16 KEYBOARDTYPE=pc KEYTABLE=us
2017 Feb 17
11
[PATCH 00/35] treewide trivial patches converting pr_warning to pr_warn
There are ~4300 uses of pr_warn and ~250 uses of the older
pr_warning in the kernel source tree.
Make the use of pr_warn consistent across all kernel files.
This excludes all files in tools/ as there is a separate
define pr_warning for that directory tree and pr_warn is
not used in tools/.
Done with 'sed s/\bpr_warning\b/pr_warn/' and some emacsing.
Miscellanea:
o Coalesce formats and
2017 Feb 17
11
[PATCH 00/35] treewide trivial patches converting pr_warning to pr_warn
There are ~4300 uses of pr_warn and ~250 uses of the older
pr_warning in the kernel source tree.
Make the use of pr_warn consistent across all kernel files.
This excludes all files in tools/ as there is a separate
define pr_warning for that directory tree and pr_warn is
not used in tools/.
Done with 'sed s/\bpr_warning\b/pr_warn/' and some emacsing.
Miscellanea:
o Coalesce formats and
2017 Feb 17
11
[PATCH 00/35] treewide trivial patches converting pr_warning to pr_warn
There are ~4300 uses of pr_warn and ~250 uses of the older
pr_warning in the kernel source tree.
Make the use of pr_warn consistent across all kernel files.
This excludes all files in tools/ as there is a separate
define pr_warning for that directory tree and pr_warn is
not used in tools/.
Done with 'sed s/\bpr_warning\b/pr_warn/' and some emacsing.
Miscellanea:
o Coalesce formats and
2012 Sep 11
1
[PATCH 3/3] VT-d: use msi_compose_msg()
... instead of open coding it.
Signed-off-by: Jan Beulich <jbeulich@suse.com>
--- a/xen/drivers/passthrough/vtd/iommu.c
+++ b/xen/drivers/passthrough/vtd/iommu.c
@@ -1079,22 +1079,11 @@ static void dma_msi_set_affinity(struct
return;
}
- memset(&msg, 0, sizeof(msg));
- msg.data = MSI_DATA_VECTOR(desc->arch.vector) & 0xff;
- msg.data |= 1 << 14;
-
2014 May 16
0
Bug#748052: [Xen-devel] dom0 USB failing with "ehci-pci: probe of 0000:00:1d.0 failed with error -110"
>>> On 16.05.14 at 10:58, <ijc at hellion.org.uk> wrote:
> So it seems like dom0 is unable to (correctly) bind to some hardware
> interrupts. I wonder if these messages from Xen's dmesg are relevant.
> (XEN) Not enabling x2APIC: depends on iommu_supports_eim.
> (XEN) I/O virtualisation disabled
> (XEN) Enabled directed EOI with ioapic_ack_old on!
The last one
2014 May 16
1
Bug#748052: [Xen-devel] dom0 USB failing with "ehci-pci: probe of 0000:00:1d.0 failed with error -110"
On 05/16/2014 06:08 AM, Jan Beulich wrote:
>>>> On 16.05.14 at 10:58, <ijc at hellion.org.uk> wrote:
>> So it seems like dom0 is unable to (correctly) bind to some hardware
>> interrupts. I wonder if these messages from Xen's dmesg are relevant.
>> (XEN) Not enabling x2APIC: depends on iommu_supports_eim.
>> (XEN) I/O virtualisation disabled
>>
2018 Jul 03
1
multiple devices in the same iommu group in L1 guest
Hi,
I have a guest enabled vIOMMU, but on the guest there are several devices
in the same iommu group.
Could someone help to check if I missed something?
Thank you very much!
1. guest xml:
# virsh edit q
...
<os>
<type arch='x86_64' machine='pc-q35-rhel7.5.0'>hvm</type>
<loader readonly='yes' secure='yes'
2012 Oct 24
5
[PATCH v3] IOMMU: keep disabled until iommu_setup() is called
The iommu is enabled by default when xen is booting and later disabled
in iommu_setup() when no iommu is present.
But under some circumstances iommu code can be called before
iommu_setup() is processed. If there is no iommu available xen crashes.
This can happen for example when panic(...) is called as introduced
with the patch "x86-64: detect processors subject to AMD erratum #121
and
2014 May 15
5
Bug#748052: Bug#748052: Bug#748052: Bug#748052: xen-hypervisor-4.3-amd64: No USB keyboard af
On Thu, 2014-05-15 at 11:01 +0100, Ian Campbell wrote:
> Please can you also post Xen's own dmesg (from "xl dmesg").
Please boot with loglvl=all on the hypervisor command line for this too.
Ian.
2012 Dec 12
7
[PATCH V5] x86/kexec: Change NMI and MCE handling on kexec path
xen/arch/x86/crash.c | 116 ++++++++++++++++++++++++++++++++++-----
xen/arch/x86/machine_kexec.c | 19 ++++++
xen/arch/x86/x86_64/entry.S | 34 +++++++++++
xen/include/asm-x86/desc.h | 45 +++++++++++++++
xen/include/asm-x86/processor.h | 4 +
5 files changed, 203 insertions(+), 15 deletions(-)
Experimentally, certain crash kernels will triple fault very early
2011 Feb 11
4
Xen hypervisor failed to startup when booting CPUs
Hi Folks:
I run into a problem when enabling Xen in next generation server platforms with Xen c/s is 21380.
Xen reported "CPU Not responding" when booting up 32 CPUs( 2 sockets with 8 cores/16threads total). The log files belonging showed something wrong with APCI. So I added x2apic=0 in the xen grub line, but the symptom remained.
However, Native RHEL5.5 can
2013 Jan 15
14
[PATCH] VTD/Intremap: Disable Intremap on Chipset 5500/5520/X58 due to errata
http://www.intel.com/content/www/us/en/chipsets/5520-and-5500-chipset-ioh-specification-update.html
Stepping B-3 has two errata (#47 and #53) related to Interrupt
remapping, to which the workaround is for the BIOS to completely disable
interrupt remapping. These errata are fixed in stepping C-2.
Unfortunately this chipset is very common and many BIOSes are not
disabling remapping. We can
2014 May 15
0
Bug#748052: Bug#748052: Bug#748052: Bug#748052: xen-hypervisor-4.3-a
Ian Campbell <ijc at hellion.org.uk> writes:
#Please boot with loglvl=all on the hypervisor command line for this too.
No problem Ian,
Here are some results with (now) the latest BIOS version 41. (was version 35)
This is a fresh new install of Debian "Testing" non production server.
Just wanted to run some test domU's.
Changing USB ports, no effect. I even tried a different
2017 Nov 09
4
[PATCH v2 0/5] x86/xen: support booting PVH guest via standard boot path
Booting a Xen PVH guest requires a special boot entry as it is
mandatory to setup some Xen-specific interfaces rather early. When grub
or OVMF are used as boot loaders, however, those will fill the boot
parameters in zeropage and there is no longer a need to do something
PVH specific in the early boot path.
This patch series adds support for that scenario by identifying PVH
environment and doing
2017 Nov 09
4
[PATCH v2 0/5] x86/xen: support booting PVH guest via standard boot path
Booting a Xen PVH guest requires a special boot entry as it is
mandatory to setup some Xen-specific interfaces rather early. When grub
or OVMF are used as boot loaders, however, those will fill the boot
parameters in zeropage and there is no longer a need to do something
PVH specific in the early boot path.
This patch series adds support for that scenario by identifying PVH
environment and doing