WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
   
 
 
Xen 
 
Home Products Support Community News
 
   
 

xen-changelog

[Xen-changelog] [xen-unstable] [XEN] Some cleanups to the log-level stuf

To: xen-changelog@xxxxxxxxxxxxxxxxxxx
Subject: [Xen-changelog] [xen-unstable] [XEN] Some cleanups to the log-level stuff. Largely this
From: Xen patchbot-unstable <patchbot-unstable@xxxxxxxxxxxxxxxxxxx>
Date: Fri, 27 Oct 2006 23:00:26 +0000
Delivery-date: Fri, 27 Oct 2006 16:00:33 -0700
Envelope-to: www-data@xxxxxxxxxxxxxxxxxx
List-help: <mailto:xen-changelog-request@lists.xensource.com?subject=help>
List-id: BK change log <xen-changelog.lists.xensource.com>
List-post: <mailto:xen-changelog@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-changelog>, <mailto:xen-changelog-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-changelog>, <mailto:xen-changelog-request@lists.xensource.com?subject=unsubscribe>
Reply-to: xen-devel@xxxxxxxxxxxxxxxxxxx
Sender: xen-changelog-bounces@xxxxxxxxxxxxxxxxxxx
# HG changeset patch
# User kaf24@xxxxxxxxxxxxxxxxxxxxx
# Node ID 36679b74e24a8a0f8757da1d9fdabd3374779d15
# Parent  d60b709724f48397b95da3d56299213cae391789
[XEN] Some cleanups to the log-level stuff. Largely this
is a rename and slight interface change to DPRINTK (now
replaced by dprintk() and gdprintk()). Also shuffle some
log-level definitions around and tweak the semantics of
the upper threshold.
Signed-off-by: Keir Fraser <keir@xxxxxxxxxxxxx>
---
 xen/arch/ia64/vmx/vlsapic.c       |    6 +--
 xen/arch/ia64/vmx/vmx_hypercall.c |    2 -
 xen/arch/ia64/vmx/vmx_init.c      |    2 -
 xen/arch/ia64/xen/dom0_ops.c      |    2 -
 xen/arch/ia64/xen/domain.c        |    4 +-
 xen/arch/ia64/xen/irq.c           |    8 ++--
 xen/arch/ia64/xen/mm.c            |   61 ++++++++++++++++---------------
 xen/arch/ia64/xen/tlb_track.c     |    5 +-
 xen/arch/ia64/xen/vcpu.c          |    7 ++-
 xen/arch/powerpc/mm.c             |    2 -
 xen/arch/powerpc/shadow.c         |    4 +-
 xen/arch/x86/domain.c             |    2 -
 xen/arch/x86/extable.c            |    2 -
 xen/arch/x86/hvm/hvm.c            |   22 +++++------
 xen/arch/x86/hvm/i8259.c          |    6 +--
 xen/arch/x86/hvm/instrlen.c       |    4 +-
 xen/arch/x86/hvm/platform.c       |    6 ++-
 xen/arch/x86/hvm/svm/svm.c        |    2 -
 xen/arch/x86/hvm/vioapic.c        |    6 +--
 xen/arch/x86/hvm/vmx/vmcs.c       |    2 -
 xen/arch/x86/hvm/vmx/vmx.c        |   12 +++---
 xen/arch/x86/io_apic.c            |    2 -
 xen/arch/x86/irq.c                |    8 ++--
 xen/arch/x86/mm.c                 |   17 +-------
 xen/arch/x86/mm/shadow/common.c   |    2 -
 xen/arch/x86/platform_hypercall.c |    2 -
 xen/arch/x86/traps.c              |   29 +++++++--------
 xen/arch/x86/x86_32/seg_fixup.c   |   40 ++++++++++----------
 xen/arch/x86/x86_64/traps.c       |    4 +-
 xen/arch/x86/x86_emulate.c        |   12 +++---
 xen/common/domain.c               |    7 ++-
 xen/common/event_channel.c        |    2 -
 xen/common/grant_table.c          |   42 ++++++++++-----------
 xen/common/memory.c               |   10 ++---
 xen/common/multicall.c            |    2 -
 xen/common/page_alloc.c           |    4 +-
 xen/common/schedule.c             |    2 -
 xen/common/trace.c                |    2 -
 xen/drivers/char/console.c        |   26 +++++++++++++
 xen/include/asm-ia64/mm.h         |    2 -
 xen/include/asm-x86/mm.h          |    2 -
 xen/include/xen/config.h          |   73 +++++---------------------------------
 42 files changed, 212 insertions(+), 245 deletions(-)

diff -r d60b709724f4 -r 36679b74e24a xen/arch/ia64/vmx/vlsapic.c
--- a/xen/arch/ia64/vmx/vlsapic.c       Fri Oct 27 19:15:48 2006 +0100
+++ b/xen/arch/ia64/vmx/vlsapic.c       Fri Oct 27 23:47:30 2006 +0100
@@ -95,7 +95,7 @@ static int vmx_vcpu_unpend_interrupt(VCP
     int ret;
 
     if (vector & ~0xff) {
-        DPRINTK("vmx_vcpu_pend_interrupt: bad vector\n");
+        dprintk(XENLOG_WARNING, "vmx_vcpu_pend_interrupt: bad vector\n");
         return -1;
     }
 
@@ -410,7 +410,7 @@ void vlsapic_reset(VCPU *vcpu)
     vcpu->arch.arch_vmx.vlapic.vcpu = vcpu;
     hvm_vioapic_add_lapic(&vcpu->arch.arch_vmx.vlapic, vcpu);
 #endif
-    DPRINTK(XENLOG_INFO "VLSAPIC inservice base=%p\n", &VLSAPIC_INSVC(vcpu,0) 
);
+    dprintk(XENLOG_INFO, "VLSAPIC inservice base=%p\n", &VLSAPIC_INSVC(vcpu,0) 
);
 }
 
 /*
@@ -539,7 +539,7 @@ int vmx_vcpu_pend_interrupt(VCPU *vcpu, 
     int ret;
 
     if (vector & ~0xff) {
-        DPRINTK(XENLOG_G_INFO "vmx_vcpu_pend_interrupt: bad vector\n");
+        gdprintk(XENLOG_INFO, "vmx_vcpu_pend_interrupt: bad vector\n");
         return -1;
     }
     local_irq_save(spsr);
diff -r d60b709724f4 -r 36679b74e24a xen/arch/ia64/vmx/vmx_hypercall.c
--- a/xen/arch/ia64/vmx/vmx_hypercall.c Fri Oct 27 19:15:48 2006 +0100
+++ b/xen/arch/ia64/vmx/vmx_hypercall.c Fri Oct 27 23:47:30 2006 +0100
@@ -79,7 +79,7 @@ do_hvm_op(unsigned long op, XEN_GUEST_HA
     }
 
     default:
-        DPRINTK(XENLOG_G_INFO "Bad HVM op %ld.\n", op);
+        gdprintk(XENLOG_INFO, "Bad HVM op %ld.\n", op);
         rc = -ENOSYS;
     }
     return rc;
diff -r d60b709724f4 -r 36679b74e24a xen/arch/ia64/vmx/vmx_init.c
--- a/xen/arch/ia64/vmx/vmx_init.c      Fri Oct 27 19:15:48 2006 +0100
+++ b/xen/arch/ia64/vmx/vmx_init.c      Fri Oct 27 23:47:30 2006 +0100
@@ -277,7 +277,7 @@ static void vmx_create_event_channels(st
                        p = get_vio(v->domain, o->vcpu_id);
                        o->arch.arch_vmx.xen_port = p->vp_eport =
                                        alloc_unbound_xen_event_channel(o, 0);
-                       DPRINTK(XENLOG_G_INFO "Allocated port %d for hvm.\n",
+                       gdprintk(XENLOG_INFO, "Allocated port %d for hvm.\n",
                                o->arch.arch_vmx.xen_port);
                }
        }
diff -r d60b709724f4 -r 36679b74e24a xen/arch/ia64/xen/dom0_ops.c
--- a/xen/arch/ia64/xen/dom0_ops.c      Fri Oct 27 19:15:48 2006 +0100
+++ b/xen/arch/ia64/xen/dom0_ops.c      Fri Oct 27 23:47:30 2006 +0100
@@ -320,7 +320,7 @@ do_dom0vp_op(unsigned long cmd,
     case IA64_DOM0VP_phystomach:
         ret = ____lookup_domain_mpa(d, arg0 << PAGE_SHIFT);
         if (ret == INVALID_MFN) {
-            DPRINTK(XENLOG_INFO "%s: INVALID_MFN ret: 0x%lx\n",
+            dprintk(XENLOG_INFO, "%s: INVALID_MFN ret: 0x%lx\n",
                      __func__, ret);
         } else {
             ret = (ret & _PFN_MASK) >> PAGE_SHIFT;//XXX pte_pfn()
diff -r d60b709724f4 -r 36679b74e24a xen/arch/ia64/xen/domain.c
--- a/xen/arch/ia64/xen/domain.c        Fri Oct 27 19:15:48 2006 +0100
+++ b/xen/arch/ia64/xen/domain.c        Fri Oct 27 23:47:30 2006 +0100
@@ -412,7 +412,7 @@ int arch_domain_create(struct domain *d)
 
 #ifdef CONFIG_XEN_IA64_PERVCPU_VHPT
        d->arch.has_pervcpu_vhpt = opt_pervcpu_vhpt;
-       DPRINTK("%s:%d domain %d pervcpu_vhpt %d\n",
+       dprintk(XENLOG_WARNING, "%s:%d domain %d pervcpu_vhpt %d\n",
                __func__, __LINE__, d->domain_id, d->arch.has_pervcpu_vhpt);
 #endif
        if (tlb_track_create(d) < 0)
@@ -682,7 +682,7 @@ int shadow_mode_control(struct domain *d
        //struct vcpu *v;
 
        if (unlikely(d == current->domain)) {
-               DPRINTK(XENLOG_G_INFO
+               gdprintk(XENLOG_INFO,
                         "Don't try to do a shadow op on yourself!\n");
                return -EINVAL;
        }   
diff -r d60b709724f4 -r 36679b74e24a xen/arch/ia64/xen/irq.c
--- a/xen/arch/ia64/xen/irq.c   Fri Oct 27 19:15:48 2006 +0100
+++ b/xen/arch/ia64/xen/irq.c   Fri Oct 27 23:47:30 2006 +0100
@@ -377,7 +377,7 @@ int pirq_guest_bind(struct vcpu *v, int 
     {
         if ( desc->action != NULL )
         {
-            DPRINTK(XENLOG_G_INFO
+            gdprintk(XENLOG_INFO,
                     "Cannot bind IRQ %d to guest. In use by '%s'.\n",
                     irq, desc->action->name);
             rc = -EBUSY;
@@ -387,7 +387,7 @@ int pirq_guest_bind(struct vcpu *v, int 
         action = xmalloc(irq_guest_action_t);
         if ( (desc->action = (struct irqaction *)action) == NULL )
         {
-            DPRINTK(XENLOG_G_INFO
+            gdprintk(XENLOG_INFO,
                     "Cannot bind IRQ %d to guest. Out of memory.\n",
                     irq);
             rc = -ENOMEM;
@@ -413,7 +413,7 @@ int pirq_guest_bind(struct vcpu *v, int 
     }
     else if ( !will_share || !action->shareable )
     {
-        DPRINTK(XENLOG_G_INFO
+        gdprintk(XENLOG_INFO,
                 "Cannot bind IRQ %d to guest. Will not share with others.\n",
                 irq);
         rc = -EBUSY;
@@ -422,7 +422,7 @@ int pirq_guest_bind(struct vcpu *v, int 
 
     if ( action->nr_guests == IRQ_MAX_GUESTS )
     {
-        DPRINTK(XENLOG_G_INFO
+        gdprintk(XENLOG_INFO,
                 "Cannot bind IRQ %d to guest. Already at max share.\n",
                 irq);
         rc = -EBUSY;
diff -r d60b709724f4 -r 36679b74e24a xen/arch/ia64/xen/mm.c
--- a/xen/arch/ia64/xen/mm.c    Fri Oct 27 19:15:48 2006 +0100
+++ b/xen/arch/ia64/xen/mm.c    Fri Oct 27 23:47:30 2006 +0100
@@ -229,7 +229,7 @@ try_to_clear_PGC_allocate(struct domain*
         if (unlikely(!(x & PGC_allocated)) || unlikely(_nd != _d)) {
             struct domain* nd = unpickle_domptr(_nd);
             if (nd == NULL) {
-                DPRINTK(XENLOG_G_INFO "gnttab_transfer: "
+                gdprintk(XENLOG_INFO, "gnttab_transfer: "
                         "Bad page %p: ed=%p(%u) 0x%x, "
                         "sd=%p 0x%x,"
                         " caf=%016lx, taf=%" PRtype_info "\n",
@@ -445,7 +445,8 @@ u64 translate_domain_pte(u64 pteval, u64
        arflags2 = pteval2 & _PAGE_AR_MASK;
        if (arflags != _PAGE_AR_R && arflags2 == _PAGE_AR_R) {
 #if 0
-               DPRINTK("%s:%d "
+               dprintk(XENLOG_WARNING,
+                "%s:%d "
                        "pteval 0x%lx arflag 0x%lx address 0x%lx itir 0x%lx "
                        "pteval2 0x%lx arflags2 0x%lx mpaddr 0x%lx\n",
                        __func__, __LINE__,
@@ -979,7 +980,7 @@ efi_mmio(unsigned long physaddr, unsigne
 
         if (start <= physaddr && physaddr < end) {
             if ((physaddr + size) > end) {
-                DPRINTK(XENLOG_G_INFO "%s: physaddr 0x%lx size = 0x%lx\n",
+                gdprintk(XENLOG_INFO, "%s: physaddr 0x%lx size = 0x%lx\n",
                         __func__, physaddr, size);
                 return 0;
             }
@@ -1014,12 +1015,12 @@ assign_domain_mmio_page(struct domain *d
                         unsigned long mpaddr, unsigned long size)
 {
     if (size == 0) {
-        DPRINTK(XENLOG_G_INFO "%s: domain %p mpaddr 0x%lx size = 0x%lx\n",
+        gdprintk(XENLOG_INFO, "%s: domain %p mpaddr 0x%lx size = 0x%lx\n",
                 __func__, d, mpaddr, size);
     }
     if (!efi_mmio(mpaddr, size)) {
 #ifndef NDEBUG
-        DPRINTK(XENLOG_G_INFO "%s: domain %p mpaddr 0x%lx size = 0x%lx\n",
+        gdprintk(XENLOG_INFO, "%s: domain %p mpaddr 0x%lx size = 0x%lx\n",
                 __func__, d, mpaddr, size);
 #endif
         return -EINVAL;
@@ -1109,7 +1110,7 @@ assign_domain_page_cmpxchg_rel(struct do
     old_mfn = page_to_mfn(old_page);
     old_pte = pfn_pte(old_mfn, __pgprot(old_prot));
     if (!pte_present(old_pte)) {
-        DPRINTK(XENLOG_G_INFO
+        gdprintk(XENLOG_INFO,
                 "%s: old_pte 0x%lx old_prot 0x%lx old_mfn 0x%lx\n",
                 __func__, pte_val(old_pte), old_prot, old_mfn);
         return -EINVAL;
@@ -1126,7 +1127,7 @@ assign_domain_page_cmpxchg_rel(struct do
             goto again;
         }
 
-        DPRINTK(XENLOG_G_INFO
+        gdprintk(XENLOG_INFO,
                 "%s: old_pte 0x%lx old_prot 0x%lx old_mfn 0x%lx "
                 "ret_pte 0x%lx ret_mfn 0x%lx\n",
                 __func__,
@@ -1187,7 +1188,7 @@ zap_domain_page_one(struct domain *d, un
                 goto again;
             }
 
-            DPRINTK(XENLOG_G_INFO "%s: old_pte 0x%lx old_arflags 0x%lx mfn 
0x%lx "
+            gdprintk(XENLOG_INFO, "%s: old_pte 0x%lx old_arflags 0x%lx mfn 
0x%lx "
                     "ret_pte 0x%lx ret_mfn 0x%lx\n",
                     __func__,
                     pte_val(old_pte), old_arflags, mfn,
@@ -1255,7 +1256,7 @@ dom0vp_add_physmap(struct domain* d, uns
             rd = dom_io;
             break;
         default:
-            DPRINTK(XENLOG_G_INFO "d 0x%p domid %d "
+            gdprintk(XENLOG_INFO, "d 0x%p domid %d "
                     "pgfn 0x%lx mfn 0x%lx flags 0x%lx domid %d\n",
                     d, d->domain_id, gpfn, mfn, flags, domid);
             return -ESRCH;
@@ -1328,7 +1329,7 @@ dom0vp_expose_p2m(struct domain* d,
         (conv_start_gpfn % granule_pfn) != 0 ||
         (assign_start_gpfn % granule_pfn) != 0 ||
         (expose_num_pfn % granule_pfn) != 0) {
-        DPRINTK(XENLOG_G_INFO
+        gdprintk(XENLOG_INFO,
                 "%s conv_start_gpfn 0x%016lx assign_start_gpfn 0x%016lx "
                 "expose_size 0x%016lx granulte_pfn 0x%016lx\n", __func__, 
                 conv_start_gpfn, assign_start_gpfn, expose_size, granule_pfn);
@@ -1336,7 +1337,7 @@ dom0vp_expose_p2m(struct domain* d,
     }
 
     if (granule_pfn != PTRS_PER_PTE) {
-        DPRINTK(XENLOG_G_INFO
+        gdprintk(XENLOG_INFO,
                 "%s granule_pfn 0x%016lx PTRS_PER_PTE 0x%016lx\n",
                 __func__, granule_pfn, PTRS_PER_PTE);
         return -ENOSYS;
@@ -1355,7 +1356,7 @@ dom0vp_expose_p2m(struct domain* d,
         assign_pte = lookup_alloc_domain_pte(d, (assign_start_gpfn <<
                                              PAGE_SHIFT) + i * sizeof(pte_t));
         if (assign_pte == NULL) {
-            DPRINTK(XENLOG_G_INFO "%s failed to allocate pte page\n", 
__func__);
+            gdprintk(XENLOG_INFO, "%s failed to allocate pte page\n", 
__func__);
             return -ENOMEM;
         }
 
@@ -1376,7 +1377,7 @@ dom0vp_expose_p2m(struct domain* d,
 
         if (expose_p2m_page(d, (assign_start_gpfn << PAGE_SHIFT) +
                             i * sizeof(pte_t), virt_to_page(conv_pte)) < 0) {
-            DPRINTK(XENLOG_G_INFO "%s failed to assign page\n", __func__);
+            gdprintk(XENLOG_INFO, "%s failed to assign page\n", __func__);
             return -EAGAIN;
         }
 
@@ -1395,7 +1396,7 @@ dom0vp_expose_p2m(struct domain* d,
         }
         if (expose_p2m_page(d, (assign_start_gpfn + i) << PAGE_SHIFT,
                             p2m_pte_zero_page) < 0) {
-            DPRINTK(XENLOG_G_INFO "%s failed to assign zero-pte page\n", 
__func__);
+            gdprintk(XENLOG_INFO, "%s failed to assign zero-pte page\n", 
__func__);
             return -EAGAIN;
         }
     }
@@ -1418,7 +1419,7 @@ create_grant_host_mapping(unsigned long 
 
     if (flags & (GNTMAP_device_map |
                  GNTMAP_application_map | GNTMAP_contains_pte)) {
-        DPRINTK(XENLOG_G_INFO "%s: flags 0x%x\n", __func__, flags);
+        gdprintk(XENLOG_INFO, "%s: flags 0x%x\n", __func__, flags);
         return GNTST_general_error;
     }
 
@@ -1452,13 +1453,13 @@ destroy_grant_host_mapping(unsigned long
     struct page_info* page;
 
     if (flags & (GNTMAP_application_map | GNTMAP_contains_pte)) {
-        DPRINTK(XENLOG_G_INFO "%s: flags 0x%x\n", __func__, flags);
+        gdprintk(XENLOG_INFO, "%s: flags 0x%x\n", __func__, flags);
         return GNTST_general_error;
     }
 
     pte = lookup_noalloc_domain_pte(d, gpaddr);
     if (pte == NULL) {
-        DPRINTK(XENLOG_G_INFO "%s: gpaddr 0x%lx mfn 0x%lx\n",
+        gdprintk(XENLOG_INFO, "%s: gpaddr 0x%lx mfn 0x%lx\n",
                 __func__, gpaddr, mfn);
         return GNTST_general_error;
     }
@@ -1467,7 +1468,7 @@ destroy_grant_host_mapping(unsigned long
     cur_arflags = pte_val(*pte) & ~_PAGE_PPN_MASK;
     cur_pte = pfn_pte(mfn, __pgprot(cur_arflags));
     if (!pte_present(cur_pte)) {
-        DPRINTK(XENLOG_G_INFO "%s: gpaddr 0x%lx mfn 0x%lx cur_pte 0x%lx\n",
+        gdprintk(XENLOG_INFO, "%s: gpaddr 0x%lx mfn 0x%lx cur_pte 0x%lx\n",
                 __func__, gpaddr, mfn, pte_val(cur_pte));
         return GNTST_general_error;
     }
@@ -1475,7 +1476,7 @@ destroy_grant_host_mapping(unsigned long
 
     old_pte = ptep_cmpxchg_rel(&d->arch.mm, gpaddr, pte, cur_pte, new_pte);
     if (unlikely(!pte_present(old_pte))) {
-        DPRINTK(XENLOG_G_INFO "%s: gpaddr 0x%lx mfn 0x%lx"
+        gdprintk(XENLOG_INFO, "%s: gpaddr 0x%lx mfn 0x%lx"
                          " cur_pte 0x%lx old_pte 0x%lx\n",
                 __func__, gpaddr, mfn, pte_val(cur_pte), pte_val(old_pte));
         return GNTST_general_error;
@@ -1484,7 +1485,7 @@ destroy_grant_host_mapping(unsigned long
         if (pte_pfn(old_pte) == mfn) {
             goto again;
         }
-        DPRINTK(XENLOG_G_INFO "%s gpaddr 0x%lx mfn 0x%lx cur_pte "
+        gdprintk(XENLOG_INFO, "%s gpaddr 0x%lx mfn 0x%lx cur_pte "
                 "0x%lx old_pte 0x%lx\n",
                 __func__, gpaddr, mfn, pte_val(cur_pte), pte_val(old_pte));
         return GNTST_general_error;
@@ -1517,7 +1518,7 @@ steal_page(struct domain *d, struct page
     u64 x, nx, y;
 
     if (page_get_owner(page) != d) {
-        DPRINTK(XENLOG_G_INFO "%s d 0x%p owner 0x%p\n",
+        gdprintk(XENLOG_INFO, "%s d 0x%p owner 0x%p\n",
                 __func__, d, page_get_owner(page));
         return -1;
     }
@@ -1530,7 +1531,7 @@ steal_page(struct domain *d, struct page
 
         new = alloc_domheap_page(d);
         if (new == NULL) {
-            DPRINTK(XENLOG_G_INFO "alloc_domheap_page() failed\n");
+            gdprintk(XENLOG_INFO, "alloc_domheap_page() failed\n");
             return -1;
         }
         // zero out pages for security reasons
@@ -1554,7 +1555,7 @@ steal_page(struct domain *d, struct page
         ret = assign_domain_page_cmpxchg_rel(d, gpfn << PAGE_SHIFT, page, new,
                                              ASSIGN_writable);
         if (ret < 0) {
-            DPRINTK(XENLOG_G_INFO "assign_domain_page_cmpxchg_rel failed %d\n",
+            gdprintk(XENLOG_INFO, "assign_domain_page_cmpxchg_rel failed %d\n",
                     ret);
             set_gpfn_from_mfn(new_mfn, INVALID_M2P_ENTRY);
             free_domheap_page(new);
@@ -1592,7 +1593,7 @@ steal_page(struct domain *d, struct page
             unlikely(_nd != _d)) {
             struct domain* nd = unpickle_domptr(_nd);
             if (nd == NULL) {
-                DPRINTK(XENLOG_G_INFO "gnttab_transfer: "
+                gdprintk(XENLOG_INFO, "gnttab_transfer: "
                         "Bad page %p: ed=%p(%u) 0x%x, "
                         "sd=%p 0x%x,"
                         " caf=%016lx, taf=%" PRtype_info
@@ -1604,7 +1605,7 @@ steal_page(struct domain *d, struct page
                         page->u.inuse.type_info,
                         memflags);
             } else {
-                DPRINTK(XENLOG_G_WARNING "gnttab_transfer: "
+                gdprintk(XENLOG_WARNING, "gnttab_transfer: "
                         "Bad page %p: ed=%p(%u) 0x%x, "
                         "sd=%p(%u) 0x%x,"
                         " caf=%016lx, taf=%" PRtype_info
@@ -1682,24 +1683,24 @@ domain_page_flush(struct domain* d, unsi
     switch (tlb_track_search_and_remove(d->arch.tlb_track,
                                         ptep, old_pte, &entry)) {
     case TLB_TRACK_NOT_TRACKED:
-        // DPRINTK("%s TLB_TRACK_NOT_TRACKED\n", __func__);
+        // dprintk(XENLOG_WARNING, "%s TLB_TRACK_NOT_TRACKED\n", __func__);
         domain_flush_vtlb_all();
         break;
     case TLB_TRACK_NOT_FOUND:
         /* do nothing */
-        // DPRINTK("%s TLB_TRACK_NOT_FOUND\n", __func__);
+        // dprintk(XENLOG_WARNING, "%s TLB_TRACK_NOT_FOUND\n", __func__);
         break;
     case TLB_TRACK_FOUND:
-        // DPRINTK("%s TLB_TRACK_FOUND\n", __func__);
+        // dprintk(XENLOG_WARNING, "%s TLB_TRACK_FOUND\n", __func__);
         domain_flush_vtlb_track_entry(d, entry);
         tlb_track_free_entry(d->arch.tlb_track, entry);
         break;
     case TLB_TRACK_MANY:
-        DPRINTK(XENLOG_G_INFO "%s TLB_TRACK_MANY\n", __func__);
+        gdprintk(XENLOG_INFO, "%s TLB_TRACK_MANY\n", __func__);
         domain_flush_vtlb_all();
         break;
     case TLB_TRACK_AGAIN:
-        DPRINTK(XENLOG_G_ERR "%s TLB_TRACK_AGAIN\n", __func__);
+        gdprintk(XENLOG_ERR, "%s TLB_TRACK_AGAIN\n", __func__);
         BUG();
         break;
     }
diff -r d60b709724f4 -r 36679b74e24a xen/arch/ia64/xen/tlb_track.c
--- a/xen/arch/ia64/xen/tlb_track.c     Fri Oct 27 19:15:48 2006 +0100
+++ b/xen/arch/ia64/xen/tlb_track.c     Fri Oct 27 23:47:30 2006 +0100
@@ -44,13 +44,14 @@ tlb_track_allocate_entries(struct tlb_tr
 
     BUG_ON(tlb_track->num_free > 0);
     if (tlb_track->num_entries >= tlb_track->limit) {
-        DPRINTK("%s: num_entries %d limit %d\n",
+        dprintk(XENLOG_WARNING, "%s: num_entries %d limit %d\n",
                 __func__, tlb_track->num_entries, tlb_track->limit);
         return -ENOMEM;
     }
     entry_page = alloc_domheap_page(NULL);
     if (entry_page == NULL) {
-        DPRINTK("%s: domheap page failed. num_entries %d limit %d\n",
+        dprintk(XENLOG_WARNING,
+                "%s: domheap page failed. num_entries %d limit %d\n",
                 __func__, tlb_track->num_entries, tlb_track->limit);
         return -ENOMEM;
     }
diff -r d60b709724f4 -r 36679b74e24a xen/arch/ia64/xen/vcpu.c
--- a/xen/arch/ia64/xen/vcpu.c  Fri Oct 27 19:15:48 2006 +0100
+++ b/xen/arch/ia64/xen/vcpu.c  Fri Oct 27 23:47:30 2006 +0100
@@ -1544,8 +1544,9 @@ vcpu_get_domain_bundle(VCPU * vcpu, REGS
                // Last itc.i value is cached to PSCBX(vcpu, itlb).
                tr = PSCBX(vcpu, itlb);
                if (vcpu_match_tr_entry(&tr, gip, rid)) {
-                       //DPRINTK("%s gip 0x%lx gpip 0x%lx\n", __func__,
-                       //      gip, gpip);
+                       //dprintk(XENLOG_WARNING,
+                       //        "%s gip 0x%lx gpip 0x%lx\n", __func__,
+                       //        gip, gpip);
                        goto found;
                }
                trp = vcpu_tr_lookup(vcpu, gip, rid, 1);
@@ -1571,7 +1572,7 @@ vcpu_get_domain_bundle(VCPU * vcpu, REGS
                        set_metaphysical_rr0();
                }
                if (bundle->i64[0] == 0 && bundle->i64[1] == 0) {
-                       DPRINTK(XENLOG_INFO "%s gip 0x%lx\n", __func__, gip);
+                       dprintk(XENLOG_INFO, "%s gip 0x%lx\n", __func__, gip);
                        return 0;
                }
                return 1;
diff -r d60b709724f4 -r 36679b74e24a xen/arch/powerpc/mm.c
--- a/xen/arch/powerpc/mm.c     Fri Oct 27 19:15:48 2006 +0100
+++ b/xen/arch/powerpc/mm.c     Fri Oct 27 23:47:30 2006 +0100
@@ -268,7 +268,7 @@ int allocate_rma(struct domain *d, unsig
 
     d->arch.rma_page = alloc_domheap_pages(d, order, 0);
     if (d->arch.rma_page == NULL) {
-        DPRINTK(XENLOG_G_INFO "Could not allocate order=%d RMA for domain 
%u\n",
+        gdprintk(XENLOG_INFO, "Could not allocate order=%d RMA for domain 
%u\n",
                 order, d->domain_id);
         return -ENOMEM;
     }
diff -r d60b709724f4 -r 36679b74e24a xen/arch/powerpc/shadow.c
--- a/xen/arch/powerpc/shadow.c Fri Oct 27 19:15:48 2006 +0100
+++ b/xen/arch/powerpc/shadow.c Fri Oct 27 23:47:30 2006 +0100
@@ -120,14 +120,14 @@ int shadow_domctl(struct domain *d,
 {
     if ( unlikely(d == current->domain) )
     {
-        DPRINTK(XENLOG_G_INFO "Don't try to do a shadow op on yourself!\n");
+        gdprintk(XENLOG_INFO, "Don't try to do a shadow op on yourself!\n");
         return -EINVAL;
     }
 
     switch ( sc->op )
     {
     case XEN_DOMCTL_SHADOW_OP_OFF:
-         DPRINTK(XENLOG_G_INFO "Shadow is mandatory!\n");
+         gdprintk(XENLOG_INFO, "Shadow is mandatory!\n");
          return -EINVAL;
 
     case XEN_DOMCTL_SHADOW_OP_GET_ALLOCATION:
diff -r d60b709724f4 -r 36679b74e24a xen/arch/x86/domain.c
--- a/xen/arch/x86/domain.c     Fri Oct 27 19:15:48 2006 +0100
+++ b/xen/arch/x86/domain.c     Fri Oct 27 23:47:30 2006 +0100
@@ -564,7 +564,7 @@ static void load_segments(struct vcpu *n
              put_user(regs->r11,           rsp-10) |
              put_user(regs->rcx,           rsp-11) )
         {
-            DPRINTK(XENLOG_G_ERR "Error while creating failsafe "
+            gdprintk(XENLOG_ERR, "Error while creating failsafe "
                     "callback frame.\n");
             domain_crash(n->domain);
         }
diff -r d60b709724f4 -r 36679b74e24a xen/arch/x86/extable.c
--- a/xen/arch/x86/extable.c    Fri Oct 27 19:15:48 2006 +0100
+++ b/xen/arch/x86/extable.c    Fri Oct 27 23:47:30 2006 +0100
@@ -74,7 +74,7 @@ search_pre_exception_table(struct cpu_us
     unsigned long addr = (unsigned long)regs->eip;
     unsigned long fixup = search_one_table(
         __start___pre_ex_table, __stop___pre_ex_table-1, addr);
-    DPRINTK(XENLOG_INFO "Pre-exception: %p -> %p\n", _p(addr), _p(fixup));
+    dprintk(XENLOG_INFO, "Pre-exception: %p -> %p\n", _p(addr), _p(fixup));
 #ifdef PERF_COUNTERS
     if ( fixup )
         perfc_incrc(exception_fixed);
diff -r d60b709724f4 -r 36679b74e24a xen/arch/x86/hvm/hvm.c
--- a/xen/arch/x86/hvm/hvm.c    Fri Oct 27 19:15:48 2006 +0100
+++ b/xen/arch/x86/hvm/hvm.c    Fri Oct 27 23:47:30 2006 +0100
@@ -194,7 +194,7 @@ void hvm_create_event_channels(struct vc
             p = get_vio(v->domain, o->vcpu_id);
             o->arch.hvm_vcpu.xen_port = p->vp_eport =
                 alloc_unbound_xen_event_channel(o, 0);
-            DPRINTK(XENLOG_INFO "Allocated port %d for hvm.\n",
+            dprintk(XENLOG_INFO, "Allocated port %d for hvm.\n",
                     o->arch.hvm_vcpu.xen_port);
         }
     }
@@ -356,7 +356,7 @@ static void hvm_vcpu_down(void)
     struct domain *d = v->domain;
     int online_count = 0;
 
-    DPRINTK(XENLOG_G_INFO "DOM%d/VCPU%d: going offline.\n",
+    gdprintk(XENLOG_INFO, "DOM%d/VCPU%d: going offline.\n",
            d->domain_id, v->vcpu_id);
 
     /* Doesn't halt us immediately, but we'll never return to guest context. */
@@ -373,7 +373,7 @@ static void hvm_vcpu_down(void)
     /* ... Shut down the domain if not. */
     if ( online_count == 0 )
     {
-        DPRINTK(XENLOG_G_INFO "DOM%d: all CPUs offline -- powering off.\n",
+        gdprintk(XENLOG_INFO, "DOM%d: all CPUs offline -- powering off.\n",
                 d->domain_id);
         domain_shutdown(d, SHUTDOWN_poweroff);
     }
@@ -514,7 +514,7 @@ void hvm_do_hypercall(struct cpu_user_re
 
     if ( (pregs->eax >= NR_hypercalls) || !hvm_hypercall_table[pregs->eax] )
     {
-        DPRINTK(XENLOG_G_INFO "HVM vcpu %d:%d did a bad hypercall %d.\n",
+        gdprintk(XENLOG_INFO, "HVM vcpu %d:%d did a bad hypercall %d.\n",
                 current->domain->domain_id, current->vcpu_id,
                 pregs->eax);
         pregs->eax = -ENOSYS;
@@ -560,7 +560,7 @@ static long do_memory_op_compat32(int cm
     }
 
     default:
-        DPRINTK(XENLOG_G_INFO "memory_op %d.\n", cmd);
+        gdprintk(XENLOG_INFO, "memory_op %d.\n", cmd);
         rc = -ENOSYS;
         break;
     }
@@ -593,7 +593,7 @@ void hvm_do_hypercall(struct cpu_user_re
     pregs->rax = (uint32_t)pregs->eax; /* mask in case compat32 caller */
     if ( (pregs->rax >= NR_hypercalls) || !hvm_hypercall64_table[pregs->rax] )
     {
-        DPRINTK(XENLOG_G_INFO "HVM vcpu %d:%d did a bad hypercall %ld.\n",
+        gdprintk(XENLOG_INFO, "HVM vcpu %d:%d did a bad hypercall %ld.\n",
                 current->domain->domain_id, current->vcpu_id,
                 pregs->rax);
         pregs->rax = -ENOSYS;
@@ -644,7 +644,7 @@ int hvm_bringup_ap(int vcpuid, int tramp
 
     if ( bsp->vcpu_id != 0 )
     {
-        DPRINTK(XENLOG_G_ERR "Not calling hvm_bringup_ap from BSP context.\n");
+        gdprintk(XENLOG_ERR, "Not calling hvm_bringup_ap from BSP context.\n");
         domain_crash_synchronous();
     }
 
@@ -653,7 +653,7 @@ int hvm_bringup_ap(int vcpuid, int tramp
 
     if ( (ctxt = xmalloc(struct vcpu_guest_context)) == NULL )
     {
-        DPRINTK(XENLOG_G_INFO
+        gdprintk(XENLOG_INFO,
                 "Failed to allocate memory in hvm_bringup_ap.\n");
         return -ENOMEM;
     }
@@ -668,14 +668,14 @@ int hvm_bringup_ap(int vcpuid, int tramp
 
     if ( rc != 0 )
     {
-        DPRINTK(XENLOG_G_INFO
+        gdprintk(XENLOG_INFO,
                "AP %d bringup failed in boot_vcpu %x.\n", vcpuid, rc);
         goto out;
     }
 
     if ( test_and_clear_bit(_VCPUF_down, &d->vcpu[vcpuid]->vcpu_flags) )
         vcpu_wake(d->vcpu[vcpuid]);
-    DPRINTK(XENLOG_G_INFO "AP %d bringup suceeded.\n", vcpuid);
+    gdprintk(XENLOG_INFO, "AP %d bringup suceeded.\n", vcpuid);
 
  out:
     xfree(ctxt);
@@ -734,7 +734,7 @@ long do_hvm_op(unsigned long op, XEN_GUE
 
     default:
     {
-        DPRINTK(XENLOG_G_INFO "Bad HVM op %ld.\n", op);
+        gdprintk(XENLOG_INFO, "Bad HVM op %ld.\n", op);
         rc = -ENOSYS;
         break;
     }
diff -r d60b709724f4 -r 36679b74e24a xen/arch/x86/hvm/i8259.c
--- a/xen/arch/x86/hvm/i8259.c  Fri Oct 27 19:15:48 2006 +0100
+++ b/xen/arch/x86/hvm/i8259.c  Fri Oct 27 23:47:30 2006 +0100
@@ -140,10 +140,8 @@ void pic_set_xen_irq(void *opaque, int i
 
     /* Set it on the 8259s */
     ps = &s->pics[irq >> 3];
-    if (!(ps->elcr & (1 << (irq & 7)))) {
-       DPRINTK("edge-triggered override IRQ?\n");
-       domain_crash(current->domain);
-    }
+    if (!(ps->elcr & (1 << (irq & 7))))
+       gdprintk(XENLOG_WARNING, "edge-triggered override IRQ?\n");
     if (level) {
        ps->irr_xen |= 1 << (irq & 7);
     } else {
diff -r d60b709724f4 -r 36679b74e24a xen/arch/x86/hvm/instrlen.c
--- a/xen/arch/x86/hvm/instrlen.c       Fri Oct 27 19:15:48 2006 +0100
+++ b/xen/arch/x86/hvm/instrlen.c       Fri Oct 27 23:47:30 2006 +0100
@@ -317,7 +317,7 @@ done_prefixes:
 
         if ( modrm_mod == 3 )
         {
-            DPRINTK(XENLOG_G_WARNING "Cannot parse ModRM.mod == 3.\n");
+            gdprintk(XENLOG_WARNING, "Cannot parse ModRM.mod == 3.\n");
             goto cannot_emulate;
         }
 
@@ -444,7 +444,7 @@ done:
     return length;
 
 cannot_emulate:
-    DPRINTK(XENLOG_G_WARNING
+    gdprintk(XENLOG_WARNING,
             "Cannot emulate %02x at address %lx (eip %lx, mode %d)\n",
             b, (unsigned long)_regs.eip, (unsigned long)regs->eip, mode);
     return -1;
diff -r d60b709724f4 -r 36679b74e24a xen/arch/x86/hvm/platform.c
--- a/xen/arch/x86/hvm/platform.c       Fri Oct 27 19:15:48 2006 +0100
+++ b/xen/arch/x86/hvm/platform.c       Fri Oct 27 23:47:30 2006 +0100
@@ -956,7 +956,8 @@ void handle_mmio(unsigned long gpa)
         }
 
         if ( addr & (size - 1) )
-            DPRINTK("Unaligned ioport access: %lx, %d\n", addr, size);
+            gdprintk(XENLOG_WARNING,
+                     "Unaligned ioport access: %lx, %d\n", addr, size);
 
         /*
          * In case of a movs spanning multiple pages, we break the accesses
@@ -971,7 +972,8 @@ void handle_mmio(unsigned long gpa)
         if ( (addr & PAGE_MASK) != ((addr + size - 1) & PAGE_MASK) ) {
             unsigned long value = 0;
 
-            DPRINTK("Single io request in a movs crossing page boundary.\n");
+            gdprintk(XENLOG_WARNING,
+                     "Single io request in a movs crossing page boundary.\n");
             mmio_op->flags |= OVERLAP;
 
             if ( dir == IOREQ_WRITE ) {
diff -r d60b709724f4 -r 36679b74e24a xen/arch/x86/hvm/svm/svm.c
--- a/xen/arch/x86/hvm/svm/svm.c        Fri Oct 27 19:15:48 2006 +0100
+++ b/xen/arch/x86/hvm/svm/svm.c        Fri Oct 27 23:47:30 2006 +0100
@@ -805,7 +805,7 @@ static void svm_final_setup_guest(struct
 
     if ( !shadow_mode_external(d) )
     {
-        DPRINTK(XENLOG_G_ERR "Can't init HVM for dom %u vcpu %u: "
+        gdprintk(XENLOG_ERR, "Can't init HVM for dom %u vcpu %u: "
                 "not in shadow external mode\n", d->domain_id, v->vcpu_id);
         domain_crash(d);
     }
diff -r d60b709724f4 -r 36679b74e24a xen/arch/x86/hvm/vioapic.c
--- a/xen/arch/x86/hvm/vioapic.c        Fri Oct 27 19:15:48 2006 +0100
+++ b/xen/arch/x86/hvm/vioapic.c        Fri Oct 27 23:47:30 2006 +0100
@@ -556,10 +556,8 @@ void hvm_vioapic_set_xen_irq(struct doma
        s->redirtbl[irq].RedirForm.mask)
         return;
 
-    if (s->redirtbl[irq].RedirForm.trigmod != IOAPIC_LEVEL_TRIGGER) {
-       DPRINTK("Forcing edge triggered APIC irq %d?\n", irq);
-       domain_crash(d);
-    }
+    if (s->redirtbl[irq].RedirForm.trigmod != IOAPIC_LEVEL_TRIGGER)
+       gdprintk(XENLOG_WARNING, "Forcing edge triggered APIC irq %d?\n", irq);
 
     if (level)
        s->irr_xen |= 1 << irq;
diff -r d60b709724f4 -r 36679b74e24a xen/arch/x86/hvm/vmx/vmcs.c
--- a/xen/arch/x86/hvm/vmx/vmcs.c       Fri Oct 27 19:15:48 2006 +0100
+++ b/xen/arch/x86/hvm/vmx/vmcs.c       Fri Oct 27 23:47:30 2006 +0100
@@ -145,7 +145,7 @@ static struct vmcs_struct *vmx_alloc_vmc
 
     if ( (vmcs = alloc_xenheap_page()) == NULL )
     {
-        DPRINTK(XENLOG_G_WARNING "Failed to allocate VMCS.\n");
+        gdprintk(XENLOG_WARNING, "Failed to allocate VMCS.\n");
         return NULL;
     }
 
diff -r d60b709724f4 -r 36679b74e24a xen/arch/x86/hvm/vmx/vmx.c
--- a/xen/arch/x86/hvm/vmx/vmx.c        Fri Oct 27 19:15:48 2006 +0100
+++ b/xen/arch/x86/hvm/vmx/vmx.c        Fri Oct 27 23:47:30 2006 +0100
@@ -71,7 +71,7 @@ static int vmx_initialize_guest_resource
 
     if ( !shadow_mode_external(d) )
     {
-        DPRINTK(XENLOG_ERR "Can't init HVM for dom %u vcpu %u: "
+        dprintk(XENLOG_ERR, "Can't init HVM for dom %u vcpu %u: "
                 "not in shadow external mode\n", 
                 d->domain_id, v->vcpu_id);
         domain_crash(d);
@@ -83,7 +83,7 @@ static int vmx_initialize_guest_resource
 
         if ( (rc = vmx_create_vmcs(vc)) != 0 )
         {
-            DPRINTK(XENLOG_WARNING
+            dprintk(XENLOG_WARNING,
                     "Failed to create VMCS for vcpu %d: err=%d.\n",
                     vc->vcpu_id, rc);
             return 0;
@@ -93,7 +93,7 @@ static int vmx_initialize_guest_resource
 
         if ( (io_bitmap_a = alloc_xenheap_pages(IO_BITMAP_ORDER)) == NULL )
         {
-            DPRINTK(XENLOG_WARNING
+            dprintk(XENLOG_WARNING,
                    "Failed to allocate io bitmap b for vcpu %d.\n",
                     vc->vcpu_id);
             return 0;
@@ -101,7 +101,7 @@ static int vmx_initialize_guest_resource
 
         if ( (io_bitmap_b = alloc_xenheap_pages(IO_BITMAP_ORDER)) == NULL )
         {
-            DPRINTK(XENLOG_WARNING
+            dprintk(XENLOG_WARNING,
                     "Failed to allocate io bitmap b for vcpu %d.\n",
                     vc->vcpu_id);
             return 0;
@@ -940,7 +940,7 @@ static void vmx_do_cpuid(struct cpu_user
         unsigned long mfn = get_mfn_from_gpfn(value >> PAGE_SHIFT);
         char *p;
 
-        DPRINTK(XENLOG_G_INFO "Input address is 0x%"PRIx64".\n", value);
+        gdprintk(XENLOG_INFO, "Input address is 0x%"PRIx64".\n", value);
 
         /* 8-byte aligned valid pseudophys address from vmxassist, please. */
         if ( (value & 7) || (mfn == INVALID_MFN) ||
@@ -951,7 +951,7 @@ static void vmx_do_cpuid(struct cpu_user
         value = *((uint64_t *)(p + (value & (PAGE_SIZE - 1))));
         unmap_domain_page(p);
 
-        DPRINTK(XENLOG_G_INFO "Output value is 0x%"PRIx64".\n", value);
+        gdprintk(XENLOG_INFO, "Output value is 0x%"PRIx64".\n", value);
         ecx = (u32)(value >>  0);
         edx = (u32)(value >> 32);
     }
diff -r d60b709724f4 -r 36679b74e24a xen/arch/x86/io_apic.c
--- a/xen/arch/x86/io_apic.c    Fri Oct 27 19:15:48 2006 +0100
+++ b/xen/arch/x86/io_apic.c    Fri Oct 27 23:47:30 2006 +0100
@@ -1980,7 +1980,7 @@ int ioapic_guest_read(unsigned long phys
 }
 
 #define WARN_BOGUS_WRITE(f, a...)                                       \
-    DPRINTK(XENLOG_INFO "\n%s: "                                        \
+    dprintk(XENLOG_INFO, "\n%s: "                                        \
             "apic=%d, pin=%d, old_irq=%d, new_irq=%d\n"                 \
             "%s: old_entry=%08x, new_entry=%08x\n"                      \
             "%s: " f, __FUNCTION__, apic, pin, old_irq, new_irq,        \
diff -r d60b709724f4 -r 36679b74e24a xen/arch/x86/irq.c
--- a/xen/arch/x86/irq.c        Fri Oct 27 19:15:48 2006 +0100
+++ b/xen/arch/x86/irq.c        Fri Oct 27 23:47:30 2006 +0100
@@ -432,7 +432,7 @@ int pirq_guest_bind(struct vcpu *v, int 
     {
         if ( desc->action != NULL )
         {
-            DPRINTK(XENLOG_G_INFO
+            gdprintk(XENLOG_INFO,
                     "Cannot bind IRQ %d to guest. In use by '%s'.\n",
                     irq, desc->action->name);
             rc = -EBUSY;
@@ -442,7 +442,7 @@ int pirq_guest_bind(struct vcpu *v, int 
         action = xmalloc(irq_guest_action_t);
         if ( (desc->action = (struct irqaction *)action) == NULL )
         {
-            DPRINTK(XENLOG_G_INFO
+            gdprintk(XENLOG_INFO,
                     "Cannot bind IRQ %d to guest. Out of memory.\n",
                     irq);
             rc = -ENOMEM;
@@ -467,7 +467,7 @@ int pirq_guest_bind(struct vcpu *v, int 
     }
     else if ( !will_share || !action->shareable )
     {
-        DPRINTK(XENLOG_G_INFO "Cannot bind IRQ %d to guest. "
+        gdprintk(XENLOG_INFO, "Cannot bind IRQ %d to guest. "
                "Will not share with others.\n",
                 irq);
         rc = -EBUSY;
@@ -488,7 +488,7 @@ int pirq_guest_bind(struct vcpu *v, int 
 
     if ( action->nr_guests == IRQ_MAX_GUESTS )
     {
-        DPRINTK(XENLOG_G_INFO "Cannot bind IRQ %d to guest. "
+        gdprintk(XENLOG_INFO, "Cannot bind IRQ %d to guest. "
                "Already at max share.\n", irq);
         rc = -EBUSY;
         goto out;
diff -r d60b709724f4 -r 36679b74e24a xen/arch/x86/mm.c
--- a/xen/arch/x86/mm.c Fri Oct 27 19:15:48 2006 +0100
+++ b/xen/arch/x86/mm.c Fri Oct 27 23:47:30 2006 +0100
@@ -108,16 +108,7 @@
 #include <asm/e820.h>
 #include <public/memory.h>
 
-#ifdef VERBOSE
-#define MEM_LOG(_f, _a...)                                          \
-    do {                                                            \
-        if ( printk_ratelimit() )                                   \
-            printk("DOM%u: (file=mm.c, line=%d) " _f "\n",          \
-                   current->domain->domain_id , __LINE__ , ## _a ); \
-    } while (0)
-#else
-#define MEM_LOG(_f, _a...) ((void)0)
-#endif
+#define MEM_LOG(_f, _a...) gdprintk(XENLOG_WARNING , _f , ## _a)
 
 /*
  * PTE updates can be done with ordinary writes except:
@@ -2261,8 +2252,7 @@ int do_mmu_update(
             {
                 if ( shadow_mode_refcounts(d) )
                 {
-                    DPRINTK(XENLOG_INFO
-                            "mmu update on shadow-refcounted domain!");
+                    MEM_LOG("mmu update on shadow-refcounted domain!");
                     break;
                 }
 
@@ -2626,8 +2616,7 @@ int steal_page(
         x = y;
         if (unlikely((x & (PGC_count_mask|PGC_allocated)) !=
                      (1 | PGC_allocated)) || unlikely(_nd != _d)) { 
-            DPRINTK(XENLOG_G_WARNING
-                    "gnttab_transfer: Bad page %p: ed=%p(%u), sd=%p,"
+            MEM_LOG("gnttab_transfer: Bad page %p: ed=%p(%u), sd=%p,"
                     " caf=%08x, taf=%" PRtype_info "\n", 
                     (void *) page_to_mfn(page),
                     d, d->domain_id, unpickle_domptr(_nd), x, 
diff -r d60b709724f4 -r 36679b74e24a xen/arch/x86/mm/shadow/common.c
--- a/xen/arch/x86/mm/shadow/common.c   Fri Oct 27 19:15:48 2006 +0100
+++ b/xen/arch/x86/mm/shadow/common.c   Fri Oct 27 23:47:30 2006 +0100
@@ -3072,7 +3072,7 @@ int shadow_domctl(struct domain *d,
 
     if ( unlikely(d == current->domain) )
     {
-        DPRINTK(XENLOG_G_INFO "Don't try to do a shadow op on yourself!\n");
+        gdprintk(XENLOG_INFO, "Don't try to do a shadow op on yourself!\n");
         return -EINVAL;
     }
 
diff -r d60b709724f4 -r 36679b74e24a xen/arch/x86/platform_hypercall.c
--- a/xen/arch/x86/platform_hypercall.c Fri Oct 27 19:15:48 2006 +0100
+++ b/xen/arch/x86/platform_hypercall.c Fri Oct 27 23:47:30 2006 +0100
@@ -125,7 +125,7 @@ long do_platform_op(XEN_GUEST_HANDLE(xen
         case QUIRK_IOAPIC_GOOD_REGSEL:
 #ifndef sis_apic_bug
             sis_apic_bug = (quirk_id == QUIRK_IOAPIC_BAD_REGSEL);
-            DPRINTK(XENLOG_INFO "Domain 0 says that IO-APIC REGSEL is %s\n",
+            dprintk(XENLOG_INFO, "Domain 0 says that IO-APIC REGSEL is %s\n",
                     sis_apic_bug ? "bad" : "good");
 #else
             BUG_ON(sis_apic_bug != (quirk_id == QUIRK_IOAPIC_BAD_REGSEL));
diff -r d60b709724f4 -r 36679b74e24a xen/arch/x86/traps.c
--- a/xen/arch/x86/traps.c      Fri Oct 27 19:15:48 2006 +0100
+++ b/xen/arch/x86/traps.c      Fri Oct 27 23:47:30 2006 +0100
@@ -407,7 +407,7 @@ static inline int do_trap(int trapnr, ch
 
     if ( likely((fixup = search_exception_table(regs->eip)) != 0) )
     {
-        DPRINTK(XENLOG_ERR "Trap %d: %p -> %p\n",
+        dprintk(XENLOG_ERR, "Trap %d: %p -> %p\n",
                 trapnr, _p(regs->eip), _p(fixup));
         regs->eip = fixup;
         return 0;
@@ -476,7 +476,7 @@ int wrmsr_hypervisor_regs(
 
         if ( idx > 0 )
         {
-            DPRINTK(XENLOG_G_WARNING
+            gdprintk(XENLOG_WARNING,
                     "Dom%d: Out of range index %u to MSR %08x\n",
                     d->domain_id, idx, 0x40000000);
             return 0;
@@ -487,7 +487,7 @@ int wrmsr_hypervisor_regs(
         if ( !mfn_valid(mfn) ||
              !get_page_and_type(mfn_to_page(mfn), d, PGT_writable_page) )
         {
-            DPRINTK(XENLOG_G_WARNING
+            gdprintk(XENLOG_WARNING,
                     "Dom%d: Bad GMFN %lx (MFN %lx) to MSR %08x\n",
                     d->domain_id, gmfn, mfn, 0x40000000);
             return 0;
@@ -835,18 +835,18 @@ static int __spurious_page_fault(
         return 0;
 
  spurious:
-    DPRINTK(XENLOG_WARNING "Spurious fault in domain %u:%u "
+    dprintk(XENLOG_WARNING, "Spurious fault in domain %u:%u "
             "at addr %lx, e/c %04x\n",
             current->domain->domain_id, current->vcpu_id,
             addr, regs->error_code);
 #if CONFIG_PAGING_LEVELS >= 4
-    DPRINTK(XENLOG_WARNING " l4e = %"PRIpte"\n", l4e_get_intpte(l4e));
+    dprintk(XENLOG_WARNING, " l4e = %"PRIpte"\n", l4e_get_intpte(l4e));
 #endif
 #if CONFIG_PAGING_LEVELS >= 3
-    DPRINTK(XENLOG_WARNING " l3e = %"PRIpte"\n", l3e_get_intpte(l3e));
-#endif
-    DPRINTK(XENLOG_WARNING " l2e = %"PRIpte"\n", l2e_get_intpte(l2e));
-    DPRINTK(XENLOG_WARNING " l1e = %"PRIpte"\n", l1e_get_intpte(l1e));
+    dprintk(XENLOG_WARNING, " l3e = %"PRIpte"\n", l3e_get_intpte(l3e));
+#endif
+    dprintk(XENLOG_WARNING, " l2e = %"PRIpte"\n", l2e_get_intpte(l2e));
+    dprintk(XENLOG_WARNING, " l1e = %"PRIpte"\n", l1e_get_intpte(l1e));
 #ifndef NDEBUG
     show_registers(regs);
 #endif
@@ -1317,7 +1317,7 @@ static int emulate_privileged_op(struct 
         case 0: /* Write CR0 */
             if ( (*reg ^ read_cr0()) & ~X86_CR0_TS )
             {
-                DPRINTK(XENLOG_G_WARNING
+                gdprintk(XENLOG_WARNING,
                         "Attempt to change unmodifiable CR0 flags.\n");
                 goto fail;
             }
@@ -1338,7 +1338,7 @@ static int emulate_privileged_op(struct 
         case 4:
             if ( *reg != (read_cr4() & ~(X86_CR4_PGE|X86_CR4_PSE)) )
             {
-                DPRINTK(XENLOG_G_WARNING "Attempt to change CR4 flags.\n");
+                gdprintk(XENLOG_WARNING, "Attempt to change CR4 flags.\n");
                 goto fail;
             }
             break;
@@ -1386,7 +1386,7 @@ static int emulate_privileged_op(struct 
 
             if ( (rdmsr_safe(regs->ecx, l, h) != 0) ||
                  (regs->eax != l) || (regs->edx != h) )
-                DPRINTK(XENLOG_G_WARNING "Domain attempted WRMSR %p from "
+                gdprintk(XENLOG_WARNING, "Domain attempted WRMSR %p from "
                         "%08x:%08x to %08lx:%08lx.\n",
                         _p(regs->ecx), h, l, (long)regs->edx, (long)regs->eax);
             break;
@@ -1422,7 +1422,8 @@ static int emulate_privileged_op(struct 
                 break;
             }
             /* Everyone can read the MSR space. */
-            /*DPRINTK("Domain attempted RDMSR %p.\n", _p(regs->ecx));*/
+            /* gdprintk(XENLOG_WARNING,"Domain attempted RDMSR %p.\n",
+                        _p(regs->ecx));*/
             if ( rdmsr_safe(regs->ecx, regs->eax, regs->edx) )
                 goto fail;
             break;
@@ -1515,7 +1516,7 @@ asmlinkage int do_general_protection(str
 
     if ( likely((fixup = search_exception_table(regs->eip)) != 0) )
     {
-        DPRINTK(XENLOG_WARNING "GPF (%04x): %p -> %p\n",
+        dprintk(XENLOG_WARNING, "GPF (%04x): %p -> %p\n",
                 regs->error_code, _p(regs->eip), _p(fixup));
         regs->eip = fixup;
         return 0;
diff -r d60b709724f4 -r 36679b74e24a xen/arch/x86/x86_32/seg_fixup.c
--- a/xen/arch/x86/x86_32/seg_fixup.c   Fri Oct 27 19:15:48 2006 +0100
+++ b/xen/arch/x86/x86_32/seg_fixup.c   Fri Oct 27 23:47:30 2006 +0100
@@ -181,7 +181,7 @@ int fixup_seg(u16 seg, unsigned long off
         table = (unsigned long *)LDT_VIRT_START(d);
         if ( idx >= d->arch.guest_context.ldt_ents )
         {
-            DPRINTK(XENLOG_DEBUG "Segment %04x out of LDT range (%ld)\n",
+            dprintk(XENLOG_DEBUG, "Segment %04x out of LDT range (%ld)\n",
                     seg, d->arch.guest_context.ldt_ents);
             goto fail;
         }
@@ -191,7 +191,7 @@ int fixup_seg(u16 seg, unsigned long off
         table = (unsigned long *)GDT_VIRT_START(d);
         if ( idx >= d->arch.guest_context.gdt_ents )
         {
-            DPRINTK(XENLOG_DEBUG "Segment %04x out of GDT range (%ld)\n",
+            dprintk(XENLOG_DEBUG, "Segment %04x out of GDT range (%ld)\n",
                     seg, d->arch.guest_context.gdt_ents);
             goto fail;
         }
@@ -201,7 +201,7 @@ int fixup_seg(u16 seg, unsigned long off
     if ( __get_user(a, &table[2*idx+0]) ||
          __get_user(b, &table[2*idx+1]) )
     {
-        DPRINTK(XENLOG_DEBUG "Fault while reading segment %04x\n", seg);
+        dprintk(XENLOG_DEBUG, "Fault while reading segment %04x\n", seg);
         goto fail; /* Barking up the wrong tree. Decode needs a page fault.*/
     }
 
@@ -210,7 +210,7 @@ int fixup_seg(u16 seg, unsigned long off
                _SEGMENT_G|_SEGMENT_CODE|_SEGMENT_DPL)) != 
          (_SEGMENT_P|_SEGMENT_S|_SEGMENT_DB|_SEGMENT_G|_SEGMENT_DPL) )
     {
-        DPRINTK(XENLOG_DEBUG "Bad segment %08lx:%08lx\n", a, b);
+        dprintk(XENLOG_DEBUG, "Bad segment %08lx:%08lx\n", a, b);
         goto fail;
     }
 
@@ -240,7 +240,7 @@ int fixup_seg(u16 seg, unsigned long off
         }
     }
 
-    DPRINTK(XENLOG_DEBUG "None of the above! "
+    dprintk(XENLOG_DEBUG, "None of the above! "
             "(%08lx:%08lx, %08lx, %08lx, %08lx)\n",
             a, b, base, limit, base+limit);
 
@@ -279,13 +279,13 @@ int gpf_emulate_4gb(struct cpu_user_regs
     /* WARNING: We only work for ring-3 segments. */
     if ( unlikely(vm86_mode(regs)) || unlikely(!ring_3(regs)) )
     {
-        DPRINTK(XENLOG_DEBUG "Taken fault at bad CS %04x\n", regs->cs);
+        dprintk(XENLOG_DEBUG, "Taken fault at bad CS %04x\n", regs->cs);
         goto fail;
     }
 
     if ( !linearise_address((u16)regs->cs, regs->eip, (unsigned long *)&eip) )
     {
-        DPRINTK(XENLOG_DEBUG "Cannot linearise %04x:%08x\n",
+        dprintk(XENLOG_DEBUG, "Cannot linearise %04x:%08x\n",
                 regs->cs, regs->eip);
         goto fail;
     }
@@ -295,7 +295,7 @@ int gpf_emulate_4gb(struct cpu_user_regs
     {
         if ( get_user(b, pb) )
         {
-            DPRINTK(XENLOG_DEBUG
+            dprintk(XENLOG_DEBUG,
                     "Fault while accessing byte %d of instruction\n",
                     pb-eip);
             goto page_fault;
@@ -303,7 +303,7 @@ int gpf_emulate_4gb(struct cpu_user_regs
 
         if ( (pb - eip) >= 15 )
         {
-            DPRINTK(XENLOG_DEBUG "Too many instruction prefixes for a "
+            dprintk(XENLOG_DEBUG, "Too many instruction prefixes for a "
                     "legal instruction\n");
             goto fail;
         }
@@ -316,7 +316,7 @@ int gpf_emulate_4gb(struct cpu_user_regs
         case 0x26: /* ES override */
         case 0x64: /* FS override */
         case 0x36: /* SS override */
-            DPRINTK(XENLOG_DEBUG "Unhandled prefix %02x\n", b);
+            dprintk(XENLOG_DEBUG, "Unhandled prefix %02x\n", b);
             goto fail;
         case 0x66: /* Operand-size override */
         case 0xf0: /* LOCK */
@@ -334,7 +334,7 @@ int gpf_emulate_4gb(struct cpu_user_regs
 
     if ( !gs_override )
     {
-        DPRINTK(XENLOG_DEBUG "Only instructions with GS override\n");
+        dprintk(XENLOG_DEBUG, "Only instructions with GS override\n");
         goto fail;
     }
 
@@ -342,7 +342,7 @@ int gpf_emulate_4gb(struct cpu_user_regs
     pb++;
     if ( decode == 0 )
     {
-        DPRINTK(XENLOG_DEBUG "Unsupported opcode %02x\n", b);
+        dprintk(XENLOG_DEBUG, "Unsupported opcode %02x\n", b);
         goto fail;
     }
     
@@ -354,7 +354,7 @@ int gpf_emulate_4gb(struct cpu_user_regs
 
         if ( get_user(offset, (u32 *)pb) )
         {
-            DPRINTK(XENLOG_DEBUG "Fault while extracting <disp32>.\n");
+            dprintk(XENLOG_DEBUG, "Fault while extracting <disp32>.\n");
             goto page_fault;
         }
         pb += 4;
@@ -368,7 +368,7 @@ int gpf_emulate_4gb(struct cpu_user_regs
 
     if ( get_user(modrm, pb) )
     {
-        DPRINTK(XENLOG_DEBUG "Fault while extracting modrm byte\n");
+        dprintk(XENLOG_DEBUG, "Fault while extracting modrm byte\n");
         goto page_fault;
     }
 
@@ -380,7 +380,7 @@ int gpf_emulate_4gb(struct cpu_user_regs
 
     if ( rm == 4 )
     {
-        DPRINTK(XENLOG_DEBUG "FIXME: Add decoding for the SIB byte.\n");
+        dprintk(XENLOG_DEBUG, "FIXME: Add decoding for the SIB byte.\n");
         goto fixme;
     }
 
@@ -398,7 +398,7 @@ int gpf_emulate_4gb(struct cpu_user_regs
             memreg = NULL;
             if ( get_user(disp32, (u32 *)pb) )
             {
-                DPRINTK(XENLOG_DEBUG "Fault while extracting <disp8>.\n");
+                dprintk(XENLOG_DEBUG, "Fault while extracting <disp8>.\n");
                 goto page_fault;
             }
             pb += 4;
@@ -408,7 +408,7 @@ int gpf_emulate_4gb(struct cpu_user_regs
     case 1:
         if ( get_user(disp8, pb) )
         {
-            DPRINTK(XENLOG_DEBUG "Fault while extracting <disp8>.\n");
+            dprintk(XENLOG_DEBUG, "Fault while extracting <disp8>.\n");
             goto page_fault;
         }
         pb++;
@@ -418,14 +418,14 @@ int gpf_emulate_4gb(struct cpu_user_regs
     case 2:
         if ( get_user(disp32, (u32 *)pb) )
         {
-            DPRINTK(XENLOG_DEBUG "Fault while extracting <disp8>.\n");
+            dprintk(XENLOG_DEBUG, "Fault while extracting <disp8>.\n");
             goto page_fault;
         }
         pb += 4;
         break;
 
     case 3:
-        DPRINTK(XENLOG_DEBUG "Not a memory operand!\n");
+        dprintk(XENLOG_DEBUG, "Not a memory operand!\n");
         goto fail;
     }
 
@@ -456,7 +456,7 @@ int gpf_emulate_4gb(struct cpu_user_regs
     return EXCRET_fault_fixed;
 
  fixme:
-    DPRINTK(XENLOG_DEBUG "Undecodable instruction "
+    dprintk(XENLOG_DEBUG, "Undecodable instruction "
             "%02x:%02x:%02x:%02x:%02x:%02x:%02x:%02x "
             "caused GPF(0) at %04x:%08x\n",
             eip[0], eip[1], eip[2], eip[3],
diff -r d60b709724f4 -r 36679b74e24a xen/arch/x86/x86_64/traps.c
--- a/xen/arch/x86/x86_64/traps.c       Fri Oct 27 19:15:48 2006 +0100
+++ b/xen/arch/x86/x86_64/traps.c       Fri Oct 27 23:47:30 2006 +0100
@@ -206,7 +206,7 @@ unsigned long do_iret(void)
     if ( unlikely(copy_from_user(&iret_saved, (void *)regs->rsp,
                                  sizeof(iret_saved))) )
     {
-        DPRINTK(XENLOG_G_ERR "Fault while reading IRET context from "
+        gdprintk(XENLOG_ERR, "Fault while reading IRET context from "
                 "guest stack\n");
         domain_crash_synchronous();
     }
@@ -216,7 +216,7 @@ unsigned long do_iret(void)
     {
         if ( unlikely(pagetable_is_null(v->arch.guest_table_user)) )
         {
-            DPRINTK(XENLOG_G_ERR "Guest switching to user mode with no "
+            gdprintk(XENLOG_ERR, "Guest switching to user mode with no "
                     "user page tables\n");
             domain_crash_synchronous();
         }
diff -r d60b709724f4 -r 36679b74e24a xen/arch/x86/x86_emulate.c
--- a/xen/arch/x86/x86_emulate.c        Fri Oct 27 19:15:48 2006 +0100
+++ b/xen/arch/x86/x86_emulate.c        Fri Oct 27 23:47:30 2006 +0100
@@ -10,14 +10,14 @@
 #include <stdio.h>
 #include <stdint.h>
 #include <public/xen.h>
-#define DPRINTF(_f, _a...) printf( _f , ## _a )
+#define dprintf(_f, _a...) printf( _f , ## _a )
 #else
 #include <xen/config.h>
 #include <xen/types.h>
 #include <xen/lib.h>
 #include <xen/mm.h>
 #include <asm/regs.h>
-#define DPRINTF DPRINTK
+#define dprintf(_f, _a...) gdprintk(XENLOG_WARNING, _f , ## _a )
 #endif
 #include <asm-x86/x86_emulate.h>
 
@@ -560,7 +560,7 @@ x86_emulate_memop(
 
         if ( modrm_mod == 3 )
         {
-            DPRINTF("Cannot parse ModRM.mod == 3.\n");
+            dprintf("Cannot parse ModRM.mod == 3.\n");
             goto cannot_emulate;
         }
 
@@ -970,7 +970,7 @@ x86_emulate_memop(
             _regs.edi, (_regs.eflags & EFLG_DF) ? -dst.bytes : dst.bytes);
         break;
     case 0xa6 ... 0xa7: /* cmps */
-        DPRINTF("Urk! I don't handle CMPS.\n");
+        dprintf("Urk! I don't handle CMPS.\n");
         goto cannot_emulate;
     case 0xaa ... 0xab: /* stos */
         dst.type  = OP_MEM;
@@ -990,7 +990,7 @@ x86_emulate_memop(
             _regs.esi, (_regs.eflags & EFLG_DF) ? -dst.bytes : dst.bytes);
         break;
     case 0xae ... 0xaf: /* scas */
-        DPRINTF("Urk! I don't handle SCAS.\n");
+        dprintf("Urk! I don't handle SCAS.\n");
         goto cannot_emulate;
     }
     goto writeback;
@@ -1149,7 +1149,7 @@ x86_emulate_memop(
     goto writeback;
 
  cannot_emulate:
-    DPRINTF("Cannot emulate %02x\n", b);
+    dprintf("Cannot emulate %02x\n", b);
     return -1;
 }
 
diff -r d60b709724f4 -r 36679b74e24a xen/common/domain.c
--- a/xen/common/domain.c       Fri Oct 27 19:15:48 2006 +0100
+++ b/xen/common/domain.c       Fri Oct 27 23:47:30 2006 +0100
@@ -35,6 +35,11 @@ struct domain *dom0;
 
 struct vcpu *idle_vcpu[NR_CPUS] __read_mostly;
 
+int current_domain_id(void)
+{
+    return current->domain->domain_id;
+}
+
 struct domain *alloc_domain(domid_t domid)
 {
     struct domain *d;
@@ -54,7 +59,6 @@ struct domain *alloc_domain(domid_t domi
     return d;
 }
 
-
 void free_domain(struct domain *d)
 {
     struct vcpu *v;
@@ -68,7 +72,6 @@ void free_domain(struct domain *d)
 
     xfree(d);
 }
-
 
 struct vcpu *alloc_vcpu(
     struct domain *d, unsigned int vcpu_id, unsigned int cpu_id)
diff -r d60b709724f4 -r 36679b74e24a xen/common/event_channel.c
--- a/xen/common/event_channel.c        Fri Oct 27 19:15:48 2006 +0100
+++ b/xen/common/event_channel.c        Fri Oct 27 23:47:30 2006 +0100
@@ -40,7 +40,7 @@
 
 #define ERROR_EXIT(_errno)                                          \
     do {                                                            \
-        DPRINTK(XENLOG_G_WARNING                                    \
+        gdprintk(XENLOG_WARNING,                                    \
                 "EVTCHNOP failure: domain %d, error %d, line %d\n", \
                 current->domain->domain_id, (_errno), __LINE__);    \
         rc = (_errno);                                              \
diff -r d60b709724f4 -r 36679b74e24a xen/common/grant_table.c
--- a/xen/common/grant_table.c  Fri Oct 27 19:15:48 2006 +0100
+++ b/xen/common/grant_table.c  Fri Oct 27 23:47:30 2006 +0100
@@ -47,7 +47,7 @@ union grant_combo {
 
 #define PIN_FAIL(_lbl, _rc, _f, _a...)          \
     do {                                        \
-        DPRINTK( XENLOG_G_WARNING _f, ## _a );  \
+        gdprintk(XENLOG_WARNING, _f, ## _a );   \
         rc = (_rc);                             \
         goto _lbl;                              \
     } while ( 0 )
@@ -109,7 +109,7 @@ __gnttab_map_grant_ref(
     if ( unlikely(op->ref >= NR_GRANT_ENTRIES) ||
          unlikely((op->flags & (GNTMAP_device_map|GNTMAP_host_map)) == 0) )
     {
-        DPRINTK(XENLOG_G_INFO "Bad ref (%d) or flags (%x).\n",
+        gdprintk(XENLOG_INFO, "Bad ref (%d) or flags (%x).\n",
                 op->ref, op->flags);
         op->status = GNTST_bad_gntref;
         return;
@@ -125,7 +125,7 @@ __gnttab_map_grant_ref(
     {
         if ( rd != NULL )
             put_domain(rd);
-        DPRINTK(XENLOG_G_INFO "Could not find domain %d\n", op->dom);
+        gdprintk(XENLOG_INFO, "Could not find domain %d\n", op->dom);
         op->status = GNTST_bad_domain;
         return;
     }
@@ -140,7 +140,7 @@ __gnttab_map_grant_ref(
         if ( (lgt->maptrack_limit << 1) > MAPTRACK_MAX_ENTRIES )
         {
             put_domain(rd);
-            DPRINTK(XENLOG_G_INFO "Maptrack table is at maximum size.\n");
+            gdprintk(XENLOG_INFO, "Maptrack table is at maximum size.\n");
             op->status = GNTST_no_device_space;
             return;
         }
@@ -150,7 +150,7 @@ __gnttab_map_grant_ref(
         if ( new_mt == NULL )
         {
             put_domain(rd);
-            DPRINTK(XENLOG_G_INFO "No more map handles available.\n");
+            gdprintk(XENLOG_INFO, "No more map handles available.\n");
             op->status = GNTST_no_device_space;
             return;
         }
@@ -167,7 +167,7 @@ __gnttab_map_grant_ref(
         lgt->maptrack_order   += 1;
         lgt->maptrack_limit  <<= 1;
 
-        DPRINTK(XENLOG_G_INFO "Doubled maptrack size\n");
+        gdprintk(XENLOG_INFO, "Doubled maptrack size\n");
         handle = get_maptrack_handle(ld->grant_table);
     }
 
@@ -354,7 +354,7 @@ __gnttab_unmap_grant_ref(
     if ( unlikely(op->handle >= ld->grant_table->maptrack_limit) ||
          unlikely(!map->flags) )
     {
-        DPRINTK(XENLOG_G_INFO "Bad handle (%d).\n", op->handle);
+        gdprintk(XENLOG_INFO, "Bad handle (%d).\n", op->handle);
         op->status = GNTST_bad_handle;
         return;
     }
@@ -367,7 +367,7 @@ __gnttab_unmap_grant_ref(
     {
         if ( rd != NULL )
             put_domain(rd);
-        DPRINTK(XENLOG_G_INFO "Could not find domain %d\n", dom);
+        gdprintk(XENLOG_INFO, "Could not find domain %d\n", dom);
         op->status = GNTST_bad_domain;
         return;
     }
@@ -487,13 +487,13 @@ gnttab_setup_table(
 
     if ( unlikely(copy_from_guest(&op, uop, 1) != 0) )
     {
-        DPRINTK(XENLOG_G_INFO "Fault while reading gnttab_setup_table_t.\n");
+        gdprintk(XENLOG_INFO, "Fault while reading gnttab_setup_table_t.\n");
         return -EFAULT;
     }
 
     if ( unlikely(op.nr_frames > NR_GRANT_FRAMES) )
     {
-        DPRINTK(XENLOG_G_INFO "Xen only supports up to %d grant-table frames"
+        gdprintk(XENLOG_INFO, "Xen only supports up to %d grant-table frames"
                 " per domain.\n",
                 NR_GRANT_FRAMES);
         op.status = GNTST_general_error;
@@ -513,7 +513,7 @@ gnttab_setup_table(
 
     if ( unlikely((d = find_domain_by_id(dom)) == NULL) )
     {
-        DPRINTK(XENLOG_G_INFO "Bad domid %d.\n", dom);
+        gdprintk(XENLOG_INFO, "Bad domid %d.\n", dom);
         op.status = GNTST_bad_domain;
         goto out;
     }
@@ -551,7 +551,7 @@ gnttab_prepare_for_transfer(
     if ( unlikely((rgt = rd->grant_table) == NULL) ||
          unlikely(ref >= NR_GRANT_ENTRIES) )
     {
-        DPRINTK(XENLOG_G_INFO "Dom %d has no g.t., or ref is bad (%d).\n",
+        gdprintk(XENLOG_INFO, "Dom %d has no g.t., or ref is bad (%d).\n",
                 rd->domain_id, ref);
         return 0;
     }
@@ -567,7 +567,7 @@ gnttab_prepare_for_transfer(
         if ( unlikely(scombo.shorts.flags != GTF_accept_transfer) ||
              unlikely(scombo.shorts.domid != ld->domain_id) )
         {
-            DPRINTK(XENLOG_G_INFO "Bad flags (%x) or dom (%d). "
+            gdprintk(XENLOG_INFO, "Bad flags (%x) or dom (%d). "
                     "(NB. expected dom %d)\n",
                     scombo.shorts.flags, scombo.shorts.domid,
                     ld->domain_id);
@@ -584,7 +584,7 @@ gnttab_prepare_for_transfer(
 
         if ( retries++ == 4 )
         {
-            DPRINTK(XENLOG_G_WARNING "Shared grant entry is unstable.\n");
+            gdprintk(XENLOG_WARNING, "Shared grant entry is unstable.\n");
             goto fail;
         }
 
@@ -616,7 +616,7 @@ gnttab_transfer(
         /* Read from caller address space. */
         if ( unlikely(__copy_from_guest_offset(&gop, uop, i, 1)) )
         {
-            DPRINTK(XENLOG_G_INFO "gnttab_transfer: error reading req %d/%d\n",
+            gdprintk(XENLOG_INFO, "gnttab_transfer: error reading req %d/%d\n",
                     i, count);
             return -EFAULT;
         }
@@ -626,7 +626,7 @@ gnttab_transfer(
         /* Check the passed page frame for basic validity. */
         if ( unlikely(!mfn_valid(mfn)) )
         { 
-            DPRINTK(XENLOG_G_INFO "gnttab_transfer: out-of-range %lx\n",
+            gdprintk(XENLOG_INFO, "gnttab_transfer: out-of-range %lx\n",
                     (unsigned long)gop.mfn);
             gop.status = GNTST_bad_page;
             goto copyback;
@@ -635,7 +635,7 @@ gnttab_transfer(
         page = mfn_to_page(mfn);
         if ( unlikely(IS_XEN_HEAP_FRAME(page)) )
         { 
-            DPRINTK(XENLOG_G_INFO "gnttab_transfer: xen frame %lx\n",
+            gdprintk(XENLOG_INFO, "gnttab_transfer: xen frame %lx\n",
                     (unsigned long)gop.mfn);
             gop.status = GNTST_bad_page;
             goto copyback;
@@ -650,7 +650,7 @@ gnttab_transfer(
         /* Find the target domain. */
         if ( unlikely((e = find_domain_by_id(gop.domid)) == NULL) )
         {
-            DPRINTK(XENLOG_G_INFO "gnttab_transfer: can't find domain %d\n",
+            gdprintk(XENLOG_INFO, "gnttab_transfer: can't find domain %d\n",
                     gop.domid);
             page->count_info &= ~(PGC_count_mask|PGC_allocated);
             free_domheap_page(page);
@@ -670,7 +670,7 @@ gnttab_transfer(
              unlikely(!gnttab_prepare_for_transfer(e, d, gop.ref)) )
         {
             if ( !test_bit(_DOMF_dying, &e->domain_flags) )
-                DPRINTK(XENLOG_G_INFO "gnttab_transfer: "
+                gdprintk(XENLOG_INFO, "gnttab_transfer: "
                         "Transferee has no reservation "
                         "headroom (%d,%d) or provided a bad grant ref (%08x) "
                         "or is dying (%lx)\n",
@@ -707,7 +707,7 @@ gnttab_transfer(
     copyback:
         if ( unlikely(__copy_to_guest_offset(uop, i, &gop, 1)) )
         {
-            DPRINTK(XENLOG_G_INFO "gnttab_transfer: error writing resp 
%d/%d\n",
+            gdprintk(XENLOG_INFO, "gnttab_transfer: error writing resp 
%d/%d\n",
                     i, count);
             return -EFAULT;
         }
@@ -1097,7 +1097,7 @@ gnttab_release_mappings(
 
         ref = map->ref;
 
-        DPRINTK(XENLOG_G_INFO "Grant release (%hu) ref:(%hu) "
+        gdprintk(XENLOG_INFO, "Grant release (%hu) ref:(%hu) "
                 "flags:(%x) dom:(%hu)\n",
                 handle, ref, map->flags, map->domid);
 
diff -r d60b709724f4 -r 36679b74e24a xen/common/memory.c
--- a/xen/common/memory.c       Fri Oct 27 19:15:48 2006 +0100
+++ b/xen/common/memory.c       Fri Oct 27 23:47:30 2006 +0100
@@ -63,7 +63,7 @@ increase_reservation(
         if ( unlikely((page = __alloc_domheap_pages( d, cpu, 
             extent_order, memflags )) == NULL) ) 
         {
-            DPRINTK(XENLOG_G_INFO "Could not allocate order=%d extent: "
+            gdprintk(XENLOG_INFO, "Could not allocate order=%d extent: "
                     "id=%d memflags=%x (%ld of %d)\n",
                     extent_order, d->domain_id, memflags, i, nr_extents);
             return i;
@@ -118,7 +118,7 @@ populate_physmap(
         if ( unlikely((page = __alloc_domheap_pages( d, cpu, 
             extent_order, memflags )) == NULL) ) 
         {
-            DPRINTK(XENLOG_G_INFO "Could not allocate order=%d extent: "
+            gdprintk(XENLOG_INFO, "Could not allocate order=%d extent: "
                     "id=%d memflags=%x (%ld of %d)\n",
                     extent_order, d->domain_id, memflags, i, nr_extents);
             goto out;
@@ -157,7 +157,7 @@ guest_remove_page(
     mfn = gmfn_to_mfn(d, gmfn);
     if ( unlikely(!mfn_valid(mfn)) )
     {
-        DPRINTK(XENLOG_G_INFO "Domain %u page number %lx invalid\n",
+        gdprintk(XENLOG_INFO, "Domain %u page number %lx invalid\n",
                 d->domain_id, gmfn);
         return 0;
     }
@@ -165,7 +165,7 @@ guest_remove_page(
     page = mfn_to_page(mfn);
     if ( unlikely(!get_page(page, d)) )
     {
-        DPRINTK(XENLOG_G_INFO "Bad page free for domain %u\n", d->domain_id);
+        gdprintk(XENLOG_INFO, "Bad page free for domain %u\n", d->domain_id);
         return 0;
     }
 
@@ -178,7 +178,7 @@ guest_remove_page(
     if ( unlikely(!page_is_removable(page)) )
     {
         /* We'll make this a guest-visible error in future, so take heed! */
-        DPRINTK(XENLOG_G_INFO "Dom%d freeing in-use page %lx (pseudophys %lx):"
+        gdprintk(XENLOG_INFO, "Dom%d freeing in-use page %lx (pseudophys %lx):"
                 " count=%lx type=%lx\n",
                 d->domain_id, mfn, get_gpfn_from_mfn(mfn),
                 (unsigned long)page->count_info, page->u.inuse.type_info);
diff -r d60b709724f4 -r 36679b74e24a xen/common/multicall.c
--- a/xen/common/multicall.c    Fri Oct 27 19:15:48 2006 +0100
+++ b/xen/common/multicall.c    Fri Oct 27 23:47:30 2006 +0100
@@ -24,7 +24,7 @@ do_multicall(
 
     if ( unlikely(__test_and_set_bit(_MCSF_in_multicall, &mcs->flags)) )
     {
-        DPRINTK(XENLOG_G_INFO "Multicall reentry is disallowed.\n");
+        gdprintk(XENLOG_INFO, "Multicall reentry is disallowed.\n");
         return -EINVAL;
     }
 
diff -r d60b709724f4 -r 36679b74e24a xen/common/page_alloc.c
--- a/xen/common/page_alloc.c   Fri Oct 27 19:15:48 2006 +0100
+++ b/xen/common/page_alloc.c   Fri Oct 27 23:47:30 2006 +0100
@@ -599,7 +599,7 @@ int assign_pages(
 
     if ( unlikely(test_bit(_DOMF_dying, &d->domain_flags)) )
     {
-        DPRINTK(XENLOG_G_INFO "Cannot assign page to domain%d -- dying.\n",
+        gdprintk(XENLOG_INFO, "Cannot assign page to domain%d -- dying.\n",
                 d->domain_id);
         goto fail;
     }
@@ -608,7 +608,7 @@ int assign_pages(
     {
         if ( unlikely((d->tot_pages + (1 << order)) > d->max_pages) )
         {
-            DPRINTK(XENLOG_G_INFO "Over-allocation for domain %u: %u > %u\n",
+            gdprintk(XENLOG_INFO, "Over-allocation for domain %u: %u > %u\n",
                     d->domain_id, d->tot_pages + (1 << order), d->max_pages);
             goto fail;
         }
diff -r d60b709724f4 -r 36679b74e24a xen/common/schedule.c
--- a/xen/common/schedule.c     Fri Oct 27 19:15:48 2006 +0100
+++ b/xen/common/schedule.c     Fri Oct 27 23:47:30 2006 +0100
@@ -468,7 +468,7 @@ long do_set_timer_op(s_time_t timeout)
          * timeout in this case can burn a lot of CPU. We therefore go for a
          * reasonable middleground of triggering a timer event in 100ms.
          */
-        DPRINTK(XENLOG_G_INFO "Warning: huge timeout set by domain %d (vcpu 
%d):"
+        gdprintk(XENLOG_INFO, "Warning: huge timeout set by domain %d (vcpu 
%d):"
                 " %"PRIx64"\n",
                 v->domain->domain_id, v->vcpu_id, (uint64_t)timeout);
         set_timer(&v->timer, NOW() + MILLISECS(100));
diff -r d60b709724f4 -r 36679b74e24a xen/common/trace.c
--- a/xen/common/trace.c        Fri Oct 27 19:15:48 2006 +0100
+++ b/xen/common/trace.c        Fri Oct 27 23:47:30 2006 +0100
@@ -131,7 +131,7 @@ static int tb_set_size(int size)
      */
     if ( (opt_tbuf_size != 0) || (size <= 0) )
     {
-        DPRINTK(XENLOG_G_INFO "tb_set_size from %d to %d not implemented\n",
+        gdprintk(XENLOG_INFO, "tb_set_size from %d to %d not implemented\n",
                 opt_tbuf_size, size);
         return -EINVAL;
     }
diff -r d60b709724f4 -r 36679b74e24a xen/drivers/char/console.c
--- a/xen/drivers/char/console.c        Fri Oct 27 19:15:48 2006 +0100
+++ b/xen/drivers/char/console.c        Fri Oct 27 23:47:30 2006 +0100
@@ -57,6 +57,30 @@ static int sercon_handle = -1;
 static int sercon_handle = -1;
 
 static DEFINE_SPINLOCK(console_lock);
+
+/*
+ * To control the amount of printing, thresholds are added.
+ * These thresholds correspond to the XENLOG logging levels.
+ * There's an upper and lower threshold for non-guest messages and for
+ * guest-provoked messages.  This works as follows, for a given log level L:
+ *
+ * L < lower_threshold                     : always logged
+ * lower_threshold <= L < upper_threshold  : rate-limited logging
+ * upper_threshold <= L                    : never logged
+ *
+ * Note, in the above algorithm, to disable rate limiting simply make
+ * the lower threshold equal to the upper.
+ */
+#define XENLOG_UPPER_THRESHOLD       2 /* Do not print INFO and DEBUG  */
+#define XENLOG_LOWER_THRESHOLD       2 /* Always print ERR and WARNING */
+#define XENLOG_GUEST_UPPER_THRESHOLD 2 /* Do not print INFO and DEBUG  */
+#define XENLOG_GUEST_LOWER_THRESHOLD 0 /* Rate-limit ERR and WARNING   */
+/*
+ * The XENLOG_DEFAULT is the default given to printks that
+ * do not have any print level associated with them.
+ */
+#define XENLOG_DEFAULT       1 /* XENLOG_WARNING */
+#define XENLOG_GUEST_DEFAULT 1 /* XENLOG_WARNING */
 
 int xenlog_upper_thresh = XENLOG_UPPER_THRESHOLD;
 int xenlog_lower_thresh = XENLOG_LOWER_THRESHOLD;
@@ -346,7 +370,7 @@ void printk(const char *fmt, ...)
 
     if ( !print_regardless )
     {
-        if ( level > upper_thresh )
+        if ( level >= upper_thresh )
             goto out;
         if ( (level >= lower_thresh) && (!printk_ratelimit()) )
             goto out;
diff -r d60b709724f4 -r 36679b74e24a xen/include/asm-ia64/mm.h
--- a/xen/include/asm-ia64/mm.h Fri Oct 27 19:15:48 2006 +0100
+++ b/xen/include/asm-ia64/mm.h Fri Oct 27 23:47:30 2006 +0100
@@ -175,7 +175,7 @@ static inline int get_page(struct page_i
            unlikely((nx & PGC_count_mask) == 0) ||     /* Count overflow? */
            unlikely((x >> 32) != _domain)) {           /* Wrong owner? */
 
-           DPRINTK(XENLOG_G_INFO "Error pfn %lx: rd=%p, od=%p, caf=%016lx, 
taf=%"
+           gdprintk(XENLOG_INFO, "Error pfn %lx: rd=%p, od=%p, caf=%016lx, 
taf=%"
                PRtype_info "\n", page_to_mfn(page), domain,
                unpickle_domptr(x >> 32), x, page->u.inuse.type_info);
            return 0;
diff -r d60b709724f4 -r 36679b74e24a xen/include/asm-x86/mm.h
--- a/xen/include/asm-x86/mm.h  Fri Oct 27 19:15:48 2006 +0100
+++ b/xen/include/asm-x86/mm.h  Fri Oct 27 23:47:30 2006 +0100
@@ -213,7 +213,7 @@ static inline int get_page(struct page_i
              unlikely(d != _domain) )                /* Wrong owner? */
         {
             if ( !_shadow_mode_refcounts(domain) )
-                DPRINTK(XENLOG_G_INFO
+                gdprintk(XENLOG_INFO,
                         "Error pfn %lx: rd=%p, od=%p, caf=%08x, taf=%"
                         PRtype_info "\n",
                         page_to_mfn(page), domain, unpickle_domptr(d),
diff -r d60b709724f4 -r 36679b74e24a xen/include/xen/config.h
--- a/xen/include/xen/config.h  Fri Oct 27 19:15:48 2006 +0100
+++ b/xen/include/xen/config.h  Fri Oct 27 23:47:30 2006 +0100
@@ -29,7 +29,7 @@
  * it to allow for DoS by causing the HV to print out a lot of
  * info, so where ever the guest has control of what is printed
  * we use the XENLOG_GUEST to distinguish that the output is
- * controled by the Guest.
+ * controlled by the guest.
  *
  * To make it easier on the typing, the above log levels all
  * have a corresponding _G_ equivalent that appends the
@@ -51,65 +51,8 @@
 #define XENLOG_MAX 3
 
 /*
- * To control the amount of printing, thresholds are added.
- * These thresholds correspond to the above log levels.
- * There's an upper and lower threshold for non-guests
- * and Guest.  This works as follows:
- *
- * If printk log level > upper threshold
- *   don't print anything
- *
- * If printk log level >= lower threshold
- *   rate limit the print (keep the amount down)
- *
- * Otherwise, just print.
- *
- * Note, in the above algorithm, to never rate limit
- * simply make the lower threshold greater than the upper.
- * This way the output will never be rate limited.
- *
- * For example:
- *   lower = 2; upper = 1;
- *  This will always print ERR and WARNING messages
- *  but will not print anything else.  Nothing is
- *  rate limited.
- */
-/*
- * Defaults:
- *   For the HV, always print ERR and WARNING
- *   but nothing for INFO and DEBUG.
- *
- *   For Guests, always rate limit ERR and WARNING
- *   but never print for INFO and DEBUG.
- */
-#ifndef XENLOG_UPPER_THRESHOLD
-#define XENLOG_UPPER_THRESHOLD 1
-#endif
-#ifndef XENLOG_LOWER_THRESHOLD
-#define XENLOG_LOWER_THRESHOLD 2
-#endif
-#ifndef XENLOG_GUEST_UPPER_THRESHOLD
-#define XENLOG_GUEST_UPPER_THRESHOLD 1
-#endif
-#ifndef XENLOG_GUEST_LOWER_THRESHOLD
-#define XENLOG_GUEST_LOWER_THRESHOLD 0
-#endif
-
-/*
- * The XENLOG_DEFAULT is the default given to printks that
- * do not have any print level associated to it.
- */
-#ifndef XENLOG_DEFAULT
-#define XENLOG_DEFAULT 1 /* Warning */
-#endif
-#ifndef XENLOG_GUEST_DEFAULT
-#define XENLOG_GUEST_DEFAULT 1 /* Warning */
-#endif
-
-/*
  * Some code is copied directly from Linux.
  * Match some of the Linux log levels to Xen.
- *  (Should these be Guest logs?? - SDR)
  */
 #define KERN_ERR       XENLOG_ERR
 #define KERN_CRIT      XENLOG_ERR
@@ -123,12 +66,18 @@
 #define __iomem
 #define __user
 
-#define DPRINTK(_f, _a...) printk("(file=%s, line=%d) " _f, \
-                           __FILE__ , __LINE__ , ## _a )
+#ifndef __ASSEMBLY__
 
-#ifndef __ASSEMBLY__
+int current_domain_id(void);
+#define dprintk(_l, _f, _a...)                              \
+    printk(_l "%s:%d: " _f, __FILE__ , __LINE__ , ## _a )
+#define gdprintk(_l, _f, _a...)                             \
+    printk(XENLOG_GUEST _l "%s:%d:d%d " _f, __FILE__,       \
+           __LINE__, current_domain_id() , ## _a )
+
 #include <xen/compiler.h>
-#endif
+
+#endif /* !__ASSEMBLY__ */
 
 #define __STR(...) #__VA_ARGS__
 #define STR(...) __STR(__VA_ARGS__)

_______________________________________________
Xen-changelog mailing list
Xen-changelog@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-changelog

<Prev in Thread] Current Thread [Next in Thread>
  • [Xen-changelog] [xen-unstable] [XEN] Some cleanups to the log-level stuff. Largely this, Xen patchbot-unstable <=