ia64/xen-unstable

changeset 12035:dc973fe56333

[XEN] Logging parameters for ia64 code.
Signed-off-by: Steven Rostedt <srostedt@redhat.com>
author kaf24@localhost.localdomain
date Fri Oct 27 18:57:02 2006 +0100 (2006-10-27)
parents b07487d91f93
children bbcac2aea0e8
files xen/arch/ia64/vmx/vlsapic.c xen/arch/ia64/vmx/vmx_hypercall.c xen/arch/ia64/vmx/vmx_init.c xen/arch/ia64/xen/dom0_ops.c xen/arch/ia64/xen/domain.c xen/arch/ia64/xen/irq.c xen/arch/ia64/xen/mm.c xen/arch/ia64/xen/vcpu.c xen/include/asm-ia64/mm.h
line diff
     1.1 --- a/xen/arch/ia64/vmx/vlsapic.c	Fri Oct 27 18:56:44 2006 +0100
     1.2 +++ b/xen/arch/ia64/vmx/vlsapic.c	Fri Oct 27 18:57:02 2006 +0100
     1.3 @@ -410,7 +410,7 @@ void vlsapic_reset(VCPU *vcpu)
     1.4      vcpu->arch.arch_vmx.vlapic.vcpu = vcpu;
     1.5      hvm_vioapic_add_lapic(&vcpu->arch.arch_vmx.vlapic, vcpu);
     1.6  #endif
     1.7 -    DPRINTK("VLSAPIC inservice base=%p\n", &VLSAPIC_INSVC(vcpu,0) );
     1.8 +    DPRINTK(XENLOG_INFO "VLSAPIC inservice base=%p\n", &VLSAPIC_INSVC(vcpu,0) );
     1.9  }
    1.10  
    1.11  /*
    1.12 @@ -539,7 +539,7 @@ int vmx_vcpu_pend_interrupt(VCPU *vcpu, 
    1.13      int ret;
    1.14  
    1.15      if (vector & ~0xff) {
    1.16 -        DPRINTK("vmx_vcpu_pend_interrupt: bad vector\n");
    1.17 +        DPRINTK(XENLOG_G_INFO "vmx_vcpu_pend_interrupt: bad vector\n");
    1.18          return -1;
    1.19      }
    1.20      local_irq_save(spsr);
     2.1 --- a/xen/arch/ia64/vmx/vmx_hypercall.c	Fri Oct 27 18:56:44 2006 +0100
     2.2 +++ b/xen/arch/ia64/vmx/vmx_hypercall.c	Fri Oct 27 18:57:02 2006 +0100
     2.3 @@ -79,7 +79,7 @@ do_hvm_op(unsigned long op, XEN_GUEST_HA
     2.4      }
     2.5  
     2.6      default:
     2.7 -        DPRINTK("Bad HVM op %ld.\n", op);
     2.8 +        DPRINTK(XENLOG_G_INFO "Bad HVM op %ld.\n", op);
     2.9          rc = -ENOSYS;
    2.10      }
    2.11      return rc;
     3.1 --- a/xen/arch/ia64/vmx/vmx_init.c	Fri Oct 27 18:56:44 2006 +0100
     3.2 +++ b/xen/arch/ia64/vmx/vmx_init.c	Fri Oct 27 18:57:02 2006 +0100
     3.3 @@ -277,7 +277,7 @@ static void vmx_create_event_channels(st
     3.4  			p = get_vio(v->domain, o->vcpu_id);
     3.5  			o->arch.arch_vmx.xen_port = p->vp_eport =
     3.6  			                alloc_unbound_xen_event_channel(o, 0);
     3.7 -			DPRINTK("Allocated port %d for hvm.\n",
     3.8 +			DPRINTK(XENLOG_G_INFO "Allocated port %d for hvm.\n",
     3.9  			        o->arch.arch_vmx.xen_port);
    3.10  		}
    3.11  	}
     4.1 --- a/xen/arch/ia64/xen/dom0_ops.c	Fri Oct 27 18:56:44 2006 +0100
     4.2 +++ b/xen/arch/ia64/xen/dom0_ops.c	Fri Oct 27 18:57:02 2006 +0100
     4.3 @@ -320,7 +320,8 @@ do_dom0vp_op(unsigned long cmd,
     4.4      case IA64_DOM0VP_phystomach:
     4.5          ret = ____lookup_domain_mpa(d, arg0 << PAGE_SHIFT);
     4.6          if (ret == INVALID_MFN) {
     4.7 -            DPRINTK("%s:%d INVALID_MFN ret: 0x%lx\n", __func__, __LINE__, ret);
     4.8 +            DPRINTK(XENLOG_INFO "%s: INVALID_MFN ret: 0x%lx\n",
     4.9 +                     __func__, ret);
    4.10          } else {
    4.11              ret = (ret & _PFN_MASK) >> PAGE_SHIFT;//XXX pte_pfn()
    4.12          }
     5.1 --- a/xen/arch/ia64/xen/domain.c	Fri Oct 27 18:56:44 2006 +0100
     5.2 +++ b/xen/arch/ia64/xen/domain.c	Fri Oct 27 18:57:02 2006 +0100
     5.3 @@ -682,7 +682,8 @@ int shadow_mode_control(struct domain *d
     5.4  	//struct vcpu *v;
     5.5  
     5.6  	if (unlikely(d == current->domain)) {
     5.7 -		DPRINTK("Don't try to do a shadow op on yourself!\n");
     5.8 +		DPRINTK(XENLOG_G_INFO
     5.9 +                        "Don't try to do a shadow op on yourself!\n");
    5.10  		return -EINVAL;
    5.11  	}   
    5.12  
     6.1 --- a/xen/arch/ia64/xen/irq.c	Fri Oct 27 18:56:44 2006 +0100
     6.2 +++ b/xen/arch/ia64/xen/irq.c	Fri Oct 27 18:57:02 2006 +0100
     6.3 @@ -377,7 +377,8 @@ int pirq_guest_bind(struct vcpu *v, int 
     6.4      {
     6.5          if ( desc->action != NULL )
     6.6          {
     6.7 -            DPRINTK("Cannot bind IRQ %d to guest. In use by '%s'.\n",
     6.8 +            DPRINTK(XENLOG_G_INFO
     6.9 +                    "Cannot bind IRQ %d to guest. In use by '%s'.\n",
    6.10                      irq, desc->action->name);
    6.11              rc = -EBUSY;
    6.12              goto out;
    6.13 @@ -386,7 +387,9 @@ int pirq_guest_bind(struct vcpu *v, int 
    6.14          action = xmalloc(irq_guest_action_t);
    6.15          if ( (desc->action = (struct irqaction *)action) == NULL )
    6.16          {
    6.17 -            DPRINTK("Cannot bind IRQ %d to guest. Out of memory.\n", irq);
    6.18 +            DPRINTK(XENLOG_G_INFO
    6.19 +                    "Cannot bind IRQ %d to guest. Out of memory.\n",
    6.20 +                    irq);
    6.21              rc = -ENOMEM;
    6.22              goto out;
    6.23          }
    6.24 @@ -410,7 +413,8 @@ int pirq_guest_bind(struct vcpu *v, int 
    6.25      }
    6.26      else if ( !will_share || !action->shareable )
    6.27      {
    6.28 -        DPRINTK("Cannot bind IRQ %d to guest. Will not share with others.\n",
    6.29 +        DPRINTK(XENLOG_G_INFO
    6.30 +                "Cannot bind IRQ %d to guest. Will not share with others.\n",
    6.31                  irq);
    6.32          rc = -EBUSY;
    6.33          goto out;
    6.34 @@ -418,7 +422,9 @@ int pirq_guest_bind(struct vcpu *v, int 
    6.35  
    6.36      if ( action->nr_guests == IRQ_MAX_GUESTS )
    6.37      {
    6.38 -        DPRINTK("Cannot bind IRQ %d to guest. Already at max share.\n", irq);
    6.39 +        DPRINTK(XENLOG_G_INFO
    6.40 +                "Cannot bind IRQ %d to guest. Already at max share.\n",
    6.41 +                irq);
    6.42          rc = -EBUSY;
    6.43          goto out;
    6.44      }
     7.1 --- a/xen/arch/ia64/xen/mm.c	Fri Oct 27 18:56:44 2006 +0100
     7.2 +++ b/xen/arch/ia64/xen/mm.c	Fri Oct 27 18:57:02 2006 +0100
     7.3 @@ -229,7 +229,8 @@ try_to_clear_PGC_allocate(struct domain*
     7.4          if (unlikely(!(x & PGC_allocated)) || unlikely(_nd != _d)) {
     7.5              struct domain* nd = unpickle_domptr(_nd);
     7.6              if (nd == NULL) {
     7.7 -                DPRINTK("gnttab_transfer: Bad page %p: ed=%p(%u) 0x%x, "
     7.8 +                DPRINTK(XENLOG_G_INFO "gnttab_transfer: "
     7.9 +                        "Bad page %p: ed=%p(%u) 0x%x, "
    7.10                          "sd=%p 0x%x,"
    7.11                          " caf=%016lx, taf=%" PRtype_info "\n",
    7.12                          (void *) page_to_mfn(page),
    7.13 @@ -978,8 +979,8 @@ efi_mmio(unsigned long physaddr, unsigne
    7.14  
    7.15          if (start <= physaddr && physaddr < end) {
    7.16              if ((physaddr + size) > end) {
    7.17 -                DPRINTK("%s:%d physaddr 0x%lx size = 0x%lx\n",
    7.18 -                        __func__, __LINE__, physaddr, size);
    7.19 +                DPRINTK(XENLOG_G_INFO "%s: physaddr 0x%lx size = 0x%lx\n",
    7.20 +                        __func__, physaddr, size);
    7.21                  return 0;
    7.22              }
    7.23  
    7.24 @@ -1013,13 +1014,13 @@ assign_domain_mmio_page(struct domain *d
    7.25                          unsigned long mpaddr, unsigned long size)
    7.26  {
    7.27      if (size == 0) {
    7.28 -        DPRINTK("%s: domain %p mpaddr 0x%lx size = 0x%lx\n",
    7.29 +        DPRINTK(XENLOG_G_INFO "%s: domain %p mpaddr 0x%lx size = 0x%lx\n",
    7.30                  __func__, d, mpaddr, size);
    7.31      }
    7.32      if (!efi_mmio(mpaddr, size)) {
    7.33  #ifndef NDEBUG
    7.34 -        DPRINTK("%s:%d domain %p mpaddr 0x%lx size = 0x%lx\n",
    7.35 -                __func__, __LINE__, d, mpaddr, size);
    7.36 +        DPRINTK(XENLOG_G_INFO "%s: domain %p mpaddr 0x%lx size = 0x%lx\n",
    7.37 +                __func__, d, mpaddr, size);
    7.38  #endif
    7.39          return -EINVAL;
    7.40      }
    7.41 @@ -1108,7 +1109,8 @@ assign_domain_page_cmpxchg_rel(struct do
    7.42      old_mfn = page_to_mfn(old_page);
    7.43      old_pte = pfn_pte(old_mfn, __pgprot(old_prot));
    7.44      if (!pte_present(old_pte)) {
    7.45 -        DPRINTK("%s: old_pte 0x%lx old_prot 0x%lx old_mfn 0x%lx\n",
    7.46 +        DPRINTK(XENLOG_G_INFO
    7.47 +                "%s: old_pte 0x%lx old_prot 0x%lx old_mfn 0x%lx\n",
    7.48                  __func__, pte_val(old_pte), old_prot, old_mfn);
    7.49          return -EINVAL;
    7.50      }
    7.51 @@ -1124,7 +1126,8 @@ assign_domain_page_cmpxchg_rel(struct do
    7.52              goto again;
    7.53          }
    7.54  
    7.55 -        DPRINTK("%s: old_pte 0x%lx old_prot 0x%lx old_mfn 0x%lx "
    7.56 +        DPRINTK(XENLOG_G_INFO
    7.57 +                "%s: old_pte 0x%lx old_prot 0x%lx old_mfn 0x%lx "
    7.58                  "ret_pte 0x%lx ret_mfn 0x%lx\n",
    7.59                  __func__,
    7.60                  pte_val(old_pte), old_prot, old_mfn,
    7.61 @@ -1184,7 +1187,7 @@ zap_domain_page_one(struct domain *d, un
    7.62                  goto again;
    7.63              }
    7.64  
    7.65 -            DPRINTK("%s: old_pte 0x%lx old_arflags 0x%lx mfn 0x%lx "
    7.66 +            DPRINTK(XENLOG_G_INFO "%s: old_pte 0x%lx old_arflags 0x%lx mfn 0x%lx "
    7.67                      "ret_pte 0x%lx ret_mfn 0x%lx\n",
    7.68                      __func__,
    7.69                      pte_val(old_pte), old_arflags, mfn,
    7.70 @@ -1252,7 +1255,7 @@ dom0vp_add_physmap(struct domain* d, uns
    7.71              rd = dom_io;
    7.72              break;
    7.73          default:
    7.74 -            DPRINTK("d 0x%p domid %d "
    7.75 +            DPRINTK(XENLOG_G_INFO "d 0x%p domid %d "
    7.76                      "pgfn 0x%lx mfn 0x%lx flags 0x%lx domid %d\n",
    7.77                      d, d->domain_id, gpfn, mfn, flags, domid);
    7.78              return -ESRCH;
    7.79 @@ -1325,14 +1328,16 @@ dom0vp_expose_p2m(struct domain* d,
    7.80          (conv_start_gpfn % granule_pfn) != 0 ||
    7.81          (assign_start_gpfn % granule_pfn) != 0 ||
    7.82          (expose_num_pfn % granule_pfn) != 0) {
    7.83 -        DPRINTK("%s conv_start_gpfn 0x%016lx assign_start_gpfn 0x%016lx "
    7.84 +        DPRINTK(XENLOG_G_INFO
    7.85 +                "%s conv_start_gpfn 0x%016lx assign_start_gpfn 0x%016lx "
    7.86                  "expose_size 0x%016lx granulte_pfn 0x%016lx\n", __func__, 
    7.87                  conv_start_gpfn, assign_start_gpfn, expose_size, granule_pfn);
    7.88          return -EINVAL;
    7.89      }
    7.90  
    7.91      if (granule_pfn != PTRS_PER_PTE) {
    7.92 -        DPRINTK("%s granule_pfn 0x%016lx PTRS_PER_PTE 0x%016lx\n",
    7.93 +        DPRINTK(XENLOG_G_INFO
    7.94 +                "%s granule_pfn 0x%016lx PTRS_PER_PTE 0x%016lx\n",
    7.95                  __func__, granule_pfn, PTRS_PER_PTE);
    7.96          return -ENOSYS;
    7.97      }
    7.98 @@ -1350,7 +1355,7 @@ dom0vp_expose_p2m(struct domain* d,
    7.99          assign_pte = lookup_alloc_domain_pte(d, (assign_start_gpfn <<
   7.100                                               PAGE_SHIFT) + i * sizeof(pte_t));
   7.101          if (assign_pte == NULL) {
   7.102 -            DPRINTK("%s failed to allocate pte page\n", __func__);
   7.103 +            DPRINTK(XENLOG_G_INFO "%s failed to allocate pte page\n", __func__);
   7.104              return -ENOMEM;
   7.105          }
   7.106  
   7.107 @@ -1371,7 +1376,7 @@ dom0vp_expose_p2m(struct domain* d,
   7.108  
   7.109          if (expose_p2m_page(d, (assign_start_gpfn << PAGE_SHIFT) +
   7.110                              i * sizeof(pte_t), virt_to_page(conv_pte)) < 0) {
   7.111 -            DPRINTK("%s failed to assign page\n", __func__);
   7.112 +            DPRINTK(XENLOG_G_INFO "%s failed to assign page\n", __func__);
   7.113              return -EAGAIN;
   7.114          }
   7.115  
   7.116 @@ -1390,7 +1395,7 @@ dom0vp_expose_p2m(struct domain* d,
   7.117          }
   7.118          if (expose_p2m_page(d, (assign_start_gpfn + i) << PAGE_SHIFT,
   7.119                              p2m_pte_zero_page) < 0) {
   7.120 -            DPRINTK("%s failed to assign zero-pte page\n", __func__);
   7.121 +            DPRINTK(XENLOG_G_INFO "%s failed to assign zero-pte page\n", __func__);
   7.122              return -EAGAIN;
   7.123          }
   7.124      }
   7.125 @@ -1413,7 +1418,7 @@ create_grant_host_mapping(unsigned long 
   7.126  
   7.127      if (flags & (GNTMAP_device_map |
   7.128                   GNTMAP_application_map | GNTMAP_contains_pte)) {
   7.129 -        DPRINTK("%s: flags 0x%x\n", __func__, flags);
   7.130 +        DPRINTK(XENLOG_G_INFO "%s: flags 0x%x\n", __func__, flags);
   7.131          return GNTST_general_error;
   7.132      }
   7.133  
   7.134 @@ -1447,13 +1452,14 @@ destroy_grant_host_mapping(unsigned long
   7.135      struct page_info* page;
   7.136  
   7.137      if (flags & (GNTMAP_application_map | GNTMAP_contains_pte)) {
   7.138 -        DPRINTK("%s: flags 0x%x\n", __func__, flags);
   7.139 +        DPRINTK(XENLOG_G_INFO "%s: flags 0x%x\n", __func__, flags);
   7.140          return GNTST_general_error;
   7.141      }
   7.142  
   7.143      pte = lookup_noalloc_domain_pte(d, gpaddr);
   7.144      if (pte == NULL) {
   7.145 -        DPRINTK("%s: gpaddr 0x%lx mfn 0x%lx\n", __func__, gpaddr, mfn);
   7.146 +        DPRINTK(XENLOG_G_INFO "%s: gpaddr 0x%lx mfn 0x%lx\n",
   7.147 +                __func__, gpaddr, mfn);
   7.148          return GNTST_general_error;
   7.149      }
   7.150  
   7.151 @@ -1461,7 +1467,7 @@ destroy_grant_host_mapping(unsigned long
   7.152      cur_arflags = pte_val(*pte) & ~_PAGE_PPN_MASK;
   7.153      cur_pte = pfn_pte(mfn, __pgprot(cur_arflags));
   7.154      if (!pte_present(cur_pte)) {
   7.155 -        DPRINTK("%s: gpaddr 0x%lx mfn 0x%lx cur_pte 0x%lx\n",
   7.156 +        DPRINTK(XENLOG_G_INFO "%s: gpaddr 0x%lx mfn 0x%lx cur_pte 0x%lx\n",
   7.157                  __func__, gpaddr, mfn, pte_val(cur_pte));
   7.158          return GNTST_general_error;
   7.159      }
   7.160 @@ -1469,7 +1475,8 @@ destroy_grant_host_mapping(unsigned long
   7.161  
   7.162      old_pte = ptep_cmpxchg_rel(&d->arch.mm, gpaddr, pte, cur_pte, new_pte);
   7.163      if (unlikely(!pte_present(old_pte))) {
   7.164 -        DPRINTK("%s: gpaddr 0x%lx mfn 0x%lx cur_pte 0x%lx old_pte 0x%lx\n",
   7.165 +        DPRINTK(XENLOG_G_INFO "%s: gpaddr 0x%lx mfn 0x%lx"
   7.166 +                         " cur_pte 0x%lx old_pte 0x%lx\n",
   7.167                  __func__, gpaddr, mfn, pte_val(cur_pte), pte_val(old_pte));
   7.168          return GNTST_general_error;
   7.169      }
   7.170 @@ -1477,7 +1484,8 @@ destroy_grant_host_mapping(unsigned long
   7.171          if (pte_pfn(old_pte) == mfn) {
   7.172              goto again;
   7.173          }
   7.174 -        DPRINTK("%s gpaddr 0x%lx mfn 0x%lx cur_pte 0x%lx old_pte 0x%lx\n",
   7.175 +        DPRINTK(XENLOG_G_INFO "%s gpaddr 0x%lx mfn 0x%lx cur_pte "
   7.176 +                "0x%lx old_pte 0x%lx\n",
   7.177                  __func__, gpaddr, mfn, pte_val(cur_pte), pte_val(old_pte));
   7.178          return GNTST_general_error;
   7.179      }
   7.180 @@ -1509,7 +1517,8 @@ steal_page(struct domain *d, struct page
   7.181      u64 x, nx, y;
   7.182  
   7.183      if (page_get_owner(page) != d) {
   7.184 -        DPRINTK("%s d 0x%p owner 0x%p\n", __func__, d, page_get_owner(page));
   7.185 +        DPRINTK(XENLOG_G_INFO "%s d 0x%p owner 0x%p\n",
   7.186 +                __func__, d, page_get_owner(page));
   7.187          return -1;
   7.188      }
   7.189      
   7.190 @@ -1521,7 +1530,7 @@ steal_page(struct domain *d, struct page
   7.191  
   7.192          new = alloc_domheap_page(d);
   7.193          if (new == NULL) {
   7.194 -            DPRINTK("alloc_domheap_page() failed\n");
   7.195 +            DPRINTK(XENLOG_G_INFO "alloc_domheap_page() failed\n");
   7.196              return -1;
   7.197          }
   7.198          // zero out pages for security reasons
   7.199 @@ -1545,7 +1554,8 @@ steal_page(struct domain *d, struct page
   7.200          ret = assign_domain_page_cmpxchg_rel(d, gpfn << PAGE_SHIFT, page, new,
   7.201                                               ASSIGN_writable);
   7.202          if (ret < 0) {
   7.203 -            DPRINTK("assign_domain_page_cmpxchg_rel failed %d\n", ret);
   7.204 +            DPRINTK(XENLOG_G_INFO "assign_domain_page_cmpxchg_rel failed %d\n",
   7.205 +                    ret);
   7.206              set_gpfn_from_mfn(new_mfn, INVALID_M2P_ENTRY);
   7.207              free_domheap_page(new);
   7.208              return -1;
   7.209 @@ -1582,7 +1592,8 @@ steal_page(struct domain *d, struct page
   7.210              unlikely(_nd != _d)) {
   7.211              struct domain* nd = unpickle_domptr(_nd);
   7.212              if (nd == NULL) {
   7.213 -                DPRINTK("gnttab_transfer: Bad page %p: ed=%p(%u) 0x%x, "
   7.214 +                DPRINTK(XENLOG_G_INFO "gnttab_transfer: "
   7.215 +                        "Bad page %p: ed=%p(%u) 0x%x, "
   7.216                          "sd=%p 0x%x,"
   7.217                          " caf=%016lx, taf=%" PRtype_info
   7.218                          " memflags 0x%x\n",
   7.219 @@ -1593,7 +1604,8 @@ steal_page(struct domain *d, struct page
   7.220                          page->u.inuse.type_info,
   7.221                          memflags);
   7.222              } else {
   7.223 -                DPRINTK("gnttab_transfer: Bad page %p: ed=%p(%u) 0x%x, "
   7.224 +                DPRINTK(XENLOG_G_WARNING "gnttab_transfer: "
   7.225 +                        "Bad page %p: ed=%p(%u) 0x%x, "
   7.226                          "sd=%p(%u) 0x%x,"
   7.227                          " caf=%016lx, taf=%" PRtype_info
   7.228                          " memflags 0x%x\n",
   7.229 @@ -1683,11 +1695,11 @@ domain_page_flush(struct domain* d, unsi
   7.230          tlb_track_free_entry(d->arch.tlb_track, entry);
   7.231          break;
   7.232      case TLB_TRACK_MANY:
   7.233 -        DPRINTK("%s TLB_TRACK_MANY\n", __func__);
   7.234 +        DPRINTK(XENLOG_G_INFO "%s TLB_TRACK_MANY\n", __func__);
   7.235          domain_flush_vtlb_all();
   7.236          break;
   7.237      case TLB_TRACK_AGAIN:
   7.238 -        DPRINTK("%s TLB_TRACK_AGAIN\n", __func__);
   7.239 +        DPRINTK(XENLOG_G_ERR "%s TLB_TRACK_AGAIN\n", __func__);
   7.240          BUG();
   7.241          break;
   7.242      }
     8.1 --- a/xen/arch/ia64/xen/vcpu.c	Fri Oct 27 18:56:44 2006 +0100
     8.2 +++ b/xen/arch/ia64/xen/vcpu.c	Fri Oct 27 18:57:02 2006 +0100
     8.3 @@ -1571,7 +1571,7 @@ vcpu_get_domain_bundle(VCPU * vcpu, REGS
     8.4  			set_metaphysical_rr0();
     8.5  		}
     8.6  		if (bundle->i64[0] == 0 && bundle->i64[1] == 0) {
     8.7 -			DPRINTK("%s gip 0x%lx\n", __func__, gip);
     8.8 +			DPRINTK(XENLOG_INFO "%s gip 0x%lx\n", __func__, gip);
     8.9  			return 0;
    8.10  		}
    8.11  		return 1;
     9.1 --- a/xen/include/asm-ia64/mm.h	Fri Oct 27 18:56:44 2006 +0100
     9.2 +++ b/xen/include/asm-ia64/mm.h	Fri Oct 27 18:57:02 2006 +0100
     9.3 @@ -175,7 +175,7 @@ static inline int get_page(struct page_i
     9.4  	    unlikely((nx & PGC_count_mask) == 0) ||	/* Count overflow? */
     9.5  	    unlikely((x >> 32) != _domain)) {		/* Wrong owner? */
     9.6  
     9.7 -	    DPRINTK("Error pfn %lx: rd=%p, od=%p, caf=%016lx, taf=%"
     9.8 +	    DPRINTK(XENLOG_G_INFO "Error pfn %lx: rd=%p, od=%p, caf=%016lx, taf=%"
     9.9  		PRtype_info "\n", page_to_mfn(page), domain,
    9.10  		unpickle_domptr(x >> 32), x, page->u.inuse.type_info);
    9.11  	    return 0;