[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH 20 of 20] n2 MSR handling and capability exposure
Here my input mfg, jeroen Op 26-7-2011 12:11, Tim Deegan schreef: At 11:00 +0100 on 26 Jul (1311678018), Tim Deegan wrote:If you want to double-check that you've done the patch right, edit xen/arch/x86/hvm/vmx/vvmx.c, and at line 1185, just under the line ` /* Even if this VMCS isn't the current one, we must clear it. */ ' add a line ` printk("boo!\n"); '. Then when you recompile and test you should see "boo!" printed just after each "vvmx.c:1182:d3" line on the console.Oh, and when the domU is hung, can you run the command /usr/lib/xen/bin/xenctx -aCS 1 (replacing '1' with the domid of your domU) three or four times and post the output here? On a 64-bit dom0 I think the correct path will be /usr/lib64/xen/bin/xenctx. Cheers, Tim. Attachment:
1.xenctx Attachment:
2.xenctx Attachment:
3.xenctx Attachment:
4.xenctx Attachment:
5.xenctx Attachment:
dmesg _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxx http://lists.xensource.com/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |