[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH 20 of 20] n2 MSR handling and capability exposure
At 11:00 +0100 on 26 Jul (1311678018), Tim Deegan wrote: > If you want to double-check that you've done the patch right, > edit xen/arch/x86/hvm/vmx/vvmx.c, and at line 1185, just under the line > ` /* Even if this VMCS isn't the current one, we must clear it. */ ' > add a line ` printk("boo!\n"); '. Then when you recompile and test you > should see "boo!" printed just after each "vvmx.c:1182:d3" line on the > console. Oh, and when the domU is hung, can you run the command /usr/lib/xen/bin/xenctx -aCS 1 (replacing '1' with the domid of your domU) three or four times and post the output here? On a 64-bit dom0 I think the correct path will be /usr/lib64/xen/bin/xenctx. Cheers, Tim. -- Tim Deegan <Tim.Deegan@xxxxxxxxxx> Principal Software Engineer, Xen Platform Team Citrix Systems UK Ltd. (Company #02937203, SL9 0BG) _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxx http://lists.xensource.com/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |