[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] [PATCH 20 of 20] n2 MSR handling and capability exposure



At 11:00 +0100 on 26 Jul (1311678018), Tim Deegan wrote:
> If you want to double-check that you've done the patch right,
> edit xen/arch/x86/hvm/vmx/vvmx.c, and at line 1185, just under the line
> ` /* Even if this VMCS isn't the current one, we must clear it. */ '
> add a line ` printk("boo!\n"); '.  Then when you recompile and test you
> should see "boo!" printed just after each "vvmx.c:1182:d3" line on the
> console.

Oh, and when the domU is hung, can you run the command 
/usr/lib/xen/bin/xenctx -aCS 1 
(replacing '1' with the domid of your domU) three or four times 
and post the output here?  On a 64-bit dom0 I think the correct path
will be /usr/lib64/xen/bin/xenctx.

Cheers,

Tim.

-- 
Tim Deegan <Tim.Deegan@xxxxxxxxxx>
Principal Software Engineer, Xen Platform Team
Citrix Systems UK Ltd.  (Company #02937203, SL9 0BG)

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.