[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] [PATCH 20 of 20] n2 MSR handling and capability exposure



Here my input


mfg,
jeroen

Op 26-7-2011 12:11, Tim Deegan schreef:
At 11:00 +0100 on 26 Jul (1311678018), Tim Deegan wrote:
If you want to double-check that you've done the patch right,
edit xen/arch/x86/hvm/vmx/vvmx.c, and at line 1185, just under the line
` /* Even if this VMCS isn't the current one, we must clear it. */ '
add a line ` printk("boo!\n"); '.  Then when you recompile and test you
should see "boo!" printed just after each "vvmx.c:1182:d3" line on the
console.
Oh, and when the domU is hung, can you run the command
/usr/lib/xen/bin/xenctx -aCS 1
(replacing '1' with the domid of your domU) three or four times
and post the output here?  On a 64-bit dom0 I think the correct path
will be /usr/lib64/xen/bin/xenctx.

Cheers,

Tim.


Attachment: 1.xenctx
Description: Text document

Attachment: 2.xenctx
Description: Text document

Attachment: 3.xenctx
Description: Text document

Attachment: 4.xenctx
Description: Text document

Attachment: 5.xenctx
Description: Text document

Attachment: dmesg
Description: Text document

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel

 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.