[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH v2 1/5] xentrace: add TRC_HVM_PI_LIST_ADD
On 11/05/17 07:04, Chao Gao wrote: > This patch adds TRC_HVM_PI_LIST_ADD to track adding one entry to > the per-pcpu blocking list. Also introduce a 'counter' to track > the number of entries in the list. So first of all, you have the importance of the order here backwards. The most important thing this patch is doing is adding a counter to see how many vcpus are on the list; tracing how that counter is moving is secondary. Secondly... > > Signed-off-by: Chao Gao <chao.gao@xxxxxxxxx> > --- > tools/xentrace/formats | 1 + > xen/arch/x86/hvm/vmx/vmx.c | 12 +++++++++++- > xen/include/asm-x86/hvm/trace.h | 1 + > xen/include/public/trace.h | 1 + > 4 files changed, 14 insertions(+), 1 deletion(-) > > diff --git a/tools/xentrace/formats b/tools/xentrace/formats > index 8b31780..999ca8c 100644 > --- a/tools/xentrace/formats > +++ b/tools/xentrace/formats > @@ -125,6 +125,7 @@ > 0x00082020 CPU%(cpu)d %(tsc)d (+%(reltsc)8d) INTR_WINDOW [ value = > 0x%(1)08x ] > 0x00082021 CPU%(cpu)d %(tsc)d (+%(reltsc)8d) NPF [ gpa = > 0x%(2)08x%(1)08x mfn = 0x%(4)08x%(3)08x qual = 0x%(5)04x p2mt = 0x%(6)04x ] > 0x00082023 CPU%(cpu)d %(tsc)d (+%(reltsc)8d) TRAP [ vector = > 0x%(1)02x ] > +0x00082026 CPU%(cpu)d %(tsc)d (+%(reltsc)8d) PI_LIST_ADD [ domid = > 0x%(1)04x vcpu = 0x%(2)04x, pcpu = 0x%(3)04x, #entry = 0x%(4)04x ] > > 0x0010f001 CPU%(cpu)d %(tsc)d (+%(reltsc)8d) page_grant_map [ domid > = %(1)d ] > 0x0010f002 CPU%(cpu)d %(tsc)d (+%(reltsc)8d) page_grant_unmap [ domid > = %(1)d ] > diff --git a/xen/arch/x86/hvm/vmx/vmx.c b/xen/arch/x86/hvm/vmx/vmx.c > index c8ef18a..efff6cd 100644 > --- a/xen/arch/x86/hvm/vmx/vmx.c > +++ b/xen/arch/x86/hvm/vmx/vmx.c > @@ -82,6 +82,7 @@ static int vmx_vmfunc_intercept(struct cpu_user_regs *regs); > struct vmx_pi_blocking_vcpu { > struct list_head list; > spinlock_t lock; > + atomic_t counter; Why is this atomic? There's already a lock for this structure, and as far as I can tell every access throughout the series is (or could be) protected by a lock. Finally, please add an entry to tools/xentrace/xenalyze.c to interpret this value as well. Thanks, -George _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx https://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |