Thanks for the clarification.

On Mon, Feb 19, 2018, 17:33 Roger Pau Monné <roger....@citrix.com> wrote:

> On Mon, Feb 19, 2018 at 05:13:11PM +0000, Wei Liu wrote:
> > On Mon, Feb 19, 2018 at 04:23:33PM +0000, Charles Gonçalves wrote:
> > > Hello,
> > >
> > > Im getting this Hypercall [op = 0x0040001a ] on xen trace  but can't
> figure
> > > out which operation this is.
> > >
> > > Using old Xen 4.4.1.
> > > Looking at documentation  and also using grep into source code couldn't
> > > figure out which hypercall this is.
> > >
> > > Can someone help clarify this?
> >
> > See public/trace.h for the exact definition of the event.
> >
> > I can't seem to be able to find 0x004xxxxx in the latest upstream code
> > though.
>
> AFAICT the 0x004xxxxx comes from TRC_PV_HYPERCALL_V2_ARG_32, which is
> used by __trace_hypercall, for __HYPERVISOR_mmuext_op that would be:
>
> d.op = __HYPERVISOR_mmuext_op | (0x1 << 22);
>
> Roger.
>
-- 
Atenciosamente,
Charles F.'. Gonçalves
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel

Reply via email to