|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [PATCH for-4.19?] xen/x86: pretty print interrupt CPU affinity masks
On Thu, May 16, 2024 at 06:13:29PM +0100, Andrew Cooper wrote:
> On 15/05/2024 4:29 pm, Roger Pau Monne wrote:
> > Print the CPU affinity masks as numeric ranges instead of plain hexadecimal
> > bitfields.
> >
> > Signed-off-by: Roger Pau Monné <roger.pau@xxxxxxxxxx>
> > ---
> > xen/arch/x86/irq.c | 10 +++++-----
> > 1 file changed, 5 insertions(+), 5 deletions(-)
> >
> > diff --git a/xen/arch/x86/irq.c b/xen/arch/x86/irq.c
> > index 80ba8d9fe912..3b951d81bd6d 100644
> > --- a/xen/arch/x86/irq.c
> > +++ b/xen/arch/x86/irq.c
> > @@ -1934,10 +1934,10 @@ void do_IRQ(struct cpu_user_regs *regs)
> > if ( ~irq < nr_irqs && irq_desc_initialized(desc) )
> > {
> > spin_lock(&desc->lock);
> > - printk("IRQ%d a=%04lx[%04lx,%04lx] v=%02x[%02x] t=%s
> > s=%08x\n",
> > - ~irq, *cpumask_bits(desc->affinity),
> > - *cpumask_bits(desc->arch.cpu_mask),
> > - *cpumask_bits(desc->arch.old_cpu_mask),
> > + printk("IRQ%d a={%*pbl}[{%*pbl},{%*pbl}] v=%02x[%02x]
> > t=%s s=%08x\n",
>
> Looking at this more closely, there's still some information obfuscation
> going on.
>
> How about "... a={} o={} n={} v=..."
>
> so affinity, old and new masks are all stated explicitly, instead of
> having to remember what the square brackets mean, and in particular that
> the masks are backwards?
>
> Happy to adjust on commit.
Sure, I guess I got used to it and didn't think of adjusting the
format. The only risk is anyone having an automated parser to consume
that information, but I think it's unlikely.
Thanks, Roger.
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |