WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
   
 
 
Xen 
 
Home Products Support Community News
 
   
 

xen-devel

Re: [Xen-devel] [PATCH] Fix xenoprof counter overflow check

To: Niraj Tolia <ntolia@xxxxxxxxx>, <xen-devel@xxxxxxxxxxxxxxxxxxx>
Subject: Re: [Xen-devel] [PATCH] Fix xenoprof counter overflow check
From: Keir Fraser <keir.fraser@xxxxxxxxxxxxx>
Date: Tue, 06 Jan 2009 14:10:23 +0000
Cc:
Delivery-date: Tue, 06 Jan 2009 06:11:01 -0800
Envelope-to: www-data@xxxxxxxxxxxxxxxxxxx
In-reply-to: <eb1ad7bbdaf3ae553a6b.1231217351@niraj-desktop>
List-help: <mailto:xen-devel-request@lists.xensource.com?subject=help>
List-id: Xen developer discussion <xen-devel.lists.xensource.com>
List-post: <mailto:xen-devel@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=unsubscribe>
Sender: xen-devel-bounces@xxxxxxxxxxxxxxxxxxx
Thread-index: AclwCIPLL0T3+04+a0G0S5UkVWhTbQ==
Thread-topic: [Xen-devel] [PATCH] Fix xenoprof counter overflow check
User-agent: Microsoft-Entourage/12.14.0.081024
On 06/01/2009 04:49, "Niraj Tolia" <ntolia@xxxxxxxxx> wrote:

> # HG changeset patch
> # User Niraj Tolia <ntolia@xxxxxxxxx>
> # Date 1231217146 28800
> # Node ID eb1ad7bbdaf3ae553a6bf319180b5880f5ac4307
> # Parent  8417ddc981b407753f966c568ef8c7b673d8d22a
> Xenoprof patch to fix the counter overflow check for CPUs with counter
> width > 32
> 
> I had to port this patch from mainline Linux where it can be found at
> http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;
> h=7c64ade53a6f977d73f16243865c42ceae999aea
> 
> Signed-off-by: Niraj Tolia <ntolia@xxxxxxxxx>

This patch can't possibly build, and is pointless anyway since the overflow
width check is still hardcoded to 32 bits in CTR_OVERFLOWED().

 -- Keir



_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel