|
|
|
|
|
|
|
|
|
|
xen-devel
Re: [Xen-devel] [PATCH] Fix xenoprof counter overflow check
On Tue, Jan 6, 2009 at 6:10 AM, Keir Fraser <keir.fraser@xxxxxxxxxxxxx> wrote:
This patch can't possibly build, and is pointless anyway since the overflow
While the mainline patch won't build, the one attached definitely does. That said, I see your point about the overflow. Now I need to figure out why this broken patch actually enables xenoprof to work on my Intel Xeon. The only reason would be the switch from CTR_READ() (which uses rdmsr() internally) to rdmsrl() but let me dig into it.
Cheers, Niraj
width check is still hardcoded to 32 bits in CTR_OVERFLOWED().
-- Keir
-- Niraj Tolia, Researcher, HP Labs http://www.hpl.hp.com/personal/Niraj_Tolia/
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel
|
|
|
|
|