[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] [PATCH] Fix xenoprof counter overflow check


  • To: Niraj Tolia <ntolia@xxxxxxxxx>, <xen-devel@xxxxxxxxxxxxxxxxxxx>
  • From: Keir Fraser <keir.fraser@xxxxxxxxxxxxx>
  • Date: Tue, 06 Jan 2009 14:10:23 +0000
  • Cc:
  • Delivery-date: Tue, 06 Jan 2009 06:11:01 -0800
  • List-id: Xen developer discussion <xen-devel.lists.xensource.com>
  • Thread-index: AclwCIPLL0T3+04+a0G0S5UkVWhTbQ==
  • Thread-topic: [Xen-devel] [PATCH] Fix xenoprof counter overflow check

On 06/01/2009 04:49, "Niraj Tolia" <ntolia@xxxxxxxxx> wrote:

> # HG changeset patch
> # User Niraj Tolia <ntolia@xxxxxxxxx>
> # Date 1231217146 28800
> # Node ID eb1ad7bbdaf3ae553a6bf319180b5880f5ac4307
> # Parent  8417ddc981b407753f966c568ef8c7b673d8d22a
> Xenoprof patch to fix the counter overflow check for CPUs with counter
> width > 32
> 
> I had to port this patch from mainline Linux where it can be found at
> http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;
> h=7c64ade53a6f977d73f16243865c42ceae999aea
> 
> Signed-off-by: Niraj Tolia <ntolia@xxxxxxxxx>

This patch can't possibly build, and is pointless anyway since the overflow
width check is still hardcoded to 32 bits in CTR_OVERFLOWED().

 -- Keir



_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.