>>> On 23.06.15 at 09:08, <chao.p.p...@linux.intel.com> wrote: > On Mon, Jun 15, 2015 at 05:02:59PM +0100, Jan Beulich wrote: >> >>> On 03.06.15 at 06:53, <chao.p.p...@linux.intel.com> wrote: >> > @@ -209,6 +215,23 @@ void psr_ctxt_switch_to(struct domain *d) >> > } >> > } >> > >> > +static int cat_cpu_prepare(unsigned int cpu) >> > +{ >> > + struct psr_cat_socket_info *info; >> > + >> > + if ( !cat_socket_info ) >> > + return 0; >> > + >> > + info = cat_socket_info + cpu_to_socket(cpu); >> >> Is cpu_to_socket() guaranteed to always return a value < nr_sockets? > > Return –ENOSPC once this happen?
Maybe. I can't tell what's a suitable action to take without digging out the full patch (and perhaps series) again. Jan _______________________________________________ Xen-devel mailing list Xen-devel@lists.xen.org http://lists.xen.org/xen-devel