>>> On 23.06.15 at 09:08, <chao.p.p...@linux.intel.com> wrote:
> On Mon, Jun 15, 2015 at 05:02:59PM +0100, Jan Beulich wrote:
>> >>> On 03.06.15 at 06:53, <chao.p.p...@linux.intel.com> wrote:
>> > @@ -209,6 +215,23 @@ void psr_ctxt_switch_to(struct domain *d)
>> >      }
>> >  }
>> >  
>> > +static int cat_cpu_prepare(unsigned int cpu)
>> > +{
>> > +    struct psr_cat_socket_info *info;
>> > +
>> > +    if ( !cat_socket_info )
>> > +        return 0;
>> > +
>> > +    info = cat_socket_info + cpu_to_socket(cpu);
>> 
>> Is cpu_to_socket() guaranteed to always return a value < nr_sockets?
> 
> Return –ENOSPC once this happen?

Maybe. I can't tell what's a suitable action to take without digging
out the full patch (and perhaps series) again.

Jan

_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel

Reply via email to