[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-changelog] [xen-unstable] sysctl: Another clarification re. max_cpu_index.



# HG changeset patch
# User Keir Fraser <keir.fraser@xxxxxxxxxx>
# Date 1278956358 -3600
# Node ID 9f08c4e82037415f0677da080470aac97d11d010
# Parent  e9331523d2d1dab1ef193eeaf21ddc22d8c5a925
sysctl: Another clarification re. max_cpu_index.

Signed-off-by: Keir Fraser <keir.fraser@xxxxxxxxxx>
---
 xen/include/public/sysctl.h |   12 ++++++------
 1 files changed, 6 insertions(+), 6 deletions(-)

diff -r e9331523d2d1 -r 9f08c4e82037 xen/include/public/sysctl.h
--- a/xen/include/public/sysctl.h       Mon Jul 12 18:33:30 2010 +0100
+++ b/xen/include/public/sysctl.h       Mon Jul 12 18:39:18 2010 +0100
@@ -468,17 +468,17 @@ struct xen_sysctl_topologyinfo {
      * IN: maximum addressable entry in the caller-provided arrays.
      * OUT: largest cpu identifier in the system.
      * If OUT is greater than IN then the arrays are truncated!
+     * If OUT is leass than IN then the array tails are not written by sysctl.
      */
     uint32_t max_cpu_index;
 
     /*
-     * If not NULL, this array is filled with core/socket/node identifier for 
-     * each cpu.
+     * If not NULL, these arrays are filled with core/socket/node identifier
+     * for each cpu.
      * If a cpu has no core/socket/node information (e.g., cpu not present) 
-     * then the sentinel value ~0u is written.
-     * The size of this array is specified by the caller (@max_cpu_index+1).
-     * If the array has more than @max_cpu_index+1 elements then the trailing
-     * elements of the array will not be written by the sysctl.
+     * then the sentinel value ~0u is written to each array.
+     * The number of array elements written by the sysctl is:
+     *   min(@max_cpu_index_IN,@max_cpu_index_OUT)+1
      */
     XEN_GUEST_HANDLE_64(uint32) cpu_to_core;
     XEN_GUEST_HANDLE_64(uint32) cpu_to_socket;

_______________________________________________
Xen-changelog mailing list
Xen-changelog@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-changelog


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.