[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[PATCH v2] MAINTAINERS: consolidate vm-event/monitor entry


  • To: "xen-devel@xxxxxxxxxxxxxxxxxxxx" <xen-devel@xxxxxxxxxxxxxxxxxxxx>
  • From: Jan Beulich <jbeulich@xxxxxxxx>
  • Date: Thu, 31 Aug 2023 08:15:13 +0200
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com; dkim=pass header.d=suse.com; arc=none
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=o/uhMQIUJkpNDbQp8w14s3Rnav8Hu3quoN6QCu+nTUo=; b=hShKUQttjLQvOmKRvQW8copKjI+pJULlX7MpMfT8Vh5KvskqeDg7YJdVjwrWH7xdtPFS23S3HkQUzAK3QRMkrEzhLtwj4RC0pPO+kw5k3UcxyEElsBYN0p+9tZgAeRK1hdqFq5fT0Y8484PdCU/X4Y8C/197LIZUcxb+Hjf90WgW9jbP7wDAhYsOsVrzSFBb2k4Y9pOvJrZUNzq5d4TMxchH/ctDpoD0SpgbmOHlr4TAFf/frvIYka1pka19c15yxVg+9vu4L3C0YEp9+tnqamOzYos66d1n7g87s5vDAg5kDlbnAXDBHkmGlMGS3o7Lr8wb0Lr9DORSXWuDVnB8Yg==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=MwIqk/jkU6YwJ60uVcPzOqIYXKk6RyRPIRupU5pSxQ9GG5SFaYhYnU9dqKK2XHC2+E8ohM+oUhbRhcaBsRfq/yphDfUU1IUxakJSpItsnHjFEXP/cKO2+4jC20+Aj1XM+KoigR+DX9uU04tpn4uzy5l/0Mxk3pXa0ZVbIc/ylGVfp2Wd0BPjOCpCIlAU7KMQ5/lx2OqUSeEikmNOqLr/FVnbqI9Tt3BFNZ2vSu+DUewbFCFwwHXnbPLAHGI98JFJVTV7hJPywK51T4P85fgPu8P05t17SL8pyOwc7avrJv6+1tCKuqNiWHI5cm6y7yvlwthT2LubFfXiclxsGfJpeA==
  • Authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=suse.com;
  • Cc: Tamas K Lengyel <tamas@xxxxxxxxxxxxx>, Andrew Cooper <andrew.cooper3@xxxxxxxxxx>, George Dunlap <george.dunlap@xxxxxxxxxx>, Julien Grall <julien@xxxxxxx>, Stefano Stabellini <sstabellini@xxxxxxxxxx>, Wei Liu <wl@xxxxxxx>
  • Delivery-date: Thu, 31 Aug 2023 06:15:26 +0000
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>

If the F: description is to be trusted, the two xen/arch/x86/hvm/
lines were fully redundant with the earlier wildcard ones. Arch header
files, otoh, were no longer covered by anything as of the move from
include/asm-*/ to arch/*/include/asm/. Further also generalize (by
folding) the x86- and Arm-specific mem_access.c entries.

Finally, again assuming the F: description can be trusted, there's no
point listing arch/, common/, and include/ entries separately. Fold
them all.

Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
---
v2: Further fold patterns.
---
Triggered by me looking at the entry in the context of Oleksii's RISC-V
preparatory patch.

--- a/MAINTAINERS
+++ b/MAINTAINERS
@@ -558,20 +558,9 @@ R: Alexandru Isaila <aisaila@bitdefender
 R:     Petre Pircalabu <ppircalabu@xxxxxxxxxxxxxxx>
 S:     Supported
 F:     tools/misc/xen-access.c
-F:     xen/arch/*/monitor.c
-F:     xen/arch/*/vm_event.c
-F:     xen/arch/arm/mem_access.c
-F:     xen/arch/x86/include/asm/hvm/monitor.h
-F:     xen/arch/x86/include/asm/hvm/vm_event.h
-F:     xen/arch/x86/mm/mem_access.c
-F:     xen/arch/x86/hvm/monitor.c
-F:     xen/arch/x86/hvm/vm_event.c
-F:     xen/common/mem_access.c
-F:     xen/common/monitor.c
-F:     xen/common/vm_event.c
-F:     xen/include/*/mem_access.h
-F:     xen/include/*/monitor.h
-F:     xen/include/*/vm_event.h
+F:     xen/*/mem_access.[ch]
+F:     xen/*/monitor.[ch]
+F:     xen/*/vm_event.[ch]
 
 VPCI
 M:     Roger Pau Monné <roger.pau@xxxxxxxxxx>



 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.