[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[PATCH v6 0/4] xen/console: configurable conring size


  • To: xen-devel@xxxxxxxxxxxxxxxxxxxx
  • From: dmukhin@xxxxxxxx
  • Date: Fri, 8 May 2026 17:57:10 -0700
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 205.220.161.53) smtp.rcpttodomain=lists.xenproject.org smtp.mailfrom=ford.com; dmarc=pass (p=reject sp=reject pct=100) action=none header.from=ford.com; dkim=pass (signature was verified) header.d=saarlouis.ford.com; dkim=pass (signature was verified) header.d=ford.com; arc=none (0)
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=uoMw8oYw+/re4inManVJEtjmNjWTs+EgvjkcXbZqY94=; b=UU3kZsavRDeO8cwtxCm0oQc2uAFQlRdSPkNs2w13n9rGXK6K93Hzmo22cXI7FzLVxRQ+kRVVom0ieQ4fCZhGABAs1Zu/YtplwQ8hsQwNkB6vWDZhfFhuqUjSQUAHvwNHxQj0iHi01PA7jCqwupEknpANEz+YQ4fHpwTg0YgH45sXs6d2T3KqlTcLU8DOpbFe/Ye0Uyvg7rPa46ce/Y1LtXw11pgIY2bq7gXPXnj0qIrz4QkRJJ6iTF/eJ+5KbajUjWvczLxqt1da2Ss+uvFCiAnZvFGSL+87eFlpQudngADYy1JRYscKctUPb79Cg1NsouXEfds0WnyLz3d6DduFqg==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=x2X2RQ8SAqTgkxXlv+QZWSVPIw9l5dE1kSNxSZugFJpAoIJYzzy8IGpKXOB1du+b4RJqN6d54NHqrwYw7UN3fR1bnhbW7IvnTf8fO8weD02RB3lhNAaPDzBtIdvVOzSKHxg/GRpYI7ntkLY3ajA0szLGA9mk3zF0TvyUactmgpJ/KaNE/GAetzv+I8LWFiiGvID4Xe9AI1EaXuEp4FiNxnfvYgLnVy9x7Ik2MkSWYBfDmsx/GL+eaLjoi3tBR9fbx535fDxu7S6P0cO74gmnMyO1T6eFgYM/zxBHsx6wIpLnujXTfnx8are4BLqW3minDujtkd69IOpeKYq7f1Wyug==
  • Authentication-results: eu.smtp.expurgate.cloud; dkim=pass header.s=ppford header.d=ford.com header.i="@ford.com" header.h="Cc:Content-Transfer-Encoding:Content-Type:Date:From:Message-ID:MIME-Version:Subject:To"; dkim=pass header.s=selector2-azureford-onmicrosoft-com header.d=azureford.onmicrosoft.com header.i="@azureford.onmicrosoft.com" header.h="From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck"; dkim=pass header.s=ppserprodsaar header.d=saarlouis.ford.com header.i="@saarlouis.ford.com" header.h="Cc:Content-Transfer-Encoding:Date:From:Message-ID:MIME-Version:Subject:To"; dkim=pass header.s=ppfserpocford header.d=ford.com header.i="@ford.com" header.h="Cc:Content-Transfer-Encoding:Date:From:Message-ID:MIME-Version:Subject:To"
  • Cc: andrew.cooper3@xxxxxxxxxx, anthony.perard@xxxxxxxxxx, jbeulich@xxxxxxxx, julien@xxxxxxx, michal.orzel@xxxxxxx, roger.pau@xxxxxxxxxx, sstabellini@xxxxxxxxxx, dmukhin@xxxxxxxx
  • Delivery-date: Sat, 09 May 2026 00:57:53 +0000
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>
  • Pser-m365-app: SER-APP

Series introduces compile-time configurable conring size along
with few cleanups in conring management.

Patch 1 introduces CONRING_CONRING_SHIFT to select compile-time
conring buffer size.

Patch 2 updates conring{,_size} annotations to __ro_after_init as per [2].

Patch 3 optimizes switch from early conring to permanent conring.

Patch 4 update the conring buffer allocation code.

[1] Link to v6: 
https://lore.kernel.org/xen-devel/20260205013606.3384798-1-dmukhin@xxxxxxxx/
[2] 
https://lore.kernel.org/xen-devel/1a5ed8ad-0cc7-4e05-9b9c-cd6930d9b9ea@xxxxxxxxxx
[3] Link to CI: 
https://gitlab.com/xen-project/people/dmukhin/xen/-/pipelines/2511597097

Denis Mukhin (4):
  xen/console: make console buffer size configurable
  xen/console: promote conring{,_size} to __ro_after_init
  xen/console: use memcpy() in console_init_ring()
  xen/console: switch conring runtime allocation to xvmalloc

 docs/misc/xen-command-line.pandoc |  5 +--
 xen/drivers/char/Kconfig          | 15 ++++++++
 xen/drivers/char/console.c        | 60 +++++++++++++++++++++++--------
 3 files changed, 63 insertions(+), 17 deletions(-)

-- 
2.54.0




 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.