From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-17.3 required=3.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS,INCLUDES_CR_TRAILER, INCLUDES_PATCH,MAILING_LIST_MULTI,NICE_REPLY_A,SPF_HELO_NONE,SPF_PASS, URIBL_BLOCKED,USER_AGENT_SANE_1 autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 7C8F0C11F65 for ; Wed, 30 Jun 2021 17:45:24 +0000 (UTC) Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPS id 4573861480 for ; Wed, 30 Jun 2021 17:45:24 +0000 (UTC) DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org 4573861480 Authentication-Results: mail.kernel.org; dmarc=none (p=none dis=none) header.from=xen.org Authentication-Results: mail.kernel.org; spf=pass smtp.mailfrom=xen-devel-bounces@lists.xenproject.org Received: from list by lists.xenproject.org with outflank-mailman.148218.273903 (Exim 4.92) (envelope-from ) id 1lyeGy-0000nO-SD; Wed, 30 Jun 2021 17:45:16 +0000 X-Outflank-Mailman: Message body and most headers restored to incoming version Received: by outflank-mailman (output) from mailman id 148218.273903; Wed, 30 Jun 2021 17:45:16 +0000 Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1lyeGy-0000nH-P5; Wed, 30 Jun 2021 17:45:16 +0000 Received: by outflank-mailman (input) for mailman id 148218; Wed, 30 Jun 2021 17:45:15 +0000 Received: from mail.xenproject.org ([104.130.215.37]) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1lyeGx-0000n9-Cg for xen-devel@lists.xenproject.org; Wed, 30 Jun 2021 17:45:15 +0000 Received: from xenbits.xenproject.org ([104.239.192.120]) by mail.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1lyeGv-0002Tx-JR; Wed, 30 Jun 2021 17:45:13 +0000 Received: from [54.239.6.186] (helo=a483e7b01a66.ant.amazon.com) by xenbits.xenproject.org with esmtpsa (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92) (envelope-from ) id 1lyeGv-00057o-DE; Wed, 30 Jun 2021 17:45:13 +0000 X-BeenThere: xen-devel@lists.xenproject.org List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xenproject.org Precedence: list Sender: "Xen-devel" DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org; s=20200302mail; h=Content-Transfer-Encoding:Content-Type:In-Reply-To: MIME-Version:Date:Message-ID:From:References:Cc:To:Subject; bh=FfI6ppnPns+NmCdd9yp8YwCtDplHv5GrM16/jYM7ZEI=; b=FosGCeCZPOimqoK8lPvV8K2pFU FrR0gDwTJAp7VA2KBkxm98Olt6z4q/cWzI6vow2rTAzFS91Z8hrdRPH6G89wACVMVRiOdO5HhANjJ 2/VhM/x8bDN1vpjEjfLxkNHZWWw6J317SIv4vq/v1zoXj5EZ8l+FnoS28plfwM7FeWvM=; Subject: Re: [PATCH 3/9] xen/arm: introduce CONFIG_STATIC_ALLOCATION To: Penny Zheng , xen-devel@lists.xenproject.org, sstabellini@kernel.org, jbeulich@suse.com Cc: Bertrand.Marquis@arm.com, Wei.Chen@arm.com References: <20210607024318.3988467-1-penny.zheng@arm.com> <20210607024318.3988467-4-penny.zheng@arm.com> From: Julien Grall Message-ID: <2b604aba-1d12-7957-ad9b-114f6ad1f857@xen.org> Date: Wed, 30 Jun 2021 18:45:11 +0100 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:78.0) Gecko/20100101 Thunderbird/78.11.0 MIME-Version: 1.0 In-Reply-To: <20210607024318.3988467-4-penny.zheng@arm.com> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-GB Content-Transfer-Encoding: 7bit Hi Penny, On 07/06/2021 03:43, Penny Zheng wrote: > For now, since the feature of Domain on Static Allocation is only supported > on ARM Architecture, this commit introduces new CONFIG_STATIC_ALLOCATION to > avoid bringing dead codes in other archs. Similarly to patch #2, I think it would be better to introduce this Kconfig when it is used or after the common code is introduced. This would prevent dead Kconfig. Cheers, > Signed-off-by: Penny Zheng > --- > changes v2: > - new commit > --- > xen/arch/arm/Kconfig | 3 +++ > 1 file changed, 3 insertions(+) > > diff --git a/xen/arch/arm/Kconfig b/xen/arch/arm/Kconfig > index ecfa6822e4..f165db8ecd 100644 > --- a/xen/arch/arm/Kconfig > +++ b/xen/arch/arm/Kconfig > @@ -278,6 +278,9 @@ config ARM64_ERRATUM_1286807 > > If unsure, say Y. > > +config STATIC_ALLOCATION > + def_bool y > + > endmenu > > config ARM64_HARDEN_BRANCH_PREDICTOR > -- Julien Grall