[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[PATCH v3] MAINTAINERS: generalize vm-event/monitor entry
- To: "xen-devel@xxxxxxxxxxxxxxxxxxxx" <xen-devel@xxxxxxxxxxxxxxxxxxxx>
- From: Jan Beulich <jbeulich@xxxxxxxx>
- Date: Thu, 7 Sep 2023 09:45:55 +0200
- Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com; dkim=pass header.d=suse.com; arc=none
- Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=LA8h0yfEMbV6daKal0abZLk8Yk/KcqV4BLNGkjYcORM=; b=ofG6Xo2OaeEUEpyDwby//ZumOiy8mLc9vYQaY4HYKkulo1iaXxiSKkCBGR7teR0wmp8OBRHHkNyOmnPhg3hTZptkU90hqOyUQiqu4uEqmWITXGwPLyJiVb5zE8jDFnx35LQDqCY1HBZD9tdICoXANyNUHGWae4+nh2iVcRc7UFz1xcPgcv9qOd/Ekn6tr/08gKEOUT4oHH1uXQ8SZ/ImTp5H3Bmwck8/zx/o3ggyaMdvfDlBHE2PTloDkI2ZPWwtj4pWXEqBXGK3yyhsIJ/1YRDPcCMaDWouUSn63miLpQhlUkNqil5qvqDc7zQCjexYuXmXexD9Ma5c4O/8Kwz6zg==
- Arc-seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=L/84Y2WlTLutQZERl69MR4hmDOBClwazQ7Y3nvU+Nqf6U778ApXpG2WKSnx6UZZXR7ePdya4JfDXuSVl4q2GkwhmGXHSI/yCM6JI4cJ3DvUi/0wyRIP0xDxcGeJ3pXzKrFkgb3MybzsinZsgoxBrIE0WfF/vWPTcfnbvt3EMKPojGS//WrrA11+o0G61+kO63mRJo1lUfNMtyjYZGJ4lYaTMHTIwhe2d2ZOQonyz0cFRuYr3DHMYCG6T+/No8KI6Uzi4Mg7xRTU7+If6XEDIuPqQb9f6OpqsRKFRGeCJ7PKQZMwLrMImR1sPL0RvpJSBYotj2qwW4b6sdTfVPym3tQ==
- Authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=suse.com;
- Cc: Tamas K Lengyel <tamas@xxxxxxxxxxxxx>, Andrew Cooper <andrew.cooper3@xxxxxxxxxx>, George Dunlap <george.dunlap@xxxxxxxxxx>, Julien Grall <julien@xxxxxxx>, Stefano Stabellini <sstabellini@xxxxxxxxxx>, Wei Liu <wl@xxxxxxx>, Anthony Perard <anthony.perard@xxxxxxxxxx>
- Delivery-date: Thu, 07 Sep 2023 07:46:31 +0000
- List-id: Xen developer discussion <xen-devel.lists.xenproject.org>
Replace Arm- and x86-specific lines with wildcard ones, thus covering
all architectures. Uniformly permit an extra sub-directory level to be
used, as is already the case for xen/include/.
Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
---
v3: Unfold, for F: not being handled as originally expected.
v2: Further fold patterns.
---
Triggered by me looking at the entry in the context of Oleksii's RISC-V
preparatory patch.
--- a/MAINTAINERS
+++ b/MAINTAINERS
@@ -559,14 +559,18 @@ R: Alexandru Isaila <aisaila@bitdefender
R: Petre Pircalabu <ppircalabu@xxxxxxxxxxxxxxx>
S: Supported
F: tools/misc/xen-access.c
+F: xen/arch/*/*/mem_access.c
+F: xen/arch/*/*/monitor.c
+F: xen/arch/*/*/vm_event.c
+F: xen/arch/*/include/asm/*/mem_access.h
+F: xen/arch/*/include/asm/*/monitor.h
+F: xen/arch/*/include/asm/*/vm_event.h
+F: xen/arch/*/include/asm/mem_access.h
+F: xen/arch/*/include/asm/monitor.h
+F: xen/arch/*/include/asm/vm_event.h
+F: xen/arch/*/mem_access.c
F: xen/arch/*/monitor.c
F: xen/arch/*/vm_event.c
-F: xen/arch/arm/mem_access.c
-F: xen/arch/x86/include/asm/hvm/monitor.h
-F: xen/arch/x86/include/asm/hvm/vm_event.h
-F: xen/arch/x86/mm/mem_access.c
-F: xen/arch/x86/hvm/monitor.c
-F: xen/arch/x86/hvm/vm_event.c
F: xen/common/mem_access.c
F: xen/common/monitor.c
F: xen/common/vm_event.c
|