From mboxrd@z Thu Jan 1 00:00:00 1970 From: Boris Ostrovsky Subject: Re: [PATCH 5/9] apm32: remove paravirt_enabled() use Date: Fri, 19 Feb 2016 17:17:27 -0500 Message-ID: <56C79477.3060105@oracle.com> References: <1455887316-9223-1-git-send-email-mcgrof@kernel.org> <1455887316-9223-6-git-send-email-mcgrof@kernel.org> <56C72FFB.5090105@oracle.com> <20160219205806.GS25240@wotan.suse.de> Mime-Version: 1.0 Content-Type: text/plain; charset=windows-1252; format=flowed Content-Transfer-Encoding: 7bit Return-path: In-Reply-To: <20160219205806.GS25240@wotan.suse.de> Sender: linux-kernel-owner@vger.kernel.org To: "Luis R. Rodriguez" Cc: bp@alien8.de, x86@kernel.org, linux-kernel@vger.kernel.org, luto@amacapital.net, rusty@rustcorp.com.au, david.vrabel@citrix.com, konrad.wilk@oracle.com, xen-devel@lists.xensource.com List-Id: xen-devel@lists.xenproject.org On 02/19/2016 03:58 PM, Luis R. Rodriguez wrote: > On Fri, Feb 19, 2016 at 10:08:43AM -0500, Boris Ostrovsky wrote: > >> in xen_start_kernel(). Better yet, clear whole .bss. >> >> (This applies to the next patch as well). > So clear_bss() -- oh look, another call that xen_start_kernel() could have made > good use of. :) Can you send a respective patch I can old into this series? > I'm afraid it is by no means obvious to me where it would be safe to do this on > xen_start_kernel(). OK, I'll test it next week, it really should be done irrespective of what you are doing here. -boris