From publicity-bounces@lists.xenproject.org Tue Apr 06 13:40:39 2021
Return-path: <publicity-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xenproject.org
Delivery-date: Tue, 06 Apr 2021 13:40:39 +0000
Received: from list by lists.xenproject.org with outflank-mailman.105959.202598 (Exim 4.92)
	(envelope-from <publicity-bounces@lists.xenproject.org>)
	id 1lTlwd-0002xi-Hs; Tue, 06 Apr 2021 13:40:39 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 105959.202598; Tue, 06 Apr 2021 13:40:39 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <publicity-bounces@lists.xenproject.org>)
	id 1lTlwd-0002xe-Es; Tue, 06 Apr 2021 13:40:39 +0000
Received: by outflank-mailman (input) for mailman id 105959;
 Tue, 06 Apr 2021 13:40:38 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=vBzH=JD=linuxfoundation.org=rromoff@srs-us1.protection.inumbo.net>)
 id 1lTlwc-0002xZ-2D
 for publicity@lists.xenproject.org; Tue, 06 Apr 2021 13:40:38 +0000
Received: from mail-lj1-x236.google.com (unknown [2a00:1450:4864:20::236])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id 2bc55b50-c0a4-49d8-b4cf-76d932542226;
 Tue, 06 Apr 2021 13:40:37 +0000 (UTC)
Received: by mail-lj1-x236.google.com with SMTP id f16so16543948ljm.1
 for <publicity@lists.xenproject.org>; Tue, 06 Apr 2021 06:40:37 -0700 (PDT)
X-BeenThere: publicity@lists.xenproject.org
List-Id: "List for Xen Publicity,
 PR and events" <publicity.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/publicity>,
 <mailto:publicity-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:publicity@lists.xenproject.org>
List-Help: <mailto:publicity-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/publicity>,
 <mailto:publicity-request@lists.xenproject.org?subject=subscribe>
Errors-To: publicity-bounces@lists.xenproject.org
Precedence: list
Sender: "Publicity" <publicity-bounces@lists.xenproject.org>
X-Inumbo-ID: 2bc55b50-c0a4-49d8-b4cf-76d932542226
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=linuxfoundation.org; s=google;
        h=mime-version:references:in-reply-to:from:date:message-id:subject:to
         :cc;
        bh=2SqNBY5SazTTfd7qDkvx5mqTW+/h3GfVmms8LRXXzbI=;
        b=OLTOJveyeyuO4hdTo0mmxODZwsjZ/1YcyLzDc2GZb01Oc4Ia6+JQn7BAUwIPKsOLHk
         rfPQL/7XU1XUe6BE91pYAxax5uQLscccozWzuK+06MsuWgQiEQdj1k9tElEiEn1indIb
         s7iXCZzt1KzzB0TLsQ9cFITjILDjKcrxLb3IY=
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=1e100.net; s=20161025;
        h=x-gm-message-state:mime-version:references:in-reply-to:from:date
         :message-id:subject:to:cc;
        bh=2SqNBY5SazTTfd7qDkvx5mqTW+/h3GfVmms8LRXXzbI=;
        b=sT+DmEpkCOx4qMZKEnMC3lB9pwAP4Lr9nV14uy4PGelqe1gYaMpBcXsOMzTaoN0+A6
         w2OY7+hQBrPjG9RSp2/hHsUVTXinjT9a2L+3l06WQbG/wjOebPpvN7ZtOIV1LsQKxQWT
         P/eDp/X9ispwQ2VuZVdZ9gTAqDeWsi3xvX2TVP9Jy2D2YfrStrzlodSDdYXuHUe5jTqw
         EIid2NTj8IfjFCC5y/O210I3vLVSy2NM1AjGJKYOJ8UMBmwM0RrxwOg0od3nFCR90fGP
         RmFPJTL8EzsHk1wwi1zvbYU09fO6xziFXEqktgUVmgSSBdHEKPdaRSjWw1aE5Bfmn6fZ
         VG+A==
X-Gm-Message-State: AOAM5320qrPuEJofTWJZmX5OvB3FD+CPyk9EsbtIZLPMtt1/oudcJ6DA
	PblCXWBFNyDbbWcQM81/avVG5syev8ziMZzPAGQc+w==
X-Google-Smtp-Source: ABdhPJycQTD/i/5vxUhS+jY6FsLIMC9pWt0Zc+lBt0RqcgL1YzLhaflnXyTvHUwPj2/ad6q8XklmVwq/iB/OoLZVhyc=
X-Received: by 2002:a05:651c:32e:: with SMTP id b14mr19218326ljp.277.1617716436133;
 Tue, 06 Apr 2021 06:40:36 -0700 (PDT)
MIME-Version: 1.0
References: <24666.2231.658788.116255@mariner.uk.xensource.com>
 <9A5898F5-A79F-4420-9414-86590440D9B2@citrix.com> <CA+1LEQvjLe4docgCN-eoD372ObgGW75Df6_rA6U1Zi6YLJp_Rw@mail.gmail.com>
 <24669.52161.941983.881493@mariner.uk.xensource.com> <24673.58484.252387.116243@mariner.uk.xensource.com>
 <CA+1LEQtQn_1Wzjsum350QQS2mtaFhC4Jc+K73Ap1fTjNw+hFxw@mail.gmail.com>
 <24673.60343.17604.771777@mariner.uk.xensource.com> <24684.19823.832795.383049@mariner.uk.xensource.com>
In-Reply-To: <24684.19823.832795.383049@mariner.uk.xensource.com>
From: Rachel Romoff <rromoff@linuxfoundation.org>
Date: Tue, 6 Apr 2021 08:40:24 -0500
Message-ID: <CA+1LEQuEuq02n_Oz5x1eBaWWXnXwHWC0H0VsqZLuxzOm4QmBpQ@mail.gmail.com>
Subject: Re: Xen 4.15 release date selection
To: Ian Jackson <iwj@xenproject.org>
Cc: George Dunlap <George.Dunlap@citrix.com>, 
	Community Manager <community.manager@xenproject.org>, 
	"publicity@lists.xenproject.org" <publicity@lists.xenproject.org>
Content-Type: multipart/alternative; boundary="00000000000085fa2705bf4df589"

--00000000000085fa2705bf4df589
Content-Type: text/plain; charset="UTF-8"

Thanks, I'll get the announcement scheduled for 9 am PT on Thursday.

On Tue, Apr 6, 2021 at 7:00 AM Ian Jackson <iwj@xenproject.org> wrote:

> Ian Jackson writes ("Re: Xen 4.15 release date selection"):
> > I will send you a clear go/no-go by email, by 12:00 UTC on
> > Tuesday the 6th.
>
> Hi.  We are going to go ahead and release Xen 4.15 on this Thursday
> (the 8th).
>
> Thanks,
> Ian.
>


-- 
Rachel Romoff
Pronouns: She/Her
(210) 241-8284
Twitter @rachelromoff

--00000000000085fa2705bf4df589
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">Thanks, I&#39;ll get the announcement scheduled for 9 am P=
T on Thursday.=C2=A0</div><br><div class=3D"gmail_quote"><div dir=3D"ltr" c=
lass=3D"gmail_attr">On Tue, Apr 6, 2021 at 7:00 AM Ian Jackson &lt;<a href=
=3D"mailto:iwj@xenproject.org">iwj@xenproject.org</a>&gt; wrote:<br></div><=
blockquote class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-l=
eft:1px solid rgb(204,204,204);padding-left:1ex">Ian Jackson writes (&quot;=
Re: Xen 4.15 release date selection&quot;):<br>
&gt; I will send you a clear go/no-go by email, by 12:00 UTC on<br>
&gt; Tuesday the 6th.<br>
<br>
Hi.=C2=A0 We are going to go ahead and release Xen 4.15 on this Thursday<br=
>
(the 8th).<br>
<br>
Thanks,<br>
Ian.<br>
</blockquote></div><br clear=3D"all"><div><br></div>-- <br><div dir=3D"ltr"=
 class=3D"gmail_signature"><div dir=3D"ltr">Rachel Romoff<div>Pronouns: She=
/Her<br><div><span style=3D"background-color:rgb(255,255,255)">(210) 241-82=
84</span></div><div><span style=3D"background-color:rgb(255,255,255)">Twitt=
er @rachelromoff</span></div><div><br></div><div><br></div></div></div></di=
v>

--00000000000085fa2705bf4df589--


From publicity-bounces@lists.xenproject.org Thu Apr 08 14:20:46 2021
Return-path: <publicity-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xenproject.org
Delivery-date: Thu, 08 Apr 2021 14:20:46 +0000
Received: from list by lists.xenproject.org with outflank-mailman.107370.205264 (Exim 4.92)
	(envelope-from <publicity-bounces@lists.xenproject.org>)
	id 1lUVWY-0000p9-TP; Thu, 08 Apr 2021 14:20:46 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 107370.205264; Thu, 08 Apr 2021 14:20:46 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <publicity-bounces@lists.xenproject.org>)
	id 1lUVWY-0000p5-QP; Thu, 08 Apr 2021 14:20:46 +0000
Received: by outflank-mailman (input) for mailman id 107370;
 Thu, 08 Apr 2021 14:18:18 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <iwj@xenproject.org>) id 1lUVU9-0008VU-WB
 for publicity@lists.xenproject.org; Thu, 08 Apr 2021 14:18:17 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <iwj@xenproject.org>) id 1lUVU9-00054m-UZ
 for publicity@lists.xenproject.org; Thu, 08 Apr 2021 14:18:17 +0000
Received: from iwj (helo=mariner.uk.xensource.com)
 by xenbits.xenproject.org with local-bsmtp (Exim 4.92)
 (envelope-from <iwj@xenproject.org>) id 1lUVU9-00075k-TS
 for publicity@lists.xenproject.org; Thu, 08 Apr 2021 14:18:17 +0000
Received: from iwj by mariner.uk.xensource.com with local (Exim 4.89)
 (envelope-from <iwj@xenproject.org>)
 id 1lUVU8-0007wn-3U; Thu, 08 Apr 2021 15:18:16 +0100
X-BeenThere: publicity@lists.xenproject.org
List-Id: "List for Xen Publicity,
 PR and events" <publicity.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/publicity>,
 <mailto:publicity-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:publicity@lists.xenproject.org>
List-Help: <mailto:publicity-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/publicity>,
 <mailto:publicity-request@lists.xenproject.org?subject=subscribe>
Errors-To: publicity-bounces@lists.xenproject.org
Precedence: list
Sender: "Publicity" <publicity-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Subject:CC:To:Date:Message-ID:
	Content-Transfer-Encoding:Content-Type:MIME-Version:From;
	bh=6hCos9tvAysZvy9xflZt34LbtTECcueVNICxWpOk47U=; b=UTIS3EJXvHX8LihwcSgR9OAofM
	x0I4gc3XxV06U8TvrD4cDqFypliSWscLy+SqabDrjbQzNlsSVrzYXVWeufjmykwe8MF6uKfnTPzXc
	AKtLr+TYtp9QefC80m82VGnrRG+EVgUKQi+EMITpK48lCWfKlZ7VSisiaQ8T6xAzaxxM=;
From: Ian Jackson <iwj@xenproject.org>
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: 8bit
Message-ID: <24687.4263.894342.559476@mariner.uk.xensource.com>
Date: Thu, 8 Apr 2021 15:18:15 +0100
To: publicity@lists.xenproject.org
CC: Rachel Romoff <rromoff@linuxfoundation.org>
Subject: Draft Xen 4.15 release announcement for xen-announce mailing list
X-Mailer: VM 8.2.0b under 24.5.1 (i686-pc-linux-gnu)

To: xen-announce@lists.xenproject.org
CC: xen-devel@lists.xenproject.org,
    xen-users@lists.xenproject.org
Subject: Xen 4.15 is released
X-Mailer: VM 8.2.0b under 24.5.1 (i686-pc-linux-gnu)
FCC: ~/mail/Outbound
--text follows this line--
Xen 4.15, the product of 9 months' work by the Xen Project community,
is now released.

You can find it here:
  git clone -b RELEASE-4.15.0 https://xenbits.xen.org/git-http/xen.git
  https://downloads.xenproject.org/release/xen/4.15.0/
For more information see the release notes:
  https://wiki.xenproject.org/wiki/Xen_Project_4.15_Release_Notes
There is also the press release:
  https://xenproject.org/2021/04/08/xen-project-hypervisor-4-15/

Xen 4.15 has a number of improvements, ranging from cleanups to
significant new features in a number of areas:
  https://wiki.xenproject.org/wiki/Xen_Project_4.15_Feature_List
(reproduced below).

Thanks and congratulations are due to all the people and organisations
who have contributed.  Well done, everyone!

Ian.
(Xen 4.15 Release Manager)


Notable Features
================

Arm now allows running device models in dom0 (tech preview), allowing
arbitrary devices to be emulated for Arm guests.  Arm also now has
SMMUv3 support (also tech preview), which will improve security and
reliability of device pass-through on Arm systems.

Xen can now export Intel Processor Trace (IPT) data from guests to
tools in dom0, enabling tools like
https://github.com/intel/kernel-fuzzer-for-xen-project or
https://github.com/CERT-Polska/drakvuf-sandbox

Xen now supports Viridian enlightenments for guests with more than 64
vcpus.

Xenstored and oxenstored both now support LiveUpdate (tech preview),
allowing security fixes to be applied without having to restart the
entire host

“PV Shim” mode, for supporting legacy PV guests on HVM-only systems,
continues to be improved; its size was reduced by further factoring
out HVM-specific code. This will also help reduce the size and
security of any PV-only build of the hypervisor.

Unified boot images: It is now possible to create an image bundling
together files needed for Xen to boot into a single EFI binary; making
it now possible to boot a functional Xen system directly from the EFI
boot manager, rather than having to go through grub multiboot.  Files
that can be bundled include a hypervisor, dom0 kernel, dom0 initrd,
Xen KConfig, XSM configuration, and a device tree.

Developed IOREQ server in Xen on Arm for further enablement of VirtIO
protocols as a generic and standardized solution for I/O
virtualization.  Ability to expose a VirtIO block device to a Xen on
Arm guest.  Reference implementation of VirtIO block device for Xen on
Arm (collaboration between Arm, EPAM and Linaro’s project STRATOS)


Features and improvements
=========================

Arm Renesas IPMMU-VMSA support upgraded to Supported, not security
supported (was Tech Preview in 4.14).

Switched x86 MSR accesses to deny by default policy.

Named PCI devices for xl/libxl and improved documentation for xl PCI
configuration format.

Support for zstd-compressed dom0 (x86) and domU kernels.

Reduce ACPI verbosity by default.

Add <code>ucode=allow-same</code> option to test late microcode loading path.

Library improvements from NetBSD ports upstreamed.

x86: Allow domains to use AVX-VNNI instructions.

Added <code>XEN_SCRIPT_DIR</code> configuration option to specify
location for Xen scripts, rather than hard-coding
<code>/etc/xen/scripts</code>.

xennet: Documented a way for the backend (or toolstack) to specify MTU to the frontend.

Some additional affordances in various xl subcommands.

Added workarounds for the following ARM errata: Cortex A53 #843419,
Cortex A55 #1530923, Cortex A72 #853709, Cortex A73 #858921, Cortex
A76 #1286807, Neoverse-N1 #1165522.

On detecting a host crash, some debug key handlers can automatically
triggered to aid in debugging.

Increase the maximum number of guests which can share a single IRQ
from 7 to 16, and make this configurable with
<code>irq-max-guests</code>.


CI loop (gitlab CI)
-------------------

Add Alpine Linux, Ubuntu Focal targets; drop CentOS 6.

Add qemu-based dom0 / domU test for ARM.

Add dom0less aarch64 smoke test.


Ongoing activities
==================

The Xen community has several interesting initiatives, where work is
ongoing and is expected to bear fruit in forthcoming releases.  Some
of the highlights:

Functional Safety
-----------------

Progress continues to be made within the Functional Safety
SIG. Specifications are becoming more concrete and the group is
working with other communities to establish standards. Additionally,
Xen is working with other projects to converge best practices across
communities.

Updates include:

Progress on MISRA-C rules tailored for Xen in collaboration with
Zephyr. MISRA-C is a set of coding guidelines for the language for
safety. The SIG now has a shortlist of MISRA-C rules that apply to our
project and we are currently evaluating static analyzers for each of
them.

Progress on tracking and maintaining safety requirements including
collaboration with Zephyr to build a Doxygen-based infrastructure that
generates safety requirements documents from in-code comments and text
files. It will allow proper maintenance of safety-related artifacts
next to the code under git and keep them up to date easily in the
community.

RISC-V Port
-----------

The Xen community, led by sub-project XCP.ng, is working on a RISC-V
Port for Xen.  Progress includes:

Development of host and guest virtual memory management code, one of
the key components necessary for supporting guest virtualization

Development of  the internal architecture-specific code to conform to Xen common APIs

Other interesting progress
--------------------------

Moving towards enabling PCIe virtualization support for Xen on Arm
(collaboration between Xilinx, Arm, EPAM and Renesas)

“Hyperlaunch”: “Dom0less” pioneered the ability to configure Xen to
launch a static set of virtual machines by Xen at boot time.  But
configuration for these domains was very basic, and focused on
embedded use cases.  “Hyperlaunch” is a new initiative that intends to
make this configuration far more flexible by generalizing it and
introducing a “boot domain” (domB).  Draft design documents for
Hyperlaunch have been posted, and a working group has been formed to
form a plan to complete iron out the details.



