[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [PATCH v9 00/11] acquire_resource size and external IPT monitoring
Andrew Cooper writes ("[PATCH v9 00/11] acquire_resource size and external IPT monitoring"): ... > Therefore, I'd like to request a release exception. Thanks for this writeup. There is discussion here of the upside of granting an exception, which certainly seems substantial enough to give this serious consideration. > It [is] fairly isolated in terms of interactions with the rest of > Xen, so the changes of a showstopper affecting other features is > very slim. This is encouraging (optimistic, even) but very general. I would like to see a frank and detailed assessment of the downside risks, ideally based on analysis of the individual patches. When I say a "frank and detailed assessment" I'm hoping to have a list of the specific design and code changes that pose a risk to non-IPT configurations, in decreasing order of risk. For each one there should be brief discussion of the measures that have exist to control that risk (eg, additional review, additional testing), and a characterisation of the resulting risk (both in terms of likelihood and severity of the resulting bug). All risks that would come to a diligent reviewer's mind should be mentioned and explicitly delath with, even if it is immediately clear that they are not a real risk. Do you think that would be feasible ? We would want to make a decision ASAP so it would have to be done quickly too - in the next few days and certainly by the end of the week. Since you mentioned patch 1 and asserted it didn't need a release-ack, I looked at it in a little more detail. It seems to contain a moderate amount of (fairly localised) restructuring. IDK whether XENMEM_acquire_resource is used by non-IPT configurations but I didn't see an assertion anywhere that it isn't. I appreciate that whether something is "straightforward" on the one hand, vs involving "substantial refactoring" on the ohter, or this is a matter of judgement, which I have left up to the commiters during this part of the freeze. But for the record my view is that this patch is not a "straightforward bugfix" and needs a release ack. To give you an idea of what kind of thing I am looking for in a risk assessment, I have written one up for [PATCH v9 03/11] tools/[lib]xl: Add vmtrace_buf_size parameter Ideally I would like to go through a similar process for the other patches. I appreciate that this is rather a more throrough process than we have adopted in the past. Thanks, Ian.
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |