[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [ANNOUNCE] Xen 4.15 - release status, branching tomorrow


  • To: Ian Jackson <iwj@xxxxxxxxxxxxxx>
  • From: Roger Pau Monné <roger.pau@xxxxxxxxxx>
  • Date: Tue, 23 Mar 2021 16:26:36 +0100
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com; dkim=pass header.d=citrix.com; arc=none
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=jy3yDcKswrFvrBEobQc0Ogq4HkkDpnep69HnFYT0CiE=; b=CuB3pBPfoyw6oiWU+0w+AVXd0SJErrDVxyzUdOzngkuoxw0hAoW7PAVzmJ5zo2Pii4EWJrQNrNlXa7PyN+EcbmfnJvQ5C0KsUAE+zDVsEwYkc9UrGh6lUxc032Ml/oGZ7JUfidsZ0vNP9FUWT4BW1Xky0gjwcPBvomEBkOKxMlq9nLj87YYrcYx96tw+Zo9UKZ55WtJoNKyWCiWTomwomhr54yTBsBdzkyrJyUXFhvOHt4uHejEdohguSqGg27h88OSByB1zQVCeeG3Ly5U11OfSwIHh7wjsaRGkQL5/oPiU5hugKddimIu86LQ+VGRzZh1KfTSwCUjSQusnQArnfw==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=NrfDkXTRTDD5b2dUY9Wb4uokYr8DNJ73CSSicbLL8tl24xGaCxYN70iDQIkyC7FzNg+dAIyAPFdmKm9md9t+i8wwoCMrtY2PhdFoifX2sqQiABNSbTBkU4wYM57K+o3gSA1D08LtkFQHK+TejWeIiuj0xGbgCw5KzAe6jmhmY4uPuA/jQgViWn49s1SeAFQmfjhGXgmuEBSc5giXU6GLgbUlZVvdJPKos/vs6QvuM7YoeULpWWMary8wlnkgh0dWsKOiaxvpqJhMeS+bcjYsseeYREyI1AOvaIT+Ev+jvE2viI0ZLG/zakfILNWzIKkFZ0W0wKAQSeSQ7/ZXLdL1/g==
  • Authentication-results: esa1.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
  • Cc: <committers@xxxxxxxxxxxxxx>, Andrew Cooper <andrew.cooper3@xxxxxxxxxx>, Juergen Gross <jgross@xxxxxxxx>, Wei Liu <wl@xxxxxxx>, Jan Beulich <jbeulich@xxxxxxxx>, Frédéric Pierret <frederic.pierret@xxxxxxxxxxxx>, <xen-devel@xxxxxxxxxxxxxxxxxxxx>, <community.manager@xxxxxxxxxxxxxx>
  • Delivery-date: Tue, 23 Mar 2021 15:27:05 +0000
  • Ironport-hdrordr: A9a23:jSDoq6HcRiRG7Z7SpLqFG5HXdLJzesId70hD6mlYVQFVfsuEl8 qngfQc0lvOhCwMXWw78OrsBICrSxrnlaJdy48XILukQU3aqHKlRbsSi7fK7h/BP2nF9uBb3b p9aKQWMrfNJHVzkMqS2maFOvk6xt3vys6VrMfYi0xgVAR7L5xnhj0JaDqzNm1TaE14CYEiFJ yaj/A3wAaIXXgMdMy0Cj0kcoH41r72vanraxIHGBIrgTPm5V+VwYX3HBSC0hAVXykn+8ZGzU H/nxHk/aLmivmny3bnvFP71Yhcm9fq17J4daixo/USQw+Mti+YIL5PdpfHlzAzreGp5j8R4a bxiiZlBetfwTf8emm0pDHkxgXv1i0/gkWSt2OwsD/YjuHSAB48FspdlaJVGyGpmnYIjZVH/4 9gm0KfqpZNAhvLkE3Glqj1fiAvrGWYiz4Gs4co/gVieLpbUpB9h8gj2XkQN5E6ECfz+OkcYZ RTJfCZ3tl6WxendXzD11MfuOCEbzAIMTqtZFMNgcCR2yg+pgEE82IogPYSmXoN7/sGOuJ5zt WBNqxpkYdHRdMNYZR8A/8cQdC2Bnale2O3DF6v
  • Ironport-sdr: IUOLf2P+w7dqzumy+4siTHwLrFm38JVKwl4cGX/efiZz6S/s4XpUw11uBjiI4Bx1mXrJiAwwRT ohQMQGaiUNJM2BK4dRSWeF/qZ1E365sbnXWPCA3fqyaXdlCB2K7Nlj+iYoBOGBU+uoqQysvup+ 0hJE1DWy24y71gRQGPCGlOTfbIT+BrpNpD5pnlK56aOe0kZgbpt58ocjFoyi8hyMy07No6dQfv EDiFOc95Tfz7wnhgjbbUd2U5QSueCZ8jrGAQH8BH3ira8C+hTMpEFsgo4gN6R6XUJWTlVzYSXb 6R8=
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>

On Tue, Mar 23, 2021 at 03:17:38PM +0000, Ian Jackson wrote:
> I think things are looking in reasonable shape.
> 
> I intend to branch off the 4.15 stable branch tomorrow.  I will then
> turn off debug on that branch.  There will be a commit moratorium in
> force for much of the afternoon while the branching is done -
> commmitters please check your mail or irc.
> 
> Any outstanding patches that have a release-ack but have not yet been
> committed should go in ASAP, and certainly by Friday.
> 
> I have reviewed my list of blockers and the conversation that followed
> and there are just three areas that are still of concern to me:
> 
> * io-apic issue on Ryzen 1800X
> 
>    Related Qubes issue tracking this:
>    https://github.com/QubesOS/qubes-issues/issues/6423
>    Information from
>      Jan Beulich <jbeulich@xxxxxxxx>
>      Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
>      Frédéric Pierret <frederic.pierret@xxxxxxxxxxxx>
> 
>   Are we likely to get a fix in the next few days ?
> 
>   I think it may be time to reconcile ourselves to not fixing this,
>   and deciding on a suitable plan B.  Do we need to put something in
>   the release notes, or SUPPORT.md, or implement a mitigation of some
>   kind ?
> 
> * Subject: Re: xenstore_lib.h and libxenstore API/ABI problems
> 
>    In the last mail in that thread, I wrote:   
> 
>    | I suggest, instead, that we:
>    |
>    | In 4.15:
>    |
>    |  * Retain the current soname, but:
>    |  * Delete the tdb internals from the header file and cease to export
>    |    those symbols.
>    |  * Rename the expanding_buffer and sanitise_value functions, to
>    |    properly namespace them, and move them to a private header.
>    |
>    | This is of course technically a breach of the ABI stability rules but
>    | for the reasons I [give above] I don't think it will cause anyone any
>    | trouble.
> 
>    I don't think I have seen any patches in this area.  I'm concerned
>    that this is getting late.  I suspect we may have to punt this to
>    xen-next.
> 
>  * Release notes (feature list), SUPPORT.md.  This is on my plate,
>    although George is helping with the feature list (thanks!)

So there's also the series from Andrew to allow Solaris to boot
without resorting to use the 'msr_relaxed' option:

https://lore.kernel.org/xen-devel/20210316161844.1658-1-andrew.cooper3@xxxxxxxxxx/

This has been R-A:

https://lore.kernel.org/xen-devel/24658.7471.309734.168120@xxxxxxxxxxxxxxxxxxxxxxxx/

But AFAICT it's missing a repost with some minimal adjustments?

If we don't get this in we should document on the release notes that
Solaris guests will likely require 'msr_relaxed=1' option added to the
configuration file in order to work.

Thanks, Roger.



 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.