[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Xen 4.17 release: Current status before the feature freeze


  • To: "xen-devel@xxxxxxxxxxxxxxxxxxxx" <xen-devel@xxxxxxxxxxxxxxxxxxxx>
  • From: Henry Wang <Henry.Wang@xxxxxxx>
  • Date: Mon, 5 Sep 2022 03:44:33 +0000
  • Accept-language: zh-CN, en-US
  • Arc-authentication-results: i=2; mx.microsoft.com 1; spf=pass (sender ip is 63.35.35.123) smtp.rcpttodomain=lists.xenproject.org smtp.mailfrom=arm.com; dmarc=pass (p=none sp=none pct=100) action=none header.from=arm.com; dkim=pass (signature was verified) header.d=armh.onmicrosoft.com; arc=pass (0 oda=1 ltdi=1 spf=[1,1,smtp.mailfrom=arm.com] dkim=[1,1,header.d=arm.com] dmarc=[1,1,header.from=arm.com])
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass header.d=arm.com; arc=none
  • Arc-message-signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=bWoQ9ZSYFjnjyRnksdC3j5tqGGnmAdf0hNC572h/55M=; b=DMo+O8v5A9qmdrarwT8B3M3tsKG5uG+sBQUizcIgSTut2lCh2yJKh0BEpO0pbP2RQnubp4SplZ+/ry4HNHD7EAvZwArRya9XXSPT175BdBq3/YU/IcfN6Km8i2Hod9JQGXOhkX1em4BQy/D61DMPa2LdRkusLj7G2fgrh87S5i+Mt7ZWYvDmXM2AKFLNJz2PfJ2nzTJPhE9c5vwTv4Pwz5nyrHXJle2oV1kZUYfeNEWTKtEEXeoA4dbkyZR3bw8Dj4cYtslE7DdH7KIyePp/NLM8T18QSn9L1JiBnXjYsybomjN5hPDzeqIpsx9J7cjmFBr+bTpbh/4lb3+xJPB9XA==
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=bWoQ9ZSYFjnjyRnksdC3j5tqGGnmAdf0hNC572h/55M=; b=XabJUdUw8XAST1Jzv3l7Xp8GJolFwoE0je2NJFJMVJP7Lxz9vYohJvoJbARG/Qz1NXYgFsVR5W1l7gVHSFeK2yXlysk+3lolBId49zABLPoLpQ6YniFWFJEx4feh1vOig/4FG01uyZLTL+eRFbfX3Luv2Ur9DlbexyuYWtDXRonUUqklJ7cmx8VnOjCJq5/DWc5IQIMylBtNhvudW9B/QFtwDEo7QYwDYFgJDx0NK1N6uJTRnXHm/1XgSqTIMUSM1i34L7Kc443sJxv8IeEO/e/9jp+nEJpfqmkNU1ywIBwHfKaPYc3mEx7pCxkRUHDdPMUekceHL+lFZlXtv6KZeA==
  • Arc-seal: i=2; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=pass; b=YtAsGO3l/u6f2na0w7n4UciwNdBSeeo8kFF4br5DBZMk9fxVaQxYK2XuEx2XilG+IpCYj2qja+CnkQHc+eGla+9wO6Yk4DUfis2xnIg+QRFjQvj7yxdsBWwe8ctrUh9Wp8fQHvWi37QuE9Q+fyiPsCdM3tA4xT2Ur7SFE8rY+woZqZmLRIBiXHTUJau5npa2EKifO+w/prnoFWGuqtYrZN5uvOO7q50mgzXriZqzrP5SYqAJlotXE/wPp+cf7Kn1oN86M+dEtKIo4lobl8iQuqpq86ctFgfd2fHADHujNsNfgkWtf2zuXWI4UQ99Ioh3AU07zbtIV8XcBWKMRrS5IQ==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=FMA7lBTnWr6WW47EYu214ws/uifdFJHojNE981QHzOnHoc1DnFH8j6RQ5IzRTnaGJolirwR2P48Da+qKdx9WOUCX4TjJrm8arTVklrLZLWV9Vu+cuKf6unkqbMnOsit3L7V/jyw3YEMD+O3ztk5EVN4ji3at6Drtv+0VLh5tcU9lWDSSMicDEYNH8DOJeWxKwBlNqebask9Q8TlYwZ3BCBdPhd2Yezck9WIIzZjAaqICq2ZqDFpA4xpr7S1Iw24l5yvjLHNaMZutiQwKfqahpm29SDUx3/vFY/34ZGZvRgavUTyLFXm4UPiedsX/1Sh2wLLoozpnA+pjwjfx3Zr03w==
  • Authentication-results-original: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=arm.com;
  • Cc: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>, George Dunlap <george.dunlap@xxxxxxxxxx>, Jan Beulich <jbeulich@xxxxxxxx>, "christopher.w.clark@xxxxxxxxx" <christopher.w.clark@xxxxxxxxx>, "christopher.clark@xxxxxxxxxx" <christopher.clark@xxxxxxxxxx>, Bertrand Marquis <Bertrand.Marquis@xxxxxxx>, Julien Grall <julien@xxxxxxx>, Julien Grall <jgrall@xxxxxxxxxx>, Stefano Stabellini <stefano.stabellini@xxxxxxxxxx>, "sstabellini@xxxxxxxxxx" <sstabellini@xxxxxxxxxx>, "jgross@xxxxxxxx" <jgross@xxxxxxxx>, Andrew Cooper <andrew.cooper3@xxxxxxxxxx>, Roger Pau Monné <roger.pau@xxxxxxxxxx>, Anthony PERARD <anthony.perard@xxxxxxxxxx>, Volodymyr Babchuk <Volodymyr_Babchuk@xxxxxxxx>, Wei Liu <wl@xxxxxxx>, "Wei Liu (LSG)" <liuwe@xxxxxxxxxxxxx>
  • Delivery-date: Mon, 05 Sep 2022 03:45:18 +0000
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>
  • Nodisclaimer: true
  • Original-authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=arm.com;
  • Thread-index: AdjA2VmJ6EcVoZ5cTOOgVSRHep4cQA==
  • Thread-topic: Xen 4.17 release: Current status before the feature freeze

Hi all,

As the feature freeze date is around the corner (Sep. 9, 2022) and we are
currently summarizing the series for the release, here are the list of series
pending in the mailing list. Please add the ones that I probably missed.
Thank you very much!

Note that the blocker, automation, Arm lists should be accurate for tracking
the 4.17 release IMHO. More inputs and clarifications might needed to clarify
if all series in x86, tools and common lists are going to the Xen 4.17 release.

Also, as agreed from the September community call, the tracking of Xen 4.17
release will happen both in the mailing list and the Gitlab. I will send the 
Gitlab
link once the work is done. Thanks!

** Blocker List **:
1. Patch: x86: enable interrupts around dump_execstate()
https://patchwork.kernel.org/project/xen-devel/patch/e717897f-980d-ad44-31d9-39f5e7e1c45e@xxxxxxxx/
Status: Waiting for review.

2. The fix of libvirt after the virtio support in toolstack
Status: The OSSTEST seems to work properly, apart from what Jan
asked in IRC - the qemu and omvf OSSTEST might need a force push.
(I am not sure if this has been fixed so I just carried this)

3. [v2] x86/PV: issue branch prediction barrier when switching 64-bit guest to 
kernel mode
https://patchwork.kernel.org/project/xen-devel/list/?series=661061
Status: Need review.

4. Licensing issues and details
https://lore.kernel.org/xen-devel/b58f5340-d4fa-df9d-89de-6137005add77@xxxxxxxxxx/T/#u
According to Andrew, relicensing device_tree_defs.h is a release blocker

** Arm **:
1. static shared memory on dom0less system
https://patchwork.kernel.org/project/xen-devel/list/?series=661838
Status: Need v7 from author.

2. populate/unpopulate memory when domain on static allocation
https://patchwork.kernel.org/project/xen-devel/list/?series=672665
Status: Patch #6 needs review.

3. xen/pci: implement is_memory_hole for ARM
https://patchwork.kernel.org/project/xen-devel/list/?series=673155
Status: Patch #2 has comments and probably need a v3.

4. Introduce reserved heap
Status: Need a v2.

5. xen/arm: smmuv3: Merge Linux fixes to Xen
https://patchwork.kernel.org/project/xen-devel/list/?series=673634
Status: Need a v3.

** Automation **
1. GitLab CI cleanup and boot time cpupools test
https://patchwork.kernel.org/project/xen-devel/list/?series=673488
Status: Need CI maintainer's review on Patch #1 #2, need author's
action for Patch #3.

2. automation: Test a pv network interface under dom0less enhanced
https://patchwork.kernel.org/project/xen-devel/list/?series=666128
Status: Need reviews.

** x86 **:
1. [v2] x86: show_hvm_stack() requires enabled interrupts
https://patchwork.kernel.org/project/xen-devel/list/?series=667114
Status: Need reviews.

2. [v2] x86: help inlining of functions involving alternative_call()
https://patchwork.kernel.org/project/xen-devel/list/?series=667117
Status: Need reviews.

3. x86/spec-ctrl: Reduce HVM RAS overhead
https://patchwork.kernel.org/project/xen-devel/list/?series=666983
Status: Patch #1 reviewed. Patch #2 discussion going on.

4. Intel Hardware P-States (HWP) support
https://patchwork.kernel.org/project/xen-devel/list/?series=666690
Status: Need reviews.

5. x86/hvm: Improve hvm_set_guest_pat() code generation again
https://patchwork.kernel.org/project/xen-devel/list/?series=666603
Status: Waiting actions from author.

6. x86/AMD: check microcode size against CPUID-supplied limit
https://patchwork.kernel.org/project/xen-devel/list/?series=666515
Status: Need review.

7. xen/x86: import linkage.h and clean up x86/kexec.S and x86/entry.S
https://patchwork.kernel.org/project/xen-devel/list/?series=665401
Status: Patch #1 #3 merged. Patch #2 #4 need actions from author.

8. x86: limit issuing of IBPB during context switch
https://patchwork.kernel.org/project/xen-devel/list/?series=662741
Status: Need replies from maintainer

9. XSA-407 followon fixes
https://patchwork.kernel.org/project/xen-devel/list/?series=660818
Status: Patch #3 reviewed with further actions from author. Patch
#1 #2 merged.

10. x86/irq: switch x2APIC default destination mode
https://patchwork.kernel.org/project/xen-devel/list/?series=655330
Status: Patch #1 merged. Others need review.

11. [PATCH v2 00/12] x86: memcpy() / memset() (non-)ERMS flavors plus fallout
Status: Some parts committed, some parts entirely uncommented on.

12. [PATCH 0/2] x86/vMCE: address handling related adjustments
Status: No comments at all so far.

13. [PATCH v3 0/5] x86/mwait-idle: (remaining) SPR + (new) ADL support
https://patchwork.kernel.org/project/xen-devel/list/?series=668735
Status: Patch #1 #3 #5 need reviews.

14. [PATCH v2 0/8] x86emul: a few small steps towards disintegration
Status: Entirely ignored for about a year (since v1 submission).

15. [PATCH 00/11] x86: support AVX512-FP16
Status: v1 was reviewed, but some of the review comments need further
clarifying before Jan can sensibly make/submit v2. Note that this depends
on item 22 (albeit if absolutely necessary it could be re-based ahead).

16. Device tree based NUMA support for Arm - Part#2
https://patchwork.kernel.org/project/xen-devel/list/?series=673455
Status: Need reviews for Patch #1 #2 #4 #5.

17. [v2] x86/public: move XEN_ACPI_ in a new header
https://patchwork.kernel.org/project/xen-devel/list/?series=670995
Status: Ready to be merged.

18. x86/PVH: restore VMX APIC assist for Dom0
https://patchwork.kernel.org/project/xen-devel/list/?series=670123
Status: Need review

** toolstack **:
1. Toolstack build system improvement, toward non-recursive makefiles
https://patchwork.kernel.org/project/xen-devel/list/?series=666960
Status: Partially committed. Patch #1, #8 #17 needs an ack from related
maintainers. More reviews needed for Patch from #20

2. libxl smbios support
https://patchwork.kernel.org/project/xen-devel/list/?series=666694
Status: Need reviews.

3. Virtio toolstack support for I2C and GPIO on Arm
https://patchwork.kernel.org/project/xen-devel/list/?series=669685
Status: Need reviews.

4. tools/ocaml code and build cleanups
https://patchwork.kernel.org/project/xen-devel/list/?series=664150
Status: Patch #2 #5 #6 merged. Others need actions from author.

5. [v2,1/4] tools: remove xenstore entries on vchan server closure
https://patchwork.kernel.org/project/xen-devel/list/?series=659375
Status: Need reviews for patch #3 #4.

6. [PATCH v7 00/11] libs/guest: new CPUID/MSR interface
Status: Largely reviewed, but there was something Andrew's input
was needed on, or he wasn't happy with.

7. tools/xenstore: add some new features to the documentation
https://patchwork.kernel.org/project/xen-devel/list/?series=665064
Status: Patch #2 merged. Only patch #5 is not properly reviewed/acked.
Discussion seems going on and (probably?) needs a respin.

8. acpi: Add TPM2 interface definition and make the TPM version configurable.
https://patchwork.kernel.org/project/xen-devel/list/?series=672588
Status: Need action from author.

9. Use direct I/O for loop devices
https://patchwork.kernel.org/project/xen-devel/list/?series=668537
Status: Need inputs from reviewer/maintainer.

10. x86/hvmloader: Fixes/improvements
https://patchwork.kernel.org/project/xen-devel/list/?series=670606
Status: Need actions from author.

** XSM **:
1. [v12] xsm: refactor flask sid alloc and domain check
https://patchwork.kernel.org/project/xen-devel/list/?series=666302
Status: Need review.

** drivers **:
1. Add Xue - console over USB 3 Debug Capability
https://patchwork.kernel.org/project/xen-devel/list/?series=673630
Status: Need reviews for #1 #2 #4 #9 #10

2. PCI: avoid bogus calls to get_pseg()
https://patchwork.kernel.org/project/xen-devel/list/?series=666322
Status: I am not sure if this is superseded by
PCI: re-work pci_get_pdev() and friends, if so please ignore this.

** Common **:
1. xen: add late init call in start_xen
https://patchwork.kernel.org/project/xen-devel/list/?series=664963
Status: Need actions from author.

2. xen/wait: Improvements
https://patchwork.kernel.org/project/xen-devel/list/?series=660565
Status: Need reviews for patch #4 #5.

3. xen/sched: fix cpu hotplug
https://patchwork.kernel.org/project/xen-devel/list/?series=667963
Status: Need actions from author for Patch #2, need confirmation
from maintainer for Patch #3.

4. Hyperlaunch
https://patchwork.kernel.org/project/xen-devel/list/?series=657187
Status: Need actions from author.

5. [PATCH 0/9] gnttab: further work from XSA-380 / -382 context
Status: Some parts are controversial, but this shouldn't prevent the
reviewing / progressing of non-controversial ones there (7-9).

6. [XEN PATCH v2 0/4] xen: rework compat headers generation
Status: The 3rd patch needs reviewing by someone speaking enough Perl.

7. MISRA fixes.
https://patchwork.kernel.org/project/xen-devel/list/?series=672591
Status: Need review.

8. Config.mk: correct PIE-related option(s) in EMBEDDED_EXTRA_CFLAGS
https://patchwork.kernel.org/project/xen-devel/list/?series=670926
Status: Need review.

9. Make XEN_FW_EFI_MEM_INFO easier to use
https://patchwork.kernel.org/project/xen-devel/list/?series=670812
Status: Need confirmation from maintainer

10. [XEN,v2] build: Fix x86 out-of-tree build without EFI
https://patchwork.kernel.org/project/xen-devel/list/?series=668331
Status: Reviewed but not merged.

11. [XEN] MAINTAINERS: CC Anthony on Xen's build system changes
https://patchwork.kernel.org/project/xen-devel/list/?series=667992
Status: I guess this need a v2?

Kind regards,
Henry



 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.