[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: preparations for 4.16.4 and 4.17.1


  • To: Jan Beulich <jbeulich@xxxxxxxx>, "xen-devel@xxxxxxxxxxxxxxxxxxxx" <xen-devel@xxxxxxxxxxxxxxxxxxxx>
  • From: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
  • Date: Mon, 27 Mar 2023 11:55:41 +0100
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com; dkim=pass header.d=citrix.com; arc=none
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=qtcOmsZSbzUx/yxNvzMjA5n2O+ElOAmElaLLWC0VbRY=; b=IfvLRPNAfz/ddOg0tzL/ExuVfAmO9zaSloSOKweEbD55AmVnzhw/36j21Bn5Xb+kZalsA13Su8a9qWRYkZ1z1s1+pLMmj2QkrYjBp1SzcRJRvQzYAUCjXeqtgK8PHQhDkuTxoCzmz6w5WcnGPfNoDA6IpRvN7/5OmpbY580xwS4NdXflQBbeahGNA47kKpjwHT8VO3wZfud8DdOkK3hGUW8fXb6dOicsHuZxb8BpQF2YMfYPlUXk6Z0Zr8mz40/qps9D+2LBAj5YAnEiCIVZhTofhyZW7SvLF1LpOx48e/CuNq05Q5BPCuO0PDPxtndVnsXUYCVyOVHRZWmGQBId9Q==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=kT8F3dl76WIqZ++DXXM1klSvFHa0ntjhvORyDEcoz6zkNwipK4WzcOOslVgzgnf1Cu5jlX5EQ4A8Ixl9fWgO/rwPVOe+3zjggGzgrLcPZtly4Pbdr7wZ4BJ6U8zxstYPwbMyjd+L4xPvyXmHlGaX0mQZP/gAzH/KLocO7/5vwJbwGA9Zne4waVkNjUJfJqJuhf9Y/ixqI72TkSaDVpy83pRV6mUntB8J9hKH6Mf2jxH8cDrvjntGjCpB6RN2JZ5uFngE6aq9NT39kvA96e+CuC573s0SlGj0OHb3kKaPoNJoWLL12sAqqcN1PwSDZSmog6ohVhoR+o1nb9e6vj6ljw==
  • Authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=citrix.com;
  • Cc: George Dunlap <george.dunlap@xxxxxxxxxx>, Stefano Stabellini <sstabellini@xxxxxxxxxx>, Wei Liu <wl@xxxxxxx>, Anthony Perard <anthony.perard@xxxxxxxxxx>, Julien Grall <julien@xxxxxxx>
  • Delivery-date: Mon, 27 Mar 2023 10:56:02 +0000
  • Ironport-data: A9a23:OxAuaqAsNZySzRVW/+Piw5YqxClBgxIJ4kV8jS/XYbTApDIl1DFVz WsXWWnQaKuCMzGjc9kibdnj8xwA7ZbRmoVgQQY4rX1jcSlH+JHPbTi7wuUcHAvJd5GeExg3h yk6QoOdRCzhZiaE/n9BCpC48T8nk/nOHuGmYAL9EngZbRd+Tys8gg5Ulec8g4p56fC0GArIs t7pyyHlEAbNNwVcbyRFu8pvlDs15K6p4GhC4QRnDRx2lAS2e0c9Xcp3yZ6ZdxMUcqEMdsamS uDKyq2O/2+x13/B3fv8z94X2mVTKlLjFVDmZkh+AsBOsTAbzsAG6Y4pNeJ0VKtio27hc+ada jl6ncfYpQ8BZsUgkQmGOvVSO3kW0aZuoNcrLZUj2CA6IoKvn3bEmp1T4E8K0YIw0eImIn9f7 NAhJjkGaS+Cutvqzbjkc7w57igjBJGD0II3nFhFlWucIdN9BJfJTuPN+MNS2yo2ioZWB/HCa sEFaD1pKhPdfxlIPVRRA5U79AuqriCnL3sE9xTI++xruQA/zyQouFTpGPPTdsaHWoN+mUGAq 3id12/4HgsbJJqUzj/tHneE37eVzX6rBNxOfFG+3v00vUGq2V1OMgBIcwOnhP7lqkKFZc0Kf iT4/QJr98De7neDTNPwQhm5q36spQMHVpxbFOhSwBGAzO/Y7hiUAkAATyVdc5o2uckuXzso2 1SV2dTzClRHq6aJQHiQ8rOVqzKaOiUPK2IGIygeQmMt/N3LsIw1yBXVQb5LErOxj9DzMSH9x XaNtidWulkIpcsC1qH+8VWchTup/sLNVlRtul+RWX+55ARkYoLjf5av9VXQ8fdHKsCeU0WFu 38H3cOZ6YjiEK2wqcBEe81VdJnB2hpPGGS0bYJHd3X5ywmQxg==
  • Ironport-hdrordr: A9a23:Br563apsHZmM5NUIjU6WQmAaV5oleYIsimQD101hICG9E/b1qy nKpp8mPHDP5wr5NEtPpTnjAsm9qALnlKKdiLN5Vd3OYOCMghrKEGgN1/qG/xTQXwH46+5Bxe NBXsFFebnN5IFB/KTH3DU=
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>

On 21/03/2023 2:30 pm, Jan Beulich wrote:
> All,
>
> the former release is due in a couple of weeks time, the latter a week
> or two later. Note that with us following the 4 month cadence pretty
> strictly this time, 4.16.4 isn't expected to be the last ordinary stable
> release from the 4.16 branch, yet (unless, of course, we end up slipping
> significantly).
>
> Please point out backports you find missing from the respective staging
> branch, but which you consider relevant. I have one change queued on top
> of what I've pushed to the branches earlier today, simply because it
> hasn't passed the push gate on master yet:
>
> 0d2686f6b66b AMD/IOMMU: without XT, x2APIC needs to be forced into physical 
> mode

All subsequent to this email, but for completeness:

6d14cb105b x86/shadow: Fix build with no PG_log_dirty (all trees, as
this was a bug in XSA-427)

bc3c133841 x86/nospec: Fix evaluate_nospec() code generation under Clang

~Andrew



 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.