[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: preparations for 4.19.1


  • To: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
  • From: Jan Beulich <jbeulich@xxxxxxxx>
  • Date: Thu, 14 Nov 2024 13:46:12 +0100
  • Autocrypt: addr=jbeulich@xxxxxxxx; keydata= xsDiBFk3nEQRBADAEaSw6zC/EJkiwGPXbWtPxl2xCdSoeepS07jW8UgcHNurfHvUzogEq5xk hu507c3BarVjyWCJOylMNR98Yd8VqD9UfmX0Hb8/BrA+Hl6/DB/eqGptrf4BSRwcZQM32aZK 7Pj2XbGWIUrZrd70x1eAP9QE3P79Y2oLrsCgbZJfEwCgvz9JjGmQqQkRiTVzlZVCJYcyGGsD /0tbFCzD2h20ahe8rC1gbb3K3qk+LpBtvjBu1RY9drYk0NymiGbJWZgab6t1jM7sk2vuf0Py O9Hf9XBmK0uE9IgMaiCpc32XV9oASz6UJebwkX+zF2jG5I1BfnO9g7KlotcA/v5ClMjgo6Gl MDY4HxoSRu3i1cqqSDtVlt+AOVBJBACrZcnHAUSuCXBPy0jOlBhxPqRWv6ND4c9PH1xjQ3NP nxJuMBS8rnNg22uyfAgmBKNLpLgAGVRMZGaGoJObGf72s6TeIqKJo/LtggAS9qAUiuKVnygo 3wjfkS9A3DRO+SpU7JqWdsveeIQyeyEJ/8PTowmSQLakF+3fote9ybzd880fSmFuIEJldWxp Y2ggPGpiZXVsaWNoQHN1c2UuY29tPsJgBBMRAgAgBQJZN5xEAhsDBgsJCAcDAgQVAggDBBYC AwECHgECF4AACgkQoDSui/t3IH4J+wCfQ5jHdEjCRHj23O/5ttg9r9OIruwAn3103WUITZee e7Sbg12UgcQ5lv7SzsFNBFk3nEQQCACCuTjCjFOUdi5Nm244F+78kLghRcin/awv+IrTcIWF hUpSs1Y91iQQ7KItirz5uwCPlwejSJDQJLIS+QtJHaXDXeV6NI0Uef1hP20+y8qydDiVkv6l IreXjTb7DvksRgJNvCkWtYnlS3mYvQ9NzS9PhyALWbXnH6sIJd2O9lKS1Mrfq+y0IXCP10eS FFGg+Av3IQeFatkJAyju0PPthyTqxSI4lZYuJVPknzgaeuJv/2NccrPvmeDg6Coe7ZIeQ8Yj t0ARxu2xytAkkLCel1Lz1WLmwLstV30g80nkgZf/wr+/BXJW/oIvRlonUkxv+IbBM3dX2OV8 AmRv1ySWPTP7AAMFB/9PQK/VtlNUJvg8GXj9ootzrteGfVZVVT4XBJkfwBcpC/XcPzldjv+3 HYudvpdNK3lLujXeA5fLOH+Z/G9WBc5pFVSMocI71I8bT8lIAzreg0WvkWg5V2WZsUMlnDL9 mpwIGFhlbM3gfDMs7MPMu8YQRFVdUvtSpaAs8OFfGQ0ia3LGZcjA6Ik2+xcqscEJzNH+qh8V m5jjp28yZgaqTaRbg3M/+MTbMpicpZuqF4rnB0AQD12/3BNWDR6bmh+EkYSMcEIpQmBM51qM EKYTQGybRCjpnKHGOxG0rfFY1085mBDZCH5Kx0cl0HVJuQKC+dV2ZY5AqjcKwAxpE75MLFkr wkkEGBECAAkFAlk3nEQCGwwACgkQoDSui/t3IH7nnwCfcJWUDUFKdCsBH/E5d+0ZnMQi+G0A nAuWpQkjM1ASeQwSHEeAWPgskBQL
  • Cc: Stefano Stabellini <sstabellini@xxxxxxxxxx>, Julien Grall <julien@xxxxxxx>, Kelly Choi <kelly.choi@xxxxxxxxx>, Anthony PERARD <anthony.perard@xxxxxxxxxx>, Juergen Gross <jgross@xxxxxxxx>, Alejandro Vallejo <alejandro.vallejo@xxxxxxxxx>, "xen-devel@xxxxxxxxxxxxxxxxxxxx" <xen-devel@xxxxxxxxxxxxxxxxxxxx>
  • Delivery-date: Thu, 14 Nov 2024 12:46:32 +0000
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>

On 13.11.2024 16:20, Andrew Cooper wrote:
> On 12/11/2024 1:00 pm, Jan Beulich wrote:
>> the release is due by the end of the month. Please point out backports you 
>> find
>> missing from the respective staging branch, but which you consider relevant.
> 
> Looking over the XenServer patchqueue:

First, overall - that's quite a few. Most not even having a Fixes: tag. Or
in one case having even two of them alongside saying "no functional change".
Plus it would be really nice if someone else could take care of tool stack
backports again.

In more detail:

> These are all bugfixes, some that came from customer bugs:
> 
> e42e4d8c3e2c: tools/misc: xen-hvmcrash: Inject #DF instead of
> overwriting RIP

I'm on the edge here, but since you're asking for it, I'll include it.

> ba709d514aac: x86/viridian: Clarify some viridian logging strings

Not really a backporting candidate imo.

> d81dd3130351: x86/shutdown: change default reboot method preference

I'll include that, despite the different perspective I'm taking.

> 0d69635d27cb: tools/ocaml: Remove '-cc $(CC)' from OCAMLOPTFLAGS
> 8ffcf184affb: tools/ocaml: Fix OCaml libs rules
> 126293eae648: tools/ocaml: Drop the OCAMLOPTFLAG_G invocation
> 1965e9a93074: tools/ocaml: Fix the version embedded in META files

Provided these apply as-is, I'll blindly take these.

> e58a2858d588: x86/boot: Preserve the value clobbered by the load-base
> calculation

Based on its Fixes: tags I probably should have included this one already.

> This is a diagnostic improvement, also from a customer bug:
> 
> 2f413e22fa5e: x86/msr: add log messages to MSR state load error paths

Again - not really a backporting candidate imo.

> These are a SIGPIPE bugfix which happen to also have a perf
> improvement.  I cant remember if we discussed backporting them before. 
> (Juergen/Anthony?)
> 
> 42db2deb5e76: tools/libxs: Fix length check in xs_talkv()
> e2a93bed8b9e: tools/libxs: Rework xs_talkv() to take xsd_sockmsg within
> the iovec
> f050c03ce2ad: tools/libxs: Rationalise the definition of struct xs_handle
> 046efe529e82: tools/libxs: Track whether we're using a socket or file
> ebaeb0c64a6d: tools/libxs: Use writev()/sendmsg() instead of write()
> a17b6db9b007: tools/libxs: Stop playing with SIGPIPE

See the earlier reply to both Jürgen and you.

> These are from a livepatching snafu:
> 
> 3a28da8f4daf: xen/livepatch: remove useless check for duplicated sections
> 8c81423038f1: xen/livepatch: drop load_addr Elf section field
> 86d09d16dd74: xen/livepatch: simplify and unify logic in prepare_payload()
> fa49f4be413c: xen/livepatch: do Xen build-id check earlier
> aa5a06d5d6ed: x86/alternatives: do not BUG during apply
> 
> where the buildid check is much too late.

I certainly agree with taking the last two. The first three though are all
"no functional change", which generally I'd prefer to omit unless they're
strictly prereqs, or diverging from master is deemed to be a severe issue.

> And from looking at staging:
> 
> fa2d8318033e: x86/cpu-policy: Extend the guest max policy max leaf/subleaves
> 
> This fixes a real issue on older AMD systems.

Will include it.

Jan



 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.