From: Oleksii <oleksii.kurochko@gmail.com>
To: xen-devel@lists.xenproject.org
Cc: :,
committers@xenproject.org, community.manager@xenproject.org,
Kelly Choi <kelly.choi@cloud.com>
Subject: Xen 4.19 release status tracking list [ May ]
Date: Fri, 03 May 2024 18:54:40 +0200 [thread overview]
Message-ID: <32e2d9dddfaa80e8edfaa5a7207c4e7fb7862a45.camel@gmail.com> (raw)
Hello everyone,
I would like to share with you a list for status tracking based on Xen
ML and community members comments:
*** Arm ***:
* Arm cache coloring [
https://lore.kernel.org/xen-devel/20240502165533.319988-1-carlo.nonato@minervasys.tech/
]:
- new patch series version [v8] was sent
* PCI devices passthrough on Arm, part 3 [
https://lore.kernel.org/xen-devel/20240202213321.1920347-1-stewart.hildebrand@amd.com/
]
* DOMCTL-based guest magic region allocation for 11
domUs [
https://lore.kernel.org/xen-devel/20240409045357.236802-1-xin.wang2@amd.com/
]
- new patch series verstion [v4] was sent
* [XEN v6 0/3] xen/arm: Add emulation of Debug Data Transfer
Registers [
https://patchew.org/Xen/20240307123943.1991755-1-ayan.kumar.halder@amd.com/
]
*** PPC ***:
* [PATCH v4 0/6] Early Boot Allocation on Power [
https://lore.kernel.org/xen-devel/cover.1712893887.git.sanastasio@raptorengineering.com/
]:
new patch series version [v4] was sent
*** RISC-V ***:
* [PATCH v8 00/17] Enable build of full Xen for RISC-V
https://lore.kernel.org/xen-devel/cover.1713347222.git.oleksii.kurochko@gmail.com/
]:
- several patches were merged
- new patch series version [v8] were sent
*** x86 ***:
* [PATCH 0/4] iommu/x86: fixes/improvements for unity range checks [
https://lore.kernel.org/xen-devel/20240201170159.66330-1-roger.pau@citrix.com/
]:
- almost patch series have been merged already except the patch:
[PATCH 4/4] iommu/x86: make unity range checking more strict
* [PATCH 0/8] x86: support AVX10.1 [
https://lore.kernel.org/xen-devel/298db76f-d0ee-4d47-931f-1baa1a7546cf@suse.com/
]:
- two patches of patch series are waitng to merged/reviewed:
[PATCH 1/4] amd-vi: fix IVMD memory type checks
[PATCH 4/4] iommu/x86: make unity range checking more strict
* APX support?
* [PATCH v4 0/8] x86emul: misc additions [
https://lore.kernel.org/xen-devel/9dd23064-c79e-4a50-9c71-c0e73b189944@suse.com/
]
* [PATCH v2 00/12] VT-d: SATC handling; ATS: tidying[
https://lore.kernel.org/xen-devel/64b028be-2197-4951-ae5b-32f9eabfa84a@suse.com/
]:
new version was sent [ v2 ]
* [XEN PATCH 0/9] x86: parallelize AP bring-up during boot [
https://lore.kernel.org/xen-devel/cover.1699982111.git.krystian.hebel@3mdeb.com/
]
* [PATCH v2 00/12] x86: memcpy() / memset() (non-)ERMS flavors plus
fallout [
https://lore.kernel.org/xen-devel/8f56a8f4-0482-932f-96a9-c791bebb4610@suse.com/
]
- 6/12 are merged.
* [PATCH v6 0/4] x86/pvh: Support relocating dom0 kernel [
https://patchew.org/Xen/20240327215102.136001-1-jason.andryuk@amd.com/
]
* x86/spec-ctrl: IBPB improvements [
https://patchew.org/Xen/06591b64-2f05-a4cc-a2f3-a74c3c4a76d6@suse.com/
]
*** common ***:
* annotate entry points with type and size" series:
The bulk of this has gone in, but there'll want to be follow-ups.
* [PATCH v2 (resend) 00/27] Remove the directmap [
https://lore.kernel.org/xen-devel/20240116192611.41112-1-eliasely@amazon.com/
]
- 7/27 were merged.
* [PATCH] move __read_mostly to xen/cache.h [
https://lore.kernel.org/xen-devel/f25eb5c9-7c14-6e23-8535-2c66772b333e@suse.com/
]
* [XEN PATCH v2 1/3] xen: introduce STATIC_ASSERT_UNREACHABLE() [
https://lore.kernel.org/xen-devel/42fc6ae8d3eb802429d29c774502ff232340dc84.1706259490.git.federico.serafini@bugseng.com/
]
* MISRA rules updates:
- [PATCH v2] docs/misra/rules.rst update [
https://lore.kernel.org/xen-devel/alpine.DEB.2.22.394.2402131431070.1925432@ubuntu-linux-20-04-desktop/T/#maded3df1bebe68d0fe53c73e89f996ec395a39e5
]: 2/3 were merged.
- [XEN PATCH v3 0/7] address violations of MISRA C Rule 20.7[
https://patchew.org/Xen/cover.1711700095.git.nicola.vetrini@bugseng.com/
]: new patch series version (v3) were sent.
- [XEN PATCH v3 00/16] xen: address violation of MISRA C:2012
Directive 4.10 [
https://patchew.org/Xen/cover.1710145041.git.simone.ballarin@bugseng.com/
]: 2/16 were merged.
* [PATCH v6 00/8] xen/spinlock: make recursive spinlocks a dedicated
type [ https://patchew.org/Xen/20240327152229.25847-1-jgross@suse.com/
]:
- only one patch required to be merged:
https://patchew.org/Xen/20240327152229.25847-1-jgross@suse.com/20240327152229.25847-9-jgross@suse.com/
* [PATCH 0/7] GRUB: Supporting Secure Boot of xen.gz [
https://patchew.org/Xen/20240313150748.791236-1-ross.lagerwall@citrix.com/
]:
* [PATCH v6 0/7] MSI-X support with qemu in stubdomain, and other
related changes:
- new patch version was sent
* [PATCH 0/7] xen/bitops: Reduce the mess, starting with ffs() [
https://patchew.org/Xen/20240313172716.2325427-1-andrew.cooper3@citrix.com/
]:
* [PATCH 0/7] xen/trace: Treewide API cleanup [
https://patchew.org/Xen/20240318163552.3808695-1-andrew.cooper3@citrix.com/
]:
patches were merged to staging:
- [PATCH 3/7] xen/rt: Clean up trace handling
- [PATCH 4/7] xen/sched: Clean up trace handling
* [PATCH v3 0/4] xenwatchdogd bugfixes and enhancements [
https://lore.kernel.org/xen-devel/20240411182023.56309-1-leigh@solinno.co.uk/
]:
new patch series were sent.
* [RFC XEN PATCH v7 0/5] Support device passthrough when dom0 is PVH
on Xen [
https://patchew.org/Xen/20240419035340.608833-1-Jiqian.Chen@amd.com/ ]:
- new patch series were sent [v7].
*** Completed ***:
*** Arm ***:
* xen/arm64: Rework the MMU-off code (idmap) so it is self-
contained
*** x86 ***:
* tools: enable xenstore-stubdom to use 9pfs
*** common ***:
* NUMA: no need for asm/numa.h when !NUMA
* xen: move BUG_ON(), WARN_ON(), ASSERT(), ASSERT_UNREACHABLE() to
xen/bug.h
* xen/lib: introduce generic find next bit operations
* Introduce generic headers
* xen/livepatch: fixes for the pre-apply / post-revert hooks
* limit passing around of cpu_user_regs
Please reply with items you would like to see in 4.19 so that people
know what is happening and prioritize accordingly.
You're welcome to provide a description and use cases of the feature
you're working on.
Have a nice week!
Best regards,
Oleksii
next reply other threads:[~2024-05-03 16:55 UTC|newest]
Thread overview: 6+ messages / expand[flat|nested] mbox.gz Atom feed top
2024-05-03 16:54 Oleksii [this message]
2024-05-06 7:11 ` Xen 4.19 release status tracking list [ May ] Jan Beulich
2024-05-06 8:25 ` Oleksii
2024-05-06 9:26 ` Roger Pau Monné
2024-05-06 9:35 ` Jan Beulich
2024-05-06 10:34 ` Roger Pau Monné
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=32e2d9dddfaa80e8edfaa5a7207c4e7fb7862a45.camel@gmail.com \
--to=oleksii.kurochko@gmail.com \
--cc=committers@xenproject.org \
--cc=community.manager@xenproject.org \
--cc=kelly.choi@cloud.com \
--cc=xen-devel@lists.xenproject.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).