[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Xen 4.19 release status tracking list [ May ]
Hello everyone, I would like to share with you a list for status tracking based on Xen ML and community members comments: *** Arm ***: * Arm cache coloring [ https://lore.kernel.org/xen-devel/20240502165533.319988-1-carlo.nonato@xxxxxxxxxxxxxxx/ ]: - new patch series version [v8] was sent * PCI devices passthrough on Arm, part 3 [ https://lore.kernel.org/xen-devel/20240202213321.1920347-1-stewart.hildebrand@xxxxxxx/ ] * DOMCTL-based guest magic region allocation for 11 domUs [ https://lore.kernel.org/xen-devel/20240409045357.236802-1-xin.wang2@xxxxxxx/ ] - new patch series verstion [v4] was sent * [XEN v6 0/3] xen/arm: Add emulation of Debug Data Transfer Registers [ https://patchew.org/Xen/20240307123943.1991755-1-ayan.kumar.halder@xxxxxxx/ ] *** PPC ***: * [PATCH v4 0/6] Early Boot Allocation on Power [ https://lore.kernel.org/xen-devel/cover.1712893887.git.sanastasio@xxxxxxxxxxxxxxxxxxxxx/ ]: new patch series version [v4] was sent *** RISC-V ***: * [PATCH v8 00/17] Enable build of full Xen for RISC-V https://lore.kernel.org/xen-devel/cover.1713347222.git.oleksii.kurochko@xxxxxxxxx/ ]: - several patches were merged - new patch series version [v8] were sent *** x86 ***: * [PATCH 0/4] iommu/x86: fixes/improvements for unity range checks [ https://lore.kernel.org/xen-devel/20240201170159.66330-1-roger.pau@xxxxxxxxxx/ ]: - almost patch series have been merged already except the patch: [PATCH 4/4] iommu/x86: make unity range checking more strict * [PATCH 0/8] x86: support AVX10.1 [ https://lore.kernel.org/xen-devel/298db76f-d0ee-4d47-931f-1baa1a7546cf@xxxxxxxx/ ]: - two patches of patch series are waitng to merged/reviewed: [PATCH 1/4] amd-vi: fix IVMD memory type checks [PATCH 4/4] iommu/x86: make unity range checking more strict * APX support? * [PATCH v4 0/8] x86emul: misc additions [ https://lore.kernel.org/xen-devel/9dd23064-c79e-4a50-9c71-c0e73b189944@xxxxxxxx/ ] * [PATCH v2 00/12] VT-d: SATC handling; ATS: tidying[ https://lore.kernel.org/xen-devel/64b028be-2197-4951-ae5b-32f9eabfa84a@xxxxxxxx/ ]: new version was sent [ v2 ] * [XEN PATCH 0/9] x86: parallelize AP bring-up during boot [ https://lore.kernel.org/xen-devel/cover.1699982111.git.krystian.hebel@xxxxxxxxx/ ] * [PATCH v2 00/12] x86: memcpy() / memset() (non-)ERMS flavors plus fallout [ https://lore.kernel.org/xen-devel/8f56a8f4-0482-932f-96a9-c791bebb4610@xxxxxxxx/ ] - 6/12 are merged. * [PATCH v6 0/4] x86/pvh: Support relocating dom0 kernel [ https://patchew.org/Xen/20240327215102.136001-1-jason.andryuk@xxxxxxx/ ] * x86/spec-ctrl: IBPB improvements [ https://patchew.org/Xen/06591b64-2f05-a4cc-a2f3-a74c3c4a76d6@xxxxxxxx/ ] *** common ***: * annotate entry points with type and size" series: The bulk of this has gone in, but there'll want to be follow-ups. * [PATCH v2 (resend) 00/27] Remove the directmap [ https://lore.kernel.org/xen-devel/20240116192611.41112-1-eliasely@xxxxxxxxxx/ ] - 7/27 were merged. * [PATCH] move __read_mostly to xen/cache.h [ https://lore.kernel.org/xen-devel/f25eb5c9-7c14-6e23-8535-2c66772b333e@xxxxxxxx/ ] * [XEN PATCH v2 1/3] xen: introduce STATIC_ASSERT_UNREACHABLE() [ https://lore.kernel.org/xen-devel/42fc6ae8d3eb802429d29c774502ff232340dc84.1706259490.git.federico.serafini@xxxxxxxxxxx/ ] * MISRA rules updates: - [PATCH v2] docs/misra/rules.rst update [ https://lore.kernel.org/xen-devel/alpine.DEB.2.22.394.2402131431070.1925432@ubuntu-linux-20-04-desktop/T/#maded3df1bebe68d0fe53c73e89f996ec395a39e5 ]: 2/3 were merged. - [XEN PATCH v3 0/7] address violations of MISRA C Rule 20.7[ https://patchew.org/Xen/cover.1711700095.git.nicola.vetrini@xxxxxxxxxxx/ ]: new patch series version (v3) were sent. - [XEN PATCH v3 00/16] xen: address violation of MISRA C:2012 Directive 4.10 [ https://patchew.org/Xen/cover.1710145041.git.simone.ballarin@xxxxxxxxxxx/ ]: 2/16 were merged. * [PATCH v6 00/8] xen/spinlock: make recursive spinlocks a dedicated type [ https://patchew.org/Xen/20240327152229.25847-1-jgross@xxxxxxxx/ ]: - only one patch required to be merged: https://patchew.org/Xen/20240327152229.25847-1-jgross@xxxxxxxx/20240327152229.25847-9-jgross@xxxxxxxx/ * [PATCH 0/7] GRUB: Supporting Secure Boot of xen.gz [ https://patchew.org/Xen/20240313150748.791236-1-ross.lagerwall@xxxxxxxxxx/ ]: * [PATCH v6 0/7] MSI-X support with qemu in stubdomain, and other related changes: - new patch version was sent * [PATCH 0/7] xen/bitops: Reduce the mess, starting with ffs() [ https://patchew.org/Xen/20240313172716.2325427-1-andrew.cooper3@xxxxxxxxxx/ ]: * [PATCH 0/7] xen/trace: Treewide API cleanup [ https://patchew.org/Xen/20240318163552.3808695-1-andrew.cooper3@xxxxxxxxxx/ ]: patches were merged to staging: - [PATCH 3/7] xen/rt: Clean up trace handling - [PATCH 4/7] xen/sched: Clean up trace handling * [PATCH v3 0/4] xenwatchdogd bugfixes and enhancements [ https://lore.kernel.org/xen-devel/20240411182023.56309-1-leigh@xxxxxxxxxxxxx/ ]: new patch series were sent. * [RFC XEN PATCH v7 0/5] Support device passthrough when dom0 is PVH on Xen [ https://patchew.org/Xen/20240419035340.608833-1-Jiqian.Chen@xxxxxxx/ ]: - new patch series were sent [v7]. *** Completed ***: *** Arm ***: * xen/arm64: Rework the MMU-off code (idmap) so it is self- contained *** x86 ***: * tools: enable xenstore-stubdom to use 9pfs *** common ***: * NUMA: no need for asm/numa.h when !NUMA * xen: move BUG_ON(), WARN_ON(), ASSERT(), ASSERT_UNREACHABLE() to xen/bug.h * xen/lib: introduce generic find next bit operations * Introduce generic headers * xen/livepatch: fixes for the pre-apply / post-revert hooks * limit passing around of cpu_user_regs Please reply with items you would like to see in 4.19 so that people know what is happening and prioritize accordingly. You're welcome to provide a description and use cases of the feature you're working on. Have a nice week! Best regards, Oleksii
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |