[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: preparations for 4.13.2 and 4.12.4


  • To: Julien Grall <julien@xxxxxxx>
  • From: Bertrand Marquis <Bertrand.Marquis@xxxxxxx>
  • Date: Fri, 11 Sep 2020 15:36:03 +0000
  • Accept-language: en-GB, en-US
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass header.d=arm.com; arc=none
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=jLvLCAlXL9ZX93RsMUrYjWGT/J2ZyHcQKOxE2P1Tl2s=; b=EoHvOSEPJlEeRgztc1hGWlPKq0vxiqjM2o0HT2d68lU3omlQeMRGquDN8gQvvTNZs4W+e1BTjkg2iqUPbqnDQBNF6ImRMEILihgbYnFdLmGaA06kiSx83FNVmGnRSqvR3wKdhX7kWsek0rZtyyFFk+1vDkATDyDlnBMnM1I26Vo0YFXyE2RgZK5J57Mb3jWPBFk4EsZnmU18Ex4Z/qjJzqgp6GPE7IL53IRZLoWYp5VKVJ0N+Ibt89OviPaPf7xTptNB5S2f/sk2e/sDBXt0FP3FBJisAv8jXLX1bEINfvh58eTvxHj29gKaoIihovZ6aZP8oKifQpzd7Qu9uR04uw==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=L3qU5+cWVbORhH+CrEtGGT3/P+ZX4Z7cNIwg5MVtgQ/98pjQu8i+qN0y5foCEYB766kGoQt//OOsnxdd7mv8o2QlIxci7nYhuEz+VVjxbtBl0af0Tufu0XKIvtpLHUKKpbEVZAQAEkNtD1TeNVH035kjEHwCuTKTYvFnCyYhsJLy0rYgubZQKaRQixHuiV8Z1UfC+2wRqRHhFOriCXq+tjVuS0ATHEW1DaHZwkmcVzGa7FanUEy3fzAE5w/YMbhn6YINvj2IpM8PS3IvUa1OX3KRmFsqGJe+35lvlU9omjLDx0Bl+U1vKV4I+IWayiNd9ZJ58W+XnW58fxgGPkUXyQ==
  • Authentication-results-original: xen.org; dkim=none (message not signed) header.d=none;xen.org; dmarc=none action=none header.from=arm.com;
  • Cc: Jan Beulich <jbeulich@xxxxxxxx>, "xen-devel@xxxxxxxxxxxxxxxxxxxx" <xen-devel@xxxxxxxxxxxxxxxxxxxx>, George Dunlap <george.dunlap@xxxxxxxxxx>, Stefano Stabellini <sstabellini@xxxxxxxxxx>, Ian Jackson <ian.jackson@xxxxxxxxxx>, Wei Liu <wl@xxxxxxx>, Anthony Perard <anthony.perard@xxxxxxxxxx>
  • Delivery-date: Fri, 11 Sep 2020 15:36:56 +0000
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>
  • Nodisclaimer: true
  • Original-authentication-results: xen.org; dkim=none (message not signed) header.d=none;xen.org; dmarc=none action=none header.from=arm.com;
  • Thread-index: AQHWiD10WcdFT9qIdEquGSa2/T2AM6ljb4MAgAAFNoCAAAFogIAACDSAgAATsgA=
  • Thread-topic: preparations for 4.13.2 and 4.12.4


> On 11 Sep 2020, at 15:25, Julien Grall <julien@xxxxxxx> wrote:
> 
> Hi Bertrand,
> 
> On 11/09/2020 14:56, Bertrand Marquis wrote:
>>> On 11 Sep 2020, at 14:51, Julien Grall <julien@xxxxxxx> wrote:
>>> 
>>> Hi Bertrand,
>>> 
>>> On 11/09/2020 14:32, Bertrand Marquis wrote:
>>>>> On 11 Sep 2020, at 14:11, Jan Beulich <jbeulich@xxxxxxxx> wrote:
>>>>> 
>>>>> All,
>>>>> 
>>>>> the releases are about due, but will of course want to wait for the
>>>>> XSA fixes going public on the 22nd. Please point out backports
>>>>> you find missing from the respective staging branches, but which
>>>>> you consider relevant. (Ian, Julien, Stefano: I notice there once
>>>>> again haven't been any tools or Arm side backports at all so far
>>>>> since the most recent stable releases from these branches. But
>>>>> maybe there simply aren't any.)
>>>>> 
>>>>> One that I have queued already, but which first need to at least
>>>>> pass the push gate to master, are
>>>>> 
>>>>> 8efa46516c5f hvmloader: indicate ACPI tables with "ACPI data" type in e820
>>>>> e5a1b6f0d207 x86/mm: do not mark IO regions as Xen heap
>>>>> b4e41b1750d5 b4e41b1750d5 [4.14 only]
>>>>> 
>>>>> On the Arm side I'd also like to ask for
>>>>> 
>>>>> 5d45ecabe3c0 xen/arm64: force gcc 10+ to always inline generic atomics 
>>>>> helpers
>>>> +1
>>>> Could those fixes also be considered:
>>>> 3b418b3326 arm: Add Neoverse N1 processor identification
>>>> 858c0be8c2 xen/arm: Enable CPU Erratum 1165522 for Neoverse
>>>> 1814a626fb xen/arm: Update silicon-errata.txt with the Neovers AT erratum
>>> The processor is quite new so may I ask why we would want to backport on 
>>> older Xen?
>> 4.14 at least would be good as it is the current stable and N1SDP is support 
>> in Yocto which is based on 4.14.
> While I understand external project are often based on stable release, I 
> don't want to always backport errata. Some of them are quite involved and 
> this is a risk for others.
> 
> In this case, the erratum has already been implemented for other processors. 
> So the risk is minimal.
> 
>> But as the official one will be on next Yocto release this would be ok to 
>> consider only 4.14 here.
> 
> 4.14 only would be my preference.

This is ok for me if we have all those only in 4.14 (errata and FP/SIMD).

Cheers
Bertrand




 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.