[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: Call for tools backports (was Re: preparations for 4.13.3)


  • To: Ian Jackson <iwj@xxxxxxxxxxxxxx>, Julien Grall <julien@xxxxxxx>
  • From: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
  • Date: Fri, 19 Mar 2021 11:57:16 +0000
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com; dkim=pass header.d=citrix.com; arc=none
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=lsqooOdB76lGAtjkkaoc3F6WpDipErIvdHTplSG30tU=; b=mHo2RkuH9HpCLgguFij5RCInYwPgKxleWOQs7w1iNwu2bJj0TtaaEMbQx2H7n+KRa+T5a5ULHvA4O6tv1U7pjnARaN+1glBRM0VoOnQSZLfvfL6tXA2vIoSvBp22qw0UfuK23uBNH8TesTfDsN2UCdI/FE+HM5fu8LFsLkmJewl0X9YUvvqjp0Gh8xBfeJp+rXIWwMFTTWQ86uej24jvdgkqIHLAvNRjkH8d39bIbMWTdOGItodWszNUD9DH89Yz3lWYffJA1g/3b4107ONJaIEM2RTE86Y065Iov1Erzmz25jm7UQZbM7kWeSbXuGIL6uNplZYdk1szEIEJjTQYtQ==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=gvvEWHqq2zO6hVcWw77oY71ABWa9Y+KRV9Shx5MWqsidXxd9/KkSqKGGQ6L15NG/7jU+XzFFGjCaygrNbOV3KW+0IhmaP8K8ddDkZz855J/GoK7KRpTRpgGPrPYIEBbUYDhdB8jX0MyZzNb173kPfGlUcvYCY0R++vWJQz9X+gcB1rC7AzIsVEKfmdew1txe+PiqFYkTpbuVod/wOtxyoi9nStnfZkgamTIMyMD2MXcSxNsusNJeVB6lZqnnzTbfOWm1xA3AKf+jwplO8xRzk5bXkX/xEQY5xiTjADFhulZRjL55yJy0ZebRCYSRMX7xbXVXgzuALFOYEx0EAuSbxQ==
  • Authentication-results: esa2.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
  • Cc: Jan Beulich <jbeulich@xxxxxxxx>, "xen-devel@xxxxxxxxxxxxxxxxxxxx" <xen-devel@xxxxxxxxxxxxxxxxxxxx>, Stefano Stabellini <sstabellini@xxxxxxxxxx>, George Dunlap <george.dunlap@xxxxxxxxxx>, Wei Liu <wl@xxxxxxx>, Anthony Perard <anthony.perard@xxxxxxxxxx>
  • Delivery-date: Fri, 19 Mar 2021 11:57:32 +0000
  • Ironport-hdrordr: A9a23:2pQNaqEsZlUlSx5hpLqFRZTXdLJzesId70hD6mlYcjYQWtCEls yogfQQ3QL1jjFUY307hdWcIsC7Lk/03aVepa0cJ62rUgWjgmunK4l+8ZDvqgeNJwTXzcQY76 tpdsFFZeHYJURmjMr8/QmzG8shxt7Cy6yzmeLC1R5WLD1CQYsI1XYdNi+wFEpqSA5aQb8wE5 SB7sRKzgDQBkg/RMK9G3UDQqz/vNXNjp3relorABQg5QmIg1qTmcLHOjKf2QoTVC4K/Kc6/Q H+4nHEz4iAk9X+8B/T0GfP849b8eGO9vJvDNGB4/JlUgnEpR2vYO1aKtq/lRAz5Nqi8VM71O TLyi1QRfhbz1P0UiWLrQD22w/muQxemEPK7VODm3PsrYjYaVsBerN8rLlUeBfY9EYs1esUuM kgvxP7xu9qJCjNkyjn69/DWwsCrDvRnVMYnfMOlHsaaIMCadZq3Pwi1XlIG5QNFj+S0vFALM BSCqjnlZRrWG+BY2uclmdix8HEZAVJIj62BmIGusCTzgFMmmF4w0Yy1KUk7wY93aN4ZJ9e6+ veNKN00JlIU88NdKp4QNwMWM2tFwX2MF3xGVPXBW6iOLAMOnrLpZKyyLIp5NuycJhN6Jcpgp zOXH5RqGZaQTOhNeS+mLlwtjzdSmS0WjrgjutE4YJih7H6TL33dQWeVVEHiaKb0rYiK/yef8 z2FINdAvflI2erM51OxRfCV55bLmRbeNEJu+w8R0mFrqvwW83Xn92eVMyWCKvmED4iVG+6KG AERiLPKMJJ6V3udWT/hDTXRnPxam3y9Z99C8Hhjq0u4blIErcJnhkeiFy/6M3OAyZFqLYKcE x3J66isq7TnxjzwU/4q0FSfjZNBEdc57vtF1lQoxURDk/yebEf//GWeWVY2mq7NgZyJvmmVz J3lhBSw+aaPpaQzSctB5aMKWSBlUYeo3qMUtM6lrCc49zmPrc1FIwvVqA0NQijLW01pS9a7E N4LCMUTE7WET3jzY+/ioYPOe3Zf95gxCGxIcBVrnrbnV6Gpd4mQ0YaWzLGa7/UvS8eAx5vwn Fh+a4Wh7SN3Ry1L3Ekveg+OFpQLFiMDKl+FwSDboVMkrXNcAV9JF36wwCyulUWQC7H5k8Sjm vuIWmxdevQClRQgHxez53n6Uh5bGmbYkJ2ZE1rqIEVLxW1hl9DlcuwIoaj2WqYbVUPhtsQNz zIehM+CAJjzdLf7m/epB+yUVEdgrk+NO3UC7ouN4zJ0nS2MYuSiOUtBPlP5qtoM9jor84GWe +SYBWuMTv9Eu8lsjbl/0oNCW1Rkj0JgPno0Brq4CyEx3Y5G+PVO0kjaLcBId2QhlKUDsqg4d Fct5YSsuSxOGmqNYLD5qHTcjJZKhTc5USxVPolrJhIvaQ08Jt/dqOrJgfg5TVi5lEZKsyxqW Y1BIJcy5rFMpV0f8MTdzlCl2BZ3+inHQ8OiEjOHuQ6fVsRlHfVMNOC3qrQpdMUczm8jTq1HW PazjZU8PjEVRaSzLI2C6o/JmJNdUg3gU4Sit+qRsn1CA+wcftE80f/GnihcKVFQKztI8Rckj 9Kp/WJlfSQbSz2xUT5uiZ6OLtH9yKCTdmpCAyBXc5O/NrSAyXBvoKapOqyhizwUz21dgAxgp BEb1UZaoB7sQYZ5bdHmhSae+jQuUIqk1xX/DFhmBrM4+GdkRnmNHADFxbYjJVQVSRUKV6Sg6 3+gLCl6Eg=
  • Ironport-sdr: ++HRilZzOYDzK83EstmEtFlYzZGEzDNaEVO16QOfW4J1ItjGbE3+uLWZOgVPljl0fjGPbjlyp2 AxVv60YY1U2wamEYRKbs9PcU5E73FNL5IebfOZ7g4/TRYQrUXAtc9mmSyVF2l8I7BdXFoIb6D8 3OMzFR0PNwxwh9hQB8GJZiXS7VJx01KQEvNJKJrS9pY0lJMokBsJC87d65s353KOy8gC014SgP eCz03f2qcDfuHKx+y6SFPmZcYjMAyXc7ocRePDpzERZmUcYwvmG1S9Tf5e0v331ixU3w9mX6Tb F1g=
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>

On 17/03/2021 14:55, Ian Jackson wrote:
> Julien Grall writes ("Re: preparations for 4.13.3"):
>> On 08/03/2021 09:49, Jan Beulich wrote:
>>> All,
>>>
>>> the release is overdue (my apologies). Please point out backports
>>> you find missing from the respective staging branches, but which
>>> you consider relevant.
>>>> Ones that I have queued already, but which hadn't passed the push
>>> gate to master yet when doing a swipe late last week, are
>>>
>>> c6ad5a701b9a crypto: adjust rijndaelEncrypt() prototype for gcc11
>>> 9318fdf757ec x86/shadow: suppress "fast fault path" optimization without 
>>> reserved bits
>>> 60c0444fae21 x86/shadow: suppress "fast fault path" optimization when 
>>> running virtualized
>> I would like to also consider the following one:
>>
>> 28804c0ce9fd SUPPORT.MD: Clarify the support state for the Arm SMMUv{1, 
>> 2} drivers (4.11+ as updating the security support)
>> 067935804a8e xen/vgic: Implement write to ISPENDR in vGICv{2, 3} (4.13+)
>>      To support newer kernel on stable Xen
>> d81133d45d81 xen/arm: Add workaround for Cortex-A53 erratum #843419 (4.13+)
>> fd7479b9aec2 xen/arm: Add workaround for Cortex-A55 erratum #1530923 (4.13+)
>> 5505f5f8e7e8 xen/arm: Add Cortex-A73 erratum 858921 workaround (4.13+)
>> 63b4c9bfb788 xen/arm: mm: Access a PT entry before the table is unmapped 
>> (4.13 only)
>> f6790389613c xen/arm: sched: Ensure the vCPU context is seen before 
>> vcpu_pause() returns (4.13 only)
>>
>> I have put in parentheses the list of versions targeted.
> My backport list seems to have very few tools patches on it.
>
> If anyone has any tools bugfixes that ought to go into 4.13 please do
> let me know!
>
> Additionally, perhaps this one commit to be backported ?
>   935e0836710ce8cab584155b2844cea8497a5159
>   arm: replace typeof() with __typeof__()

These are general backport requests, not specifically for 4.13

d92ba1aa7cf8 - tools/ocaml: libxb: Harden stub_header_of_string()
59b087e39544 - tools/ocaml: Fix stubs build when OCaml has been compiled
with -safe-string
78686437e949 - tools/ocaml: libxb: Avoid to use String_val() when value
is bytes
2b8079610ec5 - tools/libxc: misc: Mark const the parameter 'keys' of
xc_send_debug_keys()
a6ed77f1e033 - oxenstored: fix ABI breakage introduced in Xen 4.9.0

The penultimate one is an API change, but strictly in a relaxing
direction.  The final one is an ABI change, but fixing a regression.


5e31789634 - tools/ocaml/libs/xb: Do not crash after xenbus is unmapped
2a47797d1f - tools/oxenstored: Trim txhistory on xenbus reconnect
c8b9670825 - tools/oxenstored: Fix quota calculation for mkdir EEXIST
dc8caf214fb - tools/oxenstored: Reject invalid watch paths early
45dee7d92b - tools/oxenstored: mkdir conflicts were sometimes missed


Do we want to backport the -Og fixes so we can get ABI checking working?

~Andrew




 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.