[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: preparations for 4.14.5 ?


  • To: Anthony Perard <anthony.perard@xxxxxxxxxx>
  • From: Jan Beulich <jbeulich@xxxxxxxx>
  • Date: Mon, 4 Apr 2022 15:42:09 +0200
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com; dkim=pass header.d=suse.com; arc=none
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=aHoIdCEpO+jBYTPDkxu6odsSF2r1CJ9hPDTpPVF7tyI=; b=dMHB/+op0PloOLRQWq/fOIMlDQ+Zoa15Y/fyBXElWXYXegC4EtiYx/abUo6HrDoGHhJoi13kW1KoFyKts0PSmKzhpZcNJV79Q2mjv8XWyg0y8Qx71r3+FKL5450dUPFiqvA0t+zU5MFnHceWucZJxTt/g4JJUjNA64h1Y/GJciaDSk7yK6c1ub1CqUx8TUKPigEyPRuzhMIQhonnTV5LVAcKKAlQGBtYhDuaCqU02/DMNfqqJNT472ilJCtfJWx+u1U0Z9ixF3/XdIxz6I6JV81hfmxH3gDC1m5adaf6LgUrp4lArGva0qP9TMd0391WoBte48hzkQoksKiQCiPWhw==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=d9KlpEmUmPd4HHJ6dqCuGTLXi2nliG36T1WQ5+6xMhcyngMtdn7HMwJBx/6do46w6Ef+YfI8kjGrbJ8T7dWMk8C3XRzmJ4zDHy5bJ+tZqKOrZyJ1mDNZphBVjLUFvYEjwdwPfDhwAkp4op+MzbkCHbMhR0MvuIeUWMWlod+iI9ESlD9NdJMdJiYPUXvzqpNtndAYIfWnJPJPgzg9Prxg9UVm0I8D//KGhRV2krprzNcqgZe+Jg5pWLHJ5bscCXk/iLL7mhE0DrOvXHd07ki14bCAsGit1+06MNu6XfALj7GJuqpGibxxtEHWMF++C3Ebke34oZ1b3qugBKMN1xeMnQ==
  • Authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=suse.com;
  • Cc: "xen-devel@xxxxxxxxxxxxxxxxxxxx" <xen-devel@xxxxxxxxxxxxxxxxxxxx>, George Dunlap <george.dunlap@xxxxxxxxxx>, Stefano Stabellini <sstabellini@xxxxxxxxxx>, Wei Liu <wl@xxxxxxx>, Julien Grall <julien@xxxxxxx>, Marek Marczykowski-Górecki <marmarek@xxxxxxxxxxxxxxxxxxxxxx>
  • Delivery-date: Mon, 04 Apr 2022 13:42:25 +0000
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>

On 01.04.2022 15:46, Marek Marczykowski-Górecki wrote:
> On Wed, Mar 30, 2022 at 12:16:00PM +0200, Jan Beulich wrote:
>> All,
>>
>> while 4.14's general support period ended in January, we're considering
>> to cut an out-of-band release due to the relatively large number of
>> security relevant backports which has accumulated in just 2 months. By
>> doing this we would _not_ be promising to do so again in the future.
>> Please voice objections to the plan (or support for it) in the next
>> couple of days.
>>
>> Since it's a little easier to "batch" releases, I would intend to keep
>> 4.14.5 aligned with 4.16.1.
>>
>> Commits I have queued but not committed to the branch yet (and I won't
>> until in a couple of days time, to allow for objections to the plan to
>> be raised):
>>
>> dd6c062a7a4a tools/libxl: Correctly align the ACPI tables
>> aa390d513a67 build: fix exported variable name CFLAGS_stack_boundary
>> e62cc29f9b6c tools/libs: Fix build dependencies
>> eddf13b5e940 x86emul: fix VPBLENDMW with mask and memory operand
>> 6bd1b4d35c05 x86/console: process softirqs between warning prints
>> 07449ecfa425 tools/libxl: don't allow IOMMU usage with PoD
>> 10454f381f91 xz: avoid overlapping memcpy() with invalid input with in-place 
>> decompression
>> 0a21660515c2 xz: validate the value before assigning it to an enum variable
>> b4f211606011 vpci/msix: fix PBA accesses
>>
>> Please point out backports you find missing from both the respective
>> staging branch and the list above, but which you consider relevant.
> 
> I'm not sure if "just" bugfix qualify for 4.14 at this point, but if so,
> I'd propose:
> 0a20a53df158 tools/libs/light: set video_mem for PVH guests
> 
> In any case, the above should be backported to 4.15 and 4.16.

Hmm, Anthony, I'd like to ask for your view here: This looks more
like a cosmetic change to me at the first glance. Plus it's a
little odd to see it being proposed for backporting now, when it's
already almost 4 months old and hence could have gone into 4.15.2
and 4.14.4 if it was important.

Jan




 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.