On 01/03/2024 17:21, Oleksii wrote:
CAUTION: This message has originated from an External Source. Please use proper judgment and caution when opening attachments, clicking links, or responding to this email. Hello everyone,
Hi Oleksii, Greetings
I would like to share with you a list for status tracking based on Xen ML and community members comments: Arm: * [PATCH v6 00/15] Arm cache coloring [ https://lore.kernel.org/xen-devel/[email protected]/ ]: new patch series version [v6] was sent * [PATCH v13 00/14] PCI devices passthrough on Arm, part 3 [ https://lore.kernel.org/xen-devel/[email protected]/ ] PPC: * [PATCH v2 0/7] Early Boot Allocation on Power [ https://lore.kernel.org/xen-devel/[email protected]/ ] RISC-V: * [PATCH v4 05/23] Enable build of full Xen for RISC-V [ https://lore.kernel.org/xen-devel/[email protected]/ ]: a bulk of patch have been merged already and a new version was sent to ML
There is one more series https://patchew.org/Xen/[email protected]/ (Support for HVC_DCC registers). - Ayan
x86: * [PATCH 0/4] iommu/x86: fixes/improvements for unity range checks [ https://lore.kernel.org/xen-devel/[email protected]/ ]: * almost patch series have been merged already except the patch: [PATCH 4/4] iommu/x86: make unity range checking more strict * [PATCH 0/8] x86: support AVX10.1 [ https://lore.kernel.org/xen-devel/[email protected]/ ] * APX support? * [PATCH v4 0/8] x86emul: misc additions [ https://lore.kernel.org/xen-devel/[email protected]/ ]: * [PATCH v4 3/8] VMX: tertiary execution control infrastructure - was merged * [PATCH 0/7] VT-d: SATC handling and ATS tidying [ https://lore.kernel.org/xen-devel/[email protected]/ ] * [XEN PATCH 0/9] x86: parallelize AP bring-up during boot [ https://lore.kernel.org/xen-devel/[email protected]/ ] * [PATCH v2 00/12] x86: memcpy() / memset() (non-)ERMS flavors plus fallout [ https://lore.kernel.org/xen-devel/[email protected]/ ] * [PATCH v2 01/12] x86: introduce ioremap_wc() - were merged common: * annotate entry points with type and size" series: The bulk of this has gone in, but there'll want to be follow-ups. * limit passing around of cpu_user_regs [ https://lore.kernel.org/xen-devel/[email protected]/ ]: new patch series version was sent. * [PATCH v2 (resend) 00/27] Remove the directmap [ https://lore.kernel.org/xen-devel/[email protected]/ ] * [PATCH v9 0/7] Introduce generic headers [ https://lore.kernel.org/all/[email protected]/ ]: Almost fully patch series were merged except several patches: * [PATCH v9 1/7] automation: introduce fixed randconfig for RISC-V * [PATCH v9 2/7] xen/asm-generic: introduce stub header monitor.h * [PATCH v9 6/7] xen/ppc: switch PPC to use asm-generic/device.h * [PATCH] move __read_mostly to xen/cache.h [ https://lore.kernel.org/xen-devel/[email protected]/ ] * [XEN PATCH v2 1/3] xen: introduce STATIC_ASSERT_UNREACHABLE() [ https://lore.kernel.org/xen-devel/42fc6ae8d3eb802429d29c774502ff232340dc84.1706259490.git.federico.seraf...@bugseng.com/ ] * MISRA rules updates: [PATCH v2] docs/misra/rules.rst update [ https://lore.kernel.org/xen-devel/alpine.DEB.2.22.394.2402131431070.1925432@ubuntu-linux-20-04-desktop/T/#maded3df1bebe68d0fe53c73e89f996ec395a39e5 ] * [XEN PATCH 00/10] address some violations of MISRA C Rule 20.7 [ https://lore.kernel.org/xen-devel/[email protected]/T/#t ] * [PATCH v4 00/12] xen/spinlock: make recursive spinlocks a dedicated type [ https://lore.kernel.org/xen-devel/[email protected]/T/#t ] * [PATCH v2 0/5] xen/livepatch: fixes for the pre-apply / post-revert hooks [ https://lore.kernel.org/xen-devel/[email protected]/T/#m620c827bd097522d9d87b7f6511bc1599f6a8c84 ] Completed: Arm: * [PATCH v1 repost 0/4] xen/arm64: Rework the MMU-off code (idmap) so it is self-contained [ https://lore.kernel.org/xen-devel/[email protected]/ ] x86: * [PATCH v9 0/6] tools: enable xenstore-stubdom to use 9pfs [ https://lore.kernel.org/xen-devel/[email protected]/ ] common: * [PATCH v2] NUMA: no need for asm/numa.h when !NUMA [ https://lore.kernel.org/xen-devel/[email protected]/ ] * [PATCH] xen: move BUG_ON(), WARN_ON(), ASSERT(), ASSERT_UNREACHABLE() to xen/bug.h [ https://lore.kernel.org/xen-devel/4887b2d91a4bf2e8b4b66f03964259651981403b.1706897023.git.oleksii.kuroc...@gmail.com/ ] * [PATCH] xen/lib: introduce generic find next bit operations [ https://lore.kernel.org/xen-devel/52730e6314210ba4164a9934a720c4fda201447b.1706266854.git.oleksii.kuroc...@gmail.com/ ] Please reply with items you would like to see in 4.19 so that people know what is happening and prioritize accordingly. You're welcome to provide a description and use cases of the feature you're working on. Have a nice week! Best regards, Oleksii
