From patchwork Tue Oct 31 13:19:52 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: Andrew Cooper X-Patchwork-Id: 13441517 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.lore.kernel.org (Postfix) with ESMTPS id 8F88BC4332F for ; Tue, 31 Oct 2023 13:20:28 +0000 (UTC) Received: from list by lists.xenproject.org with outflank-mailman.625697.975234 (Exim 4.92) (envelope-from ) id 1qxofC-0001rY-TG; Tue, 31 Oct 2023 13:20:10 +0000 X-Outflank-Mailman: Message body and most headers restored to incoming version Received: by outflank-mailman (output) from mailman id 625697.975234; Tue, 31 Oct 2023 13:20:10 +0000 Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1qxofC-0001rP-QM; Tue, 31 Oct 2023 13:20:10 +0000 Received: by outflank-mailman (input) for mailman id 625697; Tue, 31 Oct 2023 13:20:09 +0000 Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50] helo=se1-gles-flk1.inumbo.com) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1qxofB-0001bo-RS for xen-devel@lists.xenproject.org; Tue, 31 Oct 2023 13:20:09 +0000 Received: from esa1.hc3370-68.iphmx.com (esa1.hc3370-68.iphmx.com [216.71.145.142]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS id 35ecad8b-77f0-11ee-9b0e-b553b5be7939; Tue, 31 Oct 2023 14:20:07 +0100 (CET) X-BeenThere: xen-devel@lists.xenproject.org List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xenproject.org Precedence: list Sender: "Xen-devel" X-Inumbo-ID: 35ecad8b-77f0-11ee-9b0e-b553b5be7939 DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=citrix.com; s=securemail; t=1698758407; h=from:to:cc:subject:date:message-id:in-reply-to: references:mime-version:content-transfer-encoding; bh=HDgQZiBDOWeiKil/jzTiLJs8a96nKVOORadMZobuEAk=; b=PrVh4nif38Bz7TY/iruczMZiEE1uErthb6k258jCtyhD8MUliGMjHKsk K8BT9V9cm95Z7Qy7VqmWAV1wdQ/IzDXUIwATFG0HmaSvHrWqKt6JCEyf0 DLWQ9VQXizwEkI4aDSOQtOgVaud+AteWH3RWG/s3U0m3JBCYwqGbbwFmX A=; X-CSE-ConnectionGUID: doa3TLBmT+eQnMIwQ1ipjg== X-CSE-MsgGUID: 4xjpwq9wSqWWRP98Wj+azA== Authentication-Results: esa1.hc3370-68.iphmx.com; dkim=none (message not signed) header.i=none X-SBRS: 4.0 X-MesageID: 127580572 X-Ironport-Server: esa1.hc3370-68.iphmx.com X-Remote-IP: 162.221.159.70 X-Policy: $RELAYED X-ThreatScanner-Verdict: Negative IronPort-Data: A9a23:k7lDg6PK5BLpJIDvrR2Xl8FynXyQoLVcMsEvi/4bfWQNrUojg2QFm GsfXziPMvyJM2b1eoh3PIWwoUME6sWHm9IwSwto+SlhQUwRpJueD7x1DKtS0wC6dZSfER09v 63yTvGacajYm1eF/k/F3oDJ9CQ6jefQAOOkVIYoAwgpLSd8UiAtlBl/rOAwh49skLCRDhiE/ Nj/uKUzAnf8s9JPGjxSs/nrRC9H5qyo42pA5QVmPJingXeF/5UrJMNHTU2OByOQrrl8RoaSW +vFxbelyWLVlz9F5gSNy+uTnuUiG9Y+DCDW4pZkc/HKbitq/0Te5p0TJvsEAXq7vh3S9zxHJ HehgrTrIeshFvWkdO3wyHC0GQkmVUFN0OevzXRSLaV/ZqAJGpfh66wGMa04AWEX0upwCDpy0 dYdFHMAVxampv2PmbOjSOY506zPLOGzVG8eknRpzDWfBvc6W5HTBa7N4Le03h9p2JoIR6yHI ZNEOHwwNHwsYDUWUrsTILs4kP2lmT/UdDpApUjOjaE2/3LS3Ep6172F3N/9I4bVGJUNwxnCz o7A1zjpAAkFLY2A8iO6zUiU17/wn2DySqtHQdVU8dY12QbOlwT/EiY+RVa95PW0lEO6c9ZeM FAPvDojq7Ao806mRcW7WAe3yFamlBMBX9tbE8Uh9RqAjKHT5m6xHXMYRzRMbNgnss4eRjEw0 FKN2dTzClRHr7m9WX+bsLCOoluaOzURLGIETT8JS00C+daLiKE+iAjeCOlqFqGdh8fwXzr3x li3QDMW3utJy5RRjuPioAGB3GrESoX1ohAd6gLeBV6BxAZFJ4OcYamJ9mGC7O5CI9PMJrWeh 0Toi/Ry/chXU8Ddy3bWHbRWdF26z6zbamGC2zaDC7Fkp2z3pSP5FWxFyGsmTHqFJProbtMAj KX7kgRL7ZsbB2OwbKl4eOpd4OxxlvC/TLwJuh3OB+eig6Sdlyfdp0mCnWbKgwjQfLEEyMnTw 6uzf8e2Fmo9Aq961jewTOp1+eZ1l3BglDuDGs+glUnPPV+iiJm9EOhtDbdzRrlkt/3sTPv9q L6zyPdmOz0ACbajM0E7AKYYLEwQLGhTOK0aX/d/L7bZSiI/QTFJNhMk6e95E2CTt/gPx7igE 7DUchMw9WcTclWecFzbMis4MOKHsFQWhStTABHA9G2AgxALCbtDJo9FLvPboZFPGDRf8MNJ IronPort-HdrOrdr: A9a23:kc1VBKBl84ho2V/lHelW55DYdb4zR+YMi2TDt3oddfWaSKylfq GV7ZAmPHrP4gr5N0tOpTntAse9qBDnhPtICOsqTNSftWDd0QPFEGgL1+DfKlbbak/DH4BmtJ uJc8JFeaDN5VoRt7eH3OFveexQv+Vu88qT9JnjJ28Gd3AMV0n5hT0JcTpyFCdNNW97LKt8Lr WwzOxdqQGtfHwGB/7LfEXsD4D41qT2fIuNW29/OyIa X-Talos-CUID: 9a23:pJliEWoBHMTOaGHmgF/xmn/mUcwieybh6F3VHwy1MGBMaaKsEF6I+qwxxg== X-Talos-MUID: 9a23:eZlXpQRHZYZHTOGARXSwlDN6K945/J+3N383qcRWhMvHPD5ZbmI= X-IronPort-AV: E=Sophos;i="6.03,265,1694750400"; d="scan'208";a="127580572" From: Andrew Cooper To: Xen-devel CC: Andrew Cooper , George Dunlap , Jan Beulich , "Stefano Stabellini" , Wei Liu , Julien Grall , =?utf-8?q?Roger_Pau_Monn=C3=A9?= , Henry Wang Subject: [PATCH for-4.18 1/3] CHANGELOG: Reformat Date: Tue, 31 Oct 2023 13:19:52 +0000 Message-ID: <20231031131954.3310725-2-andrew.cooper3@citrix.com> X-Mailer: git-send-email 2.30.2 In-Reply-To: <20231031131954.3310725-1-andrew.cooper3@citrix.com> References: <20231031131954.3310725-1-andrew.cooper3@citrix.com> MIME-Version: 1.0 Collect all x86 and ARM changes together instead of having them scattered. Tweak grammar as necessary. No change. Signed-off-by: Andrew Cooper Acked-by: Henry Wang --- CC: George Dunlap CC: Jan Beulich CC: Stefano Stabellini CC: Wei Liu CC: Julien Grall CC: Roger Pau Monné CC: Henry Wang --- CHANGELOG.md | 35 +++++++++++++++++++---------------- 1 file changed, 19 insertions(+), 16 deletions(-) diff --git a/CHANGELOG.md b/CHANGELOG.md index 3ca796969990..edc0d69898ed 100644 --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -17,24 +17,27 @@ The format is based on [Keep a Changelog](https://keepachangelog.com/en/1.0.0/) Hotplug" for clarity ### Added - - On x86, support for features new in Intel Sapphire Rapids CPUs: - - PKS (Protection Key Supervisor) available to HVM/PVH guests. - - VM-Notify used by Xen to mitigate certain micro-architectural pipeline - livelocks, instead of crashing the entire server. - - Bus-lock detection, used by Xen to mitigate (by rate-limiting) the system - wide impact of a guest misusing atomic instructions. - - xl/libxl can customize SMBIOS strings for HVM guests. - - Add support for AVX512-FP16 on x86. - - On Arm, Xen supports guests running SVE/SVE2 instructions. (Tech Preview) - - On Arm, add suport for Firmware Framework for Arm A-profile (FF-A) Mediator - (Tech Preview) - - Add Intel Hardware P-States (HWP) cpufreq driver. - - On Arm, experimental support for dynamic addition/removal of Xen device tree - nodes using a device tree overlay binary (.dtbo). + - On x86: + - xl/libxl can customize SMBIOS strings for HVM guests. + - Support for enforcing system-wide operation in Data Operand Independent + Timing Mode. + - Add Intel Hardware P-States (HWP) cpufreq driver. + - Support for features new in Intel Sapphire Rapids CPUs: + - PKS (Protection Key Supervisor) available to HVM/PVH guests. + - VM-Notify used by Xen to mitigate certain micro-architectural pipeline + livelocks, instead of crashing the entire server. + - Bus-lock detection, used by Xen to mitigate (by rate-limiting) the + system wide impact of a guest misusing atomic instructions. + - Support for features new in Intel Granite Rapids CPUs: + - AVX512-FP16. + - On Arm: + - Xen supports guests running SVE/SVE2 instructions. (Tech Preview) + - Add suport for Firmware Framework for Arm A-profile (FF-A) Mediator (Tech + Preview) + - Experimental support for dynamic addition/removal of Xen device tree + nodes using a device tree overlay binary (.dtbo). - Introduce two new hypercalls to map the vCPU runstate and time areas by physical rather than linear/virtual addresses. - - On x86, support for enforcing system-wide operation in Data Operand - Independent Timing Mode. - The project has now officially adopted 6 directives and 65 rules of MISRA-C. ### Removed From patchwork Tue Oct 31 13:19:53 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: Andrew Cooper X-Patchwork-Id: 13441516 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.lore.kernel.org (Postfix) with ESMTPS id 86268C4167B for ; Tue, 31 Oct 2023 13:20:21 +0000 (UTC) Received: from list by lists.xenproject.org with outflank-mailman.625698.975241 (Exim 4.92) (envelope-from ) id 1qxofD-0001uh-B0; Tue, 31 Oct 2023 13:20:11 +0000 X-Outflank-Mailman: Message body and most headers restored to incoming version Received: by outflank-mailman (output) from mailman id 625698.975241; Tue, 31 Oct 2023 13:20:11 +0000 Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1qxofD-0001tf-2u; Tue, 31 Oct 2023 13:20:11 +0000 Received: by outflank-mailman (input) for mailman id 625698; Tue, 31 Oct 2023 13:20:10 +0000 Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254] helo=se1-gles-sth1.inumbo.com) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1qxofC-0001kV-BR for xen-devel@lists.xenproject.org; Tue, 31 Oct 2023 13:20:10 +0000 Received: from esa1.hc3370-68.iphmx.com (esa1.hc3370-68.iphmx.com [216.71.145.142]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS id 36064885-77f0-11ee-98d6-6d05b1d4d9a1; Tue, 31 Oct 2023 14:20:09 +0100 (CET) X-BeenThere: xen-devel@lists.xenproject.org List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xenproject.org Precedence: list Sender: "Xen-devel" X-Inumbo-ID: 36064885-77f0-11ee-98d6-6d05b1d4d9a1 DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=citrix.com; s=securemail; t=1698758409; h=from:to:cc:subject:date:message-id:in-reply-to: references:mime-version:content-transfer-encoding; bh=vPTCG/lAXBnLTf+H7ZaUloccF/gIFmPZvfjfDD5NKds=; b=MsXtaBQXcGHg8WIs+QhxxXWRsXVcfkehHWkhUtxIZp9TKLnLef8tnZ7U ty/KOPr/330LZIwAEqbewFkuVVdhiJ2z3uMUOKdKq9nnGiNOBk0GzQomP sDclkb027P1Nac2yZuxcG8vLkBcVvO1oc20AhM/vcVvgXEP7e+9rYbBSs U=; X-CSE-ConnectionGUID: doa3TLBmT+eQnMIwQ1ipjg== X-CSE-MsgGUID: 6BsuTsINSPK1MX1qrxrprw== Authentication-Results: esa1.hc3370-68.iphmx.com; dkim=none (message not signed) header.i=none X-SBRS: 4.0 X-MesageID: 127580573 X-Ironport-Server: esa1.hc3370-68.iphmx.com X-Remote-IP: 162.221.159.70 X-Policy: $RELAYED X-ThreatScanner-Verdict: Negative IronPort-Data: A9a23:8WKcXqyiHRv8uXS7M/16t+cFxirEfRIJ4+MujC+fZmUNrF6WrkVWy 2ceW22Cb6yNZjGge9EiPoTi/BhQvZaHnIBjTgM/qSAxQypGp/SeCIXCJC8cHc8wwu7rFxs7s ppEOrEsCOhuExcwcz/0auCJQUFUjPzOHvykTrecZkidfCc8IA85kxVvhuUltYBhhNm9Emult Mj75sbSIzdJ4RYtWo4vw/zF8EgHUMja4mtC5QVmPqkT5TcyqlFOZH4hDfDpR5fHatE88t6SH 47r0Ly/92XFyBYhYvvNfmHTKxBirhb6ZGBiu1IOM0SQqkEqSh8ai87XAME0e0ZP4whlqvgqo Dl7WT5cfi9yVkHEsLx1vxC1iEiSN4UekFPMCSDXXcB+UyQq2pYjqhljJBheAGEWxgp4KW1J/ KckDBoIUlOOvuST4a2CE+h0hMt2eaEHPKtH0p1h5TTQDPJgSpHfWaTao9Rf2V/chOgXQ6yYP ZBAL2MyPVKfO3WjOX9OYH46tM6uimPybHtzr1WNqLBsy2PS0BZwwP7mN9+9ltmiHJ8KwxbA+ z2dl4j/Kk8wL8Gj0hujyUqP38r/xDrhSJgKDqLto5aGh3XMnzdOWXX6T2CTsfS/z0KzRd9bA 0gV4TY167g/8lSxSdvwVAH+p2SL1jY+cddNF+wx6CmW17HZpQ2eAwAsVSVdYdYrsMs3Qz0C1 VKTmd7tQzt1v9W9Vna15rqS6zSoNkA9L3IGZCICZRsI5Z/kuo5bpjLCSMxyVpG8iNLdECv1h TuNqUADa6471JBRkf/hpBae3mPq+cChohMJChv/UmWstT9dTouZJIGR73368s8ZLZ6bQQzU1 JQboPRy/NziHLnUyn3dH79WQeDyjxqWGGeC2wIxRfHN4xzoqyb5I90KiN1rDB0xWvvobwMFd 6M6Vel5z5hJNX/iVrdtYoS+EKzGJoC7Toy6D5g4gjdUC6WdlTNrHwk0PiZ8J0i3zCARfVgXY P93i/qEA3cAErhAxzGrXeob2rJD7nlglDONFMirkEv8i+f2iJuppVAtaQTmUwzExPrZ+1u9H yh3bKNmNCmzoMWhO3KKoOb/3HgBLGQhBICelvG7gtWre1I8cEl4Uq+5/F/UU9A990ijvruSr y7Vt44x4AaXuEAr3i3TMykyMOi0BccXQLBSFXVEAGtEEkMLOe6HhJrzvbNtJNHLKMQLISZIc sQ4 IronPort-HdrOrdr: A9a23:fmXKP62lRNtZZbK9AGYOWAqjBEgkLtp133Aq2lEZdPU0SKGlfg 6V/MjztCWE7Ar5PUtLpTnuAsa9qB/nm6KdgrNhWItKPjOW21dARbsKheffKlXbcBEWndQtt5 uIHZIeNDXxZ2IK8PoT4mODYqodKA/sytHWuQ/cpU0dMz2Dc8tbnmBE4p7wKDwMeOFBb6BJcq a01458iBeLX28YVci/DmltZZm4mzWa/KiWGCLvHnQcmXGzsQ8= X-Talos-CUID: 9a23:tiJZHm27ir2lQu/FusOyArxfFscsKUH55nLsYEKBD0NIV4TMSEeS9/Yx X-Talos-MUID: 9a23:4PFUSA8AKHV1q3qadGFjw1qQf5lC+LmSE2Erqq0l4uy0bDVqKy2FliviFw== X-IronPort-AV: E=Sophos;i="6.03,265,1694750400"; d="scan'208";a="127580573" From: Andrew Cooper To: Xen-devel CC: Andrew Cooper , George Dunlap , Jan Beulich , "Stefano Stabellini" , Wei Liu , Julien Grall , =?utf-8?q?Roger_Pau_Monn=C3=A9?= , Henry Wang Subject: [PATCH for-4.18 2/3] CHANGELOG: More 4.18 content Date: Tue, 31 Oct 2023 13:19:53 +0000 Message-ID: <20231031131954.3310725-3-andrew.cooper3@citrix.com> X-Mailer: git-send-email 2.30.2 In-Reply-To: <20231031131954.3310725-1-andrew.cooper3@citrix.com> References: <20231031131954.3310725-1-andrew.cooper3@citrix.com> MIME-Version: 1.0 Signed-off-by: Andrew Cooper Acked-by: Henry Wang --- CC: George Dunlap CC: Jan Beulich CC: Stefano Stabellini CC: Wei Liu CC: Julien Grall CC: Roger Pau Monné CC: Henry Wang --- CHANGELOG.md | 7 +++++++ 1 file changed, 7 insertions(+) diff --git a/CHANGELOG.md b/CHANGELOG.md index edc0d69898ed..a827054cf27d 100644 --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -18,10 +18,17 @@ The format is based on [Keep a Changelog](https://keepachangelog.com/en/1.0.0/) ### Added - On x86: + - On all Intel systems, MSR_ARCH_CAPS is now visible in guests, and + controllable from the VM's config file. For CPUs from ~2019 onwards, + this allows guest kernels to see details about hardware fixes for + speculative mitigations. (Backported as XSA-435 to older releases). - xl/libxl can customize SMBIOS strings for HVM guests. - Support for enforcing system-wide operation in Data Operand Independent Timing Mode. - Add Intel Hardware P-States (HWP) cpufreq driver. + - Support for features new in AMD Genoa CPUs: + - CPUID_USER_DIS (CPUID Faulting) used by Xen to control PV guest's view + of CPUID data. - Support for features new in Intel Sapphire Rapids CPUs: - PKS (Protection Key Supervisor) available to HVM/PVH guests. - VM-Notify used by Xen to mitigate certain micro-architectural pipeline From patchwork Tue Oct 31 13:19:54 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: Andrew Cooper X-Patchwork-Id: 13441518 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.lore.kernel.org (Postfix) with ESMTPS id 18D8EC4332F for ; Tue, 31 Oct 2023 13:20:33 +0000 (UTC) Received: from list by lists.xenproject.org with outflank-mailman.625699.975255 (Exim 4.92) (envelope-from ) id 1qxofF-0002Ns-Er; Tue, 31 Oct 2023 13:20:13 +0000 X-Outflank-Mailman: Message body and most headers restored to incoming version Received: by outflank-mailman (output) from mailman id 625699.975255; Tue, 31 Oct 2023 13:20:13 +0000 Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1qxofF-0002Nj-Bv; Tue, 31 Oct 2023 13:20:13 +0000 Received: by outflank-mailman (input) for mailman id 625699; Tue, 31 Oct 2023 13:20:11 +0000 Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50] helo=se1-gles-flk1.inumbo.com) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1qxofD-0001bo-I6 for xen-devel@lists.xenproject.org; Tue, 31 Oct 2023 13:20:11 +0000 Received: from esa3.hc3370-68.iphmx.com (esa3.hc3370-68.iphmx.com [216.71.145.155]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS id 361c5d0f-77f0-11ee-9b0e-b553b5be7939; Tue, 31 Oct 2023 14:20:09 +0100 (CET) X-BeenThere: xen-devel@lists.xenproject.org List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xenproject.org Precedence: list Sender: "Xen-devel" X-Inumbo-ID: 361c5d0f-77f0-11ee-9b0e-b553b5be7939 DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=citrix.com; s=securemail; t=1698758409; h=from:to:cc:subject:date:message-id:in-reply-to: references:mime-version:content-transfer-encoding; bh=H+Q30HMrWjJaZC00sLj+OmZFAlKnx4f9E66ZOhOBbQQ=; b=CpJcJoue0UK9cPQSM3y4NHZON9Kc2SeEyYlIkpWjD2fdCl2JpMpIrDAC 7FxwHa2G3N1C0jNbjaJ+feyVNWJVg5NGEZx5ZQGymYgO6xPE2MYqSg00s 1BUK7XyIHVuQpmV1Hg0o0ByGC0CZxtHmLUIA6pPwUpE4iPx72aHwURjVp g=; X-CSE-ConnectionGUID: 6pNHE+2jTxipSSOO/9v0tA== X-CSE-MsgGUID: E3PqqUTuQKqVsIwXMsxBuA== Authentication-Results: esa3.hc3370-68.iphmx.com; dkim=none (message not signed) header.i=none X-SBRS: 4.0 X-MesageID: 127136997 X-Ironport-Server: esa3.hc3370-68.iphmx.com X-Remote-IP: 162.221.159.70 X-Policy: $RELAYED X-ThreatScanner-Verdict: Negative IronPort-Data: A9a23:pH9dy6JWbTUWkDmaFE+R4pUlxSXFcZb7ZxGr2PjKsXjdYENShjdVz WAbDG2FafnfMGGgeo1yYI+z80tSsJ7WmNBhTwJlqX01Q3x08seUXt7xwmUcnc+xBpaaEB84t ZV2hv3odp1coqr0/0/1WlTZhSAhk/nOHvylULKs1hlZHWdMUD0mhQ9oh9k3i4tphcnRKw6Ws Jb5rta31GWNglaYCUpKrfrYwP9TlK6q4mhB5gdnPakjUGL2zBH5MrpOfcldEFOgKmVkNrbSb /rOyri/4lTY838FYj9yuu+mGqGiaue60Tmm0hK6aYD76vRxjnVaPpIAHOgdcS9qZwChxLid/ jnvWauYEm/FNoWU8AgUvoIx/ytWZcWq85efSZSzXFD6I+QrvBIAzt03ZHzaM7H09c4pGUdu2 L9CKgwdbwi4vMWRh+OlEvVF05FLwMnDZOvzu1llxDDdS/0nXYrCU+PB4towMDUY354UW6yEP oxANGspM0yojx5nYz/7DLoXmuuyi2a5WDpfsF+P/oI84nTJzRw327/oWDbQUoXQGpwOwBfJ+ Qoq+UzUWSkDLeGj1AOm60y3p/D/uDjrcp87QejQGvlC3wTImz175ActfUu2p7y1h1CzX/pbK lcI4Ww+oK4q7kupQ9LhGRqirxasnDQRRt5RGO0S8xyWx+zf5APxLnMfUjdLZdgitck3bT8nz FmEm5XuHzMHmKKRYWKQ8PGTtzzaESoIKW4PYwcUQA1D5MPsyKkTgxTVX5BcGai6ptTvHHf7x DXikcQlr+xN14hRjfz9pA2WxW30znTUcuIrzlvPeEKIrVl7WJ6kf7eTzn+cvOgYMK/MGzFto 0M4d9iiAPEmVM/cxHPXG7hcR9lF9N7fbmeA3wQH840JsmT1oSD+J+i89RkkfC9U3tA4lSgFi aM5kShW/pZXdECyd65xbJnZ5y8ClvO4So2Nuhw5dLNzjnlNmOyvpnoGiba4hTyFraTVufhX1 W2nWcitF20GLq9s0SC7QewQuZdymHFumzKLFc+klE76uVZ7WJJyYe5aWGZik8hgsfjayOkr2 4032zS2J+V3D7SlP3i/HX87JlEWN3krba3LRzhsXrfbeGJOQThxY8I9NJt9I+SJaYwJzLaXl px8M2cEoGfCaYrvcFzTOyg4M+u+NXu9xFpiVRER0Z+T8yBLSe6SAG03K/PboZFPGDRf8MNJ IronPort-HdrOrdr: A9a23:Xwo54q7mEvTygqkR8gPXwP7XdLJyesId70hD6qkXc20vTiX4rb HXoB1/73XJYVkqOU3I5urwXpVoLUmyyXcN2/h3AV7AZniFhILLFvAH0WK4+UyYJ8SWzIc0uZ uIFZIOa+EYZWIQsS+Q2meF+rgboOVvoJrEuQ+dp00dKD1XVw== X-Talos-CUID: 9a23:9g9VH2A3zE2ZAV36E3d/0m45WZonTm3c1EzrBGj/WHgxVJTAHA== X-Talos-MUID: 9a23:BQa+2Q/zDXMP0vxDR6/WHiiQf+oz2723NXwQqLYfhdKlKhxVICe3kR3iFw== X-IronPort-AV: E=Sophos;i="6.03,265,1694750400"; d="scan'208";a="127136997" From: Andrew Cooper To: Xen-devel CC: Andrew Cooper , George Dunlap , Jan Beulich , "Stefano Stabellini" , Wei Liu , Julien Grall , =?utf-8?q?Roger_Pau_Monn=C3=A9?= , Henry Wang Subject: [PATCH for-4.19 3/3] CHANGELOG: Keep unstable section Date: Tue, 31 Oct 2023 13:19:54 +0000 Message-ID: <20231031131954.3310725-4-andrew.cooper3@citrix.com> X-Mailer: git-send-email 2.30.2 In-Reply-To: <20231031131954.3310725-1-andrew.cooper3@citrix.com> References: <20231031131954.3310725-1-andrew.cooper3@citrix.com> MIME-Version: 1.0 Signed-off-by: Andrew Cooper --- CC: George Dunlap CC: Jan Beulich CC: Stefano Stabellini CC: Wei Liu CC: Julien Grall CC: Roger Pau Monné CC: Henry Wang --- CHANGELOG.md | 2 ++ 1 file changed, 2 insertions(+) diff --git a/CHANGELOG.md b/CHANGELOG.md index a827054cf27d..cf0c9c3f8cb9 100644 --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -4,6 +4,8 @@ Notable changes to Xen will be documented in this file. The format is based on [Keep a Changelog](https://keepachangelog.com/en/1.0.0/) +## [unstable UNRELEASED](https://xenbits.xenproject.org/gitweb/?p=xen.git;a=shortlog;h=staging) - TBD + ## [4.18.0](https://xenbits.xenproject.org/gitweb/?p=xen.git;a=shortlog;h=RELEASE-4.18.0) - 2023-XX-XX ### Changed