From mboxrd@z Thu Jan 1 00:00:00 1970 From: Andrew Cooper Subject: Backports for Xen 4.6 Date: Mon, 18 Jan 2016 15:53:12 +0000 Message-ID: <569D0A68.4060003@citrix.com> Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Return-path: List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Sender: xen-devel-bounces@lists.xen.org Errors-To: xen-devel-bounces@lists.xen.org To: Jan Beulich , Ian Jackson Cc: Xen Security , Xen-devel List List-Id: xen-devel@lists.xenproject.org Hi, Looking at the XenServer patch queue, I have a few nominations for backports. Hypervisor: 22a1fbb575df "x86/hvm: make sure stdvga cache cannot be re-enabled" 0747bc8b4d85 "x86/vmx: Fix injection of #DB traps following XSA-156" Possibly also: 42940c046902 "x86/shadow: Fix missing newline in dprintk()" 6851e979874e "VT-d: use proper error codes in iommu_enable_x2apic_IR()" 0ce647ad6f70 "x86: suppress bogus log message" 484c14b7254e "x86/vmx: enable PML by default" Toolstack: 82ff7cbed64e "oxenstored: Quota.merge: don't assume domain already exists" 8a2c11f876e6 "tools/ocaml/xb: Correct calculations of data/space the ring" In particular, the advisory for XSA-156 needs re-issuing with c/s 0747bc8b4d85 folded in. ~Andrew