[GIT PULL] xen: bug fixes for 4.4-rc5

From: David Vrabel
Date: Fri Dec 18 2015 - 12:01:54 EST


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Linus,

Please git pull the following tag:

git://git.kernel.org/pub/scm/linux/kernel/git/xen/tip.git for-linus-4.4-rc5-tag

xen: bug fixes for 4.4-rc5

- - XSA-155 security fixes to backend drivers.
- - XSA-157 security fixes to pciback.

Thanks.

David

arch/x86/xen/mmu.c | 9 +----
arch/x86/xen/suspend.c | 20 +++++-----
drivers/block/xen-blkback/blkback.c | 15 ++++---
drivers/block/xen-blkback/common.h | 8 ++--
drivers/net/xen-netback/netback.c | 34 +++++++---------
drivers/xen/events/events_fifo.c | 23 ++++++++---
drivers/xen/xen-pciback/pciback.h | 1 +
drivers/xen/xen-pciback/pciback_ops.c | 75 ++++++++++++++++++++++++++++-------
drivers/xen/xen-pciback/xenbus.c | 4 +-
drivers/xen/xen-scsiback.c | 2 +-
include/xen/interface/io/ring.h | 14 +++++++
11 files changed, 138 insertions(+), 67 deletions(-)

Boris Ostrovsky (2):
xen: Resume PMU from non-atomic context
xen/x86/pvh: Use HVM's flush_tlb_others op

David Vrabel (4):
xen: Add RING_COPY_REQUEST()
xen-netback: don't use last request to determine minimum Tx credit
xen-netback: use RING_COPY_REQUEST() throughout
xen-scsiback: safely copy requests

Doug Goldstein (1):
xen-pciback: fix up cleanup path when alloc fails

Konrad Rzeszutek Wilk (6):
xen/pciback: Save xen_pci_op commands before processing it
xen/pciback: Return error on XEN_PCI_OP_enable_msi when device has MSI or MSI-X enabled
xen/pciback: Return error on XEN_PCI_OP_enable_msix when device has MSI or MSI-X enabled
xen/pciback: Do not install an IRQ handler for MSI interrupts.
xen/pciback: For XEN_PCI_OP_disable_msi[|x] only disable if device has MSI(X) enabled.
xen/pciback: Don't allow MSI-X ops if PCI_COMMAND_MEMORY is not set.

Roger Pau Monnà (2):
xen-blkback: only read request operation from shared ring once
xen-blkback: read from indirect descriptors only once

Ross Lagerwall (1):
xen/events/fifo: Consume unprocessed events when a CPU dies
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQEcBAEBAgAGBQJWdDv6AAoJEFxbo/MsZsTRCDwH/12DHa6w91TtaWKZqn2cugNU
E8ePHbVh99Xaecw9Qpz3QTKi0W/yiY6m8AaukSs9cYY0yHULVtusCJ1fROn+WJw5
594oPJuxWS/DOEnRRfNYIVas5u468Gheq446FLlitTfPTKALDAQGxolUITG+LRcZ
YIgVAt77/c3RS0JksubCvjC4ihrWqGU/bvBpifLgZJL6Ab9+rToCF4DXcKWVCaDX
HSwhbfjP0g/3a8qF+0RKEWEoXLyq+hUCpsN/hSrU6sxswEEmdz+RSoYPqkfudnM8
cIktBaXzdjqJEqBppmAOnQgGryXcGYO4ZHPnsogwxH22xaGeEMQN+NuYsI1307o=
=J2MR
-----END PGP SIGNATURE-----
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/