From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail.kernel.org ([198.145.29.99]:45230 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727608AbeLMTOr (ORCPT ); Thu, 13 Dec 2018 14:14:47 -0500 Date: Thu, 13 Dec 2018 20:13:39 +0100 From: Greg Kroah-Hartman To: Ben Hutchings Cc: Sasha Levin , stable Subject: Re: Security fixes for 4.4 Message-ID: <20181213191339.GA3996@kroah.com> References: <1544727079.19315.55.camel@codethink.co.uk> MIME-Version: 1.0 Content-Type: text/plain; charset=iso-8859-1 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: <1544727079.19315.55.camel@codethink.co.uk> Sender: stable-owner@vger.kernel.org List-ID: On Thu, Dec 13, 2018 at 06:51:19PM +0000, Ben Hutchings wrote: > I've backported a number of fixes for security issues affecting 4.4- > stable.��All of these are already fixed in the newer stable branches. > > For the BPF fix, I verified that the self-tests (taken from 4.14) > didn't regress and temporarily added logging to check that the > mitigation is applied when needed. > > For the KVM changes, I verified that IBPB/IBRS are now exposed to and > used by a guest on Intel hardware. > > I also verified that the current self-tests for timers, usercopy and vm > didn't regress. Thanks a lot for these! All now queued up. greg k-h