Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1754402AbbGXOQJ (ORCPT ); Fri, 24 Jul 2015 10:16:09 -0400 Received: from mail-ig0-f181.google.com ([209.85.213.181]:34007 "EHLO mail-ig0-f181.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1754129AbbGXOQF (ORCPT ); Fri, 24 Jul 2015 10:16:05 -0400 MIME-Version: 1.0 In-Reply-To: References: Date: Fri, 24 Jul 2015 10:16:04 -0400 X-Google-Sender-Auth: CK9GmHBjC-sV8ib-FI3ai-_Avv4 Message-ID: Subject: Re: Linux x86_64 NMI security issues From: Josh Boyer To: Andy Lutomirski Cc: oss security list , "linux-kernel@vger.kernel.org" Content-Type: text/plain; charset=UTF-8 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 734 Lines: 16 On Wed, Jul 22, 2015 at 2:12 PM, Andy Lutomirski wrote: > Note: Several of these fixes each depend on a few patches immediately > before them. The NMI stack switching fix also depends on changes made > in 4.2 and will appear to apply but crash on older kernels. I have a > different variant that's more portable. Given that none of these are going to apply cleanly on older kernels, do you have backports available for 4.1.y and the longterm stable kernels? josh -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/