Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1758510AbcDHQZb (ORCPT ); Fri, 8 Apr 2016 12:25:31 -0400 Received: from mail-oi0-f46.google.com ([209.85.218.46]:33208 "EHLO mail-oi0-f46.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1758136AbcDHQZ3 (ORCPT ); Fri, 8 Apr 2016 12:25:29 -0400 MIME-Version: 1.0 In-Reply-To: <1516493578.821675.1460055819108.JavaMail.zimbra@redhat.com> References: <1459365887-146735-1-git-send-email-dmatlack@google.com> <5703A175.4000005@redhat.com> <57062382.6070005@redhat.com> <1516493578.821675.1460055819108.JavaMail.zimbra@redhat.com> From: David Matlack Date: Fri, 8 Apr 2016 09:25:03 -0700 Message-ID: Subject: Re: [PATCH] kvm: x86: do not leak guest xcr0 into host interrupt handlers To: Paolo Bonzini Cc: kvm list , "linux-kernel@vger.kernel.org" , Andy Lutomirski , stable@vger.kernel.org Content-Type: text/plain; charset=UTF-8 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 175 Lines: 7 On Thu, Apr 7, 2016 at 12:03 PM, Paolo Bonzini wrote: >> >> Thank you :). Let me know how testing goes. > > It went well. Great! How should we proceed?