Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S932506AbcDHQuZ (ORCPT ); Fri, 8 Apr 2016 12:50:25 -0400 Received: from mx1.redhat.com ([209.132.183.28]:48333 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1753723AbcDHQuW (ORCPT ); Fri, 8 Apr 2016 12:50:22 -0400 Subject: Re: [PATCH] kvm: x86: do not leak guest xcr0 into host interrupt handlers To: David Matlack References: <1459365887-146735-1-git-send-email-dmatlack@google.com> <5703A175.4000005@redhat.com> <57062382.6070005@redhat.com> <1516493578.821675.1460055819108.JavaMail.zimbra@redhat.com> Cc: kvm list , "linux-kernel@vger.kernel.org" , Andy Lutomirski , stable@vger.kernel.org From: Paolo Bonzini Message-ID: <5707E149.4020703@redhat.com> Date: Fri, 8 Apr 2016 18:50:17 +0200 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:38.0) Gecko/20100101 Thunderbird/38.6.0 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 384 Lines: 16 On 08/04/2016 18:25, David Matlack wrote: > On Thu, Apr 7, 2016 at 12:03 PM, Paolo Bonzini wrote: >>> >>> Thank you :). Let me know how testing goes. >> >> It went well. > > Great! How should we proceed? It will appear very soon on kvm/next and Radim will send the pull request to Linus next week (I'm having him practice before I go on vacation ;)). Paolo