Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752368AbdHRUVS (ORCPT ); Fri, 18 Aug 2017 16:21:18 -0400 Received: from mail-qt0-f174.google.com ([209.85.216.174]:37060 "EHLO mail-qt0-f174.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751644AbdHRUVQ (ORCPT ); Fri, 18 Aug 2017 16:21:16 -0400 MIME-Version: 1.0 In-Reply-To: References: <20170804212010.15064-1-mjg59@google.com> From: Matthew Garrett Date: Fri, 18 Aug 2017 13:21:14 -0700 Message-ID: Subject: Re: [PATCH] Enable reset attack mitigation To: Ard Biesheuvel Cc: "linux-kernel@vger.kernel.org" , "linux-efi@vger.kernel.org" , Matt Fleming Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 170 Lines: 5 On Fri, Aug 18, 2017 at 1:19 PM, Ard Biesheuvel wrote: > OK. I will get it queued. No need to resend, I can apply the fixes locally. Thanks!