From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751358AbcDBOY0 (ORCPT ); Sat, 2 Apr 2016 10:24:26 -0400 Received: from mail-ig0-f196.google.com ([209.85.213.196]:34468 "EHLO mail-ig0-f196.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1750767AbcDBOYY (ORCPT ); Sat, 2 Apr 2016 10:24:24 -0400 MIME-Version: 1.0 In-Reply-To: References: Date: Sat, 2 Apr 2016 09:24:23 -0500 X-Google-Sender-Auth: 3fA5Jo5hgcwiOAaNtgNeXMExIx4 Message-ID: Subject: Re: [PATCH v5 0/9] Improve non-"safe" MSR access failure handling From: Linus Torvalds To: Andy Lutomirski Cc: X86 ML , Paolo Bonzini , Peter Zijlstra , KVM list , Arjan van de Ven , xen-devel , Linux Kernel Mailing List , Andrew Morton , Borislav Petkov Content-Type: text/plain; charset=UTF-8 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This patch series looks much nicer than the last one. I assume you tested that the early-trap handling actually worked too? I only looked at the patches.. Ack to it all, Linus