Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1759445AbcDEQH3 (ORCPT ); Tue, 5 Apr 2016 12:07:29 -0400 Received: from mx1.redhat.com ([209.132.183.28]:43890 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751598AbcDEQH2 (ORCPT ); Tue, 5 Apr 2016 12:07:28 -0400 Subject: Re: [PATCH] kvm: x86: do not leak guest xcr0 into host interrupt handlers To: David Matlack References: <1459365887-146735-1-git-send-email-dmatlack@google.com> <5703A175.4000005@redhat.com> Cc: kvm list , "linux-kernel@vger.kernel.org" , Andy Lutomirski , stable@vger.kernel.org From: Paolo Bonzini Message-ID: <5703E2BB.8070707@redhat.com> Date: Tue, 5 Apr 2016 18:07:23 +0200 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:38.0) Gecko/20100101 Thunderbird/38.6.0 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 395 Lines: 13 On 05/04/2016 17:56, David Matlack wrote: > > I'm going to rerun the tests without this patch, as it seems the most > > likely culprit, and leave it out of the pull request if they pass. > > Agreed this is a very likely culprit. I think I see one way the > guest's xcr0 can leak into the host. I will do some testing an send > another version. Thanks. Tests passed without this patch. Paolo