From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mga12.intel.com ([192.55.52.136]) by Galois.linutronix.de with esmtps (TLS1.2:DHE_RSA_AES_256_CBC_SHA256:256) (Exim 4.80) (envelope-from ) id 1fO8Md-0001nh-2G for speck@linutronix.de; Wed, 30 May 2018 23:10:35 +0200 Date: Wed, 30 May 2018 14:10:30 -0700 From: Andi Kleen Subject: [MODERATED] Re: [PATCH 2/2] L1TF KVM 2 Message-ID: <20180530211030.GH30764@tassilo.jf.intel.com> References: <20180529194214.2600-1-pbonzini@redhat.com> <20180529194322.8B56F610F8@crypto-ml.lab.linutronix.de> <5f5ee0f8-ac8f-fdee-900c-7a2fed532053@citrix.com> MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 7bit To: speck@linutronix.de List-ID: > Right, but you really have to make a judgement whether this leak is useful > and can be orchestrated by the attacker in the guest. If it's just the > theoretical cornercase with no practical attack surface then you really can > leave that as an exercise for ivory tower people. We care about user data and kernel secrets like keys. NMIs don't have either. (except for profile NMIs, but they only have the data of what you just interrupted) Same for machine checks etc. In fact most hard interrupts are likely uninteresting (except those that copy user data), although soft interrupts may not be. -Andi