From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Subject: Re: [PATCH] kvm: x86: do not leak guest xcr0 into host interrupt handlers To: David Matlack References: <1459365887-146735-1-git-send-email-dmatlack@google.com> <5703A175.4000005@redhat.com> Cc: kvm list , "linux-kernel@vger.kernel.org" , Andy Lutomirski , stable@vger.kernel.org From: Paolo Bonzini Message-ID: <5703E2BB.8070707@redhat.com> Date: Tue, 5 Apr 2016 18:07:23 +0200 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org List-ID: On 05/04/2016 17:56, David Matlack wrote: > > I'm going to rerun the tests without this patch, as it seems the most > > likely culprit, and leave it out of the pull request if they pass. > > Agreed this is a very likely culprit. I think I see one way the > guest's xcr0 can leak into the host. I will do some testing an send > another version. Thanks. Tests passed without this patch. Paolo