From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail-wr0-x22b.google.com ([2a00:1450:400c:c0c::22b]) by Galois.linutronix.de with esmtps (TLS1.2:RSA_AES_128_CBC_SHA1:128) (Exim 4.80) (envelope-from ) id 1fNkVj-0000XZ-NC for speck@linutronix.de; Tue, 29 May 2018 21:42:23 +0200 Received: by mail-wr0-x22b.google.com with SMTP id i12-v6so27220976wrc.4 for ; Tue, 29 May 2018 12:42:23 -0700 (PDT) Received: from donizetti.lan (dynamic-adsl-78-12-189-60.clienti.tiscali.it. [78.12.189.60]) by smtp.gmail.com with ESMTPSA id f10-v6sm13298551wmc.0.2018.05.29.12.42.15 for (version=TLS1_2 cipher=ECDHE-RSA-CHACHA20-POLY1305 bits=256/256); Tue, 29 May 2018 12:42:16 -0700 (PDT) Sender: Paolo Bonzini From: Paolo Bonzini Subject: [MODERATED] [PATCH 0/2] L1TF KVM 0 Date: Tue, 29 May 2018 21:42:12 +0200 Message-Id: <20180529194214.2600-1-pbonzini@redhat.com> Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 7bit MIME-Version: 1.0 To: speck@linutronix.de List-ID: Here is the first version of the L1 terminal fault KVM mitigation patches, adding a TLB flush on vmentry. Thanks, Paolo