Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp1632432imu; Sat, 12 Jan 2019 04:32:27 -0800 (PST) X-Google-Smtp-Source: ALg8bN5VrWZ7oeGGVZItwpAngwEjqQ0uK9gMX/4GoF8dK3XyhQGS+LZoWKruaFRSYfEgy7gxbZlc X-Received: by 2002:a17:902:33c2:: with SMTP id b60mr18506142plc.211.1547296347913; Sat, 12 Jan 2019 04:32:27 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1547296347; cv=none; d=google.com; s=arc-20160816; b=jRWtMvBq8yI+4ptRms1/Nexl3WhtK/bWEkIY5wJu/FqooeGTXORzI1S58qv1uZGNpD PZ+X+OKshJajF5LGRLsiEDw8W0fwF/j+8FnnFrqvsf1JeMYtkvIV0Dnp82TqynHO0S1i rKcEvU/YJUoQSu3mMYOlr7XqLt9DnMJagh+p8zzZK+Uzhcrh4/CADOxmUS/xgBSrI20T yysDo7dit10FSDY2Eol6l2IAiyEL1VDcS4yUmutwv/Do0HQfqNEpp7bXfqZPiTxMIBGb i7o08h0wYEce7T7Ek7BPcyV3VKRaDoveMcRLGefICStJniuikuXN7C6W4JN+oe115Gwr C59Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-disposition:mime-version :message-id:subject:cc:to:from:date; bh=Xv7lIjRFAiOAxMkk+kwsdFOJBPpk841MnqZQewfuABQ=; b=KYXZL6F71znm4jxd+kfKMri8aLf7x9FEW3MsMrD2IEgiBRi50HJD9V1wTVnmGWBF47 ci5PAzCziGYcTNBl2WNTHI9ST3xupkOg+DjUiNWmFaF9kPRPgoO2Ur8jmSaKNcAjw2AE bq6bagQIoe2hx0QxKPZQUS55K2qMbQKMm6qV+q50j9Y7izxhrULIM3Gf2sdhggqU1heT vI8cau0RSutY2nCQ0fEUjWorlCHm7bKzTShl0efw+eSjAIe4dqzfByvX3AKkIs4f3DMn jUiapj+ZOQhV4+TdPcj8ecOZKijka8o9MAHu5O9KvAIU+muvYo5CywNCIjvMr3G5eGwy alLw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id b28si13692968pgm.409.2019.01.12.04.32.09; Sat, 12 Jan 2019 04:32:27 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1725867AbfALMa4 (ORCPT + 99 others); Sat, 12 Jan 2019 07:30:56 -0500 Received: from mx1.redhat.com ([209.132.183.28]:51854 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725823AbfALMa4 (ORCPT ); Sat, 12 Jan 2019 07:30:56 -0500 Received: from smtp.corp.redhat.com (int-mx06.intmail.prod.int.phx2.redhat.com [10.5.11.16]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id 09FE7C057F34; Sat, 12 Jan 2019 12:30:56 +0000 (UTC) Received: from flask (ovpn-204-20.brq.redhat.com [10.40.204.20]) by smtp.corp.redhat.com (Postfix) with SMTP id 5012C173C5; Sat, 12 Jan 2019 12:30:42 +0000 (UTC) Received: by flask (sSMTP sendmail emulation); Sat, 12 Jan 2019 13:30:38 +0100 Date: Sat, 12 Jan 2019 13:30:38 +0100 From: Radim =?utf-8?B?S3LEjW3DocWZ?= To: Linus Torvalds Cc: Paolo Bonzini , linux-kernel@vger.kernel.org, kvm@vger.kernel.org Subject: [GIT PULL] KVM fixes for Linux 5.0-rc2 Message-ID: <20190112123031.GA2992@flask> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline X-Scanned-By: MIMEDefang 2.79 on 10.5.11.16 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.32]); Sat, 12 Jan 2019 12:30:56 +0000 (UTC) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Linus, The following changes since commit bfeffd155283772bbe78c6a05dec7c0128ee500c: Linux 5.0-rc1 (2019-01-06 17:08:20 -0800) are available in the Git repository at: git://git.kernel.org/pub/scm/virt/kvm/kvm tags/for-linus for you to fetch changes up to 826c1362e79abcd36f99092acd083b5a2d576676: x86/kvm/nVMX: don't skip emulated instruction twice when vmptr address is not backed (2019-01-11 18:41:53 +0100) ---------------------------------------------------------------- KVM fixes for 5.0-rc2 Minor fixes for new code, corner cases, and documentation. Patches are isolated and sufficiently described by the shortlog. ---------------------------------------------------------------- Christophe de Dinechin (1): Documentation/virtual/kvm: Update URL for AMD SEV API specification David Rientjes (1): kvm: sev: Fail KVM_SEV_INIT if already initialized Gustavo A. R. Silva (1): KVM: x86: Fix bit shifting in update_intel_pt_cfg Lan Tianyu (1): KVM/VMX: Avoid return error when flush tlb successfully in the hv_remote_flush_tlb_with_range() Tomas Bortoli (1): KVM: validate userspace input in kvm_clear_dirty_log_protect() Vitaly Kuznetsov (1): x86/kvm/nVMX: don't skip emulated instruction twice when vmptr address is not backed Documentation/virtual/kvm/amd-memory-encryption.rst | 2 +- arch/x86/kvm/svm.c | 3 +++ arch/x86/kvm/vmx/nested.c | 3 +-- arch/x86/kvm/vmx/vmx.c | 4 ++-- virt/kvm/kvm_main.c | 9 +++++++-- 5 files changed, 14 insertions(+), 7 deletions(-)