These are some very minor vmx cleanups.
2/4 is necessary for nested esx to be able to
successfully launch a guest of its own. Without single context
invalidation present, it just disables ept altogether.

Bandan Das (4):
  nvmx: use warn_on for buggy cases when emulating invept/invvpid
  nvmx: mark ept single context invalidation as supported
  mmu: don't pass *kvm to spte_write_protect
  nvmx: check for shadow vmcs check on entry

 arch/x86/kvm/mmu.c |  4 ++--
 arch/x86/kvm/vmx.c | 23 +++++++++++++----------
 2 files changed, 15 insertions(+), 12 deletions(-)

-- 
2.5.5

Reply via email to