These are some very minor vmx cleanups. 2/4 is necessary for nested esx to be able to successfully launch a guest of its own. Without single context invalidation present, it just disables ept altogether. Bandan Das (4): nvmx: use warn_on for buggy cases when emulating invept/invvpid nvmx: mark ept single context invalidation as supported mmu: don't pass *kvm to spte_write_protect nvmx: check for shadow vmcs check on entry arch/x86/kvm/mmu.c | 4 ++-- arch/x86/kvm/vmx.c | 23 +++++++++++++---------- 2 files changed, 15 insertions(+), 12 deletions(-) -- 2.5.5 -- To unsubscribe from this list: send the line "unsubscribe kvm" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html