[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <1469053536-11130-1-git-send-email-bsd@redhat.com>
Date: Wed, 20 Jul 2016 18:25:32 -0400
From: Bandan Das <bsd@...hat.com>
To: kvm@...r.kernel.org
Cc: pbonzini@...hat.com, rkrcmar@...hat.com,
linux-kernel@...r.kernel.org
Subject: [PATCH 0/4] vmx: miscellaneous cleanups
These are some very minor vmx cleanups.
2/4 is necessary for nested esx to be able to
successfully launch a guest of its own. Without single context
invalidation present, it just disables ept altogether.
Bandan Das (4):
nvmx: use warn_on for buggy cases when emulating invept/invvpid
nvmx: mark ept single context invalidation as supported
mmu: don't pass *kvm to spte_write_protect
nvmx: check for shadow vmcs check on entry
arch/x86/kvm/mmu.c | 4 ++--
arch/x86/kvm/vmx.c | 23 +++++++++++++----------
2 files changed, 15 insertions(+), 12 deletions(-)
--
2.5.5
Powered by blists - more mailing lists