4f664a60516ab749f37530824cc9c015fefb972e KVM: SVM: Use a separate vmcb for the nested L2 guest b463e218d5b45b5b2e41b84120fb957ce92dd5cf KVM: nSVM: Track the physical cpu of the vmcb vmrun through the vmcb afe228fe1313170fb1535d3dd5a66b61ad8f5a32 KVM: nSVM: Track the ASID generation of the vmcb vmrun through the vmcb 7dc29253074924a6f831a489d08562726aec583c KVM: nSVM: rename functions and variables according to vmcbXY nomenclature f1de5cffd568bca7f543de712cdd3fc8850e61e0 KVM: nSVM: do not copy vmcb01->control blindly to vmcb02->control c841128f07a3d517021fdfb4084f870a4de42350 KVM: nSVM: do not mark all VMCB01 fields dirty on nested vmexit b9fd43c3dbd80ceb16c3979e529f1d96b7cf937d KVM: nSVM: do not mark all VMCB02 fields dirty on nested vmexit d9c6ca32a06a1dcc87e59eab2660b9df2506f492 KVM: nSVM: only copy L1 non-VMLOAD/VMSAVE data in svm_set_nested_state() 95ef477d9c9e1b0427db5f809905f161ebfaffbf KVM: nSVM: Add missing checks for reserved bits to svm_set_nested_state() eb9a8b010a223a1f19c2a81867e55e0b4e4f2c1e KVM: x86: Move nVMX's consistency check macro to common code f8a5f661936ab8b7665fb1b4b5a37bf9663461cf KVM: nSVM: Trace VM-Enter consistency check failures 0c9f61d80e693106cabf726724820724501277b6 x86/cpufeatures: Add CPUIDs for Control-flow Enforcement Technology (CET) e4e42678892485077caae21b1b3077d82a566fc4 cet msrs a32d5b2352835e28b49daee2374bd4cef97084a0 KVM: x86: Report XSS as an MSR to be saved if there are supported features 0fa6181a83f6dda7a2eda194cbc00e3e442a33f0 KVM: x86: Refresh CPUID on writes to MSR_IA32_XSS 36b2468f4cfec19bfda5368ebaa29b98b8a7f843 KVM: x86: Load guest fpu state when accessing MSRs managed by XSAVES d81a670e48d4fb521e040b5a3b1fc01141c84d88 KVM: x86: Add #CP support in guest exception classification. f6d521e44b7931e32d252e171f6d8cd3b465e799 KVM: VMX: Introduce CET VMCS fields and flags cf30836e7ccecc55763184abfe1e390b97271662 KVM: x86: Add fault checks for CR4.CET ebf0ad915d025cd44ad1038db764a197a5647e08 KVM: VMX: Emulate reads and writes to CET MSRs 438a4cae1e9a3778a3cfb39cffacf11a46b1c910 KVM: VMX: Add a synthetic MSR to allow userspace VMM to access GUEST_SSP 2833d986acae8005c4d46892039e2de03fff17c1 KVM: x86: Report CET MSRs as to-be-saved if CET is supported a2c0d4d6304045078f1f823c47b04769d5e723ae KVM: x86: Save/Restore GUEST_SSP to/from SMM state save area 81a0df38d0fe3d48e9524a0cb7f3362bc83964ef KVM: x86: Enable CET virtualization for VMX and advertise CET to userspace 5c4a19e93cf10719aa60c683d31a30133f14a1ab KVM: VMX: Pass through CET MSRs to the guest when supported 27f042ae3f41fc869a7339d0255e45feb0634c32 KVM: nVMX: Add helper to check the vmcs01 MSR bitmap for MSR pass-through 1dfdded2b69f7b7095d905a0321273d2361eb54f KVM: nVMX: Enable CET support for nested VMX a0e5076175e8ce1c276d9fe568d30278b729e4c3 x86/cpufeatures: Enumerate #DB for bus lock detection 053f0c6fa0392b870a75ba296ce7b6e83357c7d7 x86/bus_lock: Handle warn and fatal in #DB for bus lock 88af45a5aecb563e2611289e40b02440b7ad3ee2 KVM: X86: Add support for the emulation of DR6_BUS_LOCK bit 4edbfa87f4f41cf0d0be2d51d99e7734359efd8b KVM: X86: Expose bus lock debug exception to guest