897218ff7cf19290ec2d69652ce673d8ed6fedeb KVM: x86: compile out TDP MMU on 32-bit systems 9fd6dad1261a541b3f5fa7dc5b152222306e6702 mm: provide a saner PTE walking API for modules a9545779ee9e9e103648f6f2552e73cfe808d0f4 KVM: Use kvm_pfn_t for local PFN variable in hva_to_pfn_remapped() 99df541dcc97ce4436528a4eeb23165d8c672a64 KVM: x86/xen: Remove extra unlock in kvm_xen_hvm_set_attr() 448841f0b7b50f1b8d7a40138dfb0d882435c8bd KVM: x86/xen: Use hva_t for holding hypercall page address 16d5163f338753fb93b1809e067da5d27d540fbc KVM: x86: Remove misleading DR6/DR7 adjustments from RSM emulation 2644312052d54e2e7543c7d186899a36ed22f0bf KVM: x86: Restore all 64 bits of DR6 and DR7 during RSM on x86-64 e6c804a848d604438bd9a083939569a7c9ff2bb5 KVM: SVM: Move AVIC vCPU kicking snippet to helper function 6f7a343987fa24299db1a36b7af55bdbd5dd3b1b KVM: SVM: Remove an unnecessary forward declaration 29d6ca41992a771e2441424099695c329d735c28 KVM: x86: reading DR cannot fail 996ff5429e9898947016206ee9da387a93d63d9d KVM: x86: move kvm_inject_gp up from kvm_set_dr to callers 281d9cd9b471a28382ac79be9b5cd59b72ae5c87 selftests: kvm: Raise the default timeout to 120 seconds 4fc096a99e01dd06dc55bef76ade7f8d76653245 KVM: Raise the maximum number of user memslots 32f00fd9ef39d8bd32ed7a365fc9a134ebbc646f selftests: kvm: Move kvm_get_supported_hv_cpuid() to common code a75b40a4dd57e624dc89b81abaf6ebd206bf62a0 selftests: kvm: Properly set Hyper-V CPUIDs in evmcs_test cb5b916172c6d47f8243212b0c00196ede219d95 KVM: x86: hyper-v: Drop unused kvm_hv_vapic_assist_page_enabled() ef3f3980dedffe124727f7baa1932c8491a911e4 KVM: x86: hyper-v: Rename vcpu_to_hv_vcpu() to to_hv_vcpu() e0121fa29a7f4fc56cf75f5c6a80c41c7c73f593 KVM: x86: hyper-v: Rename vcpu_to_synic()/synic_to_vcpu() aafa97fd1c01bc82c1f288bf1f27e8e1bdc36a3e KVM: x86: hyper-v: Rename vcpu_to_stimer()/stimer_to_vcpu() f69b55efef8406113c52f7494d2669ba9d4958c8 KVM: x86: hyper-v: Rename vcpu_to_hv_syndbg() to to_hv_syndbg() 05f04ae4ffcc77cfcda86adc4e2c13aa72143c03 KVM: x86: hyper-v: Introduce to_kvm_hv() helper 72167a9d7da2c295caf1d4a2d58128406786505d KVM: x86: hyper-v: Stop shadowing global 'current_vcpu' variable 9ff5e0304e949a8a4e584c8c2b11fad9b2e0b133 KVM: x86: hyper-v: Always use to_hv_vcpu() accessor to get to 'struct kvm_vcpu_hv' f2bc14b69c38b60f201fdf90c08cb2dc8966f331 KVM: x86: hyper-v: Prepare to meet unallocated Hyper-V context 4592b7eaa87d3525825d4ab2a35308bcec9e5ff9 KVM: x86: hyper-v: Allocate 'struct kvm_vcpu_hv' dynamically 8f014550dfb114cc7f42a517d20d2cf887a0b771 KVM: x86: hyper-v: Make Hyper-V emulation enablement conditional fc08b628d7c96d9a6d6bca488c3fa9c92bee6cc8 KVM: x86: hyper-v: Allocate Hyper-V context lazily b9ce0f86d91942596bce0267bfa7db3bbd7b434f KVM: x86: hyper-v: Drop hv_vcpu_to_vcpu() helper 8f5c44f953d36f8c1aea6d57eb3251e3640f4dad KVM: x86/mmu: Make HVA handler retpoline-friendly 0c165b3c01fefa78f440d5759cef47e8754a7a32 KVM: x86/xen: Allow reset of Xen attributes 9294b8a12585f8b4ccb9c060b54bab0bd13f24b9 Documentation: kvm: fix warning 153fd68968be45e1c4355fe61b7531bc55e810e5 KVM: SVM: Use a separate vmcb for the nested L2 guest 0fd6e41d3c28b26c017f163acc8e7e45db33962e KVM: nSVM: Track the physical cpu of the vmcb vmrun through the vmcb d83064b5af762aa4d8281208407fba7b38045517 KVM: nSVM: Track the ASID generation of the vmcb vmrun through the vmcb fcd7355a2ac812d852a45c3414c9f9720a2dc6f3 KVM: nSVM: rename functions and variables according to vmcbXY nomenclature e144bdfea1ea994715a30f6b5e82ca36538ef8d0 KVM: nSVM: do not copy vmcb01->control blindly to vmcb02->control bd086ffe33c1b51a5512d61e25e03f1703c908ac KVM: nSVM: do not mark all VMCB01 fields dirty on nested vmexit 52411f8985e5ea5acf454b6017719f051f45a382 KVM: nSVM: do not mark all VMCB02 fields dirty on nested vmexit e879b5b65f2189606534dc5b23ef07bb01ad31c7 KVM: nSVM: only copy L1 non-VMLOAD/VMSAVE data in svm_set_nested_state() 0715d17d84288b64fc5d0ac0ebad64d7decb89d0 KVM: nSVM: Add missing checks for reserved bits to svm_set_nested_state() f55acbfb293e5ebe96fc847886007991f47617e4 KVM: x86: Move nVMX's consistency check macro to common code d86068f69cbabda7d07d2b74cd12ad11778d235d KVM: nSVM: Trace VM-Enter consistency check failures a91df12ff53e8f8fadb8ad9922c43c2c0d020aa0 KVM: SVM: Pass struct kvm_vcpu to exit handlers (and many, many other places) e119d5a7316a8015c9a160b1829b5cf40fadc66b KVM: nSVM: Add VMLOAD/VMSAVE helper to deduplicate code 603b12e0bd89d52f95aa2a12d47635b9d02f0fbe KVM: x86: Move XSETBV emulation to common code a1067ebc2b4e3b57ef6b3c5fb1642fa9a8356967 KVM: x86: Move trivial instruction-based exit handlers to common code 297bb0652b50a0d138b64597fc7eb2cf28099313 KVM: x86: Move RDPMC emulation to common code 4dfe67c9f9f09bd50b8aa436caee705d63b83839 KVM: SVM: Don't manually emulate RDPMC if nrips=0 13c8c08296dad36059e4ff7912c251dad697e65c KVM: SVM: Skip intercepted PAUSE instructions after emulation 68b8afb6013f446ed79189c60b63bb0c5af35cf2 x86/cpufeatures: Add CPUIDs for Control-flow Enforcement Technology (CET) 505cbafdc05c74e8e31c18bc6fcbb9da2a30806e cet msrs 56c9936c5dacf013b0e0c93c3e35673edbe4f18f KVM: x86: Report XSS as an MSR to be saved if there are supported features 3467725411bb3f2827c4893cc127c51c11b0628b KVM: x86: Refresh CPUID on writes to MSR_IA32_XSS 53a1c449f0275505b02f7a0a46152504b25b4aec KVM: x86: Load guest fpu state when accessing MSRs managed by XSAVES d9eb566ccd9f09ae4710edaddb6c2b1b98fff2ac KVM: x86: Add #CP support in guest exception classification. 8bf00f77eeb03d257a8565123ad78bd6d0eb3d76 KVM: VMX: Introduce CET VMCS fields and flags 8da426298cdfd7d8574e665b96dff04f7eb2d8c2 KVM: x86: Add fault checks for CR4.CET dbae887ee27ceb9671ba774f8cd97c31f0a905e0 KVM: VMX: Emulate reads and writes to CET MSRs e5b71e1e411817a2f621c4f2cbbe80585bd0b926 KVM: VMX: Add a synthetic MSR to allow userspace VMM to access GUEST_SSP 9d133acabf5230dd30c3a2eb3ba1323dc8619931 KVM: x86: Report CET MSRs as to-be-saved if CET is supported 75f4433ea199ac70471d3555fb4fbac85ac19f45 KVM: x86: Save/Restore GUEST_SSP to/from SMM state save area 8776cb4d423b6f82e7355a77b434dc9a4b756bbc KVM: x86: Enable CET virtualization for VMX and advertise CET to userspace 80430c578d78fede1b2a52ff6e152e87e985910e KVM: VMX: Pass through CET MSRs to the guest when supported 112aea8231b3e04e83511231b3552ae17614b0f8 KVM: nVMX: Add helper to check the vmcs01 MSR bitmap for MSR pass-through d4de5dee3ab410e84ca5c4e192731f6717486cd1 KVM: nVMX: Enable CET support for nested VMX 19bb885f38f08afea5d42e5af9426b9f638f23d3 x86/cpufeatures: Enumerate #DB for bus lock detection 6e856438b72e296000d1de873c43ef599fd35a2c x86/bus_lock: Handle warn and fatal in #DB for bus lock 6ddc6784fc4108b3cbded3afb0c2489d1c198492 KVM: X86: Add support for the emulation of DR6_BUS_LOCK bit 208daa08adc25a8f475f2714ae3177d8a0d29bdb KVM: X86: Expose bus lock debug exception to guest