| 995f00a61958 ("x86: kvm: mmu: use ept a/d in vmcs02 iff used in vmcs12") |
| fe0e80befd4d ("KVM: VMX: drop vmm_exclusive module parameter") |
| 332518706195 ("KVM: nVMX: fix AD condition when handling EPT violation") |
| ae1e2d1082ae ("kvm: nVMX: support EPT accessed/dirty bits") |
| 86407bcb5c83 ("kvm: x86: MMU support for EPT accessed/dirty bits") |
| 004772313040 ("KVM: VMX: remove bogus check for invalid EPT violation") |
| 7db742654dd5 ("KVM: nVMX: we support 1GB EPT pages") |
| f0b98c02c18a ("kvm: vmx: Don't use INVVPID when EPT is enabled") |
| fb6c81984313 ("kvm: vmx: Flush TLB when the APIC-access address changes") |
| 312b616b30d8 ("kvm: x86: mmu: Set SPTE_SPECIAL_MASK within mmu.c") |
| ab22a4733fe9 ("kvm: x86: mmu: Rename EPT_VIOLATION_READ/WRITE/INSTR constants") |
| f160c7b7bb32 ("kvm: x86: mmu: Lockless access tracking for Intel CPUs without EPT A bits.") |
| 37f0e8fe6b10 ("kvm: x86: mmu: Do not use bit 63 for tracking special SPTEs") |
| 83ef6c8155c0 ("kvm: x86: mmu: Refactor accessed/dirty checks in mmu_spte_update/clear") |
| 97dceba29a6a ("kvm: x86: mmu: Fast Page Fault path retries") |
| ea4114bcd3a8 ("kvm: x86: mmu: Rename spte_is_locklessly_modifiable()") |
| 27959a4415a5 ("kvm: x86: mmu: Use symbolic constants for EPT Violation Exit Qualifications") |
| 114df303a7ee ("kvm: x86: reduce collisions in mmu_page_hash") |
| 66d73e12f278 ("KVM: X86: MMU: no mmu_notifier_seq++ in kvm_age_hva") |