blob: ea372ccaf04353717a31db1170cd1b659e1b9f2d [file] [log] [blame]
995f00a61958 ("x86: kvm: mmu: use ept a/d in vmcs02 iff used in vmcs12")
fe0e80befd4d ("KVM: VMX: drop vmm_exclusive module parameter")
332518706195 ("KVM: nVMX: fix AD condition when handling EPT violation")
ae1e2d1082ae ("kvm: nVMX: support EPT accessed/dirty bits")
86407bcb5c83 ("kvm: x86: MMU support for EPT accessed/dirty bits")
004772313040 ("KVM: VMX: remove bogus check for invalid EPT violation")
7db742654dd5 ("KVM: nVMX: we support 1GB EPT pages")
f0b98c02c18a ("kvm: vmx: Don't use INVVPID when EPT is enabled")
fb6c81984313 ("kvm: vmx: Flush TLB when the APIC-access address changes")
312b616b30d8 ("kvm: x86: mmu: Set SPTE_SPECIAL_MASK within mmu.c")
ab22a4733fe9 ("kvm: x86: mmu: Rename EPT_VIOLATION_READ/WRITE/INSTR constants")
f160c7b7bb32 ("kvm: x86: mmu: Lockless access tracking for Intel CPUs without EPT A bits.")
37f0e8fe6b10 ("kvm: x86: mmu: Do not use bit 63 for tracking special SPTEs")
83ef6c8155c0 ("kvm: x86: mmu: Refactor accessed/dirty checks in mmu_spte_update/clear")
97dceba29a6a ("kvm: x86: mmu: Fast Page Fault path retries")
ea4114bcd3a8 ("kvm: x86: mmu: Rename spte_is_locklessly_modifiable()")
27959a4415a5 ("kvm: x86: mmu: Use symbolic constants for EPT Violation Exit Qualifications")
114df303a7ee ("kvm: x86: reduce collisions in mmu_page_hash")
66d73e12f278 ("KVM: X86: MMU: no mmu_notifier_seq++ in kvm_age_hva")