| 2ed41aa631fc ("KVM: VMX: Intercept guest reserved CR4 bits to inject #GP fault") |
| a6337a3542b1 ("KVM: x86: Move call to update_exception_bitmap() into VMX code") |
| c44d9b34701d ("KVM: x86: Invoke vendor's vcpu_after_set_cpuid() after all common updates") |
| 32de2b5ee378 ("KVM: x86: update exception bitmap on CPUID changes") |
| aedbaf4f6afd ("KVM: x86: Extract kvm_update_cpuid_runtime() from kvm_update_cpuid()") |
| a76733a98752 ("KVM: x86: Introduce kvm_check_cpuid()") |
| 36f37648ca98 ("KVM: X86: Move kvm_apic_set_version() to kvm_update_cpuid()") |
| 0d3b2ba16ba6 ("KVM: X86: Go on updating other CPUID leaves when leaf 1 is absent") |
| 18964092825a ("KVM: X86: Reset vcpu->arch.cpuid_nent to 0 if SET_CPUID* fails") |
| b899c13277a9 ("KVM: x86: Create mask for guest CR4 reserved bits in kvm_update_cpuid()") |
| 6abe9c1386e5 ("KVM: X86: Move ignore_msrs handling upper the stack") |
| fa71e9527f6a ("KVM: VMX: Use KVM_POSSIBLE_CR*_GUEST_BITS to initialize guest/host masks") |
| 7c83d096aed0 ("KVM: x86: Mark CR4.TSD as being possibly owned by the guest") |
| cbd717585b80 ("KVM: x86/pmu: Tweak kvm_pmu_get_msr to pass 'struct msr_data' in") |
| a71936ab46f1 ("kvm: x86: Cleanup vcpu->arch.guest_xstate_size") |