| 76ea438b4afc ("KVM: X86: Expose bus lock debug exception to guest") |
| 72add915fbd5 ("KVM: VMX: Enable SGX virtualization for SGX1, SGX2 and LC") |
| 8f102445d404 ("KVM: VMX: Add emulation of SGX Launch Control LE hash MSRs") |
| 70210c044b4e ("KVM: VMX: Add SGX ENCLS[ECREATE] handler to enforce CPUID restrictions") |
| 9798adbc04cf ("KVM: VMX: Frame in ENCLS handler for SGX virtualization") |
| ee36656f0ac3 ("KVM: VMX: Define Hyper-V paravirt TLB flush fields iff Hyper-V is enabled") |
| a4038ef1aa63 ("KVM: VMX: Track common EPTP for Hyper-V's paravirt TLB flush") |
| 6fcd9cbc6a90 ("kvm: x86: annotate RCU pointers") |
| e42033342293 ("KVM: x86: Advertise INVPCID by default") |
| c646236344e9 ("KVM: vmx/pmu: Add PMU_CAP_LBR_FMT check when guest LBR is enabled") |
| 9c9520ce8833 ("KVM: vmx/pmu: Add PMU_CAP_LBR_FMT check when guest LBR is enabled") |
| a755753903a4 ("KVM: x86/pmu: preserve IA32_PERF_CAPABILITIES across CPUID refresh") |
| d855066f8172 ("KVM: VMX: read/write MSR_IA32_DEBUGCTLMSR from GUEST_IA32_DEBUGCTL") |
| fe6b6bc802b4 ("KVM: VMX: Enable bus lock VM exit") |
| 8e5332402164 ("KVM: VMX: Convert vcpu_vmx.exit_reason to a union") |
| 647daca25d24 ("KVM: SVM: Add support for booting APs in an SEV-ES guest") |
| 8640ca588b03 ("KVM: SVM: Add AP_JUMP_TABLE support in prep for AP booting") |
| 861377730aa9 ("KVM: SVM: Provide support for SEV-ES vCPU loading") |
| 376c6d285017 ("KVM: SVM: Provide support for SEV-ES vCPU creation/loading") |
| 85ca8be938c0 ("KVM: SVM: Set the encryption mask for the SVM host save area") |