static int vmx_restore_vmx_misc(struct vcpu_vmx *vmx, u64 data)
 {
-       const u64 feature_and_reserved_bits =
-               /* feature */
-               BIT_ULL(5) | GENMASK_ULL(8, 6) | BIT_ULL(14) | BIT_ULL(15) |
-               BIT_ULL(28) | BIT_ULL(29) | BIT_ULL(30) |
-               /* reserved */
-               GENMASK_ULL(13, 9) | BIT_ULL(31);
+       const u64 feature_bits = VMX_MISC_SAVE_EFER_LMA |
+                                VMX_MISC_ACTIVITY_HLT |
+                                VMX_MISC_ACTIVITY_SHUTDOWN |
+                                VMX_MISC_ACTIVITY_WAIT_SIPI |
+                                VMX_MISC_INTEL_PT |
+                                VMX_MISC_RDMSR_IN_SMM |
+                                VMX_MISC_VMWRITE_SHADOW_RO_FIELDS |
+                                VMX_MISC_VMXOFF_BLOCK_SMI |
+                                VMX_MISC_ZERO_LEN_INS;
+
+       const u64 reserved_bits = BIT_ULL(31) | GENMASK_ULL(13, 9);
+
        u64 vmx_misc = vmx_control_msr(vmcs_config.nested.misc_low,
                                       vmcs_config.nested.misc_high);
 
-       if (!is_bitwise_subset(vmx_misc, data, feature_and_reserved_bits))
+       BUILD_BUG_ON(feature_bits & reserved_bits);
+
+       /*
+        * The incoming value must not set feature bits or reserved bits that
+        * aren't allowed/supported by KVM.  Fields, i.e. multi-bit values, are
+        * explicitly checked below.
+        */
+       if (!is_bitwise_subset(vmx_misc, data, feature_bits | reserved_bits))
                return -EINVAL;
 
        if ((vmx->nested.msrs.pinbased_ctls_high &