Thank you Thomas. I missed what I think is your fundamental point
regarding duplication created by this patch between CPU feature bits
and KVM's consumption of the IA32_VMX_EPT_VPID_CAP MSR.
Should all the features in this MSR be exposed via CPU feature bits
and should KVM consume only from there
esent.
Signed-off-by: Peter Feiner
Signed-off-by: Peter Shier
Reviewed-by: Jim Mattson
---
arch/x86/include/asm/cpufeatures.h | 2 +-
arch/x86/kernel/cpu/intel.c| 10 +-
2 files changed, 10 insertions(+), 2 deletions(-)
diff --git a/arch/x86/include/asm/cpufeatures.h
b/arch/x
k would be
generally useful and I will be careful from now on to remove any
wording that is not publicly relevant.
On Mon, Jul 30, 2018 at 3:12 PM Thomas Gleixner wrote:
>
> On Mon, 30 Jul 2018, Peter Shier wrote:
>
> > Subject: [PATCH] proc: added ept_ad flag to /proc/cpuinfo
>
> T
From: Peter Feiner
The Intel Haswell architecture has an EPT feature whereby the access &
dirty bits in EPT entries are updated without taking a guest exit.
This patch adds the "ept_ad" flag to /proc/cpuinfo if this feature is
available.
Signed-off-by: Peter Feiner
Signed-off-b
4 matches
Mail list logo