Re: [PATCH] proc: added ept_ad flag to /proc/cpuinfo

2018-08-02 Thread Peter Shier
Thank you Thomas. I missed what I think is your fundamental point regarding duplication created by this patch between CPU feature bits and KVM's consumption of the IA32_VMX_EPT_VPID_CAP MSR. Should all the features in this MSR be exposed via CPU feature bits and should KVM consume only from there

[PATCH] x86/cpufeatures: Add EPT_AD feature bit

2018-08-01 Thread Peter Shier
esent. Signed-off-by: Peter Feiner Signed-off-by: Peter Shier Reviewed-by: Jim Mattson --- arch/x86/include/asm/cpufeatures.h | 2 +- arch/x86/kernel/cpu/intel.c| 10 +- 2 files changed, 10 insertions(+), 2 deletions(-) diff --git a/arch/x86/include/asm/cpufeatures.h b/arch/x

Re: [PATCH] proc: added ept_ad flag to /proc/cpuinfo

2018-08-01 Thread Peter Shier
k would be generally useful and I will be careful from now on to remove any wording that is not publicly relevant. On Mon, Jul 30, 2018 at 3:12 PM Thomas Gleixner wrote: > > On Mon, 30 Jul 2018, Peter Shier wrote: > > > Subject: [PATCH] proc: added ept_ad flag to /proc/cpuinfo > > T

[PATCH] proc: added ept_ad flag to /proc/cpuinfo

2018-07-30 Thread Peter Shier
From: Peter Feiner The Intel Haswell architecture has an EPT feature whereby the access & dirty bits in EPT entries are updated without taking a guest exit. This patch adds the "ept_ad" flag to /proc/cpuinfo if this feature is available. Signed-off-by: Peter Feiner Signed-off-b