[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CACwOFJSta=jM7LDiEtT-V_UnCwhggurDa4B+dViqLcdyPvYGxQ@mail.gmail.com>
Date: Thu, 2 Aug 2018 12:33:37 -0700
From: Peter Shier <pshier@...gle.com>
To: tglx@...utronix.de
Cc: mingo@...hat.com, hpa@...or.com, x86@...nel.org, bp@...e.de,
konrad.wilk@...cle.com, dwmw@...zon.co.uk,
Jim Mattson <jmattson@...gle.com>,
linux-kernel@...r.kernel.org, Peter Feiner <pfeiner@...gle.com>,
kvm@...r.kernel.org
Subject: Re: [PATCH] proc: added ept_ad flag to /proc/cpuinfo
Thank you Thomas. I missed what I think is your fundamental point
regarding duplication created by this patch between CPU feature bits
and KVM's consumption of the IA32_VMX_EPT_VPID_CAP MSR.
Should all the features in this MSR be exposed via CPU feature bits
and should KVM consume only from there rather than reading the MSR
directly? There are 16 feature bits in the MSR per SDM Vol 3d section
A.10.
Powered by blists - more mailing lists