KVM: VMX: Enumerate EPT Violation #VE support in /proc/cpuinfo
authorSean Christopherson <seanjc@google.com>
Sat, 18 May 2024 00:04:29 +0000 (17:04 -0700)
committerPaolo Bonzini <pbonzini@redhat.com>
Thu, 23 May 2024 16:28:49 +0000 (12:28 -0400)
commita5dc0c9b557573315633bc78bacf8f548352f95b
treeeb1823c6c882fbee1aa54c6873d390ac950aece3
parentbca99c0356524a620126b789edbaf25934415467
KVM: VMX: Enumerate EPT Violation #VE support in /proc/cpuinfo

Don't suppress printing EPT_VIOLATION_VE in /proc/cpuinfo, knowing whether
or not KVM_INTEL_PROVE_VE actually does anything is extremely valuable.
A privileged user can get at the information by reading the raw MSR, but
the whole point of the VMX flags is to avoid needing to glean information
from raw MSR reads.

Signed-off-by: Sean Christopherson <seanjc@google.com>
Message-ID: <20240518000430.1118488-9-seanjc@google.com>
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
arch/x86/include/asm/vmxfeatures.h