[pve-devel] applied: [PATCH manager 1/1] CPU flags: Add aes flag
Thomas Lamprecht
t.lamprecht at proxmox.com
Fri Aug 23 10:43:01 CEST 2019
On 01.08.19 19:39, Peter Keresztes Schmidt wrote:
> Signed-off-by: Peter Keresztes Schmidt <peterke at sos.ethz.ch>
> ---
> www/manager6/form/VMCPUFlagSelector.js | 3 ++-
> 1 file changed, 2 insertions(+), 1 deletion(-)
>
> diff --git a/www/manager6/form/VMCPUFlagSelector.js b/www/manager6/form/VMCPUFlagSelector.js
> index 2612be11..dec9de54 100644
> --- a/www/manager6/form/VMCPUFlagSelector.js
> +++ b/www/manager6/form/VMCPUFlagSelector.js
> @@ -32,7 +32,8 @@ Ext.define('PVE.form.VMCPUFlagSelector', {
> { flag: 'amd-no-ssb', desc: 'Notifies guest OS that host is not vulnerable for Spectre on AMD CPUs' },
> { flag: 'pdpe1gb', desc: 'Allow guest OS to use 1GB size pages, if host HW supports it' },
> { flag: 'hv-tlbflush', desc: 'Improve performance in overcommitted Windows guests. May lead to guest bluescreens on old CPUs.' },
> - { flag: 'hv-evmcs', desc: 'Improve performance for nested virtualization. Only supported on Intel CPUs.' }
> + { flag: 'hv-evmcs', desc: 'Improve performance for nested virtualization. Only supported on Intel CPUs.' },
> + { flag: 'aes', desc: 'Activate AES instruction set for HW acceleration.' }
> ],
> listeners: {
> update: function() {
>
applied, thanks!
More information about the pve-devel
mailing list