From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-3.8 required=3.0 tests=HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS,USER_AGENT_GIT autolearn=no autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 037D9C433E2 for ; Sun, 5 Jul 2020 23:05:15 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by mail.kernel.org (Postfix) with ESMTP id DEE99206E2 for ; Sun, 5 Jul 2020 23:05:14 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728159AbgGEXFL (ORCPT ); Sun, 5 Jul 2020 19:05:11 -0400 Received: from mga03.intel.com ([134.134.136.65]:22784 "EHLO mga03.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727894AbgGEXFL (ORCPT ); Sun, 5 Jul 2020 19:05:11 -0400 IronPort-SDR: l1XRvknSfJpxrIl3BdiqmlF5ASTMWJw/RCb7dOnZwyxcIC/SW1uGP1pM35AJ8sFxdi4l4IWDwA 0A7JXw3U+zeQ== X-IronPort-AV: E=McAfee;i="6000,8403,9673"; a="147344297" X-IronPort-AV: E=Sophos;i="5.75,317,1589266800"; d="scan'208";a="147344297" X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from fmsmga001.fm.intel.com ([10.253.24.23]) by orsmga103.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 05 Jul 2020 16:05:10 -0700 IronPort-SDR: i0jCGVlWBSYwbFFrXWQhgxWDVRBwjxs/MsO0mwfKmvr3XN1mUpgZnvqFTrCNdpfjeSSe7VA7TR 232RjCbNGKRA== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.75,317,1589266800"; d="scan'208";a="388043365" Received: from unknown (HELO localhost.localdomain.bj.intel.com) ([10.238.156.127]) by fmsmga001.fm.intel.com with ESMTP; 05 Jul 2020 16:05:07 -0700 From: Cathy Zhang To: kvm@vger.kernel.org, linux-kernel@vger.kernel.org, x86@kernel.org Cc: pbonzini@redhat.com, sean.j.christopherson@intel.com, vkuznets@redhat.com, wanpengli@tencent.com, jmattson@google.com, joro@8bytes.org, tglx@linutronix.de, mingo@redhat.com, bp@alien8.de, hpa@zytor.com, ricardo.neri-calderon@linux.intel.com, kyung.min.park@intel.com, Cathy Zhang Subject: [PATCH 0/2] Expose new features for intel processor Date: Mon, 6 Jul 2020 06:59:50 +0800 Message-Id: <1593989992-10019-1-git-send-email-cathy.zhang@intel.com> X-Mailer: git-send-email 1.8.3.1 Sender: kvm-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: kvm@vger.kernel.org This patchset is to expose two new features for intel processors which support them, like Sapphire Rapids. SERIALIZE is a faster serializing instruction which does not modify registers, arithmetic flags or memory, will not cause VM exit. TSX suspend load tracking instruction aims to give a way to choose which memory accesses do not need to be tracked in the TSX read set. Cathy Zhang (2): x86: Expose SERIALIZE for supported cpuid x86: Expose TSX Suspend Load Address Tracking arch/x86/kvm/cpuid.c | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) -- 1.8.3.1