From patchwork Tue Nov 6 05:55:26 2018 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: "Liu, Jingqi" X-Patchwork-Id: 10669673 Return-Path: Received: from mail.wl.linuxfoundation.org (pdx-wl-mail.web.codeaurora.org [172.30.200.125]) by pdx-korg-patchwork-2.web.codeaurora.org (Postfix) with ESMTP id B663F15E9 for ; Tue, 6 Nov 2018 06:01:55 +0000 (UTC) Received: from mail.wl.linuxfoundation.org (localhost [127.0.0.1]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id A5C922A069 for ; Tue, 6 Nov 2018 06:01:55 +0000 (UTC) Received: by mail.wl.linuxfoundation.org (Postfix, from userid 486) id 9903A2A074; Tue, 6 Nov 2018 06:01:55 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on pdx-wl-mail.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-7.9 required=2.0 tests=BAYES_00,MAILING_LIST_MULTI, RCVD_IN_DNSWL_HI autolearn=ham version=3.3.1 Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id 32D502A069 for ; Tue, 6 Nov 2018 06:01:55 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729416AbeKFPYz (ORCPT ); Tue, 6 Nov 2018 10:24:55 -0500 Received: from mga04.intel.com ([192.55.52.120]:36463 "EHLO mga04.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729326AbeKFPYz (ORCPT ); Tue, 6 Nov 2018 10:24:55 -0500 X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from orsmga005.jf.intel.com ([10.7.209.41]) by fmsmga104.fm.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 05 Nov 2018 22:01:22 -0800 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.54,470,1534834800"; d="scan'208";a="271698783" Received: from optiplex-7050.sh.intel.com ([10.239.161.26]) by orsmga005.jf.intel.com with ESMTP; 05 Nov 2018 22:01:20 -0800 From: Liu Jingqi To: pbonzini@redhat.com, rkrcmar@redhat.com, tglx@linutronix.de, mingo@redhat.com Cc: bp@alien8.de, hpa@zytor.com, x86@kernel.org, kvm@vger.kernel.org, linux-kernel@vger.kernel.org, tao3.xu@intel.com, Liu Jingqi Subject: [PATCH v2 0/2] KVM: x86: expose direct stores instructions into VM. Date: Tue, 6 Nov 2018 13:55:26 +0800 Message-Id: <1541483728-7826-1-git-send-email-jingqi.liu@intel.com> X-Mailer: git-send-email 2.7.4 Sender: kvm-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: kvm@vger.kernel.org X-Virus-Scanned: ClamAV using ClamSMTP Direct stores instructions MOVDIRI and MOVDIR64B will be available in Tremont and other future x86 processors, and need to be exposed to guest VM. The release document ref below link: https://software.intel.com/sites/default/files/managed/c5/15/\ architecture-instruction-set-extensions-programming-reference.pdf This series expose movdiri and movdir64b features to guest VM. Changelog: v2: Separated from the series https://lkml.org/lkml/2018/7/10/160 since umonitor/umwait/tpause instructions patches are not ready yet. v1: Sent out with umonitor/umwait/tpause instructions patches. Liu Jingqi (2): KVM: x86: expose MOVDIRI CPU feature into VM. KVM: x86: expose MOVDIR64B CPU feature into VM. arch/x86/kvm/cpuid.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)