lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Wed, 16 Dec 2020 10:01:27 +0800 From: Yang Zhong <yang.zhong@...el.com> To: linux-kernel@...r.kernel.org, x86@...nel.org, kvm@...r.kernel.org Cc: tglx@...utronix.de, mingo@...hat.com, bp@...en8.de, hpa@...or.com, tony.luck@...el.com, pbonzini@...hat.com, seanjc@...gle.com, vkuznets@...hat.com, wanpengli@...cent.com, jmattson@...gle.com, joro@...tes.org, kyung.min.park@...el.com, yang.zhong@...el.com Subject: [PATCH 0/2] Enumerate and expose AVX_VNNI feature A processor supports AVX_VNNI instructions if CPUID.(EAX=7,ECX=1):EAX[bit 4] is present. This series includes kernel and kvm patches, kernel patch define this new cpu feature bit and kvm expose this bit to guest. When this bit is enabled on cpu or vcpu, the cpu feature flag is shown as "avx_vnni" in /proc/cpuinfo of host and guest. Detailed information on the instruction and CPUID feature flag can be found in the latest "extensions" manual [1]. Reference: [1]. https://software.intel.com/content/www/us/en/develop/download/intel-architecture-instruction-set-extensions-programming-reference.html Kyung Min Park (1): Enumerate AVX Vector Neural Network instructions Yang Zhong (1): KVM: Expose AVX_VNNI instruction to guset arch/x86/include/asm/cpufeatures.h | 1 + arch/x86/kvm/cpuid.c | 2 +- 2 files changed, 2 insertions(+), 1 deletion(-) -- 2.29.2.334.gfaefdd61ec
Powered by blists - more mailing lists