|
336 | 336 | #define X86_FEATURE_AMD_IBRS (13*32+14) /* Indirect Branch Restricted Speculation */
|
337 | 337 | #define X86_FEATURE_AMD_STIBP (13*32+15) /* Single Thread Indirect Branch Predictors */
|
338 | 338 | #define X86_FEATURE_AMD_STIBP_ALWAYS_ON (13*32+17) /* Single Thread Indirect Branch Predictors always-on preferred */
|
339 |
| -#define X86_FEATURE_AMD_IBRS_SAME_MODE (13*32+19) /* Indirect Branch Restricted Speculation same mode protection*/ |
| 339 | +#define X86_FEATURE_AMD_IBRS_SAME_MODE (13*32+19) /* Indirect Branch Restricted Speculation same mode protection*/ |
340 | 340 | #define X86_FEATURE_AMD_PPIN (13*32+23) /* "amd_ppin" Protected Processor Inventory Number */
|
341 | 341 | #define X86_FEATURE_AMD_SSBD (13*32+24) /* Speculative Store Bypass Disable */
|
342 | 342 | #define X86_FEATURE_VIRT_SSBD (13*32+25) /* "virt_ssbd" Virtualized Speculative Store Bypass Disable */
|
|
379 | 379 | #define X86_FEATURE_V_SPEC_CTRL (15*32+20) /* "v_spec_ctrl" Virtual SPEC_CTRL */
|
380 | 380 | #define X86_FEATURE_VNMI (15*32+25) /* "vnmi" Virtual NMI */
|
381 | 381 | #define X86_FEATURE_SVME_ADDR_CHK (15*32+28) /* SVME addr check */
|
| 382 | +#define X86_FEATURE_BUS_LOCK_THRESHOLD (15*32+29) /* Bus lock threshold */ |
382 | 383 | #define X86_FEATURE_IDLE_HLT (15*32+30) /* IDLE HLT intercept */
|
383 | 384 |
|
384 | 385 | /* Intel-defined CPU features, CPUID level 0x00000007:0 (ECX), word 16 */
|
|
447 | 448 | #define X86_FEATURE_DEBUG_SWAP (19*32+14) /* "debug_swap" SEV-ES full debug state swap support */
|
448 | 449 | #define X86_FEATURE_RMPREAD (19*32+21) /* RMPREAD instruction */
|
449 | 450 | #define X86_FEATURE_SEGMENTED_RMP (19*32+23) /* Segmented RMP support */
|
| 451 | +#define X86_FEATURE_ALLOWED_SEV_FEATURES (19*32+27) /* Allowed SEV Features */ |
450 | 452 | #define X86_FEATURE_SVSM (19*32+28) /* "svsm" SVSM present */
|
451 | 453 | #define X86_FEATURE_HV_INUSE_WR_ALLOWED (19*32+30) /* Allow Write to in-use hypervisor-owned pages */
|
452 | 454 |
|
|
458 | 460 | #define X86_FEATURE_AUTOIBRS (20*32+ 8) /* Automatic IBRS */
|
459 | 461 | #define X86_FEATURE_NO_SMM_CTL_MSR (20*32+ 9) /* SMM_CTL MSR is not present */
|
460 | 462 |
|
| 463 | +#define X86_FEATURE_PREFETCHI (20*32+20) /* Prefetch Data/Instruction to Cache Level */ |
461 | 464 | #define X86_FEATURE_SBPB (20*32+27) /* Selective Branch Prediction Barrier */
|
462 | 465 | #define X86_FEATURE_IBPB_BRTYPE (20*32+28) /* MSR_PRED_CMD[IBPB] flushes all branch type predictions */
|
463 | 466 | #define X86_FEATURE_SRSO_NO (20*32+29) /* CPU is not affected by SRSO */
|
|
482 | 485 | #define X86_FEATURE_AMD_HTR_CORES (21*32+ 6) /* Heterogeneous Core Topology */
|
483 | 486 | #define X86_FEATURE_AMD_WORKLOAD_CLASS (21*32+ 7) /* Workload Classification */
|
484 | 487 | #define X86_FEATURE_PREFER_YMM (21*32+ 8) /* Avoid ZMM registers due to downclocking */
|
485 |
| -#define X86_FEATURE_INDIRECT_THUNK_ITS (21*32+ 9) /* Use thunk for indirect branches in lower half of cacheline */ |
| 488 | +#define X86_FEATURE_APX (21*32+ 9) /* Advanced Performance Extensions */ |
| 489 | +#define X86_FEATURE_INDIRECT_THUNK_ITS (21*32+10) /* Use thunk for indirect branches in lower half of cacheline */ |
486 | 490 |
|
487 | 491 | /*
|
488 | 492 | * BUG word(s)
|
|
535 | 539 | #define X86_BUG_BHI X86_BUG( 1*32+ 3) /* "bhi" CPU is affected by Branch History Injection */
|
536 | 540 | #define X86_BUG_IBPB_NO_RET X86_BUG( 1*32+ 4) /* "ibpb_no_ret" IBPB omits return target predictions */
|
537 | 541 | #define X86_BUG_SPECTRE_V2_USER X86_BUG( 1*32+ 5) /* "spectre_v2_user" CPU is affected by Spectre variant 2 attack between user processes */
|
538 |
| -#define X86_BUG_ITS X86_BUG( 1*32+ 6) /* "its" CPU is affected by Indirect Target Selection */ |
539 |
| -#define X86_BUG_ITS_NATIVE_ONLY X86_BUG( 1*32+ 7) /* "its_native_only" CPU is affected by ITS, VMX is not affected */ |
| 542 | +#define X86_BUG_OLD_MICROCODE X86_BUG( 1*32+ 6) /* "old_microcode" CPU has old microcode, it is surely vulnerable to something */ |
| 543 | +#define X86_BUG_ITS X86_BUG( 1*32+ 7) /* "its" CPU is affected by Indirect Target Selection */ |
| 544 | +#define X86_BUG_ITS_NATIVE_ONLY X86_BUG( 1*32+ 8) /* "its_native_only" CPU is affected by ITS, VMX is not affected */ |
| 545 | + |
540 | 546 | #endif /* _ASM_X86_CPUFEATURES_H */
|
0 commit comments