|
203 | 203 | #define X86_FEATURE_PROC_FEEDBACK ( 7*32+ 9) /* AMD ProcFeedbackInterface */
|
204 | 204 | #define X86_FEATURE_XCOMPACTED ( 7*32+10) /* "" Use compacted XSTATE (XSAVES or XSAVEC) */
|
205 | 205 | #define X86_FEATURE_PTI ( 7*32+11) /* Kernel Page Table Isolation enabled */
|
206 |
| -#define X86_FEATURE_RETPOLINE ( 7*32+12) /* "" Generic Retpoline mitigation for Spectre variant 2 */ |
207 |
| -#define X86_FEATURE_RETPOLINE_LFENCE ( 7*32+13) /* "" Use LFENCE for Spectre variant 2 */ |
| 206 | +#define X86_FEATURE_KERNEL_IBRS ( 7*32+12) /* "" Set/clear IBRS on kernel entry/exit */ |
| 207 | +#define X86_FEATURE_RSB_VMEXIT ( 7*32+13) /* "" Fill RSB on VM-Exit */ |
208 | 208 | #define X86_FEATURE_INTEL_PPIN ( 7*32+14) /* Intel Processor Inventory Number */
|
209 | 209 | #define X86_FEATURE_CDP_L2 ( 7*32+15) /* Code and Data Prioritization L2 */
|
210 | 210 | #define X86_FEATURE_MSR_SPEC_CTRL ( 7*32+16) /* "" MSR SPEC_CTRL is implemented */
|
|
296 | 296 | #define X86_FEATURE_PER_THREAD_MBA (11*32+ 7) /* "" Per-thread Memory Bandwidth Allocation */
|
297 | 297 | #define X86_FEATURE_SGX1 (11*32+ 8) /* "" Basic SGX */
|
298 | 298 | #define X86_FEATURE_SGX2 (11*32+ 9) /* "" SGX Enclave Dynamic Memory Management (EDMM) */
|
| 299 | +#define X86_FEATURE_ENTRY_IBPB (11*32+10) /* "" Issue an IBPB on kernel entry */ |
| 300 | +#define X86_FEATURE_RRSBA_CTRL (11*32+11) /* "" RET prediction control */ |
| 301 | +#define X86_FEATURE_RETPOLINE (11*32+12) /* "" Generic Retpoline mitigation for Spectre variant 2 */ |
| 302 | +#define X86_FEATURE_RETPOLINE_LFENCE (11*32+13) /* "" Use LFENCE for Spectre variant 2 */ |
| 303 | +#define X86_FEATURE_RETHUNK (11*32+14) /* "" Use REturn THUNK */ |
| 304 | +#define X86_FEATURE_UNRET (11*32+15) /* "" AMD BTB untrain return */ |
299 | 305 |
|
300 | 306 | /* Intel-defined CPU features, CPUID level 0x00000007:1 (EAX), word 12 */
|
301 | 307 | #define X86_FEATURE_AVX_VNNI (12*32+ 4) /* AVX VNNI instructions */
|
|
316 | 322 | #define X86_FEATURE_VIRT_SSBD (13*32+25) /* Virtualized Speculative Store Bypass Disable */
|
317 | 323 | #define X86_FEATURE_AMD_SSB_NO (13*32+26) /* "" Speculative Store Bypass is fixed in hardware. */
|
318 | 324 | #define X86_FEATURE_CPPC (13*32+27) /* Collaborative Processor Performance Control */
|
| 325 | +#define X86_FEATURE_BTC_NO (13*32+29) /* "" Not vulnerable to Branch Type Confusion */ |
319 | 326 | #define X86_FEATURE_BRS (13*32+31) /* Branch Sampling available */
|
320 | 327 |
|
321 | 328 | /* Thermal and Power Management Leaf, CPUID level 0x00000006 (EAX), word 14 */
|
|
447 | 454 | #define X86_BUG_ITLB_MULTIHIT X86_BUG(23) /* CPU may incur MCE during certain page attribute changes */
|
448 | 455 | #define X86_BUG_SRBDS X86_BUG(24) /* CPU may leak RNG bits if not mitigated */
|
449 | 456 | #define X86_BUG_MMIO_STALE_DATA X86_BUG(25) /* CPU is affected by Processor MMIO Stale Data vulnerabilities */
|
| 457 | +#define X86_BUG_RETBLEED X86_BUG(26) /* CPU is affected by RETBleed */ |
450 | 458 |
|
451 | 459 | #endif /* _ASM_X86_CPUFEATURES_H */
|
0 commit comments