Skip to content
Projects
Groups
Snippets
Help
Loading...
Help
Support
Keyboard shortcuts
?
Submit feedback
Contribute to GitLab
Sign in / Register
Toggle navigation
L
linux
Project overview
Project overview
Details
Activity
Releases
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Issues
0
Issues
0
List
Boards
Labels
Milestones
Merge Requests
0
Merge Requests
0
Analytics
Analytics
Repository
Value Stream
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Create a new issue
Commits
Issue Boards
Open sidebar
Kirill Smelkov
linux
Commits
e24f14b0
Commit
e24f14b0
authored
Aug 08, 2018
by
David Woodhouse
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
tools headers: Synchronise x86 cpufeatures.h for L1TF additions
Signed-off-by:
David Woodhouse
<
dwmw@amazon.co.uk
>
parent
1063711b
Changes
1
Hide whitespace changes
Inline
Side-by-side
Showing
1 changed file
with
3 additions
and
0 deletions
+3
-0
tools/arch/x86/include/asm/cpufeatures.h
tools/arch/x86/include/asm/cpufeatures.h
+3
-0
No files found.
tools/arch/x86/include/asm/cpufeatures.h
View file @
e24f14b0
...
...
@@ -219,6 +219,7 @@
#define X86_FEATURE_IBPB ( 7*32+26)
/* Indirect Branch Prediction Barrier */
#define X86_FEATURE_STIBP ( 7*32+27)
/* Single Thread Indirect Branch Predictors */
#define X86_FEATURE_ZEN ( 7*32+28)
/* "" CPU is AMD family 0x17 (Zen) */
#define X86_FEATURE_L1TF_PTEINV ( 7*32+29)
/* "" L1TF workaround PTE inversion */
/* Virtualization flags: Linux defined, word 8 */
#define X86_FEATURE_TPR_SHADOW ( 8*32+ 0)
/* Intel TPR Shadow */
...
...
@@ -341,6 +342,7 @@
#define X86_FEATURE_PCONFIG (18*32+18)
/* Intel PCONFIG */
#define X86_FEATURE_SPEC_CTRL (18*32+26)
/* "" Speculation Control (IBRS + IBPB) */
#define X86_FEATURE_INTEL_STIBP (18*32+27)
/* "" Single Thread Indirect Branch Predictors */
#define X86_FEATURE_FLUSH_L1D (18*32+28)
/* Flush L1D cache */
#define X86_FEATURE_ARCH_CAPABILITIES (18*32+29)
/* IA32_ARCH_CAPABILITIES MSR (Intel) */
#define X86_FEATURE_SPEC_CTRL_SSBD (18*32+31)
/* "" Speculative Store Bypass Disable */
...
...
@@ -373,5 +375,6 @@
#define X86_BUG_SPECTRE_V1 X86_BUG(15)
/* CPU is affected by Spectre variant 1 attack with conditional branches */
#define X86_BUG_SPECTRE_V2 X86_BUG(16)
/* CPU is affected by Spectre variant 2 attack with indirect branches */
#define X86_BUG_SPEC_STORE_BYPASS X86_BUG(17)
/* CPU is affected by speculative store bypass attack */
#define X86_BUG_L1TF X86_BUG(18)
/* CPU is affected by L1 Terminal Fault */
#endif
/* _ASM_X86_CPUFEATURES_H */
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment