Greg Kroah-Hartman | b244131 | 2017-11-01 15:07:57 +0100 | [diff] [blame] | 1 | /* SPDX-License-Identifier: GPL-2.0 */ |
Borislav Petkov | cd4d09e | 2016-01-26 22:12:04 +0100 | [diff] [blame] | 2 | #ifndef _ASM_X86_CPUFEATURES_H |
| 3 | #define _ASM_X86_CPUFEATURES_H |
| 4 | |
| 5 | #ifndef _ASM_X86_REQUIRED_FEATURES_H |
| 6 | #include <asm/required-features.h> |
| 7 | #endif |
| 8 | |
| 9 | #ifndef _ASM_X86_DISABLED_FEATURES_H |
| 10 | #include <asm/disabled-features.h> |
| 11 | #endif |
| 12 | |
| 13 | /* |
| 14 | * Defines x86 CPU feature bits |
| 15 | */ |
David Woodhouse | 95ca0ee | 2018-01-25 16:14:09 +0000 | [diff] [blame] | 16 | #define NCAPINTS 19 /* N 32-bit words worth of info */ |
Ingo Molnar | acbc845 | 2017-10-31 13:17:22 +0100 | [diff] [blame] | 17 | #define NBUGINTS 1 /* N 32-bit bug flags */ |
Borislav Petkov | cd4d09e | 2016-01-26 22:12:04 +0100 | [diff] [blame] | 18 | |
| 19 | /* |
| 20 | * Note: If the comment begins with a quoted string, that string is used |
| 21 | * in /proc/cpuinfo instead of the macro name. If the string is "", |
| 22 | * this feature bit is not displayed in /proc/cpuinfo at all. |
Ingo Molnar | f3a624e | 2017-10-31 13:17:23 +0100 | [diff] [blame] | 23 | * |
Andi Kleen | 0b00de8 | 2017-10-13 14:56:42 -0700 | [diff] [blame] | 24 | * When adding new features here that depend on other features, |
Ingo Molnar | f3a624e | 2017-10-31 13:17:23 +0100 | [diff] [blame] | 25 | * please update the table in kernel/cpu/cpuid-deps.c as well. |
Andi Kleen | 0b00de8 | 2017-10-13 14:56:42 -0700 | [diff] [blame] | 26 | */ |
| 27 | |
Ingo Molnar | f3a624e | 2017-10-31 13:17:23 +0100 | [diff] [blame] | 28 | /* Intel-defined CPU features, CPUID level 0x00000001 (EDX), word 0 */ |
Ingo Molnar | acbc845 | 2017-10-31 13:17:22 +0100 | [diff] [blame] | 29 | #define X86_FEATURE_FPU ( 0*32+ 0) /* Onboard FPU */ |
| 30 | #define X86_FEATURE_VME ( 0*32+ 1) /* Virtual Mode Extensions */ |
| 31 | #define X86_FEATURE_DE ( 0*32+ 2) /* Debugging Extensions */ |
| 32 | #define X86_FEATURE_PSE ( 0*32+ 3) /* Page Size Extensions */ |
| 33 | #define X86_FEATURE_TSC ( 0*32+ 4) /* Time Stamp Counter */ |
| 34 | #define X86_FEATURE_MSR ( 0*32+ 5) /* Model-Specific Registers */ |
| 35 | #define X86_FEATURE_PAE ( 0*32+ 6) /* Physical Address Extensions */ |
| 36 | #define X86_FEATURE_MCE ( 0*32+ 7) /* Machine Check Exception */ |
| 37 | #define X86_FEATURE_CX8 ( 0*32+ 8) /* CMPXCHG8 instruction */ |
| 38 | #define X86_FEATURE_APIC ( 0*32+ 9) /* Onboard APIC */ |
| 39 | #define X86_FEATURE_SEP ( 0*32+11) /* SYSENTER/SYSEXIT */ |
| 40 | #define X86_FEATURE_MTRR ( 0*32+12) /* Memory Type Range Registers */ |
| 41 | #define X86_FEATURE_PGE ( 0*32+13) /* Page Global Enable */ |
| 42 | #define X86_FEATURE_MCA ( 0*32+14) /* Machine Check Architecture */ |
Ingo Molnar | f3a624e | 2017-10-31 13:17:23 +0100 | [diff] [blame] | 43 | #define X86_FEATURE_CMOV ( 0*32+15) /* CMOV instructions (plus FCMOVcc, FCOMI with FPU) */ |
Ingo Molnar | acbc845 | 2017-10-31 13:17:22 +0100 | [diff] [blame] | 44 | #define X86_FEATURE_PAT ( 0*32+16) /* Page Attribute Table */ |
| 45 | #define X86_FEATURE_PSE36 ( 0*32+17) /* 36-bit PSEs */ |
| 46 | #define X86_FEATURE_PN ( 0*32+18) /* Processor serial number */ |
| 47 | #define X86_FEATURE_CLFLUSH ( 0*32+19) /* CLFLUSH instruction */ |
| 48 | #define X86_FEATURE_DS ( 0*32+21) /* "dts" Debug Store */ |
| 49 | #define X86_FEATURE_ACPI ( 0*32+22) /* ACPI via MSR */ |
| 50 | #define X86_FEATURE_MMX ( 0*32+23) /* Multimedia Extensions */ |
| 51 | #define X86_FEATURE_FXSR ( 0*32+24) /* FXSAVE/FXRSTOR, CR4.OSFXSR */ |
| 52 | #define X86_FEATURE_XMM ( 0*32+25) /* "sse" */ |
| 53 | #define X86_FEATURE_XMM2 ( 0*32+26) /* "sse2" */ |
| 54 | #define X86_FEATURE_SELFSNOOP ( 0*32+27) /* "ss" CPU self snoop */ |
| 55 | #define X86_FEATURE_HT ( 0*32+28) /* Hyper-Threading */ |
| 56 | #define X86_FEATURE_ACC ( 0*32+29) /* "tm" Automatic clock control */ |
| 57 | #define X86_FEATURE_IA64 ( 0*32+30) /* IA-64 processor */ |
| 58 | #define X86_FEATURE_PBE ( 0*32+31) /* Pending Break Enable */ |
Borislav Petkov | cd4d09e | 2016-01-26 22:12:04 +0100 | [diff] [blame] | 59 | |
| 60 | /* AMD-defined CPU features, CPUID level 0x80000001, word 1 */ |
| 61 | /* Don't duplicate feature flags which are redundant with Intel! */ |
Ingo Molnar | acbc845 | 2017-10-31 13:17:22 +0100 | [diff] [blame] | 62 | #define X86_FEATURE_SYSCALL ( 1*32+11) /* SYSCALL/SYSRET */ |
Ingo Molnar | f3a624e | 2017-10-31 13:17:23 +0100 | [diff] [blame] | 63 | #define X86_FEATURE_MP ( 1*32+19) /* MP Capable */ |
Ingo Molnar | acbc845 | 2017-10-31 13:17:22 +0100 | [diff] [blame] | 64 | #define X86_FEATURE_NX ( 1*32+20) /* Execute Disable */ |
| 65 | #define X86_FEATURE_MMXEXT ( 1*32+22) /* AMD MMX extensions */ |
| 66 | #define X86_FEATURE_FXSR_OPT ( 1*32+25) /* FXSAVE/FXRSTOR optimizations */ |
| 67 | #define X86_FEATURE_GBPAGES ( 1*32+26) /* "pdpe1gb" GB pages */ |
| 68 | #define X86_FEATURE_RDTSCP ( 1*32+27) /* RDTSCP */ |
Ingo Molnar | f3a624e | 2017-10-31 13:17:23 +0100 | [diff] [blame] | 69 | #define X86_FEATURE_LM ( 1*32+29) /* Long Mode (x86-64, 64-bit support) */ |
| 70 | #define X86_FEATURE_3DNOWEXT ( 1*32+30) /* AMD 3DNow extensions */ |
| 71 | #define X86_FEATURE_3DNOW ( 1*32+31) /* 3DNow */ |
Borislav Petkov | cd4d09e | 2016-01-26 22:12:04 +0100 | [diff] [blame] | 72 | |
| 73 | /* Transmeta-defined CPU features, CPUID level 0x80860001, word 2 */ |
Ingo Molnar | acbc845 | 2017-10-31 13:17:22 +0100 | [diff] [blame] | 74 | #define X86_FEATURE_RECOVERY ( 2*32+ 0) /* CPU in recovery mode */ |
| 75 | #define X86_FEATURE_LONGRUN ( 2*32+ 1) /* Longrun power control */ |
| 76 | #define X86_FEATURE_LRTI ( 2*32+ 3) /* LongRun table interface */ |
Borislav Petkov | cd4d09e | 2016-01-26 22:12:04 +0100 | [diff] [blame] | 77 | |
| 78 | /* Other features, Linux-defined mapping, word 3 */ |
| 79 | /* This range is used for feature bits which conflict or are synthesized */ |
Ingo Molnar | acbc845 | 2017-10-31 13:17:22 +0100 | [diff] [blame] | 80 | #define X86_FEATURE_CXMMX ( 3*32+ 0) /* Cyrix MMX extensions */ |
| 81 | #define X86_FEATURE_K6_MTRR ( 3*32+ 1) /* AMD K6 nonstandard MTRRs */ |
| 82 | #define X86_FEATURE_CYRIX_ARR ( 3*32+ 2) /* Cyrix ARRs (= MTRRs) */ |
| 83 | #define X86_FEATURE_CENTAUR_MCR ( 3*32+ 3) /* Centaur MCRs (= MTRRs) */ |
Ingo Molnar | f3a624e | 2017-10-31 13:17:23 +0100 | [diff] [blame] | 84 | |
| 85 | /* CPU types for specific tunings: */ |
Ingo Molnar | acbc845 | 2017-10-31 13:17:22 +0100 | [diff] [blame] | 86 | #define X86_FEATURE_K8 ( 3*32+ 4) /* "" Opteron, Athlon64 */ |
| 87 | #define X86_FEATURE_K7 ( 3*32+ 5) /* "" Athlon */ |
| 88 | #define X86_FEATURE_P3 ( 3*32+ 6) /* "" P3 */ |
| 89 | #define X86_FEATURE_P4 ( 3*32+ 7) /* "" P4 */ |
| 90 | #define X86_FEATURE_CONSTANT_TSC ( 3*32+ 8) /* TSC ticks at a constant rate */ |
Ingo Molnar | f3a624e | 2017-10-31 13:17:23 +0100 | [diff] [blame] | 91 | #define X86_FEATURE_UP ( 3*32+ 9) /* SMP kernel running on UP */ |
| 92 | #define X86_FEATURE_ART ( 3*32+10) /* Always running timer (ART) */ |
Ingo Molnar | acbc845 | 2017-10-31 13:17:22 +0100 | [diff] [blame] | 93 | #define X86_FEATURE_ARCH_PERFMON ( 3*32+11) /* Intel Architectural PerfMon */ |
| 94 | #define X86_FEATURE_PEBS ( 3*32+12) /* Precise-Event Based Sampling */ |
| 95 | #define X86_FEATURE_BTS ( 3*32+13) /* Branch Trace Store */ |
Ingo Molnar | f3a624e | 2017-10-31 13:17:23 +0100 | [diff] [blame] | 96 | #define X86_FEATURE_SYSCALL32 ( 3*32+14) /* "" syscall in IA32 userspace */ |
| 97 | #define X86_FEATURE_SYSENTER32 ( 3*32+15) /* "" sysenter in IA32 userspace */ |
| 98 | #define X86_FEATURE_REP_GOOD ( 3*32+16) /* REP microcode works well */ |
Krish Sadhukhan | 5866e92 | 2020-09-17 21:20:36 +0000 | [diff] [blame] | 99 | #define X86_FEATURE_SME_COHERENT ( 3*32+17) /* "" AMD hardware-enforced cache coherency */ |
Ingo Molnar | f3a624e | 2017-10-31 13:17:23 +0100 | [diff] [blame] | 100 | #define X86_FEATURE_LFENCE_RDTSC ( 3*32+18) /* "" LFENCE synchronizes RDTSC */ |
Ingo Molnar | acbc845 | 2017-10-31 13:17:22 +0100 | [diff] [blame] | 101 | #define X86_FEATURE_ACC_POWER ( 3*32+19) /* AMD Accumulated Power Mechanism */ |
| 102 | #define X86_FEATURE_NOPL ( 3*32+20) /* The NOPL (0F 1F) instructions */ |
| 103 | #define X86_FEATURE_ALWAYS ( 3*32+21) /* "" Always-present feature */ |
Ingo Molnar | f3a624e | 2017-10-31 13:17:23 +0100 | [diff] [blame] | 104 | #define X86_FEATURE_XTOPOLOGY ( 3*32+22) /* CPU topology enum extensions */ |
Ingo Molnar | acbc845 | 2017-10-31 13:17:22 +0100 | [diff] [blame] | 105 | #define X86_FEATURE_TSC_RELIABLE ( 3*32+23) /* TSC is known to be reliable */ |
| 106 | #define X86_FEATURE_NONSTOP_TSC ( 3*32+24) /* TSC does not stop in C states */ |
| 107 | #define X86_FEATURE_CPUID ( 3*32+25) /* CPU has CPUID instruction itself */ |
Ingo Molnar | f3a624e | 2017-10-31 13:17:23 +0100 | [diff] [blame] | 108 | #define X86_FEATURE_EXTD_APICID ( 3*32+26) /* Extended APICID (8 bits) */ |
| 109 | #define X86_FEATURE_AMD_DCM ( 3*32+27) /* AMD multi-node processor */ |
| 110 | #define X86_FEATURE_APERFMPERF ( 3*32+28) /* P-State hardware coordination feedback capability (APERF/MPERF MSRs) */ |
Borislav Petkov | fbd5969d | 2020-06-04 12:38:39 +0200 | [diff] [blame] | 111 | /* free ( 3*32+29) */ |
Ingo Molnar | acbc845 | 2017-10-31 13:17:22 +0100 | [diff] [blame] | 112 | #define X86_FEATURE_NONSTOP_TSC_S3 ( 3*32+30) /* TSC doesn't stop in S3 state */ |
| 113 | #define X86_FEATURE_TSC_KNOWN_FREQ ( 3*32+31) /* TSC has known frequency */ |
Borislav Petkov | cd4d09e | 2016-01-26 22:12:04 +0100 | [diff] [blame] | 114 | |
Ingo Molnar | f3a624e | 2017-10-31 13:17:23 +0100 | [diff] [blame] | 115 | /* Intel-defined CPU features, CPUID level 0x00000001 (ECX), word 4 */ |
Ingo Molnar | acbc845 | 2017-10-31 13:17:22 +0100 | [diff] [blame] | 116 | #define X86_FEATURE_XMM3 ( 4*32+ 0) /* "pni" SSE-3 */ |
| 117 | #define X86_FEATURE_PCLMULQDQ ( 4*32+ 1) /* PCLMULQDQ instruction */ |
| 118 | #define X86_FEATURE_DTES64 ( 4*32+ 2) /* 64-bit Debug Store */ |
Ingo Molnar | f3a624e | 2017-10-31 13:17:23 +0100 | [diff] [blame] | 119 | #define X86_FEATURE_MWAIT ( 4*32+ 3) /* "monitor" MONITOR/MWAIT support */ |
| 120 | #define X86_FEATURE_DSCPL ( 4*32+ 4) /* "ds_cpl" CPL-qualified (filtered) Debug Store */ |
Ingo Molnar | acbc845 | 2017-10-31 13:17:22 +0100 | [diff] [blame] | 121 | #define X86_FEATURE_VMX ( 4*32+ 5) /* Hardware virtualization */ |
Ingo Molnar | f3a624e | 2017-10-31 13:17:23 +0100 | [diff] [blame] | 122 | #define X86_FEATURE_SMX ( 4*32+ 6) /* Safer Mode eXtensions */ |
Ingo Molnar | acbc845 | 2017-10-31 13:17:22 +0100 | [diff] [blame] | 123 | #define X86_FEATURE_EST ( 4*32+ 7) /* Enhanced SpeedStep */ |
| 124 | #define X86_FEATURE_TM2 ( 4*32+ 8) /* Thermal Monitor 2 */ |
| 125 | #define X86_FEATURE_SSSE3 ( 4*32+ 9) /* Supplemental SSE-3 */ |
| 126 | #define X86_FEATURE_CID ( 4*32+10) /* Context ID */ |
| 127 | #define X86_FEATURE_SDBG ( 4*32+11) /* Silicon Debug */ |
| 128 | #define X86_FEATURE_FMA ( 4*32+12) /* Fused multiply-add */ |
Ingo Molnar | f3a624e | 2017-10-31 13:17:23 +0100 | [diff] [blame] | 129 | #define X86_FEATURE_CX16 ( 4*32+13) /* CMPXCHG16B instruction */ |
Ingo Molnar | acbc845 | 2017-10-31 13:17:22 +0100 | [diff] [blame] | 130 | #define X86_FEATURE_XTPR ( 4*32+14) /* Send Task Priority Messages */ |
Ingo Molnar | f3a624e | 2017-10-31 13:17:23 +0100 | [diff] [blame] | 131 | #define X86_FEATURE_PDCM ( 4*32+15) /* Perf/Debug Capabilities MSR */ |
Ingo Molnar | acbc845 | 2017-10-31 13:17:22 +0100 | [diff] [blame] | 132 | #define X86_FEATURE_PCID ( 4*32+17) /* Process Context Identifiers */ |
| 133 | #define X86_FEATURE_DCA ( 4*32+18) /* Direct Cache Access */ |
| 134 | #define X86_FEATURE_XMM4_1 ( 4*32+19) /* "sse4_1" SSE-4.1 */ |
| 135 | #define X86_FEATURE_XMM4_2 ( 4*32+20) /* "sse4_2" SSE-4.2 */ |
Ingo Molnar | f3a624e | 2017-10-31 13:17:23 +0100 | [diff] [blame] | 136 | #define X86_FEATURE_X2APIC ( 4*32+21) /* X2APIC */ |
Ingo Molnar | acbc845 | 2017-10-31 13:17:22 +0100 | [diff] [blame] | 137 | #define X86_FEATURE_MOVBE ( 4*32+22) /* MOVBE instruction */ |
| 138 | #define X86_FEATURE_POPCNT ( 4*32+23) /* POPCNT instruction */ |
Ingo Molnar | f3a624e | 2017-10-31 13:17:23 +0100 | [diff] [blame] | 139 | #define X86_FEATURE_TSC_DEADLINE_TIMER ( 4*32+24) /* TSC deadline timer */ |
Ingo Molnar | acbc845 | 2017-10-31 13:17:22 +0100 | [diff] [blame] | 140 | #define X86_FEATURE_AES ( 4*32+25) /* AES instructions */ |
Ingo Molnar | f3a624e | 2017-10-31 13:17:23 +0100 | [diff] [blame] | 141 | #define X86_FEATURE_XSAVE ( 4*32+26) /* XSAVE/XRSTOR/XSETBV/XGETBV instructions */ |
| 142 | #define X86_FEATURE_OSXSAVE ( 4*32+27) /* "" XSAVE instruction enabled in the OS */ |
Ingo Molnar | acbc845 | 2017-10-31 13:17:22 +0100 | [diff] [blame] | 143 | #define X86_FEATURE_AVX ( 4*32+28) /* Advanced Vector Extensions */ |
Ingo Molnar | f3a624e | 2017-10-31 13:17:23 +0100 | [diff] [blame] | 144 | #define X86_FEATURE_F16C ( 4*32+29) /* 16-bit FP conversions */ |
| 145 | #define X86_FEATURE_RDRAND ( 4*32+30) /* RDRAND instruction */ |
Ingo Molnar | acbc845 | 2017-10-31 13:17:22 +0100 | [diff] [blame] | 146 | #define X86_FEATURE_HYPERVISOR ( 4*32+31) /* Running on a hypervisor */ |
Borislav Petkov | cd4d09e | 2016-01-26 22:12:04 +0100 | [diff] [blame] | 147 | |
| 148 | /* VIA/Cyrix/Centaur-defined CPU features, CPUID level 0xC0000001, word 5 */ |
Ingo Molnar | acbc845 | 2017-10-31 13:17:22 +0100 | [diff] [blame] | 149 | #define X86_FEATURE_XSTORE ( 5*32+ 2) /* "rng" RNG present (xstore) */ |
| 150 | #define X86_FEATURE_XSTORE_EN ( 5*32+ 3) /* "rng_en" RNG enabled */ |
| 151 | #define X86_FEATURE_XCRYPT ( 5*32+ 6) /* "ace" on-CPU crypto (xcrypt) */ |
| 152 | #define X86_FEATURE_XCRYPT_EN ( 5*32+ 7) /* "ace_en" on-CPU crypto enabled */ |
| 153 | #define X86_FEATURE_ACE2 ( 5*32+ 8) /* Advanced Cryptography Engine v2 */ |
| 154 | #define X86_FEATURE_ACE2_EN ( 5*32+ 9) /* ACE v2 enabled */ |
| 155 | #define X86_FEATURE_PHE ( 5*32+10) /* PadLock Hash Engine */ |
| 156 | #define X86_FEATURE_PHE_EN ( 5*32+11) /* PHE enabled */ |
| 157 | #define X86_FEATURE_PMM ( 5*32+12) /* PadLock Montgomery Multiplier */ |
| 158 | #define X86_FEATURE_PMM_EN ( 5*32+13) /* PMM enabled */ |
Borislav Petkov | cd4d09e | 2016-01-26 22:12:04 +0100 | [diff] [blame] | 159 | |
Ingo Molnar | f3a624e | 2017-10-31 13:17:23 +0100 | [diff] [blame] | 160 | /* More extended AMD flags: CPUID level 0x80000001, ECX, word 6 */ |
Ingo Molnar | acbc845 | 2017-10-31 13:17:22 +0100 | [diff] [blame] | 161 | #define X86_FEATURE_LAHF_LM ( 6*32+ 0) /* LAHF/SAHF in long mode */ |
| 162 | #define X86_FEATURE_CMP_LEGACY ( 6*32+ 1) /* If yes HyperThreading not valid */ |
Ingo Molnar | f3a624e | 2017-10-31 13:17:23 +0100 | [diff] [blame] | 163 | #define X86_FEATURE_SVM ( 6*32+ 2) /* Secure Virtual Machine */ |
Ingo Molnar | acbc845 | 2017-10-31 13:17:22 +0100 | [diff] [blame] | 164 | #define X86_FEATURE_EXTAPIC ( 6*32+ 3) /* Extended APIC space */ |
| 165 | #define X86_FEATURE_CR8_LEGACY ( 6*32+ 4) /* CR8 in 32-bit mode */ |
| 166 | #define X86_FEATURE_ABM ( 6*32+ 5) /* Advanced bit manipulation */ |
| 167 | #define X86_FEATURE_SSE4A ( 6*32+ 6) /* SSE-4A */ |
| 168 | #define X86_FEATURE_MISALIGNSSE ( 6*32+ 7) /* Misaligned SSE mode */ |
| 169 | #define X86_FEATURE_3DNOWPREFETCH ( 6*32+ 8) /* 3DNow prefetch instructions */ |
| 170 | #define X86_FEATURE_OSVW ( 6*32+ 9) /* OS Visible Workaround */ |
| 171 | #define X86_FEATURE_IBS ( 6*32+10) /* Instruction Based Sampling */ |
| 172 | #define X86_FEATURE_XOP ( 6*32+11) /* extended AVX instructions */ |
| 173 | #define X86_FEATURE_SKINIT ( 6*32+12) /* SKINIT/STGI instructions */ |
| 174 | #define X86_FEATURE_WDT ( 6*32+13) /* Watchdog timer */ |
| 175 | #define X86_FEATURE_LWP ( 6*32+15) /* Light Weight Profiling */ |
| 176 | #define X86_FEATURE_FMA4 ( 6*32+16) /* 4 operands MAC instructions */ |
Ingo Molnar | f3a624e | 2017-10-31 13:17:23 +0100 | [diff] [blame] | 177 | #define X86_FEATURE_TCE ( 6*32+17) /* Translation Cache Extension */ |
Ingo Molnar | acbc845 | 2017-10-31 13:17:22 +0100 | [diff] [blame] | 178 | #define X86_FEATURE_NODEID_MSR ( 6*32+19) /* NodeId MSR */ |
Ingo Molnar | f3a624e | 2017-10-31 13:17:23 +0100 | [diff] [blame] | 179 | #define X86_FEATURE_TBM ( 6*32+21) /* Trailing Bit Manipulations */ |
| 180 | #define X86_FEATURE_TOPOEXT ( 6*32+22) /* Topology extensions CPUID leafs */ |
| 181 | #define X86_FEATURE_PERFCTR_CORE ( 6*32+23) /* Core performance counter extensions */ |
Ingo Molnar | acbc845 | 2017-10-31 13:17:22 +0100 | [diff] [blame] | 182 | #define X86_FEATURE_PERFCTR_NB ( 6*32+24) /* NB performance counter extensions */ |
Ingo Molnar | f3a624e | 2017-10-31 13:17:23 +0100 | [diff] [blame] | 183 | #define X86_FEATURE_BPEXT ( 6*32+26) /* Data breakpoint extension */ |
| 184 | #define X86_FEATURE_PTSC ( 6*32+27) /* Performance time-stamp counter */ |
Ingo Molnar | acbc845 | 2017-10-31 13:17:22 +0100 | [diff] [blame] | 185 | #define X86_FEATURE_PERFCTR_LLC ( 6*32+28) /* Last Level Cache performance counter extensions */ |
Ingo Molnar | f3a624e | 2017-10-31 13:17:23 +0100 | [diff] [blame] | 186 | #define X86_FEATURE_MWAITX ( 6*32+29) /* MWAIT extension (MONITORX/MWAITX instructions) */ |
Borislav Petkov | cd4d09e | 2016-01-26 22:12:04 +0100 | [diff] [blame] | 187 | |
| 188 | /* |
| 189 | * Auxiliary flags: Linux defined - For features scattered in various |
| 190 | * CPUID levels like 0x6, 0xA etc, word 7. |
| 191 | * |
| 192 | * Reuse free bits when adding new feature flags! |
| 193 | */ |
Ingo Molnar | f3a624e | 2017-10-31 13:17:23 +0100 | [diff] [blame] | 194 | #define X86_FEATURE_RING3MWAIT ( 7*32+ 0) /* Ring 3 MONITOR/MWAIT instructions */ |
Ingo Molnar | acbc845 | 2017-10-31 13:17:22 +0100 | [diff] [blame] | 195 | #define X86_FEATURE_CPUID_FAULT ( 7*32+ 1) /* Intel CPUID faulting */ |
| 196 | #define X86_FEATURE_CPB ( 7*32+ 2) /* AMD Core Performance Boost */ |
| 197 | #define X86_FEATURE_EPB ( 7*32+ 3) /* IA32_ENERGY_PERF_BIAS support */ |
| 198 | #define X86_FEATURE_CAT_L3 ( 7*32+ 4) /* Cache Allocation Technology L3 */ |
| 199 | #define X86_FEATURE_CAT_L2 ( 7*32+ 5) /* Cache Allocation Technology L2 */ |
| 200 | #define X86_FEATURE_CDP_L3 ( 7*32+ 6) /* Code and Data Prioritization L3 */ |
Dave Hansen | 6cff64b | 2017-12-04 15:08:01 +0100 | [diff] [blame] | 201 | #define X86_FEATURE_INVPCID_SINGLE ( 7*32+ 7) /* Effectively INVPCID && CR4.PCIDE=1 */ |
Ingo Molnar | acbc845 | 2017-10-31 13:17:22 +0100 | [diff] [blame] | 202 | #define X86_FEATURE_HW_PSTATE ( 7*32+ 8) /* AMD HW-PState */ |
| 203 | #define X86_FEATURE_PROC_FEEDBACK ( 7*32+ 9) /* AMD ProcFeedbackInterface */ |
| 204 | #define X86_FEATURE_SME ( 7*32+10) /* AMD Secure Memory Encryption */ |
Thomas Gleixner | a89f040 | 2017-12-04 15:07:33 +0100 | [diff] [blame] | 205 | #define X86_FEATURE_PTI ( 7*32+11) /* Kernel Page Table Isolation enabled */ |
David Woodhouse | 2961298 | 2018-01-27 16:24:32 +0000 | [diff] [blame] | 206 | #define X86_FEATURE_RETPOLINE ( 7*32+12) /* "" Generic Retpoline mitigation for Spectre variant 2 */ |
| 207 | #define X86_FEATURE_RETPOLINE_AMD ( 7*32+13) /* "" AMD Retpoline mitigation for Spectre variant 2 */ |
Ingo Molnar | acbc845 | 2017-10-31 13:17:22 +0100 | [diff] [blame] | 208 | #define X86_FEATURE_INTEL_PPIN ( 7*32+14) /* Intel Processor Inventory Number */ |
Fenghua Yu | a511e79 | 2017-12-20 14:57:21 -0800 | [diff] [blame] | 209 | #define X86_FEATURE_CDP_L2 ( 7*32+15) /* Code and Data Prioritization L2 */ |
Thomas Gleixner | 7eb8956 | 2018-05-10 19:13:18 +0200 | [diff] [blame] | 210 | #define X86_FEATURE_MSR_SPEC_CTRL ( 7*32+16) /* "" MSR SPEC_CTRL is implemented */ |
Thomas Gleixner | 5281758 | 2018-05-10 20:21:36 +0200 | [diff] [blame] | 211 | #define X86_FEATURE_SSBD ( 7*32+17) /* Speculative Store Bypass Disable */ |
Ingo Molnar | acbc845 | 2017-10-31 13:17:22 +0100 | [diff] [blame] | 212 | #define X86_FEATURE_MBA ( 7*32+18) /* Memory Bandwidth Allocation */ |
David Woodhouse | 2961298 | 2018-01-27 16:24:32 +0000 | [diff] [blame] | 213 | #define X86_FEATURE_RSB_CTXSW ( 7*32+19) /* "" Fill RSB on context switches */ |
Radim Krčmář | 7bf14c2 | 2018-02-01 15:04:17 +0100 | [diff] [blame] | 214 | #define X86_FEATURE_SEV ( 7*32+20) /* AMD Secure Encrypted Virtualization */ |
David Woodhouse | 2961298 | 2018-01-27 16:24:32 +0000 | [diff] [blame] | 215 | #define X86_FEATURE_USE_IBPB ( 7*32+21) /* "" Indirect Branch Prediction Barrier enabled */ |
David Woodhouse | dd84441 | 2018-02-19 10:50:54 +0000 | [diff] [blame] | 216 | #define X86_FEATURE_USE_IBRS_FW ( 7*32+22) /* "" Use IBRS during runtime firmware calls */ |
Konrad Rzeszutek Wilk | 24f7fc8 | 2018-04-25 22:04:21 -0400 | [diff] [blame] | 217 | #define X86_FEATURE_SPEC_STORE_BYPASS_DISABLE ( 7*32+23) /* "" Disable Speculative Store Bypass. */ |
Thomas Gleixner | 5281758 | 2018-05-10 20:21:36 +0200 | [diff] [blame] | 218 | #define X86_FEATURE_LS_CFG_SSBD ( 7*32+24) /* "" AMD SSBD implementation via LS_CFG MSR */ |
Borislav Petkov | e7c587d | 2018-05-02 18:15:14 +0200 | [diff] [blame] | 219 | #define X86_FEATURE_IBRS ( 7*32+25) /* Indirect Branch Restricted Speculation */ |
| 220 | #define X86_FEATURE_IBPB ( 7*32+26) /* Indirect Branch Prediction Barrier */ |
| 221 | #define X86_FEATURE_STIBP ( 7*32+27) /* Single Thread Indirect Branch Predictors */ |
Kim Phillips | 753039e | 2020-03-11 14:14:51 -0500 | [diff] [blame] | 222 | #define X86_FEATURE_ZEN ( 7*32+28) /* "" CPU is AMD family 0x17 or above (Zen) */ |
Andi Kleen | 17dbca1 | 2018-06-13 15:48:26 -0700 | [diff] [blame] | 223 | #define X86_FEATURE_L1TF_PTEINV ( 7*32+29) /* "" L1TF workaround PTE inversion */ |
Linus Torvalds | 958f338 | 2018-08-14 09:46:06 -0700 | [diff] [blame] | 224 | #define X86_FEATURE_IBRS_ENHANCED ( 7*32+30) /* Enhanced IBRS */ |
Sean Christopherson | 85c1729 | 2019-12-20 20:45:07 -0800 | [diff] [blame] | 225 | #define X86_FEATURE_MSR_IA32_FEAT_CTL ( 7*32+31) /* "" MSR IA32_FEAT_CTL configured */ |
Vikas Shivappa | ab66a33 | 2017-04-07 17:33:52 -0700 | [diff] [blame] | 226 | |
Borislav Petkov | cd4d09e | 2016-01-26 22:12:04 +0100 | [diff] [blame] | 227 | /* Virtualization flags: Linux defined, word 8 */ |
Ingo Molnar | acbc845 | 2017-10-31 13:17:22 +0100 | [diff] [blame] | 228 | #define X86_FEATURE_TPR_SHADOW ( 8*32+ 0) /* Intel TPR Shadow */ |
| 229 | #define X86_FEATURE_VNMI ( 8*32+ 1) /* Intel Virtual NMI */ |
| 230 | #define X86_FEATURE_FLEXPRIORITY ( 8*32+ 2) /* Intel FlexPriority */ |
| 231 | #define X86_FEATURE_EPT ( 8*32+ 3) /* Intel Extended Page Table */ |
| 232 | #define X86_FEATURE_VPID ( 8*32+ 4) /* Intel Virtual Processor ID */ |
Borislav Petkov | cd4d09e | 2016-01-26 22:12:04 +0100 | [diff] [blame] | 233 | |
Ingo Molnar | f3a624e | 2017-10-31 13:17:23 +0100 | [diff] [blame] | 234 | #define X86_FEATURE_VMMCALL ( 8*32+15) /* Prefer VMMCALL to VMCALL */ |
Ingo Molnar | acbc845 | 2017-10-31 13:17:22 +0100 | [diff] [blame] | 235 | #define X86_FEATURE_XENPV ( 8*32+16) /* "" Xen paravirtual guest */ |
Peter Feiner | 301d328 | 2018-08-01 11:06:57 -0700 | [diff] [blame] | 236 | #define X86_FEATURE_EPT_AD ( 8*32+17) /* Intel Extended Page Table access-dirty bit */ |
Thomas Hellstrom | b4dd4f6 | 2019-08-28 10:03:51 +0200 | [diff] [blame] | 237 | #define X86_FEATURE_VMCALL ( 8*32+18) /* "" Hypervisor supports the VMCALL instruction */ |
| 238 | #define X86_FEATURE_VMW_VMMCALL ( 8*32+19) /* "" VMware prefers VMMCALL hypercall instruction */ |
Tom Lendacky | 360e7c5 | 2020-09-07 15:15:06 +0200 | [diff] [blame] | 239 | #define X86_FEATURE_SEV_ES ( 8*32+20) /* AMD Secure Encrypted Virtualization - Encrypted State */ |
Tom Lendacky | 69372cf0 | 2020-12-10 11:09:36 -0600 | [diff] [blame] | 240 | #define X86_FEATURE_VM_PAGE_FLUSH ( 8*32+21) /* "" VM Page Flush MSR is supported */ |
Borislav Petkov | cd4d09e | 2016-01-26 22:12:04 +0100 | [diff] [blame] | 241 | |
Ingo Molnar | f3a624e | 2017-10-31 13:17:23 +0100 | [diff] [blame] | 242 | /* Intel-defined CPU features, CPUID level 0x00000007:0 (EBX), word 9 */ |
| 243 | #define X86_FEATURE_FSGSBASE ( 9*32+ 0) /* RDFSBASE, WRFSBASE, RDGSBASE, WRGSBASE instructions*/ |
| 244 | #define X86_FEATURE_TSC_ADJUST ( 9*32+ 1) /* TSC adjustment MSR 0x3B */ |
Sean Christopherson | e7b6385 | 2020-11-13 00:01:14 +0200 | [diff] [blame] | 245 | #define X86_FEATURE_SGX ( 9*32+ 2) /* Software Guard Extensions */ |
Ingo Molnar | acbc845 | 2017-10-31 13:17:22 +0100 | [diff] [blame] | 246 | #define X86_FEATURE_BMI1 ( 9*32+ 3) /* 1st group bit manipulation extensions */ |
| 247 | #define X86_FEATURE_HLE ( 9*32+ 4) /* Hardware Lock Elision */ |
| 248 | #define X86_FEATURE_AVX2 ( 9*32+ 5) /* AVX2 instructions */ |
Aaron Lewis | cbb99c0 | 2019-06-05 15:02:52 -0700 | [diff] [blame] | 249 | #define X86_FEATURE_FDP_EXCPTN_ONLY ( 9*32+ 6) /* "" FPU data pointer updated only on x87 exceptions */ |
Ingo Molnar | acbc845 | 2017-10-31 13:17:22 +0100 | [diff] [blame] | 250 | #define X86_FEATURE_SMEP ( 9*32+ 7) /* Supervisor Mode Execution Protection */ |
| 251 | #define X86_FEATURE_BMI2 ( 9*32+ 8) /* 2nd group bit manipulation extensions */ |
Ingo Molnar | f3a624e | 2017-10-31 13:17:23 +0100 | [diff] [blame] | 252 | #define X86_FEATURE_ERMS ( 9*32+ 9) /* Enhanced REP MOVSB/STOSB instructions */ |
Ingo Molnar | acbc845 | 2017-10-31 13:17:22 +0100 | [diff] [blame] | 253 | #define X86_FEATURE_INVPCID ( 9*32+10) /* Invalidate Processor Context ID */ |
| 254 | #define X86_FEATURE_RTM ( 9*32+11) /* Restricted Transactional Memory */ |
| 255 | #define X86_FEATURE_CQM ( 9*32+12) /* Cache QoS Monitoring */ |
Aaron Lewis | cbb99c0 | 2019-06-05 15:02:52 -0700 | [diff] [blame] | 256 | #define X86_FEATURE_ZERO_FCS_FDS ( 9*32+13) /* "" Zero out FPU CS and FPU DS */ |
Ingo Molnar | acbc845 | 2017-10-31 13:17:22 +0100 | [diff] [blame] | 257 | #define X86_FEATURE_MPX ( 9*32+14) /* Memory Protection Extension */ |
| 258 | #define X86_FEATURE_RDT_A ( 9*32+15) /* Resource Director Technology Allocation */ |
| 259 | #define X86_FEATURE_AVX512F ( 9*32+16) /* AVX-512 Foundation */ |
| 260 | #define X86_FEATURE_AVX512DQ ( 9*32+17) /* AVX-512 DQ (Double/Quad granular) Instructions */ |
Ingo Molnar | f3a624e | 2017-10-31 13:17:23 +0100 | [diff] [blame] | 261 | #define X86_FEATURE_RDSEED ( 9*32+18) /* RDSEED instruction */ |
| 262 | #define X86_FEATURE_ADX ( 9*32+19) /* ADCX and ADOX instructions */ |
Ingo Molnar | acbc845 | 2017-10-31 13:17:22 +0100 | [diff] [blame] | 263 | #define X86_FEATURE_SMAP ( 9*32+20) /* Supervisor Mode Access Prevention */ |
| 264 | #define X86_FEATURE_AVX512IFMA ( 9*32+21) /* AVX-512 Integer Fused Multiply-Add instructions */ |
| 265 | #define X86_FEATURE_CLFLUSHOPT ( 9*32+23) /* CLFLUSHOPT instruction */ |
| 266 | #define X86_FEATURE_CLWB ( 9*32+24) /* CLWB instruction */ |
Paolo Bonzini | 4fdec20 | 2018-01-16 16:42:25 +0100 | [diff] [blame] | 267 | #define X86_FEATURE_INTEL_PT ( 9*32+25) /* Intel Processor Trace */ |
Ingo Molnar | acbc845 | 2017-10-31 13:17:22 +0100 | [diff] [blame] | 268 | #define X86_FEATURE_AVX512PF ( 9*32+26) /* AVX-512 Prefetch */ |
| 269 | #define X86_FEATURE_AVX512ER ( 9*32+27) /* AVX-512 Exponential and Reciprocal */ |
| 270 | #define X86_FEATURE_AVX512CD ( 9*32+28) /* AVX-512 Conflict Detection */ |
| 271 | #define X86_FEATURE_SHA_NI ( 9*32+29) /* SHA1/SHA256 Instruction Extensions */ |
| 272 | #define X86_FEATURE_AVX512BW ( 9*32+30) /* AVX-512 BW (Byte/Word granular) Instructions */ |
| 273 | #define X86_FEATURE_AVX512VL ( 9*32+31) /* AVX-512 VL (128/256 Vector Length) Extensions */ |
Borislav Petkov | cd4d09e | 2016-01-26 22:12:04 +0100 | [diff] [blame] | 274 | |
Ingo Molnar | f3a624e | 2017-10-31 13:17:23 +0100 | [diff] [blame] | 275 | /* Extended state features, CPUID level 0x0000000d:1 (EAX), word 10 */ |
| 276 | #define X86_FEATURE_XSAVEOPT (10*32+ 0) /* XSAVEOPT instruction */ |
| 277 | #define X86_FEATURE_XSAVEC (10*32+ 1) /* XSAVEC instruction */ |
| 278 | #define X86_FEATURE_XGETBV1 (10*32+ 2) /* XGETBV with ECX = 1 instruction */ |
| 279 | #define X86_FEATURE_XSAVES (10*32+ 3) /* XSAVES/XRSTORS instructions */ |
Borislav Petkov | cd4d09e | 2016-01-26 22:12:04 +0100 | [diff] [blame] | 280 | |
Fenghua Yu | acec0ce | 2019-06-19 18:51:09 +0200 | [diff] [blame] | 281 | /* |
| 282 | * Extended auxiliary flags: Linux defined - for features scattered in various |
| 283 | * CPUID levels like 0xf, etc. |
| 284 | * |
| 285 | * Reuse free bits when adding new feature flags! |
| 286 | */ |
| 287 | #define X86_FEATURE_CQM_LLC (11*32+ 0) /* LLC QoS if 1 */ |
| 288 | #define X86_FEATURE_CQM_OCCUP_LLC (11*32+ 1) /* LLC occupancy monitoring */ |
| 289 | #define X86_FEATURE_CQM_MBM_TOTAL (11*32+ 2) /* LLC Total MBM monitoring */ |
| 290 | #define X86_FEATURE_CQM_MBM_LOCAL (11*32+ 3) /* LLC Local MBM monitoring */ |
Josh Poimboeuf | 18ec54f | 2019-07-08 11:52:25 -0500 | [diff] [blame] | 291 | #define X86_FEATURE_FENCE_SWAPGS_USER (11*32+ 4) /* "" LFENCE in user entry SWAPGS path */ |
| 292 | #define X86_FEATURE_FENCE_SWAPGS_KERNEL (11*32+ 5) /* "" LFENCE in kernel entry SWAPGS path */ |
Peter Zijlstra (Intel) | 6650cdd | 2020-01-26 12:05:35 -0800 | [diff] [blame] | 293 | #define X86_FEATURE_SPLIT_LOCK_DETECT (11*32+ 6) /* #AC for split lock */ |
Fenghua Yu | e48cb1a | 2020-08-24 12:11:20 -0700 | [diff] [blame] | 294 | #define X86_FEATURE_PER_THREAD_MBA (11*32+ 7) /* "" Per-thread Memory Bandwidth Allocation */ |
Borislav Petkov | cd4d09e | 2016-01-26 22:12:04 +0100 | [diff] [blame] | 295 | |
Fenghua Yu | b302e4b | 2019-06-17 11:00:16 -0700 | [diff] [blame] | 296 | /* Intel-defined CPU features, CPUID level 0x00000007:1 (EAX), word 12 */ |
| 297 | #define X86_FEATURE_AVX512_BF16 (12*32+ 5) /* AVX512 BFLOAT16 instructions */ |
| 298 | |
Ingo Molnar | f3a624e | 2017-10-31 13:17:23 +0100 | [diff] [blame] | 299 | /* AMD-defined CPU features, CPUID level 0x80000008 (EBX), word 13 */ |
| 300 | #define X86_FEATURE_CLZERO (13*32+ 0) /* CLZERO instruction */ |
| 301 | #define X86_FEATURE_IRPERF (13*32+ 1) /* Instructions Retired Count */ |
Rudolf Marek | e3811a3 | 2017-11-28 22:01:06 +0100 | [diff] [blame] | 302 | #define X86_FEATURE_XSAVEERPTR (13*32+ 2) /* Always save/restore FP error pointers */ |
Babu Moger | 9d40b85 | 2019-10-07 15:48:39 -0500 | [diff] [blame] | 303 | #define X86_FEATURE_RDPRU (13*32+ 4) /* Read processor register at user level */ |
Robert Hoo | a0aea13 | 2018-12-19 21:51:43 +0800 | [diff] [blame] | 304 | #define X86_FEATURE_WBNOINVD (13*32+ 9) /* WBNOINVD instruction */ |
Borislav Petkov | e7c587d | 2018-05-02 18:15:14 +0200 | [diff] [blame] | 305 | #define X86_FEATURE_AMD_IBPB (13*32+12) /* "" Indirect Branch Prediction Barrier */ |
| 306 | #define X86_FEATURE_AMD_IBRS (13*32+14) /* "" Indirect Branch Restricted Speculation */ |
| 307 | #define X86_FEATURE_AMD_STIBP (13*32+15) /* "" Single Thread Indirect Branch Predictors */ |
Thomas Lendacky | 20c3a2c | 2018-12-13 23:03:54 +0000 | [diff] [blame] | 308 | #define X86_FEATURE_AMD_STIBP_ALWAYS_ON (13*32+17) /* "" Single Thread Indirect Branch Predictors always-on preferred */ |
Wei Huang | 077168e | 2020-03-21 14:38:00 -0500 | [diff] [blame] | 309 | #define X86_FEATURE_AMD_PPIN (13*32+23) /* Protected Processor Inventory Number */ |
Konrad Rzeszutek Wilk | 6ac2f49 | 2018-06-01 10:59:20 -0400 | [diff] [blame] | 310 | #define X86_FEATURE_AMD_SSBD (13*32+24) /* "" Speculative Store Bypass Disable */ |
Tom Lendacky | 11fb068 | 2018-05-17 17:09:18 +0200 | [diff] [blame] | 311 | #define X86_FEATURE_VIRT_SSBD (13*32+25) /* Virtualized Speculative Store Bypass Disable */ |
Konrad Rzeszutek Wilk | 2480986 | 2018-06-01 10:59:19 -0400 | [diff] [blame] | 312 | #define X86_FEATURE_AMD_SSB_NO (13*32+26) /* "" Speculative Store Bypass is fixed in hardware. */ |
Borislav Petkov | cd4d09e | 2016-01-26 22:12:04 +0100 | [diff] [blame] | 313 | |
Ingo Molnar | f3a624e | 2017-10-31 13:17:23 +0100 | [diff] [blame] | 314 | /* Thermal and Power Management Leaf, CPUID level 0x00000006 (EAX), word 14 */ |
Ingo Molnar | acbc845 | 2017-10-31 13:17:22 +0100 | [diff] [blame] | 315 | #define X86_FEATURE_DTHERM (14*32+ 0) /* Digital Thermal Sensor */ |
| 316 | #define X86_FEATURE_IDA (14*32+ 1) /* Intel Dynamic Acceleration */ |
| 317 | #define X86_FEATURE_ARAT (14*32+ 2) /* Always Running APIC Timer */ |
| 318 | #define X86_FEATURE_PLN (14*32+ 4) /* Intel Power Limit Notification */ |
| 319 | #define X86_FEATURE_PTS (14*32+ 6) /* Intel Package Thermal Status */ |
| 320 | #define X86_FEATURE_HWP (14*32+ 7) /* Intel Hardware P-states */ |
| 321 | #define X86_FEATURE_HWP_NOTIFY (14*32+ 8) /* HWP Notification */ |
| 322 | #define X86_FEATURE_HWP_ACT_WINDOW (14*32+ 9) /* HWP Activity Window */ |
| 323 | #define X86_FEATURE_HWP_EPP (14*32+10) /* HWP Energy Perf. Preference */ |
| 324 | #define X86_FEATURE_HWP_PKG_REQ (14*32+11) /* HWP Package Level Request */ |
Borislav Petkov | cd4d09e | 2016-01-26 22:12:04 +0100 | [diff] [blame] | 325 | |
Ingo Molnar | f3a624e | 2017-10-31 13:17:23 +0100 | [diff] [blame] | 326 | /* AMD SVM Feature Identification, CPUID level 0x8000000a (EDX), word 15 */ |
Ingo Molnar | acbc845 | 2017-10-31 13:17:22 +0100 | [diff] [blame] | 327 | #define X86_FEATURE_NPT (15*32+ 0) /* Nested Page Table support */ |
| 328 | #define X86_FEATURE_LBRV (15*32+ 1) /* LBR Virtualization support */ |
| 329 | #define X86_FEATURE_SVML (15*32+ 2) /* "svm_lock" SVM locking MSR */ |
| 330 | #define X86_FEATURE_NRIPS (15*32+ 3) /* "nrip_save" SVM next_rip save */ |
| 331 | #define X86_FEATURE_TSCRATEMSR (15*32+ 4) /* "tsc_scale" TSC scaling support */ |
| 332 | #define X86_FEATURE_VMCBCLEAN (15*32+ 5) /* "vmcb_clean" VMCB clean bits support */ |
| 333 | #define X86_FEATURE_FLUSHBYASID (15*32+ 6) /* flush-by-ASID support */ |
| 334 | #define X86_FEATURE_DECODEASSISTS (15*32+ 7) /* Decode Assists support */ |
| 335 | #define X86_FEATURE_PAUSEFILTER (15*32+10) /* filtered pause intercept */ |
| 336 | #define X86_FEATURE_PFTHRESHOLD (15*32+12) /* pause filter threshold */ |
| 337 | #define X86_FEATURE_AVIC (15*32+13) /* Virtual Interrupt Controller */ |
| 338 | #define X86_FEATURE_V_VMSAVE_VMLOAD (15*32+15) /* Virtual VMSAVE VMLOAD */ |
| 339 | #define X86_FEATURE_VGIF (15*32+16) /* Virtual GIF */ |
Borislav Petkov | cd4d09e | 2016-01-26 22:12:04 +0100 | [diff] [blame] | 340 | |
Ingo Molnar | f3a624e | 2017-10-31 13:17:23 +0100 | [diff] [blame] | 341 | /* Intel-defined CPU features, CPUID level 0x00000007:0 (ECX), word 16 */ |
Ingo Molnar | acbc845 | 2017-10-31 13:17:22 +0100 | [diff] [blame] | 342 | #define X86_FEATURE_AVX512VBMI (16*32+ 1) /* AVX512 Vector Bit Manipulation instructions*/ |
Ricardo Neri | 3522c2a | 2017-11-05 18:27:51 -0800 | [diff] [blame] | 343 | #define X86_FEATURE_UMIP (16*32+ 2) /* User Mode Instruction Protection */ |
Ingo Molnar | acbc845 | 2017-10-31 13:17:22 +0100 | [diff] [blame] | 344 | #define X86_FEATURE_PKU (16*32+ 3) /* Protection Keys for Userspace */ |
| 345 | #define X86_FEATURE_OSPKE (16*32+ 4) /* OS Protection Keys Enable */ |
Fenghua Yu | 6dbbf5e | 2019-06-19 18:33:54 -0700 | [diff] [blame] | 346 | #define X86_FEATURE_WAITPKG (16*32+ 5) /* UMONITOR/UMWAIT/TPAUSE Instructions */ |
Ingo Molnar | acbc845 | 2017-10-31 13:17:22 +0100 | [diff] [blame] | 347 | #define X86_FEATURE_AVX512_VBMI2 (16*32+ 6) /* Additional AVX512 Vector Bit Manipulation Instructions */ |
| 348 | #define X86_FEATURE_GFNI (16*32+ 8) /* Galois Field New Instructions */ |
| 349 | #define X86_FEATURE_VAES (16*32+ 9) /* Vector AES */ |
Ingo Molnar | f3a624e | 2017-10-31 13:17:23 +0100 | [diff] [blame] | 350 | #define X86_FEATURE_VPCLMULQDQ (16*32+10) /* Carry-Less Multiplication Double Quadword */ |
| 351 | #define X86_FEATURE_AVX512_VNNI (16*32+11) /* Vector Neural Network Instructions */ |
| 352 | #define X86_FEATURE_AVX512_BITALG (16*32+12) /* Support for VPOPCNT[B,W] and VPSHUF-BITQMB instructions */ |
Kirill A. Shutemov | 1da961d | 2018-03-05 19:25:49 +0300 | [diff] [blame] | 353 | #define X86_FEATURE_TME (16*32+13) /* Intel Total Memory Encryption */ |
Ingo Molnar | acbc845 | 2017-10-31 13:17:22 +0100 | [diff] [blame] | 354 | #define X86_FEATURE_AVX512_VPOPCNTDQ (16*32+14) /* POPCNT for vectors of DW/QW */ |
| 355 | #define X86_FEATURE_LA57 (16*32+16) /* 5-level page tables */ |
| 356 | #define X86_FEATURE_RDPID (16*32+22) /* RDPID instruction */ |
Fenghua Yu | 9124130 | 2018-04-23 11:29:22 -0700 | [diff] [blame] | 357 | #define X86_FEATURE_CLDEMOTE (16*32+25) /* CLDEMOTE instruction */ |
Fenghua Yu | 33823f4d | 2018-10-24 14:57:16 -0700 | [diff] [blame] | 358 | #define X86_FEATURE_MOVDIRI (16*32+27) /* MOVDIRI instruction */ |
Fenghua Yu | ace6485 | 2018-10-24 14:57:17 -0700 | [diff] [blame] | 359 | #define X86_FEATURE_MOVDIR64B (16*32+28) /* MOVDIR64B instruction */ |
Fenghua Yu | ff4f828 | 2020-09-15 09:30:08 -0700 | [diff] [blame] | 360 | #define X86_FEATURE_ENQCMD (16*32+29) /* ENQCMD and ENQCMDS instructions */ |
Sean Christopherson | d205e0f | 2020-11-13 00:01:15 +0200 | [diff] [blame] | 361 | #define X86_FEATURE_SGX_LC (16*32+30) /* Software Guard Extensions Launch Control */ |
Dave Hansen | 0d47638 | 2016-03-10 14:12:13 -0800 | [diff] [blame] | 362 | |
Ingo Molnar | f3a624e | 2017-10-31 13:17:23 +0100 | [diff] [blame] | 363 | /* AMD-defined CPU features, CPUID level 0x80000007 (EBX), word 17 */ |
| 364 | #define X86_FEATURE_OVERFLOW_RECOV (17*32+ 0) /* MCA overflow recovery support */ |
| 365 | #define X86_FEATURE_SUCCOR (17*32+ 1) /* Uncorrectable error containment and recovery */ |
| 366 | #define X86_FEATURE_SMCA (17*32+ 3) /* Scalable MCA */ |
Yazen Ghannam | 71faad4 | 2016-05-11 14:58:26 +0200 | [diff] [blame] | 367 | |
David Woodhouse | 95ca0ee | 2018-01-25 16:14:09 +0000 | [diff] [blame] | 368 | /* Intel-defined CPU features, CPUID level 0x00000007:0 (EDX), word 18 */ |
| 369 | #define X86_FEATURE_AVX512_4VNNIW (18*32+ 2) /* AVX-512 Neural Network Instructions */ |
| 370 | #define X86_FEATURE_AVX512_4FMAPS (18*32+ 3) /* AVX-512 Multiply Accumulation Single precision */ |
Tony Luck | f444a5f | 2019-12-16 13:42:54 -0800 | [diff] [blame] | 371 | #define X86_FEATURE_FSRM (18*32+ 4) /* Fast Short Rep Mov */ |
Gayatri Kammela | 018ebca | 2019-07-17 16:46:32 -0700 | [diff] [blame] | 372 | #define X86_FEATURE_AVX512_VP2INTERSECT (18*32+ 8) /* AVX-512 Intersect for D/Q */ |
Mark Gross | 7e5b3c2 | 2020-04-16 17:54:04 +0200 | [diff] [blame] | 373 | #define X86_FEATURE_SRBDS_CTRL (18*32+ 9) /* "" SRBDS mitigation MSR available */ |
Andi Kleen | ed5194c | 2019-01-18 16:50:16 -0800 | [diff] [blame] | 374 | #define X86_FEATURE_MD_CLEAR (18*32+10) /* VERW clears CPU buffers */ |
Peter Zijlstra (Intel) | 52f6490 | 2019-03-05 22:23:17 +0100 | [diff] [blame] | 375 | #define X86_FEATURE_TSX_FORCE_ABORT (18*32+13) /* "" TSX_FORCE_ABORT */ |
Ricardo Neri | 85b23fb | 2020-07-26 21:31:29 -0700 | [diff] [blame] | 376 | #define X86_FEATURE_SERIALIZE (18*32+14) /* SERIALIZE instruction */ |
Kyung Min Park | 18ec63f | 2020-08-25 08:47:57 +0800 | [diff] [blame] | 377 | #define X86_FEATURE_TSXLDTRK (18*32+16) /* TSX Suspend Load Address Tracking */ |
Kirill A. Shutemov | 7958b22 | 2018-03-05 19:25:51 +0300 | [diff] [blame] | 378 | #define X86_FEATURE_PCONFIG (18*32+18) /* Intel PCONFIG */ |
Kan Liang | bd657aa | 2020-07-03 05:49:07 -0700 | [diff] [blame] | 379 | #define X86_FEATURE_ARCH_LBR (18*32+19) /* Intel ARCH LBR */ |
Kyung Min Park | e1b35da | 2020-12-07 19:34:40 -0800 | [diff] [blame] | 380 | #define X86_FEATURE_AVX512_FP16 (18*32+23) /* AVX512 FP16 */ |
David Woodhouse | 2961298 | 2018-01-27 16:24:32 +0000 | [diff] [blame] | 381 | #define X86_FEATURE_SPEC_CTRL (18*32+26) /* "" Speculation Control (IBRS + IBPB) */ |
| 382 | #define X86_FEATURE_INTEL_STIBP (18*32+27) /* "" Single Thread Indirect Branch Predictors */ |
Konrad Rzeszutek Wilk | 11e34e6 | 2018-06-20 16:42:58 -0400 | [diff] [blame] | 383 | #define X86_FEATURE_FLUSH_L1D (18*32+28) /* Flush L1D cache */ |
David Woodhouse | fc67dd7 | 2018-01-25 16:14:10 +0000 | [diff] [blame] | 384 | #define X86_FEATURE_ARCH_CAPABILITIES (18*32+29) /* IA32_ARCH_CAPABILITIES MSR (Intel) */ |
Peter Zijlstra (Intel) | 6650cdd | 2020-01-26 12:05:35 -0800 | [diff] [blame] | 385 | #define X86_FEATURE_CORE_CAPABILITIES (18*32+30) /* "" IA32_CORE_CAPABILITIES MSR */ |
Thomas Gleixner | 5281758 | 2018-05-10 20:21:36 +0200 | [diff] [blame] | 386 | #define X86_FEATURE_SPEC_CTRL_SSBD (18*32+31) /* "" Speculative Store Bypass Disable */ |
David Woodhouse | 95ca0ee | 2018-01-25 16:14:09 +0000 | [diff] [blame] | 387 | |
Borislav Petkov | cd4d09e | 2016-01-26 22:12:04 +0100 | [diff] [blame] | 388 | /* |
| 389 | * BUG word(s) |
| 390 | */ |
Ingo Molnar | acbc845 | 2017-10-31 13:17:22 +0100 | [diff] [blame] | 391 | #define X86_BUG(x) (NCAPINTS*32 + (x)) |
Borislav Petkov | cd4d09e | 2016-01-26 22:12:04 +0100 | [diff] [blame] | 392 | |
Ingo Molnar | acbc845 | 2017-10-31 13:17:22 +0100 | [diff] [blame] | 393 | #define X86_BUG_F00F X86_BUG(0) /* Intel F00F */ |
| 394 | #define X86_BUG_FDIV X86_BUG(1) /* FPU FDIV */ |
| 395 | #define X86_BUG_COMA X86_BUG(2) /* Cyrix 6x86 coma */ |
| 396 | #define X86_BUG_AMD_TLB_MMATCH X86_BUG(3) /* "tlb_mmatch" AMD Erratum 383 */ |
| 397 | #define X86_BUG_AMD_APIC_C1E X86_BUG(4) /* "apic_c1e" AMD Erratum 400 */ |
| 398 | #define X86_BUG_11AP X86_BUG(5) /* Bad local APIC aka 11AP */ |
| 399 | #define X86_BUG_FXSAVE_LEAK X86_BUG(6) /* FXSAVE leaks FOP/FIP/FOP */ |
| 400 | #define X86_BUG_CLFLUSH_MONITOR X86_BUG(7) /* AAI65, CLFLUSH required before MONITOR */ |
| 401 | #define X86_BUG_SYSRET_SS_ATTRS X86_BUG(8) /* SYSRET doesn't fix up SS attrs */ |
Andy Lutomirski | 58a5aac | 2016-02-29 15:50:19 -0800 | [diff] [blame] | 402 | #ifdef CONFIG_X86_32 |
| 403 | /* |
| 404 | * 64-bit kernels don't use X86_BUG_ESPFIX. Make the define conditional |
| 405 | * to avoid confusion. |
| 406 | */ |
Ingo Molnar | acbc845 | 2017-10-31 13:17:22 +0100 | [diff] [blame] | 407 | #define X86_BUG_ESPFIX X86_BUG(9) /* "" IRET to 16-bit SS corrupts ESP/RSP high bits */ |
Andy Lutomirski | 58a5aac | 2016-02-29 15:50:19 -0800 | [diff] [blame] | 408 | #endif |
Ingo Molnar | acbc845 | 2017-10-31 13:17:22 +0100 | [diff] [blame] | 409 | #define X86_BUG_NULL_SEG X86_BUG(10) /* Nulling a selector preserves the base */ |
| 410 | #define X86_BUG_SWAPGS_FENCE X86_BUG(11) /* SWAPGS without input dep on GS */ |
| 411 | #define X86_BUG_MONITOR X86_BUG(12) /* IPI required to wake up remote CPU */ |
| 412 | #define X86_BUG_AMD_E400 X86_BUG(13) /* CPU is among the affected by Erratum 400 */ |
Thomas Gleixner | de79182 | 2018-01-05 15:27:34 +0100 | [diff] [blame] | 413 | #define X86_BUG_CPU_MELTDOWN X86_BUG(14) /* CPU is affected by meltdown attack and needs kernel page table isolation */ |
David Woodhouse | 99c6fa2 | 2018-01-06 11:49:23 +0000 | [diff] [blame] | 414 | #define X86_BUG_SPECTRE_V1 X86_BUG(15) /* CPU is affected by Spectre variant 1 attack with conditional branches */ |
| 415 | #define X86_BUG_SPECTRE_V2 X86_BUG(16) /* CPU is affected by Spectre variant 2 attack with indirect branches */ |
Konrad Rzeszutek Wilk | c456442 | 2018-04-25 22:04:20 -0400 | [diff] [blame] | 416 | #define X86_BUG_SPEC_STORE_BYPASS X86_BUG(17) /* CPU is affected by speculative store bypass attack */ |
Andi Kleen | 17dbca1 | 2018-06-13 15:48:26 -0700 | [diff] [blame] | 417 | #define X86_BUG_L1TF X86_BUG(18) /* CPU is affected by L1 Terminal Fault */ |
Andi Kleen | ed5194c | 2019-01-18 16:50:16 -0800 | [diff] [blame] | 418 | #define X86_BUG_MDS X86_BUG(19) /* CPU is affected by Microarchitectural data sampling */ |
Thomas Gleixner | e261f20 | 2019-03-01 20:21:08 +0100 | [diff] [blame] | 419 | #define X86_BUG_MSBDS_ONLY X86_BUG(20) /* CPU is only affected by the MSDBS variant of BUG_MDS */ |
Thomas Gleixner | f36cf38 | 2019-07-17 21:18:59 +0200 | [diff] [blame] | 420 | #define X86_BUG_SWAPGS X86_BUG(21) /* CPU is affected by speculation through SWAPGS */ |
Pawan Gupta | 1b42f01 | 2019-10-23 11:30:45 +0200 | [diff] [blame] | 421 | #define X86_BUG_TAA X86_BUG(22) /* CPU is affected by TSX Async Abort(TAA) */ |
Vineela Tummalapalli | db4d30f | 2019-11-04 12:22:01 +0100 | [diff] [blame] | 422 | #define X86_BUG_ITLB_MULTIHIT X86_BUG(23) /* CPU may incur MCE during certain page attribute changes */ |
Mark Gross | 7e5b3c2 | 2020-04-16 17:54:04 +0200 | [diff] [blame] | 423 | #define X86_BUG_SRBDS X86_BUG(24) /* CPU may leak RNG bits if not mitigated */ |
Ingo Molnar | f3a624e | 2017-10-31 13:17:23 +0100 | [diff] [blame] | 424 | |
Borislav Petkov | cd4d09e | 2016-01-26 22:12:04 +0100 | [diff] [blame] | 425 | #endif /* _ASM_X86_CPUFEATURES_H */ |