Symbol: X86_BUG
arch/x86/include/asm/cpufeatures.h
524
#define X86_BUG_F00F X86_BUG(0) /* "f00f" Intel F00F */
arch/x86/include/asm/cpufeatures.h
525
#define X86_BUG_FDIV X86_BUG(1) /* "fdiv" FPU FDIV */
arch/x86/include/asm/cpufeatures.h
526
#define X86_BUG_COMA X86_BUG(2) /* "coma" Cyrix 6x86 coma */
arch/x86/include/asm/cpufeatures.h
527
#define X86_BUG_AMD_TLB_MMATCH X86_BUG(3) /* "tlb_mmatch" AMD Erratum 383 */
arch/x86/include/asm/cpufeatures.h
528
#define X86_BUG_AMD_APIC_C1E X86_BUG(4) /* "apic_c1e" AMD Erratum 400 */
arch/x86/include/asm/cpufeatures.h
529
#define X86_BUG_11AP X86_BUG(5) /* "11ap" Bad local APIC aka 11AP */
arch/x86/include/asm/cpufeatures.h
530
#define X86_BUG_FXSAVE_LEAK X86_BUG(6) /* "fxsave_leak" FXSAVE leaks FOP/FIP/FOP */
arch/x86/include/asm/cpufeatures.h
531
#define X86_BUG_CLFLUSH_MONITOR X86_BUG(7) /* "clflush_monitor" AAI65, CLFLUSH required before MONITOR */
arch/x86/include/asm/cpufeatures.h
532
#define X86_BUG_SYSRET_SS_ATTRS X86_BUG(8) /* "sysret_ss_attrs" SYSRET doesn't fix up SS attrs */
arch/x86/include/asm/cpufeatures.h
538
#define X86_BUG_ESPFIX X86_BUG(9) /* IRET to 16-bit SS corrupts ESP/RSP high bits */
arch/x86/include/asm/cpufeatures.h
540
#define X86_BUG_NULL_SEG X86_BUG(10) /* "null_seg" Nulling a selector preserves the base */
arch/x86/include/asm/cpufeatures.h
541
#define X86_BUG_SWAPGS_FENCE X86_BUG(11) /* "swapgs_fence" SWAPGS without input dep on GS */
arch/x86/include/asm/cpufeatures.h
542
#define X86_BUG_MONITOR X86_BUG(12) /* "monitor" IPI required to wake up remote CPU */
arch/x86/include/asm/cpufeatures.h
543
#define X86_BUG_AMD_E400 X86_BUG(13) /* "amd_e400" CPU is among the affected by Erratum 400 */
arch/x86/include/asm/cpufeatures.h
544
#define X86_BUG_CPU_MELTDOWN X86_BUG(14) /* "cpu_meltdown" CPU is affected by meltdown attack and needs kernel page table isolation */
arch/x86/include/asm/cpufeatures.h
545
#define X86_BUG_SPECTRE_V1 X86_BUG(15) /* "spectre_v1" CPU is affected by Spectre variant 1 attack with conditional branches */
arch/x86/include/asm/cpufeatures.h
546
#define X86_BUG_SPECTRE_V2 X86_BUG(16) /* "spectre_v2" CPU is affected by Spectre variant 2 attack with indirect branches */
arch/x86/include/asm/cpufeatures.h
547
#define X86_BUG_SPEC_STORE_BYPASS X86_BUG(17) /* "spec_store_bypass" CPU is affected by speculative store bypass attack */
arch/x86/include/asm/cpufeatures.h
548
#define X86_BUG_L1TF X86_BUG(18) /* "l1tf" CPU is affected by L1 Terminal Fault */
arch/x86/include/asm/cpufeatures.h
549
#define X86_BUG_MDS X86_BUG(19) /* "mds" CPU is affected by Microarchitectural data sampling */
arch/x86/include/asm/cpufeatures.h
550
#define X86_BUG_MSBDS_ONLY X86_BUG(20) /* "msbds_only" CPU is only affected by the MSDBS variant of BUG_MDS */
arch/x86/include/asm/cpufeatures.h
551
#define X86_BUG_SWAPGS X86_BUG(21) /* "swapgs" CPU is affected by speculation through SWAPGS */
arch/x86/include/asm/cpufeatures.h
552
#define X86_BUG_TAA X86_BUG(22) /* "taa" CPU is affected by TSX Async Abort(TAA) */
arch/x86/include/asm/cpufeatures.h
553
#define X86_BUG_ITLB_MULTIHIT X86_BUG(23) /* "itlb_multihit" CPU may incur MCE during certain page attribute changes */
arch/x86/include/asm/cpufeatures.h
554
#define X86_BUG_SRBDS X86_BUG(24) /* "srbds" CPU may leak RNG bits if not mitigated */
arch/x86/include/asm/cpufeatures.h
555
#define X86_BUG_MMIO_STALE_DATA X86_BUG(25) /* "mmio_stale_data" CPU is affected by Processor MMIO Stale Data vulnerabilities */
arch/x86/include/asm/cpufeatures.h
557
#define X86_BUG_RETBLEED X86_BUG(27) /* "retbleed" CPU is affected by RETBleed */
arch/x86/include/asm/cpufeatures.h
558
#define X86_BUG_EIBRS_PBRSB X86_BUG(28) /* "eibrs_pbrsb" EIBRS is vulnerable to Post Barrier RSB Predictions */
arch/x86/include/asm/cpufeatures.h
559
#define X86_BUG_SMT_RSB X86_BUG(29) /* "smt_rsb" CPU is vulnerable to Cross-Thread Return Address Predictions */
arch/x86/include/asm/cpufeatures.h
560
#define X86_BUG_GDS X86_BUG(30) /* "gds" CPU is affected by Gather Data Sampling */
arch/x86/include/asm/cpufeatures.h
561
#define X86_BUG_TDX_PW_MCE X86_BUG(31) /* "tdx_pw_mce" CPU may incur #MC if non-TD software does partial write to TDX private memory */
arch/x86/include/asm/cpufeatures.h
564
#define X86_BUG_SRSO X86_BUG( 1*32+ 0) /* "srso" AMD SRSO bug */
arch/x86/include/asm/cpufeatures.h
565
#define X86_BUG_DIV0 X86_BUG( 1*32+ 1) /* "div0" AMD DIV0 speculation bug */
arch/x86/include/asm/cpufeatures.h
566
#define X86_BUG_RFDS X86_BUG( 1*32+ 2) /* "rfds" CPU is vulnerable to Register File Data Sampling */
arch/x86/include/asm/cpufeatures.h
567
#define X86_BUG_BHI X86_BUG( 1*32+ 3) /* "bhi" CPU is affected by Branch History Injection */
arch/x86/include/asm/cpufeatures.h
568
#define X86_BUG_IBPB_NO_RET X86_BUG( 1*32+ 4) /* "ibpb_no_ret" IBPB omits return target predictions */
arch/x86/include/asm/cpufeatures.h
569
#define X86_BUG_SPECTRE_V2_USER X86_BUG( 1*32+ 5) /* "spectre_v2_user" CPU is affected by Spectre variant 2 attack between user processes */
arch/x86/include/asm/cpufeatures.h
570
#define X86_BUG_OLD_MICROCODE X86_BUG( 1*32+ 6) /* "old_microcode" CPU has old microcode, it is surely vulnerable to something */
arch/x86/include/asm/cpufeatures.h
571
#define X86_BUG_ITS X86_BUG( 1*32+ 7) /* "its" CPU is affected by Indirect Target Selection */
arch/x86/include/asm/cpufeatures.h
572
#define X86_BUG_ITS_NATIVE_ONLY X86_BUG( 1*32+ 8) /* "its_native_only" CPU is affected by ITS, VMX is not affected */
arch/x86/include/asm/cpufeatures.h
573
#define X86_BUG_TSA X86_BUG( 1*32+ 9) /* "tsa" CPU is affected by Transient Scheduler Attacks */
arch/x86/include/asm/cpufeatures.h
574
#define X86_BUG_VMSCAPE X86_BUG( 1*32+10) /* "vmscape" CPU is affected by VMSCAPE attacks from guests */
tools/arch/x86/include/asm/cpufeatures.h
524
#define X86_BUG_F00F X86_BUG(0) /* "f00f" Intel F00F */
tools/arch/x86/include/asm/cpufeatures.h
525
#define X86_BUG_FDIV X86_BUG(1) /* "fdiv" FPU FDIV */
tools/arch/x86/include/asm/cpufeatures.h
526
#define X86_BUG_COMA X86_BUG(2) /* "coma" Cyrix 6x86 coma */
tools/arch/x86/include/asm/cpufeatures.h
527
#define X86_BUG_AMD_TLB_MMATCH X86_BUG(3) /* "tlb_mmatch" AMD Erratum 383 */
tools/arch/x86/include/asm/cpufeatures.h
528
#define X86_BUG_AMD_APIC_C1E X86_BUG(4) /* "apic_c1e" AMD Erratum 400 */
tools/arch/x86/include/asm/cpufeatures.h
529
#define X86_BUG_11AP X86_BUG(5) /* "11ap" Bad local APIC aka 11AP */
tools/arch/x86/include/asm/cpufeatures.h
530
#define X86_BUG_FXSAVE_LEAK X86_BUG(6) /* "fxsave_leak" FXSAVE leaks FOP/FIP/FOP */
tools/arch/x86/include/asm/cpufeatures.h
531
#define X86_BUG_CLFLUSH_MONITOR X86_BUG(7) /* "clflush_monitor" AAI65, CLFLUSH required before MONITOR */
tools/arch/x86/include/asm/cpufeatures.h
532
#define X86_BUG_SYSRET_SS_ATTRS X86_BUG(8) /* "sysret_ss_attrs" SYSRET doesn't fix up SS attrs */
tools/arch/x86/include/asm/cpufeatures.h
538
#define X86_BUG_ESPFIX X86_BUG(9) /* IRET to 16-bit SS corrupts ESP/RSP high bits */
tools/arch/x86/include/asm/cpufeatures.h
540
#define X86_BUG_NULL_SEG X86_BUG(10) /* "null_seg" Nulling a selector preserves the base */
tools/arch/x86/include/asm/cpufeatures.h
541
#define X86_BUG_SWAPGS_FENCE X86_BUG(11) /* "swapgs_fence" SWAPGS without input dep on GS */
tools/arch/x86/include/asm/cpufeatures.h
542
#define X86_BUG_MONITOR X86_BUG(12) /* "monitor" IPI required to wake up remote CPU */
tools/arch/x86/include/asm/cpufeatures.h
543
#define X86_BUG_AMD_E400 X86_BUG(13) /* "amd_e400" CPU is among the affected by Erratum 400 */
tools/arch/x86/include/asm/cpufeatures.h
544
#define X86_BUG_CPU_MELTDOWN X86_BUG(14) /* "cpu_meltdown" CPU is affected by meltdown attack and needs kernel page table isolation */
tools/arch/x86/include/asm/cpufeatures.h
545
#define X86_BUG_SPECTRE_V1 X86_BUG(15) /* "spectre_v1" CPU is affected by Spectre variant 1 attack with conditional branches */
tools/arch/x86/include/asm/cpufeatures.h
546
#define X86_BUG_SPECTRE_V2 X86_BUG(16) /* "spectre_v2" CPU is affected by Spectre variant 2 attack with indirect branches */
tools/arch/x86/include/asm/cpufeatures.h
547
#define X86_BUG_SPEC_STORE_BYPASS X86_BUG(17) /* "spec_store_bypass" CPU is affected by speculative store bypass attack */
tools/arch/x86/include/asm/cpufeatures.h
548
#define X86_BUG_L1TF X86_BUG(18) /* "l1tf" CPU is affected by L1 Terminal Fault */
tools/arch/x86/include/asm/cpufeatures.h
549
#define X86_BUG_MDS X86_BUG(19) /* "mds" CPU is affected by Microarchitectural data sampling */
tools/arch/x86/include/asm/cpufeatures.h
550
#define X86_BUG_MSBDS_ONLY X86_BUG(20) /* "msbds_only" CPU is only affected by the MSDBS variant of BUG_MDS */
tools/arch/x86/include/asm/cpufeatures.h
551
#define X86_BUG_SWAPGS X86_BUG(21) /* "swapgs" CPU is affected by speculation through SWAPGS */
tools/arch/x86/include/asm/cpufeatures.h
552
#define X86_BUG_TAA X86_BUG(22) /* "taa" CPU is affected by TSX Async Abort(TAA) */
tools/arch/x86/include/asm/cpufeatures.h
553
#define X86_BUG_ITLB_MULTIHIT X86_BUG(23) /* "itlb_multihit" CPU may incur MCE during certain page attribute changes */
tools/arch/x86/include/asm/cpufeatures.h
554
#define X86_BUG_SRBDS X86_BUG(24) /* "srbds" CPU may leak RNG bits if not mitigated */
tools/arch/x86/include/asm/cpufeatures.h
555
#define X86_BUG_MMIO_STALE_DATA X86_BUG(25) /* "mmio_stale_data" CPU is affected by Processor MMIO Stale Data vulnerabilities */
tools/arch/x86/include/asm/cpufeatures.h
557
#define X86_BUG_RETBLEED X86_BUG(27) /* "retbleed" CPU is affected by RETBleed */
tools/arch/x86/include/asm/cpufeatures.h
558
#define X86_BUG_EIBRS_PBRSB X86_BUG(28) /* "eibrs_pbrsb" EIBRS is vulnerable to Post Barrier RSB Predictions */
tools/arch/x86/include/asm/cpufeatures.h
559
#define X86_BUG_SMT_RSB X86_BUG(29) /* "smt_rsb" CPU is vulnerable to Cross-Thread Return Address Predictions */
tools/arch/x86/include/asm/cpufeatures.h
560
#define X86_BUG_GDS X86_BUG(30) /* "gds" CPU is affected by Gather Data Sampling */
tools/arch/x86/include/asm/cpufeatures.h
561
#define X86_BUG_TDX_PW_MCE X86_BUG(31) /* "tdx_pw_mce" CPU may incur #MC if non-TD software does partial write to TDX private memory */
tools/arch/x86/include/asm/cpufeatures.h
564
#define X86_BUG_SRSO X86_BUG( 1*32+ 0) /* "srso" AMD SRSO bug */
tools/arch/x86/include/asm/cpufeatures.h
565
#define X86_BUG_DIV0 X86_BUG( 1*32+ 1) /* "div0" AMD DIV0 speculation bug */
tools/arch/x86/include/asm/cpufeatures.h
566
#define X86_BUG_RFDS X86_BUG( 1*32+ 2) /* "rfds" CPU is vulnerable to Register File Data Sampling */
tools/arch/x86/include/asm/cpufeatures.h
567
#define X86_BUG_BHI X86_BUG( 1*32+ 3) /* "bhi" CPU is affected by Branch History Injection */
tools/arch/x86/include/asm/cpufeatures.h
568
#define X86_BUG_IBPB_NO_RET X86_BUG( 1*32+ 4) /* "ibpb_no_ret" IBPB omits return target predictions */
tools/arch/x86/include/asm/cpufeatures.h
569
#define X86_BUG_SPECTRE_V2_USER X86_BUG( 1*32+ 5) /* "spectre_v2_user" CPU is affected by Spectre variant 2 attack between user processes */
tools/arch/x86/include/asm/cpufeatures.h
570
#define X86_BUG_OLD_MICROCODE X86_BUG( 1*32+ 6) /* "old_microcode" CPU has old microcode, it is surely vulnerable to something */
tools/arch/x86/include/asm/cpufeatures.h
571
#define X86_BUG_ITS X86_BUG( 1*32+ 7) /* "its" CPU is affected by Indirect Target Selection */
tools/arch/x86/include/asm/cpufeatures.h
572
#define X86_BUG_ITS_NATIVE_ONLY X86_BUG( 1*32+ 8) /* "its_native_only" CPU is affected by ITS, VMX is not affected */
tools/arch/x86/include/asm/cpufeatures.h
573
#define X86_BUG_TSA X86_BUG( 1*32+ 9) /* "tsa" CPU is affected by Transient Scheduler Attacks */
tools/arch/x86/include/asm/cpufeatures.h
574
#define X86_BUG_VMSCAPE X86_BUG( 1*32+10) /* "vmscape" CPU is affected by VMSCAPE attacks from guests */