x86/cpufeatures: Add FEATURE_ZEN
[linux-2.6-block.git] / arch / x86 / kernel / cpu / amd.c
CommitLineData
69c60c88 1#include <linux/export.h>
1da177e4 2#include <linux/bitops.h>
5cdd174f 3#include <linux/elf.h>
1da177e4 4#include <linux/mm.h>
8d71a2ea 5
8bdbd962 6#include <linux/io.h>
c98fdeaa 7#include <linux/sched.h>
e6017571 8#include <linux/sched/clock.h>
4e26d11f 9#include <linux/random.h>
1da177e4 10#include <asm/processor.h>
d3f7eae1 11#include <asm/apic.h>
1f442d70 12#include <asm/cpu.h>
28a27752 13#include <asm/spec-ctrl.h>
26bfa5f8 14#include <asm/smp.h>
42937e81 15#include <asm/pci-direct.h>
b466bdb6 16#include <asm/delay.h>
1da177e4 17
8d71a2ea 18#ifdef CONFIG_X86_64
8d71a2ea 19# include <asm/mmconfig.h>
d1163651 20# include <asm/set_memory.h>
8d71a2ea
YL
21#endif
22
1da177e4
LT
23#include "cpu.h"
24
3344ed30
TG
25static const int amd_erratum_383[];
26static const int amd_erratum_400[];
27static bool cpu_has_amd_erratum(struct cpuinfo_x86 *cpu, const int *erratum);
28
cc2749e4
AG
29/*
30 * nodes_per_socket: Stores the number of nodes per socket.
31 * Refer to Fam15h Models 00-0fh BKDG - CPUID Fn8000_001E_ECX
32 * Node Identifiers[10:8]
33 */
34static u32 nodes_per_socket = 1;
35
2c929ce6
BP
36static inline int rdmsrl_amd_safe(unsigned msr, unsigned long long *p)
37{
2c929ce6
BP
38 u32 gprs[8] = { 0 };
39 int err;
40
682469a5
BP
41 WARN_ONCE((boot_cpu_data.x86 != 0xf),
42 "%s should only be used on K8!\n", __func__);
2c929ce6
BP
43
44 gprs[1] = msr;
45 gprs[7] = 0x9c5a203a;
46
47 err = rdmsr_safe_regs(gprs);
48
49 *p = gprs[0] | ((u64)gprs[2] << 32);
50
51 return err;
52}
53
54static inline int wrmsrl_amd_safe(unsigned msr, unsigned long long val)
55{
2c929ce6
BP
56 u32 gprs[8] = { 0 };
57
682469a5
BP
58 WARN_ONCE((boot_cpu_data.x86 != 0xf),
59 "%s should only be used on K8!\n", __func__);
2c929ce6
BP
60
61 gprs[0] = (u32)val;
62 gprs[1] = msr;
63 gprs[2] = val >> 32;
64 gprs[7] = 0x9c5a203a;
65
66 return wrmsr_safe_regs(gprs);
67}
68
1da177e4
LT
69/*
70 * B step AMD K6 before B 9730xxxx have hardware bugs that can cause
71 * misexecution of code under Linux. Owners of such processors should
72 * contact AMD for precise details and a CPU swap.
73 *
74 * See http://www.multimania.com/poulot/k6bug.html
d7de8649
AH
75 * and section 2.6.2 of "AMD-K6 Processor Revision Guide - Model 6"
76 * (Publication # 21266 Issue Date: August 1998)
1da177e4
LT
77 *
78 * The following test is erm.. interesting. AMD neglected to up
79 * the chip setting when fixing the bug but they also tweaked some
80 * performance at the same time..
81 */
fb87a298 82
277d5b40 83extern __visible void vide(void);
de642faf
JP
84__asm__(".globl vide\n"
85 ".type vide, @function\n"
86 ".align 4\n"
87 "vide: ret\n");
1da177e4 88
148f9bb8 89static void init_amd_k5(struct cpuinfo_x86 *c)
11fdd252 90{
26bfa5f8 91#ifdef CONFIG_X86_32
11fdd252
YL
92/*
93 * General Systems BIOSen alias the cpu frequency registers
6a6256f9 94 * of the Elan at 0x000df000. Unfortunately, one of the Linux
11fdd252
YL
95 * drivers subsequently pokes it, and changes the CPU speed.
96 * Workaround : Remove the unneeded alias.
97 */
98#define CBAR (0xfffc) /* Configuration Base Address (32-bit) */
99#define CBAR_ENB (0x80000000)
100#define CBAR_KEY (0X000000CB)
101 if (c->x86_model == 9 || c->x86_model == 10) {
8bdbd962
AC
102 if (inl(CBAR) & CBAR_ENB)
103 outl(0 | CBAR_KEY, CBAR);
11fdd252 104 }
26bfa5f8 105#endif
11fdd252
YL
106}
107
148f9bb8 108static void init_amd_k6(struct cpuinfo_x86 *c)
11fdd252 109{
26bfa5f8 110#ifdef CONFIG_X86_32
11fdd252 111 u32 l, h;
46a84132 112 int mbytes = get_num_physpages() >> (20-PAGE_SHIFT);
11fdd252
YL
113
114 if (c->x86_model < 6) {
115 /* Based on AMD doc 20734R - June 2000 */
116 if (c->x86_model == 0) {
117 clear_cpu_cap(c, X86_FEATURE_APIC);
118 set_cpu_cap(c, X86_FEATURE_PGE);
119 }
120 return;
121 }
122
b399151c 123 if (c->x86_model == 6 && c->x86_stepping == 1) {
11fdd252
YL
124 const int K6_BUG_LOOP = 1000000;
125 int n;
126 void (*f_vide)(void);
37963666 127 u64 d, d2;
11fdd252 128
1b74dde7 129 pr_info("AMD K6 stepping B detected - ");
11fdd252
YL
130
131 /*
132 * It looks like AMD fixed the 2.6.2 bug and improved indirect
133 * calls at the same time.
134 */
135
136 n = K6_BUG_LOOP;
137 f_vide = vide;
5f8a1615 138 OPTIMIZER_HIDE_VAR(f_vide);
4ea1636b 139 d = rdtsc();
11fdd252
YL
140 while (n--)
141 f_vide();
4ea1636b 142 d2 = rdtsc();
11fdd252
YL
143 d = d2-d;
144
145 if (d > 20*K6_BUG_LOOP)
1b74dde7 146 pr_cont("system stability may be impaired when more than 32 MB are used.\n");
11fdd252 147 else
1b74dde7 148 pr_cont("probably OK (after B9730xxxx).\n");
11fdd252
YL
149 }
150
151 /* K6 with old style WHCR */
152 if (c->x86_model < 8 ||
b399151c 153 (c->x86_model == 8 && c->x86_stepping < 8)) {
11fdd252
YL
154 /* We can only write allocate on the low 508Mb */
155 if (mbytes > 508)
156 mbytes = 508;
157
158 rdmsr(MSR_K6_WHCR, l, h);
159 if ((l&0x0000FFFF) == 0) {
160 unsigned long flags;
161 l = (1<<0)|((mbytes/4)<<1);
162 local_irq_save(flags);
163 wbinvd();
164 wrmsr(MSR_K6_WHCR, l, h);
165 local_irq_restore(flags);
1b74dde7 166 pr_info("Enabling old style K6 write allocation for %d Mb\n",
11fdd252
YL
167 mbytes);
168 }
169 return;
170 }
171
b399151c 172 if ((c->x86_model == 8 && c->x86_stepping > 7) ||
11fdd252
YL
173 c->x86_model == 9 || c->x86_model == 13) {
174 /* The more serious chips .. */
175
176 if (mbytes > 4092)
177 mbytes = 4092;
178
179 rdmsr(MSR_K6_WHCR, l, h);
180 if ((l&0xFFFF0000) == 0) {
181 unsigned long flags;
182 l = ((mbytes>>2)<<22)|(1<<16);
183 local_irq_save(flags);
184 wbinvd();
185 wrmsr(MSR_K6_WHCR, l, h);
186 local_irq_restore(flags);
1b74dde7 187 pr_info("Enabling new style K6 write allocation for %d Mb\n",
11fdd252
YL
188 mbytes);
189 }
190
191 return;
192 }
193
194 if (c->x86_model == 10) {
195 /* AMD Geode LX is model 10 */
196 /* placeholder for any needed mods */
197 return;
198 }
26bfa5f8 199#endif
11fdd252
YL
200}
201
26bfa5f8 202static void init_amd_k7(struct cpuinfo_x86 *c)
1f442d70 203{
26bfa5f8
BP
204#ifdef CONFIG_X86_32
205 u32 l, h;
206
207 /*
208 * Bit 15 of Athlon specific MSR 15, needs to be 0
209 * to enable SSE on Palomino/Morgan/Barton CPU's.
210 * If the BIOS didn't enable it already, enable it here.
211 */
212 if (c->x86_model >= 6 && c->x86_model <= 10) {
213 if (!cpu_has(c, X86_FEATURE_XMM)) {
1b74dde7 214 pr_info("Enabling disabled K7/SSE Support.\n");
26bfa5f8
BP
215 msr_clear_bit(MSR_K7_HWCR, 15);
216 set_cpu_cap(c, X86_FEATURE_XMM);
217 }
218 }
219
220 /*
221 * It's been determined by AMD that Athlons since model 8 stepping 1
222 * are more robust with CLK_CTL set to 200xxxxx instead of 600xxxxx
223 * As per AMD technical note 27212 0.2
224 */
b399151c 225 if ((c->x86_model == 8 && c->x86_stepping >= 1) || (c->x86_model > 8)) {
26bfa5f8
BP
226 rdmsr(MSR_K7_CLK_CTL, l, h);
227 if ((l & 0xfff00000) != 0x20000000) {
1b74dde7
CY
228 pr_info("CPU: CLK_CTL MSR was %x. Reprogramming to %x\n",
229 l, ((l & 0x000fffff)|0x20000000));
26bfa5f8
BP
230 wrmsr(MSR_K7_CLK_CTL, (l & 0x000fffff)|0x20000000, h);
231 }
232 }
233
234 set_cpu_cap(c, X86_FEATURE_K7);
235
1f442d70 236 /* calling is from identify_secondary_cpu() ? */
f6e9456c 237 if (!c->cpu_index)
1f442d70
YL
238 return;
239
240 /*
241 * Certain Athlons might work (for various values of 'work') in SMP
242 * but they are not certified as MP capable.
243 */
244 /* Athlon 660/661 is valid. */
b399151c
JZ
245 if ((c->x86_model == 6) && ((c->x86_stepping == 0) ||
246 (c->x86_stepping == 1)))
1077c932 247 return;
1f442d70
YL
248
249 /* Duron 670 is valid */
b399151c 250 if ((c->x86_model == 7) && (c->x86_stepping == 0))
1077c932 251 return;
1f442d70
YL
252
253 /*
254 * Athlon 662, Duron 671, and Athlon >model 7 have capability
255 * bit. It's worth noting that the A5 stepping (662) of some
256 * Athlon XP's have the MP bit set.
257 * See http://www.heise.de/newsticker/data/jow-18.10.01-000 for
258 * more.
259 */
b399151c
JZ
260 if (((c->x86_model == 6) && (c->x86_stepping >= 2)) ||
261 ((c->x86_model == 7) && (c->x86_stepping >= 1)) ||
1f442d70 262 (c->x86_model > 7))
26bfa5f8 263 if (cpu_has(c, X86_FEATURE_MP))
1077c932 264 return;
1f442d70
YL
265
266 /* If we get here, not a certified SMP capable AMD system. */
267
268 /*
269 * Don't taint if we are running SMP kernel on a single non-MP
270 * approved Athlon
271 */
272 WARN_ONCE(1, "WARNING: This combination of AMD"
7da8b6dd 273 " processors is not suitable for SMP.\n");
8c90487c 274 add_taint(TAINT_CPU_OUT_OF_SPEC, LOCKDEP_NOW_UNRELIABLE);
6c62aa4a 275#endif
26bfa5f8 276}
6c62aa4a 277
645a7919 278#ifdef CONFIG_NUMA
bbc9e2f4
TH
279/*
280 * To workaround broken NUMA config. Read the comment in
281 * srat_detect_node().
282 */
148f9bb8 283static int nearby_node(int apicid)
6c62aa4a
YL
284{
285 int i, node;
286
287 for (i = apicid - 1; i >= 0; i--) {
bbc9e2f4 288 node = __apicid_to_node[i];
6c62aa4a
YL
289 if (node != NUMA_NO_NODE && node_online(node))
290 return node;
291 }
292 for (i = apicid + 1; i < MAX_LOCAL_APIC; i++) {
bbc9e2f4 293 node = __apicid_to_node[i];
6c62aa4a
YL
294 if (node != NUMA_NO_NODE && node_online(node))
295 return node;
296 }
297 return first_node(node_online_map); /* Shouldn't happen */
298}
299#endif
11fdd252 300
aac64f7d 301#ifdef CONFIG_SMP
b89b41d0
SS
302/*
303 * Fix up cpu_core_id for pre-F17h systems to be in the
304 * [0 .. cores_per_node - 1] range. Not really needed but
305 * kept so as not to break existing setups.
306 */
307static void legacy_fixup_core_id(struct cpuinfo_x86 *c)
308{
309 u32 cus_per_node;
310
311 if (c->x86 >= 0x17)
312 return;
313
314 cus_per_node = c->x86_max_cores / nodes_per_socket;
315 c->cpu_core_id %= cus_per_node;
316}
317
4a376ec3 318/*
23588c38
AH
319 * Fixup core topology information for
320 * (1) AMD multi-node processors
321 * Assumption: Number of cores in each internal node is the same.
6057b4d3 322 * (2) AMD processors supporting compute units
4a376ec3 323 */
148f9bb8 324static void amd_get_topology(struct cpuinfo_x86 *c)
4a376ec3 325{
23588c38 326 u8 node_id;
4a376ec3
AH
327 int cpu = smp_processor_id();
328
23588c38 329 /* get information required for multi-node processors */
362f924b 330 if (boot_cpu_has(X86_FEATURE_TOPOEXT)) {
79a8b9aa 331 u32 eax, ebx, ecx, edx;
6057b4d3 332
79a8b9aa
BP
333 cpuid(0x8000001e, &eax, &ebx, &ecx, &edx);
334
335 node_id = ecx & 0xff;
336 smp_num_siblings = ((ebx >> 8) & 0xff) + 1;
337
338 if (c->x86 == 0x15)
339 c->cu_id = ebx & 0xff;
b6a50cdd 340
08b25963
YG
341 if (c->x86 >= 0x17) {
342 c->cpu_core_id = ebx & 0xff;
343
344 if (smp_num_siblings > 1)
345 c->x86_max_cores /= smp_num_siblings;
346 }
347
b6a50cdd
YG
348 /*
349 * We may have multiple LLCs if L3 caches exist, so check if we
350 * have an L3 cache by looking at the L3 cache CPUID leaf.
351 */
352 if (cpuid_edx(0x80000006)) {
353 if (c->x86 == 0x17) {
354 /*
355 * LLC is at the core complex level.
356 * Core complex id is ApicId[3].
357 */
358 per_cpu(cpu_llc_id, cpu) = c->apicid >> 3;
359 } else {
360 /* LLC is at the node level. */
361 per_cpu(cpu_llc_id, cpu) = node_id;
362 }
363 }
23588c38 364 } else if (cpu_has(c, X86_FEATURE_NODEID_MSR)) {
6057b4d3
AH
365 u64 value;
366
23588c38 367 rdmsrl(MSR_FAM10H_NODE_ID, value);
23588c38 368 node_id = value & 7;
b6a50cdd
YG
369
370 per_cpu(cpu_llc_id, cpu) = node_id;
23588c38 371 } else
4a376ec3
AH
372 return;
373
cc2749e4 374 if (nodes_per_socket > 1) {
23588c38 375 set_cpu_cap(c, X86_FEATURE_AMD_DCM);
b89b41d0 376 legacy_fixup_core_id(c);
23588c38 377 }
4a376ec3
AH
378}
379#endif
380
11fdd252 381/*
aa5e5dc2 382 * On a AMD dual core setup the lower bits of the APIC id distinguish the cores.
11fdd252
YL
383 * Assumes number of cores is a power of two.
384 */
148f9bb8 385static void amd_detect_cmp(struct cpuinfo_x86 *c)
11fdd252 386{
c8e56d20 387#ifdef CONFIG_SMP
11fdd252 388 unsigned bits;
99bd0c0f 389 int cpu = smp_processor_id();
11fdd252
YL
390
391 bits = c->x86_coreid_bits;
11fdd252
YL
392 /* Low order bits define the core id (index of core in socket) */
393 c->cpu_core_id = c->initial_apicid & ((1 << bits)-1);
394 /* Convert the initial APIC ID into the socket ID */
395 c->phys_proc_id = c->initial_apicid >> bits;
99bd0c0f
AH
396 /* use socket ID also for last level cache */
397 per_cpu(cpu_llc_id, cpu) = c->phys_proc_id;
23588c38 398 amd_get_topology(c);
11fdd252
YL
399#endif
400}
401
8b84c8df 402u16 amd_get_nb_id(int cpu)
6a812691 403{
8b84c8df 404 u16 id = 0;
6a812691
AH
405#ifdef CONFIG_SMP
406 id = per_cpu(cpu_llc_id, cpu);
407#endif
408 return id;
409}
410EXPORT_SYMBOL_GPL(amd_get_nb_id);
411
cc2749e4
AG
412u32 amd_get_nodes_per_socket(void)
413{
414 return nodes_per_socket;
415}
416EXPORT_SYMBOL_GPL(amd_get_nodes_per_socket);
417
148f9bb8 418static void srat_detect_node(struct cpuinfo_x86 *c)
6c62aa4a 419{
645a7919 420#ifdef CONFIG_NUMA
6c62aa4a
YL
421 int cpu = smp_processor_id();
422 int node;
0d96b9ff 423 unsigned apicid = c->apicid;
6c62aa4a 424
bbc9e2f4
TH
425 node = numa_cpu_node(cpu);
426 if (node == NUMA_NO_NODE)
427 node = per_cpu(cpu_llc_id, cpu);
6c62aa4a 428
64be4c1c 429 /*
68894632
AH
430 * On multi-fabric platform (e.g. Numascale NumaChip) a
431 * platform-specific handler needs to be called to fixup some
432 * IDs of the CPU.
64be4c1c 433 */
68894632 434 if (x86_cpuinit.fixup_cpu_id)
64be4c1c
DB
435 x86_cpuinit.fixup_cpu_id(c, node);
436
6c62aa4a 437 if (!node_online(node)) {
bbc9e2f4
TH
438 /*
439 * Two possibilities here:
440 *
441 * - The CPU is missing memory and no node was created. In
442 * that case try picking one from a nearby CPU.
443 *
444 * - The APIC IDs differ from the HyperTransport node IDs
445 * which the K8 northbridge parsing fills in. Assume
446 * they are all increased by a constant offset, but in
447 * the same order as the HT nodeids. If that doesn't
448 * result in a usable node fall back to the path for the
449 * previous case.
450 *
451 * This workaround operates directly on the mapping between
452 * APIC ID and NUMA node, assuming certain relationship
453 * between APIC ID, HT node ID and NUMA topology. As going
454 * through CPU mapping may alter the outcome, directly
455 * access __apicid_to_node[].
456 */
6c62aa4a
YL
457 int ht_nodeid = c->initial_apicid;
458
7030a7e9 459 if (__apicid_to_node[ht_nodeid] != NUMA_NO_NODE)
bbc9e2f4 460 node = __apicid_to_node[ht_nodeid];
6c62aa4a
YL
461 /* Pick a nearby node */
462 if (!node_online(node))
463 node = nearby_node(apicid);
464 }
465 numa_set_node(cpu, node);
6c62aa4a
YL
466#endif
467}
468
148f9bb8 469static void early_init_amd_mc(struct cpuinfo_x86 *c)
11fdd252 470{
c8e56d20 471#ifdef CONFIG_SMP
11fdd252
YL
472 unsigned bits, ecx;
473
474 /* Multi core CPU? */
475 if (c->extended_cpuid_level < 0x80000008)
476 return;
477
478 ecx = cpuid_ecx(0x80000008);
479
480 c->x86_max_cores = (ecx & 0xff) + 1;
481
482 /* CPU telling us the core id bits shift? */
483 bits = (ecx >> 12) & 0xF;
484
485 /* Otherwise recompute */
486 if (bits == 0) {
487 while ((1 << bits) < c->x86_max_cores)
488 bits++;
489 }
490
491 c->x86_coreid_bits = bits;
492#endif
493}
494
148f9bb8 495static void bsp_init_amd(struct cpuinfo_x86 *c)
8fa8b035 496{
26bfa5f8
BP
497
498#ifdef CONFIG_X86_64
499 if (c->x86 >= 0xf) {
500 unsigned long long tseg;
501
502 /*
503 * Split up direct mapping around the TSEG SMM area.
504 * Don't do it for gbpages because there seems very little
505 * benefit in doing so.
506 */
507 if (!rdmsrl_safe(MSR_K8_TSEG_ADDR, &tseg)) {
508 unsigned long pfn = tseg >> PAGE_SHIFT;
509
1b74dde7 510 pr_debug("tseg: %010llx\n", tseg);
26bfa5f8
BP
511 if (pfn_range_is_mapped(pfn, pfn + 1))
512 set_memory_4k((unsigned long)__va(tseg), 1);
513 }
514 }
515#endif
516
8fa8b035
BP
517 if (cpu_has(c, X86_FEATURE_CONSTANT_TSC)) {
518
519 if (c->x86 > 0x10 ||
520 (c->x86 == 0x10 && c->x86_model >= 0x2)) {
521 u64 val;
522
523 rdmsrl(MSR_K7_HWCR, val);
524 if (!(val & BIT(24)))
1b74dde7 525 pr_warn(FW_BUG "TSC doesn't count with P0 frequency!\n");
8fa8b035
BP
526 }
527 }
528
529 if (c->x86 == 0x15) {
530 unsigned long upperbit;
531 u32 cpuid, assoc;
532
533 cpuid = cpuid_edx(0x80000005);
534 assoc = cpuid >> 16 & 0xff;
535 upperbit = ((cpuid >> 24) << 10) / assoc;
536
537 va_align.mask = (upperbit - 1) & PAGE_MASK;
538 va_align.flags = ALIGN_VA_32 | ALIGN_VA_64;
4e26d11f
HMG
539
540 /* A random value per boot for bit slice [12:upper_bit) */
541 va_align.bits = get_random_int() & va_align.mask;
8fa8b035 542 }
b466bdb6
HR
543
544 if (cpu_has(c, X86_FEATURE_MWAITX))
545 use_mwaitx_delay();
8dfeae0d
HR
546
547 if (boot_cpu_has(X86_FEATURE_TOPOEXT)) {
548 u32 ecx;
549
550 ecx = cpuid_ecx(0x8000001e);
551 nodes_per_socket = ((ecx >> 8) & 7) + 1;
552 } else if (boot_cpu_has(X86_FEATURE_NODEID_MSR)) {
553 u64 value;
554
555 rdmsrl(MSR_FAM10H_NODE_ID, value);
556 nodes_per_socket = ((value >> 3) & 7) + 1;
557 }
764f3c21
KRW
558
559 if (c->x86 >= 0x15 && c->x86 <= 0x17) {
560 unsigned int bit;
561
562 switch (c->x86) {
563 case 0x15: bit = 54; break;
564 case 0x16: bit = 33; break;
565 case 0x17: bit = 10; break;
566 default: return;
567 }
568 /*
569 * Try to cache the base value so further operations can
9f65fb29 570 * avoid RMW. If that faults, do not enable SSBD.
764f3c21
KRW
571 */
572 if (!rdmsrl_safe(MSR_AMD64_LS_CFG, &x86_amd_ls_cfg_base)) {
52817587 573 setup_force_cpu_cap(X86_FEATURE_LS_CFG_SSBD);
9f65fb29 574 setup_force_cpu_cap(X86_FEATURE_SSBD);
9f65fb29 575 x86_amd_ls_cfg_ssbd_mask = 1ULL << bit;
764f3c21
KRW
576 }
577 }
8fa8b035
BP
578}
579
18c71ce9
TL
580static void early_detect_mem_encrypt(struct cpuinfo_x86 *c)
581{
582 u64 msr;
583
584 /*
585 * BIOS support is required for SME and SEV.
586 * For SME: If BIOS has enabled SME then adjust x86_phys_bits by
587 * the SME physical address space reduction value.
588 * If BIOS has not enabled SME then don't advertise the
589 * SME feature (set in scattered.c).
590 * For SEV: If BIOS has not enabled SEV then don't advertise the
591 * SEV feature (set in scattered.c).
592 *
593 * In all cases, since support for SME and SEV requires long mode,
594 * don't advertise the feature under CONFIG_X86_32.
595 */
596 if (cpu_has(c, X86_FEATURE_SME) || cpu_has(c, X86_FEATURE_SEV)) {
597 /* Check if memory encryption is enabled */
598 rdmsrl(MSR_K8_SYSCFG, msr);
599 if (!(msr & MSR_K8_SYSCFG_MEM_ENCRYPT))
600 goto clear_all;
601
602 /*
603 * Always adjust physical address bits. Even though this
604 * will be a value above 32-bits this is still done for
605 * CONFIG_X86_32 so that accurate values are reported.
606 */
607 c->x86_phys_bits -= (cpuid_ebx(0x8000001f) >> 6) & 0x3f;
608
609 if (IS_ENABLED(CONFIG_X86_32))
610 goto clear_all;
611
612 rdmsrl(MSR_K7_HWCR, msr);
613 if (!(msr & MSR_K7_HWCR_SMMLOCK))
614 goto clear_sev;
615
616 return;
617
618clear_all:
619 clear_cpu_cap(c, X86_FEATURE_SME);
620clear_sev:
621 clear_cpu_cap(c, X86_FEATURE_SEV);
622 }
623}
624
148f9bb8 625static void early_init_amd(struct cpuinfo_x86 *c)
2b16a235 626{
f655e6e6
TL
627 u32 dummy;
628
11fdd252
YL
629 early_init_amd_mc(c);
630
f655e6e6
TL
631 rdmsr_safe(MSR_AMD64_PATCH_LEVEL, &c->microcode, &dummy);
632
40fb1715
VP
633 /*
634 * c->x86_power is 8000_0007 edx. Bit 8 is TSC runs at constant rate
635 * with P/T states and does not stop in deep C-states
636 */
637 if (c->x86_power & (1 << 8)) {
e3224234 638 set_cpu_cap(c, X86_FEATURE_CONSTANT_TSC);
40fb1715
VP
639 set_cpu_cap(c, X86_FEATURE_NONSTOP_TSC);
640 }
5fef55fd 641
01fe03ff
HR
642 /* Bit 12 of 8000_0007 edx is accumulated power mechanism. */
643 if (c->x86_power & BIT(12))
644 set_cpu_cap(c, X86_FEATURE_ACC_POWER);
645
6c62aa4a
YL
646#ifdef CONFIG_X86_64
647 set_cpu_cap(c, X86_FEATURE_SYSCALL32);
648#else
5fef55fd 649 /* Set MTRR capability flag if appropriate */
6c62aa4a
YL
650 if (c->x86 == 5)
651 if (c->x86_model == 13 || c->x86_model == 9 ||
b399151c 652 (c->x86_model == 8 && c->x86_stepping >= 8))
6c62aa4a
YL
653 set_cpu_cap(c, X86_FEATURE_K6_MTRR);
654#endif
42937e81 655#if defined(CONFIG_X86_LOCAL_APIC) && defined(CONFIG_PCI)
b9d16a2a
AG
656 /*
657 * ApicID can always be treated as an 8-bit value for AMD APIC versions
658 * >= 0x10, but even old K8s came out of reset with version 0x10. So, we
659 * can safely set X86_FEATURE_EXTD_APICID unconditionally for families
660 * after 16h.
661 */
425d8c2f
BP
662 if (boot_cpu_has(X86_FEATURE_APIC)) {
663 if (c->x86 > 0x16)
42937e81 664 set_cpu_cap(c, X86_FEATURE_EXTD_APICID);
425d8c2f
BP
665 else if (c->x86 >= 0xf) {
666 /* check CPU config space for extended APIC ID */
667 unsigned int val;
668
669 val = read_pci_config(0, 24, 0, 0x68);
670 if ((val >> 17 & 0x3) == 0x3)
671 set_cpu_cap(c, X86_FEATURE_EXTD_APICID);
672 }
42937e81
AH
673 }
674#endif
3b564968 675
c1118b36
PB
676 /*
677 * This is only needed to tell the kernel whether to use VMCALL
678 * and VMMCALL. VMMCALL is never executed except under virt, so
679 * we can set it unconditionally.
680 */
681 set_cpu_cap(c, X86_FEATURE_VMMCALL);
682
3b564968 683 /* F16h erratum 793, CVE-2013-6885 */
8f86a737
BP
684 if (c->x86 == 0x16 && c->x86_model <= 0xf)
685 msr_set_bit(MSR_AMD64_LS_CFG, 15);
2b16a235 686
3344ed30
TG
687 /*
688 * Check whether the machine is affected by erratum 400. This is
689 * used to select the proper idle routine and to enable the check
690 * whether the machine is affected in arch_post_acpi_init(), which
691 * sets the X86_BUG_AMD_APIC_C1E bug depending on the MSR check.
692 */
693 if (cpu_has_amd_erratum(c, amd_erratum_400))
694 set_cpu_bug(c, X86_BUG_AMD_E400);
872cbefd 695
18c71ce9 696 early_detect_mem_encrypt(c);
3344ed30 697}
e6ee94d5 698
26bfa5f8
BP
699static void init_amd_k8(struct cpuinfo_x86 *c)
700{
701 u32 level;
702 u64 value;
703
704 /* On C+ stepping K8 rep microcode works well for copy/memset */
705 level = cpuid_eax(1);
706 if ((level >= 0x0f48 && level < 0x0f50) || level >= 0x0f58)
707 set_cpu_cap(c, X86_FEATURE_REP_GOOD);
708
709 /*
710 * Some BIOSes incorrectly force this feature, but only K8 revision D
711 * (model = 0x14) and later actually support it.
712 * (AMD Erratum #110, docId: 25759).
713 */
714 if (c->x86_model < 0x14 && cpu_has(c, X86_FEATURE_LAHF_LM)) {
715 clear_cpu_cap(c, X86_FEATURE_LAHF_LM);
716 if (!rdmsrl_amd_safe(0xc001100d, &value)) {
717 value &= ~BIT_64(32);
718 wrmsrl_amd_safe(0xc001100d, value);
719 }
720 }
721
722 if (!c->x86_model_id[0])
723 strcpy(c->x86_model_id, "Hammer");
6f9b63a0
BP
724
725#ifdef CONFIG_SMP
726 /*
727 * Disable TLB flush filter by setting HWCR.FFDIS on K8
728 * bit 6 of msr C001_0015
729 *
730 * Errata 63 for SH-B3 steppings
731 * Errata 122 for all steppings (F+ have it disabled by default)
732 */
733 msr_set_bit(MSR_K7_HWCR, 6);
734#endif
96e5d28a 735 set_cpu_bug(c, X86_BUG_SWAPGS_FENCE);
26bfa5f8
BP
736}
737
738static void init_amd_gh(struct cpuinfo_x86 *c)
739{
8364e1f8 740#ifdef CONFIG_MMCONF_FAM10H
26bfa5f8
BP
741 /* do this for boot cpu */
742 if (c == &boot_cpu_data)
743 check_enable_amd_mmconf_dmi();
744
745 fam10h_check_enable_mmcfg();
746#endif
747
748 /*
749 * Disable GART TLB Walk Errors on Fam10h. We do this here because this
750 * is always needed when GART is enabled, even in a kernel which has no
751 * MCE support built in. BIOS should disable GartTlbWlk Errors already.
752 * If it doesn't, we do it here as suggested by the BKDG.
753 *
754 * Fixes: https://bugzilla.kernel.org/show_bug.cgi?id=33012
755 */
756 msr_set_bit(MSR_AMD64_MCx_MASK(4), 10);
757
758 /*
759 * On family 10h BIOS may not have properly enabled WC+ support, causing
760 * it to be converted to CD memtype. This may result in performance
761 * degradation for certain nested-paging guests. Prevent this conversion
762 * by clearing bit 24 in MSR_AMD64_BU_CFG2.
763 *
764 * NOTE: we want to use the _safe accessors so as not to #GP kvm
765 * guests on older kvm hosts.
766 */
767 msr_clear_bit(MSR_AMD64_BU_CFG2, 24);
768
769 if (cpu_has_amd_erratum(c, amd_erratum_383))
770 set_cpu_bug(c, X86_BUG_AMD_TLB_MMATCH);
771}
772
d1992996
EC
773#define MSR_AMD64_DE_CFG 0xC0011029
774
775static void init_amd_ln(struct cpuinfo_x86 *c)
776{
777 /*
778 * Apply erratum 665 fix unconditionally so machines without a BIOS
779 * fix work.
780 */
781 msr_set_bit(MSR_AMD64_DE_CFG, 31);
782}
783
26bfa5f8
BP
784static void init_amd_bd(struct cpuinfo_x86 *c)
785{
786 u64 value;
787
788 /* re-enable TopologyExtensions if switched off by BIOS */
96685a55 789 if ((c->x86_model >= 0x10) && (c->x86_model <= 0x6f) &&
26bfa5f8
BP
790 !cpu_has(c, X86_FEATURE_TOPOEXT)) {
791
792 if (msr_set_bit(0xc0011005, 54) > 0) {
793 rdmsrl(0xc0011005, value);
794 if (value & BIT_64(54)) {
795 set_cpu_cap(c, X86_FEATURE_TOPOEXT);
96685a55 796 pr_info_once(FW_INFO "CPU: Re-enabling disabled Topology Extensions Support.\n");
26bfa5f8
BP
797 }
798 }
799 }
800
801 /*
802 * The way access filter has a performance penalty on some workloads.
803 * Disable it on the affected CPUs.
804 */
805 if ((c->x86_model >= 0x02) && (c->x86_model < 0x20)) {
ae8b7875 806 if (!rdmsrl_safe(MSR_F15H_IC_CFG, &value) && !(value & 0x1E)) {
26bfa5f8 807 value |= 0x1E;
ae8b7875 808 wrmsrl_safe(MSR_F15H_IC_CFG, value);
26bfa5f8
BP
809 }
810 }
811}
812
f7f3dc00
BP
813static void init_amd_zn(struct cpuinfo_x86 *c)
814{
d1035d97 815 set_cpu_cap(c, X86_FEATURE_ZEN);
f7f3dc00
BP
816 /*
817 * Fix erratum 1076: CPB feature bit not being set in CPUID. It affects
818 * all up to and including B1.
819 */
b399151c 820 if (c->x86_model <= 1 && c->x86_stepping <= 1)
f7f3dc00
BP
821 set_cpu_cap(c, X86_FEATURE_CPB);
822}
823
148f9bb8 824static void init_amd(struct cpuinfo_x86 *c)
1da177e4 825{
2b16a235
AK
826 early_init_amd(c);
827
fb87a298
PC
828 /*
829 * Bit 31 in normal CPUID used for nonstandard 3DNow ID;
16282a8e 830 * 3DNow is IDd by bit 31 in extended CPUID (1*32+31) anyway
fb87a298 831 */
16282a8e 832 clear_cpu_cap(c, 0*32+31);
fb87a298 833
12d8a961 834 if (c->x86 >= 0x10)
6c62aa4a 835 set_cpu_cap(c, X86_FEATURE_REP_GOOD);
0d96b9ff
YL
836
837 /* get apicid instead of initial apic id from cpuid */
838 c->apicid = hard_smp_processor_id();
11fdd252
YL
839
840 /* K6s reports MCEs but don't actually have all the MSRs */
841 if (c->x86 < 6)
842 clear_cpu_cap(c, X86_FEATURE_MCE);
26bfa5f8
BP
843
844 switch (c->x86) {
845 case 4: init_amd_k5(c); break;
846 case 5: init_amd_k6(c); break;
847 case 6: init_amd_k7(c); break;
848 case 0xf: init_amd_k8(c); break;
849 case 0x10: init_amd_gh(c); break;
d1992996 850 case 0x12: init_amd_ln(c); break;
26bfa5f8 851 case 0x15: init_amd_bd(c); break;
f7f3dc00 852 case 0x17: init_amd_zn(c); break;
26bfa5f8 853 }
11fdd252 854
e3811a3f
RM
855 /*
856 * Enable workaround for FXSAVE leak on CPUs
857 * without a XSaveErPtr feature
858 */
859 if ((c->x86 >= 6) && (!cpu_has(c, X86_FEATURE_XSAVEERPTR)))
9b13a93d 860 set_cpu_bug(c, X86_BUG_FXSAVE_LEAK);
1da177e4 861
27c13ece 862 cpu_detect_cache_sizes(c);
3dd9d514 863
11fdd252 864 /* Multi core CPU? */
6c62aa4a 865 if (c->extended_cpuid_level >= 0x80000008) {
11fdd252 866 amd_detect_cmp(c);
6c62aa4a
YL
867 srat_detect_node(c);
868 }
faee9a5d 869
6c62aa4a 870#ifdef CONFIG_X86_32
11fdd252 871 detect_ht(c);
6c62aa4a 872#endif
39b3a791 873
04a15418 874 init_amd_cacheinfo(c);
3556ddfa 875
12d8a961 876 if (c->x86 >= 0xf)
11fdd252 877 set_cpu_cap(c, X86_FEATURE_K8);
de421863 878
054efb64 879 if (cpu_has(c, X86_FEATURE_XMM2)) {
9c6a73c7
TL
880 unsigned long long val;
881 int ret;
882
e4d0e84e
TL
883 /*
884 * A serializing LFENCE has less overhead than MFENCE, so
885 * use it for execution serialization. On families which
886 * don't have that MSR, LFENCE is already serializing.
887 * msr_set_bit() uses the safe accessors, too, even if the MSR
888 * is not present.
889 */
890 msr_set_bit(MSR_F10H_DECFG,
891 MSR_F10H_DECFG_LFENCE_SERIALIZE_BIT);
892
9c6a73c7
TL
893 /*
894 * Verify that the MSR write was successful (could be running
895 * under a hypervisor) and only then assume that LFENCE is
896 * serializing.
897 */
898 ret = rdmsrl_safe(MSR_F10H_DECFG, &val);
899 if (!ret && (val & MSR_F10H_DECFG_LFENCE_SERIALIZE)) {
900 /* A serializing LFENCE stops RDTSC speculation */
901 set_cpu_cap(c, X86_FEATURE_LFENCE_RDTSC);
902 } else {
903 /* MFENCE stops RDTSC speculation */
904 set_cpu_cap(c, X86_FEATURE_MFENCE_RDTSC);
905 }
11fdd252 906 }
6c62aa4a 907
e9cdd343
BO
908 /*
909 * Family 0x12 and above processors have APIC timer
910 * running in deep C states.
911 */
912 if (c->x86 > 0x11)
b87cf80a 913 set_cpu_cap(c, X86_FEATURE_ARAT);
5bbc097d 914
a930dc45
BP
915 /* 3DNow or LM implies PREFETCHW */
916 if (!cpu_has(c, X86_FEATURE_3DNOWPREFETCH))
917 if (cpu_has(c, X86_FEATURE_3DNOW) || cpu_has(c, X86_FEATURE_LM))
918 set_cpu_cap(c, X86_FEATURE_3DNOWPREFETCH);
61f01dd9 919
def9331a
JG
920 /* AMD CPUs don't reset SS attributes on SYSRET, Xen does. */
921 if (!cpu_has(c, X86_FEATURE_XENPV))
922 set_cpu_bug(c, X86_BUG_SYSRET_SS_ATTRS);
1da177e4
LT
923}
924
6c62aa4a 925#ifdef CONFIG_X86_32
148f9bb8 926static unsigned int amd_size_cache(struct cpuinfo_x86 *c, unsigned int size)
1da177e4
LT
927{
928 /* AMD errata T13 (order #21922) */
929 if ((c->x86 == 6)) {
8bdbd962 930 /* Duron Rev A0 */
b399151c 931 if (c->x86_model == 3 && c->x86_stepping == 0)
1da177e4 932 size = 64;
8bdbd962 933 /* Tbird rev A1/A2 */
1da177e4 934 if (c->x86_model == 4 &&
b399151c 935 (c->x86_stepping == 0 || c->x86_stepping == 1))
1da177e4
LT
936 size = 256;
937 }
938 return size;
939}
6c62aa4a 940#endif
1da177e4 941
148f9bb8 942static void cpu_detect_tlb_amd(struct cpuinfo_x86 *c)
b46882e4
BP
943{
944 u32 ebx, eax, ecx, edx;
945 u16 mask = 0xfff;
946
947 if (c->x86 < 0xf)
948 return;
949
950 if (c->extended_cpuid_level < 0x80000006)
951 return;
952
953 cpuid(0x80000006, &eax, &ebx, &ecx, &edx);
954
955 tlb_lld_4k[ENTRIES] = (ebx >> 16) & mask;
956 tlb_lli_4k[ENTRIES] = ebx & mask;
957
958 /*
959 * K8 doesn't have 2M/4M entries in the L2 TLB so read out the L1 TLB
960 * characteristics from the CPUID function 0x80000005 instead.
961 */
962 if (c->x86 == 0xf) {
963 cpuid(0x80000005, &eax, &ebx, &ecx, &edx);
964 mask = 0xff;
965 }
966
967 /* Handle DTLB 2M and 4M sizes, fall back to L1 if L2 is disabled */
d1393367
BP
968 if (!((eax >> 16) & mask))
969 tlb_lld_2m[ENTRIES] = (cpuid_eax(0x80000005) >> 16) & 0xff;
970 else
b46882e4 971 tlb_lld_2m[ENTRIES] = (eax >> 16) & mask;
b46882e4
BP
972
973 /* a 4M entry uses two 2M entries */
974 tlb_lld_4m[ENTRIES] = tlb_lld_2m[ENTRIES] >> 1;
975
976 /* Handle ITLB 2M and 4M sizes, fall back to L1 if L2 is disabled */
977 if (!(eax & mask)) {
978 /* Erratum 658 */
979 if (c->x86 == 0x15 && c->x86_model <= 0x1f) {
980 tlb_lli_2m[ENTRIES] = 1024;
981 } else {
982 cpuid(0x80000005, &eax, &ebx, &ecx, &edx);
983 tlb_lli_2m[ENTRIES] = eax & 0xff;
984 }
985 } else
986 tlb_lli_2m[ENTRIES] = eax & mask;
987
988 tlb_lli_4m[ENTRIES] = tlb_lli_2m[ENTRIES] >> 1;
989}
990
148f9bb8 991static const struct cpu_dev amd_cpu_dev = {
1da177e4 992 .c_vendor = "AMD",
fb87a298 993 .c_ident = { "AuthenticAMD" },
6c62aa4a 994#ifdef CONFIG_X86_32
09dc68d9
JB
995 .legacy_models = {
996 { .family = 4, .model_names =
1da177e4
LT
997 {
998 [3] = "486 DX/2",
999 [7] = "486 DX/2-WB",
fb87a298
PC
1000 [8] = "486 DX/4",
1001 [9] = "486 DX/4-WB",
1da177e4 1002 [14] = "Am5x86-WT",
fb87a298 1003 [15] = "Am5x86-WB"
1da177e4
LT
1004 }
1005 },
1006 },
09dc68d9 1007 .legacy_cache_size = amd_size_cache,
6c62aa4a 1008#endif
03ae5768 1009 .c_early_init = early_init_amd,
b46882e4 1010 .c_detect_tlb = cpu_detect_tlb_amd,
8fa8b035 1011 .c_bsp_init = bsp_init_amd,
1da177e4 1012 .c_init = init_amd,
10a434fc 1013 .c_x86_vendor = X86_VENDOR_AMD,
1da177e4
LT
1014};
1015
10a434fc 1016cpu_dev_register(amd_cpu_dev);
d78d671d
HR
1017
1018/*
1019 * AMD errata checking
1020 *
1021 * Errata are defined as arrays of ints using the AMD_LEGACY_ERRATUM() or
1022 * AMD_OSVW_ERRATUM() macros. The latter is intended for newer errata that
1023 * have an OSVW id assigned, which it takes as first argument. Both take a
1024 * variable number of family-specific model-stepping ranges created by
7d7dc116 1025 * AMD_MODEL_RANGE().
d78d671d
HR
1026 *
1027 * Example:
1028 *
1029 * const int amd_erratum_319[] =
1030 * AMD_LEGACY_ERRATUM(AMD_MODEL_RANGE(0x10, 0x2, 0x1, 0x4, 0x2),
1031 * AMD_MODEL_RANGE(0x10, 0x8, 0x0, 0x8, 0x0),
1032 * AMD_MODEL_RANGE(0x10, 0x9, 0x0, 0x9, 0x0));
1033 */
1034
7d7dc116
BP
1035#define AMD_LEGACY_ERRATUM(...) { -1, __VA_ARGS__, 0 }
1036#define AMD_OSVW_ERRATUM(osvw_id, ...) { osvw_id, __VA_ARGS__, 0 }
1037#define AMD_MODEL_RANGE(f, m_start, s_start, m_end, s_end) \
1038 ((f << 24) | (m_start << 16) | (s_start << 12) | (m_end << 4) | (s_end))
1039#define AMD_MODEL_RANGE_FAMILY(range) (((range) >> 24) & 0xff)
1040#define AMD_MODEL_RANGE_START(range) (((range) >> 12) & 0xfff)
1041#define AMD_MODEL_RANGE_END(range) ((range) & 0xfff)
1042
1043static const int amd_erratum_400[] =
328935e6 1044 AMD_OSVW_ERRATUM(1, AMD_MODEL_RANGE(0xf, 0x41, 0x2, 0xff, 0xf),
9d8888c2
HR
1045 AMD_MODEL_RANGE(0x10, 0x2, 0x1, 0xff, 0xf));
1046
e6ee94d5 1047static const int amd_erratum_383[] =
1be85a6d 1048 AMD_OSVW_ERRATUM(3, AMD_MODEL_RANGE(0x10, 0, 0, 0xff, 0xf));
9d8888c2 1049
8c6b79bb
TK
1050
1051static bool cpu_has_amd_erratum(struct cpuinfo_x86 *cpu, const int *erratum)
d78d671d 1052{
d78d671d
HR
1053 int osvw_id = *erratum++;
1054 u32 range;
1055 u32 ms;
1056
d78d671d
HR
1057 if (osvw_id >= 0 && osvw_id < 65536 &&
1058 cpu_has(cpu, X86_FEATURE_OSVW)) {
1059 u64 osvw_len;
1060
1061 rdmsrl(MSR_AMD64_OSVW_ID_LENGTH, osvw_len);
1062 if (osvw_id < osvw_len) {
1063 u64 osvw_bits;
1064
1065 rdmsrl(MSR_AMD64_OSVW_STATUS + (osvw_id >> 6),
1066 osvw_bits);
1067 return osvw_bits & (1ULL << (osvw_id & 0x3f));
1068 }
1069 }
1070
1071 /* OSVW unavailable or ID unknown, match family-model-stepping range */
b399151c 1072 ms = (cpu->x86_model << 4) | cpu->x86_stepping;
d78d671d
HR
1073 while ((range = *erratum++))
1074 if ((cpu->x86 == AMD_MODEL_RANGE_FAMILY(range)) &&
1075 (ms >= AMD_MODEL_RANGE_START(range)) &&
1076 (ms <= AMD_MODEL_RANGE_END(range)))
1077 return true;
1078
1079 return false;
1080}
d6d55f0b
JS
1081
1082void set_dr_addr_mask(unsigned long mask, int dr)
1083{
362f924b 1084 if (!boot_cpu_has(X86_FEATURE_BPEXT))
d6d55f0b
JS
1085 return;
1086
1087 switch (dr) {
1088 case 0:
1089 wrmsr(MSR_F16H_DR0_ADDR_MASK, mask, 0);
1090 break;
1091 case 1:
1092 case 2:
1093 case 3:
1094 wrmsr(MSR_F16H_DR1_ADDR_MASK - 1 + dr, mask, 0);
1095 break;
1096 default:
1097 break;
1098 }
1099}