1 // SPDX-License-Identifier: GPL-2.0-or-later 2 /* 3 * Intel CPU Microcode Update Driver for Linux 4 * 5 * Copyright (C) 2000-2006 Tigran Aivazian <[email protected]> 6 * 2006 Shaohua Li <[email protected]> 7 * 8 * Intel CPU microcode early update for Linux 9 * 10 * Copyright (C) 2012 Fenghua Yu <[email protected]> 11 * H Peter Anvin" <[email protected]> 12 */ 13 #define pr_fmt(fmt) "microcode: " fmt 14 #include <linux/earlycpio.h> 15 #include <linux/firmware.h> 16 #include <linux/uaccess.h> 17 #include <linux/vmalloc.h> 18 #include <linux/initrd.h> 19 #include <linux/kernel.h> 20 #include <linux/slab.h> 21 #include <linux/cpu.h> 22 #include <linux/uio.h> 23 #include <linux/mm.h> 24 25 #include <asm/intel-family.h> 26 #include <asm/processor.h> 27 #include <asm/tlbflush.h> 28 #include <asm/setup.h> 29 #include <asm/msr.h> 30 31 #include "internal.h" 32 33 static const char ucode_path[] = "kernel/x86/microcode/GenuineIntel.bin"; 34 35 #define UCODE_BSP_LOADED ((struct microcode_intel *)0x1UL) 36 37 /* Current microcode patch used in early patching on the APs. */ 38 static struct microcode_intel *ucode_patch_va __read_mostly; 39 40 /* last level cache size per core */ 41 static unsigned int llc_size_per_core __ro_after_init; 42 43 /* microcode format is extended from prescott processors */ 44 struct extended_signature { 45 unsigned int sig; 46 unsigned int pf; 47 unsigned int cksum; 48 }; 49 50 struct extended_sigtable { 51 unsigned int count; 52 unsigned int cksum; 53 unsigned int reserved[3]; 54 struct extended_signature sigs[]; 55 }; 56 57 #define DEFAULT_UCODE_TOTALSIZE (DEFAULT_UCODE_DATASIZE + MC_HEADER_SIZE) 58 #define EXT_HEADER_SIZE (sizeof(struct extended_sigtable)) 59 #define EXT_SIGNATURE_SIZE (sizeof(struct extended_signature)) 60 61 static inline unsigned int get_totalsize(struct microcode_header_intel *hdr) 62 { 63 return hdr->datasize ? hdr->totalsize : DEFAULT_UCODE_TOTALSIZE; 64 } 65 66 static inline unsigned int exttable_size(struct extended_sigtable *et) 67 { 68 return et->count * EXT_SIGNATURE_SIZE + EXT_HEADER_SIZE; 69 } 70 71 int intel_cpu_collect_info(struct ucode_cpu_info *uci) 72 { 73 unsigned int val[2]; 74 unsigned int family, model; 75 struct cpu_signature csig = { 0 }; 76 unsigned int eax, ebx, ecx, edx; 77 78 memset(uci, 0, sizeof(*uci)); 79 80 eax = 0x00000001; 81 ecx = 0; 82 native_cpuid(&eax, &ebx, &ecx, &edx); 83 csig.sig = eax; 84 85 family = x86_family(eax); 86 model = x86_model(eax); 87 88 if (model >= 5 || family > 6) { 89 /* get processor flags from MSR 0x17 */ 90 native_rdmsr(MSR_IA32_PLATFORM_ID, val[0], val[1]); 91 csig.pf = 1 << ((val[1] >> 18) & 7); 92 } 93 94 csig.rev = intel_get_microcode_revision(); 95 96 uci->cpu_sig = csig; 97 98 return 0; 99 } 100 EXPORT_SYMBOL_GPL(intel_cpu_collect_info); 101 102 /* 103 * Returns 1 if update has been found, 0 otherwise. 104 */ 105 int intel_find_matching_signature(void *mc, unsigned int csig, int cpf) 106 { 107 struct microcode_header_intel *mc_hdr = mc; 108 struct extended_sigtable *ext_hdr; 109 struct extended_signature *ext_sig; 110 int i; 111 112 if (intel_cpu_signatures_match(csig, cpf, mc_hdr->sig, mc_hdr->pf)) 113 return 1; 114 115 /* Look for ext. headers: */ 116 if (get_totalsize(mc_hdr) <= intel_microcode_get_datasize(mc_hdr) + MC_HEADER_SIZE) 117 return 0; 118 119 ext_hdr = mc + intel_microcode_get_datasize(mc_hdr) + MC_HEADER_SIZE; 120 ext_sig = (void *)ext_hdr + EXT_HEADER_SIZE; 121 122 for (i = 0; i < ext_hdr->count; i++) { 123 if (intel_cpu_signatures_match(csig, cpf, ext_sig->sig, ext_sig->pf)) 124 return 1; 125 ext_sig++; 126 } 127 return 0; 128 } 129 EXPORT_SYMBOL_GPL(intel_find_matching_signature); 130 131 /** 132 * intel_microcode_sanity_check() - Sanity check microcode file. 133 * @mc: Pointer to the microcode file contents. 134 * @print_err: Display failure reason if true, silent if false. 135 * @hdr_type: Type of file, i.e. normal microcode file or In Field Scan file. 136 * Validate if the microcode header type matches with the type 137 * specified here. 138 * 139 * Validate certain header fields and verify if computed checksum matches 140 * with the one specified in the header. 141 * 142 * Return: 0 if the file passes all the checks, -EINVAL if any of the checks 143 * fail. 144 */ 145 int intel_microcode_sanity_check(void *mc, bool print_err, int hdr_type) 146 { 147 unsigned long total_size, data_size, ext_table_size; 148 struct microcode_header_intel *mc_header = mc; 149 struct extended_sigtable *ext_header = NULL; 150 u32 sum, orig_sum, ext_sigcount = 0, i; 151 struct extended_signature *ext_sig; 152 153 total_size = get_totalsize(mc_header); 154 data_size = intel_microcode_get_datasize(mc_header); 155 156 if (data_size + MC_HEADER_SIZE > total_size) { 157 if (print_err) 158 pr_err("Error: bad microcode data file size.\n"); 159 return -EINVAL; 160 } 161 162 if (mc_header->ldrver != 1 || mc_header->hdrver != hdr_type) { 163 if (print_err) 164 pr_err("Error: invalid/unknown microcode update format. Header type %d\n", 165 mc_header->hdrver); 166 return -EINVAL; 167 } 168 169 ext_table_size = total_size - (MC_HEADER_SIZE + data_size); 170 if (ext_table_size) { 171 u32 ext_table_sum = 0; 172 u32 *ext_tablep; 173 174 if (ext_table_size < EXT_HEADER_SIZE || 175 ((ext_table_size - EXT_HEADER_SIZE) % EXT_SIGNATURE_SIZE)) { 176 if (print_err) 177 pr_err("Error: truncated extended signature table.\n"); 178 return -EINVAL; 179 } 180 181 ext_header = mc + MC_HEADER_SIZE + data_size; 182 if (ext_table_size != exttable_size(ext_header)) { 183 if (print_err) 184 pr_err("Error: extended signature table size mismatch.\n"); 185 return -EFAULT; 186 } 187 188 ext_sigcount = ext_header->count; 189 190 /* 191 * Check extended table checksum: the sum of all dwords that 192 * comprise a valid table must be 0. 193 */ 194 ext_tablep = (u32 *)ext_header; 195 196 i = ext_table_size / sizeof(u32); 197 while (i--) 198 ext_table_sum += ext_tablep[i]; 199 200 if (ext_table_sum) { 201 if (print_err) 202 pr_warn("Bad extended signature table checksum, aborting.\n"); 203 return -EINVAL; 204 } 205 } 206 207 /* 208 * Calculate the checksum of update data and header. The checksum of 209 * valid update data and header including the extended signature table 210 * must be 0. 211 */ 212 orig_sum = 0; 213 i = (MC_HEADER_SIZE + data_size) / sizeof(u32); 214 while (i--) 215 orig_sum += ((u32 *)mc)[i]; 216 217 if (orig_sum) { 218 if (print_err) 219 pr_err("Bad microcode data checksum, aborting.\n"); 220 return -EINVAL; 221 } 222 223 if (!ext_table_size) 224 return 0; 225 226 /* 227 * Check extended signature checksum: 0 => valid. 228 */ 229 for (i = 0; i < ext_sigcount; i++) { 230 ext_sig = (void *)ext_header + EXT_HEADER_SIZE + 231 EXT_SIGNATURE_SIZE * i; 232 233 sum = (mc_header->sig + mc_header->pf + mc_header->cksum) - 234 (ext_sig->sig + ext_sig->pf + ext_sig->cksum); 235 if (sum) { 236 if (print_err) 237 pr_err("Bad extended signature checksum, aborting.\n"); 238 return -EINVAL; 239 } 240 } 241 return 0; 242 } 243 EXPORT_SYMBOL_GPL(intel_microcode_sanity_check); 244 245 static void update_ucode_pointer(struct microcode_intel *mc) 246 { 247 kfree(ucode_patch_va); 248 249 /* 250 * Save the virtual address for early loading and for eventual free 251 * on late loading. 252 */ 253 ucode_patch_va = mc; 254 } 255 256 static void save_microcode_patch(struct microcode_intel *patch) 257 { 258 struct microcode_intel *mc; 259 260 mc = kmemdup(patch, get_totalsize(&patch->hdr), GFP_KERNEL); 261 if (mc) 262 update_ucode_pointer(mc); 263 } 264 265 /* Scan blob for microcode matching the boot CPUs family, model, stepping */ 266 static __init struct microcode_intel *scan_microcode(void *data, size_t size, 267 struct ucode_cpu_info *uci, 268 bool save) 269 { 270 struct microcode_header_intel *mc_header; 271 struct microcode_intel *patch = NULL; 272 u32 cur_rev = uci->cpu_sig.rev; 273 unsigned int mc_size; 274 275 for (; size >= sizeof(struct microcode_header_intel); size -= mc_size, data += mc_size) { 276 mc_header = (struct microcode_header_intel *)data; 277 278 mc_size = get_totalsize(mc_header); 279 if (!mc_size || mc_size > size || 280 intel_microcode_sanity_check(data, false, MC_HEADER_TYPE_MICROCODE) < 0) 281 break; 282 283 if (!intel_find_matching_signature(data, uci->cpu_sig.sig, uci->cpu_sig.pf)) 284 continue; 285 286 /* 287 * For saving the early microcode, find the matching revision which 288 * was loaded on the BSP. 289 * 290 * On the BSP during early boot, find a newer revision than 291 * actually loaded in the CPU. 292 */ 293 if (save) { 294 if (cur_rev != mc_header->rev) 295 continue; 296 } else if (cur_rev >= mc_header->rev) { 297 continue; 298 } 299 300 patch = data; 301 cur_rev = mc_header->rev; 302 } 303 304 return size ? NULL : patch; 305 } 306 307 static enum ucode_state apply_microcode_early(struct ucode_cpu_info *uci) 308 { 309 struct microcode_intel *mc; 310 u32 rev, old_rev, date; 311 312 mc = uci->mc; 313 if (!mc) 314 return UCODE_NFOUND; 315 316 /* 317 * Save us the MSR write below - which is a particular expensive 318 * operation - when the other hyperthread has updated the microcode 319 * already. 320 */ 321 rev = intel_get_microcode_revision(); 322 if (rev >= mc->hdr.rev) { 323 uci->cpu_sig.rev = rev; 324 return UCODE_OK; 325 } 326 327 old_rev = rev; 328 329 /* 330 * Writeback and invalidate caches before updating microcode to avoid 331 * internal issues depending on what the microcode is updating. 332 */ 333 native_wbinvd(); 334 335 /* write microcode via MSR 0x79 */ 336 native_wrmsrl(MSR_IA32_UCODE_WRITE, (unsigned long)mc->bits); 337 338 rev = intel_get_microcode_revision(); 339 if (rev != mc->hdr.rev) 340 return UCODE_ERROR; 341 342 uci->cpu_sig.rev = rev; 343 344 date = mc->hdr.date; 345 pr_info_once("updated early: 0x%x -> 0x%x, date = %04x-%02x-%02x\n", 346 old_rev, rev, date & 0xffff, date >> 24, (date >> 16) & 0xff); 347 return UCODE_UPDATED; 348 } 349 350 static __init bool load_builtin_intel_microcode(struct cpio_data *cp) 351 { 352 unsigned int eax = 1, ebx, ecx = 0, edx; 353 struct firmware fw; 354 char name[30]; 355 356 if (IS_ENABLED(CONFIG_X86_32)) 357 return false; 358 359 native_cpuid(&eax, &ebx, &ecx, &edx); 360 361 sprintf(name, "intel-ucode/%02x-%02x-%02x", 362 x86_family(eax), x86_model(eax), x86_stepping(eax)); 363 364 if (firmware_request_builtin(&fw, name)) { 365 cp->size = fw.size; 366 cp->data = (void *)fw.data; 367 return true; 368 } 369 return false; 370 } 371 372 static __init struct microcode_intel *get_microcode_blob(struct ucode_cpu_info *uci, bool save) 373 { 374 struct cpio_data cp; 375 376 if (!load_builtin_intel_microcode(&cp)) 377 cp = find_microcode_in_initrd(ucode_path); 378 379 if (!(cp.data && cp.size)) 380 return NULL; 381 382 intel_cpu_collect_info(uci); 383 384 return scan_microcode(cp.data, cp.size, uci, save); 385 } 386 387 /* 388 * Invoked from an early init call to save the microcode blob which was 389 * selected during early boot when mm was not usable. The microcode must be 390 * saved because initrd is going away. It's an early init call so the APs 391 * just can use the pointer and do not have to scan initrd/builtin firmware 392 * again. 393 */ 394 static int __init save_builtin_microcode(void) 395 { 396 struct ucode_cpu_info uci; 397 398 if (xchg(&ucode_patch_va, NULL) != UCODE_BSP_LOADED) 399 return 0; 400 401 if (dis_ucode_ldr || boot_cpu_data.x86_vendor != X86_VENDOR_INTEL) 402 return 0; 403 404 uci.mc = get_microcode_blob(&uci, true); 405 if (uci.mc) 406 save_microcode_patch(uci.mc); 407 return 0; 408 } 409 early_initcall(save_builtin_microcode); 410 411 /* Load microcode on BSP from initrd or builtin blobs */ 412 void __init load_ucode_intel_bsp(void) 413 { 414 struct ucode_cpu_info uci; 415 416 uci.mc = get_microcode_blob(&uci, false); 417 if (uci.mc && apply_microcode_early(&uci) == UCODE_UPDATED) 418 ucode_patch_va = UCODE_BSP_LOADED; 419 } 420 421 void load_ucode_intel_ap(void) 422 { 423 struct ucode_cpu_info uci; 424 425 uci.mc = ucode_patch_va; 426 if (uci.mc) 427 apply_microcode_early(&uci); 428 } 429 430 /* Reload microcode on resume */ 431 void reload_ucode_intel(void) 432 { 433 struct ucode_cpu_info uci = { .mc = ucode_patch_va, }; 434 435 if (uci.mc) 436 apply_microcode_early(&uci); 437 } 438 439 static int collect_cpu_info(int cpu_num, struct cpu_signature *csig) 440 { 441 struct cpuinfo_x86 *c = &cpu_data(cpu_num); 442 unsigned int val[2]; 443 444 memset(csig, 0, sizeof(*csig)); 445 446 csig->sig = cpuid_eax(0x00000001); 447 448 if ((c->x86_model >= 5) || (c->x86 > 6)) { 449 /* get processor flags from MSR 0x17 */ 450 rdmsr(MSR_IA32_PLATFORM_ID, val[0], val[1]); 451 csig->pf = 1 << ((val[1] >> 18) & 7); 452 } 453 454 csig->rev = c->microcode; 455 456 return 0; 457 } 458 459 static enum ucode_state apply_microcode_intel(int cpu) 460 { 461 struct ucode_cpu_info *uci = ucode_cpu_info + cpu; 462 struct cpuinfo_x86 *c = &cpu_data(cpu); 463 bool bsp = c->cpu_index == boot_cpu_data.cpu_index; 464 struct microcode_intel *mc; 465 enum ucode_state ret; 466 static int prev_rev; 467 u32 rev; 468 469 /* We should bind the task to the CPU */ 470 if (WARN_ON(raw_smp_processor_id() != cpu)) 471 return UCODE_ERROR; 472 473 mc = ucode_patch_va; 474 if (!mc) { 475 mc = uci->mc; 476 if (!mc) 477 return UCODE_NFOUND; 478 } 479 480 /* 481 * Save us the MSR write below - which is a particular expensive 482 * operation - when the other hyperthread has updated the microcode 483 * already. 484 */ 485 rev = intel_get_microcode_revision(); 486 if (rev >= mc->hdr.rev) { 487 ret = UCODE_OK; 488 goto out; 489 } 490 491 /* 492 * Writeback and invalidate caches before updating microcode to avoid 493 * internal issues depending on what the microcode is updating. 494 */ 495 native_wbinvd(); 496 497 /* write microcode via MSR 0x79 */ 498 wrmsrl(MSR_IA32_UCODE_WRITE, (unsigned long)mc->bits); 499 500 rev = intel_get_microcode_revision(); 501 502 if (rev != mc->hdr.rev) { 503 pr_err("CPU%d update to revision 0x%x failed\n", 504 cpu, mc->hdr.rev); 505 return UCODE_ERROR; 506 } 507 508 if (bsp && rev != prev_rev) { 509 pr_info("updated to revision 0x%x, date = %04x-%02x-%02x\n", 510 rev, 511 mc->hdr.date & 0xffff, 512 mc->hdr.date >> 24, 513 (mc->hdr.date >> 16) & 0xff); 514 prev_rev = rev; 515 } 516 517 ret = UCODE_UPDATED; 518 519 out: 520 uci->cpu_sig.rev = rev; 521 c->microcode = rev; 522 523 /* Update boot_cpu_data's revision too, if we're on the BSP: */ 524 if (bsp) 525 boot_cpu_data.microcode = rev; 526 527 return ret; 528 } 529 530 static enum ucode_state parse_microcode_blobs(int cpu, struct iov_iter *iter) 531 { 532 struct ucode_cpu_info *uci = ucode_cpu_info + cpu; 533 int cur_rev = uci->cpu_sig.rev; 534 unsigned int curr_mc_size = 0; 535 u8 *new_mc = NULL, *mc = NULL; 536 537 while (iov_iter_count(iter)) { 538 struct microcode_header_intel mc_header; 539 unsigned int mc_size, data_size; 540 u8 *data; 541 542 if (!copy_from_iter_full(&mc_header, sizeof(mc_header), iter)) { 543 pr_err("error! Truncated or inaccessible header in microcode data file\n"); 544 break; 545 } 546 547 mc_size = get_totalsize(&mc_header); 548 if (mc_size < sizeof(mc_header)) { 549 pr_err("error! Bad data in microcode data file (totalsize too small)\n"); 550 break; 551 } 552 553 data_size = mc_size - sizeof(mc_header); 554 if (data_size > iov_iter_count(iter)) { 555 pr_err("error! Bad data in microcode data file (truncated file?)\n"); 556 break; 557 } 558 559 /* For performance reasons, reuse mc area when possible */ 560 if (!mc || mc_size > curr_mc_size) { 561 vfree(mc); 562 mc = vmalloc(mc_size); 563 if (!mc) 564 break; 565 curr_mc_size = mc_size; 566 } 567 568 memcpy(mc, &mc_header, sizeof(mc_header)); 569 data = mc + sizeof(mc_header); 570 if (!copy_from_iter_full(data, data_size, iter) || 571 intel_microcode_sanity_check(mc, true, MC_HEADER_TYPE_MICROCODE) < 0) { 572 break; 573 } 574 575 if (cur_rev >= mc_header.rev) 576 continue; 577 578 if (!intel_find_matching_signature(mc, uci->cpu_sig.sig, uci->cpu_sig.pf)) 579 continue; 580 581 vfree(new_mc); 582 cur_rev = mc_header.rev; 583 new_mc = mc; 584 mc = NULL; 585 } 586 587 vfree(mc); 588 589 if (iov_iter_count(iter)) { 590 vfree(new_mc); 591 return UCODE_ERROR; 592 } 593 594 if (!new_mc) 595 return UCODE_NFOUND; 596 597 /* Save for CPU hotplug */ 598 save_microcode_patch((struct microcode_intel *)new_mc); 599 uci->mc = ucode_patch_va; 600 601 vfree(new_mc); 602 603 pr_debug("CPU%d found a matching microcode update with version 0x%x (current=0x%x)\n", 604 cpu, cur_rev, uci->cpu_sig.rev); 605 606 return UCODE_NEW; 607 } 608 609 static bool is_blacklisted(unsigned int cpu) 610 { 611 struct cpuinfo_x86 *c = &cpu_data(cpu); 612 613 /* 614 * Late loading on model 79 with microcode revision less than 0x0b000021 615 * and LLC size per core bigger than 2.5MB may result in a system hang. 616 * This behavior is documented in item BDF90, #334165 (Intel Xeon 617 * Processor E7-8800/4800 v4 Product Family). 618 */ 619 if (c->x86 == 6 && 620 c->x86_model == INTEL_FAM6_BROADWELL_X && 621 c->x86_stepping == 0x01 && 622 llc_size_per_core > 2621440 && 623 c->microcode < 0x0b000021) { 624 pr_err_once("Erratum BDF90: late loading with revision < 0x0b000021 (0x%x) disabled.\n", c->microcode); 625 pr_err_once("Please consider either early loading through initrd/built-in or a potential BIOS update.\n"); 626 return true; 627 } 628 629 return false; 630 } 631 632 static enum ucode_state request_microcode_fw(int cpu, struct device *device) 633 { 634 struct cpuinfo_x86 *c = &cpu_data(cpu); 635 const struct firmware *firmware; 636 struct iov_iter iter; 637 enum ucode_state ret; 638 struct kvec kvec; 639 char name[30]; 640 641 if (is_blacklisted(cpu)) 642 return UCODE_NFOUND; 643 644 sprintf(name, "intel-ucode/%02x-%02x-%02x", 645 c->x86, c->x86_model, c->x86_stepping); 646 647 if (request_firmware_direct(&firmware, name, device)) { 648 pr_debug("data file %s load failed\n", name); 649 return UCODE_NFOUND; 650 } 651 652 kvec.iov_base = (void *)firmware->data; 653 kvec.iov_len = firmware->size; 654 iov_iter_kvec(&iter, ITER_SOURCE, &kvec, 1, firmware->size); 655 ret = parse_microcode_blobs(cpu, &iter); 656 657 release_firmware(firmware); 658 659 return ret; 660 } 661 662 static struct microcode_ops microcode_intel_ops = { 663 .request_microcode_fw = request_microcode_fw, 664 .collect_cpu_info = collect_cpu_info, 665 .apply_microcode = apply_microcode_intel, 666 }; 667 668 static __init void calc_llc_size_per_core(struct cpuinfo_x86 *c) 669 { 670 u64 llc_size = c->x86_cache_size * 1024ULL; 671 672 do_div(llc_size, c->x86_max_cores); 673 llc_size_per_core = (unsigned int)llc_size; 674 } 675 676 struct microcode_ops * __init init_intel_microcode(void) 677 { 678 struct cpuinfo_x86 *c = &boot_cpu_data; 679 680 if (c->x86_vendor != X86_VENDOR_INTEL || c->x86 < 6 || 681 cpu_has(c, X86_FEATURE_IA64)) { 682 pr_err("Intel CPU family 0x%x not supported\n", c->x86); 683 return NULL; 684 } 685 686 calc_llc_size_per_core(c); 687 688 return µcode_intel_ops; 689 } 690