1 // SPDX-License-Identifier: GPL-2.0-or-later 2 /* 3 * Intel CPU Microcode Update Driver for Linux 4 * 5 * Copyright (C) 2000-2006 Tigran Aivazian <[email protected]> 6 * 2006 Shaohua Li <[email protected]> 7 * 8 * Intel CPU microcode early update for Linux 9 * 10 * Copyright (C) 2012 Fenghua Yu <[email protected]> 11 * H Peter Anvin" <[email protected]> 12 */ 13 #define pr_fmt(fmt) "microcode: " fmt 14 #include <linux/earlycpio.h> 15 #include <linux/firmware.h> 16 #include <linux/uaccess.h> 17 #include <linux/initrd.h> 18 #include <linux/kernel.h> 19 #include <linux/slab.h> 20 #include <linux/cpu.h> 21 #include <linux/uio.h> 22 #include <linux/mm.h> 23 24 #include <asm/intel-family.h> 25 #include <asm/processor.h> 26 #include <asm/tlbflush.h> 27 #include <asm/setup.h> 28 #include <asm/msr.h> 29 30 #include "internal.h" 31 32 static const char ucode_path[] = "kernel/x86/microcode/GenuineIntel.bin"; 33 34 #define UCODE_BSP_LOADED ((struct microcode_intel *)0x1UL) 35 36 /* Current microcode patch used in early patching on the APs. */ 37 static struct microcode_intel *ucode_patch_va __read_mostly; 38 static struct microcode_intel *ucode_patch_late __read_mostly; 39 40 /* last level cache size per core */ 41 static unsigned int llc_size_per_core __ro_after_init; 42 43 /* microcode format is extended from prescott processors */ 44 struct extended_signature { 45 unsigned int sig; 46 unsigned int pf; 47 unsigned int cksum; 48 }; 49 50 struct extended_sigtable { 51 unsigned int count; 52 unsigned int cksum; 53 unsigned int reserved[3]; 54 struct extended_signature sigs[]; 55 }; 56 57 #define DEFAULT_UCODE_TOTALSIZE (DEFAULT_UCODE_DATASIZE + MC_HEADER_SIZE) 58 #define EXT_HEADER_SIZE (sizeof(struct extended_sigtable)) 59 #define EXT_SIGNATURE_SIZE (sizeof(struct extended_signature)) 60 61 static inline unsigned int get_totalsize(struct microcode_header_intel *hdr) 62 { 63 return hdr->datasize ? hdr->totalsize : DEFAULT_UCODE_TOTALSIZE; 64 } 65 66 static inline unsigned int exttable_size(struct extended_sigtable *et) 67 { 68 return et->count * EXT_SIGNATURE_SIZE + EXT_HEADER_SIZE; 69 } 70 71 int intel_cpu_collect_info(struct ucode_cpu_info *uci) 72 { 73 unsigned int val[2]; 74 unsigned int family, model; 75 struct cpu_signature csig = { 0 }; 76 unsigned int eax, ebx, ecx, edx; 77 78 memset(uci, 0, sizeof(*uci)); 79 80 eax = 0x00000001; 81 ecx = 0; 82 native_cpuid(&eax, &ebx, &ecx, &edx); 83 csig.sig = eax; 84 85 family = x86_family(eax); 86 model = x86_model(eax); 87 88 if (model >= 5 || family > 6) { 89 /* get processor flags from MSR 0x17 */ 90 native_rdmsr(MSR_IA32_PLATFORM_ID, val[0], val[1]); 91 csig.pf = 1 << ((val[1] >> 18) & 7); 92 } 93 94 csig.rev = intel_get_microcode_revision(); 95 96 uci->cpu_sig = csig; 97 98 return 0; 99 } 100 EXPORT_SYMBOL_GPL(intel_cpu_collect_info); 101 102 /* 103 * Returns 1 if update has been found, 0 otherwise. 104 */ 105 int intel_find_matching_signature(void *mc, unsigned int csig, int cpf) 106 { 107 struct microcode_header_intel *mc_hdr = mc; 108 struct extended_sigtable *ext_hdr; 109 struct extended_signature *ext_sig; 110 int i; 111 112 if (intel_cpu_signatures_match(csig, cpf, mc_hdr->sig, mc_hdr->pf)) 113 return 1; 114 115 /* Look for ext. headers: */ 116 if (get_totalsize(mc_hdr) <= intel_microcode_get_datasize(mc_hdr) + MC_HEADER_SIZE) 117 return 0; 118 119 ext_hdr = mc + intel_microcode_get_datasize(mc_hdr) + MC_HEADER_SIZE; 120 ext_sig = (void *)ext_hdr + EXT_HEADER_SIZE; 121 122 for (i = 0; i < ext_hdr->count; i++) { 123 if (intel_cpu_signatures_match(csig, cpf, ext_sig->sig, ext_sig->pf)) 124 return 1; 125 ext_sig++; 126 } 127 return 0; 128 } 129 EXPORT_SYMBOL_GPL(intel_find_matching_signature); 130 131 /** 132 * intel_microcode_sanity_check() - Sanity check microcode file. 133 * @mc: Pointer to the microcode file contents. 134 * @print_err: Display failure reason if true, silent if false. 135 * @hdr_type: Type of file, i.e. normal microcode file or In Field Scan file. 136 * Validate if the microcode header type matches with the type 137 * specified here. 138 * 139 * Validate certain header fields and verify if computed checksum matches 140 * with the one specified in the header. 141 * 142 * Return: 0 if the file passes all the checks, -EINVAL if any of the checks 143 * fail. 144 */ 145 int intel_microcode_sanity_check(void *mc, bool print_err, int hdr_type) 146 { 147 unsigned long total_size, data_size, ext_table_size; 148 struct microcode_header_intel *mc_header = mc; 149 struct extended_sigtable *ext_header = NULL; 150 u32 sum, orig_sum, ext_sigcount = 0, i; 151 struct extended_signature *ext_sig; 152 153 total_size = get_totalsize(mc_header); 154 data_size = intel_microcode_get_datasize(mc_header); 155 156 if (data_size + MC_HEADER_SIZE > total_size) { 157 if (print_err) 158 pr_err("Error: bad microcode data file size.\n"); 159 return -EINVAL; 160 } 161 162 if (mc_header->ldrver != 1 || mc_header->hdrver != hdr_type) { 163 if (print_err) 164 pr_err("Error: invalid/unknown microcode update format. Header type %d\n", 165 mc_header->hdrver); 166 return -EINVAL; 167 } 168 169 ext_table_size = total_size - (MC_HEADER_SIZE + data_size); 170 if (ext_table_size) { 171 u32 ext_table_sum = 0; 172 u32 *ext_tablep; 173 174 if (ext_table_size < EXT_HEADER_SIZE || 175 ((ext_table_size - EXT_HEADER_SIZE) % EXT_SIGNATURE_SIZE)) { 176 if (print_err) 177 pr_err("Error: truncated extended signature table.\n"); 178 return -EINVAL; 179 } 180 181 ext_header = mc + MC_HEADER_SIZE + data_size; 182 if (ext_table_size != exttable_size(ext_header)) { 183 if (print_err) 184 pr_err("Error: extended signature table size mismatch.\n"); 185 return -EFAULT; 186 } 187 188 ext_sigcount = ext_header->count; 189 190 /* 191 * Check extended table checksum: the sum of all dwords that 192 * comprise a valid table must be 0. 193 */ 194 ext_tablep = (u32 *)ext_header; 195 196 i = ext_table_size / sizeof(u32); 197 while (i--) 198 ext_table_sum += ext_tablep[i]; 199 200 if (ext_table_sum) { 201 if (print_err) 202 pr_warn("Bad extended signature table checksum, aborting.\n"); 203 return -EINVAL; 204 } 205 } 206 207 /* 208 * Calculate the checksum of update data and header. The checksum of 209 * valid update data and header including the extended signature table 210 * must be 0. 211 */ 212 orig_sum = 0; 213 i = (MC_HEADER_SIZE + data_size) / sizeof(u32); 214 while (i--) 215 orig_sum += ((u32 *)mc)[i]; 216 217 if (orig_sum) { 218 if (print_err) 219 pr_err("Bad microcode data checksum, aborting.\n"); 220 return -EINVAL; 221 } 222 223 if (!ext_table_size) 224 return 0; 225 226 /* 227 * Check extended signature checksum: 0 => valid. 228 */ 229 for (i = 0; i < ext_sigcount; i++) { 230 ext_sig = (void *)ext_header + EXT_HEADER_SIZE + 231 EXT_SIGNATURE_SIZE * i; 232 233 sum = (mc_header->sig + mc_header->pf + mc_header->cksum) - 234 (ext_sig->sig + ext_sig->pf + ext_sig->cksum); 235 if (sum) { 236 if (print_err) 237 pr_err("Bad extended signature checksum, aborting.\n"); 238 return -EINVAL; 239 } 240 } 241 return 0; 242 } 243 EXPORT_SYMBOL_GPL(intel_microcode_sanity_check); 244 245 static void update_ucode_pointer(struct microcode_intel *mc) 246 { 247 kvfree(ucode_patch_va); 248 249 /* 250 * Save the virtual address for early loading and for eventual free 251 * on late loading. 252 */ 253 ucode_patch_va = mc; 254 } 255 256 static void save_microcode_patch(struct microcode_intel *patch) 257 { 258 unsigned int size = get_totalsize(&patch->hdr); 259 struct microcode_intel *mc; 260 261 mc = kvmemdup(patch, size, GFP_KERNEL); 262 if (mc) 263 update_ucode_pointer(mc); 264 else 265 pr_err("Unable to allocate microcode memory size: %u\n", size); 266 } 267 268 /* Scan blob for microcode matching the boot CPUs family, model, stepping */ 269 static __init struct microcode_intel *scan_microcode(void *data, size_t size, 270 struct ucode_cpu_info *uci, 271 bool save) 272 { 273 struct microcode_header_intel *mc_header; 274 struct microcode_intel *patch = NULL; 275 u32 cur_rev = uci->cpu_sig.rev; 276 unsigned int mc_size; 277 278 for (; size >= sizeof(struct microcode_header_intel); size -= mc_size, data += mc_size) { 279 mc_header = (struct microcode_header_intel *)data; 280 281 mc_size = get_totalsize(mc_header); 282 if (!mc_size || mc_size > size || 283 intel_microcode_sanity_check(data, false, MC_HEADER_TYPE_MICROCODE) < 0) 284 break; 285 286 if (!intel_find_matching_signature(data, uci->cpu_sig.sig, uci->cpu_sig.pf)) 287 continue; 288 289 /* 290 * For saving the early microcode, find the matching revision which 291 * was loaded on the BSP. 292 * 293 * On the BSP during early boot, find a newer revision than 294 * actually loaded in the CPU. 295 */ 296 if (save) { 297 if (cur_rev != mc_header->rev) 298 continue; 299 } else if (cur_rev >= mc_header->rev) { 300 continue; 301 } 302 303 patch = data; 304 cur_rev = mc_header->rev; 305 } 306 307 return size ? NULL : patch; 308 } 309 310 static enum ucode_state apply_microcode_early(struct ucode_cpu_info *uci) 311 { 312 struct microcode_intel *mc; 313 u32 rev, old_rev, date; 314 315 mc = uci->mc; 316 if (!mc) 317 return UCODE_NFOUND; 318 319 /* 320 * Save us the MSR write below - which is a particular expensive 321 * operation - when the other hyperthread has updated the microcode 322 * already. 323 */ 324 rev = intel_get_microcode_revision(); 325 if (rev >= mc->hdr.rev) { 326 uci->cpu_sig.rev = rev; 327 return UCODE_OK; 328 } 329 330 old_rev = rev; 331 332 /* 333 * Writeback and invalidate caches before updating microcode to avoid 334 * internal issues depending on what the microcode is updating. 335 */ 336 native_wbinvd(); 337 338 /* write microcode via MSR 0x79 */ 339 native_wrmsrl(MSR_IA32_UCODE_WRITE, (unsigned long)mc->bits); 340 341 rev = intel_get_microcode_revision(); 342 if (rev != mc->hdr.rev) 343 return UCODE_ERROR; 344 345 uci->cpu_sig.rev = rev; 346 347 date = mc->hdr.date; 348 pr_info_once("updated early: 0x%x -> 0x%x, date = %04x-%02x-%02x\n", 349 old_rev, rev, date & 0xffff, date >> 24, (date >> 16) & 0xff); 350 return UCODE_UPDATED; 351 } 352 353 static __init bool load_builtin_intel_microcode(struct cpio_data *cp) 354 { 355 unsigned int eax = 1, ebx, ecx = 0, edx; 356 struct firmware fw; 357 char name[30]; 358 359 if (IS_ENABLED(CONFIG_X86_32)) 360 return false; 361 362 native_cpuid(&eax, &ebx, &ecx, &edx); 363 364 sprintf(name, "intel-ucode/%02x-%02x-%02x", 365 x86_family(eax), x86_model(eax), x86_stepping(eax)); 366 367 if (firmware_request_builtin(&fw, name)) { 368 cp->size = fw.size; 369 cp->data = (void *)fw.data; 370 return true; 371 } 372 return false; 373 } 374 375 static __init struct microcode_intel *get_microcode_blob(struct ucode_cpu_info *uci, bool save) 376 { 377 struct cpio_data cp; 378 379 if (!load_builtin_intel_microcode(&cp)) 380 cp = find_microcode_in_initrd(ucode_path); 381 382 if (!(cp.data && cp.size)) 383 return NULL; 384 385 intel_cpu_collect_info(uci); 386 387 return scan_microcode(cp.data, cp.size, uci, save); 388 } 389 390 /* 391 * Invoked from an early init call to save the microcode blob which was 392 * selected during early boot when mm was not usable. The microcode must be 393 * saved because initrd is going away. It's an early init call so the APs 394 * just can use the pointer and do not have to scan initrd/builtin firmware 395 * again. 396 */ 397 static int __init save_builtin_microcode(void) 398 { 399 struct ucode_cpu_info uci; 400 401 if (xchg(&ucode_patch_va, NULL) != UCODE_BSP_LOADED) 402 return 0; 403 404 if (dis_ucode_ldr || boot_cpu_data.x86_vendor != X86_VENDOR_INTEL) 405 return 0; 406 407 uci.mc = get_microcode_blob(&uci, true); 408 if (uci.mc) 409 save_microcode_patch(uci.mc); 410 return 0; 411 } 412 early_initcall(save_builtin_microcode); 413 414 /* Load microcode on BSP from initrd or builtin blobs */ 415 void __init load_ucode_intel_bsp(void) 416 { 417 struct ucode_cpu_info uci; 418 419 uci.mc = get_microcode_blob(&uci, false); 420 if (uci.mc && apply_microcode_early(&uci) == UCODE_UPDATED) 421 ucode_patch_va = UCODE_BSP_LOADED; 422 } 423 424 void load_ucode_intel_ap(void) 425 { 426 struct ucode_cpu_info uci; 427 428 uci.mc = ucode_patch_va; 429 if (uci.mc) 430 apply_microcode_early(&uci); 431 } 432 433 /* Reload microcode on resume */ 434 void reload_ucode_intel(void) 435 { 436 struct ucode_cpu_info uci = { .mc = ucode_patch_va, }; 437 438 if (uci.mc) 439 apply_microcode_early(&uci); 440 } 441 442 static int collect_cpu_info(int cpu_num, struct cpu_signature *csig) 443 { 444 struct cpuinfo_x86 *c = &cpu_data(cpu_num); 445 unsigned int val[2]; 446 447 memset(csig, 0, sizeof(*csig)); 448 449 csig->sig = cpuid_eax(0x00000001); 450 451 if ((c->x86_model >= 5) || (c->x86 > 6)) { 452 /* get processor flags from MSR 0x17 */ 453 rdmsr(MSR_IA32_PLATFORM_ID, val[0], val[1]); 454 csig->pf = 1 << ((val[1] >> 18) & 7); 455 } 456 457 csig->rev = c->microcode; 458 459 return 0; 460 } 461 462 static enum ucode_state apply_microcode_intel(int cpu) 463 { 464 struct ucode_cpu_info *uci = ucode_cpu_info + cpu; 465 struct cpuinfo_x86 *c = &cpu_data(cpu); 466 bool bsp = c->cpu_index == boot_cpu_data.cpu_index; 467 struct microcode_intel *mc; 468 enum ucode_state ret; 469 static int prev_rev; 470 u32 rev; 471 472 /* We should bind the task to the CPU */ 473 if (WARN_ON(raw_smp_processor_id() != cpu)) 474 return UCODE_ERROR; 475 476 mc = ucode_patch_late; 477 if (!mc) 478 return UCODE_NFOUND; 479 480 /* 481 * Save us the MSR write below - which is a particular expensive 482 * operation - when the other hyperthread has updated the microcode 483 * already. 484 */ 485 rev = intel_get_microcode_revision(); 486 if (rev >= mc->hdr.rev) { 487 ret = UCODE_OK; 488 goto out; 489 } 490 491 /* 492 * Writeback and invalidate caches before updating microcode to avoid 493 * internal issues depending on what the microcode is updating. 494 */ 495 native_wbinvd(); 496 497 /* write microcode via MSR 0x79 */ 498 wrmsrl(MSR_IA32_UCODE_WRITE, (unsigned long)mc->bits); 499 500 rev = intel_get_microcode_revision(); 501 502 if (rev != mc->hdr.rev) { 503 pr_err("CPU%d update to revision 0x%x failed\n", 504 cpu, mc->hdr.rev); 505 return UCODE_ERROR; 506 } 507 508 if (bsp && rev != prev_rev) { 509 pr_info("updated to revision 0x%x, date = %04x-%02x-%02x\n", 510 rev, 511 mc->hdr.date & 0xffff, 512 mc->hdr.date >> 24, 513 (mc->hdr.date >> 16) & 0xff); 514 prev_rev = rev; 515 } 516 517 ret = UCODE_UPDATED; 518 519 out: 520 uci->cpu_sig.rev = rev; 521 c->microcode = rev; 522 523 /* Update boot_cpu_data's revision too, if we're on the BSP: */ 524 if (bsp) 525 boot_cpu_data.microcode = rev; 526 527 return ret; 528 } 529 530 static enum ucode_state parse_microcode_blobs(int cpu, struct iov_iter *iter) 531 { 532 struct ucode_cpu_info *uci = ucode_cpu_info + cpu; 533 int cur_rev = uci->cpu_sig.rev; 534 unsigned int curr_mc_size = 0; 535 u8 *new_mc = NULL, *mc = NULL; 536 537 while (iov_iter_count(iter)) { 538 struct microcode_header_intel mc_header; 539 unsigned int mc_size, data_size; 540 u8 *data; 541 542 if (!copy_from_iter_full(&mc_header, sizeof(mc_header), iter)) { 543 pr_err("error! Truncated or inaccessible header in microcode data file\n"); 544 goto fail; 545 } 546 547 mc_size = get_totalsize(&mc_header); 548 if (mc_size < sizeof(mc_header)) { 549 pr_err("error! Bad data in microcode data file (totalsize too small)\n"); 550 goto fail; 551 } 552 data_size = mc_size - sizeof(mc_header); 553 if (data_size > iov_iter_count(iter)) { 554 pr_err("error! Bad data in microcode data file (truncated file?)\n"); 555 goto fail; 556 } 557 558 /* For performance reasons, reuse mc area when possible */ 559 if (!mc || mc_size > curr_mc_size) { 560 kvfree(mc); 561 mc = kvmalloc(mc_size, GFP_KERNEL); 562 if (!mc) 563 goto fail; 564 curr_mc_size = mc_size; 565 } 566 567 memcpy(mc, &mc_header, sizeof(mc_header)); 568 data = mc + sizeof(mc_header); 569 if (!copy_from_iter_full(data, data_size, iter) || 570 intel_microcode_sanity_check(mc, true, MC_HEADER_TYPE_MICROCODE) < 0) 571 goto fail; 572 573 if (cur_rev >= mc_header.rev) 574 continue; 575 576 if (!intel_find_matching_signature(mc, uci->cpu_sig.sig, uci->cpu_sig.pf)) 577 continue; 578 579 kvfree(new_mc); 580 cur_rev = mc_header.rev; 581 new_mc = mc; 582 mc = NULL; 583 } 584 585 if (iov_iter_count(iter)) 586 goto fail; 587 588 kvfree(mc); 589 if (!new_mc) 590 return UCODE_NFOUND; 591 592 ucode_patch_late = (struct microcode_intel *)new_mc; 593 return UCODE_NEW; 594 595 fail: 596 kvfree(mc); 597 kvfree(new_mc); 598 return UCODE_ERROR; 599 } 600 601 static bool is_blacklisted(unsigned int cpu) 602 { 603 struct cpuinfo_x86 *c = &cpu_data(cpu); 604 605 /* 606 * Late loading on model 79 with microcode revision less than 0x0b000021 607 * and LLC size per core bigger than 2.5MB may result in a system hang. 608 * This behavior is documented in item BDF90, #334165 (Intel Xeon 609 * Processor E7-8800/4800 v4 Product Family). 610 */ 611 if (c->x86 == 6 && 612 c->x86_model == INTEL_FAM6_BROADWELL_X && 613 c->x86_stepping == 0x01 && 614 llc_size_per_core > 2621440 && 615 c->microcode < 0x0b000021) { 616 pr_err_once("Erratum BDF90: late loading with revision < 0x0b000021 (0x%x) disabled.\n", c->microcode); 617 pr_err_once("Please consider either early loading through initrd/built-in or a potential BIOS update.\n"); 618 return true; 619 } 620 621 return false; 622 } 623 624 static enum ucode_state request_microcode_fw(int cpu, struct device *device) 625 { 626 struct cpuinfo_x86 *c = &cpu_data(cpu); 627 const struct firmware *firmware; 628 struct iov_iter iter; 629 enum ucode_state ret; 630 struct kvec kvec; 631 char name[30]; 632 633 if (is_blacklisted(cpu)) 634 return UCODE_NFOUND; 635 636 sprintf(name, "intel-ucode/%02x-%02x-%02x", 637 c->x86, c->x86_model, c->x86_stepping); 638 639 if (request_firmware_direct(&firmware, name, device)) { 640 pr_debug("data file %s load failed\n", name); 641 return UCODE_NFOUND; 642 } 643 644 kvec.iov_base = (void *)firmware->data; 645 kvec.iov_len = firmware->size; 646 iov_iter_kvec(&iter, ITER_SOURCE, &kvec, 1, firmware->size); 647 ret = parse_microcode_blobs(cpu, &iter); 648 649 release_firmware(firmware); 650 651 return ret; 652 } 653 654 static void finalize_late_load(int result) 655 { 656 if (!result) 657 update_ucode_pointer(ucode_patch_late); 658 else 659 kvfree(ucode_patch_late); 660 ucode_patch_late = NULL; 661 } 662 663 static struct microcode_ops microcode_intel_ops = { 664 .request_microcode_fw = request_microcode_fw, 665 .collect_cpu_info = collect_cpu_info, 666 .apply_microcode = apply_microcode_intel, 667 .finalize_late_load = finalize_late_load, 668 }; 669 670 static __init void calc_llc_size_per_core(struct cpuinfo_x86 *c) 671 { 672 u64 llc_size = c->x86_cache_size * 1024ULL; 673 674 do_div(llc_size, c->x86_max_cores); 675 llc_size_per_core = (unsigned int)llc_size; 676 } 677 678 struct microcode_ops * __init init_intel_microcode(void) 679 { 680 struct cpuinfo_x86 *c = &boot_cpu_data; 681 682 if (c->x86_vendor != X86_VENDOR_INTEL || c->x86 < 6 || 683 cpu_has(c, X86_FEATURE_IA64)) { 684 pr_err("Intel CPU family 0x%x not supported\n", c->x86); 685 return NULL; 686 } 687 688 calc_llc_size_per_core(c); 689 690 return µcode_intel_ops; 691 } 692