xref: /linux/arch/x86/kernel/cpu/microcode/intel.c (revision cd4cdc53cc5e7009ea6ef305336682d7800becf7)
1 // SPDX-License-Identifier: GPL-2.0-or-later
2 /*
3  * Intel CPU Microcode Update Driver for Linux
4  *
5  * Copyright (C) 2000-2006 Tigran Aivazian <aivazian.tigran@gmail.com>
6  *		 2006 Shaohua Li <shaohua.li@intel.com>
7  *
8  * Intel CPU microcode early update for Linux
9  *
10  * Copyright (C) 2012 Fenghua Yu <fenghua.yu@intel.com>
11  *		      H Peter Anvin" <hpa@zytor.com>
12  */
13 #define pr_fmt(fmt) "microcode: " fmt
14 #include <linux/earlycpio.h>
15 #include <linux/firmware.h>
16 #include <linux/pci_ids.h>
17 #include <linux/uaccess.h>
18 #include <linux/initrd.h>
19 #include <linux/kernel.h>
20 #include <linux/delay.h>
21 #include <linux/slab.h>
22 #include <linux/cpu.h>
23 #include <linux/uio.h>
24 #include <linux/io.h>
25 #include <linux/mm.h>
26 
27 #include <asm/cpu_device_id.h>
28 #include <asm/processor.h>
29 #include <asm/tlbflush.h>
30 #include <asm/setup.h>
31 #include <asm/msr.h>
32 
33 #include "internal.h"
34 
35 static const char ucode_path[] = "kernel/x86/microcode/GenuineIntel.bin";
36 
37 #define UCODE_BSP_LOADED	((struct microcode_intel *)0x1UL)
38 
39 /* Defines for the microcode staging mailbox interface */
40 #define MBOX_REG_NUM		4
41 #define MBOX_REG_SIZE		sizeof(u32)
42 
43 #define MBOX_CONTROL_OFFSET	0x0
44 #define MBOX_STATUS_OFFSET	0x4
45 #define MBOX_WRDATA_OFFSET	0x8
46 #define MBOX_RDDATA_OFFSET	0xc
47 
48 #define MASK_MBOX_CTRL_ABORT	BIT(0)
49 #define MASK_MBOX_CTRL_GO	BIT(31)
50 
51 #define MASK_MBOX_STATUS_ERROR	BIT(2)
52 #define MASK_MBOX_STATUS_READY	BIT(31)
53 
54 #define MASK_MBOX_RESP_SUCCESS	BIT(0)
55 #define MASK_MBOX_RESP_PROGRESS	BIT(1)
56 #define MASK_MBOX_RESP_ERROR	BIT(2)
57 
58 #define MBOX_CMD_LOAD		0x3
59 #define MBOX_OBJ_STAGING	0xb
60 #define MBOX_HEADER(size)	((PCI_VENDOR_ID_INTEL)    | \
61 				 (MBOX_OBJ_STAGING << 16) | \
62 				 ((u64)((size) / sizeof(u32)) << 32))
63 
64 /* The size of each mailbox header */
65 #define MBOX_HEADER_SIZE	sizeof(u64)
66 /* The size of staging hardware response */
67 #define MBOX_RESPONSE_SIZE	sizeof(u64)
68 
69 #define MBOX_XACTION_TIMEOUT_MS	(10 * MSEC_PER_SEC)
70 
71 /* Current microcode patch used in early patching on the APs. */
72 static struct microcode_intel *ucode_patch_va __read_mostly;
73 static struct microcode_intel *ucode_patch_late __read_mostly;
74 
75 /* last level cache size per core */
76 static unsigned int llc_size_per_core __ro_after_init;
77 
78 /* microcode format is extended from prescott processors */
79 struct extended_signature {
80 	unsigned int	sig;
81 	unsigned int	pf;
82 	unsigned int	cksum;
83 };
84 
85 struct extended_sigtable {
86 	unsigned int			count;
87 	unsigned int			cksum;
88 	unsigned int			reserved[3];
89 	struct extended_signature	sigs[];
90 };
91 
92 /**
93  * struct staging_state - Track the current staging process state
94  *
95  * @mmio_base:		MMIO base address for staging
96  * @ucode_len:		Total size of the microcode image
97  * @chunk_size:		Size of each data piece
98  * @bytes_sent:		Total bytes transmitted so far
99  * @offset:		Current offset in the microcode image
100  */
101 struct staging_state {
102 	void __iomem		*mmio_base;
103 	unsigned int		ucode_len;
104 	unsigned int		chunk_size;
105 	unsigned int		bytes_sent;
106 	unsigned int		offset;
107 };
108 
109 #define DEFAULT_UCODE_TOTALSIZE (DEFAULT_UCODE_DATASIZE + MC_HEADER_SIZE)
110 #define EXT_HEADER_SIZE		(sizeof(struct extended_sigtable))
111 #define EXT_SIGNATURE_SIZE	(sizeof(struct extended_signature))
112 
get_totalsize(struct microcode_header_intel * hdr)113 static inline unsigned int get_totalsize(struct microcode_header_intel *hdr)
114 {
115 	return hdr->datasize ? hdr->totalsize : DEFAULT_UCODE_TOTALSIZE;
116 }
117 
exttable_size(struct extended_sigtable * et)118 static inline unsigned int exttable_size(struct extended_sigtable *et)
119 {
120 	return et->count * EXT_SIGNATURE_SIZE + EXT_HEADER_SIZE;
121 }
122 
123 
124 /*
125  * Use CPUID to generate a "vfm" value. Useful before cpuinfo_x86
126  * structures are populated.
127  */
intel_cpuid_vfm(void)128 static u32 intel_cpuid_vfm(void)
129 {
130 	u32 eax   = cpuid_eax(1);
131 	u32 fam   = x86_family(eax);
132 	u32 model = x86_model(eax);
133 
134 	return IFM(fam, model);
135 }
136 
intel_get_platform_id(void)137 u32 intel_get_platform_id(void)
138 {
139 	unsigned int val[2];
140 
141 	/*
142 	 * This can be called early. Use CPUID directly instead of
143 	 * relying on cpuinfo_x86 which may not be fully initialized.
144 	 * The PII does not have MSR_IA32_PLATFORM_ID. Everything
145 	 * before _it_ has no microcode (for Linux at least).
146 	 */
147 	if (intel_cpuid_vfm() <= INTEL_PENTIUM_II_KLAMATH)
148 		return 0;
149 
150 	/* get processor flags from MSR 0x17 */
151 	native_rdmsr(MSR_IA32_PLATFORM_ID, val[0], val[1]);
152 
153 	return (val[1] >> 18) & 7;
154 }
155 
intel_collect_cpu_info(struct cpu_signature * sig)156 void intel_collect_cpu_info(struct cpu_signature *sig)
157 {
158 	sig->sig = cpuid_eax(1);
159 	sig->rev = intel_get_microcode_revision();
160 	sig->pf  = 1 << intel_get_platform_id();
161 }
162 EXPORT_SYMBOL_GPL(intel_collect_cpu_info);
163 
cpu_signatures_match(struct cpu_signature * s1,unsigned int sig2,unsigned int pf2)164 static inline bool cpu_signatures_match(struct cpu_signature *s1, unsigned int sig2,
165 					unsigned int pf2)
166 {
167 	if (s1->sig != sig2)
168 		return false;
169 
170 	/*
171 	 * Consider an empty mask to match everything. This
172 	 * should only occur for one CPU model, the PII.
173 	 */
174 	if (!pf2)
175 		return true;
176 
177 	/* Is the CPU's platform ID in the signature mask? */
178 	return s1->pf & pf2;
179 }
180 
intel_find_matching_signature(void * mc,struct cpu_signature * sig)181 bool intel_find_matching_signature(void *mc, struct cpu_signature *sig)
182 {
183 	struct microcode_header_intel *mc_hdr = mc;
184 	struct extended_signature *ext_sig;
185 	struct extended_sigtable *ext_hdr;
186 	int i;
187 
188 	if (cpu_signatures_match(sig, mc_hdr->sig, mc_hdr->pf))
189 		return true;
190 
191 	/* Look for ext. headers: */
192 	if (get_totalsize(mc_hdr) <= intel_microcode_get_datasize(mc_hdr) + MC_HEADER_SIZE)
193 		return false;
194 
195 	ext_hdr = mc + intel_microcode_get_datasize(mc_hdr) + MC_HEADER_SIZE;
196 	ext_sig = (void *)ext_hdr + EXT_HEADER_SIZE;
197 
198 	for (i = 0; i < ext_hdr->count; i++) {
199 		if (cpu_signatures_match(sig, ext_sig->sig, ext_sig->pf))
200 			return true;
201 		ext_sig++;
202 	}
203 	return 0;
204 }
205 EXPORT_SYMBOL_GPL(intel_find_matching_signature);
206 
207 /**
208  * intel_microcode_sanity_check() - Sanity check microcode file.
209  * @mc: Pointer to the microcode file contents.
210  * @print_err: Display failure reason if true, silent if false.
211  * @hdr_type: Type of file, i.e. normal microcode file or In Field Scan file.
212  *            Validate if the microcode header type matches with the type
213  *            specified here.
214  *
215  * Validate certain header fields and verify if computed checksum matches
216  * with the one specified in the header.
217  *
218  * Return: 0 if the file passes all the checks, -EINVAL if any of the checks
219  * fail.
220  */
intel_microcode_sanity_check(void * mc,bool print_err,int hdr_type)221 int intel_microcode_sanity_check(void *mc, bool print_err, int hdr_type)
222 {
223 	unsigned long total_size, data_size, ext_table_size;
224 	struct microcode_header_intel *mc_header = mc;
225 	struct extended_sigtable *ext_header = NULL;
226 	u32 sum, orig_sum, ext_sigcount = 0, i;
227 	struct extended_signature *ext_sig;
228 
229 	total_size = get_totalsize(mc_header);
230 	data_size = intel_microcode_get_datasize(mc_header);
231 
232 	if (data_size + MC_HEADER_SIZE > total_size) {
233 		if (print_err)
234 			pr_err("Error: bad microcode data file size.\n");
235 		return -EINVAL;
236 	}
237 
238 	if (mc_header->ldrver != 1 || mc_header->hdrver != hdr_type) {
239 		if (print_err)
240 			pr_err("Error: invalid/unknown microcode update format. Header type %d\n",
241 			       mc_header->hdrver);
242 		return -EINVAL;
243 	}
244 
245 	ext_table_size = total_size - (MC_HEADER_SIZE + data_size);
246 	if (ext_table_size) {
247 		u32 ext_table_sum = 0;
248 		u32 *ext_tablep;
249 
250 		if (ext_table_size < EXT_HEADER_SIZE ||
251 		    ((ext_table_size - EXT_HEADER_SIZE) % EXT_SIGNATURE_SIZE)) {
252 			if (print_err)
253 				pr_err("Error: truncated extended signature table.\n");
254 			return -EINVAL;
255 		}
256 
257 		ext_header = mc + MC_HEADER_SIZE + data_size;
258 		if (ext_table_size != exttable_size(ext_header)) {
259 			if (print_err)
260 				pr_err("Error: extended signature table size mismatch.\n");
261 			return -EFAULT;
262 		}
263 
264 		ext_sigcount = ext_header->count;
265 
266 		/*
267 		 * Check extended table checksum: the sum of all dwords that
268 		 * comprise a valid table must be 0.
269 		 */
270 		ext_tablep = (u32 *)ext_header;
271 
272 		i = ext_table_size / sizeof(u32);
273 		while (i--)
274 			ext_table_sum += ext_tablep[i];
275 
276 		if (ext_table_sum) {
277 			if (print_err)
278 				pr_warn("Bad extended signature table checksum, aborting.\n");
279 			return -EINVAL;
280 		}
281 	}
282 
283 	/*
284 	 * Calculate the checksum of update data and header. The checksum of
285 	 * valid update data and header including the extended signature table
286 	 * must be 0.
287 	 */
288 	orig_sum = 0;
289 	i = (MC_HEADER_SIZE + data_size) / sizeof(u32);
290 	while (i--)
291 		orig_sum += ((u32 *)mc)[i];
292 
293 	if (orig_sum) {
294 		if (print_err)
295 			pr_err("Bad microcode data checksum, aborting.\n");
296 		return -EINVAL;
297 	}
298 
299 	if (!ext_table_size)
300 		return 0;
301 
302 	/*
303 	 * Check extended signature checksum: 0 => valid.
304 	 */
305 	for (i = 0; i < ext_sigcount; i++) {
306 		ext_sig = (void *)ext_header + EXT_HEADER_SIZE +
307 			  EXT_SIGNATURE_SIZE * i;
308 
309 		sum = (mc_header->sig + mc_header->pf + mc_header->cksum) -
310 		      (ext_sig->sig + ext_sig->pf + ext_sig->cksum);
311 		if (sum) {
312 			if (print_err)
313 				pr_err("Bad extended signature checksum, aborting.\n");
314 			return -EINVAL;
315 		}
316 	}
317 	return 0;
318 }
319 EXPORT_SYMBOL_GPL(intel_microcode_sanity_check);
320 
update_ucode_pointer(struct microcode_intel * mc)321 static void update_ucode_pointer(struct microcode_intel *mc)
322 {
323 	kvfree(ucode_patch_va);
324 
325 	/*
326 	 * Save the virtual address for early loading and for eventual free
327 	 * on late loading.
328 	 */
329 	ucode_patch_va = mc;
330 }
331 
save_microcode_patch(struct microcode_intel * patch)332 static void save_microcode_patch(struct microcode_intel *patch)
333 {
334 	unsigned int size = get_totalsize(&patch->hdr);
335 	struct microcode_intel *mc;
336 
337 	mc = kvmemdup(patch, size, GFP_KERNEL);
338 	if (mc)
339 		update_ucode_pointer(mc);
340 	else
341 		pr_err("Unable to allocate microcode memory size: %u\n", size);
342 }
343 
344 /* Scan blob for microcode matching the boot CPUs family, model, stepping */
scan_microcode(void * data,size_t size,struct ucode_cpu_info * uci,bool save)345 static __init struct microcode_intel *scan_microcode(void *data, size_t size,
346 						     struct ucode_cpu_info *uci,
347 						     bool save)
348 {
349 	struct microcode_header_intel *mc_header;
350 	struct microcode_intel *patch = NULL;
351 	u32 cur_rev = uci->cpu_sig.rev;
352 	unsigned int mc_size;
353 
354 	for (; size >= sizeof(struct microcode_header_intel); size -= mc_size, data += mc_size) {
355 		mc_header = (struct microcode_header_intel *)data;
356 
357 		mc_size = get_totalsize(mc_header);
358 		if (!mc_size || mc_size > size ||
359 		    intel_microcode_sanity_check(data, false, MC_HEADER_TYPE_MICROCODE) < 0)
360 			break;
361 
362 		if (!intel_find_matching_signature(data, &uci->cpu_sig))
363 			continue;
364 
365 		/*
366 		 * For saving the early microcode, find the matching revision which
367 		 * was loaded on the BSP.
368 		 *
369 		 * On the BSP during early boot, find a newer revision than
370 		 * actually loaded in the CPU.
371 		 */
372 		if (save) {
373 			if (cur_rev != mc_header->rev)
374 				continue;
375 		} else if (cur_rev >= mc_header->rev) {
376 			continue;
377 		}
378 
379 		patch = data;
380 		cur_rev = mc_header->rev;
381 	}
382 
383 	return size ? NULL : patch;
384 }
385 
read_mbox_dword(void __iomem * mmio_base)386 static inline u32 read_mbox_dword(void __iomem *mmio_base)
387 {
388 	u32 dword = readl(mmio_base + MBOX_RDDATA_OFFSET);
389 
390 	/* Acknowledge read completion to the staging hardware */
391 	writel(0, mmio_base + MBOX_RDDATA_OFFSET);
392 	return dword;
393 }
394 
write_mbox_dword(void __iomem * mmio_base,u32 dword)395 static inline void write_mbox_dword(void __iomem *mmio_base, u32 dword)
396 {
397 	writel(dword, mmio_base + MBOX_WRDATA_OFFSET);
398 }
399 
read_mbox_header(void __iomem * mmio_base)400 static inline u64 read_mbox_header(void __iomem *mmio_base)
401 {
402 	u32 high, low;
403 
404 	low  = read_mbox_dword(mmio_base);
405 	high = read_mbox_dword(mmio_base);
406 
407 	return ((u64)high << 32) | low;
408 }
409 
write_mbox_header(void __iomem * mmio_base,u64 value)410 static inline void write_mbox_header(void __iomem *mmio_base, u64 value)
411 {
412 	write_mbox_dword(mmio_base, value);
413 	write_mbox_dword(mmio_base, value >> 32);
414 }
415 
write_mbox_data(void __iomem * mmio_base,u32 * chunk,unsigned int chunk_bytes)416 static void write_mbox_data(void __iomem *mmio_base, u32 *chunk, unsigned int chunk_bytes)
417 {
418 	int i;
419 
420 	/*
421 	 * The MMIO space is mapped as Uncached (UC). Each write arrives
422 	 * at the device as an individual transaction in program order.
423 	 * The device can then reassemble the sequence accordingly.
424 	 */
425 	for (i = 0; i < chunk_bytes / sizeof(u32); i++)
426 		write_mbox_dword(mmio_base, chunk[i]);
427 }
428 
429 /*
430  * Prepare for a new microcode transfer: reset hardware and record the
431  * image size.
432  */
init_stage(struct staging_state * ss)433 static void init_stage(struct staging_state *ss)
434 {
435 	ss->ucode_len = get_totalsize(&ucode_patch_late->hdr);
436 
437 	/*
438 	 * Abort any ongoing process, effectively resetting the device.
439 	 * Unlike regular mailbox data processing requests, this
440 	 * operation does not require a status check.
441 	 */
442 	writel(MASK_MBOX_CTRL_ABORT, ss->mmio_base + MBOX_CONTROL_OFFSET);
443 }
444 
445 /*
446  * Update the chunk size and decide whether another chunk can be sent.
447  * This accounts for remaining data and retry limits.
448  */
can_send_next_chunk(struct staging_state * ss,int * err)449 static bool can_send_next_chunk(struct staging_state *ss, int *err)
450 {
451 	/* A page size or remaining bytes if this is the final chunk */
452 	ss->chunk_size = min(PAGE_SIZE, ss->ucode_len - ss->offset);
453 
454 	/*
455 	 * Each microcode image is divided into chunks, each at most
456 	 * one page size. A 10-chunk image would typically require 10
457 	 * transactions.
458 	 *
459 	 * However, the hardware managing the mailbox has limited
460 	 * resources and may not cache the entire image, potentially
461 	 * requesting the same chunk multiple times.
462 	 *
463 	 * To tolerate this behavior, allow up to twice the expected
464 	 * number of transactions (i.e., a 10-chunk image can take up to
465 	 * 20 attempts).
466 	 *
467 	 * If the number of attempts exceeds this limit, treat it as
468 	 * exceeding the maximum allowed transfer size.
469 	 */
470 	if (ss->bytes_sent + ss->chunk_size > ss->ucode_len * 2) {
471 		*err = -EMSGSIZE;
472 		return false;
473 	}
474 
475 	*err = 0;
476 	return true;
477 }
478 
479 /*
480  * The hardware indicates completion by returning a sentinel end offset.
481  */
is_end_offset(u32 offset)482 static inline bool is_end_offset(u32 offset)
483 {
484 	return offset == UINT_MAX;
485 }
486 
487 /*
488  * Determine whether staging is complete: either the hardware signaled
489  * the end offset, or no more transactions are permitted (retry limit
490  * reached).
491  */
staging_is_complete(struct staging_state * ss,int * err)492 static inline bool staging_is_complete(struct staging_state *ss, int *err)
493 {
494 	return is_end_offset(ss->offset) || !can_send_next_chunk(ss, err);
495 }
496 
497 /*
498  * Wait for the hardware to complete a transaction.
499  * Return 0 on success, or an error code on failure.
500  */
wait_for_transaction(struct staging_state * ss)501 static int wait_for_transaction(struct staging_state *ss)
502 {
503 	u32 timeout, status;
504 
505 	/* Allow time for hardware to complete the operation: */
506 	for (timeout = 0; timeout < MBOX_XACTION_TIMEOUT_MS; timeout++) {
507 		msleep(1);
508 
509 		status = readl(ss->mmio_base + MBOX_STATUS_OFFSET);
510 		/* Break out early if the hardware is ready: */
511 		if (status & MASK_MBOX_STATUS_READY)
512 			break;
513 	}
514 
515 	/* Check for explicit error response */
516 	if (status & MASK_MBOX_STATUS_ERROR)
517 		return -EIO;
518 
519 	/*
520 	 * Hardware has neither responded to the action nor signaled any
521 	 * error. Treat this as a timeout.
522 	 */
523 	if (!(status & MASK_MBOX_STATUS_READY))
524 		return -ETIMEDOUT;
525 
526 	return 0;
527 }
528 
529 /*
530  * Transmit a chunk of the microcode image to the hardware.
531  * Return 0 on success, or an error code on failure.
532  */
send_data_chunk(struct staging_state * ss,void * ucode_ptr)533 static int send_data_chunk(struct staging_state *ss, void *ucode_ptr)
534 {
535 	u32 *src_chunk = ucode_ptr + ss->offset;
536 	u16 mbox_size;
537 
538 	/*
539 	 * Write a 'request' mailbox object in this order:
540 	 *  1. Mailbox header includes total size
541 	 *  2. Command header specifies the load operation
542 	 *  3. Data section contains a microcode chunk
543 	 *
544 	 * Thus, the mailbox size is two headers plus the chunk size.
545 	 */
546 	mbox_size = MBOX_HEADER_SIZE * 2 + ss->chunk_size;
547 	write_mbox_header(ss->mmio_base, MBOX_HEADER(mbox_size));
548 	write_mbox_header(ss->mmio_base, MBOX_CMD_LOAD);
549 	write_mbox_data(ss->mmio_base, src_chunk, ss->chunk_size);
550 	ss->bytes_sent += ss->chunk_size;
551 
552 	/* Notify the hardware that the mailbox is ready for processing. */
553 	writel(MASK_MBOX_CTRL_GO, ss->mmio_base + MBOX_CONTROL_OFFSET);
554 
555 	return wait_for_transaction(ss);
556 }
557 
558 /*
559  * Retrieve the next offset from the hardware response.
560  * Return 0 on success, or an error code on failure.
561  */
fetch_next_offset(struct staging_state * ss)562 static int fetch_next_offset(struct staging_state *ss)
563 {
564 	const u64 expected_header = MBOX_HEADER(MBOX_HEADER_SIZE + MBOX_RESPONSE_SIZE);
565 	u32 offset, status;
566 	u64 header;
567 
568 	/*
569 	 * The 'response' mailbox returns three fields, in order:
570 	 *  1. Header
571 	 *  2. Next offset in the microcode image
572 	 *  3. Status flags
573 	 */
574 	header = read_mbox_header(ss->mmio_base);
575 	offset = read_mbox_dword(ss->mmio_base);
576 	status = read_mbox_dword(ss->mmio_base);
577 
578 	/* All valid responses must start with the expected header. */
579 	if (header != expected_header) {
580 		pr_err_once("staging: invalid response header (0x%llx)\n", header);
581 		return -EBADR;
582 	}
583 
584 	/*
585 	 * Verify the offset: If not at the end marker, it must not
586 	 * exceed the microcode image length.
587 	 */
588 	if (!is_end_offset(offset) && offset > ss->ucode_len) {
589 		pr_err_once("staging: invalid offset (%u) past the image end (%u)\n",
590 			    offset, ss->ucode_len);
591 		return -EINVAL;
592 	}
593 
594 	/* Hardware may report errors explicitly in the status field */
595 	if (status & MASK_MBOX_RESP_ERROR)
596 		return -EPROTO;
597 
598 	ss->offset = offset;
599 	return 0;
600 }
601 
602 /*
603  * Handle the staging process using the mailbox MMIO interface. The
604  * microcode image is transferred in chunks until completion.
605  * Return 0 on success or an error code on failure.
606  */
do_stage(u64 mmio_pa)607 static int do_stage(u64 mmio_pa)
608 {
609 	struct staging_state ss = {};
610 	int err;
611 
612 	ss.mmio_base = ioremap(mmio_pa, MBOX_REG_NUM * MBOX_REG_SIZE);
613 	if (WARN_ON_ONCE(!ss.mmio_base))
614 		return -EADDRNOTAVAIL;
615 
616 	init_stage(&ss);
617 
618 	/* Perform the staging process while within the retry limit */
619 	while (!staging_is_complete(&ss, &err)) {
620 		/* Send a chunk of microcode each time: */
621 		err = send_data_chunk(&ss, ucode_patch_late);
622 		if (err)
623 			break;
624 		/*
625 		 * Then, ask the hardware which piece of the image it
626 		 * needs next. The same piece may be sent more than once.
627 		 */
628 		err = fetch_next_offset(&ss);
629 		if (err)
630 			break;
631 	}
632 
633 	iounmap(ss.mmio_base);
634 
635 	return err;
636 }
637 
stage_microcode(void)638 static void stage_microcode(void)
639 {
640 	unsigned int pkg_id = UINT_MAX;
641 	int cpu, err;
642 	u64 mmio_pa;
643 
644 	if (!IS_ALIGNED(get_totalsize(&ucode_patch_late->hdr), sizeof(u32))) {
645 		pr_err("Microcode image 32-bit misaligned (0x%x), staging failed.\n",
646 			get_totalsize(&ucode_patch_late->hdr));
647 		return;
648 	}
649 
650 	lockdep_assert_cpus_held();
651 
652 	/*
653 	 * The MMIO address is unique per package, and all the SMT
654 	 * primary threads are online here. Find each MMIO space by
655 	 * their package IDs to avoid duplicate staging.
656 	 */
657 	for_each_cpu(cpu, cpu_primary_thread_mask) {
658 		if (topology_logical_package_id(cpu) == pkg_id)
659 			continue;
660 
661 		pkg_id = topology_logical_package_id(cpu);
662 
663 		err = rdmsrq_on_cpu(cpu, MSR_IA32_MCU_STAGING_MBOX_ADDR, &mmio_pa);
664 		if (WARN_ON_ONCE(err))
665 			return;
666 
667 		err = do_stage(mmio_pa);
668 		if (err) {
669 			pr_err("Error: staging failed (%d) for CPU%d at package %u.\n",
670 			       err, cpu, pkg_id);
671 			return;
672 		}
673 	}
674 
675 	pr_info("Staging of patch revision 0x%x succeeded.\n", ucode_patch_late->hdr.rev);
676 }
677 
__apply_microcode(struct ucode_cpu_info * uci,struct microcode_intel * mc,u32 * cur_rev)678 static enum ucode_state __apply_microcode(struct ucode_cpu_info *uci,
679 					  struct microcode_intel *mc,
680 					  u32 *cur_rev)
681 {
682 	u32 rev;
683 
684 	if (!mc)
685 		return UCODE_NFOUND;
686 
687 	/*
688 	 * Save us the MSR write below - which is a particular expensive
689 	 * operation - when the other hyperthread has updated the microcode
690 	 * already.
691 	 */
692 	*cur_rev = intel_get_microcode_revision();
693 	if (*cur_rev >= mc->hdr.rev) {
694 		uci->cpu_sig.rev = *cur_rev;
695 		return UCODE_OK;
696 	}
697 
698 	/* write microcode via MSR 0x79 */
699 	native_wrmsrq(MSR_IA32_UCODE_WRITE, (unsigned long)mc->bits);
700 
701 	rev = intel_get_microcode_revision();
702 	if (rev != mc->hdr.rev)
703 		return UCODE_ERROR;
704 
705 	uci->cpu_sig.rev = rev;
706 	return UCODE_UPDATED;
707 }
708 
apply_microcode_early(struct ucode_cpu_info * uci)709 static enum ucode_state apply_microcode_early(struct ucode_cpu_info *uci)
710 {
711 	struct microcode_intel *mc = uci->mc;
712 	u32 cur_rev;
713 
714 	return __apply_microcode(uci, mc, &cur_rev);
715 }
716 
load_builtin_intel_microcode(struct cpio_data * cp)717 static __init bool load_builtin_intel_microcode(struct cpio_data *cp)
718 {
719 	unsigned int eax = 1, ebx, ecx = 0, edx;
720 	struct firmware fw;
721 	char name[30];
722 
723 	if (IS_ENABLED(CONFIG_X86_32))
724 		return false;
725 
726 	native_cpuid(&eax, &ebx, &ecx, &edx);
727 
728 	sprintf(name, "intel-ucode/%02x-%02x-%02x",
729 		x86_family(eax), x86_model(eax), x86_stepping(eax));
730 
731 	if (firmware_request_builtin(&fw, name)) {
732 		cp->size = fw.size;
733 		cp->data = (void *)fw.data;
734 		return true;
735 	}
736 	return false;
737 }
738 
get_microcode_blob(struct ucode_cpu_info * uci,bool save)739 static __init struct microcode_intel *get_microcode_blob(struct ucode_cpu_info *uci, bool save)
740 {
741 	struct cpio_data cp;
742 
743 	intel_collect_cpu_info(&uci->cpu_sig);
744 
745 	if (!load_builtin_intel_microcode(&cp))
746 		cp = find_microcode_in_initrd(ucode_path);
747 
748 	if (!(cp.data && cp.size))
749 		return NULL;
750 
751 	return scan_microcode(cp.data, cp.size, uci, save);
752 }
753 
754 /*
755  * Invoked from an early init call to save the microcode blob which was
756  * selected during early boot when mm was not usable. The microcode must be
757  * saved because initrd is going away. It's an early init call so the APs
758  * just can use the pointer and do not have to scan initrd/builtin firmware
759  * again.
760  */
save_builtin_microcode(void)761 static int __init save_builtin_microcode(void)
762 {
763 	struct ucode_cpu_info uci;
764 
765 	if (xchg(&ucode_patch_va, NULL) != UCODE_BSP_LOADED)
766 		return 0;
767 
768 	if (microcode_loader_disabled() || boot_cpu_data.x86_vendor != X86_VENDOR_INTEL)
769 		return 0;
770 
771 	uci.mc = get_microcode_blob(&uci, true);
772 	if (uci.mc)
773 		save_microcode_patch(uci.mc);
774 	return 0;
775 }
776 early_initcall(save_builtin_microcode);
777 
778 /* Load microcode on BSP from initrd or builtin blobs */
load_ucode_intel_bsp(struct early_load_data * ed)779 void __init load_ucode_intel_bsp(struct early_load_data *ed)
780 {
781 	struct ucode_cpu_info uci;
782 
783 	uci.mc = get_microcode_blob(&uci, false);
784 	ed->old_rev = uci.cpu_sig.rev;
785 
786 	if (uci.mc && apply_microcode_early(&uci) == UCODE_UPDATED) {
787 		ucode_patch_va = UCODE_BSP_LOADED;
788 		ed->new_rev = uci.cpu_sig.rev;
789 	}
790 }
791 
load_ucode_intel_ap(void)792 void load_ucode_intel_ap(void)
793 {
794 	struct ucode_cpu_info uci;
795 
796 	uci.mc = ucode_patch_va;
797 	if (uci.mc)
798 		apply_microcode_early(&uci);
799 }
800 
801 /* Reload microcode on resume */
reload_ucode_intel(void)802 void reload_ucode_intel(void)
803 {
804 	struct ucode_cpu_info uci = { .mc = ucode_patch_va, };
805 
806 	if (uci.mc)
807 		apply_microcode_early(&uci);
808 }
809 
collect_cpu_info(int cpu_num,struct cpu_signature * csig)810 static int collect_cpu_info(int cpu_num, struct cpu_signature *csig)
811 {
812 	intel_collect_cpu_info(csig);
813 	return 0;
814 }
815 
apply_microcode_late(int cpu)816 static enum ucode_state apply_microcode_late(int cpu)
817 {
818 	struct ucode_cpu_info *uci = ucode_cpu_info + cpu;
819 	struct microcode_intel *mc = ucode_patch_late;
820 	enum ucode_state ret;
821 	u32 cur_rev;
822 
823 	if (WARN_ON_ONCE(smp_processor_id() != cpu))
824 		return UCODE_ERROR;
825 
826 	ret = __apply_microcode(uci, mc, &cur_rev);
827 	if (ret != UCODE_UPDATED && ret != UCODE_OK)
828 		return ret;
829 
830 	cpu_data(cpu).microcode	 = uci->cpu_sig.rev;
831 	if (!cpu)
832 		boot_cpu_data.microcode = uci->cpu_sig.rev;
833 
834 	return ret;
835 }
836 
ucode_validate_minrev(struct microcode_header_intel * mc_header)837 static bool ucode_validate_minrev(struct microcode_header_intel *mc_header)
838 {
839 	int cur_rev = boot_cpu_data.microcode;
840 
841 	/*
842 	 * When late-loading, ensure the header declares a minimum revision
843 	 * required to perform a late-load. The previously reserved field
844 	 * is 0 in older microcode blobs.
845 	 */
846 	if (!mc_header->min_req_ver) {
847 		pr_info("Unsafe microcode update: Microcode header does not specify a required min version\n");
848 		return false;
849 	}
850 
851 	/*
852 	 * Check whether the current revision is either greater or equal to
853 	 * to the minimum revision specified in the header.
854 	 */
855 	if (cur_rev < mc_header->min_req_ver) {
856 		pr_info("Unsafe microcode update: Current revision 0x%x too old\n", cur_rev);
857 		pr_info("Current should be at 0x%x or higher. Use early loading instead\n", mc_header->min_req_ver);
858 		return false;
859 	}
860 	return true;
861 }
862 
parse_microcode_blobs(int cpu,struct iov_iter * iter)863 static enum ucode_state parse_microcode_blobs(int cpu, struct iov_iter *iter)
864 {
865 	struct ucode_cpu_info *uci = ucode_cpu_info + cpu;
866 	bool is_safe, new_is_safe = false;
867 	int cur_rev = uci->cpu_sig.rev;
868 	unsigned int curr_mc_size = 0;
869 	u8 *new_mc = NULL, *mc = NULL;
870 
871 	while (iov_iter_count(iter)) {
872 		struct microcode_header_intel mc_header;
873 		unsigned int mc_size, data_size;
874 		u8 *data;
875 
876 		if (!copy_from_iter_full(&mc_header, sizeof(mc_header), iter)) {
877 			pr_err("error! Truncated or inaccessible header in microcode data file\n");
878 			goto fail;
879 		}
880 
881 		mc_size = get_totalsize(&mc_header);
882 		if (mc_size < sizeof(mc_header)) {
883 			pr_err("error! Bad data in microcode data file (totalsize too small)\n");
884 			goto fail;
885 		}
886 		data_size = mc_size - sizeof(mc_header);
887 		if (data_size > iov_iter_count(iter)) {
888 			pr_err("error! Bad data in microcode data file (truncated file?)\n");
889 			goto fail;
890 		}
891 
892 		/* For performance reasons, reuse mc area when possible */
893 		if (!mc || mc_size > curr_mc_size) {
894 			kvfree(mc);
895 			mc = kvmalloc(mc_size, GFP_KERNEL);
896 			if (!mc)
897 				goto fail;
898 			curr_mc_size = mc_size;
899 		}
900 
901 		memcpy(mc, &mc_header, sizeof(mc_header));
902 		data = mc + sizeof(mc_header);
903 		if (!copy_from_iter_full(data, data_size, iter) ||
904 		    intel_microcode_sanity_check(mc, true, MC_HEADER_TYPE_MICROCODE) < 0)
905 			goto fail;
906 
907 		if (cur_rev >= mc_header.rev)
908 			continue;
909 
910 		if (!intel_find_matching_signature(mc, &uci->cpu_sig))
911 			continue;
912 
913 		is_safe = ucode_validate_minrev(&mc_header);
914 		if (force_minrev && !is_safe)
915 			continue;
916 
917 		kvfree(new_mc);
918 		cur_rev = mc_header.rev;
919 		new_mc  = mc;
920 		new_is_safe = is_safe;
921 		mc = NULL;
922 	}
923 
924 	if (iov_iter_count(iter))
925 		goto fail;
926 
927 	kvfree(mc);
928 	if (!new_mc)
929 		return UCODE_NFOUND;
930 
931 	ucode_patch_late = (struct microcode_intel *)new_mc;
932 	return new_is_safe ? UCODE_NEW_SAFE : UCODE_NEW;
933 
934 fail:
935 	kvfree(mc);
936 	kvfree(new_mc);
937 	return UCODE_ERROR;
938 }
939 
is_blacklisted(unsigned int cpu)940 static bool is_blacklisted(unsigned int cpu)
941 {
942 	struct cpuinfo_x86 *c = &cpu_data(cpu);
943 
944 	/*
945 	 * Late loading on model 79 with microcode revision less than 0x0b000021
946 	 * and LLC size per core bigger than 2.5MB may result in a system hang.
947 	 * This behavior is documented in item BDX90, #334165 (Intel Xeon
948 	 * Processor E7-8800/4800 v4 Product Family).
949 	 */
950 	if (c->x86_vfm == INTEL_BROADWELL_X &&
951 	    c->x86_stepping == 0x01 &&
952 	    llc_size_per_core > 2621440 &&
953 	    c->microcode < 0x0b000021) {
954 		pr_err_once("Erratum BDX90: late loading with revision < 0x0b000021 (0x%x) disabled.\n", c->microcode);
955 		pr_err_once("Please consider either early loading through initrd/built-in or a potential BIOS update.\n");
956 		return true;
957 	}
958 
959 	return false;
960 }
961 
request_microcode_fw(int cpu,struct device * device)962 static enum ucode_state request_microcode_fw(int cpu, struct device *device)
963 {
964 	struct cpuinfo_x86 *c = &cpu_data(cpu);
965 	const struct firmware *firmware;
966 	struct iov_iter iter;
967 	enum ucode_state ret;
968 	struct kvec kvec;
969 	char name[30];
970 
971 	if (is_blacklisted(cpu))
972 		return UCODE_NFOUND;
973 
974 	sprintf(name, "intel-ucode/%02x-%02x-%02x",
975 		c->x86, c->x86_model, c->x86_stepping);
976 
977 	if (request_firmware_direct(&firmware, name, device)) {
978 		pr_debug("data file %s load failed\n", name);
979 		return UCODE_NFOUND;
980 	}
981 
982 	kvec.iov_base = (void *)firmware->data;
983 	kvec.iov_len = firmware->size;
984 	iov_iter_kvec(&iter, ITER_SOURCE, &kvec, 1, firmware->size);
985 	ret = parse_microcode_blobs(cpu, &iter);
986 
987 	release_firmware(firmware);
988 
989 	return ret;
990 }
991 
finalize_late_load(int result)992 static void finalize_late_load(int result)
993 {
994 	if (!result)
995 		update_ucode_pointer(ucode_patch_late);
996 	else
997 		kvfree(ucode_patch_late);
998 	ucode_patch_late = NULL;
999 }
1000 
1001 static struct microcode_ops microcode_intel_ops = {
1002 	.request_microcode_fw	= request_microcode_fw,
1003 	.collect_cpu_info	= collect_cpu_info,
1004 	.apply_microcode	= apply_microcode_late,
1005 	.finalize_late_load	= finalize_late_load,
1006 	.stage_microcode	= stage_microcode,
1007 	.use_nmi		= IS_ENABLED(CONFIG_X86_64),
1008 };
1009 
calc_llc_size_per_core(struct cpuinfo_x86 * c)1010 static __init void calc_llc_size_per_core(struct cpuinfo_x86 *c)
1011 {
1012 	u64 llc_size = c->x86_cache_size * 1024ULL;
1013 
1014 	do_div(llc_size, topology_num_cores_per_package());
1015 	llc_size_per_core = (unsigned int)llc_size;
1016 }
1017 
staging_available(void)1018 static __init bool staging_available(void)
1019 {
1020 	u64 val;
1021 
1022 	val = x86_read_arch_cap_msr();
1023 	if (!(val & ARCH_CAP_MCU_ENUM))
1024 		return false;
1025 
1026 	rdmsrq(MSR_IA32_MCU_ENUMERATION, val);
1027 	return !!(val & MCU_STAGING);
1028 }
1029 
init_intel_microcode(void)1030 struct microcode_ops * __init init_intel_microcode(void)
1031 {
1032 	struct cpuinfo_x86 *c = &boot_cpu_data;
1033 
1034 	if (c->x86_vendor != X86_VENDOR_INTEL || c->x86 < 6 ||
1035 	    cpu_has(c, X86_FEATURE_IA64)) {
1036 		pr_err("Intel CPU family 0x%x not supported\n", c->x86);
1037 		return NULL;
1038 	}
1039 
1040 	if (staging_available()) {
1041 		microcode_intel_ops.use_staging = true;
1042 		pr_info("Enabled staging feature.\n");
1043 	}
1044 
1045 	calc_llc_size_per_core(c);
1046 
1047 	return &microcode_intel_ops;
1048 }
1049