lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date:	Sun, 27 Sep 2009 00:15:47 -0700
From:	Yinghai Lu <yinghai@...nel.org>
To:	Ingo Molnar <mingo@...e.hu>, Thomas Gleixner <tglx@...utronix.de>,
	"H. Peter Anvin" <hpa@...or.com>
CC:	"linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>
Subject: [PATCH] x86: print out microcode patch level


warning if there are not consistent between cpus

Signed-off-by: Yinghai Lu <yinghai@...nel.org>

---
 arch/x86/kernel/cpu/amd.c   |   27 +++++++++++++++++++++++++++
 arch/x86/kernel/cpu/intel.c |   27 +++++++++++++++++++++++++++
 2 files changed, 54 insertions(+)

Index: linux-2.6/arch/x86/kernel/cpu/amd.c
===================================================================
--- linux-2.6.orig/arch/x86/kernel/cpu/amd.c
+++ linux-2.6/arch/x86/kernel/cpu/amd.c
@@ -439,6 +439,31 @@ static void __cpuinit early_init_amd(str
 #endif
 }
 
+static u32 __cpuinitdata boot_cpu_microcode_level;
+
+static void __cpuinit check_amd_microcode_level(struct cpuinfo_x86 *c)
+{
+	u32 level, dummy;
+	unsigned int cpu_index = 0;
+
+#ifdef CONFIG_SMP
+	cpu_index = c->cpu_index;
+#endif
+
+	rdmsr(MSR_AMD64_PATCH_LEVEL, level, dummy);
+
+	printk(KERN_INFO "CPU %d microcode level: 0x%x\n", cpu_index, level);
+
+#ifdef CONFIG_SMP
+	if (cpu_index == boot_cpu_id)
+		boot_cpu_microcode_level = level;
+	else if (boot_cpu_microcode_level != level)
+		printk(KERN_WARNING
+		       "CPU %d microcode level 0x%x is not same to boot cpu\n",
+			cpu_index, level);
+#endif
+}
+
 static void __cpuinit init_amd(struct cpuinfo_x86 *c)
 {
 #ifdef CONFIG_SMP
@@ -562,6 +587,8 @@ static void __cpuinit init_amd(struct cp
 		set_cpu_cap(c, X86_FEATURE_MFENCE_RDTSC);
 	}
 
+	check_amd_microcode_level(c);
+
 #ifdef CONFIG_X86_64
 	if (c->x86 == 0x10) {
 		/* do this for boot cpu */
Index: linux-2.6/arch/x86/kernel/cpu/intel.c
===================================================================
--- linux-2.6.orig/arch/x86/kernel/cpu/intel.c
+++ linux-2.6/arch/x86/kernel/cpu/intel.c
@@ -327,6 +327,31 @@ static void __cpuinit detect_vmx_virtcap
 	}
 }
 
+static u32 __cpuinitdata boot_cpu_microcode_level;
+
+static void __cpuinit check_intel_microcode_level(struct cpuinfo_x86 *c)
+{
+	u32 level, dummy;
+	unsigned int cpu_index = 0;
+
+#ifdef CONFIG_SMP
+	cpu_index = c->cpu_index;
+#endif
+
+	rdmsr(MSR_IA32_UCODE_REV, dummy, level);
+
+	printk(KERN_INFO "CPU %d microcode level: 0x%x\n", cpu_index, level);
+
+#ifdef CONFIG_SMP
+	if (cpu_index == boot_cpu_id)
+		boot_cpu_microcode_level = level;
+	else if (boot_cpu_microcode_level != level)
+		printk(KERN_WARNING
+		       "CPU %d microcode level 0x%x is not same to boot cpu\n",
+			cpu_index, level);
+#endif
+}
+
 static void __cpuinit init_intel(struct cpuinfo_x86 *c)
 {
 	unsigned int l2 = 0;
@@ -432,6 +457,8 @@ static void __cpuinit init_intel(struct
 	/* Work around errata */
 	srat_detect_node(c);
 
+	check_intel_microcode_level(c);
+
 	if (cpu_has(c, X86_FEATURE_VMX))
 		detect_vmx_virtcap(c);
 }
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists