[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <3E5A0FA7E9CA944F9D5414FEC6C712205633D85A@ORSMSX106.amr.corp.intel.com>
Date: Fri, 24 May 2013 15:33:38 +0000
From: "Yu, Fenghua" <fenghua.yu@...el.com>
To: Jacob Shin <jacob.shin@....com>, "H. Peter Anvin" <hpa@...or.com>,
"Ingo Molnar" <mingo@...hat.com>,
Thomas Gleixner <tglx@...utronix.de>,
"x86@...nel.org" <x86@...nel.org>
CC: Andreas Herrmann <herrmann.der.user@...glemail.com>,
Borislav Petkov <bp@...en8.de>,
"linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>
Subject: RE: [PATCH V2 3/3] x86/microcode: early microcode patch loading
support on AMD
> From: Jacob Shin [mailto:jacob.shin@....com]
> Add support for early microcode patch loading on AMD.
>
> Signed-off-by: Jacob Shin <jacob.shin@....com>
> ---
> arch/x86/Kconfig | 16 +-
> arch/x86/include/asm/microcode.h | 1 -
> arch/x86/include/asm/microcode_amd.h | 17 ++
> arch/x86/include/asm/microcode_intel.h | 1 +
> arch/x86/kernel/microcode_amd.c | 338
> ++++++++++++++++++++++++++++----
> arch/x86/kernel/microcode_core_early.c | 7 +
> 6 files changed, 333 insertions(+), 47 deletions(-)
> create mode 100644 arch/x86/include/asm/microcode_amd.h
>
> diff --git a/arch/x86/Kconfig b/arch/x86/Kconfig
> index 3a5bced..fab72e7 100644
> --- a/arch/x86/Kconfig
> +++ b/arch/x86/Kconfig
> @@ -1090,8 +1090,18 @@ config MICROCODE_INTEL_LIB
> depends on MICROCODE_INTEL
>
> config MICROCODE_INTEL_EARLY
> - bool "Early load microcode"
> + def_bool n
> depends on MICROCODE_INTEL && BLK_DEV_INITRD
> +
> +config MICROCODE_AMD_EARLY
> + def_bool n
> + depends on MICROCODE_AMD && BLK_DEV_INITRD
> +
> +config MICROCODE_EARLY
> + bool "Early load microcode"
> + depends on (MICROCODE_INTEL || MICROCODE_AMD) && BLK_DEV_INITRD
> + select MICROCODE_INTEL_EARLY if MICROCODE_INTEL
> + select MICROCODE_AMD_EARLY if MICROCODE_AMD
> default y
> help
> This option provides functionality to read additional microcode
> data
> @@ -1099,10 +1109,6 @@ config MICROCODE_INTEL_EARLY
> microcode to CPU's as early as possible. No functional change
> if no
> microcode data is glued to the initrd, therefore it's safe to
> say Y.
>
> -config MICROCODE_EARLY
> - def_bool y
> - depends on MICROCODE_INTEL_EARLY
> -
> config X86_MSR
> tristate "/dev/cpu/*/msr - Model-specific register support"
> ---help---
> diff --git a/arch/x86/include/asm/microcode.h
> b/arch/x86/include/asm/microcode.h
> index 6825e2e..f4be4cc 100644
> --- a/arch/x86/include/asm/microcode.h
> +++ b/arch/x86/include/asm/microcode.h
> @@ -58,7 +58,6 @@ static inline void __exit exit_amd_microcode(void) {}
> #endif
>
> #ifdef CONFIG_MICROCODE_EARLY
> -#define MAX_UCODE_COUNT 128
> extern void __init load_ucode_bsp(void);
> extern __init void load_ucode_ap(void);
> extern int __init save_microcode_in_initrd(void);
> diff --git a/arch/x86/include/asm/microcode_amd.h
> b/arch/x86/include/asm/microcode_amd.h
> new file mode 100644
> index 0000000..376123c
> --- /dev/null
> +++ b/arch/x86/include/asm/microcode_amd.h
> @@ -0,0 +1,17 @@
> +#ifndef _ASM_X86_MICROCODE_AMD_H
> +#define _ASM_X86_MICROCODE_AMD_H
> +
> +#ifdef CONFIG_MICROCODE_AMD_EARLY
> +extern void __init load_ucode_amd_bsp(void);
> +extern void __cpuinit load_ucode_amd_ap(void);
> +extern int __init save_microcode_in_initrd_amd(void);
> +#else
> +static inline void __init load_ucode_amd_bsp(void) {}
> +static inline void __cpuinit load_ucode_amd_ap(void) {}
> +static inline int __init save_microcode_in_initrd_amd(void)
> +{
> + return -EINVAL;
> +}
> +#endif
> +
> +#endif /* _ASM_X86_MICROCODE_AMD_H */
> diff --git a/arch/x86/include/asm/microcode_intel.h
> b/arch/x86/include/asm/microcode_intel.h
> index 538e407..db4a2f9 100644
> --- a/arch/x86/include/asm/microcode_intel.h
> +++ b/arch/x86/include/asm/microcode_intel.h
> @@ -64,6 +64,7 @@ extern int
> update_match_revision(struct microcode_header_intel *mc_header, int
> rev);
>
> #ifdef CONFIG_MICROCODE_INTEL_EARLY
> +#define MAX_UCODE_COUNT 128
> extern void __init load_ucode_intel_bsp(void);
> extern void __cpuinit load_ucode_intel_ap(void);
> extern void show_ucode_info_early(void);
> diff --git a/arch/x86/kernel/microcode_amd.c
> b/arch/x86/kernel/microcode_amd.c
> index efdec7c..cda647e 100644
> --- a/arch/x86/kernel/microcode_amd.c
> +++ b/arch/x86/kernel/microcode_amd.c
> @@ -27,10 +27,13 @@
> #include <linux/kernel.h>
> #include <linux/module.h>
> #include <linux/pci.h>
> +#include <linux/earlycpio.h>
>
> #include <asm/microcode.h>
> +#include <asm/microcode_amd.h>
> #include <asm/processor.h>
> #include <asm/msr.h>
> +#include <asm/setup.h>
>
> MODULE_DESCRIPTION("AMD Microcode Update Driver");
> MODULE_AUTHOR("Peter Oruba");
> @@ -84,23 +87,28 @@ struct ucode_patch {
>
> static LIST_HEAD(pcache);
>
> -static u16 find_equiv_id(unsigned int cpu)
> +static u16 _find_equiv_id(struct equiv_cpu_entry *eq,
> + struct ucode_cpu_info *uci)
> {
> - struct ucode_cpu_info *uci = ucode_cpu_info + cpu;
> int i = 0;
>
> - if (!equiv_cpu_table)
> + if (!eq)
> return 0;
>
> - while (equiv_cpu_table[i].installed_cpu != 0) {
> - if (uci->cpu_sig.sig == equiv_cpu_table[i].installed_cpu)
> - return equiv_cpu_table[i].equiv_cpu;
> + while (eq[i].installed_cpu != 0) {
> + if (uci->cpu_sig.sig == eq[i].installed_cpu)
> + return eq[i].equiv_cpu;
>
> i++;
> }
> return 0;
> }
>
> +static u16 find_equiv_id(unsigned int cpu)
> +{
> + return _find_equiv_id(equiv_cpu_table, ucode_cpu_info + cpu);
> +}
> +
> static u32 find_cpu_family_by_equiv_cpu(u16 equiv_cpu)
> {
> int i = 0;
> @@ -173,9 +181,17 @@ static struct ucode_patch *find_patch(unsigned int
> cpu)
> static int collect_cpu_info_amd(int cpu, struct cpu_signature *csig)
> {
> struct cpuinfo_x86 *c = &cpu_data(cpu);
> + struct ucode_cpu_info *uci = ucode_cpu_info + cpu;
> + struct ucode_patch *p;
>
> csig->sig = cpuid_eax(0x00000001);
> csig->rev = c->microcode;
> +
> + /* if a patch was early loaded, tell microcode_core.c about it */
> + p = find_patch(cpu);
> + if (p && (p->patch_id == csig->rev))
> + uci->mc = p->data;
> +
> pr_info("CPU%d: patch_level=0x%08x\n", cpu, csig->rev);
>
> return 0;
> @@ -215,24 +231,14 @@ static unsigned int verify_patch_size(int cpu,
> u32 patch_size,
> return patch_size;
> }
>
> -static int apply_microcode_amd(int cpu)
> +static int _apply_microcode_amd(int cpu, void *data, struct
> cpuinfo_x86 *c,
> + struct ucode_cpu_info *uci, bool silent)
> {
> - struct cpuinfo_x86 *c = &cpu_data(cpu);
> struct microcode_amd *mc_amd;
> - struct ucode_cpu_info *uci;
> - struct ucode_patch *p;
> u32 rev, dummy;
>
> - BUG_ON(raw_smp_processor_id() != cpu);
> -
> - uci = ucode_cpu_info + cpu;
> -
> - p = find_patch(cpu);
> - if (!p)
> - return 0;
> -
> - mc_amd = p->data;
> - uci->mc = p->data;
> + mc_amd = data;
> + uci->mc = data;
>
> rdmsr(MSR_AMD64_PATCH_LEVEL, rev, dummy);
>
> @@ -247,18 +253,37 @@ static int apply_microcode_amd(int cpu)
> /* verify patch application was successful */
> rdmsr(MSR_AMD64_PATCH_LEVEL, rev, dummy);
> if (rev != mc_amd->hdr.patch_id) {
> - pr_err("CPU%d: update failed for patch_level=0x%08x\n",
> - cpu, mc_amd->hdr.patch_id);
> + if (!silent)
> + pr_err("CPU%d: update failed for
> patch_level=0x%08x\n",
> + cpu, mc_amd->hdr.patch_id);
> return -1;
> }
>
> - pr_info("CPU%d: new patch_level=0x%08x\n", cpu, rev);
> + if (!silent)
> + pr_info("CPU%d: new patch_level=0x%08x\n", cpu, rev);
In 32-bit, this info won't be printed. Then microcode is silently updated. This may make it difficult for user to catch new microcode update info. And this is not consistent to 64-bit which prints the info.
You might print this info later when printk is usable like Intel ucode does.
> uci->cpu_sig.rev = rev;
> c->microcode = rev;
>
> return 0;
> }
>
> +static int apply_microcode_amd(int cpu)
This apply_microcode_amd(int cpu) can be simplified as apply_microcode_amd(void).
> +{
> + struct cpuinfo_x86 *c = &cpu_data(cpu);
> + struct ucode_cpu_info *uci;
> + struct ucode_patch *p;
> +
> + BUG_ON(raw_smp_processor_id() != cpu);
> +
Then you can get cpu=smp_processor_id() here and remove this BUG_ON(). The code will be simpler and easier to understand.
> + uci = ucode_cpu_info + cpu;
> +
> + p = find_patch(cpu);
> + if (!p)
> + return 0;
> +
> + return _apply_microcode_amd(cpu, p->data, c, uci, false);
> +}
> +
> static int install_equiv_cpu_table(const u8 *buf)
> {
> unsigned int *ibuf = (unsigned int *)buf;
> @@ -398,6 +423,44 @@ static enum ucode_state load_microcode_amd(int cpu,
> const u8 *data, size_t size)
> return UCODE_OK;
> }
>
> +#if defined(CONFIG_MICROCODE_AMD_EARLY) && defined(CONFIG_X86_32)
> +#define MPB_MAX_SIZE F15H_MPB_MAX_SIZE
> +static u8 bsp_mpb[MPB_MAX_SIZE];
> +#endif
> +static enum ucode_state request_microcode_fw(int cpu, const struct
> firmware *fw)
> +{
> + enum ucode_state ret = UCODE_ERROR;
> +
> + if (*(u32 *)fw->data != UCODE_MAGIC) {
> + pr_err("invalid magic value (0x%08x)\n", *(u32 *)fw->data);
> + return ret;
> + }
> +
> + /* free old equiv table */
> + free_equiv_cpu_table();
> +
> + ret = load_microcode_amd(cpu, fw->data, fw->size);
> + if (ret != UCODE_OK)
> + cleanup();
> +
> +#if defined(CONFIG_MICROCODE_AMD_EARLY) && defined(CONFIG_X86_32)
> + /*
> + * on X86_32 early load, while CPU hotplugging on, we cannot
> traverse
> + * pcache since paging is not turneded on yet. so stash away
> BSP's MPB
> + * when a new fw file is installed.
> + */
> + if (cpu_data(cpu).cpu_index == boot_cpu_data.cpu_index) {
> + struct ucode_patch *p;
> +
> + p = find_patch(cpu);
> + if (p)
> + memcpy(bsp_mpb, p->data, min_t(u32, ksize(p->data),
> + MPB_MAX_SIZE));
> + }
> +#endif
> + return ret;
> +}
> +
> /*
> * AMD microcode firmware naming convention, up to family 15h they are
> in
> * the legacy file:
> @@ -419,7 +482,7 @@ static enum ucode_state request_microcode_amd(int
> cpu, struct device *device,
> {
> char fw_name[36] = "amd-ucode/microcode_amd.bin";
> struct cpuinfo_x86 *c = &cpu_data(cpu);
> - enum ucode_state ret = UCODE_NFOUND;
> + enum ucode_state ret;
> const struct firmware *fw;
>
> /* reload ucode container only on the boot cpu */
> @@ -431,26 +494,11 @@ static enum ucode_state request_microcode_amd(int
> cpu, struct device *device,
>
> if (request_firmware(&fw, (const char *)fw_name, device)) {
> pr_err("failed to load file %s\n", fw_name);
> - goto out;
> + return UCODE_NFOUND;
> }
>
> - ret = UCODE_ERROR;
> - if (*(u32 *)fw->data != UCODE_MAGIC) {
> - pr_err("invalid magic value (0x%08x)\n", *(u32 *)fw->data);
> - goto fw_release;
> - }
> -
> - /* free old equiv table */
> - free_equiv_cpu_table();
> -
> - ret = load_microcode_amd(cpu, fw->data, fw->size);
> - if (ret != UCODE_OK)
> - cleanup();
> -
> - fw_release:
> + ret = request_microcode_fw(cpu, fw);
> release_firmware(fw);
> -
> - out:
> return ret;
> }
>
> @@ -475,6 +523,214 @@ static struct microcode_ops microcode_amd_ops = {
> .microcode_fini_cpu = microcode_fini_cpu_amd,
> };
>
> +#ifdef CONFIG_MICROCODE_AMD_EARLY
> +/*
> + * Early Loading Support
> + */
> +
> +static void __cpuinit collect_cpu_info_amd_early(struct cpuinfo_x86 *c,
> + struct ucode_cpu_info *uci)
> +{
> + u32 rev, eax;
> +
> + rdmsr(MSR_AMD64_PATCH_LEVEL, rev, eax);
> + eax = cpuid_eax(0x00000001);
> +
> + uci->cpu_sig.sig = eax;
> + uci->cpu_sig.rev = rev;
> + c->microcode = rev;
> + c->x86 = ((eax >> 8) & 0xf) + ((eax >> 20) & 0xff);
> +}
> +
> +/*
> + * microcode patch container file is prepended to the initrd in cpio
> format.
> + * see Documentation/x86/early-microcode.txt
> + */
> +static __initdata char ucode_path[] =
> "kernel/x86/microcode/AuthenticAMD.bin";
> +
> +static struct cpio_data __init
> +request_firmware_in_initrd(void)
> +{
> + long offset = 0;
> +
> + return find_cpio_data(ucode_path,
> + (void *)(boot_params.hdr.ramdisk_image + PAGE_OFFSET),
> + boot_params.hdr.ramdisk_size, &offset);
> +}
> +
> +static struct cpio_data __init request_firmware_in_initrd_early(void)
> +{
> +#ifdef CONFIG_X86_32
> + struct boot_params *boot_params_p;
> + long offset = 0;
> +
> + boot_params_p = (struct boot_params *)__pa_nodebug(&boot_params);
> + return find_cpio_data((char *)__pa_nodebug(ucode_path),
> + (void *)boot_params_p->hdr.ramdisk_image,
> + boot_params_p->hdr.ramdisk_size, &offset);
> +#else
> + return request_firmware_in_initrd();
> +#endif
> +}
> +
> +static int __init
> +find_equiv_cpu_table_early(const u8 *buf, struct equiv_cpu_entry **eq)
> +{
> + unsigned int *ibuf = (unsigned int *)buf;
> + unsigned int type = ibuf[1];
> + unsigned int size = ibuf[2];
> +
> + if (type != UCODE_EQUIV_CPU_TABLE_TYPE || !size)
> + return -EINVAL;
> +
> + /*
> + * during BSP load, vmalloc() is not available yet.
> + * so just use equivalent cpu table in initrd memory in place,
> + * no need to copy it. on X86_64, first AP to load will actually
> + * "install" the equiv_cpu_table. on X86_32, before mm frees up
> initrd.
> + */
> + *eq = (struct equiv_cpu_entry *)(buf + CONTAINER_HDR_SZ);
> +
> + /* add header length */
> + return size + CONTAINER_HDR_SZ;
> +}
> +
> +static enum ucode_state __init
> +load_microcode_amd_early(int cpu, const u8 *data, size_t size)
> +{
> + unsigned int leftover;
> + u8 *fw = (u8 *)data;
> + int offset;
> + u16 equiv_id;
> + struct equiv_cpu_entry *eq;
> + struct cpuinfo_x86 c;
> + struct ucode_cpu_info uci;
> +
> + collect_cpu_info_amd_early(&c, &uci);
> +
> + offset = find_equiv_cpu_table_early(data, &eq);
> + if (offset < 0)
> + return UCODE_ERROR;
> + fw += offset;
> + leftover = size - offset;
> +
> + if (*(u32 *)fw != UCODE_UCODE_TYPE)
> + return UCODE_ERROR;
> +
> + equiv_id = _find_equiv_id(eq, &uci);
> + if (!equiv_id)
> + return UCODE_NFOUND;
> +
> + while (leftover) {
> + struct microcode_amd *mc;
> + int patch_size = *(u32 *)(fw + 4);
> +
> + /*
> + * during BSP load, vmalloc() is not available yet,
> + * so simply find and apply the matching microcode patch in
> + * initrd memory in place. on X86_64, first AP to load will
> + * actually "cache" the patches in kernel memory.
> + */
> + mc = (struct microcode_amd *)(fw + SECTION_HDR_SIZE);
> + if (equiv_id == mc->hdr.processor_rev_id)
> + if (_apply_microcode_amd(cpu, mc, &c, &uci, true) ==
> 0)
> + break;
> +
> + offset = patch_size + SECTION_HDR_SIZE;
> + fw += offset;
> + leftover -= offset;
> + }
> +
> + return UCODE_OK;
> +}
> +
> +static void collect_cpu_info_amd_early_bsp(void *arg)
> +{
> + unsigned int cpu = smp_processor_id();
> + struct cpuinfo_x86 dummy;
> + struct ucode_cpu_info *uci = ucode_cpu_info + cpu;
> + collect_cpu_info_amd_early(&dummy, uci);
> +}
> +
> +int __init save_microcode_in_initrd_amd(void)
> +{
> + struct cpio_data cd;
> + struct firmware fw;
> + struct ucode_cpu_info *uci = ucode_cpu_info +
> boot_cpu_data.cpu_index;
> +
> + if (equiv_cpu_table)
> + return 0;
> +
> + cd = request_firmware_in_initrd();
> + if (!cd.data)
> + return -EINVAL;
> +
> + fw.data = cd.data;
> + fw.size = cd.size;
> +
> + if (!uci->cpu_sig.sig)
> + smp_call_function_single(boot_cpu_data.cpu_index,
> + collect_cpu_info_amd_early_bsp, NULL,
> + 1);
> +
> + if (request_microcode_fw(boot_cpu_data.cpu_index, &fw) !=
> UCODE_OK)
> + return -EINVAL;
> +
> + return 0;
> +}
> +
> +void __init load_ucode_amd_bsp(void)
> +{
> + unsigned int cpu = smp_processor_id();
> + struct cpio_data fw = request_firmware_in_initrd_early();
> +
> + if (!fw.data)
> + return;
> +
> + load_microcode_amd_early(cpu, fw.data, fw.size);
> +}
> +
> +#ifdef CONFIG_X86_32
> +/*
> + * on X86_32 AP load, since paging is turned off and vmalloc() is not
> available
> + * yet, we cannot install the equivalent cpu table nor cache the
> microcode
> + * patches in kernel memory, so just take the BSP code path. unless we
> are
> + * CPU hotplugging on (i.e. resume from suspend), which then we will
> load from
> + * bsp_mpb instead.
> + */
> +void __cpuinit load_ucode_amd_ap(void)
> +{
> + unsigned int cpu = smp_processor_id();
> + struct microcode_amd *mc;
> + struct cpuinfo_x86 c;
> + struct ucode_cpu_info uci;
> +
> + mc = (struct microcode_amd *)__pa_nodebug(bsp_mpb);
> + if (mc->hdr.patch_id && mc->hdr.processor_rev_id)
> + _apply_microcode_amd(cpu, mc, &c, &uci, true);
> + else
> + load_ucode_amd_bsp();
> +}
> +#else /* !CONFIG_X86_32 */
> +/*
> + * on X86_64 AP load, we can vmalloc(). we can go through the normal
> (non-early)
> + * code path, we just have to make sure we prepare cpu_data and
> ucode_cpu_info.
> + */
> +void __cpuinit load_ucode_amd_ap(void)
> +{
> + unsigned int cpu = smp_processor_id();
> +
> + collect_cpu_info_amd_early(&cpu_data(cpu), ucode_cpu_info + cpu);
> +
> + if (cpu && !equiv_cpu_table)
> + if (save_microcode_in_initrd_amd())
> + return;
> +
> + apply_microcode_amd(cpu);
> +}
> +#endif /* end CONFIG_X86_32 */
> +#endif /* end CONFIG_MICROCODE_AMD_EARLY */
> +
> struct microcode_ops * __init init_amd_microcode(void)
> {
> struct cpuinfo_x86 *c = &cpu_data(0);
> diff --git a/arch/x86/kernel/microcode_core_early.c
> b/arch/x86/kernel/microcode_core_early.c
> index 0d19ac5..1221c22 100644
> --- a/arch/x86/kernel/microcode_core_early.c
> +++ b/arch/x86/kernel/microcode_core_early.c
> @@ -18,6 +18,7 @@
> */
> #include <linux/module.h>
> #include <asm/microcode_intel.h>
> +#include <asm/microcode_amd.h>
> #include <asm/processor.h>
>
> #define QCHAR(a, b, c, d) ((a) + ((b) << 8) + ((c) << 16) + ((d) <<
> 24))
> @@ -83,6 +84,8 @@ void __init load_ucode_bsp(void)
>
> if (vendor == X86_VENDOR_INTEL && x86 >= 6)
> load_ucode_intel_bsp();
> + else if (vendor == X86_VENDOR_AMD && x86 >= 0x10)
> + load_ucode_amd_bsp();
> }
>
> void __cpuinit load_ucode_ap(void)
> @@ -97,6 +100,8 @@ void __cpuinit load_ucode_ap(void)
>
> if (vendor == X86_VENDOR_INTEL && x86 >= 6)
> load_ucode_intel_ap();
> + else if (vendor == X86_VENDOR_AMD && x86 >= 0x10)
> + load_ucode_amd_ap();
> }
>
> int __init save_microcode_in_initrd(void)
> @@ -105,6 +110,8 @@ int __init save_microcode_in_initrd(void)
>
> if (c->x86_vendor == X86_VENDOR_INTEL && c->x86 >= 6)
> return save_microcode_in_initrd_intel();
> + else if (c->x86_vendor == X86_VENDOR_AMD && c->x86 >= 0x10)
> + return save_microcode_in_initrd_amd();
>
> return 0;
> }
> --
> 1.7.9.5
>
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists