Skip to content

Commit 9784edd

Browse files
committed
Merge tag 'x86-microcode-2022-06-05' of git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip
Pull x86 microcode updates from Thomas Gleixner: - Disable late microcode loading by default. Unless the HW people get their act together and provide a required minimum version in the microcode header for making a halfways informed decision its just lottery and broken. - Warn and taint the kernel when microcode is loaded late - Remove the old unused microcode loader interface - Remove a redundant perf callback from the microcode loader * tag 'x86-microcode-2022-06-05' of git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip: x86/microcode: Remove unnecessary perf callback x86/microcode: Taint and warn on late loading x86/microcode: Default-disable late loading x86/microcode: Rip out the OLD_INTERFACE
2 parents a925128 + 0c0fe08 commit 9784edd

File tree

3 files changed

+20
-112
lines changed

3 files changed

+20
-112
lines changed

arch/x86/Kconfig

Lines changed: 7 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1358,17 +1358,16 @@ config MICROCODE_AMD
13581358
If you select this option, microcode patch loading support for AMD
13591359
processors will be enabled.
13601360

1361-
config MICROCODE_OLD_INTERFACE
1362-
bool "Ancient loading interface (DEPRECATED)"
1361+
config MICROCODE_LATE_LOADING
1362+
bool "Late microcode loading (DANGEROUS)"
13631363
default n
13641364
depends on MICROCODE
13651365
help
1366-
DO NOT USE THIS! This is the ancient /dev/cpu/microcode interface
1367-
which was used by userspace tools like iucode_tool and microcode.ctl.
1368-
It is inadequate because it runs too late to be able to properly
1369-
load microcode on a machine and it needs special tools. Instead, you
1370-
should've switched to the early loading method with the initrd or
1371-
builtin microcode by now: Documentation/x86/microcode.rst
1366+
Loading microcode late, when the system is up and executing instructions
1367+
is a tricky business and should be avoided if possible. Just the sequence
1368+
of synchronizing all cores and SMT threads is one fragile dance which does
1369+
not guarantee that cores might not softlock after the loading. Therefore,
1370+
use this at your own risk. Late loading taints the kernel too.
13721371

13731372
config X86_MSR
13741373
tristate "/dev/cpu/*/msr - Model-specific register support"

arch/x86/kernel/cpu/common.c

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2222,6 +2222,7 @@ void cpu_init_secondary(void)
22222222
}
22232223
#endif
22242224

2225+
#ifdef CONFIG_MICROCODE_LATE_LOADING
22252226
/*
22262227
* The microcode loader calls this upon late microcode load to recheck features,
22272228
* only when microcode has been updated. Caller holds microcode_mutex and CPU
@@ -2251,6 +2252,7 @@ void microcode_check(void)
22512252
pr_warn("x86/CPU: CPU features have changed after loading microcode, but might not take effect.\n");
22522253
pr_warn("x86/CPU: Please consider either early loading through initrd/built-in or a potential BIOS update.\n");
22532254
}
2255+
#endif
22542256

22552257
/*
22562258
* Invoked from core CPU hotplug code after hotplug operations

arch/x86/kernel/cpu/microcode/core.c

Lines changed: 11 additions & 104 deletions
Original file line numberDiff line numberDiff line change
@@ -373,101 +373,10 @@ static int apply_microcode_on_target(int cpu)
373373
return ret;
374374
}
375375

376-
#ifdef CONFIG_MICROCODE_OLD_INTERFACE
377-
static int do_microcode_update(const void __user *buf, size_t size)
378-
{
379-
int error = 0;
380-
int cpu;
381-
382-
for_each_online_cpu(cpu) {
383-
struct ucode_cpu_info *uci = ucode_cpu_info + cpu;
384-
enum ucode_state ustate;
385-
386-
if (!uci->valid)
387-
continue;
388-
389-
ustate = microcode_ops->request_microcode_user(cpu, buf, size);
390-
if (ustate == UCODE_ERROR) {
391-
error = -1;
392-
break;
393-
} else if (ustate == UCODE_NEW) {
394-
apply_microcode_on_target(cpu);
395-
}
396-
}
397-
398-
return error;
399-
}
400-
401-
static int microcode_open(struct inode *inode, struct file *file)
402-
{
403-
return capable(CAP_SYS_RAWIO) ? stream_open(inode, file) : -EPERM;
404-
}
405-
406-
static ssize_t microcode_write(struct file *file, const char __user *buf,
407-
size_t len, loff_t *ppos)
408-
{
409-
ssize_t ret = -EINVAL;
410-
unsigned long nr_pages = totalram_pages();
411-
412-
if ((len >> PAGE_SHIFT) > nr_pages) {
413-
pr_err("too much data (max %ld pages)\n", nr_pages);
414-
return ret;
415-
}
416-
417-
cpus_read_lock();
418-
mutex_lock(&microcode_mutex);
419-
420-
if (do_microcode_update(buf, len) == 0)
421-
ret = (ssize_t)len;
422-
423-
if (ret > 0)
424-
perf_check_microcode();
425-
426-
mutex_unlock(&microcode_mutex);
427-
cpus_read_unlock();
428-
429-
return ret;
430-
}
431-
432-
static const struct file_operations microcode_fops = {
433-
.owner = THIS_MODULE,
434-
.write = microcode_write,
435-
.open = microcode_open,
436-
.llseek = no_llseek,
437-
};
438-
439-
static struct miscdevice microcode_dev = {
440-
.minor = MICROCODE_MINOR,
441-
.name = "microcode",
442-
.nodename = "cpu/microcode",
443-
.fops = &microcode_fops,
444-
};
445-
446-
static int __init microcode_dev_init(void)
447-
{
448-
int error;
449-
450-
error = misc_register(&microcode_dev);
451-
if (error) {
452-
pr_err("can't misc_register on minor=%d\n", MICROCODE_MINOR);
453-
return error;
454-
}
455-
456-
return 0;
457-
}
458-
459-
static void __exit microcode_dev_exit(void)
460-
{
461-
misc_deregister(&microcode_dev);
462-
}
463-
#else
464-
#define microcode_dev_init() 0
465-
#define microcode_dev_exit() do { } while (0)
466-
#endif
467-
468376
/* fake device for request_firmware */
469377
static struct platform_device *microcode_pdev;
470378

379+
#ifdef CONFIG_MICROCODE_LATE_LOADING
471380
/*
472381
* Late loading dance. Why the heavy-handed stomp_machine effort?
473382
*
@@ -584,6 +493,9 @@ static int microcode_reload_late(void)
584493
{
585494
int ret;
586495

496+
pr_err("Attempting late microcode loading - it is dangerous and taints the kernel.\n");
497+
pr_err("You should switch to early loading, if possible.\n");
498+
587499
atomic_set(&late_cpus_in, 0);
588500
atomic_set(&late_cpus_out, 0);
589501

@@ -632,9 +544,14 @@ static ssize_t reload_store(struct device *dev,
632544
if (ret == 0)
633545
ret = size;
634546

547+
add_taint(TAINT_CPU_OUT_OF_SPEC, LOCKDEP_STILL_OK);
548+
635549
return ret;
636550
}
637551

552+
static DEVICE_ATTR_WO(reload);
553+
#endif
554+
638555
static ssize_t version_show(struct device *dev,
639556
struct device_attribute *attr, char *buf)
640557
{
@@ -651,7 +568,6 @@ static ssize_t pf_show(struct device *dev,
651568
return sprintf(buf, "0x%x\n", uci->cpu_sig.pf);
652569
}
653570

654-
static DEVICE_ATTR_WO(reload);
655571
static DEVICE_ATTR(version, 0444, version_show, NULL);
656572
static DEVICE_ATTR(processor_flags, 0444, pf_show, NULL);
657573

@@ -804,7 +720,9 @@ static int mc_cpu_down_prep(unsigned int cpu)
804720
}
805721

806722
static struct attribute *cpu_root_microcode_attrs[] = {
723+
#ifdef CONFIG_MICROCODE_LATE_LOADING
807724
&dev_attr_reload.attr,
725+
#endif
808726
NULL
809727
};
810728

@@ -838,10 +756,7 @@ static int __init microcode_init(void)
838756

839757
cpus_read_lock();
840758
mutex_lock(&microcode_mutex);
841-
842759
error = subsys_interface_register(&mc_cpu_interface);
843-
if (!error)
844-
perf_check_microcode();
845760
mutex_unlock(&microcode_mutex);
846761
cpus_read_unlock();
847762

@@ -856,10 +771,6 @@ static int __init microcode_init(void)
856771
goto out_driver;
857772
}
858773

859-
error = microcode_dev_init();
860-
if (error)
861-
goto out_ucode_group;
862-
863774
register_syscore_ops(&mc_syscore_ops);
864775
cpuhp_setup_state_nocalls(CPUHP_AP_MICROCODE_LOADER, "x86/microcode:starting",
865776
mc_cpu_starting, NULL);
@@ -870,10 +781,6 @@ static int __init microcode_init(void)
870781

871782
return 0;
872783

873-
out_ucode_group:
874-
sysfs_remove_group(&cpu_subsys.dev_root->kobj,
875-
&cpu_root_microcode_group);
876-
877784
out_driver:
878785
cpus_read_lock();
879786
mutex_lock(&microcode_mutex);

0 commit comments

Comments
 (0)