freebsd-dev/usr.sbin/cpucontrol/intel.c
Stanislav Sedov e085f869d5 - Add cpuctl(4) pseudo-device driver to provide access to some low-level
features of CPUs like reading/writing machine-specific registers,
  retrieving cpuid data, and updating microcode.
- Add cpucontrol(8) utility, that provides userland access to
  the features of cpuctl(4).
- Add subsequent manpages.

The cpuctl(4) device operates as follows. The pseudo-device node cpuctlX
is created for each cpu present in the systems. The pseudo-device minor
number corresponds to the cpu number in the system. The cpuctl(4) pseudo-
device allows a number of ioctl to be preformed, namely RDMSR/WRMSR/CPUID
and UPDATE. The first pair alows the caller to read/write machine-specific
registers from the correspondent CPU. cpuid data could be retrieved using
the CPUID call, and microcode updates are applied via UPDATE.

The permissions are inforced based on the pseudo-device file permissions.
RDMSR/CPUID will be allowed when the caller has read access to the device
node, while WRMSR/UPDATE will be granted only when the node is opened
for writing. There're also a number of priv(9) checks.

The cpucontrol(8) utility is intened to provide userland access to
the cpuctl(4) device features. The utility also allows one to apply
cpu microcode updates.

Currently only Intel and AMD cpus are supported and were tested.

Approved by:	kib
Reviewed by:	rpaulo, cokane, Peter Jeremy
MFC after:	1 month
2008-08-08 16:26:53 +00:00

286 lines
7.2 KiB
C

/*-
* Copyright (c) 2006, 2008 Stanislav Sedov <stas@FreeBSD.org>.
* All rights reserved.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions
* are met:
* 1. Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in the
* documentation and/or other materials provided with the distribution.
*
* THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
* IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
* OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
* IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
* INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
* NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
* DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
* THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
* THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
*/
#include <sys/cdefs.h>
__FBSDID("$FreeBSD$");
#include <assert.h>
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <unistd.h>
#include <fcntl.h>
#include <err.h>
#include <sys/types.h>
#include <sys/stat.h>
#include <sys/mman.h>
#include <sys/ioctl.h>
#include <sys/ioccom.h>
#include <sys/cpuctl.h>
#include <machine/cpufunc.h>
#include <machine/specialreg.h>
#include "cpucontrol.h"
#include "intel.h"
#define DEFAULT_UCODE_SIZE 2000 /* Size of update data if not specified. */
int
intel_probe(int fd)
{
char vendor[13];
int error;
cpuctl_cpuid_args_t idargs = {
.level = 0,
};
error = ioctl(fd, CPUCTL_CPUID, &idargs);
if (error < 0) {
WARN(0, "ioctl()");
return (1);
}
((uint32_t *)vendor)[0] = idargs.data[1];
((uint32_t *)vendor)[1] = idargs.data[3];
((uint32_t *)vendor)[2] = idargs.data[2];
vendor[12] = '\0';
if (strncmp(vendor, INTEL_VENDOR_ID, sizeof(INTEL_VENDOR_ID)) != 0)
return (1);
return (0);
}
void
intel_update(const char *dev, const char *path)
{
int fd, devfd;
struct stat st;
uint32_t *fw_image;
int have_ext_table;
uint32_t sum;
unsigned int i;
size_t payload_size;
intel_fw_header_t *fw_header;
intel_cpu_signature_t *ext_table;
intel_ext_header_t *ext_header;
uint32_t signature, flags;
int32_t revision;
ssize_t ext_size;
size_t ext_table_size;
void *fw_data;
size_t data_size, total_size;
cpuctl_msr_args_t msrargs = {
.msr = MSR_IA32_PLATFORM_ID,
};
cpuctl_cpuid_args_t idargs = {
.level = 1, /* Signature. */
};
cpuctl_update_args_t args;
int error;
assert(path);
assert(dev);
fd = -1;
devfd = -1;
fw_image = MAP_FAILED;
ext_table = NULL;
ext_header = NULL;
devfd = open(dev, O_RDWR);
if (devfd < 0) {
WARN(0, "could not open %s for writing", dev);
return;
}
error = ioctl(devfd, CPUCTL_CPUID, &idargs);
if (error < 0) {
WARN(0, "ioctl(%s)", dev);
goto fail;
}
signature = idargs.data[0];
error = ioctl(devfd, CPUCTL_RDMSR, &msrargs);
if (error < 0) {
WARN(0, "ioctl(%s)", dev);
goto fail;
}
/*
* MSR_IA32_PLATFORM_ID contains flag in BCD in bits 52-50.
*/
flags = 1 << ((msrargs.data >> 50) & 7);
msrargs.msr = MSR_BIOS_SIGN;
error = ioctl(devfd, CPUCTL_RDMSR, &msrargs);
if (error < 0) {
WARN(0, "ioctl(%s)", dev);
goto fail;
}
revision = msrargs.data >> 32; /* Revision in the high dword. */
WARNX(2, "found cpu type %#x family %#x model %#x stepping %#x.",
(signature >> 12) & 0x03, (signature >> 8) & 0x0f,
(signature >> 4) & 0x0f, (signature >> 0) & 0x0f);
/*
* Open firmware image.
*/
fd = open(path, O_RDONLY, 0);
if (fd < 0) {
WARN(0, "open(%s)", path);
return;
}
error = fstat(fd, &st);
if (error != 0) {
WARN(0, "fstat(%s)", path);
goto fail;
}
if (st.st_size < 0 || (unsigned)st.st_size < sizeof(*fw_header)) {
WARNX(2, "file too short: %s", path);
goto fail;
}
/*
* mmap the whole image.
*/
fw_image = (uint32_t *)mmap(NULL, st.st_size, PROT_READ,
MAP_PRIVATE, fd, 0);
if (fw_image == MAP_FAILED) {
WARN(0, "mmap(%s)", path);
goto fail;
}
fw_header = (intel_fw_header_t *)fw_image;
if (fw_header->header_version != INTEL_HEADER_VERSION ||
fw_header->loader_revision != INTEL_LOADER_REVISION) {
WARNX(2, "%s is not a valid intel firmware: version mismatch",
path);
goto fail;
}
/*
* According to spec, if data_size == 0, then size of ucode = 2000.
*/
if (fw_header->data_size == 0)
data_size = DEFAULT_UCODE_SIZE;
else
data_size = fw_header->data_size;
if (fw_header->total_size == 0)
total_size = data_size + sizeof(*fw_header);
else
total_size = fw_header->total_size;
if (total_size > (unsigned)st.st_size || st.st_size < 0) {
WARNX(2, "file too short: %s", path);
goto fail;
}
payload_size = data_size + sizeof(*fw_header);
/*
* Check the primary checksum.
*/
sum = 0;
for (i = 0; i < (payload_size / sizeof(uint32_t)); i++)
sum += *((uint32_t *)fw_image + i);
if (sum != 0) {
WARNX(2, "%s: update data checksum invalid", path);
goto fail;
}
/*
* Check if there is an extended signature table.
*/
ext_size = total_size - payload_size;
have_ext_table = 0;
if (ext_size > (signed)sizeof(*ext_header)) {
ext_header =
(intel_ext_header_t *)((char *)fw_image + payload_size);
ext_table = (intel_cpu_signature_t *)(ext_header + 1);
/*
* Check the extended table size.
*/
ext_table_size = sizeof(*ext_header) +
ext_header->sig_count * sizeof(*ext_table);
if (ext_table_size + payload_size > total_size) {
WARNX(2, "%s: broken extended signature table", path);
goto no_table;
}
/*
* Check the extended table signature.
*/
sum = 0;
for (i = 0; i < (ext_table_size / sizeof(uint32_t)); i++)
sum += *((uint32_t *)ext_header + i);
if (sum != 0) {
WARNX(2, "%s: extended signature table checksum invalid",
path);
goto no_table;
}
have_ext_table = 1;
}
no_table:
fw_data = fw_header + 1; /* Pointer to the update data. */
/*
* Check if the given image is ok for this cpu.
*/
if (signature == fw_header->cpu_signature &&
(flags & fw_header->cpu_flags) != 0)
goto matched;
else if (have_ext_table != 0) {
for (i = 0; i < ext_header->sig_count; i++) {
uint32_t sig = ext_table[i].cpu_signature;
if (signature == sig &&
(flags & ext_table[i].cpu_flags) != 0)
goto matched;
}
} else
goto fail;
matched:
if (revision >= fw_header->revision) {
WARNX(1, "skipping %s of rev %#x: up to date",
path, fw_header->revision);
return;
}
fprintf(stderr, "%s: updating cpu %s from rev %#x to rev %#x... ",
path, dev, revision, fw_header->revision);
args.data = fw_data;
args.size = data_size;
error = ioctl(devfd, CPUCTL_UPDATE, &args);
if (error < 0) {
fprintf(stderr, "failed.\n");
WARN(0, "ioctl()");
goto fail;
}
fprintf(stderr, "done.\n");
fail:
if (fw_image != MAP_FAILED)
if (munmap(fw_image, st.st_size) != 0)
warn("munmap(%s)", path);
if (devfd >= 0)
close(devfd);
if (fd >= 0)
close(fd);
return;
}