linux/drivers/platform/x86/intel
Linus Torvalds 0a23fb262d Major microcode loader restructuring, cleanup and improvements by Thomas
Gleixner:
 
 - Restructure the code needed for it and add a temporary initrd mapping
   on 32-bit so that the loader can access the microcode blobs. This in
   itself is a preparation for the next major improvement:
 
 - Do not load microcode on 32-bit before paging has been enabled.
   Handling this has caused an endless stream of headaches, issues, ugly
   code and unnecessary hacks in the past. And there really wasn't any
   sensible reason to do that in the first place. So switch the 32-bit
   loading to happen after paging has been enabled and turn the loader
   code "real purrty" again
 
 - Drop mixed microcode steppings loading on Intel - there, a single patch
   loaded on the whole system is sufficient
 
 - Rework late loading to track which CPUs have updated microcode
   successfully and which haven't, act accordingly
 
 - Move late microcode loading on Intel in NMI context in order to
   guarantee concurrent loading on all threads
 
 - Make the late loading CPU-hotplug-safe and have the offlined threads
   be woken up for the purpose of the update
 
 - Add support for a minimum revision which determines whether late
   microcode loading is safe on a machine and the microcode does not
   change software visible features which the machine cannot use anyway
   since feature detection has happened already. Roughly, the minimum
   revision is the smallest revision number which must be loaded
   currently on the system so that late updates can be allowed
 
 - Other nice leanups, fixess, etc all over the place
 -----BEGIN PGP SIGNATURE-----
 
 iQIzBAABCgAdFiEEzv7L6UO9uDPlPSfHEsHwGGHeVUoFAmVE0xkACgkQEsHwGGHe
 VUrCuBAAhOqqwkYPiGXPWd2hvdn1zGtD5fvEdXn3Orzd+Lwc6YaQTsCxCjIO/0ws
 8inpPFuOeGz4TZcplzipi3G5oatPVc7ORDuW+/BvQQQljZOsSKfhiaC29t6dvS6z
 UG3sbCXKVwlJ5Kwv3Qe4eWur4Ex6GeFDZkIvBCmbaAdGPFlfu1i2uO1yBooNP1Rs
 GiUkp+dP1/KREWwR/dOIsHYL2QjWIWfHQEWit/9Bj46rxE9ERx/TWt3AeKPfKriO
 Wp0JKp6QY78jg6a0a2/JVmbT1BKz69Z9aPp6hl4P2MfbBYOnqijRhdezFW0NyqV2
 pn6nsuiLIiXbnSOEw0+Wdnw5Q0qhICs5B5eaBfQrwgfZ8pxPHv2Ir777GvUTV01E
 Dv0ZpYsHa+mHe17nlK8V3+4eajt0PetExcXAYNiIE+pCb7pLjjKkl8e+lcEvEsO0
 QSL3zG5i5RWUMPYUvaFRgepWy3k/GPIoDQjRcUD3P+1T0GmnogNN10MMNhmOzfWU
 pyafe4tJUOVsq0HJ7V/bxIHk2p+Q+5JLKh5xBm9janE4BpabmSQnvFWNblVfK4ig
 M9ohjI/yMtgXROC4xkNXgi8wE5jfDKBghT6FjTqKWSV45vknF1mNEjvuaY+aRZ3H
 MB4P3HCj+PKWJimWHRYnDshcytkgcgVcYDiim8va/4UDrw8O2ks=
 =JOZu
 -----END PGP SIGNATURE-----

Merge tag 'x86_microcode_for_v6.7_rc1' of git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip

Pull x86 microcode loading updates from Borislac Petkov:
 "Major microcode loader restructuring, cleanup and improvements by
  Thomas Gleixner:

   - Restructure the code needed for it and add a temporary initrd
     mapping on 32-bit so that the loader can access the microcode
     blobs. This in itself is a preparation for the next major
     improvement:

   - Do not load microcode on 32-bit before paging has been enabled.

     Handling this has caused an endless stream of headaches, issues,
     ugly code and unnecessary hacks in the past. And there really
     wasn't any sensible reason to do that in the first place. So switch
     the 32-bit loading to happen after paging has been enabled and turn
     the loader code "real purrty" again

   - Drop mixed microcode steppings loading on Intel - there, a single
     patch loaded on the whole system is sufficient

   - Rework late loading to track which CPUs have updated microcode
     successfully and which haven't, act accordingly

   - Move late microcode loading on Intel in NMI context in order to
     guarantee concurrent loading on all threads

   - Make the late loading CPU-hotplug-safe and have the offlined
     threads be woken up for the purpose of the update

   - Add support for a minimum revision which determines whether late
     microcode loading is safe on a machine and the microcode does not
     change software visible features which the machine cannot use
     anyway since feature detection has happened already. Roughly, the
     minimum revision is the smallest revision number which must be
     loaded currently on the system so that late updates can be allowed

   - Other nice leanups, fixess, etc all over the place"

* tag 'x86_microcode_for_v6.7_rc1' of git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip: (40 commits)
  x86/microcode/intel: Add a minimum required revision for late loading
  x86/microcode: Prepare for minimal revision check
  x86/microcode: Handle "offline" CPUs correctly
  x86/apic: Provide apic_force_nmi_on_cpu()
  x86/microcode: Protect against instrumentation
  x86/microcode: Rendezvous and load in NMI
  x86/microcode: Replace the all-in-one rendevous handler
  x86/microcode: Provide new control functions
  x86/microcode: Add per CPU control field
  x86/microcode: Add per CPU result state
  x86/microcode: Sanitize __wait_for_cpus()
  x86/microcode: Clarify the late load logic
  x86/microcode: Handle "nosmt" correctly
  x86/microcode: Clean up mc_cpu_down_prep()
  x86/microcode: Get rid of the schedule work indirection
  x86/microcode: Mop up early loading leftovers
  x86/microcode/amd: Use cached microcode for AP load
  x86/microcode/amd: Cache builtin/initrd microcode early
  x86/microcode/amd: Cache builtin microcode too
  x86/microcode/amd: Use correct per CPU ucode_cpu_info
  ...
2023-11-04 08:46:37 -10:00
..
atomisp2 platform/x86: intel_atomisp2_led: Also turn off the always-on camera LED on the Asus T100TAF 2022-07-10 19:37:19 +02:00
ifs Major microcode loader restructuring, cleanup and improvements by Thomas 2023-11-04 08:46:37 -10:00
int1092 platform/x86: intel: int1092: intel_sar: Convert to platform remove callback returning void 2023-03-07 12:20:31 +01:00
int3472 platform/x86: int3472: Switch to devm_get_gpiod() 2023-10-06 13:34:58 +03:00
pmc x86/cpu: Fix Gracemont uarch 2023-08-09 21:51:06 +02:00
pmt Driver core changes for 6.4-rc1 2023-04-27 11:53:57 -07:00
speed_select_if platform/x86: ISST: Ignore minor version change 2023-10-04 11:12:13 +03:00
telemetry platform/x86: intel: telemetry: pltdrv: Convert to platform remove callback returning void 2023-03-07 12:20:40 +01:00
uncore-frequency platform-drivers-x86 for v6.7-1 2023-10-31 17:53:00 -10:00
wmi platform/x86/intel/wmi: thunderbolt: Use dev_groups callback 2022-09-27 16:01:44 +02:00
bxtwc_tmu.c platform/x86: intel: bxtwc_tmu: Convert to platform remove callback returning void 2023-03-07 12:20:21 +01:00
bytcrc_pwrsrc.c platform/x86/intel: bytcrc_pwrsrc: Convert to platform remove callback returning void 2023-09-28 13:26:54 +03:00
chtdc_ti_pwrbtn.c platform/x86: intel: chtdc_ti_pwrbtn: Convert to platform remove callback returning void 2023-03-07 12:20:23 +01:00
chtwc_int33fe.c platform/x86: intel: chtwc_int33fe: Convert to platform remove callback returning void 2023-03-07 12:20:25 +01:00
crystal_cove_charger.c platform/x86: intel_crystal_cove_charger: Fix IRQ masking / unmasking 2022-01-24 10:41:46 +01:00
hid.c platform/x86/intel/hid: Add HP Dragonfly G2 to VGBS DMI quirks 2023-07-25 15:30:33 +02:00
int0002_vgpio.c platform/x86: intel: int0002_vgpio: Convert to platform remove callback returning void 2023-03-07 12:20:29 +01:00
ishtp_eclite.c HID: intel-ish-hid: fix module device-id handling 2021-11-11 22:45:40 +01:00
Kconfig platform/x86: Add intel_bytcrc_pwrsrc driver 2023-03-16 14:42:30 +01:00
Makefile platform/x86: Add intel_bytcrc_pwrsrc driver 2023-03-16 14:42:30 +01:00
mrfld_pwrbtn.c platform/x86: intel: mrfld_pwrbtn: Convert to platform remove callback returning void 2023-03-07 12:20:35 +01:00
oaktrail.c platform/x86: intel: oaktrail: Drop empty platform remove function 2023-02-02 22:48:20 +01:00
punit_ipc.c platform/x86: intel: punit_ipc: Drop empty platform remove function 2023-02-02 22:48:20 +01:00
rst.c ACPI: make remove callback of ACPI driver void 2022-11-23 19:11:22 +01:00
sdsi.c platform/x86/intel/sdsi: Change mailbox timeout 2023-04-17 12:12:29 +02:00
smartconnect.c
tpmi.c platform/x86/intel/tpmi: Add debugfs support for read/write blocked 2023-10-04 11:57:32 +03:00
turbo_max_3.c
vbtn.c platform/x86: intel: vbtn: Convert to platform remove callback returning void 2023-03-07 12:20:41 +01:00
vsec.c platform-drivers-x86 for v6.4-1 2023-04-25 16:59:48 -07:00
vsec.h platform/x86/intel: vsec: Explicitly enable capabilities 2023-03-20 14:44:27 +01:00