File: README

package info (click to toggle)
iucode-tool 2.1.1-1~bpo8%2B1
  • links: PTS, VCS
  • area: contrib
  • in suites: jessie-backports
  • size: 768 kB
  • sloc: sh: 4,179; ansic: 2,854; makefile: 23
file content (316 lines) | stat: -rw-r--r-- 13,806 bytes parent folder | download | duplicates (2)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316


       iucode_tool - IntelĀ® 64 and IA-32 processor microcode tool

			     Version 2.1.1
			  January 11th,  2017

		     https://gitlab.com/iucode-tool

IntelĀ® 64 and IA-32 system processors (x86_64 and i686 system processors)
are capable of field-upgrading their control program (microcode).  These
microcode updates correct processor errata, and are often important for
safe, correct system operation.

While most of the microcode updates fix problems that either happen rarely
or are related to less commonly used features, there are enough updates
fixing issues that would cause system lockup, memory corruption, and
unpredictable system behavior, to warrant taking it seriously.

Microcode updates are ephemeral: they will be lost after a system processor
hard reset or when the processor is powered off.  They must be reapplied at
every boot and after the system wakes up from suspend to RAM or to disk.

Updating the system processor microcode is the responsibility of the system
firmware (BIOS or EFI).  However, not all vendors will release timely
updates for their firmware when Intel releases updated microcode, and most
users don't update their system firmware in a timely fashion (or at all)
anyway.

The end result is that, unless some other method of distributing microcode
updates is in place, the processor in many systems will be running with
outdated microcode, increasing the chances of incorrect system operation.

Intel has made available to the general public a microcode update data file
(microcode bundle), which the operating system can use to install microcode
updates independently from any system firmware updates.  Currently, the
same data file (microcode bundle) is used to distribute microcode updates
for all Intel i686 and X86_64 processor models.


Updating the system processor microcode:

The Intel-distributed microcode bundle contains microcode update data for
several processor models.  It uses a text format which is unsuitable to be
used directly by the Linux kernel: it must be converted by an utility like
iucode_tool before Linux can use it.

Updating the processor microcode is a process that can be done at any time
(even with the system at full load), and as many times as required.  It is
strongly recommended that microcode updates be applied during early system
boot, though:

  * Microcode updates should be applied as soon as possible to
    shorten the time window where the errata fixed by the update
    could still trigger;

  * Some microcode updates can only be applied safely before the
    operating system enables more advanced processor functionality,
    otherwise that functionality must be disabled by the kernel
    (Atom PSE erratum);

  * Some microcode updates disable (faulty) functionality or make
    other "visible" changes to the processor, and must be applied
    before either the kernel or applications start using that
    functionality (e.g. Haswell Intel TSX erratum).

Therefore, one should always apply microcode updates through firmware
(BIOS/EFI) updates when possible.  Failing that, one should use the "early
initramfs" and "early microcode update driver" support in Linux v3.9 and
later.  As a last option, one can use the "late microcode update" driver,
but this one might run too late to be of any help (and it cannot safely
apply microcode updates such as the Intel Haswell TSX fix).


To apply a microcode update using the early microcode kernel driver:

 1. Arrange for iucode_tool --write-earlyfw to generate the early
    initramfs image from microcode data files.  You probably want
    to also use --scan-system to reduce the size of the generated
    early initramfs image;

 2. Either prepend the earlyfw image generated by iucode_tool to
    the initramfs, or, if your bootloader can handle it, arrange
    for it to load the early initramfs and the standard initramfs
    images in sequence;

 3. Boot the system using a suitable Linux v3.9 or later kernel,
    compiled with kconfig options CONFIG_MICROCODE_EARLY=y and
    CONFIG_MICROCODE_INTEL_EARLY=y.

 4. Ensure the late microcode update driver (microcode module) is
    either loaded or compiled in (CONFIG_MICROCODE=y), as it will
    be needed if the microcode needs to be reapplied to a processor,
    e.g. due to a suspend/resume or hibernate/resume cycle, or due
    to CPU hotplug.

This is usually handled by the Linux distro when you install microcode
update support packages.  Check your distro's documentation for details.


To apply a microcode update for an Intel system processor after the Linux
kernel boots, using the late microcode update driver (warning: this can
render the system unusable if it applies a microcode update that disables
processor features):

 ***** WARNING *****  the method below is unsafe  ***** WARNING *****

 1. Place the binary microcode in /lib/firmware/ with the correct
    file name (iucode_tool -K can do this automatically for Intel
    microcode);

 2. Trigger a microcode refresh action, either by the initial load
    of the kernel "microcode" module, or if it is already loaded,
    by running the shell commands:

    (Linux v3.6 and later)
    echo 1 > /sys/devices/system/cpu/microcode/reload

    (Linux v3.5 and earlier)
    for i in /sys/devices/system/cpu/cpu[0-9]*/microcode/reload ; do
        echo 1 2>/dev/null > "$i" || true
    done

 ***** WARNING *****  the method above is unsafe  ***** WARNING *****


Downloading the microcode update data file from Intel:

A new version of the microcode update data bundle can be downloaded
directly from Intel, by navigating to the support section looking for
downloads for your processor.  One could also search the Intel Download
Center for "microcode linux":

https://downloadcenter.intel.com/SearchResult.aspx?keyword=microcode+linux

To manually install the downloaded microcode data, unpack the archive you
got from Intel and copy the microcode-*.dat file from the archive to where
your distro expects it, e.g. /usr/share/misc/intel-microcode.dat

If your distro uses /lib/firmware to update microcode, you should instead
use "iucode_tool -K" to convert the downloaded microcode bundle to binary
firmware files.

You should make sure the microcode data is owned by root, and that it can
only be written to by root (e.g. mode 0644) for security reasons:

(example, adjust as needed for your Linux distro):

	chown root:root /usr/share/misc/intel-microcode.dat
	chmod 0644 /usr/share/misc/intel-microcode.dat

(example, if using /lib/firmware):

	chown -R root:root /lib/firmware/intel-ucode
	find /lib/firmware/intel-ucode -type d -exec chmod 0755 {} \;
	find /lib/firmware/intel-ucode -type f -exec chmod 0644 {} \;

You might have to regenerate the initramfs image to get the updated
microcode files into the initramfs.  The proper way to do this is
distro-specific.

If your distro has no use for the .dat file after you installed updated
binary files to /lib/firmware, you can remove it to save some space.


About the Intel-supplied microcode updates file:

Unfortunately, as of November 2014, Intel still does not usually publish
any information about changes to the intel-microcode.dat distribution to
the general public.  Such information may be available through restricted
developer and partner channels, though.  Very rarely, a specification
update might carry some information about the errata fixed by the latest
microcode revision.

Intel removes microcode from their public distribution regularly.  One can
theorize that removals of microcode updates for very old processors that
were distributed over a reasonable number of microcode data file releases
were done to reduce bundle file growth.  Unfortunately, such removals could
cause unnecessary regressions on very old, but still operational hardware,
so distros used on older hardware might want to still ship them.

On recent processors, Intel microcode release management can be puzzling:
Intel has often removed from the distribution microcode for recent
processors, as well as microcode that it had recently issued updates for.
Microcode version downgrades have also been observed.

We can only hope that Intel will start publishing microcode update
changelog information to the general public in the future.  This would
certainly make it easier for distros to schedule microcode updates for
their stable branches.



		   Technical details (optional reading)


Intel Microcode signatures:

Intel system processor microcode is identified by the processor signature
(a 32-bit number) and by three bits called "processor flags".  The
Microcode is often, but not always, the same among several processors that
differ only on their processor flags, and have the same processor
signature.

These signatures are useful when one wants to look for entries referring to
a specific processor in documentation, or request that iucode_tool create
microcode binary bundles for a specific set of processors.  Otherwise, you
can just ignore them as they are handled automatically by iucode_tool and
by the kernel microcode driver.

If you want to know the signature of the processors in your system, run
"iucode_tool --scan-system".  It is possible for a multiprocessor system
to contain processors with different signatures (known as mixed stepping
configurations), although this is usually not an ideal configuration.

The processor signature is returned in the EAX register from leaf 1 of the
CPUID instruction.  It contains an encoded format of the CPU stepping,
model, family and type, and a few undefined (reserved) bits that are zero
on all current Intel processors.


Listing what is inside a microcode bundle:

The microcode signatures for each microcode available in a microcode bundle
can be listed by iucode_tool:

iucode_tool -L /usr/share/misc/intel-microcode.dat

microcode bundle 1: /usr/share/misc/intel-microcode.dat
  01/001: sig 0x00000683, pf_mask 0x01, 2001-02-06, rev 0x0013, size 2048
  01/002: sig 0x00000f4a, pf_mask 0x5c, 2005-12-14, rev 0x0004, size 2048
  01/003: sig 0x00000653, pf_mask 0x04, 1999-05-20, rev 0x000b, size 2048
  ...

The first and third microcode updates are for very specific processor
models (a single combination of processor flags, each, as they only have
one bit set in the pf_mask field).  The second microcode update applies
to several processors that share the same family, model and stepping, but
have different processor flags (more than one bit set in the pf_mask
field). The processor flags and pf_mask field are explained below.


Microcode revisions:

Microcode revisions are signed 32-bit integers.  Negative revisions are
used by Intel during microcode and chip development, and will not be found
on public microcode updates: you'd usually find such microcode only in
UEFI/BIOS images, to support Engineering Sample processors.

Revision 0 is used by the system processor to signal that it is running the
factory-provided microcode (i.e. no microcode updates were installed).  No
Intel processor to date (since the Pentium Pro) is supposed to run with
factory (revision 0) microcode: a lot of functionality will be either
extremely buggy or missing entirely.

iucode_tool will list negative revisions as a large unsigned number.
However, it will prefer positive revisions over negative revisions when
selecting microcode.

microcode bundle 1: coreboot/s00040650_m00000072_rFFFF000A.fw
  01/001: sig 0x00040650, pf_mask 0x72, 2012-11-09, rev 0xffff000a, size 22528

The release dates are useful to track how old a microcode update is, but
are otherwise ignored by the kernel driver: Intel documentation clearly
states that only the revision number should be used to decide which
microcode update is more recent.


Microcode processor flags mask (pf_mask):

Some Intel processor variants may share the same processor signature, and
yet require different microcode.  These processors can be told apart by
checking their "processor flags" (bits 52, 51 and 50 of MSR 17h,
IA32_PLATFORM_ID).

              processor flags     processor flags mask
                 000b (0)            00000001b (01h)
                 001b (1)            00000010b (02h)
                 010b (2)            00000100b (04h)
                 011b (3)            00001000b (08h)
                 100b (4)            00010000b (10h)
                 101b (5)            00100000b (20h)
                 110b (6)            01000000b (40h)
                 111b (7)            10000000b (80h)

The microcode data file has a field called "processor flags mask", or
"pf_mask" for short, where a bit is set if the microcode can be applied to
a processor with that set of processor flags.  E.g. if bit 6 is set, that
microcode can be applied to a processor with the appropriate signature and
the processor flags combination 110 (in binary).

A microcode update identified by a processor flags mask of 42 (hexadecimal)
would apply to two types of processors: those with processor flags
combination 001 (binary), and also those with processor flags combination
110 (binary).

The definition of what a processor flag combination means varies with the
processor model.

Some very old processors lack processor flags support.  In that case,
microcode updates will have an empty processor flag mask (all bits clear).

When the "microcode" kernel driver is loaded, the processor flags
combination for each online processor in a system will be available through
sysfs.  These sysfs nodes follow the pattern:
/sys/devices/system/cpu/cpu*/microcode/processor_flags

NOTE: iucode_tool prefixes hexadecimal values with "0x".


Further reading:

The Intel 64 and IA-32 Architectures Software Developer's Manual, Volume
3A: System Programming Guide, Part 1 (order number 253668), section 9.11.

* Note: Intel is a registered trademark of Intel Corporation.