From nobody Thu May 2 20:06:22 2024 Delivered-To: importer@patchew.org Received-SPF: pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) client-ip=192.237.175.120; envelope-from=xen-devel-bounces@lists.xenproject.org; helo=lists.xenproject.org; Authentication-Results: mx.zohomail.com; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; dmarc=fail(p=none dis=none) header.from=citrix.com ARC-Seal: i=1; a=rsa-sha256; t=1591018878; cv=none; d=zohomail.com; s=zohoarc; b=FMAW0amRR8/3roCUz4MWFzbc4Qyka1Imq4/AXwI9cYQEKXSDKmFMvSMaezNKA9IR2vzJfLRuyYSm2dNKx5dzuBVLHmnMjQgB60LMeV8Ak6N79L6d4jFn65qu8hnzPC0hqsMpa3LOHKG9FL06C2lHTnGm1/bgVbppO0/U50s70dE= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1591018878; h=Content-Type:Cc:Date:From:List-Subscribe:List-Post:List-Id:List-Help:List-Unsubscribe:MIME-Version:Message-ID:Sender:Subject:To; bh=q2vAgV5HUAvRlPiX3m7jj+T+bBOsAywP4UhcNrRQY0s=; b=iS9Zk9GCdCKmqYsWn1xC6lub2ih29xmW7N6iLPAURA1N2VeLh4t6hGrxy8njzwwWyp8/oDaOOFGPMhcTqn4PwmYgakYtyUzwa9uHS9EzHZLu44TwBmn2sdHjU4dfaLlIP3nc6NQQREiFILfh8fRGDdjWRik9zV18fo1bgnhnv4M= ARC-Authentication-Results: i=1; mx.zohomail.com; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; dmarc=fail header.from= (p=none dis=none) header.from= Return-Path: Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) by mx.zohomail.com with SMTPS id 1591018878827527.5030607641512; Mon, 1 Jun 2020 06:41:18 -0700 (PDT) Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1jfkgV-0001E7-2T; Mon, 01 Jun 2020 13:40:59 +0000 Received: from us1-rack-iad1.inumbo.com ([172.99.69.81]) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1jfkgT-0001E2-D3 for xen-devel@lists.xenproject.org; Mon, 01 Jun 2020 13:40:57 +0000 Received: from esa4.hc3370-68.iphmx.com (unknown [216.71.155.144]) by us1-rack-iad1.inumbo.com (Halon) with ESMTPS id 84e9b336-a40d-11ea-81bc-bc764e2007e4; Mon, 01 Jun 2020 13:40:56 +0000 (UTC) X-Inumbo-ID: 84e9b336-a40d-11ea-81bc-bc764e2007e4 Authentication-Results: esa4.hc3370-68.iphmx.com; dkim=none (message not signed) header.i=none IronPort-SDR: EiEC/4LNeYzNvajZEdL3Yks2kRlluXttvjFpXKdHb7DO0ZMwGZoFv6vXdEGnI43ZsuBkXp6oG9 X5h6LMaGyEg0QQCDGSfXrMx+6HNtG5xQEqGw3YiIkEJswL6NlEuv2plg+U4QrTvpA3ueqZZivg I4sfJ83kT+H4K56t0xe53B4C23kHA5qeN1KeHy4sMMClQ8sAEVeWG0q/t7OW6XCxBZfORqQay4 uAGPFyWcsY3bWVY2ndCWps9y9He5bu9b5suoPwI3pkzpcA4ODVLhdM8bqg8E2AFkV/OdRnhZa8 q0I= X-SBRS: 2.7 X-MesageID: 19661962 X-Ironport-Server: esa4.hc3370-68.iphmx.com X-Remote-IP: 162.221.158.21 X-Policy: $RELAYED X-IronPort-AV: E=Sophos;i="5.73,460,1583211600"; d="scan'208";a="19661962" From: Andrew Cooper To: Xen-devel Subject: [PATCH for-4.14] docs/ucode: Extend runtime microcode loading documentation Date: Mon, 1 Jun 2020 14:40:25 +0100 Message-ID: <20200601134025.24142-1-andrew.cooper3@citrix.com> X-Mailer: git-send-email 2.11.0 MIME-Version: 1.0 X-BeenThere: xen-devel@lists.xenproject.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Cc: Stefano Stabellini , Julien Grall , Wei Liu , Konrad Rzeszutek Wilk , George Dunlap , Andrew Cooper , Paul Durrant , Jan Beulich , Ian Jackson Errors-To: xen-devel-bounces@lists.xenproject.org Sender: "Xen-devel" Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8" Extend the disclaimer about runtime loading. While we've done our best to make the mechaism reliable, the safety of late loading does ultimately depe= nd on the contents of the blobs. Extend the xen-ucode portion with examples of how to use it. Signed-off-by: Andrew Cooper Reviewed-by: Jan Beulich Reviewed-by: Roger Pau Monn=C3=A9 --- CC: George Dunlap CC: Ian Jackson CC: Jan Beulich CC: Konrad Rzeszutek Wilk CC: Stefano Stabellini CC: Wei Liu CC: Julien Grall CC: Paul Durrant --- docs/admin-guide/microcode-loading.rst | 22 +++++++++++++++++++--- 1 file changed, 19 insertions(+), 3 deletions(-) diff --git a/docs/admin-guide/microcode-loading.rst b/docs/admin-guide/micr= ocode-loading.rst index 5f0f661a2e..8cd5d0351b 100644 --- a/docs/admin-guide/microcode-loading.rst +++ b/docs/admin-guide/microcode-loading.rst @@ -104,8 +104,8 @@ modules to find any CPIO archives, and search the archi= ve for the applicable file. Xen will stop searching at the first match. =20 =20 -Run time microcode loading --------------------------- +Runtime microcode loading +------------------------- =20 .. warning:: =20 @@ -113,7 +113,23 @@ Run time microcode loading or at boot time. Not all microcode updates (or parts thereof) can be applied at runtime. =20 -The ``xen-ucode`` utility can be used to initiate a runtime microcode load. + Given the proprietry nature of microcode, we are unable to make any cla= im + that a runtime microcode is risk-free. Any runtime microcode loading n= eeds + adequate testing on a dev instance before being rolled out to production + systems. + +The ``xen-ucode`` utility can be used to initiate a runtime microcode load= :: + + [root@host ~]# xen-ucode + xen-ucode: Xen microcode updating tool + Usage: xen-ucode + [root@host ~]# + +e.g. With a Linux dom0 on a Haswell system:: + + [root@host ~]# xen-ucode /lib/firmware/intel-ucode/06-3c-03 + [root@host ~]# + It will pass the blob to Xen, which will check to see whether the blob is correct for the processor, and newer than the running microcode. =20 --=20 2.11.0