[PATCH 0/5] Adding more robustness to microcode loading
From: Ashok Raj
Date: Sat Aug 13 2022 - 18:38:58 EST
Hi Boris and Thomas,
This is an attempt to move towards enabling late-load ON by default, and if
the taint flag can be removed after this patch series.
- Patch1: Documentation improvements. (to tainted-kernels.rst) and
x86/microcode.rst.
- Patch2: (Intel) Fix in patch-match during an update left the old patch still in
the list. This isn't necessary.
- Patch3: One key improvement is the addition of min_rev_id in the
microcode header. This allows a way for CPU microcode to declare itself
if this is suitable for late-loads.
- Patch4: Avoid any MCE's while a microcode update is in progress. This
basically promotes any arriving MCE's to shutdown automatically.
- Patch5: Protect the secondary thread from entering NMI before a microcode
update is complete in the primary thread.
Ashok Raj (5):
x86/microcode: Add missing documentation that late-load will taint
kernel
x86/microcode/intel: Check against CPU signature before saving
microcode
x86/microcode/intel: Allow a late-load only if a min rev is specified
x86/microcode: Avoid any chance of MCE's during microcode update
x86/microcode: Handle NMI's during microcode update.
Documentation/admin-guide/tainted-kernels.rst | 8 +-
Documentation/x86/microcode.rst | 95 +++++++++++++++++-
arch/x86/include/asm/mce.h | 4 +
arch/x86/include/asm/microcode_intel.h | 4 +-
arch/x86/kernel/cpu/mce/core.c | 9 ++
arch/x86/kernel/cpu/microcode/core.c | 99 ++++++++++++++++++-
arch/x86/kernel/cpu/microcode/intel.c | 34 ++++++-
7 files changed, 240 insertions(+), 13 deletions(-)
--
2.32.0