From owner-freebsd-current@freebsd.org Mon Sep 10 18:27:03 2018 Return-Path: Delivered-To: freebsd-current@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id AFE671098463 for ; Mon, 10 Sep 2018 18:27:03 +0000 (UTC) (envelope-from markjdb@gmail.com) Received: from mail-pf1-x434.google.com (mail-pf1-x434.google.com [IPv6:2607:f8b0:4864:20::434]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client CN "smtp.gmail.com", Issuer "Google Internet Authority G3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 385028EEF4 for ; Mon, 10 Sep 2018 18:27:03 +0000 (UTC) (envelope-from markjdb@gmail.com) Received: by mail-pf1-x434.google.com with SMTP id j26-v6so10885046pfi.10 for ; Mon, 10 Sep 2018 11:27:03 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=sender:date:from:to:subject:message-id:mime-version :content-disposition:user-agent; bh=E8SpR3QIqrVoLeQzmWDzGbCBUMe8SW9kNTj2S+zrfMM=; b=Wp6mkci8fy06vdQO0O6hU9iJ7+korW0Xbt9TDqHDbXGC+vbPMHxzvXIYv0VY1jG0aD 8APp2ORbaK8jvmuxgHBiDPK5gfiCmvdoS3Wa45nyRInH8fh+TEdGkgaHRxW901m5ifth KtViH+EB2PNkbBEPHn/va5g6l3drVZ5ayaX0xJv/+1Mp5gLNz9diEYrtjiEidYWsxnpZ NU9ej//FEy2x2535qjyP1Xihon94pwsVYx0TN64XWIKDAB6MlKaOdPqEe/8MCwHhMEiG POZNZdftA0uNj73MNgSSDDnlB/fpEJUoFjI/CvWLankhLM0dMXhxI6DrIXx+9HTfR9C6 N+Ng== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:sender:date:from:to:subject:message-id :mime-version:content-disposition:user-agent; bh=E8SpR3QIqrVoLeQzmWDzGbCBUMe8SW9kNTj2S+zrfMM=; b=FtH4OvgSHSt78UqCiIr0LuoIUUF9F3OZfpKYQ5GNfMpBmW/15+6x/bGEdiuVNskvNi m15XWf3DK6qQDloMQUF883epO/zTLrPHqFs8bQZJ4vKVs5nI3Y/guJbpQHi2VyOmrMjC dzNKWlwwoRHzRAWJipokDNid66yXeu9xE576/lYMvp1ikyTfPwISetEd724U9hyTv3zD wielBCLwHndSVYZ/UxOSR6JCWXajfTQgnhgzgdJ2Egx+IwXcUpAV5/EBe0HQj7XbHbeH mKTk7rFT8r57W7im9Vof/BNndGn6Ot2TuTDJH7aDPHvvEr/dxYINVYNrngN817bEfbV7 3r3g== X-Gm-Message-State: APzg51C1q9lRJEO4ptB66oflSxjIusoe4XCZGIqRC0hv+PbROJntE4wQ eCDmgIvlU57jjrmEzGZBTIMJWJsZ X-Google-Smtp-Source: ANB0Vdb5O+DmA7NTGhVestr3RxP+PW2CRbUYXiHkmnxuAk9rO77sIuy8azHrfCj0iQbpISXp55WD6g== X-Received: by 2002:a62:cdcf:: with SMTP id o198-v6mr25274782pfg.12.1536604021759; Mon, 10 Sep 2018 11:27:01 -0700 (PDT) Received: from raichu (toroon0560w-lp130-01-174-88-78-8.dsl.bell.ca. [174.88.78.8]) by smtp.gmail.com with ESMTPSA id 70-v6sm23971428pfz.27.2018.09.10.11.27.00 for (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Mon, 10 Sep 2018 11:27:00 -0700 (PDT) Sender: Mark Johnston Date: Mon, 10 Sep 2018 14:26:55 -0400 From: Mark Johnston To: freebsd-current@freebsd.org Subject: testing early microcode loading Message-ID: <20180910182655.GA2849@raichu> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline User-Agent: Mutt/1.10.1 (2018-07-13) X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.27 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 10 Sep 2018 18:27:03 -0000 Hi, Support for boot-time loading of Intel microcode updates has landed in the kernel in r337715, and in the sysutils/devcpu-data port as of 1.20. I'd like to solicit some testing of the feature ahead of 12.0. The port has been modified to install /boot/firmware/intel-ucode.bin. This file contains a copy of every Intel microcode update supplied by the port. Per the pkg-message, one can enable early loading of this file by specifying: cpu_microcode_load="YES" cpu_microcode_name="/boot/firmware/intel-ucode.bin" in loader.conf. The update will be applied upon a subsequent reboot. Testing consists of enabling early loading and verifying that the CPUs report an updated microcode version. If early loading fails, a message is printed to the dmesg. If your system is capable of successful ACPI suspend/resume, it is useful to also verify that the microcode remains updated following a resume. To fetch the current microcode version, use sysutils/x86info: # kldload -n cpuctl && x86info -a | grep Micro Microcode version: 0x0000000000000020 Compare with the version installed by the microcode_update rc script at run-time: # service microcode_update onestart Updating CPU Microcode... Done. # kldload -n cpuctl && x86info -a | grep Micro Microcode version: 0x0000000000000020 If your testing indicates that the boot-time loading method doesn't work, please include the dmesg in your reply. Thanks in advance.