import microcode_ctl-20210216-1.el8

This commit is contained in:
CentOS Sources 2021-02-18 06:11:36 +00:00 committed by Andrew Lukoshko
parent 65fa6af4ac
commit a96ab2f5be
8 changed files with 34 additions and 190 deletions

6
.gitignore vendored
View File

@ -1,10 +1,8 @@
SOURCES/06-2d-07 SOURCES/06-2d-07
SOURCES/06-4e-03 SOURCES/06-4e-03
SOURCES/06-55-04 SOURCES/06-55-04
SOURCES/06-55-04.20190918
SOURCES/06-55-06
SOURCES/06-55-07
SOURCES/06-5e-03 SOURCES/06-5e-03
SOURCES/06-8c-01
SOURCES/microcode-20190918.tar.gz SOURCES/microcode-20190918.tar.gz
SOURCES/microcode-20191115.tar.gz SOURCES/microcode-20191115.tar.gz
SOURCES/microcode-20201112.tar.gz SOURCES/microcode-20210216.tar.gz

View File

@ -1,10 +1,8 @@
bcf2173cd3dd499c37defbc2533703cfa6ec2430 SOURCES/06-2d-07 bcf2173cd3dd499c37defbc2533703cfa6ec2430 SOURCES/06-2d-07
06432a25053c823b0e2a6b8e84e2e2023ee3d43e SOURCES/06-4e-03 06432a25053c823b0e2a6b8e84e2e2023ee3d43e SOURCES/06-4e-03
5f18f985f6d5ad369b5f6549b7f3ee55acaef967 SOURCES/06-55-04 2e405644a145de0f55517b6a9de118eec8ec1e5a SOURCES/06-55-04
2e405644a145de0f55517b6a9de118eec8ec1e5a SOURCES/06-55-04.20190918
8affd949151a0badd3f71e23cf9ad668d4c1d82f SOURCES/06-55-06
a7121c5f49753cc783f82135e268bc4efe85d4be SOURCES/06-55-07
86c60ee7d5d0d7115a4962c1c61ceecb0fd3a95a SOURCES/06-5e-03 86c60ee7d5d0d7115a4962c1c61ceecb0fd3a95a SOURCES/06-5e-03
2204a6dee1688980cd228268fdf4b6ed5904fe04 SOURCES/06-8c-01
bc20d6789e6614b9d9f88ee321ab82bed220f26f SOURCES/microcode-20190918.tar.gz bc20d6789e6614b9d9f88ee321ab82bed220f26f SOURCES/microcode-20190918.tar.gz
774636f4d440623b0ee6a2dad65260e81208074d SOURCES/microcode-20191115.tar.gz 774636f4d440623b0ee6a2dad65260e81208074d SOURCES/microcode-20191115.tar.gz
010507b8a7ca0b5c4a01cd1f8a6adae5f0fd316d SOURCES/microcode-20201112.tar.gz 26608161d98c3d0c965fc41856520434b14c000d SOURCES/microcode-20210216.tar.gz

View File

@ -10,12 +10,7 @@ Since revision 0x2006906 (included with the microcode-20200609 release)
it is reported that the issue is no longer present, so the newer microcode it is reported that the issue is no longer present, so the newer microcode
revision is enabled by default now (but can be disabled explicitly; see below). revision is enabled by default now (but can be disabled explicitly; see below).
Revision 0x2006a08 (included since the microcode-20201110 release) exhibits
a different issue on some systems, so it is controlled by 06-55-0x-ipu-2020.2
caveat; please refer to [2] for details.
[1] https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/issues/21 [1] https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/issues/21
[2] /usr/share/doc/microcode_ctl/caveats/06-55-0x-ipu-2020.2_readme
For the reference, SHA1 checksums of 06-55-04 microcode files containing For the reference, SHA1 checksums of 06-55-04 microcode files containing
microcode revisions in question are listed below: microcode revisions in question are listed below:
@ -23,6 +18,7 @@ microcode revisions in question are listed below:
* 06-55-04, revision 0x2000065: f27f12b9d53f492c297afd856cdbc596786fad23 * 06-55-04, revision 0x2000065: f27f12b9d53f492c297afd856cdbc596786fad23
* 06-55-04, revision 0x2006906: 5f18f985f6d5ad369b5f6549b7f3ee55acaef967 * 06-55-04, revision 0x2006906: 5f18f985f6d5ad369b5f6549b7f3ee55acaef967
* 06-55-04, revision 0x2006a08: 4059fb1f60370297454177f63cd7cc20b3fa1212 * 06-55-04, revision 0x2006a08: 4059fb1f60370297454177f63cd7cc20b3fa1212
* 06-55-04, revision 0x2006a0a: 7ec27025329c82de9553c14a78733ad1013e5462
Please contact your system vendor for a BIOS/firmware update that contains Please contact your system vendor for a BIOS/firmware update that contains
the latest microcode version. For the information regarding microcode versions the latest microcode version. For the information regarding microcode versions

View File

@ -1,20 +0,0 @@
path intel-ucode/*
vendor GenuineIntel
## It is deemed that blocking the SKX/CLX microcode update on all hardware
## in cases where no model filter is used is too broad, hence
## no-model-mode=success.
## https://bugzilla.redhat.com/1902884 https://bugzilla.redhat.com/1905111
dmi mode=fail-equal no-model-mode=success key=product_name val="Superdome Flex"
## https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/issues/45
dmi mode=fail-equal no-model-mode=success key=product_name val="SYS-2029TP-HTR/X11DPT-PS"
## The "kernel_early" statements are carried over from the intel caveat config
## in order to avoid enabling this newer microcode on these problematic kernels;
## see the caveat description in /usr/share/doc/microcode_ctl/caveats/intel_readme
## (That also means that this caveat has to be enforced separately on these
## kernels.)
kernel_early 4.10.0
kernel_early 3.10.0-930
kernel_early 3.10.0-862.14.1
kernel_early 3.10.0-693.38.1
kernel_early 3.10.0-514.57.1
kernel_early 3.10.0-327.73.1

View File

@ -1,6 +0,0 @@
Latest microcode updates for Intel Skylake/Cascade Lake Scalable Platform CPUs
(family 6, model 85, steppings 4, 6, and 7; CPUID 0x50654/0x50656/0x50657)
are disabled on some systems as these updates may cause system instability;
microcode from the previous microcode-20200609 release is used instead.
Please refer to /usr/share/doc/microcode_ctl/caveats/06-55-0x-ipu-2020.2_readme
and /usr/share/doc/microcode_ctl/README.caveats for details.

View File

@ -1,83 +0,0 @@
Latest microcode updates for Intel Skylake/Cascade Lake Scalable Platform CPUs
(family 6, model 85, steppings 4, 6, and 7; CPUID 0x50654/0x50656/0x50657)
may cause system instability on some systems, namely, HPE Superdome Flex
and Supermicro systems, when an update is performed with the resivions
that come with microcode-20201110 release, so the previously released microcode
(with revisions 0x2006906, 0x4001f01, and 0x5002f01, respectively)
from microcode-20200609 release are used on these systems by default instead
for the OS-driven microcode update.
For the reference, SHA1 checksums of the relevant microcode files containing
microcode revisions in question are listed below:
* 06-55-04, revision 0x2006906: 5f18f985f6d5ad369b5f6549b7f3ee55acaef967
* 06-55-04, revision 0x2006a08: 4059fb1f60370297454177f63cd7cc20b3fa1212
* 06-55-06, revision 0x4004f01: 8affd949151a0badd3f71e23cf9ad668d4c1d82f
* 06-55-06, revision 0x4003003: b187866d2570f90ea69f434c2b012a8c88d85f43
* 06-55-07, revision 0x5002f01: a7121c5f49753cc783f82135e268bc4efe85d4be
* 06-55-07, revision 0x5003003: 74e129b108e676f0286742f609b2c1fa65d73db1
Please contact your system vendor for a BIOS/firmware update that contains
the latest microcode version. For the information regarding microcode versions
required for mitigating specific side-channel cache attacks, please refer
to the following knowledge base articles:
* CVE-2020-8695 (Information disclosure issue in Intel SGX via RAPL interface),
CVE-2020-8696 (Vector Register Leakage-Active),
CVE-2020-8698 (Fast Forward Store Predictor):
https://access.redhat.com/articles/5569051
The information regarding enforcing microcode update is provided below.
To enforce usage of the latest microcode revision for a specific kernel
version, please create a file "force-intel-06-55-0x-ipu-2020.2" inside
/lib/firmware/<kernel_version> directory, run
"/usr/libexec/microcode_ctl/update_ucode" to add it to firmware directory
where microcode will be available for late microcode update, and run
"dracut -f --kver <kernel_version>", so initramfs for this kernel version
is regenerated and the microcode can be loaded early, for example:
touch /lib/firmware/3.10.0-862.9.1/force-intel-06-55-0x-ipu-2020.2
/usr/libexec/microcode_ctl/update_ucode
dracut -f --kver 3.10.0-862.9.1
After that, it is possible to perform a late microcode update by executing
"/usr/libexec/microcode_ctl/reload_microcode" or by writing value "1" to
"/sys/devices/system/cpu/microcode/reload" directly.
To disallow usage of the latest microcode revision for a specific kernel
version, please create a file "disallow-intel-06-55-0x-ipu-2020.2" inside
/lib/firmware/<kernel_version> directory, run
"/usr/libexec/microcode_ctl/update_ucode" to update firmware directory
used for late microcode updates, and run "dracut -f --kver <kernel_version>",
so initramfs for this kernel version is regenerated, for example:
touch /lib/firmware/3.10.0-862.9.1/disallow-intel-06-55-0x-ipu-2020.2
/usr/libexec/microcode_ctl/update_ucode
dracut -f --kver 3.10.0-862.9.1
To enforce addition of this microcode for all kernels, please create a file
"/etc/microcode_ctl/ucode_with_caveats/force-intel-06-55-0x-ipu-2020.2", run
"/usr/libexec/microcode_ctl/update_ucode" for enabling late microcode updates,
and "dracut -f --regenerate-all" for enabling early microcode updates:
mkdir -p /etc/microcode_ctl/ucode_with_caveats
touch /etc/microcode_ctl/ucode_with_caveats/force-intel-06-55-0x-ipu-2020.2
/usr/libexec/microcode_ctl/update_ucode
dracut -f --regenerate-all
To disallow usage of the latest microcode revision for all kernels, please
create a file
"/etc/microcode_ctl/ucode_with_caveats/disallow-intel-06-55-0x-ipu-2020.2",
run "/usr/libexec/microcode_ctl/update_ucode" to update firmware directories
used for late microcode updates, and run "dracut -f --regenerate-all"
so initramfs images get regenerated, for example:
mkdir -p /etc/microcode_ctl/ucode_with_caveats
touch /etc/microcode_ctl/ucode_with_caveats/disallow-intel-06-55-0x-ipu-2020.2
/usr/libexec/microcode_ctl/update_ucode
dracut -f --regenerate-all
Please refer to /usr/share/doc/microcode_ctl/README.caveats for additional
information.

View File

@ -560,11 +560,6 @@ to enable ability to disable it in case such a need arises. (See the sections
"check_caveats script" and "reload_microcode script" for details regarding "check_caveats script" and "reload_microcode script" for details regarding
caveats mechanism operation.) caveats mechanism operation.)
Revision 0x2006a08 (included since the microcode-20201110 release) exhibits
a different issue on some systems, so it is controlled by 06-55-0x-ipu-2020.2
caveat; please refer to the "Intel Skylake-SP and Cascade Lake-SP
microcode-20201110 caveats" section for details.
[1] https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/issues/21 [1] https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/issues/21
Caveat name: intel-06-55-04 Caveat name: intel-06-55-04
@ -576,28 +571,6 @@ previously published microcode revision 0x2000064 is still available
as a fallback as part of "intel" caveat. as a fallback as part of "intel" caveat.
Intel Skylake-SP and Cascade Lake-SP microcode-20201110 caveats
---------------------------------------------------------------
Latest microcode updates for Intel Skylake/Cascade Lake Scalable Platform CPUs
(family 6, model 85, steppings 4, 6, and 7; CPUID 0x50654/0x50656/0x50657)
may cause system instability on some systems (there were reports for HPE
Superdome Flex and Supermicro systems[1]) with the resivions that come
with microcode-20201110 release, so the previously released microcode
(with revisions 0x2006906, 0x4001f01, and 0x5002f01, respectively)
from microcode-20200609 release are used by default instead for the OS-driven
microcode update.
[1] https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/issues/45
Caveat name: intel-06-55-0x-ipu-2020.2
Affected microcode: intel-ucode/06-55-04, intel-ucode/06-55-06,
intel-ucode/06-55-07
Mitigation: previously published microcode files (revision 0x2006906 for 06-55-04,
0x4002f01 for 06-55-06, 0x5002f01 for 06-55-07) are used by default.
Intel Skylake-U/Y/H/S/Xeon E3 v5 caveats Intel Skylake-U/Y/H/S/Xeon E3 v5 caveats
---------------------------------------- ----------------------------------------
Some Intel Skylake CPU models (SKL-U/Y, family 6, model 78, stepping 3; Some Intel Skylake CPU models (SKL-U/Y, family 6, model 78, stepping 3;

View File

@ -1,4 +1,4 @@
%define intel_ucode_version 20201112 %define intel_ucode_version 20210216
%global debug_package %{nil} %global debug_package %{nil}
%define caveat_dir %{_datarootdir}/microcode_ctl/ucode_with_caveats %define caveat_dir %{_datarootdir}/microcode_ctl/ucode_with_caveats
@ -13,7 +13,7 @@
Summary: CPU microcode updates for Intel x86 processors Summary: CPU microcode updates for Intel x86 processors
Name: microcode_ctl Name: microcode_ctl
Version: %{intel_ucode_version} Version: %{intel_ucode_version}
Release: 2%{?dist} Release: 1%{?dist}
Epoch: 4 Epoch: 4
License: CC0 and Redistributable, no modification permitted License: CC0 and Redistributable, no modification permitted
URL: https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files URL: https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files
@ -23,7 +23,7 @@ Source0: https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Fi
Source2: https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/raw/microcode-20190514/intel-ucode/06-2d-07 Source2: https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/raw/microcode-20190514/intel-ucode/06-2d-07
# (Pre-20191112) revision 0x2000064 of 06-55-04 microcode # (Pre-20191112) revision 0x2000064 of 06-55-04 microcode
Source3: https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/raw/microcode-20190918/intel-ucode/06-55-04#/06-55-04.20190918 Source3: https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/raw/microcode-20190918/intel-ucode/06-55-04
# (Pre-20200609) revision 0xd6 of 06-4e-03/06-5e-03 microcode # (Pre-20200609) revision 0xd6 of 06-4e-03/06-5e-03 microcode
Source4: https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/raw/microcode-20200520/intel-ucode/06-4e-03 Source4: https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/raw/microcode-20200520/intel-ucode/06-4e-03
@ -33,16 +33,15 @@ Source5: https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Fi
Source6: https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/archive/microcode-20190918.tar.gz Source6: https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/archive/microcode-20190918.tar.gz
# microcode-20191115 release,containing revision 0xca of 06-[89]e-0X microcode # microcode-20191115 release,containing revision 0xca of 06-[89]e-0X microcode
Source7: https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/archive/microcode-20191115.tar.gz Source7: https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/archive/microcode-20191115.tar.gz
# microcode-20201118 has removed 06-8c-01/0x80 (TGL-UP3/UP4 B1) microcode update
# at revision 0x68; it is, however, may still be useful for some[1], so it is
# to be preserved in a caveat.
# [1] https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/issues/39
Source8: https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/raw/microcode-20201112/intel-ucode/06-8c-01
# (Pre-20201110) revision 0x2006906 of 06-55-04/0xb7 microcode
Source8: https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/raw/microcode-20200609/intel-ucode/06-55-04
# (Pre-20201110) revision 0x4002f01 of 06-55-06/0xbf microcode
Source9: https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/raw/microcode-20200609/intel-ucode/06-55-06
# (Pre-20201110) revision 0x5002f01 of 06-55-07/0xbf microcode
Source10: https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/raw/microcode-20200609/intel-ucode/06-55-07
# systemd unit # systemd unit
Source15: microcode.service Source10: microcode.service
# dracut-related stuff # dracut-related stuff
Source20: 01-microcode.conf Source20: 01-microcode.conf
@ -82,7 +81,6 @@ Source122: 06-2d-07_disclaimer
# SKL-SP/W/X (CPUID 0x50654) post-20191112 hangs # SKL-SP/W/X (CPUID 0x50654) post-20191112 hangs
# https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/issues/21 # https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/issues/21
# It is still preerved due to https://bugzilla.redhat.com/1908432
Source130: 06-55-04_readme Source130: 06-55-04_readme
Source131: 06-55-04_config Source131: 06-55-04_config
Source132: 06-55-04_disclaimer Source132: 06-55-04_disclaimer
@ -123,14 +121,6 @@ Source180: 06-8c-01_readme
Source181: 06-8c-01_config Source181: 06-8c-01_config
Source182: 06-8c-01_disclaimer Source182: 06-8c-01_disclaimer
# SKX-SP/CLX-SP (CPUID 0x50654/0x50656/0x50657)
# IPU 2020.2 HPE Superdome issue
# https://bugzilla.redhat.com/show_bug.cgi?id=1902884
# https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/issues/45
Source190: 06-55-0x-ipu-2020.2_readme
Source191: 06-55-0x-ipu-2020.2_config
Source192: 06-55-0x-ipu-2020.2_disclaimer
# "Provides:" RPM tags generator # "Provides:" RPM tags generator
Source1000: gen_provides.sh Source1000: gen_provides.sh
Source1001: codenames.list Source1001: codenames.list
@ -167,16 +157,9 @@ is no longer used for microcode upload and, as a result, no longer provided.
mv intel-ucode/06-2d-07 intel-ucode-with-caveats/ mv intel-ucode/06-2d-07 intel-ucode-with-caveats/
cp "%{SOURCE2}" intel-ucode/ cp "%{SOURCE2}" intel-ucode/
# replacing SKX/CLX (CPUID 0x50654/0x50656/0x50657) microcode with pre-20201110
# versions
# placing this caveat because the older 06-55-04 one in order to preserve
# mv/cp command pattern
mv intel-ucode/06-55-0[467] intel-ucode-with-caveats/
cp "%{SOURCE8}" "%{SOURCE9}" "%{SOURCE10}" intel-ucode/
# replacing SKL-SP/W/X (CPUID 0x50654) microcode with pre-20191112 version # replacing SKL-SP/W/X (CPUID 0x50654) microcode with pre-20191112 version
mv intel-ucode/06-55-04 intel-ucode-with-caveats/06-55-04.20200609 mv intel-ucode/06-55-04 intel-ucode-with-caveats/
cp "%{SOURCE3}" intel-ucode/06-55-04 cp "%{SOURCE3}" intel-ucode/
# replacing SKL-U/Y (CPUID 0x4063e) microcode with pre-20200609 version # replacing SKL-U/Y (CPUID 0x4063e) microcode with pre-20200609 version
mv intel-ucode/06-4e-03 intel-ucode-with-caveats/ mv intel-ucode/06-4e-03 intel-ucode-with-caveats/
@ -199,7 +182,7 @@ tar xvvf "%{SOURCE7}" --wildcards --strip-components=2 \
popd popd
# Moving 06-8c-01 microcode to intel-ucode-with-caveats # Moving 06-8c-01 microcode to intel-ucode-with-caveats
mv intel-ucode/06-8c-01 intel-ucode-with-caveats/ cp "%{SOURCE8}" intel-ucode-with-caveats/
: :
@ -211,7 +194,7 @@ install -m 755 -d \
# systemd unit # systemd unit
install -m 755 -d "%{buildroot}/%{_unitdir}" install -m 755 -d "%{buildroot}/%{_unitdir}"
install -m 644 "%{SOURCE15}" -t "%{buildroot}/%{_unitdir}/" install -m 644 "%{SOURCE10}" -t "%{buildroot}/%{_unitdir}/"
# dracut # dracut
%define dracut_mod_dir "%{buildroot}/%{dracutlibdir}/modules.d/99microcode_ctl-fw_dir_override" %define dracut_mod_dir "%{buildroot}/%{dracutlibdir}/modules.d/99microcode_ctl-fw_dir_override"
@ -250,7 +233,7 @@ install -m 644 releasenote.md \
# caveats # caveats
install -m 644 "%{SOURCE100}" "%{SOURCE110}" "%{SOURCE120}" "%{SOURCE130}" \ install -m 644 "%{SOURCE100}" "%{SOURCE110}" "%{SOURCE120}" "%{SOURCE130}" \
"%{SOURCE140}" "%{SOURCE150}" "%{SOURCE160}" "%{SOURCE170}" \ "%{SOURCE140}" "%{SOURCE150}" "%{SOURCE160}" "%{SOURCE170}" \
"%{SOURCE180}" "%{SOURCE190}" \ "%{SOURCE180}" \
-t "%{buildroot}/%{_pkgdocdir}/caveats/" -t "%{buildroot}/%{_pkgdocdir}/caveats/"
@ -283,7 +266,7 @@ install -m 644 "%{SOURCE122}" "%{snb_inst_dir}/disclaimer"
# SKL-SP caveat # SKL-SP caveat
%define skl_sp_inst_dir %{buildroot}/%{caveat_dir}/intel-06-55-04/ %define skl_sp_inst_dir %{buildroot}/%{caveat_dir}/intel-06-55-04/
install -m 755 -d "%{skl_sp_inst_dir}/intel-ucode" install -m 755 -d "%{skl_sp_inst_dir}/intel-ucode"
install -m 644 intel-ucode-with-caveats/06-55-04.20200609 "%{skl_sp_inst_dir}/intel-ucode/06-55-04" install -m 644 intel-ucode-with-caveats/06-55-04 -t "%{skl_sp_inst_dir}/intel-ucode/"
install -m 644 "%{SOURCE130}" "%{skl_sp_inst_dir}/readme" install -m 644 "%{SOURCE130}" "%{skl_sp_inst_dir}/readme"
install -m 644 "%{SOURCE131}" "%{skl_sp_inst_dir}/config" install -m 644 "%{SOURCE131}" "%{skl_sp_inst_dir}/config"
install -m 644 "%{SOURCE132}" "%{skl_sp_inst_dir}/disclaimer" install -m 644 "%{SOURCE132}" "%{skl_sp_inst_dir}/disclaimer"
@ -328,14 +311,6 @@ install -m 644 "%{SOURCE180}" "%{tgl_inst_dir}/readme"
install -m 644 "%{SOURCE181}" "%{tgl_inst_dir}/config" install -m 644 "%{SOURCE181}" "%{tgl_inst_dir}/config"
install -m 644 "%{SOURCE182}" "%{tgl_inst_dir}/disclaimer" install -m 644 "%{SOURCE182}" "%{tgl_inst_dir}/disclaimer"
# SKX-SP/CLX-SP HPE Superdome caveat
%define skx_clx_inst_dir %{buildroot}/%{caveat_dir}/intel-06-55-0x-ipu-2020.2/
install -m 755 -d "%{skx_clx_inst_dir}/intel-ucode"
install -m 644 intel-ucode-with-caveats/06-55-0[467] -t "%{skx_clx_inst_dir}/intel-ucode/"
install -m 644 "%{SOURCE190}" "%{skx_clx_inst_dir}/readme"
install -m 644 "%{SOURCE191}" "%{skx_clx_inst_dir}/config"
install -m 644 "%{SOURCE192}" "%{skx_clx_inst_dir}/disclaimer"
# SUMMARY.intel-ucode generation # SUMMARY.intel-ucode generation
# It is to be done only after file population, so, it is here, # It is to be done only after file population, so, it is here,
# at the end of the install stage # at the end of the install stage
@ -573,6 +548,19 @@ rm -rf %{buildroot}
%changelog %changelog
* Wed Feb 17 2021 Eugene Syromiatnikov <esyr@redhat.com> - 4:20210216-1
- Update Intel CPU microcode to microcode-20210216 release (#1902884):
- Update of 06-55-04/0xb7 (SKX-D/SP/W/X H0/M0/M1/U0) microcode (in
intel-06-55-04/intel-ucode/06-55-04) from revision 0x2006a08 up
to 0x2006a0a;
- Update of 06-55-06/0xbf (CLX-SP B0) microcode from revision 0x4003003
up to 0x4003006;
- Update of 06-55-07/0xbf (CLX-SP/W/X B1/L1) microcode from revision
0x5003003 up to 0x5003006.
* Wed Feb 17 2021 Eugene Syromiatnikov <esyr@redhat.com> - 4:20201112-3
- Remove 06-55-04/06-55-06/06-55-07 (SKX-SP/CLX-SP) microcode-20201110 caveats.
* Tue Dec 01 2020 Eugene Syromiatnikov <esyr@redhat.com> - 4:20201112-2 * Tue Dec 01 2020 Eugene Syromiatnikov <esyr@redhat.com> - 4:20201112-2
- Do not use "grep -q" in a pipe in check_caveats (#1902021). - Do not use "grep -q" in a pipe in check_caveats (#1902021).
- Add 06-55-04/06-55-06/06-55-07 (SKX-SP/CLX-SP) microcode-20201110 caveats - Add 06-55-04/06-55-06/06-55-07 (SKX-SP/CLX-SP) microcode-20201110 caveats