import OL microcode_ctl-20220809-2.20230214.1.0.1.el9_2
This commit is contained in:
parent
8b9830c249
commit
daffe26cb4
4
.gitignore
vendored
4
.gitignore
vendored
@ -1,7 +1,5 @@
|
||||
SOURCES/06-2d-07
|
||||
SOURCES/06-4e-03
|
||||
SOURCES/06-55-04
|
||||
SOURCES/06-5e-03
|
||||
SOURCES/microcode-20190918.tar.gz
|
||||
SOURCES/microcode-20191115.tar.gz
|
||||
SOURCES/microcode-20220809.tar.gz
|
||||
SOURCES/microcode-20230214.tar.gz
|
||||
|
@ -1,7 +1,5 @@
|
||||
bcf2173cd3dd499c37defbc2533703cfa6ec2430 SOURCES/06-2d-07
|
||||
06432a25053c823b0e2a6b8e84e2e2023ee3d43e SOURCES/06-4e-03
|
||||
2e405644a145de0f55517b6a9de118eec8ec1e5a SOURCES/06-55-04
|
||||
86c60ee7d5d0d7115a4962c1c61ceecb0fd3a95a SOURCES/06-5e-03
|
||||
bc20d6789e6614b9d9f88ee321ab82bed220f26f SOURCES/microcode-20190918.tar.gz
|
||||
774636f4d440623b0ee6a2dad65260e81208074d SOURCES/microcode-20191115.tar.gz
|
||||
13f53eed16b393325f1cf571113f102afb7ac27b SOURCES/microcode-20220809.tar.gz
|
||||
28bbd30591e0d62f441de019b2829ff265cd238d SOURCES/microcode-20230214.tar.gz
|
||||
|
@ -1,3 +0,0 @@
|
||||
model GenuineIntel 06-2d-07
|
||||
path intel-ucode/06-2d-07
|
||||
dependency required intel
|
@ -1,4 +0,0 @@
|
||||
MDS-related microcode update for Intel Sandy Bridge-EP (family 6, model 45,
|
||||
stepping 7; CPUID 0x206d7) CPUs is disabled.
|
||||
Please refer to /usr/share/doc/microcode_ctl/caveats/06-2d-07_readme
|
||||
and /usr/share/doc/microcode_ctl/README.caveats for details.
|
@ -1,58 +0,0 @@
|
||||
Intel Sandy Bridge-E/EN/EP CPU models (SNB-EP, family 6, model 45, stepping 7)
|
||||
had issues with MDS-related microcode update that may lead to a system hang
|
||||
after a microcode update[1][2]. In order to address this, microcode update
|
||||
to the MDS-related revision 0x718 had been disabled, and the previously
|
||||
published microcode revision 0x714 is used by default for the OS-driven
|
||||
microcode update. The revision 0x71a of the microcode is intended to fix
|
||||
the aforementioned issue, hence it is enabled by default (but can be disabled
|
||||
explicitly; see below).
|
||||
|
||||
[1] https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/issues/15
|
||||
[2] https://access.redhat.com/solutions/4593951
|
||||
|
||||
For the reference, SHA1 checksums of 06-2d-07 microcode files containing
|
||||
microcode revisions in question are listed below:
|
||||
* 06-2d-07, revision 0x714: bcf2173cd3dd499c37defbc2533703cfa6ec2430
|
||||
* 06-2d-07, revision 0x718: 837cfebbfc09b911151dfd179082ad99cf87e85d
|
||||
* 06-2d-07, revision 0x71a: 4512c8149e63e5ed15f45005d7fb5be0041f66f6
|
||||
|
||||
Please contact your system vendor for a BIOS/firmware update that contains
|
||||
the latest microcode version. For the information regarding microcode versions
|
||||
required for mitigating specific side-channel cache attacks, please refer
|
||||
to the following knowledge base articles:
|
||||
* CVE-2017-5715 ("Spectre"):
|
||||
https://access.redhat.com/articles/3436091
|
||||
* CVE-2018-3639 ("Speculative Store Bypass"):
|
||||
https://access.redhat.com/articles/3540901
|
||||
* CVE-2018-3620, CVE-2018-3646 ("L1 Terminal Fault Attack"):
|
||||
https://access.redhat.com/articles/3562741
|
||||
* CVE-2018-12130, CVE-2018-12126, CVE-2018-12127, and CVE-2019-11091
|
||||
("Microarchitectural Data Sampling"):
|
||||
https://access.redhat.com/articles/4138151
|
||||
|
||||
The information regarding disabling microcode update is provided below.
|
||||
|
||||
To disable usage of the newer microcode revision for a specific kernel
|
||||
version, please create file "disallow-intel-06-2d-07" inside
|
||||
/lib/firmware/<kernel_version> directory, run
|
||||
"/usr/libexec/microcode_ctl/update_ucode" to add it to firmware directory
|
||||
where microcode will be available for late microcode update, and run
|
||||
"dracut -f --kver <kernel_version>", so initramfs for this kernel version
|
||||
is regenerated and the microcode can be loaded early, for example:
|
||||
|
||||
touch /lib/firmware/3.10.0-862.9.1/disallow-intel-06-2d-07
|
||||
/usr/libexec/microcode_ctl/update_ucode
|
||||
dracut -f --kver 3.10.0-862.9.1
|
||||
|
||||
To avoid addition of the newer microcode revision for all kernels, please create
|
||||
file "/etc/microcode_ctl/ucode_with_caveats/disallow-intel-06-2d-07", run
|
||||
"/usr/libexec/microcode_ctl/update_ucode" for late microcode updates,
|
||||
and "dracut -f --regenerate-all" for early microcode updates:
|
||||
|
||||
mkdir -p /etc/microcode_ctl/ucode_with_caveats
|
||||
touch /etc/microcode_ctl/ucode_with_caveats/disallow-intel-06-2d-07
|
||||
/usr/libexec/microcode_ctl/update_ucode
|
||||
dracut -f --regenerate-all
|
||||
|
||||
Please refer to /usr/share/doc/microcode_ctl/README.caveats for additional
|
||||
information.
|
@ -1,15 +1,6 @@
|
||||
model GenuineIntel 06-4f-01
|
||||
path intel-ucode/06-4f-01
|
||||
kernel 4.17.0
|
||||
kernel 3.10.0-894
|
||||
kernel 3.10.0-862.6.1
|
||||
kernel 3.10.0-693.35.1
|
||||
kernel 3.10.0-514.52.1
|
||||
kernel 3.10.0-327.70.1
|
||||
kernel 2.6.32-754.1.1
|
||||
kernel 2.6.32-573.58.1
|
||||
kernel 2.6.32-504.71.1
|
||||
kernel 2.6.32-431.90.1
|
||||
kernel 2.6.32-358.90.1
|
||||
kernel 5.15.0
|
||||
kernel 5.14.0
|
||||
dependency required intel skip=success match-model-mode=off
|
||||
disable early late
|
||||
disable late
|
||||
|
@ -1,12 +0,0 @@
|
||||
model GenuineIntel 06-55-04
|
||||
path intel-ucode/06-55-04
|
||||
## Bug https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/issues/21
|
||||
## affects only SKX-W/X (Workstation and HEDT segments); product segment
|
||||
## can be determined by checking bits 5..3 of the CAPID0 field in PCU registers
|
||||
## device (see https://www.intel.com/content/dam/www/public/us/en/documents/specification-updates/xeon-scalable-spec-update.pdf#page=13
|
||||
## for Server/FPGA/Fabric segments description; for SKX-W/X no public
|
||||
## documentation seems to be available). Specific device/function numbers
|
||||
## are provided for speeding up the search only, VID:DID is the real selector.
|
||||
## Commented out since revision 0x2006906 seems to fix the issue.
|
||||
#pci_config_val mode=success-all device=0x1e function=3 vid=0x8086 did=0x2083 offset=0x84 size=4 mask=0x38 val=0x38,0x18,0x8
|
||||
dependency required intel
|
@ -1,5 +0,0 @@
|
||||
Microcode revisions 0x2000065 and higher for Intel Skylake-X/W (family 6,
|
||||
model 85, stepping 4; CPUID 0x50654) were disabled as they could cause system
|
||||
hangs on reboot, so the previous revision 0x2000064 was used instead.
|
||||
Please refer to /usr/share/doc/microcode_ctl/caveats/06-55-04_readme
|
||||
and /usr/share/doc/microcode_ctl/README.caveats for details.
|
@ -1,97 +0,0 @@
|
||||
Intel Skylake Scalable Platform CPU models that belong to Workstation and HEDT
|
||||
(Basin Falls) segment (SKL-W/X, family 6, model 85, stepping 4) had reports
|
||||
of system hangs on reboot when revision 0x2000065 of microcode, that was included
|
||||
from microcode-20191112 update up to microcode-20200520 update, was applied[1].
|
||||
In order to address this, microcode update to the newer revision had been
|
||||
disabled by default on these systems, and the previously published microcode
|
||||
revision 0x2000064 is used by default for the OS-driven microcode update.
|
||||
|
||||
Since revision 0x2006906 (included with the microcode-20200609 release)
|
||||
it is reported that the issue is no longer present, so the newer microcode
|
||||
revision is enabled by default now (but can be disabled explicitly; see below).
|
||||
|
||||
[1] https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/issues/21
|
||||
|
||||
For the reference, SHA1 checksums of 06-55-04 microcode files containing
|
||||
microcode revisions in question are listed below:
|
||||
* 06-55-04, revision 0x2000064: 2e405644a145de0f55517b6a9de118eec8ec1e5a
|
||||
* 06-55-04, revision 0x2000065: f27f12b9d53f492c297afd856cdbc596786fad23
|
||||
* 06-55-04, revision 0x2006906: 5f18f985f6d5ad369b5f6549b7f3ee55acaef967
|
||||
* 06-55-04, revision 0x2006a08: 4059fb1f60370297454177f63cd7cc20b3fa1212
|
||||
* 06-55-04, revision 0x2006a0a: 7ec27025329c82de9553c14a78733ad1013e5462
|
||||
* 06-55-04, revision 0x2006b06: cb5bec976cb9754e3a22ab6828b3262a8f9eccf7
|
||||
* 06-55-04, revision 0x2006c0a: 76b641375d136c08f5feb46aacebee40468ac085
|
||||
* 06-55-04, revision 0x2006d05: dc4207cf4eb916ff34acbdddc474db0df781234f
|
||||
* 06-55-04, revision 0x2006e05: bc67d247ad1c9a834bec5e452606db1381d6bc7e
|
||||
|
||||
Please contact your system vendor for a BIOS/firmware update that contains
|
||||
the latest microcode version. For the information regarding microcode versions
|
||||
required for mitigating specific side-channel cache attacks, please refer
|
||||
to the following knowledge base articles:
|
||||
* CVE-2017-5715 ("Spectre"):
|
||||
https://access.redhat.com/articles/3436091
|
||||
* CVE-2018-3639 ("Speculative Store Bypass"):
|
||||
https://access.redhat.com/articles/3540901
|
||||
* CVE-2018-3620, CVE-2018-3646 ("L1 Terminal Fault Attack"):
|
||||
https://access.redhat.com/articles/3562741
|
||||
* CVE-2018-12130, CVE-2018-12126, CVE-2018-12127, and CVE-2019-11091
|
||||
("Microarchitectural Data Sampling"):
|
||||
https://access.redhat.com/articles/4138151
|
||||
* CVE-2019-0117 (Intel SGX Information Leak),
|
||||
CVE-2019-0123 (Intel SGX Privilege Escalation),
|
||||
CVE-2019-11135 (TSX Asynchronous Abort),
|
||||
CVE-2019-11139 (Voltage Setting Modulation):
|
||||
https://access.redhat.com/solutions/2019-microcode-nov
|
||||
* CVE-2020-0543 (Special Register Buffer Data Sampling),
|
||||
CVE-2020-0548 (Vector Register Data Sampling),
|
||||
CVE-2020-0549 (L1D Cache Eviction Sampling):
|
||||
https://access.redhat.com/solutions/5142751
|
||||
* CVE-2020-8695 (Information disclosure issue in Intel SGX via RAPL interface),
|
||||
CVE-2020-8696 (Vector Register Leakage-Active),
|
||||
CVE-2020-8698 (Fast Forward Store Predictor):
|
||||
https://access.redhat.com/articles/5569051
|
||||
* CVE-2020-24489 (VT-d-related Privilege Escalation),
|
||||
CVE-2020-24511 (Improper Isolation of Shared Resources),
|
||||
CVE-2020-24512 (Observable Timing Discrepancy),
|
||||
CVE-2020-24513 (Information Disclosure on Some Intel Atom Processors):
|
||||
https://access.redhat.com/articles/6101171
|
||||
* CVE-2021-0127 (Intel Processor Breakpoint Control Flow):
|
||||
https://access.redhat.com/articles/6716541
|
||||
* CVE-2022-0005 (Informational disclosure via JTAG),
|
||||
CVE-2022-21123 (Shared Buffers Data Read),
|
||||
CVE-2022-21125 (Shared Buffers Data Sampling),
|
||||
CVE-2022-21127 (Update to Special Register Buffer Data Sampling),
|
||||
CVE-2022-21131 (Protected Processor Inventory Number (PPIN) access protection),
|
||||
CVE-2022-21136 (Overclocking service access protection),
|
||||
CVE-2022-21151 (Optimization Removal-Induced Informational Disclosure),
|
||||
CVE-2022-21166 (Device Register Partial Write):
|
||||
https://access.redhat.com/articles/6963124
|
||||
* CVE-2022-21233 (Stale Data Read from legacy xAPIC):
|
||||
https://access.redhat.com/articles/6976398
|
||||
|
||||
The information regarding disabling microcode update is provided below.
|
||||
|
||||
To disable usage of the newer microcode revision for a specific kernel
|
||||
version, please create a file "disallow-intel-06-55-04" inside
|
||||
/lib/firmware/<kernel_version> directory, run
|
||||
"/usr/libexec/microcode_ctl/update_ucode" to update firmware directory
|
||||
used for late microcode updates, and run "dracut -f --kver <kernel_version>"
|
||||
so initramfs for this kernel version is regenerated, for example:
|
||||
|
||||
touch /lib/firmware/3.10.0-862.9.1/disallow-intel-06-55-04
|
||||
/usr/libexec/microcode_ctl/update_ucode
|
||||
dracut -f --kver 3.10.0-862.9.1
|
||||
|
||||
To disable usage of the newer microcode revision for all kernels, please create
|
||||
file "/etc/microcode_ctl/ucode_with_caveats/disallow-intel-06-55-04", run
|
||||
"/usr/libexec/microcode_ctl/update_ucode" to update firmware directories
|
||||
used for late microcode updates, and run "dracut -f --regenerate-all"
|
||||
so initramfs images get regenerated, for example:
|
||||
|
||||
mkdir -p /etc/microcode_ctl/ucode_with_caveats
|
||||
touch /etc/microcode_ctl/ucode_with_caveats/disallow-intel-06-55-04
|
||||
/usr/libexec/microcode_ctl/update_ucode
|
||||
dracut -f --regenerate-all
|
||||
|
||||
Please refer to /usr/share/doc/microcode_ctl/README.caveats for additional
|
||||
information.
|
@ -265,6 +265,7 @@ SOC;;XMM 7272 (SoFIA);;01;60650;;;XMM 7272
|
||||
Mobile;;Cannon Lake;D0;80;60663;CNL;U;Core Gen8 Mobile;
|
||||
Server;;Ice Lake;C0;87;606a5;ICX;SP;Xeon Scalable Gen3;
|
||||
Server;;Ice Lake;D0;87;606a6;ICX;SP;Xeon Scalable Gen3;
|
||||
Server;;Ice Lake;B0;10;606c1;ICL;D;;Xeon D-17xx, D-27xx
|
||||
SOC;;Gemini Lake;B0;01;706a1;GLK;;;Pentium J5005/N5000, Celeron J4005/J4105/N4000/N4100
|
||||
SOC;;Gemini Lake;R0;01;706a8;GLK;R;;Pentium J5040/N5030, Celeron J4125/J4025/N4020/N4120
|
||||
Mobile;;Ice Lake;D1;80;706e5;ICL;U,Y;Core Gen10 Mobile;
|
||||
@ -286,6 +287,13 @@ Mobile;;Comet Lake;V0;94;806ec;CML;U 4+2;Core Gen10 Mobile;
|
||||
Mobile;;Whiskey Lake;W0;d0;806eb;WHL;U;Core Gen8 Mobile;
|
||||
Mobile;;Whiskey Lake;V0;94;806ec;WHL;U;Core Gen8 Mobile;
|
||||
Mobile;;Whiskey Lake;V0;94;806ed;WHL;U;Core Gen8 Mobile;
|
||||
Server;;Sapphire Rapids;E0,S1;87;806f4;SPR;SP;Xeon Scalable Gen4;
|
||||
Server;;Sapphire Rapids;B1;10;806f5;SPR;HBM;Xeon Max;
|
||||
Server;;Sapphire Rapids;E2;87;806f5;SPR;SP;Xeon Scalable Gen4;
|
||||
Server;;Sapphire Rapids;E3;87;806f6;SPR;SP;Xeon Scalable Gen4;
|
||||
Server;;Sapphire Rapids;E4,S2;87;806f7;SPR;SP;Xeon Scalable Gen4;
|
||||
Server;;Sapphire Rapids;B3;10;806f8;SPR;HBM;Xeon Max;
|
||||
Server;;Sapphire Rapids;E5,S3;87;806f8;SPR;SP;Xeon Scalable Gen4;
|
||||
SOC;;Elkhart Rate;B1;01;90661;EHL;;Pentium J6426/N6415, Celeron J6412/J6413/N6210/N6211, Atom x6000E;
|
||||
Desktop;;Alder Lake;C0;02;90672;ADL;S 8+8;Core Gen12;
|
||||
Mobile;;Alder Lake;C0;03;90672;ADL;HX;Core Gen12 Mobile;
|
||||
@ -315,6 +323,9 @@ Desktop;;Comet Lake;Q0;22;a0655;CML;S 10+2;Core Gen10 Desktop;
|
||||
Mobile;;Comet Lake;A0;80;a0660;CML;U 6+2;Core Gen10 Mobile;
|
||||
Mobile;;Comet Lake;K1;80;a0661;CML;U 6+2 v2;Core Gen10 Mobile;
|
||||
Desktop;;Rocket Lake;B0;02;a0671;RKL;S;Core Gen11;
|
||||
Desktop;;Raptor Lake;S0;32;b0671;RPL;S;Core Gen13;
|
||||
Mobile;;Raptor Lake;J0;07;b06a2;RPL;P 6+8,H 6+8;Core Gen13;
|
||||
Mobile;;Raptor Lake;Q0;07;b06a3;RPL;U 2+8;Core Gen13;
|
||||
Desktop;;Alder Lake;C0;03;b06f2;ADL;;Core Gen12;
|
||||
Desktop;;Alder Lake;C0;03;b06f5;ADL;;Core Gen12;
|
||||
|
||||
|
@ -1,8 +1,6 @@
|
||||
path intel-ucode/*
|
||||
vendor GenuineIntel
|
||||
kernel_early 4.10.0
|
||||
kernel_early 3.10.0-930
|
||||
kernel_early 3.10.0-862.14.1
|
||||
kernel_early 3.10.0-693.38.1
|
||||
kernel_early 3.10.0-514.57.1
|
||||
kernel_early 3.10.0-327.73.1
|
||||
kernel_early 5.15.0
|
||||
kernel_early 5.14.0
|
||||
kernel 5.15.0
|
||||
kernel 5.14.0
|
||||
|
@ -1,4 +1,4 @@
|
||||
%define intel_ucode_version 20220809
|
||||
%define intel_ucode_version 20230214
|
||||
|
||||
%define caveat_dir %{_datarootdir}/microcode_ctl/ucode_with_caveats
|
||||
%define microcode_ctl_libexec %{_libexecdir}/microcode_ctl
|
||||
@ -11,19 +11,13 @@
|
||||
|
||||
Summary: CPU microcode updates for Intel x86 processors
|
||||
Name: microcode_ctl
|
||||
Version: %{intel_ucode_version}
|
||||
Release: 2%{?dist}
|
||||
Version: 20220809
|
||||
Release: 2.%{intel_ucode_version}.1.0.1%{?dist}
|
||||
Epoch: 4
|
||||
License: CC0 and Redistributable, no modification permitted
|
||||
URL: https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files
|
||||
Source0: https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/archive/microcode-%{intel_ucode_version}.tar.gz
|
||||
|
||||
# (Pre-MDS) revision 0x714 of 06-2d-07 microcode
|
||||
Source2: https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/raw/microcode-20190514/intel-ucode/06-2d-07
|
||||
|
||||
# (Pre-20191112) revision 0x2000064 of 06-55-04 microcode
|
||||
Source3: https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/raw/microcode-20190918/intel-ucode/06-55-04
|
||||
|
||||
# (Pre-20200609) revision 0xd6 of 06-4e-03/06-5e-03 microcode
|
||||
Source4: https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/raw/microcode-20200520/intel-ucode/06-4e-03
|
||||
Source5: https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/raw/microcode-20200520/intel-ucode/06-5e-03
|
||||
@ -66,19 +60,6 @@ Source110: intel_readme
|
||||
Source111: intel_config
|
||||
Source112: intel_disclaimer
|
||||
|
||||
# SNB-EP (CPUID 0x206d7) post-MDS hangs
|
||||
# https://bugzilla.redhat.com/show_bug.cgi?id=1758382
|
||||
# https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/issues/15
|
||||
Source120: 06-2d-07_readme
|
||||
Source121: 06-2d-07_config
|
||||
Source122: 06-2d-07_disclaimer
|
||||
|
||||
# SKL-SP/W/X (CPUID 0x50654) post-20191112 hangs
|
||||
# https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/issues/21
|
||||
Source130: 06-55-04_readme
|
||||
Source131: 06-55-04_config
|
||||
Source132: 06-55-04_disclaimer
|
||||
|
||||
# SKL-U/Y (CPUID 0x406e3) post-20200609 hangs
|
||||
# https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/issues/31
|
||||
Source140: 06-4e-03_readme
|
||||
@ -150,14 +131,6 @@ is no longer used for microcode upload and, as a result, no longer provided.
|
||||
%setup -n "Intel-Linux-Processor-Microcode-Data-Files-microcode-%{intel_ucode_version}"
|
||||
|
||||
%build
|
||||
# replacing SNB-EP (CPUID 0x206d7) microcode with pre-MDS version
|
||||
mv intel-ucode/06-2d-07 intel-ucode-with-caveats/
|
||||
cp "%{SOURCE2}" intel-ucode/
|
||||
|
||||
# replacing SKL-SP/W/X (CPUID 0x50654) microcode with pre-20191112 version
|
||||
mv intel-ucode/06-55-04 intel-ucode-with-caveats/
|
||||
cp "%{SOURCE3}" intel-ucode/
|
||||
|
||||
# replacing SKL-U/Y (CPUID 0x4063e) microcode with pre-20200609 version
|
||||
mv intel-ucode/06-4e-03 intel-ucode-with-caveats/
|
||||
cp "%{SOURCE4}" intel-ucode/
|
||||
@ -228,7 +201,7 @@ install -m 644 releasenote.md \
|
||||
"%{buildroot}/%{_pkgdocdir}/RELEASE_NOTES.intel-ucode"
|
||||
|
||||
# caveats
|
||||
install -m 644 "%{SOURCE100}" "%{SOURCE110}" "%{SOURCE120}" "%{SOURCE130}" \
|
||||
install -m 644 "%{SOURCE100}" "%{SOURCE110}" \
|
||||
"%{SOURCE140}" "%{SOURCE150}" "%{SOURCE160}" "%{SOURCE170}" \
|
||||
"%{SOURCE180}" \
|
||||
-t "%{buildroot}/%{_pkgdocdir}/caveats/"
|
||||
@ -252,22 +225,6 @@ install -m 644 "%{SOURCE110}" "%{intel_inst_dir}/readme"
|
||||
install -m 644 "%{SOURCE111}" "%{intel_inst_dir}/config"
|
||||
install -m 644 "%{SOURCE112}" "%{intel_inst_dir}/disclaimer"
|
||||
|
||||
# SNB caveat
|
||||
%define snb_inst_dir %{buildroot}/%{caveat_dir}/intel-06-2d-07/
|
||||
install -m 755 -d "%{snb_inst_dir}/intel-ucode"
|
||||
install -m 644 intel-ucode-with-caveats/06-2d-07 -t "%{snb_inst_dir}/intel-ucode/"
|
||||
install -m 644 "%{SOURCE120}" "%{snb_inst_dir}/readme"
|
||||
install -m 644 "%{SOURCE121}" "%{snb_inst_dir}/config"
|
||||
install -m 644 "%{SOURCE122}" "%{snb_inst_dir}/disclaimer"
|
||||
|
||||
# SKL-SP caveat
|
||||
%define skl_sp_inst_dir %{buildroot}/%{caveat_dir}/intel-06-55-04/
|
||||
install -m 755 -d "%{skl_sp_inst_dir}/intel-ucode"
|
||||
install -m 644 intel-ucode-with-caveats/06-55-04 -t "%{skl_sp_inst_dir}/intel-ucode/"
|
||||
install -m 644 "%{SOURCE130}" "%{skl_sp_inst_dir}/readme"
|
||||
install -m 644 "%{SOURCE131}" "%{skl_sp_inst_dir}/config"
|
||||
install -m 644 "%{SOURCE132}" "%{skl_sp_inst_dir}/disclaimer"
|
||||
|
||||
# SKL-U/Y caveat
|
||||
%define skl_uy_inst_dir %{buildroot}/%{caveat_dir}/intel-06-4e-03/
|
||||
install -m 755 -d "%{skl_uy_inst_dir}/intel-ucode"
|
||||
@ -373,7 +330,7 @@ exit 0
|
||||
# of RPM name and it has its own versioning scheme both in NVR and uname.
|
||||
# And there's the kernel package split in RHEL 8, so one should look for *-core
|
||||
# and not the main package.
|
||||
pkgs="kernel-core kernel-debug-core kernel-rt-core kernel-rt-debug-core"
|
||||
pkgs="kernel-core kernel-debug-core kernel-rt-core kernel-rt-debug-core kernel-uek-core kernel-uek-debug-core"
|
||||
qf='%%{NAME} %%{VERSION}-%%{RELEASE}.%%{ARCH} %%{installtime}\n'
|
||||
: "${MICROCODE_RPM_KVER_LIMIT=2}"
|
||||
|
||||
@ -386,9 +343,12 @@ rpm -qa --qf "${qf}" ${pkgs} | sort -r -n -k'3,3' | {
|
||||
while read -r pkgname vra install_ts; do
|
||||
flavour=''
|
||||
|
||||
# For x86, only "debug" flavour exists in RHEL 8
|
||||
[ "x${pkgname%*-debug-core}" = "x${pkgname}" ] \
|
||||
|| flavour='+debug'
|
||||
# Fix the uname for debug kernels
|
||||
case "${pkgname}" in
|
||||
kernel-uek-debug-core) flavour='.debug';;
|
||||
kernel-debug-core) flavour='+debug';;
|
||||
*) ;;
|
||||
esac
|
||||
|
||||
kver_cnt="$((kver_cnt + 1))"
|
||||
kver_uname="${vra}${flavour}"
|
||||
@ -545,6 +505,191 @@ rm -rf %{buildroot}
|
||||
|
||||
|
||||
%changelog
|
||||
* Thu Jun 22 2023 Todd Vierling <todd.vierling@oracle.com> - 4:20220809-2.20230214.1.0.1
|
||||
- ensure UEK also rebuilds initramfs [Orabug: 34280058]
|
||||
- add support for UEK7 kernels
|
||||
- enable early update for 06-4f-01
|
||||
- remove no longer appropriate caveats for 06-2d-07 and 06-55-04
|
||||
- enable early and late load on RHCK
|
||||
|
||||
* Wed Feb 15 2023 Eugene Syromiatnikov <esyr@redhat.com> - 4:20220809-2.20230214.1
|
||||
- Update Intel CPU microcode to microcode-20230214 release, addresses
|
||||
CVE-2022-21216, CVE-2022-33196, CVE-2022-33972, CVE-2022-38090 (#2171236,
|
||||
#2171261):
|
||||
- Addition of 06-6c-01/0x10 (ICL-D B0) microcode at revision 0x1000211;
|
||||
- Addition of 06-8f-04/0x87 (SPR-SP E0/S1) microcode at revision
|
||||
0x2b000181;
|
||||
- Addition of 06-8f-04/0x10 microcode at revision 0x2c000170;
|
||||
- Addition of 06-8f-05/0x87 (SPR-SP E2) microcode (in
|
||||
intel-ucode/06-8f-04) at revision 0x2b000181;
|
||||
- Addition of 06-8f-05/0x10 (SPR-HBM B1) microcode (in
|
||||
intel-ucode/06-8f-04) at revision 0x2c000170;
|
||||
- Addition of 06-8f-06/0x87 (SPR-SP E3) microcode (in
|
||||
intel-ucode/06-8f-04) at revision 0x2b000181;
|
||||
- Addition of 06-8f-06/0x10 microcode (in intel-ucode/06-8f-04) at
|
||||
revision 0x2c000170;
|
||||
- Addition of 06-8f-07/0x87 (SPR-SP E4/S2) microcode (in
|
||||
intel-ucode/06-8f-04) at revision 0x2b000181;
|
||||
- Addition of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in
|
||||
intel-ucode/06-8f-04) at revision 0x2b000181;
|
||||
- Addition of 06-8f-08/0x10 (SPR-HBM B3) microcode (in
|
||||
intel-ucode/06-8f-04) at revision 0x2c000170;
|
||||
- Addition of 06-8f-04/0x87 (SPR-SP E0/S1) microcode (in
|
||||
intel-ucode/06-8f-05) at revision 0x2b000181;
|
||||
- Addition of 06-8f-04/0x10 microcode (in intel-ucode/06-8f-05) at
|
||||
revision 0x2c000170;
|
||||
- Addition of 06-8f-05/0x87 (SPR-SP E2) microcode at revision
|
||||
0x2b000181;
|
||||
- Addition of 06-8f-05/0x10 (SPR-HBM B1) microcode at revision
|
||||
0x2c000170;
|
||||
- Addition of 06-8f-06/0x87 (SPR-SP E3) microcode (in
|
||||
intel-ucode/06-8f-05) at revision 0x2b000181;
|
||||
- Addition of 06-8f-06/0x10 microcode (in intel-ucode/06-8f-05) at
|
||||
revision 0x2c000170;
|
||||
- Addition of 06-8f-07/0x87 (SPR-SP E4/S2) microcode (in
|
||||
intel-ucode/06-8f-05) at revision 0x2b000181;
|
||||
- Addition of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in
|
||||
intel-ucode/06-8f-05) at revision 0x2b000181;
|
||||
- Addition of 06-8f-08/0x10 (SPR-HBM B3) microcode (in
|
||||
intel-ucode/06-8f-05) at revision 0x2c000170;
|
||||
- Addition of 06-8f-04/0x87 (SPR-SP E0/S1) microcode (in
|
||||
intel-ucode/06-8f-06) at revision 0x2b000181;
|
||||
- Addition of 06-8f-04/0x10 microcode (in intel-ucode/06-8f-06) at
|
||||
revision 0x2c000170;
|
||||
- Addition of 06-8f-05/0x87 (SPR-SP E2) microcode (in
|
||||
intel-ucode/06-8f-06) at revision 0x2b000181;
|
||||
- Addition of 06-8f-05/0x10 (SPR-HBM B1) microcode (in
|
||||
intel-ucode/06-8f-06) at revision 0x2c000170;
|
||||
- Addition of 06-8f-06/0x87 (SPR-SP E3) microcode at revision
|
||||
0x2b000181;
|
||||
- Addition of 06-8f-06/0x10 microcode at revision 0x2c000170;
|
||||
- Addition of 06-8f-07/0x87 (SPR-SP E4/S2) microcode (in
|
||||
intel-ucode/06-8f-06) at revision 0x2b000181;
|
||||
- Addition of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in
|
||||
intel-ucode/06-8f-06) at revision 0x2b000181;
|
||||
- Addition of 06-8f-08/0x10 (SPR-HBM B3) microcode (in
|
||||
intel-ucode/06-8f-06) at revision 0x2c000170;
|
||||
- Addition of 06-8f-04/0x87 (SPR-SP E0/S1) microcode (in
|
||||
intel-ucode/06-8f-07) at revision 0x2b000181;
|
||||
- Addition of 06-8f-05/0x87 (SPR-SP E2) microcode (in
|
||||
intel-ucode/06-8f-07) at revision 0x2b000181;
|
||||
- Addition of 06-8f-06/0x87 (SPR-SP E3) microcode (in
|
||||
intel-ucode/06-8f-07) at revision 0x2b000181;
|
||||
- Addition of 06-8f-07/0x87 (SPR-SP E4/S2) microcode at revision
|
||||
0x2b000181;
|
||||
- Addition of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in
|
||||
intel-ucode/06-8f-07) at revision 0x2b000181;
|
||||
- Addition of 06-8f-04/0x87 (SPR-SP E0/S1) microcode (in
|
||||
intel-ucode/06-8f-08) at revision 0x2b000181;
|
||||
- Addition of 06-8f-04/0x10 microcode (in intel-ucode/06-8f-08) at
|
||||
revision 0x2c000170;
|
||||
- Addition of 06-8f-05/0x87 (SPR-SP E2) microcode (in
|
||||
intel-ucode/06-8f-08) at revision 0x2b000181;
|
||||
- Addition of 06-8f-05/0x10 (SPR-HBM B1) microcode (in
|
||||
intel-ucode/06-8f-08) at revision 0x2c000170;
|
||||
- Addition of 06-8f-06/0x87 (SPR-SP E3) microcode (in
|
||||
intel-ucode/06-8f-08) at revision 0x2b000181;
|
||||
- Addition of 06-8f-06/0x10 microcode (in intel-ucode/06-8f-08) at
|
||||
revision 0x2c000170;
|
||||
- Addition of 06-8f-07/0x87 (SPR-SP E4/S2) microcode (in
|
||||
intel-ucode/06-8f-08) at revision 0x2b000181;
|
||||
- Addition of 06-8f-08/0x87 (SPR-SP E5/S3) microcode at revision
|
||||
0x2b000181;
|
||||
- Addition of 06-8f-08/0x10 (SPR-HBM B3) microcode at revision
|
||||
0x2c000170;
|
||||
- Addition of 06-b7-01/0x32 (RPL-S S0) microcode at revision 0x112;
|
||||
- Addition of 06-ba-02/0xc0 microcode at revision 0x410e;
|
||||
- Addition of 06-ba-03/0xc0 microcode (in intel-ucode/06-ba-02) at
|
||||
revision 0x410e;
|
||||
- Addition of 06-ba-02/0xc0 microcode (in intel-ucode/06-ba-03) at
|
||||
revision 0x410e;
|
||||
- Addition of 06-ba-03/0xc0 microcode at revision 0x410e;
|
||||
- Update of 06-8c-01/0x80 (TGL-UP3/UP4 B1) microcode (in
|
||||
intel-06-8c-01/intel-ucode/06-8c-01) from revision 0xa4 up to 0xa6;
|
||||
- Update of 06-8e-0c/0x94 (AML-Y 4+2 V0, CML-U 4+2 V0, WHL-U V0)
|
||||
microcode (in intel-06-8e-9e-0x-dell/intel-ucode/06-8e-0c) from
|
||||
revision 0xf0 up to 0xf4;
|
||||
- Update of 06-9e-0d/0x22 (CFL-H/S/Xeon E R0) microcode (in
|
||||
intel-06-8e-9e-0x-dell/intel-ucode/06-9e-0d) from revision 0xf0 up
|
||||
to 0xf4;
|
||||
- Update of 06-55-03/0x97 (SKX-SP B1) microcode from revision 0x100015e
|
||||
up to 0x1000161;
|
||||
- Update of 06-55-06/0xbf (CLX-SP B0) microcode from revision 0x4003302
|
||||
up to 0x4003303;
|
||||
- Update of 06-55-07/0xbf (CLX-SP/W/X B1/L1) microcode from revision
|
||||
0x5003302 up to 0x5003303;
|
||||
- Update of 06-55-0b/0xbf (CPX-SP A1) microcode from revision 0x7002501
|
||||
up to 0x7002503;
|
||||
- Update of 06-6a-06/0x87 (ICX-SP D0) microcode from revision 0xd000375
|
||||
up to 0xd000389;
|
||||
- Update of 06-7a-01/0x01 (GLK B0) microcode from revision 0x3c up
|
||||
to 0x3e;
|
||||
- Update of 06-7a-08/0x01 (GLK-R R0) microcode from revision 0x20 up
|
||||
to 0x22;
|
||||
- Update of 06-7e-05/0x80 (ICL-U/Y D1) microcode from revision 0xb2
|
||||
up to 0xb8;
|
||||
- Update of 06-8a-01/0x10 (LKF B2/B3) microcode from revision 0x31 up
|
||||
to 0x32;
|
||||
- Update of 06-8d-01/0xc2 (TGL-H R0) microcode from revision 0x40 up
|
||||
to 0x42;
|
||||
- Update of 06-96-01/0x01 (EHL B1) microcode from revision 0x16 up
|
||||
to 0x17;
|
||||
- Update of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode from revision
|
||||
0x22 up to 0x2c (old pf 0x3);
|
||||
- Update of 06-97-05/0x07 (ADL-S 6+0 K0) microcode (in
|
||||
intel-ucode/06-97-02) from revision 0x22 up to 0x2c (old pf 0x3);
|
||||
- Update of 06-bf-02/0x07 (ADL C0) microcode (in intel-ucode/06-97-02)
|
||||
from revision 0x22 up to 0x2c (old pf 0x3);
|
||||
- Update of 06-bf-05/0x07 (ADL C0) microcode (in intel-ucode/06-97-02)
|
||||
from revision 0x22 up to 0x2c (old pf 0x3);
|
||||
- Update of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in
|
||||
intel-ucode/06-97-05) from revision 0x22 up to 0x2c (old pf 0x3);
|
||||
- Update of 06-97-05/0x07 (ADL-S 6+0 K0) microcode from revision 0x22
|
||||
up to 0x2c (old pf 0x3);
|
||||
- Update of 06-bf-02/0x07 (ADL C0) microcode (in intel-ucode/06-97-05)
|
||||
from revision 0x22 up to 0x2c (old pf 0x3);
|
||||
- Update of 06-bf-05/0x07 (ADL C0) microcode (in intel-ucode/06-97-05)
|
||||
from revision 0x22 up to 0x2c (old pf 0x3);
|
||||
- Update of 06-9a-03/0x80 (ADL-P 6+8/U 9W L0/R0) microcode from revision
|
||||
0x421 up to 0x429;
|
||||
- Update of 06-9a-04/0x80 (ADL-P 2+8 R0) microcode (in
|
||||
intel-ucode/06-9a-03) from revision 0x421 up to 0x429;
|
||||
- Update of 06-9a-03/0x80 (ADL-P 6+8/U 9W L0/R0) microcode (in
|
||||
intel-ucode/06-9a-04) from revision 0x421 up to 0x429;
|
||||
- Update of 06-9a-04/0x80 (ADL-P 2+8 R0) microcode from revision 0x421
|
||||
up to 0x429;
|
||||
- Update of 06-9c-00/0x01 (JSL A0/A1) microcode from revision 0x24000023
|
||||
up to 0x24000024;
|
||||
- Update of 06-a5-02/0x20 (CML-H R1) microcode from revision 0xf0 up
|
||||
to 0xf4;
|
||||
- Update of 06-a5-03/0x22 (CML-S 6+2 G1) microcode from revision 0xf0
|
||||
up to 0xf4;
|
||||
- Update of 06-a5-05/0x22 (CML-S 10+2 Q0) microcode from revision 0xf0
|
||||
up to 0xf4;
|
||||
- Update of 06-a6-00/0x80 (CML-U 6+2 A0) microcode from revision 0xf0
|
||||
up to 0xf4;
|
||||
- Update of 06-a6-01/0x80 (CML-U 6+2 v2 K1) microcode from revision
|
||||
0xf0 up to 0xf4;
|
||||
- Update of 06-a7-01/0x02 (RKL-S B0) microcode from revision 0x54 up
|
||||
to 0x57;
|
||||
- Update of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in
|
||||
intel-ucode/06-bf-02) from revision 0x22 up to 0x2c (old pf 0x3);
|
||||
- Update of 06-97-05/0x07 (ADL-S 6+0 K0) microcode (in
|
||||
intel-ucode/06-bf-02) from revision 0x22 up to 0x2c (old pf 0x3);
|
||||
- Update of 06-bf-02/0x07 (ADL C0) microcode from revision 0x22 up to
|
||||
0x2c (old pf 0x3);
|
||||
- Update of 06-bf-05/0x07 (ADL C0) microcode (in intel-ucode/06-bf-02)
|
||||
from revision 0x22 up to 0x2c (old pf 0x3);
|
||||
- Update of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in
|
||||
intel-ucode/06-bf-05) from revision 0x22 up to 0x2c (old pf 0x3);
|
||||
- Update of 06-97-05/0x07 (ADL-S 6+0 K0) microcode (in
|
||||
intel-ucode/06-bf-05) from revision 0x22 up to 0x2c (old pf 0x3);
|
||||
- Update of 06-bf-02/0x07 (ADL C0) microcode (in intel-ucode/06-bf-05)
|
||||
from revision 0x22 up to 0x2c (old pf 0x3);
|
||||
- Update of 06-bf-05/0x07 (ADL C0) microcode from revision 0x22 up to
|
||||
0x2c (old pf 0x3).
|
||||
|
||||
>>>>>>> 762178550d1d (Import microcode_ctl-20220809-2.20230214.1.el9_2 for 9.2)
|
||||
* Tue Oct 25 2022 Eugene Syromiatnikov <esyr@redhat.com> - 4:20220809-2
|
||||
- Change the logger severity level to warning to align with the kmsg one
|
||||
(#2136506).
|
||||
|
Loading…
Reference in New Issue
Block a user