Blame SPECS/microcode_ctl.spec

ccd24f
%define upstream_version 2.1-18
4cfd03
%define intel_ucode_version 20220809
ee041c
ee041c
%define caveat_dir %{_datarootdir}/microcode_ctl/ucode_with_caveats
4eb1a6
%define microcode_ctl_libexec %{_libexecdir}/microcode_ctl
ee041c
539655
%define update_ucode %{microcode_ctl_libexec}/update_ucode
539655
%define check_caveats %{microcode_ctl_libexec}/check_caveats
539655
%define reload_microcode %{microcode_ctl_libexec}/reload_microcode
ee041c
4eb1a6
%define dracutlibdir %{_prefix}/lib/dracut
ee041c
4eb1a6
%define i_m2u_man intel-microcode2ucode.8
ea6c69
ee041c
# In microcode_ctl, documentation directory is unversioned historically.
ee041c
# In RHEL 8 spec, %{_pkgdocdir} is used as installation destination; however,
ee041c
# it is unversioned only since Fedora 20, per #986871,
ee041c
# and not in Fedora 18/19-based RHEL 7.
ee041c
%define _pkgdocdir %{_docdir}/%{name}
ee041c
ea6c69
Summary:        Tool to transform and deploy CPU microcode update for x86.
ea6c69
Name:           microcode_ctl
ea6c69
Version:        2.1
4cfd03
Release:        73.15%{?dist}
ea6c69
Epoch:          2
ea6c69
Group:          System Environment/Base
ea6c69
License:        GPLv2+ and Redistributable, no modification permitted
19486f
URL:            https://pagure.io/microcode_ctl
4eb1a6
Source0:        https://releases.pagure.org/microcode_ctl/%{name}-%{upstream_version}.tar.xz
f9176a
Source1:        https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/archive/microcode-%{intel_ucode_version}.tar.gz
ee041c
# (Pre-MDS) revision 0x714 of 06-2d-07 microcode
ee041c
Source2:        https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/raw/microcode-20190514/intel-ucode/06-2d-07
4eb1a6
f3c512
# (Pre-20191112) revision 0x2000064 of 06-55-04 microcode
f3c512
Source3:        https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/raw/microcode-20190918/intel-ucode/06-55-04
f3c512
9db7ba
# (Pre-20200609) revision 0xd6 of 06-4e-03/06-5e-03 microcode
9db7ba
Source4:        https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/raw/microcode-20200520/intel-ucode/06-4e-03
9db7ba
Source5:        https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/raw/microcode-20200520/intel-ucode/06-5e-03
9db7ba
4eb1a6
ee041c
# systemd unit
ee041c
Source10:       microcode.service
4eb1a6
ee041c
# dracut-related stuff
ee041c
Source20:       01-microcode.conf
ee041c
Source21:       99-microcode-override.conf
ee041c
Source22:       dracut_99microcode_ctl-fw_dir_override_module_init.sh
4eb1a6
ee041c
# libexec
ee041c
Source30:       update_ucode
ee041c
Source31:       check_caveats
ee041c
Source32:       reload_microcode
742279
ee041c
# docs
ee041c
Source40:       %{i_m2u_man}.in
ee041c
Source41:       README.caveats
9d39cf
Source42:       README
4eb1a6
ee041c
## Caveats
ee041c
# BDW EP/EX
ee041c
# https://bugzilla.redhat.com/show_bug.cgi?id=1622180
ee041c
# https://bugzilla.redhat.com/show_bug.cgi?id=1623630
ee041c
# https://bugzilla.redhat.com/show_bug.cgi?id=1646383
ee041c
Source100:      06-4f-01_readme
ee041c
Source101:      06-4f-01_config
ee041c
Source102:      06-4f-01_disclaimer
4eb1a6
ee041c
# Unsafe early MC update inside VM:
ee041c
# https://bugzilla.redhat.com/show_bug.cgi?id=1596627
ee041c
Source110:      intel_readme
ee041c
Source111:      intel_config
ee041c
Source112:      intel_disclaimer
4eb1a6
ee041c
# SNB-EP (CPUID 0x206d7) post-MDS hangs
ee041c
# https://bugzilla.redhat.com/show_bug.cgi?id=1758382
ee041c
# https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/issues/15
ee041c
Source120:      06-2d-07_readme
ee041c
Source121:      06-2d-07_config
ee041c
Source122:      06-2d-07_disclaimer
ee041c
f3c512
# SKL-SP/W/X (CPUID 0x50654) post-20191112 hangs
f3c512
# https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/issues/21
f3c512
Source130:      06-55-04_readme
f3c512
Source131:      06-55-04_config
f3c512
Source132:      06-55-04_disclaimer
f3c512
9db7ba
# SKL-U/Y (CPUID 0x406e3) post-20200609 hangs
9db7ba
# https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/issues/31
9db7ba
Source140:      06-4e-03_readme
9db7ba
Source141:      06-4e-03_config
9db7ba
Source142:      06-4e-03_disclaimer
9db7ba
9db7ba
# SKL-H/S/Xeon E3 v5 (CPUID 0x506e3) post-20200609 possible hangs
9db7ba
# https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/issues/31#issuecomment-644885826
9db7ba
Source150:      06-5e-03_readme
9db7ba
Source151:      06-5e-03_config
9db7ba
Source152:      06-5e-03_disclaimer
9db7ba
501af6
# TGL-UP3/UP4 (CPUID 06-8c-01) hangs
f9176a
# https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/issues/44
501af6
Source180:      06-8c-01_readme
501af6
Source181:      06-8c-01_config
501af6
Source182:      06-8c-01_disclaimer
501af6
ee041c
ee041c
# "Provides:" RPM tags generator
cc944f
Source1000:     gen_provides.sh
cc944f
Source1001:     codenames.list
cc944f
Source1002:     gen_updates2.py
742279
ccd24f
Patch1:         microcode_ctl-do-not-merge-ucode-with-caveats.patch
ccd24f
Patch2:         microcode_ctl-revert-intel-microcode2ucode-removal.patch
ccd24f
Patch3:         microcode_ctl-use-microcode-%{intel_ucode_version}-tgz.patch
4eb1a6
Patch4:         microcode_ctl-do-not-install-intel-ucode.patch
4eb1a6
Patch5:         microcode_ctl-intel-microcode2ucode-buf-handling.patch
742279
Patch6:         microcode_ctl-ignore-first-directory-level-in-archive.patch
539655
ea6c69
Buildroot:      %{_tmppath}/%{name}-%{version}-root
fc0a9b
ea6c69
ExclusiveArch:  %{ix86} x86_64
e4b344
BuildRequires:  systemd-units
347126
# hexdump is used in gen_provides.sh
9d39cf
BuildRequires:  coreutils util-linux python
347126
Requires:       coreutils
347126
Requires(post): systemd coreutils
347126
Requires(preun): systemd coreutils
347126
Requires(postun): systemd coreutils
347126
Requires(posttrans): dracut coreutils
ea6c69
742279
%global _use_internal_dependency_generator 0
50693b
%define __find_provides "%{SOURCE1000}" "%{SOURCE1001}"
742279
ea6c69
%description
ea6c69
The microcode_ctl utility is a companion to the microcode driver written
ea6c69
by Tigran Aivazian <tigran@aivazian.fsnet.co.uk>.
ea6c69
ea6c69
The microcode update is volatile and needs to be uploaded on each system
ea6c69
boot i.e. it doesn't reflash your cpu permanently, reboot and it reverts
ea6c69
back to the old microcode.
ea6c69
ea6c69
%prep
ea6c69
%setup -q -n %{name}-%{upstream_version}
f3c512
f3c512
tar xf "%{SOURCE1}" --wildcards --strip-components=1 \
9d39cf
	\*/intel-ucode-with-caveats \
9d39cf
	\*/license \*/releasenote.md \*/README.md \*/security.md
f3c512
4eb1a6
%patch1 -p1
ccd24f
%patch2 -p1
4eb1a6
742279
# Use the latest archive instead of microcode-20180703.tgz bundled
742279
# with upstream microcode_ctl-2.1-18.
4eb1a6
cp "%{SOURCE1}" .
ccd24f
%patch3 -p1
4eb1a6
4eb1a6
# We install ucode files manually into "intel" caveat directory
4eb1a6
%patch4 -p1
4eb1a6
4eb1a6
%patch5 -p1
ea6c69
742279
# The archive published on github has an additional top-level directory,
742279
# strip it.
742279
%patch6 -p1
742279
ea6c69
%build
ea6c69
make CFLAGS="$RPM_OPT_FLAGS" %{?_smp_mflags}
ea6c69
4eb1a6
# We do not populate any intel-ucode files into /lib/firmware directly due to
4eb1a6
# early microcode load inside VM issue:
4eb1a6
#   https://bugzilla.redhat.com/show_bug.cgi?id=1596627
4eb1a6
#   https://bugzilla.redhat.com/show_bug.cgi?id=1607899
4eb1a6
#find intel-ucode -type f | sed 's/^/%%ghost \/lib\/firmware\//' > ghost_list
4eb1a6
touch ghost_list
4eb1a6
ee041c
# replacing SNB-EP (CPUID 0x206d7) microcode with pre-MDS version
ee041c
mv intel-ucode/06-2d-07 intel-ucode-with-caveats/
ee041c
cp "%{SOURCE2}" intel-ucode/
ee041c
f3c512
# replacing SKL-SP/W/X (CPUID 0x50654) microcode with pre-20191112 version
f3c512
mv intel-ucode/06-55-04 intel-ucode-with-caveats/
f3c512
cp "%{SOURCE3}" intel-ucode/
f3c512
9db7ba
# replacing SKL-U/Y (CPUID 0x4063e) microcode with pre-20200609 version
9db7ba
mv intel-ucode/06-4e-03 intel-ucode-with-caveats/
9db7ba
cp "%{SOURCE4}" intel-ucode/
9db7ba
9db7ba
# replacing SKL-H/S/Xeon E3 v5 (CPUID 0x5063e) microcode with pre-20200609 version
9db7ba
mv intel-ucode/06-5e-03 intel-ucode-with-caveats/
9db7ba
cp "%{SOURCE5}" intel-ucode/
9db7ba
501af6
# Moving 06-8c-01 microcode to intel-ucode-with-caveats
cc944f
mv intel-ucode/06-8c-01 intel-ucode-with-caveats/
501af6
4eb1a6
# man page
ee041c
sed "%{SOURCE40}" \
742279
	-e "s/@DATE@/2019-05-09/g" \
4eb1a6
	-e "s/@VERSION@/%{version}-%{release}/g" \
347126
	-e "s|@MICROCODE_URL@|https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files|g" > "%{i_m2u_man}"
539655
ea6c69
%install
ea6c69
rm -rf %{buildroot}
539655
make DESTDIR=%{buildroot} PREFIX=%{_prefix} INSDIR=/usr/sbin MICDIR=/usr/share/microcode_ctl install clean
ea6c69
ee041c
install -m 755 -d \
ee041c
	"%{buildroot}/%{_datarootdir}/microcode_ctl/intel-ucode" \
ee041c
	"%{buildroot}/%{caveat_dir}/" \
ee041c
	"%{buildroot}/etc/microcode_ctl/ucode_with_caveats/"
ee041c
ee041c
# systemd unit
ee041c
install -m 755 -d "%{buildroot}/%{_unitdir}"
ee041c
install -m 644 "%{SOURCE10}" -t "%{buildroot}/%{_unitdir}/"
e4b344
ee041c
# dracut
ee041c
%define dracut_mod_dir "%{buildroot}/%{dracutlibdir}/modules.d/99microcode_ctl-fw_dir_override"
ee041c
install -m 755 -d \
ee041c
	"%{dracut_mod_dir}" \
ee041c
	"%{buildroot}/%{dracutlibdir}/dracut.conf.d/"
ee041c
install -m 644 "%{SOURCE20}" "%{SOURCE21}" \
ee041c
	-t "%{buildroot}/%{dracutlibdir}/dracut.conf.d/"
ee041c
install -m 755 "%{SOURCE22}" "%{dracut_mod_dir}/module-setup.sh"
4eb1a6
4eb1a6
# Internal helper scripts
ee041c
install -m 755 -d "%{buildroot}/%{microcode_ctl_libexec}"
ee041c
install "%{SOURCE30}" "%{SOURCE31}" "%{SOURCE32}" \
ee041c
	-m 755 -t "%{buildroot}/%{microcode_ctl_libexec}"
ee041c
ee041c
ee041c
## Documentation
ee041c
install -m 755 -d "%{buildroot}/%{_pkgdocdir}/caveats"
539655
4eb1a6
# caveats readme
9d39cf
install "%{SOURCE41}"  "%{SOURCE42}" \
ee041c
	-m 644 -t "%{buildroot}/%{_pkgdocdir}/"
539655
4eb1a6
# Provide Intel microcode license, as it requires so
ee041c
install -m 644 license \
ee041c
	"%{buildroot}/%{_pkgdocdir}/LICENSE.intel-ucode"
539655
9d39cf
# Provide release notes, README and security for Intel microcode
9d39cf
install -m 644 README.md \
9d39cf
	"%{buildroot}/%{_pkgdocdir}/README.intel-ucode"
9d39cf
install -m 644 security.md \
9d39cf
	"%{buildroot}/%{_pkgdocdir}/SECURITY.intel-ucode"
9d39cf
install -m 644 releasenote.md \
ee041c
	"%{buildroot}/%{_pkgdocdir}/RELEASE_NOTES.intel-ucode"
ee041c
ee041c
# caveats
f3c512
install -m 644 "%{SOURCE100}" "%{SOURCE110}" "%{SOURCE120}" "%{SOURCE130}" \
9db7ba
	       "%{SOURCE140}" "%{SOURCE150}" \
501af6
	       "%{SOURCE180}" \
ee041c
	-t "%{buildroot}/%{_pkgdocdir}/caveats/"
742279
4eb1a6
# Man page
4eb1a6
install -m 755 -d %{buildroot}/%{_mandir}/man8/
4eb1a6
install -m 644 "%{i_m2u_man}" -t %{buildroot}/%{_mandir}/man8/
4eb1a6
ee041c
ee041c
## Caveat data
ee041c
ee041c
# BDW caveat
ee041c
%define bdw_inst_dir %{buildroot}/%{caveat_dir}/intel-06-4f-01/
ee041c
install -m 755 -d "%{bdw_inst_dir}/intel-ucode"
ee041c
install -m 644 intel-ucode-with-caveats/06-4f-01 -t "%{bdw_inst_dir}/intel-ucode/"
ee041c
install -m 644 "%{SOURCE100}" "%{bdw_inst_dir}/readme"
ee041c
install -m 644 "%{SOURCE101}" "%{bdw_inst_dir}/config"
ee041c
install -m 644 "%{SOURCE102}" "%{bdw_inst_dir}/disclaimer"
ee041c
ee041c
# Early update caveat
ee041c
%define intel_inst_dir %{buildroot}/%{caveat_dir}/intel/
ee041c
install -m 755 -d "%{intel_inst_dir}/intel-ucode"
ee041c
install -m 644 intel-ucode/* -t "%{intel_inst_dir}/intel-ucode/"
ee041c
install -m 644 "%{SOURCE110}" "%{intel_inst_dir}/readme"
ee041c
install -m 644 "%{SOURCE111}" "%{intel_inst_dir}/config"
ee041c
install -m 644 "%{SOURCE112}" "%{intel_inst_dir}/disclaimer"
ee041c
ee041c
# SNB caveat
ee041c
%define snb_inst_dir %{buildroot}/%{caveat_dir}/intel-06-2d-07/
ee041c
install -m 755 -d "%{snb_inst_dir}/intel-ucode"
ee041c
install -m 644 intel-ucode-with-caveats/06-2d-07 -t "%{snb_inst_dir}/intel-ucode/"
ee041c
install -m 644 "%{SOURCE120}" "%{snb_inst_dir}/readme"
ee041c
install -m 644 "%{SOURCE121}" "%{snb_inst_dir}/config"
ee041c
install -m 644 "%{SOURCE122}" "%{snb_inst_dir}/disclaimer"
ee041c
f3c512
# SKL-SP caveat
9db7ba
%define skl_sp_inst_dir %{buildroot}/%{caveat_dir}/intel-06-55-04/
9db7ba
install -m 755 -d "%{skl_sp_inst_dir}/intel-ucode"
9db7ba
install -m 644 intel-ucode-with-caveats/06-55-04 -t "%{skl_sp_inst_dir}/intel-ucode/"
9db7ba
install -m 644 "%{SOURCE130}" "%{skl_sp_inst_dir}/readme"
9db7ba
install -m 644 "%{SOURCE131}" "%{skl_sp_inst_dir}/config"
9db7ba
install -m 644 "%{SOURCE132}" "%{skl_sp_inst_dir}/disclaimer"
9db7ba
9db7ba
# SKL-U/Y caveat
9db7ba
%define skl_uy_inst_dir %{buildroot}/%{caveat_dir}/intel-06-4e-03/
9db7ba
install -m 755 -d "%{skl_uy_inst_dir}/intel-ucode"
9db7ba
install -m 644 intel-ucode-with-caveats/06-4e-03 -t "%{skl_uy_inst_dir}/intel-ucode/"
9db7ba
install -m 644 "%{SOURCE140}" "%{skl_uy_inst_dir}/readme"
9db7ba
install -m 644 "%{SOURCE141}" "%{skl_uy_inst_dir}/config"
9db7ba
install -m 644 "%{SOURCE142}" "%{skl_uy_inst_dir}/disclaimer"
9db7ba
9db7ba
# SKL-H/S/Xeoon E3 v5 caveat
9db7ba
%define skl_hs_inst_dir %{buildroot}/%{caveat_dir}/intel-06-5e-03/
9db7ba
install -m 755 -d "%{skl_hs_inst_dir}/intel-ucode"
9db7ba
install -m 644 intel-ucode-with-caveats/06-5e-03 -t "%{skl_hs_inst_dir}/intel-ucode/"
9db7ba
install -m 644 "%{SOURCE150}" "%{skl_hs_inst_dir}/readme"
9db7ba
install -m 644 "%{SOURCE151}" "%{skl_hs_inst_dir}/config"
9db7ba
install -m 644 "%{SOURCE152}" "%{skl_hs_inst_dir}/disclaimer"
f3c512
501af6
# TGL caveat
501af6
%define tgl_inst_dir %{buildroot}/%{caveat_dir}/intel-06-8c-01/
501af6
install -m 755 -d "%{tgl_inst_dir}/intel-ucode"
501af6
install -m 644 intel-ucode-with-caveats/06-8c-01 -t "%{tgl_inst_dir}/intel-ucode/"
501af6
install -m 644 "%{SOURCE180}" "%{tgl_inst_dir}/readme"
501af6
install -m 644 "%{SOURCE181}" "%{tgl_inst_dir}/config"
501af6
install -m 644 "%{SOURCE182}" "%{tgl_inst_dir}/disclaimer"
501af6
9d39cf
# SUMMARY.intel-ucode generation
9d39cf
# It is to be done only after file population, so, it is here,
9d39cf
# at the end of the install stage
50693b
/usr/bin/python "%{SOURCE1002}" -C "%{SOURCE1001}" \
9d39cf
	summary -A "%{buildroot}" \
9d39cf
	> "%{buildroot}/%{_pkgdocdir}/SUMMARY.intel-ucode"
9d39cf
4eb1a6
# Cleanup
ee041c
rm -f intel-ucode-with-caveats/06-2d-07
9db7ba
rm -f intel-ucode-with-caveats/06-4e-03
9db7ba
rm -f intel-ucode-with-caveats/06-4f-01
f3c512
rm -f intel-ucode-with-caveats/06-55-04
9db7ba
rm -f intel-ucode-with-caveats/06-5e-03
501af6
rm -f intel-ucode-with-caveats/06-8c-01
539655
rmdir intel-ucode-with-caveats
4eb1a6
rm -rf intel-ucode
539655
9d39cf
e4b344
%post
e4b344
%systemd_post microcode.service
539655
%{update_ucode}
4eb1a6
%{reload_microcode}
4eb1a6
ee041c
# send the message to syslog, so it gets recorded on /var/log
ee041c
if [ -e /usr/bin/logger ]; then
ee041c
	%{check_caveats} -m -d | /usr/bin/logger -p syslog.notice -t DISCLAIMER
ee041c
fi
ee041c
# also paste it over dmesg (some customers drop dmesg messages while
ee041c
# others keep them into /var/log for the later case, we'll have the
ee041c
# disclaimer recorded twice into system logs.
ee041c
%{check_caveats} -m -d > /dev/kmsg
ee041c
6c53eb
exit 0
8c144b
8c144b
%posttrans
5db210
# We only want to regenerate the initramfs for a fully booted
5db210
# system; if this package happened to e.g. be pulled in as a build
5db210
# dependency, it is pointless at best to regenerate the initramfs,
5db210
# and also does not work with rpm-ostree:
5db210
# https://bugzilla.redhat.com/show_bug.cgi?id=1199582
347126
# https://bugzilla.redhat.com/show_bug.cgi?id=1530400
347126
[ -d /run/systemd/system ] || exit 0
347126
347126
# We can't simply update all initramfs images, since "dracut --regenerate-all"
347126
# generates initramfs even for removed kernels and if dracut generates botched
347126
# initramfs image, that results in unbootable system, even with older kernels
347126
# that can't be used as a fallback:
347126
# https://bugzilla.redhat.com/show_bug.cgi?id=1420180
347126
# https://access.redhat.com/support/cases/#/case/01779274
347126
# https://access.redhat.com/support/cases/#/case/01814106
4eb1a6
#
347126
# ...and we can't simply limit ourselves to updating only the currently
347126
# running kernel, as this doesn't work well with cases where kernel
347126
# is installed before the updated microcode, or in the same transaction.
347126
# And we can't rely on late update either, due to issues like this:
347126
# https://bugzilla.redhat.com/show_bug.cgi?id=1710445
347126
#
347126
# ...and there are also issues with setups with increased "installonly_limit"
347126
# in /etc/yum.conf, which could lead to unacceptably long package installation
347126
# times.
347126
#
347126
# So, in the end, we try to grab no more than 2 most recently installed kernels
347126
# that are installed after the currently running one (with the currently running
347126
# kernel that makes up to 3 in total, the default "installonly_limit" value)
347126
# as a kernel package selection heuristic that tries to accomodate both the need
347126
# to put the latest microcode in freshly installed kernels and also addresses
347126
# existing concerns.
347126
#
347126
# For RPM selection, kernel flavours (like "debug" or "kdump" or "zfcp",
347126
# with only the former being relevant to x86 architecture) are a part or RPM
347126
# name; it's also a part of uname, with different separator used in RHEL 6/7
347126
# and RHEL 8.  RT kernel, however, is special, as "rt" is another part
347126
# of RPM name and it has its own versioning scheme both in NVR and uname.
347126
# And there's the kernel package split in RHEL 8, so one should look for *-core
347126
# and not the main package.
347126
pkgs="kernel kernel-debug kernel-rt kernel-rt-debug"
347126
qf='%%{NAME} %%{VERSION}-%%{RELEASE}.%%{ARCH} %%{installtime}\n'
347126
: "${MICROCODE_RPM_KVER_LIMIT=2}"
347126
347126
rpm -qa --qf "${qf}" ${pkgs} | sort -r -n -k'3,3' | {
347126
	kver_cnt=0
347126
	processed=""
347126
	skipped=""
347126
	skip=0
347126
347126
	while read -r pkgname vra install_ts; do
347126
		flavour=''
347126
347126
		# For x86, only "debug" flavour exists in RHEL 8
347126
		[ "x${pkgname%*-debug}" = "x${pkgname}" ] \
347126
			|| flavour='.debug'
347126
347126
		kver_cnt="$((kver_cnt + 1))"
347126
		kver_uname="${vra}${flavour}"
347126
347126
		# Also check that the kernel is actually installed:
347126
		# https://bugzilla.redhat.com/show_bug.cgi?id=1591664
347126
		# We use the presence of symvers file as an indicator, the check
347126
		# similar to what weak-modules script does.
347126
		#
347126
		# XXX: Not sure if this check is still needed, since we now
347126
		# iterate over the rpm output.
347126
		[ -e "/boot/symvers-${kver_uname}.gz" ] || continue
347126
		# Check that modules.dep for the kernel is present as well,
347126
		# otherwise dracut complains with "/lib/modules/.../modules.dep
347126
		# is missing. Did you run depmod?".
347126
		[ -e "/lib/modules/${kver_uname}/modules.dep" ] || continue
347126
347126
		# We update the kernels with the same uname as the running kernel
347126
		# regardless of the selected limit
347126
		if [ "x$(uname -r)" = "x${kver_uname}" \
347126
		     -o \( "${kver_cnt}" -le "${MICROCODE_RPM_KVER_LIMIT}" \
347126
		           -a "${skip}" = 0 \) ]
347126
		then
347126
			dracut -f --kver "${kver_uname}"
347126
347126
			processed="${processed} ${pkgname}-${vra}"
347126
		else
347126
			skipped="${skipped} ${pkgname}-${vra}"
347126
		fi
347126
347126
		# The packages are processed until a package with the same uname
347126
		# as the running kernel is hit (since they are sorted
347126
		# in the descending installation time stamp older).
347126
		[ "x$(uname -r)" != "x${kver_uname}" ] || skip=1
347126
	done
347126
347126
	if [ -n "${skipped}" ]; then
347126
		skip_msg="After installation of a new version of microcode_ctl package,
347126
initramfs hasn't been re-generated for all the installed kernel packages.
347126
The following kernel packages have been skipped:${skipped}.
347126
Please re-generate initramfs manually for these kernel packages with the
347126
\"dracut -f --kver KERNEL_VERSION\" command in order to get the latest
347126
Intel CPU microcode included into early initramfs image for it, if needed."
347126
347126
		if [ -e /usr/bin/logger ]; then
347126
			echo "${skip_msg}" |
347126
				/usr/bin/logger -p syslog.notice -t microcode_ctl
347126
		fi
347126
347126
		if [ -e /dev/kmsg ]; then
347126
			echo "${skip_msg}" > /dev/kmsg
347126
		fi
347126
	fi
347126
}
347126
347126
exit 0
e4b344
ed32dc
%global rpm_state_dir %{_localstatedir}/lib/rpm-state
ed32dc
ed32dc
e4b344
%preun
e4b344
%systemd_preun microcode.service
e4b344
539655
# Storing ucode list before uninstall
539655
ls /usr/share/microcode_ctl/intel-ucode |
ed32dc
	sort > "%{rpm_state_dir}/microcode_ctl_un_intel-ucode"
539655
ls /usr/share/microcode_ctl/ucode_with_caveats |
ed32dc
	sort > "%{rpm_state_dir}/microcode_ctl_un_ucode_caveats"
4eb1a6
%{update_ucode} --action list --skip-common |
ed32dc
	sort > "%{rpm_state_dir}/microcode_ctl_un_file_list"
539655
e4b344
%postun
e4b344
%systemd_postun microcode.service
e4b344
742279
ls /usr/share/microcode_ctl/intel-ucode 2> /dev/null |
ed32dc
	sort > "%{rpm_state_dir}/microcode_ctl_un_intel-ucode_after"
742279
comm -23 \
ed32dc
	"%{rpm_state_dir}/microcode_ctl_un_intel-ucode" \
ed32dc
	"%{rpm_state_dir}/microcode_ctl_un_intel-ucode_after" \
ed32dc
	> "%{rpm_state_dir}/microcode_ctl_un_intel-ucode_diff"
742279
4eb1a6
if [ -e "%{update_ucode}" ]; then
4eb1a6
	ls /usr/share/microcode_ctl/ucode_with_caveats 2> /dev/null |
ed32dc
		sort > "%{rpm_state_dir}/microcode_ctl_un_ucode_caveats_after"
539655
4eb1a6
	comm -23 \
ed32dc
		"%{rpm_state_dir}/microcode_ctl_un_ucode_caveats" \
ed32dc
		"%{rpm_state_dir}/microcode_ctl_un_ucode_caveats_after" \
ed32dc
		> "%{rpm_state_dir}/microcode_ctl_un_ucode_caveats_diff"
539655
539655
	%{update_ucode} --action remove --cleanup \
ed32dc
		"%{rpm_state_dir}/microcode_ctl_un_intel-ucode_diff" \
347126
		"%{rpm_state_dir}/microcode_ctl_un_ucode_caveats_diff" || :
4eb1a6
ed32dc
	rm -f "%{rpm_state_dir}/microcode_ctl_un_ucode_caveats_after"
ed32dc
	rm -f "%{rpm_state_dir}/microcode_ctl_un_ucode_caveats_diff"
539655
else
4eb1a6
	while read -r f; do
539655
		[ -L "/lib/firmware/intel-ucode/$f" ] || continue
539655
		rm -f "/lib/firmware/intel-ucode/$f"
ed32dc
	done < "%{rpm_state_dir}/microcode_ctl_un_intel-ucode_diff"
4eb1a6
4eb1a6
	rmdir "/lib/firmware/intel-ucode" 2>/dev/null || :
4eb1a6
4eb1a6
	# We presume that if we don't have update_ucode script, we can remove
4eb1a6
	# all the caveats-related files.
4eb1a6
	while read -r f; do
4eb1a6
		if [ -L "$f" ] || [ "${f%%readme-*}" != "$f" ]; then
4eb1a6
			rm -f "$f"
4eb1a6
			rmdir -p $(dirname "$f") 2>/dev/null || :
4eb1a6
		fi
ed32dc
	done < "%{rpm_state_dir}/microcode_ctl_un_file_list"
539655
fi
539655
ed32dc
rm -f "%{rpm_state_dir}/microcode_ctl_un_intel-ucode"
ed32dc
rm -f "%{rpm_state_dir}/microcode_ctl_un_intel-ucode_after"
ed32dc
rm -f "%{rpm_state_dir}/microcode_ctl_un_intel-ucode_diff"
742279
ed32dc
rm -f "%{rpm_state_dir}/microcode_ctl_un_ucode_caveats"
539655
ed32dc
rm -f "%{rpm_state_dir}/microcode_ctl_un_file_list"
539655
742279
4eb1a6
exit 0
539655
347126
%triggerin -- kernel, kernel-debug, kernel-rt, kernel-rt-debug
539655
%{update_ucode}
539655
347126
%triggerpostun -- kernel, kernel-debug, kernel-rt, kernel-rt-debug
539655
%{update_ucode}
539655
539655
ea6c69
%clean
ea6c69
rm -rf %{buildroot}
ea6c69
539655
%files -f ghost_list
4eb1a6
%ghost %attr(0755, root, root) /lib/firmware/intel-ucode/
ea6c69
/usr/sbin/intel-microcode2ucode
539655
%{microcode_ctl_libexec}
539655
/usr/share/microcode_ctl
ee041c
%{dracutlibdir}/modules.d/*
742279
%config(noreplace) %{dracutlibdir}/dracut.conf.d/*
e4b344
%{_unitdir}/microcode.service
ee041c
%doc %{_pkgdocdir}
4eb1a6
%{_mandir}/man8/*
ea6c69
ea6c69
ea6c69
%changelog
4cfd03
* Tue Aug 09 2022 Eugene Syromiatnikov <esyr@redhat.com> - 2:2.1-73.15
4cfd03
- Update Intel CPU microcode to microcode-20220510 release, addresses
4cfd03
  CVE-2022-21233 (#2119080):
4cfd03
  - Update of 06-55-04/0xb7 (SKX-D/SP/W/X H0/M0/M1/U0) microcode (in
4cfd03
    intel-06-55-04/intel-ucode/06-55-04) from revision 0x2006d05 up
4cfd03
    to 0x2006e05;
4cfd03
  - Update of 06-55-03/0x97 (SKX-SP B1) microcode from revision 0x100015d
4cfd03
    up to 0x100015e;
4cfd03
  - Update of 06-6a-06/0x87 (ICX-SP D0) microcode from revision 0xd000363
4cfd03
    up to 0xd000375;
4cfd03
  - Update of 06-7a-01/0x01 (GLK B0) microcode from revision 0x3a up
4cfd03
    to 0x3c;
4cfd03
  - Update of 06-7a-08/0x01 (GLK-R R0) microcode from revision 0x1e up
4cfd03
    to 0x20;
4cfd03
  - Update of 06-7e-05/0x80 (ICL-U/Y D1) microcode from revision 0xb0
4cfd03
    up to 0xb2;
4cfd03
  - Update of 06-8c-02/0xc2 (TGL-R C0) microcode from revision 0x26 up
4cfd03
    to 0x28;
4cfd03
  - Update of 06-8d-01/0xc2 (TGL-H R0) microcode from revision 0x3e up
4cfd03
    to 0x40;
4cfd03
  - Update of 06-97-02/0x03 (ADL-HX/S 8+8 C0) microcode from revision
4cfd03
    0x1f up to 0x22;
4cfd03
  - Update of 06-97-05/0x03 (ADL-S 6+0 K0) microcode (in
4cfd03
    intel-ucode/06-97-02) from revision 0x1f up to 0x22;
4cfd03
  - Update of 06-bf-02/0x03 (ADL C0) microcode (in intel-ucode/06-97-02)
4cfd03
    from revision 0x1f up to 0x22;
4cfd03
  - Update of 06-bf-05/0x03 (ADL C0) microcode (in intel-ucode/06-97-02)
4cfd03
    from revision 0x1f up to 0x22;
4cfd03
  - Update of 06-97-02/0x03 (ADL-HX/S 8+8 C0) microcode (in
4cfd03
    intel-ucode/06-97-05) from revision 0x1f up to 0x22;
4cfd03
  - Update of 06-97-05/0x03 (ADL-S 6+0 K0) microcode from revision 0x1f
4cfd03
    up to 0x22;
4cfd03
  - Update of 06-bf-02/0x03 (ADL C0) microcode (in intel-ucode/06-97-05)
4cfd03
    from revision 0x1f up to 0x22;
4cfd03
  - Update of 06-bf-05/0x03 (ADL C0) microcode (in intel-ucode/06-97-05)
4cfd03
    from revision 0x1f up to 0x22;
4cfd03
  - Update of 06-9a-03/0x80 (ADL-P 6+8/U 9W L0/R0) microcode from revision
4cfd03
    0x41c up to 0x421;
4cfd03
  - Update of 06-9a-04/0x80 (ADL-P 2+8 R0) microcode (in
4cfd03
    intel-ucode/06-9a-03) from revision 0x41c up to 0x421;
4cfd03
  - Update of 06-9a-03/0x80 (ADL-P 6+8/U 9W L0/R0) microcode (in
4cfd03
    intel-ucode/06-9a-04) from revision 0x41c up to 0x421;
4cfd03
  - Update of 06-9a-04/0x80 (ADL-P 2+8 R0) microcode from revision 0x41c
4cfd03
    up to 0x421;
4cfd03
  - Update of 06-a7-01/0x02 (RKL-S B0) microcode from revision 0x53 up
4cfd03
    to 0x54;
4cfd03
  - Update of 06-97-02/0x03 (ADL-HX/S 8+8 C0) microcode (in
4cfd03
    intel-ucode/06-bf-02) from revision 0x1f up to 0x22;
4cfd03
  - Update of 06-97-05/0x03 (ADL-S 6+0 K0) microcode (in
4cfd03
    intel-ucode/06-bf-02) from revision 0x1f up to 0x22;
4cfd03
  - Update of 06-bf-02/0x03 (ADL C0) microcode from revision 0x1f up
4cfd03
    to 0x22;
4cfd03
  - Update of 06-bf-05/0x03 (ADL C0) microcode (in intel-ucode/06-bf-02)
4cfd03
    from revision 0x1f up to 0x22;
4cfd03
  - Update of 06-97-02/0x03 (ADL-HX/S 8+8 C0) microcode (in
4cfd03
    intel-ucode/06-bf-05) from revision 0x1f up to 0x22;
4cfd03
  - Update of 06-97-05/0x03 (ADL-S 6+0 K0) microcode (in
4cfd03
    intel-ucode/06-bf-05) from revision 0x1f up to 0x22;
4cfd03
  - Update of 06-bf-02/0x03 (ADL C0) microcode (in intel-ucode/06-bf-05)
4cfd03
    from revision 0x1f up to 0x22;
4cfd03
  - Update of 06-bf-05/0x03 (ADL C0) microcode from revision 0x1f up
4cfd03
    to 0x22.
4cfd03
72a479
* Tue May 10 2022 Eugene Syromiatnikov <esyr@redhat.com> - 2:2.1-73.14
72a479
- Update Intel CPU microcode to microcode-20220510 release, addresses
72a479
  CVE-2022-0005, CVE-2022-21131, CVE-2022-21136, CVE-2022-21151 (#2090246,
72a479
  #2090259, #2086748):
72a479
  - Addition of 06-97-02/0x03 (ADL-HX C0) microcode at revision 0x1f;
72a479
  - Addition of 06-97-05/0x03 (ADL-S 6+0 K0) microcode (in
72a479
    intel-ucode/06-97-02) at revision 0x1f;
72a479
  - Addition of 06-bf-02/0x03 (ADL C0) microcode (in intel-ucode/06-97-02)
72a479
    at revision 0x1f;
72a479
  - Addition of 06-bf-05/0x03 (ADL C0) microcode (in intel-ucode/06-97-02)
72a479
    at revision 0x1f;
72a479
  - Addition of 06-97-02/0x03 (ADL-HX C0) microcode (in
72a479
    intel-ucode/06-97-05) at revision 0x1f;
72a479
  - Addition of 06-97-05/0x03 (ADL-S 6+0 K0) microcode at revision 0x1f;
72a479
  - Addition of 06-bf-02/0x03 (ADL C0) microcode (in intel-ucode/06-97-05)
72a479
    at revision 0x1f;
72a479
  - Addition of 06-bf-05/0x03 (ADL C0) microcode (in intel-ucode/06-97-05)
72a479
    at revision 0x1f;
72a479
  - Addition of 06-9a-03/0x80 (ADL-P 6+8/U 9W L0/R0) microcode at
72a479
    revision 0x41c;
72a479
  - Addition of 06-9a-04/0x80 (ADL-P 2+8 R0) microcode (in
72a479
    intel-ucode/06-9a-03) at revision 0x41c;
72a479
  - Addition of 06-9a-03/0x80 (ADL-P 6+8/U 9W L0/R0) microcode (in
72a479
    intel-ucode/06-9a-04) at revision 0x41c;
72a479
  - Addition of 06-9a-04/0x80 (ADL-P 2+8 R0) microcode at revision 0x41c;
72a479
  - Addition of 06-97-02/0x03 (ADL-HX C0) microcode (in
72a479
    intel-ucode/06-bf-02) at revision 0x1f;
72a479
  - Addition of 06-97-05/0x03 (ADL-S 6+0 K0) microcode (in
72a479
    intel-ucode/06-bf-02) at revision 0x1f;
72a479
  - Addition of 06-bf-02/0x03 (ADL C0) microcode at revision 0x1f;
72a479
  - Addition of 06-bf-05/0x03 (ADL C0) microcode (in intel-ucode/06-bf-02)
72a479
    at revision 0x1f;
72a479
  - Addition of 06-97-02/0x03 (ADL-HX C0) microcode (in
72a479
    intel-ucode/06-bf-05) at revision 0x1f;
72a479
  - Addition of 06-97-05/0x03 (ADL-S 6+0 K0) microcode (in
72a479
    intel-ucode/06-bf-05) at revision 0x1f;
72a479
  - Addition of 06-bf-02/0x03 (ADL C0) microcode (in intel-ucode/06-bf-05)
72a479
    at revision 0x1f;
72a479
  - Addition of 06-bf-05/0x03 (ADL C0) microcode at revision 0x1f;
72a479
  - Update of 06-4e-03/0xc0 (SKL-U/U 2+3e/Y D0/K1) microcode (in
72a479
    intel-06-4e-03/intel-ucode/06-4e-03) from revision 0xec up to 0xf0;
72a479
  - Update of 06-55-04/0xb7 (SKX-D/SP/W/X H0/M0/M1/U0) microcode (in
72a479
    intel-06-55-04/intel-ucode/06-55-04) from revision 0x2006c0a up
72a479
    to 0x2006d05;
72a479
  - Update of 06-5e-03/0x36 (SKL-H/S/Xeon E3 N0/R0/S0) microcode (in
72a479
    intel-06-5e-03/intel-ucode/06-5e-03) from revision 0xec up to 0xf0;
72a479
  - Update of 06-8c-01/0x80 (TGL-UP3/UP4 B1) microcode (in
72a479
    intel-06-8c-01/intel-ucode/06-8c-01) from revision 0x9a up to 0xa4;
72a479
  - Update of 06-8e-09/0x10 (AML-Y 2+2 H0) microcode (in
72a479
    intel-06-8e-9e-0x-dell/intel-ucode/06-8e-09) from revision 0xec up
72a479
    to 0xf0;
72a479
  - Update of 06-8e-09/0xc0 (KBL-U/U 2+3e/Y H0/J1) microcode (in
72a479
    intel-06-8e-9e-0x-dell/intel-ucode/06-8e-09) from revision 0xec up
72a479
    to 0xf0;
72a479
  - Update of 06-8e-0a/0xc0 (CFL-U 4+3e D0, KBL-R Y0) microcode (in
72a479
    intel-06-8e-9e-0x-dell/intel-ucode/06-8e-0a) from revision 0xec up
72a479
    to 0xf0;
72a479
  - Update of 06-8e-0b/0xd0 (WHL-U W0) microcode (in
72a479
    intel-06-8e-9e-0x-dell/intel-ucode/06-8e-0b) from revision 0xec up
72a479
    to 0xf0;
72a479
  - Update of 06-8e-0c/0x94 (AML-Y 4+2 V0, CML-U 4+2 V0, WHL-U V0)
72a479
    microcode (in intel-06-8e-9e-0x-dell/intel-ucode/06-8e-0c) from
72a479
    revision 0xec up to 0xf0;
72a479
  - Update of 06-9e-09/0x2a (KBL-G/H/S/X/Xeon E3 B0) microcode (in
72a479
    intel-06-8e-9e-0x-dell/intel-ucode/06-9e-09) from revision 0xec up
72a479
    to 0xf0;
72a479
  - Update of 06-9e-0a/0x22 (CFL-H/S/Xeon E U0) microcode (in
72a479
    intel-06-8e-9e-0x-dell/intel-ucode/06-9e-0a) from revision 0xec up
72a479
    to 0xf0;
72a479
  - Update of 06-9e-0b/0x02 (CFL-E/H/S B0) microcode (in
72a479
    intel-06-8e-9e-0x-dell/intel-ucode/06-9e-0b) from revision 0xec up
72a479
    to 0xf0;
72a479
  - Update of 06-9e-0c/0x22 (CFL-H/S/Xeon E P0) microcode (in
72a479
    intel-06-8e-9e-0x-dell/intel-ucode/06-9e-0c) from revision 0xec up
72a479
    to 0xf0;
72a479
  - Update of 06-9e-0d/0x22 (CFL-H/S/Xeon E R0) microcode (in
72a479
    intel-06-8e-9e-0x-dell/intel-ucode/06-9e-0d) from revision 0xec up
72a479
    to 0xf0;
72a479
  - Update of 06-37-09/0x0f (VLV D0) microcode from revision 0x90c up
72a479
    to 0x90d;
72a479
  - Update of 06-55-03/0x97 (SKX-SP B1) microcode from revision 0x100015c
72a479
    up to 0x100015d;
72a479
  - Update of 06-55-06/0xbf (CLX-SP B0) microcode from revision 0x400320a
72a479
    up to 0x4003302;
72a479
  - Update of 06-55-07/0xbf (CLX-SP/W/X B1/L1) microcode from revision
72a479
    0x500320a up to 0x5003302;
72a479
  - Update of 06-55-0b/0xbf (CPX-SP A1) microcode from revision 0x7002402
72a479
    up to 0x7002501;
72a479
  - Update of 06-5c-09/0x03 (APL D0) microcode from revision 0x46 up
72a479
    to 0x48;
72a479
  - Update of 06-5c-0a/0x03 (APL B1/F1) microcode from revision 0x24 up
72a479
    to 0x28;
72a479
  - Update of 06-5f-01/0x01 (DNV B0) microcode from revision 0x36 up
72a479
    to 0x38;
72a479
  - Update of 06-6a-06/0x87 (ICX-SP D0) microcode from revision 0xd000331
72a479
    up to 0xd000363;
72a479
  - Update of 06-7a-01/0x01 (GLK B0) microcode from revision 0x38 up
72a479
    to 0x3a;
72a479
  - Update of 06-7a-08/0x01 (GLK-R R0) microcode from revision 0x1c up
72a479
    to 0x1e;
72a479
  - Update of 06-7e-05/0x80 (ICL-U/Y D1) microcode from revision 0xa8
72a479
    up to 0xb0;
72a479
  - Update of 06-8a-01/0x10 (LKF B2/B3) microcode from revision 0x2d up
72a479
    to 0x31;
72a479
  - Update of 06-8c-02/0xc2 (TGL-R C0) microcode from revision 0x22 up
72a479
    to 0x26;
72a479
  - Update of 06-8d-01/0xc2 (TGL-H R0) microcode from revision 0x3c up
72a479
    to 0x3e;
72a479
  - Update of 06-96-01/0x01 (EHL B1) microcode from revision 0x15 up
72a479
    to 0x16;
72a479
  - Update of 06-9c-00/0x01 (JSL A0/A1) microcode from revision 0x2400001f
72a479
    up to 0x24000023;
72a479
  - Update of 06-a5-02/0x20 (CML-H R1) microcode from revision 0xec up
72a479
    to 0xf0;
72a479
  - Update of 06-a5-03/0x22 (CML-S 6+2 G1) microcode from revision 0xec
72a479
    up to 0xf0;
72a479
  - Update of 06-a5-05/0x22 (CML-S 10+2 Q0) microcode from revision 0xee
72a479
    up to 0xf0;
72a479
  - Update of 06-a6-00/0x80 (CML-U 6+2 A0) microcode from revision 0xea
72a479
    up to 0xf0;
72a479
  - Update of 06-a6-01/0x80 (CML-U 6+2 v2 K1) microcode from revision
72a479
    0xec up to 0xf0;
72a479
  - Update of 06-a7-01/0x02 (RKL-S B0) microcode from revision 0x50 up
72a479
    to 0x53.
72a479
fc0a9b
* Thu Feb 10 2022 Eugene Syromiatnikov <esyr@redhat.com> - 2:2.1-73.13
fc0a9b
- Update Intel CPU microcode to microcode-20220207 release:
fc0a9b
  - Fixes in releasenote.md file.
fc0a9b
fc0a9b
* Mon Feb 07 2022 Eugene Syromiatnikov <esyr@redhat.com> - 2:2.1-73.12
fc0a9b
- Update Intel CPU microcode to microcode-20220204 release, addresses
fc0a9b
  CVE-2021-0127, CVE-2021-0145, CVE-2021-33120 (#2051547, #2049549, #2049566):
fc0a9b
  - Removal of 06-86-04/0x01 (SNR B0) microcode at revision 0xb00000f;
fc0a9b
  - Removal of 06-86-05/0x01 (SNR B1) microcode (in intel-ucode/06-86-04)
fc0a9b
    at revision 0xb00000f;
fc0a9b
  - Removal of 06-86-04/0x01 (SNR B0) microcode (in intel-ucode/06-86-05)
fc0a9b
    at revision 0xb00000f;
fc0a9b
  - Removal of 06-86-05/0x01 (SNR B1) microcode at revision 0xb00000f;
fc0a9b
  - Update of 06-4e-03/0xc0 (SKL-U/U 2+3e/Y D0/K1) microcode (in
fc0a9b
    intel-06-4e-03/intel-ucode/06-4e-03) from revision 0xea up to 0xec;
fc0a9b
  - Update of 06-4f-01/0xef (BDX-E/EP/EX/ML B0/M0/R0) microcode (in
fc0a9b
    intel-06-4f-01/intel-ucode/06-4f-01) from revision 0xb00003e up
fc0a9b
    to 0xb000040;
fc0a9b
  - Update of 06-55-04/0xb7 (SKX-D/SP/W/X H0/M0/M1/U0) microcode (in
fc0a9b
    intel-06-55-04/intel-ucode/06-55-04) from revision 0x2006b06 up
fc0a9b
    to 0x2006c0a;
fc0a9b
  - Update of 06-5e-03/0x36 (SKL-H/S/Xeon E3 N0/R0/S0) microcode (in
fc0a9b
    intel-06-5e-03/intel-ucode/06-5e-03) from revision 0xea up to 0xec;
fc0a9b
  - Update of 06-8c-01/0x80 (TGL-UP3/UP4 B1) microcode (in
fc0a9b
    intel-06-8c-01/intel-ucode/06-8c-01) from revision 0x88 up to 0x9a;
fc0a9b
  - Update of 06-3f-02/0x6f (HSX-E/EN/EP/EP 4S C0/C1/M1/R2) microcode
fc0a9b
    from revision 0x46 up to 0x49;
fc0a9b
  - Update of 06-3f-04/0x80 (HSX-EX E0) microcode from revision 0x19 up
fc0a9b
    to 0x1a;
fc0a9b
  - Update of 06-55-03/0x97 (SKX-SP B1) microcode from revision 0x100015b
fc0a9b
    up to 0x100015c;
fc0a9b
  - Update of 06-55-06/0xbf (CLX-SP B0) microcode from revision 0x4003102
fc0a9b
    up to 0x400320a;
fc0a9b
  - Update of 06-55-07/0xbf (CLX-SP/W/X B1/L1) microcode from revision
fc0a9b
    0x5003102 up to 0x500320a;
fc0a9b
  - Update of 06-55-0b/0xbf (CPX-SP A1) microcode from revision 0x7002302
fc0a9b
    up to 0x7002402;
fc0a9b
  - Update of 06-56-03/0x10 (BDX-DE V2/V3) microcode from revision
fc0a9b
    0x700001b up to 0x700001c;
fc0a9b
  - Update of 06-56-04/0x10 (BDX-DE Y0) microcode from revision 0xf000019
fc0a9b
    up to 0xf00001a;
fc0a9b
  - Update of 06-56-05/0x10 (BDX-NS A0/A1, HWL A1) microcode from revision
fc0a9b
    0xe000012 up to 0xe000014;
fc0a9b
  - Update of 06-5c-09/0x03 (APL D0) microcode from revision 0x44 up
fc0a9b
    to 0x46;
fc0a9b
  - Update of 06-5c-0a/0x03 (APL B1/F1) microcode from revision 0x20 up
fc0a9b
    to 0x24;
fc0a9b
  - Update of 06-5f-01/0x01 (DNV B0) microcode from revision 0x34 up
fc0a9b
    to 0x36;
fc0a9b
  - Update of 06-6a-06/0x87 (ICX-SP D0) microcode from revision 0xd0002a0
fc0a9b
    up to 0xd000331;
fc0a9b
  - Update of 06-7a-01/0x01 (GLK B0) microcode from revision 0x36 up
fc0a9b
    to 0x38;
fc0a9b
  - Update of 06-7a-08/0x01 (GLK-R R0) microcode from revision 0x1a up
fc0a9b
    to 0x1c;
fc0a9b
  - Update of 06-7e-05/0x80 (ICL-U/Y D1) microcode from revision 0xa6
fc0a9b
    up to 0xa8;
fc0a9b
  - Update of 06-8a-01/0x10 (LKF B2/B3) microcode from revision 0x2a up
fc0a9b
    to 0x2d;
fc0a9b
  - Update of 06-8c-02/0xc2 (TGL-R C0) microcode from revision 0x16 up
fc0a9b
    to 0x22;
fc0a9b
  - Update of 06-8d-01/0xc2 (TGL-H R0) microcode from revision 0x2c up
fc0a9b
    to 0x3c;
fc0a9b
  - Update of 06-8e-09/0x10 (AML-Y 2+2 H0) microcode from revision 0xea
fc0a9b
    up to 0xec;
fc0a9b
  - Update of 06-8e-09/0xc0 (KBL-U/U 2+3e/Y H0/J1) microcode from revision
fc0a9b
    0xea up to 0xec;
fc0a9b
  - Update of 06-8e-0a/0xc0 (CFL-U 4+3e D0, KBL-R Y0) microcode from
fc0a9b
    revision 0xea up to 0xec;
fc0a9b
  - Update of 06-8e-0b/0xd0 (WHL-U W0) microcode from revision 0xea up
fc0a9b
    to 0xec;
fc0a9b
  - Update of 06-8e-0c/0x94 (AML-Y 4+2 V0, CML-U 4+2 V0, WHL-U V0)
fc0a9b
    microcode from revision 0xea up to 0xec;
fc0a9b
  - Update of 06-96-01/0x01 (EHL B1) microcode from revision 0x11 up
fc0a9b
    to 0x15;
fc0a9b
  - Update of 06-9c-00/0x01 (JSL A0/A1) microcode from revision 0x1d up
fc0a9b
    to 0x2400001f;
fc0a9b
  - Update of 06-9e-09/0x2a (KBL-G/H/S/X/Xeon E3 B0) microcode from
fc0a9b
    revision 0xea up to 0xec;
fc0a9b
  - Update of 06-9e-0a/0x22 (CFL-H/S/Xeon E U0) microcode from revision
fc0a9b
    0xea up to 0xec;
fc0a9b
  - Update of 06-9e-0b/0x02 (CFL-E/H/S B0) microcode from revision 0xea
fc0a9b
    up to 0xec;
fc0a9b
  - Update of 06-9e-0c/0x22 (CFL-H/S/Xeon E P0) microcode from revision
fc0a9b
    0xea up to 0xec;
fc0a9b
  - Update of 06-9e-0d/0x22 (CFL-H/S/Xeon E R0) microcode from revision
fc0a9b
    0xea up to 0xec;
fc0a9b
  - Update of 06-a5-02/0x20 (CML-H R1) microcode from revision 0xea up
fc0a9b
    to 0xec;
fc0a9b
  - Update of 06-a5-03/0x22 (CML-S 6+2 G1) microcode from revision 0xea
fc0a9b
    up to 0xec;
fc0a9b
  - Update of 06-a5-05/0x22 (CML-S 10+2 Q0) microcode from revision 0xec
fc0a9b
    up to 0xee;
fc0a9b
  - Update of 06-a6-00/0x80 (CML-U 6+2 A0) microcode from revision 0xe8
fc0a9b
    up to 0xea;
fc0a9b
  - Update of 06-a6-01/0x80 (CML-U 6+2 v2 K1) microcode from revision
fc0a9b
    0xea up to 0xec;
fc0a9b
  - Update of 06-a7-01/0x02 (RKL-S B0) microcode from revision 0x40 up
fc0a9b
    to 0x50.
fc0a9b
f9176a
* Fri Jul 23 2021 Eugene Syromiatnikov <esyr@redhat.com> - 2:2.1-73.11
f9176a
- Update Intel CPU microcode to microcode-20210608 release:
f9176a
  - Fixes in releasenote.md file.
f9176a
f9176a
* Fri Jul 23 2021 Eugene Syromiatnikov <esyr@redhat.com> - 2:2.1-73.10
f9176a
- Make intel-06-2d-07, intel-06-4e-03, intel-06-4f-01, intel-06-55-04,
f9176a
  intel-06-5e-03, intel-06-8c-01, intel-06-8e-9e-0x-0xca,
f9176a
  and intel-06-8e-9e-0x-dell caveats dependent on intel caveat.
f9176a
- Enable 06-8c-01 microcode update by default.
f9176a
- Enable 06-5e-03 microcode update by default (#1897684).
f9176a
cc944f
* Thu May 27 2021 Eugene Syromiatnikov <esyr@redhat.com> - 2:2.1-73.9
cc944f
- Update Intel CPU microcode to microcode-20210525 release, addresses
cc944f
  CVE-2020-24489, CVE-2020-24511, CVE-2020-24512, and CVE-2020-24513
cc944f
  (#1962659, #1962709, #1962729, #1962675):
cc944f
  - Addition of 06-55-05/0xb7 (CLX-SP A0) microcode at revision 0x3000010;
cc944f
  - Addition of 06-6a-05/0x87 (ICX-SP C0) microcode at revision 0xc0002f0;
cc944f
  - Addition of 06-6a-06/0x87 (ICX-SP D0) microcode at revision 0xd0002a0;
cc944f
  - Addition of 06-86-04/0x01 (SNR B0) microcode at revision 0xb00000f;
cc944f
  - Addition of 06-86-05/0x01 (SNR B1) microcode (in intel-ucode/06-86-04)
cc944f
    at revision 0xb00000f;
cc944f
  - Addition of 06-86-04/0x01 (SNR B0) microcode (in intel-ucode/06-86-05)
cc944f
    at revision 0xb00000f;
cc944f
  - Addition of 06-86-05/0x01 (SNR B1) microcode at revision 0xb00000f;
cc944f
  - Addition of 06-8c-02/0xc2 (TGL-R C0) microcode at revision 0x16;
cc944f
  - Addition of 06-8d-01/0xc2 (TGL-H R0) microcode at revision 0x2c;
cc944f
  - Addition of 06-96-01/0x01 (EHL B1) microcode at revision 0x11;
cc944f
  - Addition of 06-9c-00/0x01 (JSL A0/A1) microcode at revision 0x1d;
cc944f
  - Addition of 06-a7-01/0x02 (RKL-S B0) microcode at revision 0x40;
cc944f
  - Update of 06-4e-03/0xc0 (SKL-U/U 2+3e/Y D0/K1) microcode (in
cc944f
    intel-06-4e-03/intel-ucode/06-4e-03) from revision 0xe2 up to 0xea;
cc944f
  - Update of 06-4f-01/0xef (BDX-E/EP/EX/ML B0/M0/R0) microcode (in
cc944f
    intel-06-4f-01/intel-ucode/06-4f-01) from revision 0xb000038 up
cc944f
    to 0xb00003e;
cc944f
  - Update of 06-55-04/0xb7 (SKX-D/SP/W/X H0/M0/M1/U0) microcode (in
cc944f
    intel-06-55-04/intel-ucode/06-55-04) from revision 0x2006a0a up
cc944f
    to 0x2006b06;
cc944f
  - Update of 06-5e-03/0x36 (SKL-H/S/Xeon E3 N0/R0/S0) microcode (in
cc944f
    intel-06-5e-03/intel-ucode/06-5e-03) from revision 0xe2 up to 0xea;
cc944f
  - Update of 06-8c-01/0x80 (TGL-UP3/UP4 B1) microcode (in
cc944f
    intel-06-8c-01/intel-ucode/06-8c-01) from revision 0x68 up to 0x88;
cc944f
  - Update of 06-8e-09/0x10 (AML-Y 2+2 H0) microcode (in
cc944f
    intel-06-8e-9e-0x-dell/intel-ucode/06-8e-09) from revision 0xde up
cc944f
    to 0xea;
cc944f
  - Update of 06-8e-09/0xc0 (KBL-U/U 2+3e/Y H0/J1) microcode (in
cc944f
    intel-06-8e-9e-0x-dell/intel-ucode/06-8e-09) from revision 0xde up
cc944f
    to 0xea;
cc944f
  - Update of 06-8e-0a/0xc0 (CFL-U 4+3e D0, KBL-R Y0) microcode (in
cc944f
    intel-06-8e-9e-0x-dell/intel-ucode/06-8e-0a) from revision 0xe0 up
cc944f
    to 0xea;
cc944f
  - Update of 06-8e-0b/0xd0 (WHL-U W0) microcode (in
cc944f
    intel-06-8e-9e-0x-dell/intel-ucode/06-8e-0b) from revision 0xde up
cc944f
    to 0xea;
cc944f
  - Update of 06-8e-0c/0x94 (AML-Y 4+2 V0, CML-U 4+2 V0, WHL-U V0)
cc944f
    microcode (in intel-06-8e-9e-0x-dell/intel-ucode/06-8e-0c) from
cc944f
    revision 0xde up to 0xea;
cc944f
  - Update of 06-9e-09/0x2a (KBL-G/H/S/X/Xeon E3 B0) microcode (in
cc944f
    intel-06-8e-9e-0x-dell/intel-ucode/06-9e-09) from revision 0xde up
cc944f
    to 0xea;
cc944f
  - Update of 06-9e-0a/0x22 (CFL-H/S/Xeon E U0) microcode (in
cc944f
    intel-06-8e-9e-0x-dell/intel-ucode/06-9e-0a) from revision 0xde up
cc944f
    to 0xea;
cc944f
  - Update of 06-9e-0b/0x02 (CFL-E/H/S B0) microcode (in
cc944f
    intel-06-8e-9e-0x-dell/intel-ucode/06-9e-0b) from revision 0xde up
cc944f
    to 0xea;
cc944f
  - Update of 06-9e-0c/0x22 (CFL-H/S/Xeon E P0) microcode (in
cc944f
    intel-06-8e-9e-0x-dell/intel-ucode/06-9e-0c) from revision 0xde up
cc944f
    to 0xea;
cc944f
  - Update of 06-9e-0d/0x22 (CFL-H/S/Xeon E R0) microcode (in
cc944f
    intel-06-8e-9e-0x-dell/intel-ucode/06-9e-0d) from revision 0xde up
cc944f
    to 0xea;
cc944f
  - Update of 06-3f-02/0x6f (HSX-E/EN/EP/EP 4S C0/C1/M1/R2) microcode
cc944f
    from revision 0x44 up to 0x46;
cc944f
  - Update of 06-3f-04/0x80 (HSX-EX E0) microcode from revision 0x16 up
cc944f
    to 0x19;
cc944f
  - Update of 06-55-03/0x97 (SKX-SP B1) microcode from revision 0x1000159
cc944f
    up to 0x100015b;
cc944f
  - Update of 06-55-06/0xbf (CLX-SP B0) microcode from revision 0x4003006
cc944f
    up to 0x4003102;
cc944f
  - Update of 06-55-07/0xbf (CLX-SP/W/X B1/L1) microcode from revision
cc944f
    0x5003006 up to 0x5003102;
cc944f
  - Update of 06-55-0b/0xbf (CPX-SP A1) microcode from revision 0x700001e
cc944f
    up to 0x7002302;
cc944f
  - Update of 06-56-03/0x10 (BDX-DE V2/V3) microcode from revision
cc944f
    0x7000019 up to 0x700001b;
cc944f
  - Update of 06-56-04/0x10 (BDX-DE Y0) microcode from revision 0xf000017
cc944f
    up to 0xf000019;
cc944f
  - Update of 06-56-05/0x10 (BDX-NS A0/A1, HWL A1) microcode from revision
cc944f
    0xe00000f up to 0xe000012;
cc944f
  - Update of 06-5c-09/0x03 (APL D0) microcode from revision 0x40 up
cc944f
    to 0x44;
cc944f
  - Update of 06-5c-0a/0x03 (APL B1/F1) microcode from revision 0x1e up
cc944f
    to 0x20;
cc944f
  - Update of 06-5f-01/0x01 (DNV B0) microcode from revision 0x2e up
cc944f
    to 0x34;
cc944f
  - Update of 06-7a-01/0x01 (GLK B0) microcode from revision 0x34 up
cc944f
    to 0x36;
cc944f
  - Update of 06-7a-08/0x01 (GLK-R R0) microcode from revision 0x18 up
cc944f
    to 0x1a;
cc944f
  - Update of 06-7e-05/0x80 (ICL-U/Y D1) microcode from revision 0xa0
cc944f
    up to 0xa6;
cc944f
  - Update of 06-8a-01/0x10 (LKF B2/B3) microcode from revision 0x28 up
cc944f
    to 0x2a;
cc944f
  - Update of 06-a5-02/0x20 (CML-H R1) microcode from revision 0xe0 up
cc944f
    to 0xea;
cc944f
  - Update of 06-a5-03/0x22 (CML-S 6+2 G1) microcode from revision 0xe0
cc944f
    up to 0xea;
cc944f
  - Update of 06-a5-05/0x22 (CML-S 10+2 Q0) microcode from revision 0xe0
cc944f
    up to 0xec;
cc944f
  - Update of 06-a6-00/0x80 (CML-U 6+2 A0) microcode from revision 0xe0
cc944f
    up to 0xe8;
cc944f
  - Update of 06-a6-01/0x80 (CML-U 6+2 v2 K0) microcode from revision
cc944f
    0xe0 up to 0xea.
cc944f
50693b
* Wed Feb 17 2021 Eugene Syromiatnikov <esyr@redhat.com> - 2:2.1-73.8
50693b
- Update Intel CPU microcode to microcode-20210216 release (#1905111):
50693b
  - Update of 06-55-04/0xb7 (SKX-D/SP/W/X H0/M0/M1/U0) microcode (in
50693b
    intel-06-55-04/intel-ucode/06-55-04) from revision 0x2006a08 up
50693b
    to 0x2006a0a;
50693b
  - Update of 06-55-06/0xbf (CLX-SP B0) microcode from revision 0x4003003
50693b
    up to 0x4003006;
50693b
  - Update of 06-55-07/0xbf (CLX-SP/W/X B1/L1) microcode from revision
50693b
    0x5003003 up to 0x5003006.
50693b
50693b
* Wed Feb 17 2021 Eugene Syromiatnikov <esyr@redhat.com> - 2:2.1-73.7
50693b
- Remove 06-55-04/06-55-06/06-55-07 (SKX-SP/CLX-SP) microcode-20201110 caveats.
50693b
50693b
* Thu Feb 11 2021 Eugene Syromiatnikov <esyr@redhat.com> - 2:2.1-73.6
50693b
- Backport check_dmi_val to check_caveats from RHEL 8.
50693b
50693b
* Fri Dec 11 2020 Eugene Syromiatnikov <esyr@redhat.com> - 2:2.1-73.5
50693b
- Do not use "grep -q" in a pipe in check_caveats.
50693b
- Add 06-55-04/06-55-06/06-55-07 (SKX-SP/CLX-SP) microcode-20201110 caveats
50693b
  (#1905111).
50693b
501af6
* Fri Nov 13 2020 Eugene Syromiatnikov <esyr@redhat.com> - 2:2.1-73.4
501af6
- Update Intel CPU microcode to microcode-20201112 release:
501af6
  - Addition of 06-8a-01/0x10 (LKF B2/B3) microcode at revision 0x28;
501af6
  - Update of 06-7a-01/0x01 (GLK B0) microcode from revision 0x32 up
501af6
    to 0x34;
501af6
  - Updated releasenote file.
501af6
501af6
* Fri Nov 13 2020 Eugene Syromiatnikov <esyr@redhat.com> - 2:2.1-73.3
501af6
- Disable 06-8c-01 (TGL-UP3/UP4 B1) microcode update by default.
501af6
9d39cf
* Fri Oct 30 2020 Eugene Syromiatnikov <esyr@redhat.com> - 2:2.1-73.2
9d39cf
- Update Intel CPU microcode to microcode-20201027 release, addresses
9d39cf
  CVE-2020-8694, CVE-2020-8695, CVE-2020-8696, CVE-2020-8698
9d39cf
  (#1893261, #1893249, #1893229):
9d39cf
  - Addition of 06-55-0b/0xbf (CPX-SP A1) microcode at revision 0x700001e;
9d39cf
  - Addition of 06-8c-01/0x80 (TGL-UP3/UP4 B1) microcode at revision 0x68;
9d39cf
  - Addition of 06-a5-02/0x20 (CML-H R1) microcode at revision 0xe0;
9d39cf
  - Addition of 06-a5-03/0x22 (CML-S 6+2 G1) microcode at revision 0xe0;
9d39cf
  - Addition of 06-a5-05/0x22 (CML-S 10+2 Q0) microcode at revision 0xe0;
9d39cf
  - Addition of 06-a6-01/0x80 (CML-U 6+2 v2 K0) microcode at revision
9d39cf
    0xe0;
9d39cf
  - Update of 06-4e-03/0xc0 (SKL-U/U 2+3e/Y D0/K1) microcode (in
9d39cf
    intel-06-4e-03/intel-ucode/06-4e-03) from revision 0xdc up to 0xe2;
9d39cf
  - Update of 06-55-04/0xb7 (SKX-D/SP/W/X H0/M0/M1/U0) microcode (in
9d39cf
    intel-06-55-04/intel-ucode/06-55-04) from revision 0x2006906 up
9d39cf
    to 0x2006a08;
9d39cf
  - Update of 06-5e-03/0x36 (SKL-H/S/Xeon E3 N0/R0/S0) microcode (in
9d39cf
    intel-06-5e-03/intel-ucode/06-5e-03) from revision 0xdc up to 0xe2;
9d39cf
  - Update of 06-8e-09/0x10 (AML-Y 2+2 H0) microcode (in
9d39cf
    intel-06-8e-9e-0x-dell/intel-ucode/06-8e-09) from revision 0xd6 up
9d39cf
    to 0xde;
9d39cf
  - Update of 06-8e-09/0xc0 (KBL-U/U 2+3e/Y H0/J1) microcode (in
9d39cf
    intel-06-8e-9e-0x-dell/intel-ucode/06-8e-09) from revision 0xd6 up
9d39cf
    to 0xde;
9d39cf
  - Update of 06-8e-0a/0xc0 (CFL-U 4+3e D0, KBL-R Y0) microcode (in
9d39cf
    intel-06-8e-9e-0x-dell/intel-ucode/06-8e-0a) from revision 0xd6 up
9d39cf
    to 0xe0;
9d39cf
  - Update of 06-8e-0b/0xd0 (WHL-U W0) microcode (in
9d39cf
    intel-06-8e-9e-0x-dell/intel-ucode/06-8e-0b) from revision 0xd6 up
9d39cf
    to 0xde;
9d39cf
  - Update of 06-8e-0c/0x94 (AML-Y 4+2 V0, CML-U 4+2 V0, WHL-U V0)
9d39cf
    microcode (in intel-06-8e-9e-0x-dell/intel-ucode/06-8e-0c) from
9d39cf
    revision 0xd6 up to 0xde;
9d39cf
  - Update of 06-9e-09/0x2a (KBL-G/H/S/X/Xeon E3 B0) microcode (in
9d39cf
    intel-06-8e-9e-0x-dell/intel-ucode/06-9e-09) from revision 0xd6 up
9d39cf
    to 0xde;
9d39cf
  - Update of 06-9e-0a/0x22 (CFL-H/S/Xeon E U0) microcode (in
9d39cf
    intel-06-8e-9e-0x-dell/intel-ucode/06-9e-0a) from revision 0xd6 up
9d39cf
    to 0xde;
9d39cf
  - Update of 06-9e-0b/0x02 (CFL-E/H/S B0) microcode (in
9d39cf
    intel-06-8e-9e-0x-dell/intel-ucode/06-9e-0b) from revision 0xd6 up
9d39cf
    to 0xde;
9d39cf
  - Update of 06-9e-0c/0x22 (CFL-H/S/Xeon E P0) microcode (in
9d39cf
    intel-06-8e-9e-0x-dell/intel-ucode/06-9e-0c) from revision 0xd6 up
9d39cf
    to 0xde;
9d39cf
  - Update of 06-9e-0d/0x22 (CFL-H/S/Xeon E R0) microcode (in
9d39cf
    intel-06-8e-9e-0x-dell/intel-ucode/06-9e-0d) from revision 0xd6 up
9d39cf
    to 0xde;
9d39cf
  - Update of 06-3f-02/0x6f (HSX-E/EN/EP/EP 4S C0/C1/M1/R2) microcode
9d39cf
    from revision 0x43 up to 0x44;
9d39cf
  - Update of 06-55-03/0x97 (SKX-SP B1) microcode from revision 0x1000157
9d39cf
    up to 0x1000159;
9d39cf
  - Update of 06-55-06/0xbf (CLX-SP B0) microcode from revision 0x4002f01
9d39cf
    up to 0x4003003;
9d39cf
  - Update of 06-55-07/0xbf (CLX-SP/W/X B1/L1) microcode from revision
9d39cf
    0x5002f01 up to 0x5003003;
9d39cf
  - Update of 06-5c-09/0x03 (APL D0) microcode from revision 0x38 up
9d39cf
    to 0x40;
9d39cf
  - Update of 06-5c-0a/0x03 (APL B1/F1) microcode from revision 0x16 up
9d39cf
    to 0x1e;
9d39cf
  - Update of 06-7a-08/0x01 (GLK-R R0) microcode from revision 0x16 up
9d39cf
    to 0x18;
9d39cf
  - Update of 06-7e-05/0x80 (ICL-U/Y D1) microcode from revision 0x78
9d39cf
    up to 0xa0;
9d39cf
  - Update of 06-a6-00/0x80 (CML-U 6+2 A0) microcode from revision 0xca
9d39cf
    up to 0xe0.
9d39cf
9d39cf
* Fri Oct 30 2020 Eugene Syromiatnikov <esyr@redhat.com> - 2:2.1-73.1
9d39cf
- Add README file to the documentation directory.
9d39cf
- Add publicly-sourced codenames list to supply to gen_provides.sh; update
9d39cf
  the latter to handle the somewhat different format.
9d39cf
- Add SUMMARY.intel-ucode file containing metadata information from
9d39cf
  the microcode file headers.
9d39cf
bc0acf
* Mon Jun 15 2020 Eugene Syromiatnikov <esyr@redhat.com> - 2:2.1-73
bc0acf
- Update Intel CPU microcode to microcode-20200609 release (#1826589):
9db7ba
  - Fixed a typo in the release note file.
9db7ba
bc0acf
* Mon Jun 15 2020 Eugene Syromiatnikov <esyr@redhat.com> - 2:2.1-72
bc0acf
- Enable 06-2d-07 (SNB-E/EN/EP) caveat by default (#1846023).
9db7ba
bc0acf
* Mon Jun 15 2020 Eugene Syromiatnikov <esyr@redhat.com> - 2:2.1-71
9db7ba
- Enable 06-55-04 (SKL-X/W) caveat by default.
9db7ba
bc0acf
* Sun Jun 14 2020 Eugene Syromiatnikov <esyr@redhat.com> - 2:2.1-70
9db7ba
- Do not update 06-4e-03 (SKL-U/Y) and 06-5e-03 (SKL-H/S/Xeon E3 v5) to revision
bc0acf
  0xdc, use 0xd6 by default (#1846133).
9db7ba
bc0acf
* Thu Jun 04 2020 Eugene Syromiatnikov <esyr@redhat.com> - 2:2.1-69
347126
- Avoid temporary file creation, used for here-documents in check_caveats.
347126
bc0acf
* Wed Jun 03 2020 Eugene Syromiatnikov <esyr@redhat.com> - 2:2.1-68
347126
- Update Intel CPU microcode to microcode-20200602 release, addresses
bc0acf
  CVE-2020-0543, CVE-2020-0548, CVE-2020-0549 (#1795352, #1795355, #1827190):
347126
  - Update of 06-3c-03/0x32 (HSW C0) microcode from revision 0x27 up to 0x28;
347126
  - Update of 06-3d-04/0xc0 (BDW-U/Y E0/F0) microcode from revision 0x2e
347126
    up to 0x2f;
347126
  - Update of 06-45-01/0x72 (HSW-U C0/D0) microcode from revision 0x25
347126
    up to 0x26;
347126
  - Update of 06-46-01/0x32 (HSW-H C0) microcode from revision 0x1b up to 0x1c;
347126
  - Update of 06-47-01/0x22 (BDW-H/Xeon E3 E0/G0) microcode from revision 0x21
347126
    up to 0x22;
347126
  - Update of 06-4e-03/0xc0 (SKL-U/Y D0) microcode from revision 0xd6
347126
    up to 0xdc;
347126
  - Update of 06-55-03/0x97 (SKX-SP B1) microcode from revision 0x1000151
347126
    up to 0x1000157;
347126
  - Update of 06-55-04/0xb7 (SKX-SP H0/M0/U0, SKX-D M1) microcode
347126
    (in intel-06-55-04/intel-ucode/06-55-04) from revision 0x2000065
347126
    up to 0x2006906;
347126
  - Update of 06-55-06/0xbf (CLX-SP B0) microcode from revision 0x400002c
347126
    up to 0x4002f01;
347126
  - Update of 06-55-07/0xbf (CLX-SP B1) microcode from revision 0x500002c
347126
    up to 0x5002f01;
347126
  - Update of 06-5e-03/0x36 (SKL-H/S R0/N0) microcode from revision 0xd6
347126
    up to 0xdc;
347126
  - Update of 06-8e-09/0x10 (AML-Y22 H0) microcode from revision 0xca
347126
    up to 0xd6;
347126
  - Update of 06-8e-09/0xc0 (KBL-U/Y H0) microcode from revision 0xca
347126
    up to 0xd6;
347126
  - Update of 06-8e-0a/0xc0 (CFL-U43e D0) microcode from revision 0xca
347126
    up to 0xd6;
347126
  - Update of 06-8e-0b/0xd0 (WHL-U W0) microcode from revision 0xca
347126
    up to 0xd6;
347126
  - Update of 06-8e-0c/0x94 (AML-Y42 V0, CML-Y42 V0, WHL-U V0) microcode
347126
    from revision 0xca up to 0xd6;
347126
  - Update of 06-9e-09/0x2a (KBL-G/H/S/X/Xeon E3 B0) microcode from revision
347126
    0xca up to 0xd6;
347126
  - Update of 06-9e-0a/0x22 (CFL-H/S/Xeon E3 U0) microcode from revision 0xca
347126
    up to 0xd6;
347126
  - Update of 06-9e-0b/0x02 (CFL-S B0) microcode from revision 0xca up to 0xd6;
347126
  - Update of 06-9e-0c/0x22 (CFL-H/S P0) microcode from revision 0xca
347126
    up to 0xd6;
347126
  - Update of 06-9e-0d/0x22 (CFL-H R0) microcode from revision 0xca up to 0xd6.
bc0acf
bc0acf
* Fri May 22 2020 Eugene Syromiatnikov <esyr@redhat.com> - 2:2.1-67
bc0acf
- Update Intel CPU microcode to microcode-20200520 release (#1783103):
bc0acf
  - Update of 06-2d-06/0x6d (SNB-E/EN/EP C1/M0) microcode from revision 0x61f
bc0acf
    up to 0x621;
bc0acf
  - Update of 06-2d-07/0x6d (SNB-E/EN/EP C2/M1) microcode from revision 0x718
bc0acf
    up to 0x71a.
bc0acf
bc0acf
* Thu May 14 2020 Eugene Syromiatnikov <esyr@redhat.com> - 2:2.1-66
bc0acf
- Update Intel CPU microcode to microcode-20200508 release (#1835549):
bc0acf
  - Update of 06-7e-05/0x80 (ICL-U/Y D1) microcode from revision 0x46
bc0acf
    up to 0x78.
347126
- Change the URL in the intel-microcode2ucode.8 to point to the GitHub
347126
  repository since the microcode download section at Intel Download Center
347126
  does not exist anymore.
347126
bc0acf
* Thu May 07 2020 Eugene Syromiatnikov <esyr@redhat.com> - 2:2.1-65
347126
- Narrow down SKL-SP/W/X blacklist to exclude Server/FPGA/Fabric segment
bc0acf
  models (#1833037).
347126
bc0acf
* Wed Apr 29 2020 Eugene Syromiatnikov <esyr@redhat.com> - 2:2.1-64
347126
- Re-generate initramfs not only for the currently running kernel,
bc0acf
  but for several recently installed kernels as well (#1773347).
347126
bc0acf
* Mon Dec 09 2019 Eugene Syromiatnikov <esyr@redhat.com> - 2:2.1-63
bc0acf
- Avoid find being SIGPIPE'd on early "grep -q" exit in the dracut script
bc0acf
  (#1781332).
347126
bc0acf
* Mon Dec 09 2019 Eugene Syromiatnikov <esyr@redhat.com> - 2:2.1-62
347126
- Update stale posttrans dependency, add triggers for proper handling
bc0acf
  of the debug kernel flavour along with kernel-rt (#1780257).
347126
3f0330
* Wed Nov 20 2019 Eugene Syromiatnikov <esyr@redhat.com> - 2:2.1-61
f3c512
- Do not update 06-55-04 (SKL-SP/W/X) to revision 0x2000065, use 0x2000064
f3c512
  by default (#1774329).
f3c512
3f0330
* Sat Nov 16 2019 Eugene Syromiatnikov <esyr@redhat.com> - 2:2.1-60
f3c512
- Update Intel CPU microcode to microcode-20191115 release:
f3c512
  - Update of 06-4e-03/0xc0 (SKL-U/Y D0) from revision 0xd4 up to 0xd6;
f3c512
  - Update of 06-5e-03/0x36 (SKL-H/S/Xeon E3 R0/N0) from revision 0xd4
f3c512
    up to 0xd6;
f3c512
  - Update of 06-8e-09/0x10 (AML-Y 2+2 H0) from revision 0xc6 up to 0xca;
f3c512
  - Update of 06-8e-09/0xc0 (KBL-U/Y H0) from revision 0xc6 up to 0xca;
f3c512
  - Update of 06-8e-0a/0xc0 (CFL-U 4+3e D0) from revision 0xc6 up to 0xca;
f3c512
  - Update of 06-8e-0b/0xd0 (WHL-U W0) from revision 0xc6 up to 0xca;
f3c512
  - Update of 06-8e-0c/0x94 (AML-Y V0, CML-U 4+2 V0, WHL-U V0) from revision
f3c512
    0xc6 up to 0xca;
f3c512
  - Update of 06-9e-09/0x2a (KBL-G/X H0, KBL-H/S/Xeon E3 B0) from revision 0xc6
f3c512
    up to 0xca;
f3c512
  - Update of 06-9e-0a/0x22 (CFL-H/S/Xeon E U0) from revision 0xc6 up to 0xca;
f3c512
  - Update of 06-9e-0b/0x02 (CFL-S B0) from revision 0xc6 up to 0xca;
f3c512
  - Update of 06-9e-0c/0x22 (CFL-S/Xeon E P0) from revision 0xc6 up to 0xca;
f3c512
  - Update of 06-9e-0d/0x22 (CFL-H/S R0) from revision 0xc6 up to 0xca;
f3c512
  - Update of 06-a6-00/0x80 (CML-U 6+2 A0) from revision 0xc6 up to 0xca.
f3c512
3f0330
* Fri Nov 15 2019 Eugene Syromiatnikov <esyr@redhat.com> - 2:2.1-59
f3c512
- Update Intel CPU microcode to microcode-20191113 release:
f3c512
  - Update of 06-9e-0c (CFL-H/S P0) microcode from revision 0xae up to 0xc6.
f3c512
- Drop 0001-releasenote-changes-summary-fixes.patch.
f3c512
3f0330
* Tue Nov 12 2019 Eugene Syromiatnikov <esyr@redhat.com> - 2:2.1-58
3f0330
- Package the publicy available microcode-20191112 release (#1755025):
f3c512
  - Addition of 06-4d-08/0x1 (AVN B0/C0) microcode at revision 0x12d;
f3c512
  - Addition of 06-55-06/0xbf (CSL-SP B0) microcode at revision 0x400002c;
f3c512
  - Addition of 06-7a-08/0x1 (GLK R0) microcode at revision 0x16;
f3c512
  - Update of 06-55-03/0x97 (SKL-SP B1) microcode from revision 0x1000150
f3c512
    up to 0x1000151;
f3c512
  - Update of 06-55-04/0xb7 (SKL-SP H0/M0/U0, SKL-D M1) microcode from revision
f3c512
    0x2000064 up to 0x2000065;
f3c512
  - Update of 06-55-07/0xbf (CSL-SP B1) microcode from revision 0x500002b
f3c512
    up to 0x500002c;
f3c512
  - Update of 06-7a-01/0x1 (GLK B0) microcode from revision 0x2e up to 0x32;
f3c512
- Include 06-9e-0c (CFL-H/S P0) microcode from the microcode-20190918 release.
f3c512
- Correct the releasenote file (0001-releasenote-changes-summary-fixes.patch).
f3c512
- Update README.caveats with the link to the new Knowledge Base article.
f3c512
3f0330
* Thu Nov 07 2019 Eugene Syromiatnikov <esyr@redhat.com> - 2:2.1-57
fc1224
- Intel CPU microcode update to 20191112, addresses CVE-2017-5715,
3f0330
  CVE-2019-0117, CVE-2019-11135, CVE-2019-11139 (#1755025, #1764058, #1764071,
3f0330
  #1764950, #1764970, #1764998, #1765402, #1765414, #1766439, #1766871):
fc1224
  - Addition of 06-a6-00/0x80 (CML-U 6+2 A0) microcode at revision 0xc6;
fc1224
  - Addition of 06-66-03/0x80 (CNL-U D0) microcode at revision 0x2a;
fc1224
  - Addition of 06-55-03/0x97 (SKL-SP B1) microcode at revision 0x1000150;
fc1224
  - Addition of 06-7e-05/0x80 (ICL-U/Y D1) microcode at revision 0x46;
fc1224
  - Update of 06-4e-03/0xc0 (SKL-U/Y D0) microcode from revision 0xcc to 0xd4;
fc1224
  - Update of 06-5e-03/0x36 (SKL-H/S/Xeon E3 R0/N0) microcode from revision 0xcc
fc1224
    to 0xd4
fc1224
  - Update of 06-8e-09/0x10 (AML-Y 2+2 H0) microcode from revision 0xb4 to 0xc6;
fc1224
  - Update of 06-8e-09/0xc0 (KBL-U/Y H0) microcode from revision 0xb4 to 0xc6;
fc1224
  - Update of 06-8e-0a/0xc0 (CFL-U 4+3e D0) microcode from revision 0xb4
fc1224
    to 0xc6;
fc1224
  - Update of 06-8e-0b/0xd0 (WHL-U W0) microcode from revision 0xb8 to 0xc6;
fc1224
  - Update of 06-8e-0c/0x94 (AML-Y V0) microcode from revision 0xb8 to 0xc6;
fc1224
  - Update of 06-8e-0c/0x94 (CML-U 4+2 V0) microcode from revision 0xb8 to 0xc6;
fc1224
  - Update of 06-8e-0c/0x94 (WHL-U V0) microcode from revision 0xb8 to 0xc6;
fc1224
  - Update of 06-9e-09/0x2a (KBL-G/X H0) microcode from revision 0xb4 to 0xc6;
fc1224
  - Update of 06-9e-09/0x2a (KBL-H/S/Xeon E3 B0) microcode from revision 0xb4
fc1224
    to 0xc6;
fc1224
  - Update of 06-9e-0a/0x22 (CFL-H/S/Xeon E U0) microcode from revision 0xb4
fc1224
    to 0xc6;
fc1224
  - Update of 06-9e-0b/0x02 (CFL-S B0) microcode from revision 0xb4 to 0xc6;
fc1224
  - Update of 06-9e-0d/0x22 (CFL-H R0) microcode from revision 0xb8 to 0xc6.
3f0330
3f0330
* Thu Oct 10 2019 Eugene Syromiatnikov <esyr@redhat.com> - 2:2.1-56
fc1224
- Rework dracut hook to address dracut's early initramfs generation
3f0330
  behaviour (#1769413).
fc1224
3f0330
* Sun Oct 06 2019 Eugene Syromiatnikov <esyr@redhat.com> - 2:2.1-55
ee041c
- Do not update 06-2d-07 (SNB-E/EN/EP) to revision 0x718, use 0x714
ee041c
  by default.
ee041c
3f0330
* Thu Sep 19 2019 Eugene Syromiatnikov <esyr@redhat.com> - 2:2.1-54
ee041c
- Intel CPU microcode update to 20190918.
ee041c
- Add new disclaimer, generated based on relevant caveats.
3f0330
- Resolves: #1753541.
ee041c
a05add
* Wed Jun 19 2019 Eugene Syromiatnikov <esyr@redhat.com> - 2:2.1-53
ed32dc
- Intel CPU microcode update to 20190618.
a05add
- Resolves: #1717241.
ed32dc
a05add
* Sun Jun 02 2019 Eugene Syromiatnikov <esyr@redhat.com> - 2:2.1-52
6c53eb
- Remove disclaimer, as it is not as important now to justify kmsg/log
6c53eb
  pollution; its contents are partially adopted in README.caveats.
6c53eb
a05add
* Mon May 20 2019 Eugene Syromiatnikov <esyr@redhat.com> - 2:2.1-51
6c53eb
- Intel CPU microcode update to 20190514a.
a05add
- Resolves: #1711941.
6c53eb
a05add
* Thu May 09 2019 Eugene Syromiatnikov <esyr@redhat.com> - 2:2.1-50
742279
- Intel CPU microcode update to 20190507_Public_DEMO.
a05add
- Resolves: #1697904.
742279
a05add
* Mon Apr 15 2019 Eugene Syromiatnikov <esyr@redhat.com> - 2:2.1-49
742279
- Intel CPU microcode update to 20190312.
742279
- Add "Provides:" tags generation.
a05add
- Resolves: #1697904.
a05add
a05add
* Thu Sep 20 2018 Eugene Syromiatnikov <esyr@redhat.com> - 2:2.1-48
a05add
- Fix %postun script (#1628629)
742279
ccd24f
* Wed Sep 05 2018 Eugene Syromiatnikov <esyr@redhat.com> - 2:2.1-47
4eb1a6
- Add 7.3.z kernel version to kernel_early configuration.
4eb1a6
ccd24f
* Thu Aug 30 2018 Eugene Syromiatnikov <esyr@redhat.com> - 2:2.1-46
4eb1a6
- Fix dracut module checks in Host-Only mode.
4eb1a6
ccd24f
* Thu Aug 30 2018 Eugene Syromiatnikov <esyr@redhat.com> - 2:2.1-45
4eb1a6
- Disable 06-4f-01 microcode in config (#1623630).
4eb1a6
ccd24f
* Tue Aug 28 2018 Eugene Syromiatnikov <esyr@redhat.com> - 2:2.1-44
4eb1a6
- Intel CPU microcode update to 20180807a.
4eb1a6
- Add README.caveats documentation file.
4eb1a6
- Add intel-microcode2ucode manual page.
4eb1a6
- Add check for early microcode load, use it in microcode_ctl dracut module.
ccd24f
- Resolves: #1596627.
ccd24f
ccd24f
* Mon Aug 20 2018 Eugene Syromiatnikov <esyr@redhat.com> - 2:2.1-43
4eb1a6
- Check that the currently running kernel is installed before
4eb1a6
  running dracut -f.
4eb1a6
ccd24f
* Thu Aug 16 2018 Eugene Syromiatnikov <esyr@redhat.com> - 2:2.1-42
ccd24f
- Drop "hypervisor" /proc/cpuinfo flag check.
ccd24f
ccd24f
* Thu Aug 09 2018 Eugene Syromiatnikov <esyr@redhat.com> - 2:2.1-41
4eb1a6
- Intel CPU microcode update to 20180807.
ccd24f
- Resolves: #1614422
ccd24f
ccd24f
* Mon Aug 06 2018 Eugene Syromiatnikov <esyr@redhat.com> - 2:2.1-40
ccd24f
- Add an ability to disable "hypervisor" /proc/cpuinfo flag check.
4eb1a6
ccd24f
* Fri Jul 27 2018 Eugene Syromiatnikov <esyr@redhat.com> - 2:2.1-39
ccd24f
- Provide %attr for the ghosted /lib/firmware/intel-ucode.
539655
ccd24f
* Thu Jul 26 2018 Eugene Syromiatnikov <esyr@redhat.com> - 2:2.1-38
539655
- Remove model name blacklists from caveats configuration files.
ccd24f
- Resolves: #1596627
539655
ccd24f
* Wed Jul 25 2018 Eugene Syromiatnikov <esyr@redhat.com> - 2:2.1-37
539655
- Add model name blacklist infrastructure.
539655
- Store Intel ucode files in /usr/share/microcode_ctl; do not populate them
539655
  in a virtualised environment.
ccd24f
- Resolves: #1596627
539655
ccd24f
* Fri Jul 20 2018 Eugene Syromiatnikov <esyr@redhat.com> - 2:2.1-35
ccd24f
- Add intel-microcode2ucode back
ccd24f
- Resolves: #1574582
ccd24f
ccd24f
* Fri Jul 20 2018 Eugene Syromiatnikov <esyr@redhat.com> - 2:2.1-34
ccd24f
- Update to upstream 2.1-18. Intel CPU microcode update to 20180703.
539655
- Add infrastructure for handling kernel-version-dependant microcode.
ccd24f
- Resolves: #1574582
539655
ccd24f
* Wed Jun 13 2018 Petr Oros <poros@redhat.com> - 2.1-33
ccd24f
- CVE-2018-3639 hw: cpu: speculative store bypass
ccd24f
- Resolves: #1495071
539655
ccd24f
* Mon Jun 11 2018 Petr Oros <poros@redhat.com> - 2.1-32
539655
- Fix: Operation not permitted when installing microcode_ctl
ccd24f
- Resolves: #1584247
539655
ccd24f
* Tue May 15 2018 Petr Oros <poros@redhat.com> - 2.1-31
080f4b
- Update disclaimer text
ccd24f
- Resolves: #1574574
080f4b
ccd24f
* Mon May 7 2018 Petr Oros <poros@redhat.com> - 2.1-30
080f4b
- Intel CPU microcode update to 20180425.
ccd24f
- Resolves: #1574574
080f4b
19486f
* Fri Jan 12 2018 Petr Oros <poros@redhat.com> - 2.1-29
5db210
- Revert Microcode from Intel for Side Channel attack
19486f
- Resolves: #1533939
5db210
19486f
* Fri Jan 12 2018 Petr Oros <poros@redhat.com> - 2.1-29
5db210
- Don't run dracut if not on a live system
19486f
- Resolves: #1530400
19486f
19486f
* Tue Jan 9 2018 Petr Oros <poros@redhat.com> - 2.1-28
19486f
- Remove old binary tool
19486f
- Resolves: #1527360
19486f
19486f
* Tue Jan 9 2018 Petr Oros <poros@redhat.com> - 2.1-27
19486f
- Update to upstream 2.1-15. Intel CPU microcode update to 20180108.
19486f
- Resolves: #1527360
5db210
19486f
* Fri Dec 15 2017 Petr Oros <poros@redhat.com> - 2.1-26
8e8f98
- Update Intel CPU microde for 06-3f-02, 06-4f-01, and 06-55-04
19486f
- Resolves: #1527360
19486f
19486f
* Wed Nov 22 2017 Petr Oros <poros@redhat.com> - 2.1-25
19486f
- Update to upstream 2.1-14. Intel CPU microcode update to 20171117.
19486f
- Resolves: #1457522
19486f
19486f
* Tue Oct 17 2017 Petr Oros <poros@redhat.com> - 2.1-24
19486f
- Fix upstream URL
19486f
- Resolves: #1502360
8e8f98
19486f
* Fri Jul 14 2017 Petr Oros <poros@redhat.com> - 2.1-23
8e8f98
- Update to upstream 2.1-13. Intel CPU microcode update to 20170707.
19486f
- Resolves: #1457522
8e8f98
2a4399
* Wed May 24 2017 Petr Oros <poros@redhat.com> - 2.1-22
2a4399
- Update to upstream 2.1-12. Intel CPU microcode update to 20170511.
2a4399
- Resolves: #1384218
2a4399
2a4399
* Tue Mar 7 2017 Petr Oros <poros@redhat.com> - 2.1-21
2a4399
- Rpm scriptlets should only rebuild the current kernel's initrd.
2a4399
- Resolves: #1420180
2a4399
2a4399
* Wed Jan 18 2017 Petr Oros <poros@redhat.com> - 2.1-20
d60a12
- Fix issue with hot microcode cpu reload.
2a4399
- Resolves: #1411232
d60a12
2a4399
* Mon Jan 9 2017 Petr Oros <poros@redhat.com> - 2.1-19
d60a12
- Fix broken quoting in ExecStart line.
2a4399
- Resolves: #1411232
d60a12
2a4399
* Fri Dec 16 2016 Petr Oros <poros@redhat.com> - 2.1-18
8c144b
- Fix issue with hot microcode cpu reload.
2a4399
- Resolves: #1398698
2a4399
2a4399
* Wed Nov 30 2016 Petr Oros <poros@redhat.com> - 2.1-17
8c144b
- Move dracut call into posttrans phase.
2a4399
- Resolves: #1398698
8c144b
d29bfe
* Thu Jul 21 2016 Petr Oros <poros@redhat.com> - 2.1-16
d29bfe
- Update to upstream 2.1-10. Intel CPU microcode update to 20160714.
d29bfe
- Resolves: #1358047
d29bfe
d29bfe
* Wed Jun 29 2016 Petr Oros <poros@redhat.com> - 2.1-15
d29bfe
- Load CPU microcode update only on supproted systems.
d29bfe
- Resolves: #1307179
d29bfe
d29bfe
* Fri Jun 24 2016 Petr Oros <poros@redhat.com> - 2.1-14
d29bfe
- Update to upstream 2.1-9. Intel CPU microcode update to 20160607.
d29bfe
- Resolves: #1253106
d29bfe
d29bfe
* Thu May 19 2016 Petr Oros <poros@redhat.com> - 2.1-13
6bc9fc
- Run dracut -f for all kernels.
d29bfe
- Resolves: #1292158
6bc9fc
0cdd93
* Fri Jul 3 2015 Petr Oros <poros@redhat.com> - 2.1-12
0cdd93
- Update to upstream 2.1-7. Intel CPU microcode update to 20150121.
0cdd93
- Resolves: #1174983
0cdd93
0cdd93
* Fri Oct 10 2014 Petr Oros <poros@redhat.com> - 2.1-11
0cdd93
- Run dracut -f after install microcode for update initramfs.
0cdd93
- Resolves: #1151192
0cdd93
873caf
* Tue Sep 30 2014 Petr Oros <poros@redhat.com> - 2.1-10
873caf
- Update to upstream 2.1-6. Intel CPU microcode update to 20140913.
873caf
- Resolves: #1142302
873caf
873caf
* Tue Jul 15 2014 Petr Oros <poros@redhat.com> - 2.1-9
726ba7
- Update to upstream 2.1-5. Intel CPU microcode update to 20140624.
873caf
- Resolves: #1113396
873caf
873caf
* Tue Jun 3 2014 Petr Oros <poros@redhat.com> - 2.1-8
873caf
- Fix bogus time in changelog
873caf
- Resolves: #1085117
726ba7
873caf
* Tue Jun 3 2014 Petr Oros <poros@redhat.com> - 2.1-8
d25c9d
- Update to upstream 2.1-4. Intel CPU microcode update to 20140430.
873caf
- Resolves: #1085117
d25c9d
e4b344
* Wed Mar 12 2014 Anton Arapov <anton@redhat.com> - 2.1-7.1
e4b344
- Fix the microcode's behaviour in virtual environment.
e4b344
e4b344
* Fri Feb 28 2014 Anton Arapov <anton@redhat.com> - 2.1-7
e4b344
- Fix the microcode's dracut configuration file location. 
e4b344
e4b344
* Tue Feb 18 2014 Anton Arapov <anton@redhat.com> - 2.1-6
e4b344
- Enable early microcode capabilities. Systemd and Dracut support. (Jeff Bastian)
e4b344
e4b344
* Fri Jan 24 2014 Anton Arapov <anton@redhat.com> - 2.1-5
e4b344
- Update to upstream 2.1-3. Intel CPU microcode update to 20140122.
e4b344
e4b344
* Fri Dec 27 2013 Daniel Mach <dmach@redhat.com> - 2:2.1-4
e4b344
- Mass rebuild 2013-12-27
e4b344
ea6c69
* Mon Sep 09 2013 Anton Arapov <anton@redhat.com> 2.1-3
ea6c69
- Imported to RHEL tree
ea6c69
ea6c69
* Mon Sep 09 2013 Anton Arapov <anton@redhat.com> 2.1-2
ea6c69
- Update to upstream 2.1-2.
ea6c69
ea6c69
* Wed Aug 14 2013 Anton Arapov <anton@redhat.com> 2.1-1
ea6c69
- Update to upstream 2.1-1.
ea6c69
ea6c69
* Sat Jul 27 2013 Anton Arapov <anton@redhat.com> 2.1-0
ea6c69
- Update to upstream 2.1. AMD microcode has been removed, find it in linux-firmware.
ea6c69
ea6c69
* Wed Apr 03 2013 Anton Arapov <anton@redhat.com> 2.0-3.1
ea6c69
- Update to upstream 2.0-3
ea6c69
ea6c69
* Thu Feb 14 2013 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 2:2.0-3
ea6c69
- Rebuilt for https://fedoraproject.org/wiki/Fedora_19_Mass_Rebuild
ea6c69
ea6c69
* Wed Oct 17 2012 Anton Arapov <anton@redhat.com> 2.0-2
ea6c69
- Update to upstream 2.0-2
ea6c69
ea6c69
* Tue Oct 02 2012 Anton Arapov <anton@redhat.com> 2.0-1
ea6c69
- Update to upstream 2.0-1
ea6c69
ea6c69
* Mon Aug 06 2012 Anton Arapov <anton@redhat.com> 2.0
ea6c69
- Update to upstream 2.0
ea6c69
ea6c69
* Wed Jul 25 2012 Anton Arapov <anton@redhat.com> 1.18-1
ea6c69
- Update to upstream 1.18
ea6c69
ea6c69
* Fri Jul 20 2012 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 1:1.17-26
ea6c69
- Rebuilt for https://fedoraproject.org/wiki/Fedora_18_Mass_Rebuild
ea6c69
ea6c69
* Thu Jun 07 2012 Anton Arapov <anton@redhat.com> 1.17-25
ea6c69
- Update to microcode-20120606.dat
ea6c69
ea6c69
* Tue Feb 07 2012 Anton Arapov <anton@redhat.com> 1.17-24
ea6c69
- Update to amd-ucode-2012-01-17.tar
ea6c69
ea6c69
* Fri Jan 13 2012 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 1:1.17-22
ea6c69
- Rebuilt for https://fedoraproject.org/wiki/Fedora_17_Mass_Rebuild
ea6c69
ea6c69
* Thu Dec 22 2011 Anton Arapov <anton@redhat.com> 1.17-21
ea6c69
- Fix a segfault that may be triggered by very long parameter [#768803]
ea6c69
ea6c69
* Tue Dec 13 2011 Anton Arapov <anton@redhat.com> 1.17-20
ea6c69
- Update to microcode-20111110.dat
ea6c69
ea6c69
* Tue Sep 27 2011 Anton Arapov <anton@redhat.com> 1.17-19
ea6c69
- Update to microcode-20110915.dat
ea6c69
ea6c69
* Thu Aug 04 2011 Anton Arapov <anton@redhat.com> 1.17-18
ea6c69
- Ship splitted microcode for Intel CPUs [#690930]
ea6c69
- Include tool for splitting microcode for Intl CPUs (Kay Sievers )
ea6c69
ea6c69
* Thu Jun 30 2011 Anton Arapov <anton@redhat.com> 1.17-17
ea6c69
- Fix udev rules (Dave Jones ) [#690930]
ea6c69
ea6c69
* Thu May 12 2011 Anton Arapov <anton@redhat.com> 1.17-14
ea6c69
- Update to microcode-20110428.dat
ea6c69
ea6c69
* Thu Mar 24 2011 Anton Arapov <anton@redhat.com> 1.17-13
ea6c69
- fix memory leak.
ea6c69
ea6c69
* Mon Mar 07 2011 Anton Arapov <anton@redhat.com> 1.17-12
ea6c69
- Update to amd-ucode-2011-01-11.tar
ea6c69
ea6c69
* Tue Feb 08 2011 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 1:1.17-11
ea6c69
- Rebuilt for https://fedoraproject.org/wiki/Fedora_15_Mass_Rebuild
ea6c69
ea6c69
* Wed Jan 19 2011 Anton Arapov <anton@redhat.com> 1.17-10
ea6c69
- manpage fix (John Bradshaw ) [#670879]
ea6c69
ea6c69
* Wed Jan 05 2011 Anton Arapov <anton@redhat.com> 1.17-9
ea6c69
- Update to microcode-20101123.dat
ea6c69
ea6c69
* Mon Nov 01 2010 Anton Arapov <anton@redhat.com> 1.17-8
ea6c69
- Update to microcode-20100914.dat
ea6c69
ea6c69
* Wed Sep 29 2010 jkeating - 1:1.17-7
ea6c69
- Rebuilt for gcc bug 634757
ea6c69
ea6c69
* Wed Sep 15 2010 Anton Arapov <anton@redhat.com> 1.17-6
ea6c69
- Update to microcode-20100826.dat
ea6c69
ea6c69
* Tue Sep 07 2010 Toshio Kuratomi <toshio@fedoraproject.org> 1.17-5
ea6c69
- Fix license tag: bz#450491
ea6c69
ea6c69
* Fri Aug 27 2010 Dave Jones <davej@redhat.com> 1.17-4
ea6c69
- Update to microcode-20100826.dat
ea6c69
ea6c69
* Tue Mar 23 2010 Anton Arapov <anton@redhat.com> 1.17-3
ea6c69
- Fix the udev rules (Harald Hoyer )
ea6c69
ea6c69
* Mon Mar 22 2010 Anton Arapov <anton@redhat.com> 1.17-2
ea6c69
- Make microcode_ctl event driven (Bill Nottingham ) [#479898]
ea6c69
ea6c69
* Thu Feb 11 2010 Dave Jones <davej@redhat.com> 1.17-1.58
ea6c69
- Update to microcode-20100209.dat
ea6c69
ea6c69
* Fri Dec 04 2009 Kyle McMartin <kyle@redhat.com> 1.17-1.57
ea6c69
- Fix duplicate message pointed out by Edward Sheldrake.
ea6c69
ea6c69
* Wed Dec 02 2009 Kyle McMartin <kyle@redhat.com> 1.17-1.56
ea6c69
- Add AMD x86/x86-64 microcode. (Dated: 2009-10-09)
ea6c69
  Doesn't need microcode_ctl modifications as it's loaded by
ea6c69
  request_firmware() like any other sensible driver.
ea6c69
- Eventually, this AMD firmware can probably live inside
ea6c69
  kernel-firmware once it is split out.
ea6c69
ea6c69
* Wed Sep 30 2009 Dave Jones <davej@redhat.com>
ea6c69
- Update to microcode-20090927.dat
ea6c69
ea6c69
* Fri Sep 11 2009 Dave Jones <davej@redhat.com>
ea6c69
- Remove some unnecessary code from the init script.
ea6c69
ea6c69
* Sat Jul 25 2009 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 1:1.17-1.52.1
ea6c69
- Rebuilt for https://fedoraproject.org/wiki/Fedora_12_Mass_Rebuild
ea6c69
ea6c69
* Thu Jun 25 2009 Dave Jones <davej@redhat.com>
ea6c69
- Shorten sleep time during init.
ea6c69
  This really needs to be replaced with proper udev hooks, but this is
ea6c69
  a quick interim fix.
ea6c69
ea6c69
* Wed Jun 03 2009 Kyle McMartin <kyle@redhat.com> 1:1.17-1.50
ea6c69
- Change ExclusiveArch to i586 instead of i386. Resolves rhbz#497711.
ea6c69
ea6c69
* Wed May 13 2009 Dave Jones <davej@redhat.com>
ea6c69
- update to microcode 20090330
ea6c69
ea6c69
* Wed Feb 25 2009 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 1:1.17-1.46.1
ea6c69
- Rebuilt for https://fedoraproject.org/wiki/Fedora_11_Mass_Rebuild
ea6c69
ea6c69
* Fri Sep 12 2008 Dave Jones <davej@redhat.com>
ea6c69
- update to microcode 20080910
ea6c69
ea6c69
* Tue Apr 01 2008 Jarod Wilson <jwilson@redhat.com>
ea6c69
- Update to microcode 20080401
ea6c69
ea6c69
* Sat Mar 29 2008 Dave Jones <davej@redhat.com>
ea6c69
- Update to microcode 20080220
ea6c69
- Fix rpmlint warnings in specfile.
ea6c69
ea6c69
* Mon Mar 17 2008 Dave Jones <davej@redhat.com>
ea6c69
- specfile cleanups.
ea6c69
ea6c69
* Fri Feb 22 2008 Jarod Wilson <jwilson@redhat.com>
ea6c69
- Use /lib/firmware instead of /etc/firmware
ea6c69
ea6c69
* Wed Feb 13 2008 Jarod Wilson <jwilson@redhat.com>
ea6c69
- Fix permissions on microcode.dat
ea6c69
ea6c69
* Thu Feb 07 2008 Jarod Wilson <jwilson@redhat.com>
ea6c69
- Spec cleanup and macro standardization.
ea6c69
- Update license
ea6c69
- Update microcode data file to 20080131 revision.
ea6c69
ea6c69
* Mon Jul  2 2007 Dave Jones <davej@redhat.com>
ea6c69
- Update to upstream 1.17
ea6c69
ea6c69
* Thu Oct 12 2006 Jon Masters <jcm@redhat.com>
ea6c69
- BZ209455 fixes.
ea6c69
ea6c69
* Mon Jul 17 2006 Jesse Keating <jkeating@redhat.com>
ea6c69
- rebuild
ea6c69
ea6c69
* Fri Jun 16 2006 Bill Nottingham <notting@redhat.com>
ea6c69
- remove kudzu requirement
ea6c69
- add prereq for coreutils, awk, grep
ea6c69
ea6c69
* Thu Feb 09 2006 Dave Jones <davej@redhat.com>
ea6c69
- rebuild.
ea6c69
ea6c69
* Fri Jan 27 2006 Dave Jones <davej@redhat.com>
ea6c69
- Update to upstream 1.13
ea6c69
ea6c69
* Fri Dec 16 2005 Jesse Keating <jkeating@redhat.com>
ea6c69
- rebuilt for new gcj
ea6c69
ea6c69
* Fri Dec 09 2005 Jesse Keating <jkeating@redhat.com>
ea6c69
- rebuilt
ea6c69
ea6c69
* Mon Nov 14 2005 Dave Jones <davej@redhat.com>
ea6c69
- initscript tweaks.
ea6c69
ea6c69
* Tue Sep 13 2005 Dave Jones <davej@redhat.com>
ea6c69
- Update to upstream 1.12
ea6c69
ea6c69
* Wed Aug 17 2005 Dave Jones <davej@redhat.com>
ea6c69
- Check for device node *after* loading the module. (#157672)
ea6c69
ea6c69
* Tue Mar  1 2005 Dave Jones <davej@redhat.com>
ea6c69
- Rebuild for gcc4
ea6c69
ea6c69
* Thu Feb 17 2005 Dave Jones <davej@redhat.com>
ea6c69
- s/Serial/Epoch/
ea6c69
ea6c69
* Tue Jan 25 2005 Dave Jones <davej@redhat.com>
ea6c69
- Drop the node creation/deletion change from previous release.
ea6c69
  It'll cause grief with selinux, and was a hack to get around
ea6c69
  a udev shortcoming that should be fixed properly.
ea6c69
ea6c69
* Fri Jan 21 2005 Dave Jones <davej@redhat.com>
ea6c69
- Create/remove the /dev/cpu/microcode dev node as needed.
ea6c69
- Use correct path again for the microcode.dat.
ea6c69
- Remove some no longer needed tests in the init script.
ea6c69
ea6c69
* Fri Jan 14 2005 Dave Jones <davej@redhat.com>
ea6c69
- Only enable microcode_ctl service if the CPU is capable.
ea6c69
- Prevent microcode_ctl getting restarted multiple times on initlevel change (#141581)
ea6c69
- Make restart/reload work properly
ea6c69
- Do nothing if not started by root.
ea6c69
ea6c69
* Wed Jan 12 2005 Dave Jones <davej@redhat.com>
ea6c69
- Adjust dev node location. (#144963)
ea6c69
ea6c69
* Tue Jan 11 2005 Dave Jones <davej@redhat.com>
ea6c69
- Load/Remove microcode module in initscript.
ea6c69
ea6c69
* Mon Jan 10 2005 Dave Jones <davej@redhat.com>
ea6c69
- Update to upstream 1.11 release.
ea6c69
ea6c69
* Sat Dec 18 2004 Dave Jones <davej@redhat.com>
ea6c69
- Initial packaging, based upon kernel-utils.
ea6c69