Adolf Belka
6f22b0ac4d
intel-microcode: Update to version 20230613
...
- Updated from version 20230214 to 20230512-rev2 where the source tarball is named version
20230613
- Update of rootfile
- Changelog details for versions 20230512 and 20230512-rev2 can be found at
https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org >
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org >
2023-06-16 09:20:06 +00:00
Adolf Belka
504756d4f5
intel-microcode: Update to version 20230214
...
- Update from version 20221108 to 20230214
- Update of rootfile
- Changelog - details can be found in the releasenote.md file in the source tarball
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org >
2023-03-05 14:54:49 +00:00
Peter Müller
bad01e1257
intel-microcode: Update to 20221108
...
Signed-off-by: Peter Müller <peter.mueller@ipfire.org >
2022-11-18 20:05:39 +00:00
Peter Müller
14f2360f72
intel-microcode: Update to 20220809
...
https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20220809
Signed-off-by: Peter Müller <peter.mueller@ipfire.org >
2022-08-10 19:55:58 +00:00
Peter Müller
1ad192722a
intel-microcode: Update to 20220510
...
Please refer to https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20220510
for further details.
Signed-off-by: Peter Müller <peter.mueller@ipfire.org >
2022-05-12 17:53:50 +00:00
Peter Müller
822076e0c2
intel-microcode: Update to 20220419
...
Please refer to https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20220419
for the release announcement.
Signed-off-by: Peter Müller <peter.mueller@ipfire.org >
2022-05-08 11:24:06 +00:00
Peter Müller
9a7e4d8506
Switch checksums from MD5 to BLAKE2
...
Historically, the MD5 checksums in our LFS files serve as a protection
against broken downloads, or accidentally corrupted source files.
While the sources are nowadays downloaded via HTTPS, it make sense to
beef up integrity protection for them, since transparently intercepting
TLS is believed to be feasible for more powerful actors, and the state
of the public PKI ecosystem is clearly not helping.
Therefore, this patch switches from MD5 to BLAKE2, updating all LFS
files as well as make.sh to deal with this checksum algorithm. BLAKE2 is
notably faster (and more secure) than SHA2, so the performance penalty
introduced by this patch is negligible, if noticeable at all.
In preparation of this patch, the toolchain files currently used have
been supplied with BLAKE2 checksums as well on
https://source.ipfire.org/ .
Cc: Michael Tremer <michael.tremer@ipfire.org >
Signed-off-by: Peter Müller <peter.mueller@ipfire.org >
Acked-by: Michael Tremer <michael.tremeripfire.org>
2022-04-02 14:19:25 +00:00
Adolf Belka
7f0449f253
intel-microcode: Update to version 20220207
...
- Update from 20210608 to 20220207
- Update of rootfile
- Changelog
# Release Notes 20220207
- Security updates for [INTEL-SA-00528](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00528.html )
- Security updates for [INTEL-SA-00532](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00532.html )
- Update for functional issues. Refer to [Third Generation Intel® Xeon® Processor Scalable Family Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/637780 ) for details.
- Update for functional issues. Refer to [Second Generation Intel® Xeon® Processor Scalable Family Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/338848 ) for details.
- Update for functional issues. Refer to [Intel® Xeon® Processor Scalable Family Specification Update](https://www.intel.com/content/www/us/en/processors/xeon/scalable/xeon-scalable-spec-update.html?wapkw=processor+specification+update ) for details.
- Update for functional issues. Refer to [11th Generation Intel® Core™ Processor Family Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/631123 ) for details.
- Update for functional issues. Refer to [11th Generation Intel® Core™ Processor Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/634808 ) for details.
- Update for functional issues. Refer to [10th Gen Intel® Core™ Processor Families Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/341079 ) for details.
- Update for functional issues. Refer to [10th Generation Intel® Core™ Processor Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/615213 ) for details.
- Update for functional issues. Refer to [8th Generation Intel® Core™ Processor Families Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/338025 ) for details.
- Update for functional issues. Refer to [8th Gen Intel® Core™ Processor Family Spec Update](https://www.intel.com/content/www/us/en/products/docs/processors/core/8th-gen-core-family-spec-update.html?wapkw=processor+specification+update ) for details.
- Update for functional issues. Refer to [7th and 8th Generation Intel® Core™ Processor Family Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/334663 ) for details.
- Update for functional issues. Refer to [6th Generation Intel® Processor Family Specification Update](https://www.intel.com/content/www/us/en/processors/core/desktop-6th-gen-core-family-spec-update.html ) for details.
- Update for functional issues. Refer to [Intel® Pentium® Silver and Intel® Celeron® Processors](https://www.intel.com/content/www/us/en/products/docs/processors/pentium/silver-celeron-spec-update.html?wapkw=processor+specification+update ) for details.
### New Platforms
None
### Updated Platforms
| Processor | Stepping | F-M-S/PI | Old Ver | New Ver | Products
|:---------------|:---------|:------------|:---------|:---------|:---------
| HSX-E/EP | Cx/M1 | 06-3f-02/6f | 00000046 | 00000049 | Core Gen4 X series; Xeon E5 v3
| HSX-EX | E0 | 06-3f-04/80 | 00000019 | 0000001a | Xeon E7 v3
| SKL-U/Y | D0 | 06-4e-03/c0 | 000000ea | 000000ec | Core Gen6 Mobile
| BDX-ML | B0/M0/R0 | 06-4f-01/ef | 0b00003e | 0b000040 | Xeon E5/E7 v4; Core i7-69xx/68xx
| SKX-SP | B1 | 06-55-03/97 | 0100015b | 0100015c | Xeon Scalable
| SKX-SP | H0/M0/U0 | 06-55-04/b7 | 02006b06 | 02006c0a | Xeon Scalable
| SKX-D | M1 | 06-55-04/b7 | 02006b06 | 02006c0a | Xeon D-21xx
| CLX-SP | B0 | 06-55-06/bf | 04003102 | 0400320a | Xeon Scalable Gen2
| CLX-SP | B1 | 06-55-07/bf | 05003102 | 0500320a | Xeon Scalable Gen2
| CPX-SP | A1 | 06-55-0b/bf | 07002302 | 07002402 | Xeon Scalable Gen3
| BDX-DE | V2/V3 | 06-56-03/10 | 0700001b | 0700001c | Xeon D-1518/19/21/27/28/31/33/37/41/48, Pentium D1507/08/09/17/19
| BDX-DE | Y0 | 06-56-04/10 | 0f000019 | 0f00001a | Xeon D-1557/59/67/71/77/81/87
| BDX-NS | A1 | 06-56-05/10 | 0e000012 | 0e000014 | Xeon D-1513N/23/33/43/53
| APL | D0 | 06-5c-09/03 | 00000044 | 00000046 | Pentium N/J4xxx, Celeron N/J3xxx, Atom x5/7-E39xx
| APL | E0 | 06-5c-0a/03 | 00000020 | 00000024 | Atom x5-E39xx
| SKL-H/S | R0/N0 | 06-5e-03/36 | 000000ea | 000000ec | Core Gen6; Xeon E3 v5
| DNV | B0 | 06-5f-01/01 | 00000034 | 00000036 | Atom C Series
| ICX-SP | D0 | 06-6a-06/87 | 0d0002a0 | 0d000331 | Xeon Scalable Gen3
| GLK | B0 | 06-7a-01/01 | 00000036 | 00000038 | Pentium Silver N/J5xxx, Celeron N/J4xxx
| GKL-R | R0 | 06-7a-08/01 | 0000001a | 0000001c | Pentium J5040/N5030, Celeron J4125/J4025/N4020/N4120
| ICL-U/Y | D1 | 06-7e-05/80 | 000000a6 | 000000a8 | Core Gen10 Mobile
| LKF | B2/B3 | 06-8a-01/10 | 0000002a | 0000002d | Core w/Hybrid Technology
| TGL | B1 | 06-8c-01/80 | 00000088 | 0000009a | Core Gen11 Mobile
| TGL-R | C0 | 06-8c-02/c2 | 00000016 | 00000022 | Core Gen11 Mobile
| TGL-H | R0 | 06-8d-01/c2 | 0000002c | 0000003c | Core Gen11 Mobile
| AML-Y22 | H0 | 06-8e-09/10 | 000000ea | 000000ec | Core Gen8 Mobile
| KBL-U/Y | H0 | 06-8e-09/c0 | 000000ea | 000000ec | Core Gen7 Mobile
| CFL-U43e | D0 | 06-8e-0a/c0 | 000000ea | 000000ec | Core Gen8 Mobile
| WHL-U | W0 | 06-8e-0b/d0 | 000000ea | 000000ec | Core Gen8 Mobile
| AML-Y42 | V0 | 06-8e-0c/94 | 000000ea | 000000ec | Core Gen10 Mobile
| CML-Y42 | V0 | 06-8e-0c/94 | 000000ea | 000000ec | Core Gen10 Mobile
| WHL-U | V0 | 06-8e-0c/94 | 000000ea | 000000ec | Core Gen8 Mobile
| EHL | B1 | 06-96-01/01 | 00000011 | 00000015 | Pentium J6426/N6415, Celeron J6412/J6413/N6210/N6211, Atom x6000E
| JSL | A0/A1 | 06-9c-00/01 | 0000001d | 2400001f | Pentium N6000/N6005, Celeron N4500/N4505/N5100/N5105
| KBL-G/H/S/E3 | B0 | 06-9e-09/2a | 000000ea | 000000ec | Core Gen7; Xeon E3 v6
| CFL-H/S/E3 | U0 | 06-9e-0a/22 | 000000ea | 000000ec | Core Gen8 Desktop, Mobile, Xeon E
| CFL-S | B0 | 06-9e-0b/02 | 000000ea | 000000ec | Core Gen8
| CFL-H/S | P0 | 06-9e-0c/22 | 000000ea | 000000ec | Core Gen9
| CFL-H | R0 | 06-9e-0d/22 | 000000ea | 000000ec | Core Gen9 Mobile
| CML-H | R1 | 06-a5-02/20 | 000000ea | 000000ec | Core Gen10 Mobile
| CML-S62 | G1 | 06-a5-03/22 | 000000ea | 000000ec | Core Gen10
| CML-S102 | Q0 | 06-a5-05/22 | 000000ec | 000000ee | Core Gen10
| CML-U62 V1 | A0 | 06-a6-00/80 | 000000e8 | 000000ea | Core Gen10 Mobile
| CML-U62 V2 | K1 | 06-a6-01/80 | 000000ea | 000000ec | Core Gen10 Mobile
| RKL-S | B0 | 06-a7-01/02 | 00000040 | 00000050 | Core Gen11
### Removed Platforms
| Processor | Stepping | F-M-S/PI | Old Ver | New Ver | Products
|:---------------|:---------|:------------|:---------|:---------|:---------
| SNR | B0 | 06-86-04/01 | 0b00000f | | Atom P59xxB
| SNR | B1 | 06-86-05/01 | 0b00000f | | Atom P59xxB
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org >
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org >
2022-02-10 06:57:00 +00:00
Michael Tremer
6cf219c427
Drop support for i586
...
This patch removes support for i586 according to the decision being
taken over a year ago.
It removes the architecture from the build system and removes all
required hacks and other quirks that have been necessary before.
There is no need to ship any changed files to the remaining
architectures as the removed code branches have not been used.
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org >
2021-12-04 23:27:26 +01:00
Michael Tremer
65171dc956
intel-microcode: Update to 20210608
...
Fixes various security vulnerabilities:
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00442.html
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00464.html
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00465.html
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org >
2021-06-09 17:02:11 +00:00
Arne Fitzenreiter
a11783096e
intel-microcode: update to 20201118
...
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org >
2020-12-02 23:42:29 +01:00
Arne Fitzenreiter
81e87afb7b
intel-microcode: update to 20201112
...
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org >
2020-11-13 09:03:00 +01:00
Arne Fitzenreiter
1c217406f2
intel-microcode: update to 20201110
...
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org >
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org >
2020-11-11 11:50:14 +00:00
Peter Müller
04b39060f7
intel-microcode: update to 20200616
...
Ice Lake Intel CPUs have been found of being vulnerable to MDS, thus
requiring new microcodes for them. <sarcasm>Yay!</sarcasm> Please refer to
https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20200616
for further information.
Signed-off-by: Peter Müller <peter.mueller@ipfire.org >
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org >
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org >
2020-08-17 17:49:24 +00:00
Arne Fitzenreiter
4d43b3dcb1
intel-microcode: update to 20200609
...
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org >
2020-06-12 17:47:29 +02:00
Arne Fitzenreiter
6fb7936c16
intel-microcode: update to 20191115
...
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org >
2019-12-05 12:48:13 +01:00
Peter Müller
1ec32691e9
intel-microcode: update to 20191112
...
For release notes, refer to:
- https://blogs.intel.com/technology/2019/11/ipas-november-2019-intel-platform-update-ipu/
- https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20191112
Signed-off-by: Peter Müller <peter.mueller@ipfire.org >
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org >
2019-11-13 19:58:08 +00:00
Arne Fitzenreiter
4e69701332
intel-microcode: update to 20190618
...
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org >
2019-06-22 21:05:21 +02:00
Arne Fitzenreiter
29b907c677
intel-microcode: update to 20190514
...
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org >
2019-05-15 13:17:26 +02:00
Arne Fitzenreiter
1ce35de5cc
intel-microcode: update to 20180807a
...
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org >
2018-08-24 20:19:29 +02:00
Arne Fitzenreiter
3d0e252e35
intel-microcode: update to 20180807
...
fixes #11590
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org >
2018-08-11 20:52:45 +02:00
Jonatan Schlag
87b5f3711b
Add Intel microcode updates
...
Fixes : #11590
Signed-off-by: Jonatan Schlag <jonatan.schlag@ipfire.org >
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org >
2018-05-29 16:42:51 +01:00
Michael Tremer
3ed1c621cf
Revert "Add Intel microcode updates from Jan 2018"
...
This reverts commit d404b1dba2 .
Intel has pulled these microcode updates because of
random system reboots and systems becoming unstable.
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org >
2018-01-24 16:08:22 +00:00
Jonatan Schlag
d404b1dba2
Add Intel microcode updates from Jan 2018
...
Add intel microcode to the distribution and configure dracut in a way
that the microcode is loaded early in the boot process.
Fixes #11590
Signed-off-by: Jonatan Schlag <jonatan.schlag@ipfire.org >
Acknowledged-by: Arne Fitzenreiter <arne.fitzenreiter@ipfire.org >
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org >
2018-01-14 15:25:08 +00:00