Changeset 428cad4
- Timestamp:
- 06/08/2021 07:34:53 PM (3 years ago)
- Branches:
- 11.0, 11.1, 11.2, 11.3, 12.0, 12.1, kea, ken/TL2024, ken/inkscape-core-mods, ken/tuningfonts, lazarus, lxqt, plabs/newcss, plabs/python-mods, python3.11, qt5new, rahul/power-profiles-daemon, renodr/vulkan-addition, trunk, upgradedb, xry111/intltool, xry111/llvm18, xry111/soup3, xry111/test-20220226, xry111/xf86-video-removal
- Children:
- ad0b7c3a
- Parents:
- 69e77f2d
- Files:
-
- 2 edited
Legend:
- Unmodified
- Added
- Removed
-
introduction/welcome/changelog.xml
r69e77f2d r428cad4 47 47 <itemizedlist> 48 48 <listitem> 49 <para>[ken] - Update to Intel microcode-20210608 (security fix). Fixes 50 <ulink url="&blfs-ticket-root;15149">#15149</ulink>.</para> 51 </listitem> 52 <listitem> 49 53 <para>[renodr] - Update to nettle-3.7.3. Fixes 50 54 <ulink url="&blfs-ticket-root;15143">#15143</ulink>.</para> -
postlfs/config/firmware.xml
r69e77f2d r428cad4 208 208 and downloading the latest file there. As of this writing the most 209 209 secure version of the microcode, for those machines which can boot it, 210 is microcode-20210 216.<!-- If you have a Skylake machine, please read the210 is microcode-20210608.<!-- If you have a Skylake machine, please read the 211 211 Caution in the 'Early loading of microcode' section below.--> Extract this 212 212 file in the normal way, the microcode is in the <filename>intel-ucode … … 293 293 was created by temporarily booting without 294 294 microcode, to show the current Firmware Bug messages, then the late load 295 shows it being updated to revision 0xec. 296 </para> 297 298 <screen><literal>[ 0.000000] Linux version 5.9.8 (ken@leshp) (gcc (GCC) 10.2.0, 299 GNU ld (GNU Binutils) 2.35) 300 #1 SMP PREEMPT Mon Nov 16 20:42:42 GMT 2020 301 [ 0.000000] Command line: BOOT_IMAGE=/vmlinuz-5.9.8-sda11 root=/dev/sda11 ro 302 [ 0.028715] [Firmware Bug]: TSC_DEADLINE disabled due to Errata; 295 shows it being updated to revision 0xea. 296 </para> 297 298 <screen><literal>[ 0.000000] Linux version 5.12.8 (lfs@leshp) (gcc (GCC) 11.1.0, 299 GNU ld (GNU Binutils) 2.36.1) 300 #2 SMP PREEMPT Fri Jun 4 01:25:02 BST 2021 301 [ 0.000000] Command line: BOOT_IMAGE=/vmlinuz-5.12.8-sda11 root=/dev/sda11 ro 302 resume=/dev/sda10 303 [ 0.028741] [Firmware Bug]: TSC_DEADLINE disabled due to Errata; 303 304 please update microcode to version: 0xb2 (or later) 304 [ 0.111874] SRBDS: Vulnerable: No microcode 305 [ 0.111984] MDS: Vulnerable: Clear CPU buffers attempted, no microcode</literal></screen> 305 [ 0.115716] SRBDS: Vulnerable: No microcode 306 [ 0.115826] MDS: Vulnerable: Clear CPU buffers attempted, no microcode 307 [ 0.389005] microcode: sig=0x506e3, pf=0x2, revision=0x74 308 [ 0.389030] microcode: Microcode Update Driver: v2.2. 309 [ 70.089502] microcode: updated to revision 0xea, date = 2021-01-25 310 [ 70.089528] x86/CPU: CPU features have changed after loading microcode, 311 but might not take effect. 312 [ 70.089530] microcode: Reload completed, microcode revision: 0xea</literal></screen> 306 313 307 314 <para> … … 482 489 </para> 483 490 484 <screen><literal>[ 0.000000] microcode: microcode updated early to revision 0xe2, date = 2020-07-14 485 [ 0.000000] Linux version 5.9.8 (ken@leshp) (gcc (GCC) 10.2.0, 486 GNU ld (GNU Binutils) 2.35) 487 #1 SMP PREEMPT Mon Nov 16 20:42:42 GMT 2020 488 [ 0.000000] Command line: BOOT_IMAGE=/vmlinuz-5.9.8-sda11 root=/dev/sda11 ro 489 [ 0.378287] microcode: sig=0x506e3, pf=0x2, revision=0xe2 490 [ 0.378315] microcode: Microcode Update Driver: v2.2. 491 </literal></screen> 491 <screen><literal>[ 0.000000] microcode: microcode updated early to revision 0xea, date = 2021-01-25 492 [ 0.000000] Linux version 5.12.8 (lfs@leshp) (gcc (GCC) 11.1.0, 493 GNU ld (GNU Binutils) 2.36.1) #2 SMP PREEMPT Fri Jun 4 01:25:02 BST 2021 494 [ 0.000000] Command line: BOOT_IMAGE=/vmlinuz-5.12.8-sda11 root=/dev/sda11 ro 495 resume=/dev/sda10 496 [ 0.381420] microcode: sig=0x506e3, pf=0x2, revision=0xea 497 [ 0.381479] microcode: Microcode Update Driver: v2.2.</literal></screen> 492 498 493 499
Note:
See TracChangeset
for help on using the changeset viewer.