b65095250c
Contains mitigations for the following security vulnerabilities: - CVE-2019-11135: Intel TSX Asynchronous Abort vulnerability: https://software.intel.com/security-software-guidance/insights/deep-dive-intel-transactional-synchronization-extensions-intel-tsx-asynchronous-abort - CVE-2019-11139: Intel Xeon Scalable Processors Voltage Setting Modulation vulnerability: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00271.html Release notes: https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20191112 Signed-off-by: Peter Korsgaard <peter@korsgaard.com> Signed-off-by: Yann E. MORIN <yann.morin.1998@free.fr>
31 lines
971 B
Makefile
31 lines
971 B
Makefile
################################################################################
|
|
#
|
|
# intel-microcode
|
|
#
|
|
################################################################################
|
|
|
|
INTEL_MICROCODE_VERSION = 20191112
|
|
INTEL_MICROCODE_SITE = $(call github,intel,Intel-Linux-Processor-Microcode-Data-Files,microcode-$(INTEL_MICROCODE_VERSION))
|
|
INTEL_MICROCODE_LICENSE = PROPRIETARY
|
|
INTEL_MICROCODE_LICENSE_FILES = license
|
|
INTEL_MICROCODE_REDISTRIBUTE = NO
|
|
INTEL_MICROCODE_INSTALL_IMAGES = YES
|
|
|
|
define INTEL_MICROCODE_INSTALL_IMAGES_CMDS
|
|
mkdir -p $(BINARIES_DIR)/intel-ucode
|
|
$(INSTALL) -m 0644 -t $(BINARIES_DIR)/intel-ucode \
|
|
$(@D)/intel-ucode/*
|
|
endef
|
|
|
|
ifeq ($(BR2_PACKAGE_INTEL_MICROCODE_INSTALL_TARGET),y)
|
|
define INTEL_MICROCODE_INSTALL_TARGET_CMDS
|
|
mkdir -p $(TARGET_DIR)/lib/firmware/intel-ucode
|
|
$(INSTALL) -m 0644 -t $(TARGET_DIR)/lib/firmware/intel-ucode \
|
|
$(@D)/intel-ucode/*
|
|
endef
|
|
else
|
|
INTEL_MICROCODE_INSTALL_TARGET = NO
|
|
endif
|
|
|
|
$(eval $(generic-package))
|