amd64-microcode-2.20131007.1+really20130710.1/0000755000000000000000000000000012212705334014253 5ustar amd64-microcode-2.20131007.1+really20130710.1/microcode_amd_fam15h.bin.README0000644000000000000000000000142312212705334021627 0ustar ;****************************************************************************** ; The associated microcode container file fixes the errata as documented in ; Revision Guide for AMD Family 15h Models 00h-0Fh Processors, order #48063, ; Revision Guide for AMD Family 15h Models 10h-1Fh Processors, order #48931, ; for different revisions of AMD processors as follows: ; ; CPUIDFn[0000_0001]_EAX; ID; Errata fixed; ; ; 0x00600F12; 0x0600063D; #659, #660, #661, #671, #672, #673, #691, #709, #740, #759, #778; ; 0x00600F20; 0x06000822; #691, #699, #704, #708, #709, #734, #740, #778; ; 0x00610F01; 0x06001119; #671, #686, #697, #698, #699, #704, #709, #734, #740; ; ;****************************************************************************** amd64-microcode-2.20131007.1+really20130710.1/microcode_amd.bin.asc0000644000000000000000000000075212212705334020303 0ustar -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.11 (GNU/Linux) iQEcBAABAgAGBQJR3dkLAAoJEKXo28mMAQi0/9cIAKraXlbchZkkIPzyMrZBZZJe zapMterpLdDYL6zukfqgF7Frg94+ilGPK9yKAFsvC+EJyHrF5lbRQ/JthANdRv+Y 8sBKz5/knVI72WdjSjg+473I1rFdIUK+YN7Ygp6eAwP3fg/IQ9UD9iQfWKbbUnx0 WSEMCZm/izsyU2LQMJvtizJ2gz9ktFoALUtTvj0bv34CKr++qqngEVFy/WKQdR6x R3l5MjFAhvzO0O9gV59s1tXbPU56HRhMbvSBn3NIVZu17pwAFySHwQLAeW10GH0j UfgpKQppbz90iLLaSh8vseTOoTBn5SegDtK0JEJNMOuK1VoZ+kgv0cqGCs17HBQ= =FnHv -----END PGP SIGNATURE----- amd64-microcode-2.20131007.1+really20130710.1/microcode_amd.bin0000644000000000000000000003061412212705334017536 0ustar DMA bb#"CC* cCBA001 1 RASC""PP P P 0 C"p I V p *)_~W=Z<p+ H}0z^9S?A@ 0_߫\F`oO:2PJy~83? 7@4?ke? =;x ^q@?C/8~*9пv<}Uso~;?o_9A??7@h__j? 5pg+:]  ?\?cog?z?/?7#?o   p IV p *)_~W=Z<p+ H}0z^9S?A@ 0_߫\F`oO:2PJy~83? 7@4?ke? =;x ^q@?C/8~*9пv<}Uso~;?o_9A??7@h__j? 5pg+:]  ?\?cog?z?/?7#?o  Scb  UQoX9?Xro<fPߌ:2H?{? =?o?7??o? 7?o  n  U Q  O8? N^?߭={{N|{=Ws.?wZ>5>e`u~,oP?<@ ޝ_r#ʀ?c_T 2"?xw?[M<L/à "'dy@Ha^o<}tPMko?w?6??7cg<硛q~(_|d`?@?þgv;_yl=q@ !?c?g쿗߫gc?_UX?,9~:'k?ѳX2]?{=m-o'l~$p-Z=?պrm= _[<E/ X@B~x\2 </u}^=Rwy~y $ Zbq UQ .?\?fq@g~{@UsûDY4Y8C<~38C? ?o?RO0:1 p\lxn8_8>W9.s<@ʿa7} [-\ sk? =?o?7??o? 7?o? 7@?k?@?þgv;?o?7??o? 7?o? 7?{? =?o?7??o? 7?o $ rA ?6 <@T_*i@UsûDY4Z8C<~38C? ?o?RO:1 p\Vlxn8a8>W9.s<ʿa7} [-\sk? =?o?7??o? 7?o? 7?k@? =y?27?'h~{?a 7?o? 7?{? =?o?7??o? 7?o $ 6Ot3usUQ(?P;[{_ko@jVu8̠׃?{?5`z8Q XO2:I1,G 2'~l`85?ߍ >xs?p PRĪrC7?T9h< _[|{;&`>)o.5pya3 }ٕPo?@ ޝ_#r?RȰO:1p \lxn8ߕ/HWO2:@SK{ࢀ?@?þgv;N+9?z-? f79~?o?<?p߼\@_G~?yQ9A?X<@Qnb38?C/P>R2?o?7??o? 7?o 21 4 s/?^O:2@G{@xG?5@eu<q@;{Я /L yW_|Z?Ah <|s{ Q؃~`:F)? 7??_{|@eO*?W>Z 5p Z_J(r?Á ĮX$uyC@W^?SUJOuqPo*~ue ' @O0 {hEЌE<)fS÷PU?|cـᗁo/'xh~@;&`>)o.jpyͿa3} = ?(?o?Pe !ueοa|3} ;7oO??J\ WO2:TXީ`ucЀ%ÿҗJ<[z_Ń|_{ [e?o8|=<)}׃~?8A rk c??o  !)P|YdS)%-tc!1ME3r2љߑeMNWTؖLdI ` C_k])pV1U7n)%P$F+p,p HJU=/ 6;6L3@ JTK!-v"nwgc2P$ZZnF`qXmƝ^:  &QvAR{i* *sˬhSX|Ea]=Et ,]^OyI썋<ڌr0ܜ`U%X! -9pOl!,uZIА.ĴsXIS1Xf ҟ}Mr*Sݏ Ӻ/.zH!Obi#UҒ u[oJ/5+úQYc7Z~ aV4v漞*QMB?Ix*=k7z⡜T( e* bO-@.rqK[xy"ZK9шyT>C%nФig3$gO>HfBdBIMGW*CStt(s/" ʯg(h2S^z豖ϸ|3>Z`ɸmwd{M`I(|THdR[6r]0\Z4f[2[ڇvyYp4sj$2H:rOo7gw@/aESssܱPa'rd_nnw wThf>&22鰷tXXiep#y4I11'_ {>cL/v4 KZ)@ $'yuu桫ӵjtwz[/v~"5`1=1>! vmE`~ypc7]   PU| HK? 'gMU9UX4+tt^ ^xHJX]+CvI˞H Q%O-P)D,N %C "ىK LJ'Θ`vqB^,i e&EMxxO{$~Kl.;Ѥ EAb'P+%(CxּH.z|4$ jEA~cjFL&y[<|IZHБ9ؑ%^zXofΔBe1>LUWg[KTZ`J028Sr^I Y[=pk@PYN"XF'4"qDnVm7gi>p V}^.Z!ja3,#+fQM=Xn~?!P[ز7l;/r9=/y_SpgԸ`Z̚Ⱦ=o%i XO}֑`b< yTmt@Q"Asx" =.S7b9:צ'Xl`r8U 0ǘ%K?tyf4L6DW2wY&_A%XL_-N@J8f5zqQ÷2rG>*O2@U!Z7&  \LkR |;LbGIltM}gN$B_8eY/iڨ4vx$n#<|]5K,Ѿ8om 2k4|zgV24K4Bg㘵69mCwrp+vHԈ4]˳2Oh&s5ha/!۲yεjX3.ꘝ.[<sk͈9vk+pXIzhw*Rk %i۱@QcN[6MԬ=T%pQzܔ_T>]?xfF2CowmKa<_?mI_}x4>xI$amd64-microcode-2.20131007.1+really20130710.1/microcode_amd_fam15h.bin.asc0000644000000000000000000000075212212705334021444 0ustar -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.11 (GNU/Linux) iQEcBAABAgAGBQJR3dkfAAoJEKXo28mMAQi0iTsIAJ5nCgz/+jFYag2W/OH+kOQe BDXYSC5diXQR5wF/HUkXWh0sl+jNK/OrRVxT7sFaEgAUhEXhK6Df/h7qnJAYQGFr 5+CKhfSr/0Qbk1ziWYAXVKMOXbuLWSSIov1SCcwLsps7A7puITK6xDemLby7KDGC xCUfKIM/BO6DyFpNhKQ+xJdDi+yVxUKQhbdk/8gY94VdUnVZq3CTK9UStpBuaXu0 qJNfhbaU+OzgZmnmLq5+xGsCML1xfbgF6sexVRx7oT/Jv30tm97YQJWR0h4DU7jU zjID8kGtYRVV7+i8jC+jVpFo21yDVUkHUcqtNXXRB/lbOYFAm+UJviAEc4NEdSw= =JaWY -----END PGP SIGNATURE----- amd64-microcode-2.20131007.1+really20130710.1/microcode_amd_fam15h.bin0000644000000000000000000001730412212705334020700 0ustar DMA@ ` `aa``  =`Y[Du>BoVlr:4w\ʘ5?>O D&6H1&P5Nhu-n>!ge׫CugC$C@Se)&;r~{ ?A^yKUoJp!2-i "eeK:Ÿ́!O \0 ×39xš $j@[!JoR5Z[dB)h@*rbhk1rpIF+Է_eث!yK3 )*c'/iOL~@v! Q.7lӺl7zYy<(6孔? i9YRQjX6 dv Os_)<9~`Ͼ-#CW'ǰrSԂ3Nc.v^bڟ u=\(5,Xʢ#}c!}pbjy"WuD[j?営XwMX po6})g9W΄U7_],k3HHW꿅 p_|)t-X? uB@>yQWOr 5Fgg2Y2U;HF]UgKS̪ ^R Z&VP oSMk?B&@o\0(VV| )jF+Hj 8wqBmFTzwz2kdbET#9PSuRj۩h3\}E@CBQwfϡ$ 3 ~j ;m ك9'r0|Y&U#k_;T:E%=Z9n^#23t̊ y I0)2>PF 1h>tDw 7-ì$|QȭLɒ kz2åtcORg1+`O_a|\uP%0Lu8a4>AfP2 ®v[Ӊ4qmbP nB ]Z~P%Ғu(_1t\I aW |O8uDKsx62pf\Rհ'Q"9\V\ф30p]]8epn@m%zihuڷ6##ڰ+I^9b;j ID`d2pa][f)VprNjVO[ׂMnĹ=7s/􍎅=pϓy᪐H;m6!ooS)ne)]o#.""(A4Hv"|շ(S3gHmW3"CW d%Û%/?{| ʪvRf`sNv}% #EC'.3T%Y؈@=2 @{3;&!ZeJ4 ;F84pU Lh"n(G"'/d۞jӈ+`9^<&:&%CUjv*TvgeakzYJFmUf:w]M3д<'ǮPc FDڡ:3Gנ  *8`9љԜnpZ-E~xtW˷Ħ'9)ane|o=FF,T+]7A_1S"UJ(|ܜ_"F#쪅ݗ>e?D laH ^JčYGvmD+aIJSn‚[rJD}6@;Hc^޲JGd5)$錼4!ܱ!m#:m+m: <_PpAP>1EU*l&qwlUfgnm[ѸT'{!6MOD Ym%ģsQxįqz5l{ӏR=R3&^(ޣ0;|g}LHkX78PiXDL*=)WDbsdؖ9dy֬`3C!0' ;CgLof+g\#$)b>JM]fC͎钫7k߷BO4S/.w\AkKO8"\,73/7X| x| *eϑDzekVE])bYI$tN,KTPʆh7>b k=P|:âFO$+qS=Uq$\N&+%)y)PECU"zEsÅܼ͚ſVP׊#!9b~?IIr}?V}(Q>ymE)NK&jrgD]F_{׳SQO,%B*j;Qm {ƊTP`ciBy[Rj]R;д|(g bOЛCzR{D 81\Y?Q1?_ܛ|&̈́P4fbm&'^WdBcr[uYRtm󑱩XDiD*95p]wLK+N`严im X[-bS s')S|ku/8nmy/DcW &5fc敂qq1ߍ\{cp] R:ycZ}"읹M8k 1rkNȖ`EnHgU)uspo?}, Myё&N1QecHE8XsW^lGd rE`ú2[ܩ߁CZ[Qw(^ra jBCs0.umgLLNppT3 j9!KY^ uS8 G !%Zhw<:?r^e^p(a,%[A?e& \:I痜6-a:tIdI1*1G!3U'/ L eRH8CnXG( }ڙ&$n%mV|Dy)P5Q-2T7[c)S~t>m'X+0_B_Oy|[^Pl ~bͬVi7Y;Va6 fAEzpVnD0T[0DC- ,X#\M߮. Acib HAj^xį!h:4WddcKTb[`qL[D+M&L6lӐ> ŀ4s2)oӁ 7)l#y䪹벁\!pU޺kv6Gj^R=0^:l݌&w6isO_}0&yf%5qfHZ ?jWjsr|؆yض~Kd /yTE.1M̐E}U΀noC.nC$!bS4!/Yq|*I#-|} pk}w@C)q 8omL"u_)("cD `~_z\~7y{ ]WE7̺Q;1|ѫ0š'6,-ExAZ+I?~] ,uV-@,}Oſ*}/p)b2f|ijYWq}1)nfMNяT+Tص ]X IONkW6H0f;!^ IE7-@C<{LNN]]b > +[x.&ב^   a!<7Gh}O|F]&-qNr+V.4 nٔ6t5 4m\l:߲tFjM} v)nt@Lpν2⳽26 |s2eݰNĕ{gF5cbPJH8f{_gȣk{U̕!Zu)1LERH,6.:( GejŬy,&>n 3IH e hB< rR=zWT?&UsEqG;dlTkDmk9i2Th8=96TXs|n2+m@uoMdRqU?Q%2f&f+aC gW:?`滅V'FhsQ!h vz(ņ3X@UL M}C3 Y+qL&3`MSq!K7FX{/VgIC/Ya`,6:y)ܲvwlP_FzI'ݾ0//gIx龜F2=[vԗig6 uPz@eЭ8~v@h̷/%x^hfZ1ӎa@+` ZpݥsعKXp à FȤ +QD:-~I:t/rɄ3 Ň ՊnW8f\\"(Spbp]jjl3lcQϑ%cf!ޓt@@& t0@(ex65~X=*>@ :&V~֭{ `_ᠮo!<敌zF:_žn #7A zO1~{wgaV6*Ԧk XROұ*U7NL]z2F ˈ`Y ^Li1'S{Ő5S(t-@۔w쟏K&Q# V£D3QiH#{}_mX? uI"ᾔ(K=~x-gđfjQ7$ Z u2|Խe ,H<^JDћb9X(c>Ƭm[c26o Qg'ȍ|G6?b]Ã2/Odlf ՂAu9/d ~um]z|k:F̍/ݫb+陦Z-F/{w7K w\L;q ز;6tf^c@9BEIFowF@b_^Q߹i;R4a\*fL: ĥ,N}hk%'AEBI(V꜂vWы~ܔN2Ci Av4AT;gJ3K"$+Ѿu%&l834ЂˁZG  p@U Am)}}Qo\mrjB[G=B FLz ЃFtTL]7j4UO?F(=^}1 R77et쬨9 ܓ /rDaA{! h'MLDm4Ȍ4dXME ghyUǢ?XŠR%MpFG^ű0%WW |X)̳9V82Dh :V;@Ɉ,j:'Ȥ .@<'OH],jJF%V$b*84Mx=p'$4 u=O0zӷ7 xt DEycKa̵)|9C坼t Np=UH-ɇoN|D=?'a=HΘ\[tM>nlT+qqE,11Y2ᜢDS tp=5 T kA&.6mIއ>fZ; ʋ(B3Ay]W*d:yp||^ѵ?ADY$vf㺿VM>amd64-microcode-2.20131007.1+really20130710.1/microcode_amd.bin.README0000644000000000000000000000313712212705334020472 0ustar ;****************************************************************************** ; The associated microcode container file fixes the errata as documented in ; Revision Guide for AMD Family 10h Processors, order #41322, ; Revision Guide for AMD Family 11h Processors, order #41788, ; Revision Guide for AMD Family 12h Processors, order #44739, ; Revision Guide for AMD Family 14h Models 00h-0Fh Processors, order #47534, ; for different revisions of AMD processors as follows: ; ; CPUIDFn[0000_0001]_EAX; ID; Errata fixed; ; ; 0x00100F22; 0x01000083; 244, 260, 280, 302, 308, 315, 342; ; 0x00100F23; 0x01000083; 244, 260, 280, 302, 308, 315, 342; ; 0x00100F2A; 0x01000084; 244, 260, 280, 302, 308, 315, 342; ; 0x00100F42; 0x010000DB; 342, 440, 573; ; 0x00100F43; 0x010000C8; 407, 440; ; 0x00100F52; 0x010000DB; 342, 440, 573; ; 0x00100F53; 0x010000C8; 407, 440; ; 0x00100F62; 0x010000C7; 407, 440; ; 0x00100F63; 0x010000C8; 407, 440; ; 0x00100F80; 0x010000DA; 419, 440, 573; ; 0x00100F81; 0x010000D9; #406, #407, #440, #573, #669; ; 0x00100F91; 0x010000D9; #406, #407, #440, #573, #669; ; 0x00100FA0; 0x010000DC; 438, 440, 573; ; 0x00200F31; 0x02000032; 311, 316; ; 0x00300F10; 0x03000027; #564, #573, #662, #686; ; 0x00500F10; 0x05000029; #461, #564, #594, #595, #784; ; 0x00500F20; 0x05000119; #461, #564, #594, #639, #662, #686, #784; ; ;****************************************************************************** amd64-microcode-2.20131007.1+really20130710.1/README0000644000000000000000000000404112212705334015132 0ustar This package provides latest microcode patches for AMD processor families >= 0x10. See http://www.amd64.org/support/microcode.html for details. Microcode patches are included in container files: - 'microcode_amd.bin' (for AMD CPU families 10h - 14h) - 'microcode_amd_fam15h.bin' (for AMD CPU family 15h) Please read the file INSTALL for install instructions. Please read the file LICENSE for licensing information. The container files include following microcode patches: mc_patch_01000083_PUB-v4/mc_patch_01000083.asm mc_patch_01000084_PUB-v4/mc_patch_01000084.asm mc_patch_010000C7_PUB-v1/mc_patch_010000C7.asm mc_patch_010000C8_PUB-v1/mc_patch_010000C8.asm mc_patch_010000D9_PUB-v1/mc_patch_010000D9.asm mc_patch_010000DA_PUB-v1/mc_patch_010000DA.asm mc_patch_010000DB_PUB-v1/mc_patch_010000DB.asm mc_patch_010000DC_PUB-v1/mc_patch_010000DC.asm mc_patch_02000032_PUB-v3/mc_patch_02000032.asm mc_patch_03000027_PUB-v1/mc_patch_03000027.asm mc_patch_05000029_PUB-v1/mc_patch_05000029.asm mc_patch_05000119_PUB-v1/mc_patch_05000119.asm mc_patch_0600063D_PUB-v1/mc_patch_0600063D.asm mc_patch_06000822_PUB-v1/mc_patch_06000822.asm mc_patch_06001119_PUB-v2/mc_patch_06001119.asm *********************************************************************** Copyright 2008-2013 ADVANCED MICRO DEVICES, INC. All Rights Reserved. AMD is granting you permission to use this software and documentation (if any) (collectively, the “Materials”) pursuant to the terms and conditions of the Software License Agreement included with the Materials. This header does NOT give you permission to use the Materials or any rights under AMD’s intellectual property. Your use of any portion of these Materials shall constitute your acceptance of those terms and conditions. If you do not agree to the terms and conditions of the Software License Agreement, you do not have permission to use any portion of these Materials. If you do not have a copy of the Software License Agreement, contact your AMD representative for a copy. amd64-microcode-2.20131007.1+really20130710.1/LICENSE.amd-ucode0000644000000000000000000000725612212705334017127 0ustar Copyright (C) 2010-2013 Advanced Micro Devices, Inc., All rights reserved. Permission is hereby granted by Advanced Micro Devices, Inc. ("AMD"), free of any license fees, to any person obtaining a copy of this microcode in binary form (the "Software") ("You"), to install, reproduce, copy and distribute copies of the Software and to permit persons to whom the Software is provided to do the same, subject to the following terms and conditions. Your use of any portion of the Software shall constitute Your acceptance of the following terms and conditions. If You do not agree to the following terms and conditions, do not use, retain or redistribute any portion of the Software. If You redistribute this Software, You must reproduce the above copyright notice and this license with the Software. Without specific, prior, written permission from AMD, You may not reference AMD or AMD products in the promotion of any product derived from or incorporating this Software in any manner that implies that AMD endorses or has certified such product derived from or incorporating this Software. You may not reverse engineer, decompile, or disassemble this Software or any portion thereof. THE SOFTWARE IS PROVIDED "AS IS" WITHOUT ANY EXPRESS OR IMPLIED WARRANTY OF ANY KIND, INCLUDING BUT NOT LIMITED TO WARRANTIES OF MERCHANTABILITY, NONINFRINGEMENT, TITLE, FITNESS FOR ANY PARTICULAR PURPOSE, OR WARRANTIES ARISING FROM CONDUCT, COURSE OF DEALING, OR USAGE OF TRADE. IN NO EVENT SHALL AMD OR ITS LICENSORS BE LIABLE FOR ANY DAMAGES WHATSOEVER (INCLUDING, WITHOUT LIMITATION, DAMAGES FOR LOSS OF PROFITS, BUSINESS INTERRUPTION, OR LOSS OF DATA OR INFORMATION) ARISING OUT OF AMD'S NEGLIGENCE, GROSS NEGLIGENCE, THE USE OF OR INABILITY TO USE THE SOFTWARE, EVEN IF AMD HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. BECAUSE SOME JURISDICTIONS PROHIBIT THE EXCLUSION OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES OR THE EXCLUSION OF IMPLIED WARRANTIES, THE ABOVE LIMITATION MAY NOT APPLY TO YOU. Without limiting the foregoing, the Software may implement third party technologies for which You must obtain licenses from parties other than AMD. You agree that AMD has not obtained or conveyed to You, and that You shall be responsible for obtaining the rights to use and/or distribute the applicable underlying intellectual property rights related to the third party technologies. These third party technologies are not licensed hereunder. If You use the Software (in whole or in part), You shall adhere to all applicable U.S., European, and other export laws, including but not limited to the U.S. Export Administration Regulations ("EAR"), (15 C.F.R. Sections 730 through 774), and E.U. Council Regulation (EC) No 1334/2000 of 22 June 2000. Further, pursuant to Section 740.6 of the EAR, You hereby certify that, except pursuant to a license granted by the United States Department of Commerce Bureau of Industry and Security or as otherwise permitted pursuant to a License Exception under the U.S. Export Administration Regulations ("EAR"), You will not (1) export, re-export or release to a national of a country in Country Groups D:1, E:1 or E:2 any restricted technology, software, or source code You receive hereunder, or (2) export to Country Groups D:1, E:1 or E:2 the direct product of such technology or software, if such foreign produced direct product is subject to national security controls as identified on the Commerce Control List (currently found in Supplement 1 to Part 774 of EAR). For the most current Country Group listings, or for additional information about the EAR or Your obligations under those regulations, please refer to the U.S. Bureau of Industry and Security?s website at ttp://www.bis.doc.gov/. amd64-microcode-2.20131007.1+really20130710.1/debian/0000755000000000000000000000000012212753044015476 5ustar amd64-microcode-2.20131007.1+really20130710.1/debian/rules0000755000000000000000000000247612212742301016561 0ustar #!/usr/bin/make -f # debian/rules for amd64-microcode # Copyright (C) 2012 by Henrique de Moraes Holschuh # Published under the GNU GPL license version 2 or any later versions PACKAGE := amd64-microcode DEBDIR := $(CURDIR)/debian PKGDIR := $(DEBDIR)/$(PACKAGE) # DebHelper control export DH_ALWAYS_EXCLUDE=CVS:.svn:.git # Work around Debian bug #688794 INITRAMFS_NAME := $(subst -,_,$(subst +,_,$(subst .,_,$(PACKAGE)))) build-indep: build-arch: build: clean: dh_testdir dh_testroot dh_clean install: dh_testdir dh_testroot dh_prep dh_installdirs dh_install mkdir -p "$(PKGDIR)/usr/share/initramfs-tools/hooks" install -m 755 "$(DEBDIR)/initramfs.hook" \ "$(PKGDIR)/usr/share/initramfs-tools/hooks/$(INITRAMFS_NAME)" mkdir -p "$(PKGDIR)/usr/share/initramfs-tools/scripts/init-premount" install -m 755 "$(DEBDIR)/initramfs.init-premount" \ "$(PKGDIR)/usr/share/initramfs-tools/scripts/init-premount/$(INITRAMFS_NAME)" mkdir -p "$(PKGDIR)/etc/kernel/preinst.d" install -m 755 "$(DEBDIR)/kpreinst" \ "$(PKGDIR)/etc/kernel/preinst.d/$(PACKAGE)" binary: install dh_testdir dh_testroot dh_installdocs dh_installchangelogs dh_lintian dh_compress dh_fixperms dh_installdeb dh_gencontrol dh_md5sums dh_builddeb binary-indep: binary-arch: binary .PHONY: build clean binary install binary-arch binary-indep amd64-microcode-2.20131007.1+really20130710.1/debian/postinst0000644000000000000000000000610412212742301017277 0ustar #!/bin/sh # postinst script for amd64-microcode # # see: dh_installdeb(1) set -e # summary of how this script can be called: # * `configure' # * `abort-upgrade' # * `abort-remove' `in-favour' # # * `abort-remove' # * `abort-deconfigure' `in-favour' # `removing' # # for details, see http://www.debian.org/doc/debian-policy/ or # the debian-policy package case "$1" in configure) # See Debian bug #716917. Blacklist all non-LTS/non-Debian kernel versions # before kernel 3.4 that don't have all microcode fixes as of 2013-07-17. # Only known-bad kernel is 2.6.38. 2.6.32.37 presumed good based on lack of # reports by Debian squeeze backport users. kversion=$(uname -r) if dpkg --compare-versions ${kversion} le 3.4.21 && \ { dpkg --compare-versions ${kversion} lt 2.6.32.58 || \ { dpkg --compare-versions ${kversion} ge 2.6.33 && dpkg --compare-versions ${kversion} lt 3.0.54 ; } || \ { dpkg --compare-versions ${kversion} ge 3.1 && dpkg --compare-versions ${kversion} lt 3.2.35 ; } || \ dpkg --compare-versions ${kversion} ge 3.3 ; \ }; then echo "W: amd64-microcode: unsupported kernel version ${kversion}" >&2 else grep -q "^vendor_id[[:blank:]]*:[[:blank:]]*.*AuthenticAMD" /proc/cpuinfo && { # try to load the microcode module just in case. If we succeed, # it will trigger a microcode update by itself if modprobe -q --first-time microcode ; then echo "Updating microcode on all online processors..." >&2 else # we have to trigger the microcode update manually if [ -e /sys/devices/system/cpu/microcode/reload ] ; then echo "Updating microcode on all online processors..." >&2 echo 1 > /sys/devices/system/cpu/microcode/reload || { echo "Kernel reported failure while updating microcode!" >&2 } else # Try all online processors, broken kernels need this, # fixed kernels will accept it only on the BSP and update # all processors anyway, and -EINVAL all others... but we # don't know which one is the BSP, so we try all of them # and hide errors, the kernel will log any real problem. echo "Using per-core interface to update microcode on online processors..." >&2 find /sys/devices/system/cpu -noleaf -type f -path '/sys/devices/system/cpu/cpu*/microcode/reload' | \ while read i ; do echo -n 1 2>/dev/null >"$i" || true ; done fi fi } # do it like udev and firmware-linux-* if [ -x /usr/sbin/update-initramfs -a -e /etc/initramfs-tools/initramfs.conf ] ; then update-initramfs -u fi fi ;; abort-upgrade|abort-remove|abort-deconfigure) ;; *) echo "postinst called with unknown argument \`$1'" >&2 exit 1 ;; esac # dh_installdeb will replace this with shell code automatically # generated by other debhelper scripts. #DEBHELPER# exit 0 amd64-microcode-2.20131007.1+really20130710.1/debian/kpreinst0000644000000000000000000000070712212742301017256 0ustar #!/bin/sh # # /etc/kernel/preinst.d amd64-microcode script # Copyright (C) 2013 Henrique de Moraes Holschuh # Released under the GPL v2 or later license # # This script makes sure the microcode module is loaded, before the # kernel image has a chance to replace it with a new one that might not # be compatible with the current kernel. # # We need the microcode module to update microcode on postinst. # modprobe -q microcode || true : amd64-microcode-2.20131007.1+really20130710.1/debian/initramfs.init-premount0000755000000000000000000000324312212742301022225 0ustar #!/bin/sh # amd64-microcode initramfs-tools boot script # Copyright (C) 2012,2013 Henrique de Moraes Holschuh # Released under the GPL v2 or later license # # Triggers kernel firmware update requests for processor microcode # when required. # # dependencies: firmware loader, microcode kernel support (built-in/module) PREREQ="" prereqs() { echo "$PREREQ" } case $1 in prereqs) prereqs exit 0 ;; esac # hack to strip spaces is_amd() { [ "x$1" = "xvendor_id" ] && [ "x$2" = "xAuthenticAMD" ] && HAS_AMD=1 } # Only continue if we do possibly have firmware to install [ -d /lib/firmware/amd-ucode ] || exit 0 # module load will already have caused the microcode to be fetched { while read -r module trash ; do [ "x$module" = "xmicrocode" ] && exit 0 ; done ; } < /proc/modules # don't run on non-AMD HAS_AMD=0 { while IFS=: read -r field value ; do is_amd $field $value ; done ; } < /proc/cpuinfo [ $HAS_AMD -eq 0 ] && exit 0; . /scripts/functions if [ -e /sys/devices/system/cpu/microcode/reload ] ; then echo 1 > /sys/devices/system/cpu/microcode/reload || { log_warning_msg "could not update the microcode of every processor" } else # Try all online processors, broken kernels need this, # fixed kernels will accept it only on the BSP and update # all processors anyway, and -EINVAL all others... but we # don't know which one is the BSP, so we try all of them # and hide errors, the kernel will log any real problem. log_begin_msg "Requesting microcode update using per-core interface" for i in /sys/devices/system/cpu/cpu[0-9]*/microcode/reload ; do echo 1 2>/dev/null > "$i" || true done log_end_msg fi : amd64-microcode-2.20131007.1+really20130710.1/debian/initramfs.hook0000755000000000000000000000367412212742301020363 0ustar #!/bin/sh # amd64-microcode initramfs-tools hook script # Copyright (C) 2012,2013 Henrique de Moraes Holschuh # Released under the GPL v2 or later license # # Generates a copy of the minimal microcode for the current system if # possible, and installs it in the initramfs. # PREREQ="" prereqs() { echo "$PREREQ" } case $1 in prereqs) prereqs exit 0 ;; esac . /usr/share/initramfs-tools/hook-functions verbose() { if [ "${verbose}" = "y" ] ; then echo "amd64-microcode: $@" fi : } AUCODE_FW_DIR=/lib/firmware/amd-ucode if [ ! -d "${AUCODE_FW_DIR}" ] ; then verbose "no AMD64 processor microcode datafiles to install" exit 0; fi if grep -q "^vendor_id[[:blank:]]*:[[:blank:]]*.*AuthenticAMD" /proc/cpuinfo; then # See Debian bug #716917. Blacklist all non-LTS/non-Debian kernel versions # before kernel 3.4 Only known-bad kernel is 2.6.38. # # This doesn't blacklist early kernels in the LTS branches, we don't have enough # information at the initramfs-tools layer, due to the way Debian and Ubuntu version # kernel packages. if dpkg --compare-versions ${version} le 3.4 && \ { dpkg --compare-versions ${version} lt 2.6.32 || \ { dpkg --compare-versions ${version} ge 2.6.33 && dpkg --compare-versions ${version} lt 3.0 ; } || \ { dpkg --compare-versions ${version} ge 3.1 && dpkg --compare-versions ${version} lt 3.2 ; } || \ dpkg --compare-versions ${version} ge 3.3 ; \ }; then echo "E: amd64-microcode: unsupported kernel version!" >&2 exit 0 fi verbose "installing all microcode datafiles for AMD64 processors" # Generate firmware dir mkdir -m 755 -p "${DESTDIR}${AUCODE_FW_DIR}" || true cp -fr "${AUCODE_FW_DIR}/." "${DESTDIR}${AUCODE_FW_DIR}/." if ! rmdir "${DESTDIR}${AUCODE_FW_DIR}" 2>/dev/null ; then # The directory was not empty, so we have work to do verbose "installing AMD64 processor microcode update support into initramfs..." force_load microcode fi fi : amd64-microcode-2.20131007.1+really20130710.1/debian/control0000644000000000000000000000144212212742301017074 0ustar Source: amd64-microcode Section: non-free/admin Priority: standard Maintainer: Henrique de Moraes Holschuh Uploaders: Giacomo Catenazzi Build-Depends: debhelper (>= 7) Standards-Version: 3.9.4 Vcs-Git: git://git.debian.org/users/hmh/amd64-microcode.git Vcs-Browser: http://git.debian.org/?p=users/hmh/amd64-microcode.git XS-Autobuild: yes Package: amd64-microcode Architecture: i386 amd64 Depends: ${misc:Depends} Breaks: intel-microcode (<< 2) Description: Processor microcode firmware for AMD CPUs This package contains microcode patches for all AMD AMD64 processors. AMD releases microcode patches to correct processor behavior as documented in the respective processor revision guides. . For Intel processors, please refer to the intel-microcode package. amd64-microcode-2.20131007.1+really20130710.1/debian/changelog0000644000000000000000000001316712212753026017360 0ustar amd64-microcode (2.20131007.1+really20130710.1) unstable; urgency=low * Fix M-D-Y issue that leaked to the package version number * The real upstream release date is 2013-07-10 -- Henrique de Moraes Holschuh Sat, 07 Sep 2013 22:22:00 -0300 amd64-microcode (2.20131007.1) unstable; urgency=low * New upstream release, received through linux-firmware and LKML + updated microcode: sig 0x00500F10, id 0x05000029: erratum (+) 784; sig 0x00500F20, id 0x05000119: erratum (+) 784; sig 0x00600F12, id 0x0600063D: errata (-) 668, (+) 759, 778; + new microcode: sig 0x00200F31, id 0x02000032: errata 311, 316; sig 0x00600F20, id 0x06000822: errata 691, 699, 704, 708, 709, 734, 740, 778; + This update fixes important processor bugs that cause data corruption or unpredictable system behaviour. It also fixes a performance issue and several issues that cause system lockup. * Switch to native package, since there is no upstream tarball -- Henrique de Moraes Holschuh Sat, 07 Sep 2013 15:22:09 -0300 amd64-microcode (2.20120910-1) unstable; urgency=high * debian/control: update Breaks for new intel-microcode version scheme * Bump major version number, this will allow us to also update the stable branch of amd64-microcode in the future without clashing with the stable branch of intel-microcode. The real issue is that amd64-microcode 1.20120910-3 and intel-microcode 1.20130222.6 have changed (in lockstep) to a different initramfs cooperation protocol, but I failed to bump the major version at that time * Urgency high to avoid delaying a series of high-priority intel-microcode updates being done at the moment: we need this version in testing before I can upload stable backports of intel-microcode or amd64-microcode -- Henrique de Moraes Holschuh Sun, 18 Aug 2013 16:19:42 -0300 amd64-microcode (1.20120910-3) unstable; urgency=low * control: remove homepage and update standards-version * initramfs: update copyright information * initramfs, postinst: don't do anything on non-AMD systems (Closes: #715518) * initramfs, postinst: blacklist several kernel versions (Closes: #717185) * control: add breaks: intel-microcode (<< 1.20130222.6~) * load microcode module on package install/upgrade -- Henrique de Moraes Holschuh Sat, 20 Jul 2013 12:45:04 -0300 amd64-microcode (1.20120910-2) unstable; urgency=medium * initramfs: work around initramfs-tools bug #688794. Use "_" in place of "+-." for the initramfs script name. This works around a PANIC during boot when the initramfs was created in a system with noexec $TMPDIR. -- Henrique de Moraes Holschuh Tue, 09 Oct 2012 08:18:01 -0300 amd64-microcode (1.20120910-1) unstable; urgency=medium * AMD microcode release 20120910 + updated microcode: sig 0x00600F12, id 0x06000629: errata (+) 691, 709, 740; + new microcode: sig 0x00610F01, id 0x06001119: errata 671, 686, 697, 698, 699, 704, 709, 734, 740; + This update adds critical errata fixes for commonly used features. The hit probability of these errata is unknown to the Debian maintainer. * README.Debian: mention module-init-tools, not just kmod. This is useful when backporting to Debian Squeeze * debian/control: add Vcs-* fields -- Henrique de Moraes Holschuh Fri, 14 Sep 2012 15:39:37 -0300 amd64-microcode (1.20120117-2) unstable; urgency=low * debian/control: priority of this package should be standard, not extra. All AMD-based X86 boxes should install this package * debian/control: update package description -- Henrique de Moraes Holschuh Mon, 09 Jul 2012 21:50:35 -0300 amd64-microcode (1.20120117-1) unstable; urgency=low * Update ABI (first component of package version) to 1, to match the ABI of intel-microcode packages with /lib/firmware support * Update online processor cores and the initramfs image on package upgrade and the initramfs on package removal * Install initramfs-tools helpers to handle boot-time microcode updates * README.Debian: describe supported mod/built-in configs -- Henrique de Moraes Holschuh Mon, 09 Jul 2012 19:31:47 -0300 amd64-microcode (0.20120117-1) unstable; urgency=medium * AMD microcode release 20120117: sig 0x00100F22, id 0x01000083: errata 244, 260, 280, 302, 308, 315, 342; sig 0x00100F23, id 0x01000083: errata 244, 260, 280, 302, 308, 315, 342; sig 0x00100F2A, id 0x01000084: errata 244, 260, 280, 302, 308, 315, 342; sig 0x00100F42, id 0x010000DB: errata 342, 440, 573; sig 0x00100F43, id 0x010000C8: errata 407, 440; sig 0x00100F52, id 0x010000DB: errata 342, 440, 573; sig 0x00100F53, id 0x010000C8: errata 407, 440; sig 0x00100F62, id 0x010000C7: errata 407, 440; sig 0x00100F63, id 0x010000C8: errata 407, 440; sig 0x00100F80, id 0x010000DA: errata 419, 440, 573; sig 0x00100F81, id 0x010000D9: errata 406, 407, 440, 573, 669; sig 0x00100F91, id 0x010000D9: errata 406, 407, 440, 573, 669; sig 0x00100FA0, id 0x010000DC: errata 438, 440, 573; sig 0x00300F10, id 0x03000027: errata 564, 573, 662, 686; sig 0x00500F10, id 0x05000028: errata 461, 564, 594, 595; sig 0x00500F20, id 0x0500010D: errata 461, 564, 594, 639, 662, 686; sig 0x00600F12, id 0x06000624: errata 659, 660, 661, 668, 671, 672, 673; * Initial upload to Debian, urgency medium because we need this in Wheezy to properly support AMD processors. Closes: #676921. -- Henrique de Moraes Holschuh Sun, 10 Jun 2012 12:22:01 -0300 amd64-microcode-2.20131007.1+really20130710.1/debian/copyright0000644000000000000000000001053012212705334017427 0ustar This package was debianized by Henrique de Moraes Holschuh on Sun Jun 10 10:54:36 BRT 2012 It was downloaded from http://www.amd64.org/support/microcode.html up to version 20120910. It was built from the linux-firmware git tree for version 20131007 onwards. Debian only distributes the AMD64 microcode file in its unaltered form. Upstream Author: Advanced Micro Devices, Inc. Upstream Copyright: Copyright (C) 2010-2013 Advanced Micro Devices, Inc., All rights reserved. Upstream License: Permission is hereby granted by Advanced Micro Devices, Inc. ("AMD"), free of any license fees, to any person obtaining a copy of this microcode in binary form (the "Software") ("You"), to install, reproduce, copy and distribute copies of the Software and to permit persons to whom the Software is provided to do the same, subject to the following terms and conditions. Your use of any portion of the Software shall constitute Your acceptance of the following terms and conditions. If You do not agree to the following terms and conditions, do not use, retain or redistribute any portion of the Software. If You redistribute this Software, You must reproduce the above copyright notice and this license with the Software. Without specific, prior, written permission from AMD, You may not reference AMD or AMD products in the promotion of any product derived from or incorporating this Software in any manner that implies that AMD endorses or has certified such product derived from or incorporating this Software. You may not reverse engineer, decompile, or disassemble this Software or any portion thereof. THE SOFTWARE IS PROVIDED "AS IS" WITHOUT ANY EXPRESS OR IMPLIED WARRANTY OF ANY KIND, INCLUDING BUT NOT LIMITED TO WARRANTIES OF MERCHANTABILITY, NONINFRINGEMENT, TITLE, FITNESS FOR ANY PARTICULAR PURPOSE, OR WARRANTIES ARISING FROM CONDUCT, COURSE OF DEALING, OR USAGE OF TRADE. IN NO EVENT SHALL AMD OR ITS LICENSORS BE LIABLE FOR ANY DAMAGES WHATSOEVER (INCLUDING, WITHOUT LIMITATION, DAMAGES FOR LOSS OF PROFITS, BUSINESS INTERRUPTION, OR LOSS OF DATA OR INFORMATION) ARISING OUT OF AMD'S NEGLIGENCE, GROSS NEGLIGENCE, THE USE OF OR INABILITY TO USE THE SOFTWARE, EVEN IF AMD HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. BECAUSE SOME JURISDICTIONS PROHIBIT THE EXCLUSION OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES OR THE EXCLUSION OF IMPLIED WARRANTIES, THE ABOVE LIMITATION MAY NOT APPLY TO YOU. Without limiting the foregoing, the Software may implement third party technologies for which You must obtain licenses from parties other than AMD. You agree that AMD has not obtained or conveyed to You, and that You shall be responsible for obtaining the rights to use and/or distribute the applicable underlying intellectual property rights related to the third party technologies. These third party technologies are not licensed hereunder. If You use the Software (in whole or in part), You shall adhere to all applicable U.S., European, and other export laws, including but not limited to the U.S. Export Administration Regulations ("EAR"), (15 C.F.R. Sections 730 through 774), and E.U. Council Regulation (EC) No 1334/2000 of 22 June 2000. Further, pursuant to Section 740.6 of the EAR, You hereby certify that, except pursuant to a license granted by the United States Department of Commerce Bureau of Industry and Security or as otherwise permitted pursuant to a License Exception under the U.S. Export Administration Regulations ("EAR"), You will not (1) export, re-export or release to a national of a country in Country Groups D:1, E:1 or E:2 any restricted technology, software, or source code You receive hereunder, or (2) export to Country Groups D:1, E:1 or E:2 the direct product of such technology or software, if such foreign produced direct product is subject to national security controls as identified on the Commerce Control List (currently found in Supplement 1 to Part 774 of EAR). For the most current Country Group listings, or for additional information about the EAR or Your obligations under those regulations, please refer to the U.S. Bureau of Industry and Security?s website at ttp://www.bis.doc.gov/. amd64-microcode-2.20131007.1+really20130710.1/debian/source/0000755000000000000000000000000012212705334016775 5ustar amd64-microcode-2.20131007.1+really20130710.1/debian/source/format0000644000000000000000000000001512212705334020204 0ustar 3.0 (native) amd64-microcode-2.20131007.1+really20130710.1/debian/postrm0000644000000000000000000000205212212667142016747 0ustar #!/bin/sh # postrm script for amd64-microcode # # see: dh_installdeb(1) set -e # summary of how this script can be called: # * `remove' # * `purge' # * `upgrade' # * `failed-upgrade' # * `abort-install' # * `abort-install' # * `abort-upgrade' # * `disappear' # # for details, see http://www.debian.org/doc/debian-policy/ or # the debian-policy package case "$1" in purge|remove) if [ -x /usr/sbin/update-initramfs -a -e /etc/initramfs-tools/initramfs.conf ] ; then update-initramfs -u fi ;; upgrade|failed-upgrade|abort-install|abort-upgrade|disappear) ;; *) echo "postrm called with unknown argument \`$1'" >&2 exit 1 ;; esac # dh_installdeb will replace this with shell code automatically # generated by other debhelper scripts. #DEBHELPER# exit 0 amd64-microcode-2.20131007.1+really20130710.1/debian/install0000644000000000000000000000013412212667142017070 0ustar microcode_amd.bin /lib/firmware/amd-ucode microcode_amd_fam15h.bin /lib/firmware/amd-ucode amd64-microcode-2.20131007.1+really20130710.1/debian/docs0000644000000000000000000000010012212667142016343 0ustar README microcode_amd.bin.README microcode_amd_fam15h.bin.README amd64-microcode-2.20131007.1+really20130710.1/debian/dirs0000644000000000000000000000002712212667142016364 0ustar lib/firmware/amd-ucode amd64-microcode-2.20131007.1+really20130710.1/debian/compat0000644000000000000000000000000212212667142016677 0ustar 7 amd64-microcode-2.20131007.1+really20130710.1/debian/README.Debian0000644000000000000000000000420512212667142017543 0ustar amd64-microcode for Debian -------------------------- Introduction: AMD AMD64 processors are capable of field-upgrading their control program (microcode). These microcode updates correct processor errata, and are often important for safe, correct system operation. While most of the microcode updates fix problems that happen extremely rarely, there are enough updates fixing issues that would cause system lockup, memory corruption, or unpredictable system behavior, to warrant taking it seriously. Microcode updates are ephemeral: they will be lost after a processor hard reset or after the processor is powered off. They must be reapplied at every boot and after the system wakes up from suspend to RAM or disk. Updating the processor microcode is the responsibility of the system firmware (BIOS or EFI). However, not all vendors will release timely updates for their firmware when AMD releases updated microcode, and most users don't update their system firmware in a timely fashion (or at all) anyway. The end result is that, unless some other method of distributing microcode updates is in place, the processor in many systems will be running with outdated microcode, increasing the chances of incorrect system operation. Debian can apply microcode updates to the system processors during the operating system boot. The following configurations are supported for the microcode driver: 1. When an initramfs image is used (Debian default), both modular and built-in configs for the microcode driver will work, and microcode will be updated by the initramfs. You must run "update-initramfs -u" when new microcode is manually installed to /lib/firmware (this will be done automatically when new microcode is installed by a package upgrade). 2. When an initramfs image is not used, only the modular microcode driver is supported. If it doesn't autoload by itself in your kernel version, you should add it to /etc/modules. You must install either the kmod or module-init-tools package, and the root filesystem with /lib/firmware must be available when the modules are loaded. -- Henrique de Moraes Holschuh , 2012-07-09