Your message dated Sat, 31 Aug 2024 12:34:14 +0100
with message-id 
<9e3e8b8cd0db3b52d4adb2cfad04baa007c8e3e8.ca...@adam-barratt.org.uk>
and subject line Closing bugs for 12.7
has caused the Debian Bug report #1078781,
regarding bookworm-pu: package amd64-microcode/3.20240710.2~deb12u1
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1078781: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1078781
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: release.debian.org
Severity: normal
Tags: bookworm
User: release.debian....@packages.debian.org
Usertags: pu

[ Reason ]

As requested by the security team, I would like to bring the *firmware*
update level for AMD processors in Bullseye and Bookworm to match what
we have in Sid and Trixie.  This is the bug report for Bookworm, a
separate one will be filled for Bullseye.

The microcode update is a security update for "Sinkclose", plus
unspecified functional issues.

This update not only syncs the processor microcode updates and AMD SEV
firmware with what we distribute in Sid and Trixie, but also adds the
firmware data files for AMD-TEE.

It does NOT enable AMD TEE by itself.

[ Impact ]

These updates fix security issues on AMD server processors, as well as
unspecified functional issues.

[ Tests ]

The recent dpkg-trigger functionality was tested, including by manual
error injection so that the error paths were exercised.  It is already
in Trixie and Sid for a few days, and nobody reported issues with it.

There are no reports from users of AMD processors of any regressions due
to the microcode update.

The TEE changes have been tested in Sid and Trixie since 2024-01.

The SEV firmware update has been tested in Sid and Trixie since 2023-08.

Installation was tested on a bookworm container with amd64-microcode and
all other firmware packages installed, to ensure there are no file
collisions.

[ Risks ]

Microcode updates are known to seldom cause boot hangs on specific
systems, and to very rarely cause runtime regressions.  These are no
different, but I could not find any reports of such issues.

[ Checklist ]
  [x] *all* changes are documented in the d/changelog
  [x] I reviewed all changes and I approve them
  [x] attach debdiff against the package in (old)stable
  [x] the issue is verified as fixed in unstable

[ Changes ]

* Direct calls to "update-initramfs -u" where replaced with the
equivalent of:

dpkg-trigger --no-await update-initramfs || update-initramfs -u

in both postinst and postrm.

* Documentation was updated with upstream information

* Binary microcode blobs were updated with new upstream binary blobs.

[ Extra Information ]

Diff was generated from the git tree, in order to avoid excessive noise
due to the changes to the binary blobs.

diffstat:
 LICENSE.amd_pmf                                |   51 +++++++++++
 README                                         |  110 ++++++++++++++++++++++++-
 amd-ucode/README                               |   25 +++--
 amd-ucode/microcode_amd_fam17h.bin             |binary
 amd-ucode/microcode_amd_fam17h.bin.asc         |   16 +--
 amd-ucode/microcode_amd_fam19h.bin             |binary
 amd-ucode/microcode_amd_fam19h.bin.asc         |   16 +--
 amd/amd_sev_fam19h_model0xh.sbin               |binary
 amd/amd_sev_fam19h_model1xh.sbin               |binary
 amdtee/773bd96f-b83f-4d52-b12dc529b13d8543.bin |binary
 amdtee/amd_pmf_v3.bin                          |    1 
 debian/README.Debian                           |   10 --
 debian/amd64-microcode.dirs                    |    1 
 debian/amd64-microcode.install                 |    1 
 debian/amd64-microcode.postinst                |   11 +-
 debian/amd64-microcode.postrm                  |    7 -
 debian/changelog                               |   86 +++++++++++++++++++
 debian/control                                 |   14 ++-
 debian/copyright                               |   59 +++++++++++++
 19 files changed, 361 insertions(+), 47 deletions(-)

-- 
  Henrique Holschuh
diff --git a/LICENSE.amd_pmf b/LICENSE.amd_pmf
new file mode 100644
index 0000000..349e207
--- /dev/null
+++ b/LICENSE.amd_pmf
@@ -0,0 +1,51 @@
+Copyright (C) 2023  Advanced Micro Devices, Inc. All rights reserved.
+
+REDISTRIBUTION: Permission is hereby granted, free of any license fees,
+to any person obtaining a copy of this microcode (the "Software"), to
+install, reproduce, copy and distribute copies, in binary form only, of
+the Software and to permit persons to whom the Software is provided to
+do the same, provided that the following conditions are met:
+
+No reverse engineering, decompilation, or disassembly of this Software
+is permitted.
+
+Redistributions must reproduce the above copyright notice, this
+permission notice, and the following disclaimers and notices in the
+Software documentation and/or other materials provided with the
+Software.
+
+DISCLAIMER: THE USE OF THE SOFTWARE IS AT YOUR SOLE RISK.  THE SOFTWARE
+IS PROVIDED "AS IS" AND WITHOUT WARRANTY OF ANY KIND AND COPYRIGHT
+HOLDER AND ITS LICENSORS EXPRESSLY DISCLAIM ALL WARRANTIES, EXPRESS AND
+IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
+MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NON-INFRINGEMENT.
+COPYRIGHT HOLDER AND ITS LICENSORS DO NOT WARRANT THAT THE SOFTWARE WILL
+MEET YOUR REQUIREMENTS, OR THAT THE OPERATION OF THE SOFTWARE WILL BE
+UNINTERRUPTED OR ERROR-FREE.  THE ENTIRE RISK ASSOCIATED WITH THE USE OF
+THE SOFTWARE IS ASSUMED BY YOU.  FURTHERMORE, COPYRIGHT HOLDER AND ITS
+LICENSORS DO NOT WARRANT OR MAKE ANY REPRESENTATIONS REGARDING THE USE
+OR THE RESULTS OF THE USE OF THE SOFTWARE IN TERMS OF ITS CORRECTNESS,
+ACCURACY, RELIABILITY, CURRENTNESS, OR OTHERWISE.
+
+DISCLAIMER: UNDER NO CIRCUMSTANCES INCLUDING NEGLIGENCE, SHALL COPYRIGHT
+HOLDER AND ITS LICENSORS OR ITS DIRECTORS, OFFICERS, EMPLOYEES OR AGENTS
+("AUTHORIZED REPRESENTATIVES") BE LIABLE FOR ANY INCIDENTAL, INDIRECT,
+SPECIAL OR CONSEQUENTIAL DAMAGES (INCLUDING DAMAGES FOR LOSS OF BUSINESS
+PROFITS, BUSINESS INTERRUPTION, LOSS OF BUSINESS INFORMATION, AND THE
+LIKE) ARISING OUT OF THE USE, MISUSE OR INABILITY TO USE THE SOFTWARE,
+BREACH OR DEFAULT, INCLUDING THOSE ARISING FROM INFRINGEMENT OR ALLEGED
+INFRINGEMENT OF ANY PATENT, TRADEMARK, COPYRIGHT OR OTHER INTELLECTUAL
+PROPERTY RIGHT EVEN IF COPYRIGHT HOLDER AND ITS AUTHORIZED
+REPRESENTATIVES HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.  IN
+NO EVENT SHALL COPYRIGHT HOLDER OR ITS AUTHORIZED REPRESENTATIVES TOTAL
+LIABILITY FOR ALL DAMAGES, LOSSES, AND CAUSES OF ACTION (WHETHER IN
+CONTRACT, TORT (INCLUDING NEGLIGENCE) OR OTHERWISE) EXCEED THE AMOUNT OF
+US$10.
+
+Notice:  The Software is subject to United States export laws and
+regulations.  You agree to comply with all domestic and international
+export laws and regulations that apply to the Software, including but
+not limited to the Export Administration Regulations administered by the
+U.S. Department of Commerce and International Traffic in Arm Regulations
+administered by the U.S. Department of State.  These laws include
+restrictions on destinations, end users and end use.
diff --git a/README b/README
index 798d2e7..63c0879 100644
--- a/README
+++ b/README
@@ -1,13 +1,117 @@
 This amd64-microcode release was based on the linux-firmware tree.
 The linux-firmware tree can be found in kernel.org.
 
-It includes AMD-SEV firmware and AMD-UCODE firmware.  The package
-version is now based on the linux-firmware release tag that included
-the newest of either amd-ucode or amd-sev.
+It includes AMD-SEV firmware, AMD-UCODE firmware, and AMD-TEE applications
+(which are often firmware for other AMD drivers).  The package version is now
+based on the linux-firmware release tag that included the newest of any of the
+included firmware.
+
+amdtee/ currently includes firmware for the amd_pmf driver.
 
 
 latest commits in this release:
 
+commit 091bd5adf19c7ab01214c64689952acb4833b21d
+Author: John Allen <john.al...@amd.com>
+Date:   Wed Jul 10 14:58:02 2024 +0000
+
+    linux-firmware: Update AMD cpu microcode
+
+    * Update AMD cpu microcode for processor family 17h
+    * Update AMD cpu microcode for processor family 19h
+
+    Key Name        = AMD Microcode Signing Key (for signing microcode container files only)
+    Key ID          = F328AE73
+    Key Fingerprint = FC7C 6C50 5DAF CC14 7183 57CA E4BE 5339 F328 AE73
+
+    Signed-off-by: John Allen <john.al...@amd.com>
+
+commit a193c6517fbfc0e7a4e2f8b06cb2742a82a8dd63
+Author: John Allen <john.al...@amd.com>
+Date:   Tue Jan 16 21:07:43 2024 +0000
+
+    linux-firmware: Update AMD cpu microcode
+
+    * Update AMD cpu microcode for processor family 19h
+
+    Key Name        = AMD Microcode Signing Key (for signing microcode container files only)
+    Key ID          = F328AE73
+    Key Fingerprint = FC7C 6C50 5DAF CC14 7183 57CA E4BE 5339 F328 AE73
+
+    Signed-off-by: John Allen <john.al...@amd.com>
+
+commit bfc33c1e308e1ebd5f216781ea0b091c2379bbb2
+Author: John Allen <john.al...@amd.com>
+Date:   Tue Dec 5 20:10:11 2023 +0000
+
+    linux-firmware: Update AMD cpu microcode
+
+    * Update AMD cpu microcode for processor family 17h
+
+    Key Name        = AMD Microcode Signing Key (for signing microcode container files only)
+    Key ID          = F328AE73
+    Key Fingerprint = FC7C 6C50 5DAF CC14 7183 57CA E4BE 5339 F328 AE73
+
+    Signed-off-by: John Allen <john.al...@amd.com>
+
+commit 06afd7f939c5b245b2af9e0fee13026f2aaf77fa
+Author: John Allen <john.al...@amd.com>
+Date:   Thu Oct 19 17:03:20 2023 +0000
+
+    linux-firmware: Update AMD cpu microcode
+
+    * Update AMD cpu microcode for processor family 19h
+
+    Key Name        = AMD Microcode Signing Key (for signing microcode container files only)
+    Key ID          = F328AE73
+    Key Fingerprint = FC7C 6C50 5DAF CC14 7183 57CA E4BE 5339 F328 AE73
+
+    Signed-off-by: John Allen <john.al...@amd.com>
+
+commit 328beacb005045b313cd36a217ffbe8d9c37090a
+Author: Shyam Sundar S K <shyam-sundar....@amd.com>
+Date:   Tue Sep 26 21:11:07 2023 +0530
+
+    amd_pmf: Add initial PMF TA for Smart PC Solution Builder
+
+    AMD PMF driver loads the PMF TA (Trusted Application) into the AMD
+    ASP's (AMD Security Processor) TEE (Trusted Execution Environment).
+
+    PMF Trusted Application is a secured firmware placed under
+    /lib/firmware/amdtee gets loaded only when the TEE environment is
+    initialized. This Firmware adds the initial support for PMF Smart
+    PC Solution Builder.
+
+    Signed-off-by: Shyam Sundar S K <shyam-sundar....@amd.com>
+
+commit d252e92d50c02623ea9da0a140240f6d7ac4558e
+Author: Sandipan Das <sandipan....@amd.com>
+Date:   Thu Sep 14 20:16:51 2023 +0530
+
+    linux-firmware: amd-ucode: Add note on fam19h warnings
+
+    When running 5.19+ kernels on Genoa or Bergamo systems, some microcode
+    patches are known to trigger warnings in the PMI handler. Add a note
+    to list the required minimum patch levels for addressing this problem.
+
+    Signed-off-by: Sandipan Das <sandipan....@amd.com>
+    Signed-off-by: Josh Boyer <jwbo...@kernel.org>
+
+commit 97e88a0d70825d7dc0635d8d898c393b6144ebcc
+Author: John Allen <john.al...@amd.com>
+Date:   Wed Aug 23 20:28:06 2023 +0000
+
+    linux-firmware: Update AMD SEV firmware
+
+    Update AMD SEV firmware version 1.55 build 8 for AMD family 19h processors
+    with models in the range 00h to 0fh.
+
+    Add AMD SEV firmware version 1.55 build 21 for AMD family 19h processors
+    with models in the range 10h to 1fh.
+
+    Signed-off-by: John Allen <john.al...@amd.com>
+    Signed-off-by: Josh Boyer <jwbo...@kernel.org>
+
 commit f2eb058afc57348cde66852272d6bf11da1eef8f
 Author: John Allen <john.al...@amd.com>
 Date:   Tue Aug 8 19:02:39 2023 +0000
diff --git a/amd-ucode/README b/amd-ucode/README
index fac1152..4f862af 100644
--- a/amd-ucode/README
+++ b/amd-ucode/README
@@ -31,18 +31,18 @@ Microcode patches in microcode_amd_fam16h.bin:
   Family=0x16 Model=0x00 Stepping=0x01: Patch=0x0700010f Length=3458 bytes
 
 Microcode patches in microcode_amd_fam17h.bin:
+  Family=0x17 Model=0x01 Stepping=0x02: Patch=0x0800126f Length=3200 bytes
+  Family=0x17 Model=0x31 Stepping=0x00: Patch=0x0830107c Length=3200 bytes
   Family=0x17 Model=0x08 Stepping=0x02: Patch=0x0800820d Length=3200 bytes
-  Family=0x17 Model=0x31 Stepping=0x00: Patch=0x0830107a Length=3200 bytes
   Family=0x17 Model=0xa0 Stepping=0x00: Patch=0x08a00008 Length=3200 bytes
-  Family=0x17 Model=0x01 Stepping=0x02: Patch=0x0800126e Length=3200 bytes
 
 Microcode patches in microcode_amd_fam19h.bin:
-  Family=0x19 Model=0x11 Stepping=0x01: Patch=0x0a10113e Length=5568 bytes
-  Family=0x19 Model=0x11 Stepping=0x02: Patch=0x0a10123e Length=5568 bytes
-  Family=0x19 Model=0xa0 Stepping=0x02: Patch=0x0aa00212 Length=5568 bytes
-  Family=0x19 Model=0x01 Stepping=0x01: Patch=0x0a0011d1 Length=5568 bytes
-  Family=0x19 Model=0x01 Stepping=0x00: Patch=0x0a001079 Length=5568 bytes
-  Family=0x19 Model=0x01 Stepping=0x02: Patch=0x0a001234 Length=5568 bytes
+  Family=0x19 Model=0x01 Stepping=0x00: Patch=0x0a00107a Length=5568 bytes
+  Family=0x19 Model=0x11 Stepping=0x02: Patch=0x0a101248 Length=5568 bytes
+  Family=0x19 Model=0xa0 Stepping=0x02: Patch=0x0aa00215 Length=5568 bytes
+  Family=0x19 Model=0x01 Stepping=0x02: Patch=0x0a001238 Length=5568 bytes
+  Family=0x19 Model=0x11 Stepping=0x01: Patch=0x0a101148 Length=5568 bytes
+  Family=0x19 Model=0x01 Stepping=0x01: Patch=0x0a0011d5 Length=5568 bytes
   Family=0x19 Model=0xa0 Stepping=0x01: Patch=0x0aa00116 Length=5568 bytes
 
 NOTE: For Genoa (Family=0x19 Model=0x11) and Bergamo (Family=0x19 Model=0xa0),
@@ -53,3 +53,12 @@ a32b0f0db3f3 ("x86/microcode/AMD: Load late on both threads too")
 When late loading the patches for Genoa or Bergamo, there may be one spurious
 NMI observed per physical core. These NMIs are benign and don't cause any
 functional issue but will result in kernel messages being logged.
+
+NOTE: When running 5.19+ kernels on Genoa or Bergamo systems, some microcode
+patches are known to trigger warnings in the PMI handler. The following are
+the required minimum patch levels to address this problem:
+
+  Family=0x19 Model=0x11 Stepping=0x01: Patch=0x0a10113e
+  Family=0x19 Model=0x11 Stepping=0x02: Patch=0x0a10123e
+  Family=0x19 Model=0xa0 Stepping=0x01: Patch=0x0aa00116
+  Family=0x19 Model=0xa0 Stepping=0x02: Patch=0x0aa00212
diff --git a/amd-ucode/microcode_amd_fam17h.bin b/amd-ucode/microcode_amd_fam17h.bin
index f9841b6..ae94fee 100644
Binary files a/amd-ucode/microcode_amd_fam17h.bin and b/amd-ucode/microcode_amd_fam17h.bin differ
diff --git a/amd-ucode/microcode_amd_fam17h.bin.asc b/amd-ucode/microcode_amd_fam17h.bin.asc
index 34a4024..7c42849 100644
--- a/amd-ucode/microcode_amd_fam17h.bin.asc
+++ b/amd-ucode/microcode_amd_fam17h.bin.asc
@@ -1,11 +1,11 @@
 -----BEGIN PGP SIGNATURE-----
 
-iQEzBAABCgAdFiEE/HxsUF2vzBRxg1fK5L5TOfMornMFAmS4Mm4ACgkQ5L5TOfMo
-rnN35wgAkllCunxE6J5hQyLMx5o4WTHZkbNvXmu6nV1Y3vjiL1oeaK+pmx8BlkPt
-fGZJCe/068kqmp3N4EtOZLxXn55t3jNBYectPr0RmFqpjMsEJEcfXfuXROA4N9Ti
-Zd/o6X21eHEsm0kK0q4YfppfgTd5Ze7k1jTkUuuU6/yh6uRk1MiFreEzkPO3Aayh
-iEWlYx33vq3HccTPgdY3D64Zr8gmgKG+8mdEvqb1jK4SVZ1/9vy4OKIIpUZB/eqx
-46h9Ejwn9pktnYkHi/A/zCREEcIQ10HXFF5bjxJTFQkM5S46/QEO7uuvnpMb+6Yy
-4V1/QIWMG6ixqCRx9GqbBK7GHdYODw==
-=+IsI
+iQEzBAABCgAdFiEE/HxsUF2vzBRxg1fK5L5TOfMornMFAmX+B5wACgkQ5L5TOfMo
+rnOyEQgAjcQdiUYTOecifIkRdvIotUmd0rYG4Y4atXIkcMKpuZXY3ipiIJQTi+zb
+fsTrrzqvfdS0FeG9GPePsgZwBvUCbvxbW+I2ffw4KXmZQh7J0WE3qYAEx3uV3IaE
+UtV6yM9OW6EEFuIwx8m2LQsl3bP6X/Cwgf3DEHlsVZzDexrYNU9lP/BkujpO0m/q
+s8PanPluQqesoaOm+DAQnceMC4r1jpfeZ3DShvyGqaNzB9HeOE2uQEfWW69cfkU9
+n3Lsqxjgl45EmKyNqqy5o3uMBwMJzl0jW2NR5k80+H65hv4Skclk6YCz651zx9C5
+bisCiEwf4gg7ffQPLYW9MCsK3yjTaQ==
+=vQEt
 -----END PGP SIGNATURE-----
diff --git a/amd-ucode/microcode_amd_fam19h.bin b/amd-ucode/microcode_amd_fam19h.bin
index 02a5d05..4dcdca8 100644
Binary files a/amd-ucode/microcode_amd_fam19h.bin and b/amd-ucode/microcode_amd_fam19h.bin differ
diff --git a/amd-ucode/microcode_amd_fam19h.bin.asc b/amd-ucode/microcode_amd_fam19h.bin.asc
index 8cff901..dcd5a23 100644
--- a/amd-ucode/microcode_amd_fam19h.bin.asc
+++ b/amd-ucode/microcode_amd_fam19h.bin.asc
@@ -1,11 +1,11 @@
 -----BEGIN PGP SIGNATURE-----
 
-iQEzBAABCgAdFiEE/HxsUF2vzBRxg1fK5L5TOfMornMFAmTEYrcACgkQ5L5TOfMo
-rnN4IQf/QKbOezXZ4OYzaPANvsZQEAzLNfuylC/aQMwrPaO7daz5/zmCN4HU5XkH
-dDT8DYfPg+fQHIgxAw0/L24xPOm5Op/QuLVDyDqVr4qvL8+65eeI+JqxD/wXMXYN
-V34kkLM2p8iuyY1Nc8IDLXu4X75KGNPbKZlMRKMU3Pr7ai5O4ihmiAM+N6qv1KEJ
-YToNN6vrg0qt1cv0SLM8sa4e7L1+oblUrg/o0FViYE8pxsU3ZRRVSJMUg+lKjvl/
-1ZPGKOdD80fcNJ+ItYGHNNs3eCc3WgW7Kc/E668eH75Yu9Zt7ewWZX8Sg/mygleY
-OzMwhbPJg4bF4zm7C/Pku7i1T2Omcg==
-=km2X
+iQEzBAABCgAdFiEE/HxsUF2vzBRxg1fK5L5TOfMornMFAmX9xsgACgkQ5L5TOfMo
+rnP2aQf/QBOiKUZsrVIbnn0+Ls84yDYovoesYriy1rbK+K5CVRb/0iqoFn5xKIu6
+bvyHN0fnj7Ko+oedNvcRCmlu+jiw08s3WArQb6r3fK4QT/2Wj2f+qX14uoFuCGUd
+QgZTc4hZxNxSZBbQuKVbtDmT0iFtV0jKBp/ajdYD9++rA+VcIemKtwX/sxEZnUFi
+fXg016uAs/Q9LQ5KWvz3VhFz2G77BEXjDIJNAHSVCxmWCvsd05kf1SbXUswlj/T8
+JtuH840zfZicZEk8e3grO4fSywLyrZCjqATSXa+XY63thCIglM9c6V+EBL3jGXxh
+Cs2tZH8/ge+tL/UBBJ8FdOZcVSpkeQ==
+=HHoV
 -----END PGP SIGNATURE-----
diff --git a/amd/amd_sev_fam19h_model0xh.sbin b/amd/amd_sev_fam19h_model0xh.sbin
index 141d5d0..9cde6ad 100644
Binary files a/amd/amd_sev_fam19h_model0xh.sbin and b/amd/amd_sev_fam19h_model0xh.sbin differ
diff --git a/amd/amd_sev_fam19h_model1xh.sbin b/amd/amd_sev_fam19h_model1xh.sbin
new file mode 100644
index 0000000..529dcb5
Binary files /dev/null and b/amd/amd_sev_fam19h_model1xh.sbin differ
diff --git a/amdtee/773bd96f-b83f-4d52-b12dc529b13d8543.bin b/amdtee/773bd96f-b83f-4d52-b12dc529b13d8543.bin
new file mode 100644
index 0000000..6b454bf
Binary files /dev/null and b/amdtee/773bd96f-b83f-4d52-b12dc529b13d8543.bin differ
diff --git a/amdtee/amd_pmf_v3.bin b/amdtee/amd_pmf_v3.bin
new file mode 120000
index 0000000..e340752
--- /dev/null
+++ b/amdtee/amd_pmf_v3.bin
@@ -0,0 +1 @@
+773bd96f-b83f-4d52-b12dc529b13d8543.bin
\ No newline at end of file
diff --git a/debian/README.Debian b/debian/README.Debian
index b0116a4..cd91c25 100644
--- a/debian/README.Debian
+++ b/debian/README.Debian
@@ -44,13 +44,7 @@ the initramfs using dracut, and reboot.  Note that since Linux kernel 4.4,
 one must use dracut 044 or later.
 
 Applying the microcode updates without the use of an early initramfs is
-not automatically supported anymore, due to future safety concerns.
-However, the local administrator may trigger an immediate microcode update
-attempt at any time, at her own risk:
-
-  USING AN INITRAMFS+REBOOT IS SAFER.  DO THIS ONLY WHEN YOU KNOW BETTER:
-  as root:
-  echo 1 > /sys/devices/system/cpu/microcode/reload
+not supported in Debian.
 
 
 RECOVERY PROCEDURE:
@@ -97,4 +91,4 @@ the initramfs images for every installed kernel.
 Please report any issues caused by microcode updates to the mailing-list or
 to the Debian bug tracker.
 
- -- Henrique de Moraes Holschuh <h...@debian.org>, 2016-04-05
+ -- Henrique de Moraes Holschuh <h...@debian.org>, 2024-08-11
diff --git a/debian/amd64-microcode.dirs b/debian/amd64-microcode.dirs
index 0790bdb..60f0777 100644
--- a/debian/amd64-microcode.dirs
+++ b/debian/amd64-microcode.dirs
@@ -2,3 +2,4 @@ etc/default
 etc/modprobe.d
 lib/firmware/amd-ucode
 lib/firmware/amd
+lib/firmware/amdtee
diff --git a/debian/amd64-microcode.install b/debian/amd64-microcode.install
index 40d0e9c..07af704 100644
--- a/debian/amd64-microcode.install
+++ b/debian/amd64-microcode.install
@@ -1,2 +1,3 @@
 amd-ucode/*bin	lib/firmware/amd-ucode
+amdtee/*        lib/firmware/amdtee
 amd/*sev*bin	lib/firmware/amd
diff --git a/debian/amd64-microcode.postinst b/debian/amd64-microcode.postinst
index 453fd98..7fdc28b 100644
--- a/debian/amd64-microcode.postinst
+++ b/debian/amd64-microcode.postinst
@@ -19,11 +19,14 @@ set -e
 
 case "$1" in
     configure)
-	# do it like udev and firmware-linux-*
-	if [ -x /usr/sbin/update-initramfs ] && [ -e /etc/initramfs-tools/initramfs.conf ] ; then
-	    update-initramfs -u && {
+	RC=0
+	dpkg-trigger --no-await update-initramfs || RC=$?
+	[ "$RC" -ne 0 ] && [ -e /etc/initramfs-tools/initramfs.conf ] && {
+		RC=0
+		update-initramfs -u || RC=$?
+	}
+	if [ "$RC" -eq 0 ] ; then
 		echo "amd64-microcode: microcode will be updated at next boot" >&2
-	    }
 	else
 	    echo "amd64-microcode: initramfs support missing" >&2
 	fi
diff --git a/debian/amd64-microcode.postrm b/debian/amd64-microcode.postrm
index c775b42..4b187d0 100644
--- a/debian/amd64-microcode.postrm
+++ b/debian/amd64-microcode.postrm
@@ -20,9 +20,10 @@ set -e
 
 case "$1" in
     purge|remove)
-	if [ -x /usr/sbin/update-initramfs -a -e /etc/initramfs-tools/initramfs.conf ] ; then
-	    update-initramfs -u
-	fi
+	dpkg-trigger --no-await update-initramfs || {
+	    #shellcheck disable=SC2015
+	    [ -e /etc/initramfs-tools/initramfs.conf ] && update-initramfs -u || :
+	}
     ;;
 
     upgrade|failed-upgrade|abort-install|abort-upgrade|disappear)
diff --git a/debian/changelog b/debian/changelog
index fd5fbd3..72b76b1 100644
--- a/debian/changelog
+++ b/debian/changelog
@@ -1,3 +1,89 @@
+amd64-microcode (3.20240710.2~deb12u1) bookworm; urgency=high
+
+  * Rebuild for bookworm (revert merged-usr changes from unstable)
+
+ -- Henrique de Moraes Holschuh <h...@debian.org>  Mon, 12 Aug 2024 09:37:38 -0300
+
+amd64-microcode (3.20240710.2) unstable; urgency=high
+
+  * postrm: activate the update-initramfs dpkg trigger on remove/purge
+    instead of always executing update-initramfs directly, just like it
+    was done for postinst in 3.20240710.1: call update-initramfs directly
+    only if the dpkg-trigger activation call fails.
+
+ -- Henrique de Moraes Holschuh <h...@debian.org>  Mon, 12 Aug 2024 09:00:19 -0300
+
+amd64-microcode (3.20240710.1) unstable; urgency=high
+
+  * Update package data from linux-firmware 20240709-141-g59460076
+    (closes: #1076128)
+  * SECURITY UPDATE: Mitigates "Sinkclose" CVE-2023-31315 (AMD-SB-7014) on
+    AMD Epyc processors: SMM lock bypass - Improper validation in a model
+    specific register (MSR) could allow a malicious program with ring 0
+    access (kernel) to modify SMM configuration while SMI lock is enabled,
+    potentially leading to arbitrary code execution.
+    Note: a firmware update is recommended for AMD Epyc (to protect the
+    system as early as possible).  Many other AMD processor models are
+    also vulnerable to SinkClose, and can only be fixed by a firmware
+    update at this time.
+  * Updated Microcode patches:
+    + Family=0x17 Model=0x01 Stepping=0x02: Patch=0x0800126f
+    + Family=0x17 Model=0x31 Stepping=0x00: Patch=0x0830107c
+    + Family=0x19 Model=0x01 Stepping=0x00: Patch=0x0a00107a
+    + Family=0x19 Model=0x11 Stepping=0x02: Patch=0x0a101248
+    + Family=0x19 Model=0xa0 Stepping=0x02: Patch=0x0aa00215
+    + Family=0x19 Model=0x01 Stepping=0x02: Patch=0x0a001238
+    + Family=0x19 Model=0x11 Stepping=0x01: Patch=0x0a101148
+    + Family=0x19 Model=0x01 Stepping=0x01: Patch=0x0a0011d5
+  * README.Debian: "late" microcode updates are unsupported in Debian
+    (closes: #1074514)
+  * postinst: use dpkg-trigger to activate update-initramfs, this enables
+    dracut integration (closes: #1000193)
+
+ -- Henrique de Moraes Holschuh <h...@debian.org>  Sun, 11 Aug 2024 18:38:59 -0300
+
+amd64-microcode (3.20240116.2) unstable; urgency=medium
+
+  * Add AMD-TEE firmware to the package (closes: #1062678)
+    + amdtee: add amd_pmf TA firmware 20230906
+  * debian: install amdtee to /lib/firmware/amdtee
+  * debian/control: update short and long descriptions
+  * debian/copyright: update with amd-pmf license
+
+ -- Henrique de Moraes Holschuh <h...@debian.org>  Thu, 15 Feb 2024 16:56:06 -0300
+
+amd64-microcode (3.20240116.1) unstable; urgency=medium
+
+  * Update package data from linux-firmware 20240115-80-gb4b04a5c
+  * Updated Microcode patches:
+    + Family=0x17 Model=0x31 Stepping=0x00: Patch=0x0830107b
+    + Family=0x19 Model=0x01 Stepping=0x01: Patch=0x0a0011d3
+    + Family=0x19 Model=0x01 Stepping=0x02: Patch=0x0a001236
+
+ -- Henrique de Moraes Holschuh <h...@debian.org>  Tue, 06 Feb 2024 15:35:27 -0300
+
+amd64-microcode (3.20231019.1) unstable; urgency=medium
+
+  * Update package data from linux-firmware 20231019
+  * Updated Microcode patches:
+    + Family=0x19 Model=0x11 Stepping=0x01: Patch=0x0a101144
+    + Family=0x19 Model=0x11 Stepping=0x02: Patch=0x0a101244
+    + Family=0x19 Model=0xa0 Stepping=0x02: Patch=0x0aa00213
+
+ -- Henrique de Moraes Holschuh <h...@debian.org>  Sat, 21 Oct 2023 15:06:29 -0300
+
+amd64-microcode (3.20230823.1) unstable; urgency=medium
+
+  * Update package data from linux-firmware 20230919
+    * New AMD-SEV firmware from AMD upstream (20230823)
+      + Updated SEV firmware:
+        Family 19h models 00h-0fh: version 1.55 build 8
+      + New SEV firmware:
+        Family 19h models 10h-1fh: version 1.55 build 21
+  * amd-ucode: Add note on fam19h warnings.
+
+ -- Henrique de Moraes Holschuh <h...@debian.org>  Fri, 13 Oct 2023 02:02:47 -0300
+
 amd64-microcode (3.20230808.1.1~deb12u1) bookworm; urgency=medium
 
   * Rebuild for bookworm (no changes)
diff --git a/debian/control b/debian/control
index ba0d5ad..735cea0 100644
--- a/debian/control
+++ b/debian/control
@@ -14,11 +14,17 @@ Architecture: i386 amd64 x32
 Recommends: initramfs-tools (>= 0.113~) | dracut (>= 044) | tiny-initramfs
 Depends: ${misc:Depends}
 Breaks: intel-microcode (<< 2)
-Description: Processor microcode firmware for AMD CPUs
- This package contains microcode patches for all AMD AMD64
+Description: Platform firmware and microcode for AMD CPUs and SoCs
+ This package contains microcode patches for AMD AMD64
  processors.  AMD releases microcode patches to correct
  processor behavior as documented in the respective processor
- revision guides.  This package includes both AMD CPU microcode
- patches and AMD SEV firmware updates.
+ revision guides.
+ .
+ This package includes the required firmware to enable AMD
+ SEV (Secure Encrypted Virtualization) functionality.
+ .
+ This package also includes AMD TAs (Trusted Applications)
+ required by AMD platform drivers such as AMD PMF (Platform
+ Management Framework).
  .
  For Intel processors, please refer to the intel-microcode package.
diff --git a/debian/copyright b/debian/copyright
index d8aea83..8327915 100644
--- a/debian/copyright
+++ b/debian/copyright
@@ -22,7 +22,12 @@ Upstream Copyright (AMD_SEV):
     Copyright (C) 2015-2019 Advanced Micro Devices, Inc.
     All rights reserved.
 
-Upstream License:
+Upstream Copyright (AMD_PMF):
+    Copyright (C) 2023  Advanced Micro Devices, Inc.
+    All rights reserved.
+
+
+Upstream License (AMD-UCODE, AMD_SEV):
 
     Permission is hereby granted by Advanced Micro Devices, Inc. ("AMD"),
     free of any license fees, to any person obtaining a copy of this
@@ -87,3 +92,55 @@ Upstream License:
     obligations under those regulations, please refer to the U.S. Bureau
     of Industry and Security?s website at ttp://www.bis.doc.gov/.
 
+
+Upstream License: (AMD_PMF):
+
+    REDISTRIBUTION: Permission is hereby granted, free of any license fees,
+    to any person obtaining a copy of this microcode (the "Software"), to
+    install, reproduce, copy and distribute copies, in binary form only, of
+    the Software and to permit persons to whom the Software is provided to
+    do the same, provided that the following conditions are met:
+
+    No reverse engineering, decompilation, or disassembly of this Software
+    is permitted.
+
+    Redistributions must reproduce the above copyright notice, this
+    permission notice, and the following disclaimers and notices in the
+    Software documentation and/or other materials provided with the
+    Software.
+
+    DISCLAIMER: THE USE OF THE SOFTWARE IS AT YOUR SOLE RISK.  THE SOFTWARE
+    IS PROVIDED "AS IS" AND WITHOUT WARRANTY OF ANY KIND AND COPYRIGHT
+    HOLDER AND ITS LICENSORS EXPRESSLY DISCLAIM ALL WARRANTIES, EXPRESS AND
+    IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
+    MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NON-INFRINGEMENT.
+    COPYRIGHT HOLDER AND ITS LICENSORS DO NOT WARRANT THAT THE SOFTWARE WILL
+    MEET YOUR REQUIREMENTS, OR THAT THE OPERATION OF THE SOFTWARE WILL BE
+    UNINTERRUPTED OR ERROR-FREE.  THE ENTIRE RISK ASSOCIATED WITH THE USE OF
+    THE SOFTWARE IS ASSUMED BY YOU.  FURTHERMORE, COPYRIGHT HOLDER AND ITS
+    LICENSORS DO NOT WARRANT OR MAKE ANY REPRESENTATIONS REGARDING THE USE
+    OR THE RESULTS OF THE USE OF THE SOFTWARE IN TERMS OF ITS CORRECTNESS,
+    ACCURACY, RELIABILITY, CURRENTNESS, OR OTHERWISE.
+
+    DISCLAIMER: UNDER NO CIRCUMSTANCES INCLUDING NEGLIGENCE, SHALL COPYRIGHT
+    HOLDER AND ITS LICENSORS OR ITS DIRECTORS, OFFICERS, EMPLOYEES OR AGENTS
+    ("AUTHORIZED REPRESENTATIVES") BE LIABLE FOR ANY INCIDENTAL, INDIRECT,
+    SPECIAL OR CONSEQUENTIAL DAMAGES (INCLUDING DAMAGES FOR LOSS OF BUSINESS
+    PROFITS, BUSINESS INTERRUPTION, LOSS OF BUSINESS INFORMATION, AND THE
+    LIKE) ARISING OUT OF THE USE, MISUSE OR INABILITY TO USE THE SOFTWARE,
+    BREACH OR DEFAULT, INCLUDING THOSE ARISING FROM INFRINGEMENT OR ALLEGED
+    INFRINGEMENT OF ANY PATENT, TRADEMARK, COPYRIGHT OR OTHER INTELLECTUAL
+    PROPERTY RIGHT EVEN IF COPYRIGHT HOLDER AND ITS AUTHORIZED
+    REPRESENTATIVES HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.  IN
+    NO EVENT SHALL COPYRIGHT HOLDER OR ITS AUTHORIZED REPRESENTATIVES TOTAL
+    LIABILITY FOR ALL DAMAGES, LOSSES, AND CAUSES OF ACTION (WHETHER IN
+    CONTRACT, TORT (INCLUDING NEGLIGENCE) OR OTHERWISE) EXCEED THE AMOUNT OF
+    US$10.
+
+    Notice:  The Software is subject to United States export laws and
+    regulations.  You agree to comply with all domestic and international
+    export laws and regulations that apply to the Software, including but
+    not limited to the Export Administration Regulations administered by the
+    U.S. Department of Commerce and International Traffic in Arm Regulations
+    administered by the U.S. Department of State.  These laws include
+    restrictions on destinations, end users and end use.

Attachment: signature.asc
Description: PGP signature


--- End Message ---
--- Begin Message ---
Package: release.debian.org
Version: 12.7

Hi,

Each of these bugs relates to an update including in today's bookworm
12.7 point release.

Regards,

Adam

--- End Message ---

Reply via email to