From 71deace00d1a2b091313fe137ab7092418c6f87c Mon Sep 17 00:00:00 2001 From: V3n3RiX Date: Mon, 10 Feb 2020 21:05:55 +0000 Subject: gentoo resync : 10.02.2020 --- sys-firmware/Manifest.gz | Bin 5028 -> 5033 bytes sys-firmware/edk2-ovmf/Manifest | 4 +- sys-firmware/edk2-ovmf/edk2-ovmf-201905.ebuild | 2 +- sys-firmware/edk2-ovmf/edk2-ovmf-999999.ebuild | 2 +- sys-firmware/intel-microcode/Manifest | 4 +- .../intel-microcode-20191115_p20191110.ebuild | 248 --------------------- .../intel-microcode-20191115_p20200209.ebuild | 248 +++++++++++++++++++++ sys-firmware/seabios/Manifest | 8 +- sys-firmware/seabios/seabios-1.10.2.ebuild | 2 +- sys-firmware/seabios/seabios-1.11.0-r1.ebuild | 2 +- sys-firmware/seabios/seabios-1.11.0.ebuild | 2 +- sys-firmware/seabios/seabios-1.12.0.ebuild | 2 +- 12 files changed, 262 insertions(+), 262 deletions(-) delete mode 100644 sys-firmware/intel-microcode/intel-microcode-20191115_p20191110.ebuild create mode 100644 sys-firmware/intel-microcode/intel-microcode-20191115_p20200209.ebuild (limited to 'sys-firmware') diff --git a/sys-firmware/Manifest.gz b/sys-firmware/Manifest.gz index 8e9e32752e01..df663a287250 100644 Binary files a/sys-firmware/Manifest.gz and b/sys-firmware/Manifest.gz differ diff --git a/sys-firmware/edk2-ovmf/Manifest b/sys-firmware/edk2-ovmf/Manifest index 3d1528eea96d..96c910ddcc7b 100644 --- a/sys-firmware/edk2-ovmf/Manifest +++ b/sys-firmware/edk2-ovmf/Manifest @@ -1,6 +1,6 @@ DIST edk2-ovmf-201905-bin.tar.xz 3017256 BLAKE2B 6a106f111a363f1c2de33c4e7eba48183da6047654512939c286c6d0369e3b4c7705c271e61fa95299ba2b629022be7b5ef665ff096d41373583f5409b5c32fb SHA512 4a174dc1d64769a93de3bf5f9d787e278bfab57e2317699d722aa772e64e8867b3998b7feee58d5e4c66adc79ba9c5023dae2ce786159db7a740b86cf35d923d DIST edk2-ovmf-201905-bundled.tar.xz 3538508 BLAKE2B a1766180c84ee83987f50fdb6a6c9891dfb983ff78c98f7bc38635ffe484ebf29d4286ff97d7747080e28a655ff14b5939d4505d75ebe6655ecacc7f9d405469 SHA512 be3d8ef1ffb1ddce64883d9ef8dc598c7026d23d2e33c33949d28de81513b6a7f04f840ccb3d42664e918c6603487fbe594261c327921f3250c3998218572774 DIST edk2-ovmf-201905.tar.gz 14551747 BLAKE2B 6fb3385445fd01c0dea26295a68de2691524e55c96d8a0e85aab1385a9abddc47c13ce3236b952c1299514e542ad0fa4bc9550cc4527945c05109d227a698293 SHA512 91188923f7d1ab83c0d6abf7ec6d59f357d0341a617ad6a3ae05f3d0e041dff43f62b014b0c5fc5d15e16d8f1c279c581a5cd64b31e3d52b340d7ef90adb50f1 -EBUILD edk2-ovmf-201905.ebuild 4364 BLAKE2B 1fb2d01168e51a3d2f638d82d78d5ab68cc07987165513810a04563a70e28f23fb3ded4c164c592df8e966fce5366703a069c1f5443a29bd1b2590b85341a869 SHA512 6f0f6229cb6f6b3115801c2b9aeb2ab970d3bb0041807a4101cc5ad1587a1c4af4833901566dcc204563a32186a2ea5f7726cf335a114ae6e24c10b262667cd7 -EBUILD edk2-ovmf-999999.ebuild 3896 BLAKE2B b4fd1d72afaaf6e4efe6729d10bb8ce835bdd3e5586e1ba97ccb551dde79c3c8fa7545cdb2993e649a80dedf363c500df028fa61b38bd688de256925f3b81d80 SHA512 fa6e2b4f94937b2e2007820453ce3b94d463db368d36e56f9fedd2adfe4f741d15a03e60cabc12bd084f7aab196861cac7aa56fc0e6d58a47cff6c8b79d76af2 +EBUILD edk2-ovmf-201905.ebuild 4360 BLAKE2B 6a6e720605970e90f00f85bfe04ecb05f4232cb94cd937932b75aa44d84051426ec45c398c154f9e718d6ea8c393a818e6c06b88b096db52e604c68d1ef7a0d8 SHA512 d19aee8e261c930b20016906bdbf4bea67ddbb5039a890134d0109042bb87aba9c7bd04465ca3a2cecf31e665dc8354b9ad0d1755a870dbdb6f53ca3df333a75 +EBUILD edk2-ovmf-999999.ebuild 3892 BLAKE2B db584887a75633b6ee59c6cac80a08471b05122ba03a505e457f418266464ad946e83c5a3324fbed0bf133ddcb6f6f964627923838e8b7f1bc0ab3760b60fcca SHA512 ceeaae071df011ac577e8e8ffd2430f877c0a778c6858868b2cbb89fadabb0390c9ffe8099da9a2d534212171078c34682eca54b62829453619a001a95beb718 MISC metadata.xml 435 BLAKE2B b33371654b280e097ad5d112081f115446cb01a0efcf3e712bcad7e5a51d95b77f55d0e218c4767803675b71d24b405616849f57051fda492acf5d3c0e8fd1dc SHA512 d1e6233650fc1ea3a25bead14091877b9f507d2bc78cec6436e1b6e17477e40517b74da66e26b6bd39259e4ca308d724324296f1a6c353fed2f8bf112029b90f diff --git a/sys-firmware/edk2-ovmf/edk2-ovmf-201905.ebuild b/sys-firmware/edk2-ovmf/edk2-ovmf-201905.ebuild index 13b1feca47fb..1abe540a07b8 100644 --- a/sys-firmware/edk2-ovmf/edk2-ovmf-201905.ebuild +++ b/sys-firmware/edk2-ovmf/edk2-ovmf-201905.ebuild @@ -4,7 +4,7 @@ EAPI=7 PYTHON_REQ_USE="sqlite" -PYTHON_COMPAT=( python{2_7,3_6,3_7} ) +PYTHON_COMPAT=( python{3_6,3_7} ) inherit eutils python-any-r1 readme.gentoo-r1 diff --git a/sys-firmware/edk2-ovmf/edk2-ovmf-999999.ebuild b/sys-firmware/edk2-ovmf/edk2-ovmf-999999.ebuild index 4e5483b25b7a..e8acffa9d29d 100644 --- a/sys-firmware/edk2-ovmf/edk2-ovmf-999999.ebuild +++ b/sys-firmware/edk2-ovmf/edk2-ovmf-999999.ebuild @@ -4,7 +4,7 @@ EAPI=7 PYTHON_REQ_USE="sqlite" -PYTHON_COMPAT=( python{2_7,3_6,3_7} ) +PYTHON_COMPAT=( python{3_6,3_7} ) inherit eutils python-any-r1 readme.gentoo-r1 diff --git a/sys-firmware/intel-microcode/Manifest b/sys-firmware/intel-microcode/Manifest index 43cca6e93488..b03c55d93f91 100644 --- a/sys-firmware/intel-microcode/Manifest +++ b/sys-firmware/intel-microcode/Manifest @@ -1,4 +1,4 @@ -DIST intel-microcode-collection-20191110.tar.xz 5487112 BLAKE2B 89674e81857235abfdc21e50c767c702cd52da0c61c2c860bc8484c0d2b6c368601c5b1db956e90c9039c3e0b9d79139ed15e3a1a8c5a203e2cf196db69ade79 SHA512 b82221b7f506126613a80d1b8d0e47f4fea9debc51f5390c67eb50fda01677d60f50573376172054973c46563911dc79feb7b8d2cf35f53813c3a93228e7e2ee +DIST intel-microcode-collection-20200209.tar.xz 5858536 BLAKE2B 3618666b98f98c63af2c7d8accfe94adce6578b6c36452a3abe66df7b7a9f63465bb5b4c638ea0ed09f4a8df0a08b9efb8aede54d140c391a209c57aede5e85b SHA512 0d771011c6d9376c7c220b68916f7a8e261517034c543b4368d8a55850810053f410275f5a1973274e00e93e0ec2a0e86081b799ccfcef2e0c120209ee23e067 DIST microcode-20191115.tar.gz 2998063 BLAKE2B a06f2769da1577b9ce3a34f447e182312d003842b043372d850de51012efd9c0247f9a6bc8964e3da6127f8afb58f3fb31b1204e7286af9b27c795c00419ef7e SHA512 11014c16bde83ac290bc75e458242f5e64b8dffd49de2e938f61f4a09979cd5e80dd1a85d2ccbac067e4398dc3d93ef3583e4aa9b2e545ba46d26e65ec1e2881 -EBUILD intel-microcode-20191115_p20191110.ebuild 8552 BLAKE2B 0b9a8351dddb883254899b4763bec619d8e4f1642becc8ce34aa7e29ccf793e7ce49cd424389b4f2f9b0074830d455797c9bd5db52beaef47a578987f491168d SHA512 b3d2b8a6df09fe39598a2773fa0c4e67f3847ca9122b9580094e8a8c96df71254f77bbb2ef3b50ad3383ee7896448adc3f429ab3de944749b9789f8084535dec +EBUILD intel-microcode-20191115_p20200209.ebuild 8552 BLAKE2B 4fb7154e9de1cf7b5b92d1c089ba02efa959dfa2a0d23cd4e26ecb59e4945562fb27042b6ba4f23468113238e286ecea5810c15ad14f5ecaa02fc2ae18fd35d6 SHA512 dfda3995837d46dd2e71bf0bea6529b4f691e405a036de0548e75caf557797e974519d6a2d747210757f4a7dcb082572c091ff2d88a3e12f7d9c351a986e181e MISC metadata.xml 667 BLAKE2B f229775df839b3ddf34fcc289803ae113ad4b0ce293e036c24f3025bbd146d51c6e3ac55b4a7eb9b2ff0b6829aa020179ea4603f5e481de1c822a1deb66fd594 SHA512 a2d6bc54901a9eb12732e8fa0720c03b51ab615383f12a52019453b3a13f5c70233ee88a8d81706ce7e86eaec6d85155484cf32da288c3486d4b1a19647d2698 diff --git a/sys-firmware/intel-microcode/intel-microcode-20191115_p20191110.ebuild b/sys-firmware/intel-microcode/intel-microcode-20191115_p20191110.ebuild deleted file mode 100644 index 030826b2de0c..000000000000 --- a/sys-firmware/intel-microcode/intel-microcode-20191115_p20191110.ebuild +++ /dev/null @@ -1,248 +0,0 @@ -# Copyright 1999-2019 Gentoo Authors -# Distributed under the terms of the GNU General Public License v2 - -EAPI="7" - -inherit linux-info toolchain-funcs mount-boot - -# Find updates by searching and clicking the first link (hopefully it's the one): -# https://www.intel.com/content/www/us/en/search.html?keyword=Processor+Microcode+Data+File - -COLLECTION_SNAPSHOT="${PV##*_p}" -INTEL_SNAPSHOT="${PV/_p*}" -#NUM="28087" -#https://downloadcenter.intel.com/Detail_Desc.aspx?DwnldID=${NUM} -#https://downloadmirror.intel.com/${NUM}/eng/microcode-${INTEL_SNAPSHOT}.tgz -DESCRIPTION="Intel IA32/IA64 microcode update data" -HOMEPAGE="https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files http://inertiawar.com/microcode/" -SRC_URI="https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/archive/microcode-${INTEL_SNAPSHOT}.tar.gz - https://dev.gentoo.org/~whissi/dist/intel-microcode/intel-microcode-collection-${COLLECTION_SNAPSHOT}.tar.xz" - -LICENSE="intel-ucode" -SLOT="0" -KEYWORDS="-* amd64 x86" -IUSE="hostonly initramfs +split-ucode vanilla" -REQUIRED_USE="|| ( initramfs split-ucode )" - -BDEPEND="sys-apps/iucode_tool" - -# !/dev/null; then - # new tarball format from GitHub - mv * ../ || die "Failed to move Intel-Linux-Processor-Microcode-Data*" - cd .. || die - rm -r Intel-Linux-Processor-Microcode-Data* || die - fi - - # Prevent "invalid file format" errors from iucode_tool - rm -f "${S}"/intel-ucod*/list || die -} - -src_install() { - # This will take ALL of the upstream microcode sources: - # - microcode.dat - # - intel-ucode/ - # In some cases, they have not contained the same content (eg the directory has newer stuff). - MICROCODE_SRC=( - "${S}"/intel-ucode/ - "${S}"/intel-ucode-with-caveats/ - ) - - # Allow users who are scared about microcode updates not included in Intel's official - # microcode tarball to opt-out and comply with Intel marketing - if ! use vanilla; then - MICROCODE_SRC+=( "${S}"/intel-microcode-collection-${COLLECTION_SNAPSHOT} ) - fi - - # These will carry into pkg_preinst via env saving. - : ${MICROCODE_BLACKLIST=${MICROCODE_BLACKLIST_DEFAULT}} - : ${MICROCODE_SIGNATURES=${MICROCODE_SIGNATUES_DEFAULT}} - - opts=( - ${MICROCODE_BLACKLIST} - ${MICROCODE_SIGNATURES} - # be strict about what we are doing - --overwrite - --strict-checks - --no-ignore-broken - # we want to install latest version - --no-downgrade - # show everything we find - --list-all - # show what we selected - --list - ) - - # The earlyfw cpio needs to be in /boot because it must be loaded before - # rootfs is mounted. - use initramfs && dodir /boot && opts+=( --write-earlyfw="${ED}/boot/intel-uc.img" ) - - keepdir /lib/firmware/intel-ucode - opts+=( --write-firmware="${ED}/lib/firmware/intel-ucode" ) - - iucode_tool \ - "${opts[@]}" \ - "${MICROCODE_SRC[@]}" \ - || die "iucode_tool ${opts[@]} ${MICROCODE_SRC[@]}" - - dodoc releasenote -} - -pkg_preinst() { - if [[ ${MICROCODE_BLACKLIST} != ${MICROCODE_BLACKLIST_DEFAULT} ]]; then - ewarn "MICROCODE_BLACKLIST is set to \"${MICROCODE_BLACKLIST}\" instead of default \"${MICROCODE_BLACKLIST_DEFAULT}\". You are on your own!" - fi - - if [[ ${MICROCODE_SIGNATURES} != ${MICROCODE_SIGNATURES_DEFAULT} ]]; then - ewarn "Package was created using advanced options:" - ewarn "MICROCODE_SIGNATURES is set to \"${MICROCODE_SIGNATURES}\" instead of default \"${MICROCODE_SIGNATURES_DEFAULT}\"!" - fi - - # Make sure /boot is available if needed. - use initramfs && mount-boot_pkg_preinst - - local _initramfs_file="${ED}/boot/intel-uc.img" - - if use hostonly; then - # While this output looks redundant we do this check to detect - # rare cases where iucode_tool was unable to detect system's processor(s). - local _detected_processors=$(iucode_tool --scan-system 2>&1) - if [[ -z "${_detected_processors}" ]]; then - ewarn "Looks like iucode_tool was unable to detect any processor!" - else - einfo "Only installing ucode(s) for ${_detected_processors#iucode_tool: system has } due to USE=hostonly ..." - fi - - opts=( - --scan-system - # be strict about what we are doing - --overwrite - --strict-checks - --no-ignore-broken - # we want to install latest version - --no-downgrade - # show everything we find - --list-all - # show what we selected - --list - ) - - # The earlyfw cpio needs to be in /boot because it must be loaded before - # rootfs is mounted. - use initramfs && opts+=( --write-earlyfw=${_initramfs_file} ) - - if use split-ucode; then - opts+=( --write-firmware="${ED}/lib/firmware/intel-ucode" ) - fi - - opts+=( "${ED}/lib/firmware/intel-ucode-temp" ) - - mv "${ED}"/lib/firmware/intel-ucode{,-temp} || die - keepdir /lib/firmware/intel-ucode - - iucode_tool "${opts[@]}" || die "iucode_tool ${opts[@]}" - - rm -r "${ED}"/lib/firmware/intel-ucode-temp || die - - elif ! use split-ucode; then # hostonly disabled - rm -r "${ED}"/lib/firmware/intel-ucode || die - fi - - # Because it is possible that this package will install not one single file - # due to user selection which is still somehow unexpected we add the following - # check to inform user so that the user has at least a chance to detect - # a problem/invalid select. - local _has_installed_something= - if use initramfs && [[ -s "${_initramfs_file}" ]]; then - _has_installed_something="yes" - elif use split-ucode; then - _has_installed_something=$(find "${ED}/lib/firmware/intel-ucode" -maxdepth 0 -not -empty -exec echo yes \;) - fi - - if use hostonly && [[ -n "${_has_installed_something}" ]]; then - elog "You only installed ucode(s) for all currently available (=online)" - elog "processor(s). Remember to re-emerge this package whenever you" - elog "change the system's processor model." - elog "" - elif [[ -z "${_has_installed_something}" ]]; then - ewarn "WARNING:" - if [[ ${MICROCODE_SIGNATURES} != ${MICROCODE_SIGNATURES_DEFAULT} ]]; then - ewarn "No ucode was installed! Because you have created this package" - ewarn "using MICROCODE_SIGNATURES variable please double check if you" - ewarn "have an invalid select." - ewarn "It's rare but it is also possible that just no ucode update" - ewarn "is available for your processor(s). In this case it is safe" - ewarn "to ignore this warning." - else - ewarn "No ucode was installed! It's rare but it is also possible" - ewarn "that just no ucode update is available for your processor(s)." - ewarn "In this case it is safe to ignore this warning." - fi - - ewarn "" - - if use hostonly; then - ewarn "Unset \"hostonly\" USE flag to install all available ucodes." - ewarn "" - fi - fi -} - -pkg_prerm() { - # Make sure /boot is mounted so that we can remove /boot/intel-uc.img! - use initramfs && mount-boot_pkg_prerm -} - -pkg_postrm() { - # Don't forget to umount /boot if it was previously mounted by us. - use initramfs && mount-boot_pkg_postrm -} - -pkg_postinst() { - # Don't forget to umount /boot if it was previously mounted by us. - use initramfs && mount-boot_pkg_postinst - - # We cannot give detailed information if user is affected or not: - # If MICROCODE_BLACKLIST wasn't modified, user can still use MICROCODE_SIGNATURES - # to to force a specific, otherwise blacklisted, microcode. So we - # only show a generic warning based on running kernel version: - if kernel_is -lt 4 14 34; then - ewarn "${P} contains microcode updates which require" - ewarn "additional kernel patches which aren't yet included in kernel <4.14.34." - ewarn "Loading such a microcode through kernel interface from an unpatched kernel" - ewarn "can crash your system!" - ewarn "" - ewarn "Those microcodes are blacklisted per default. However, if you have altered" - ewarn "MICROCODE_BLACKLIST or MICROCODE_SIGNATURES, you maybe have unintentionally" - ewarn "re-enabled those microcodes...!" - ewarn "" - ewarn "Check \"${EROOT}/usr/share/doc/${PN}-*/releasenot*\" if your microcode update" - ewarn "requires additional kernel patches or not." - fi -} diff --git a/sys-firmware/intel-microcode/intel-microcode-20191115_p20200209.ebuild b/sys-firmware/intel-microcode/intel-microcode-20191115_p20200209.ebuild new file mode 100644 index 000000000000..0a7fafc268df --- /dev/null +++ b/sys-firmware/intel-microcode/intel-microcode-20191115_p20200209.ebuild @@ -0,0 +1,248 @@ +# Copyright 1999-2020 Gentoo Authors +# Distributed under the terms of the GNU General Public License v2 + +EAPI="7" + +inherit linux-info toolchain-funcs mount-boot + +# Find updates by searching and clicking the first link (hopefully it's the one): +# https://www.intel.com/content/www/us/en/search.html?keyword=Processor+Microcode+Data+File + +COLLECTION_SNAPSHOT="${PV##*_p}" +INTEL_SNAPSHOT="${PV/_p*}" +#NUM="28087" +#https://downloadcenter.intel.com/Detail_Desc.aspx?DwnldID=${NUM} +#https://downloadmirror.intel.com/${NUM}/eng/microcode-${INTEL_SNAPSHOT}.tgz +DESCRIPTION="Intel IA32/IA64 microcode update data" +HOMEPAGE="https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files http://inertiawar.com/microcode/" +SRC_URI="https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/archive/microcode-${INTEL_SNAPSHOT}.tar.gz + https://dev.gentoo.org/~whissi/dist/intel-microcode/intel-microcode-collection-${COLLECTION_SNAPSHOT}.tar.xz" + +LICENSE="intel-ucode" +SLOT="0" +KEYWORDS="-* amd64 x86" +IUSE="hostonly initramfs +split-ucode vanilla" +REQUIRED_USE="|| ( initramfs split-ucode )" + +BDEPEND="sys-apps/iucode_tool" + +# !/dev/null; then + # new tarball format from GitHub + mv * ../ || die "Failed to move Intel-Linux-Processor-Microcode-Data*" + cd .. || die + rm -r Intel-Linux-Processor-Microcode-Data* || die + fi + + # Prevent "invalid file format" errors from iucode_tool + rm -f "${S}"/intel-ucod*/list || die +} + +src_install() { + # This will take ALL of the upstream microcode sources: + # - microcode.dat + # - intel-ucode/ + # In some cases, they have not contained the same content (eg the directory has newer stuff). + MICROCODE_SRC=( + "${S}"/intel-ucode/ + "${S}"/intel-ucode-with-caveats/ + ) + + # Allow users who are scared about microcode updates not included in Intel's official + # microcode tarball to opt-out and comply with Intel marketing + if ! use vanilla; then + MICROCODE_SRC+=( "${S}"/intel-microcode-collection-${COLLECTION_SNAPSHOT} ) + fi + + # These will carry into pkg_preinst via env saving. + : ${MICROCODE_BLACKLIST=${MICROCODE_BLACKLIST_DEFAULT}} + : ${MICROCODE_SIGNATURES=${MICROCODE_SIGNATUES_DEFAULT}} + + opts=( + ${MICROCODE_BLACKLIST} + ${MICROCODE_SIGNATURES} + # be strict about what we are doing + --overwrite + --strict-checks + --no-ignore-broken + # we want to install latest version + --no-downgrade + # show everything we find + --list-all + # show what we selected + --list + ) + + # The earlyfw cpio needs to be in /boot because it must be loaded before + # rootfs is mounted. + use initramfs && dodir /boot && opts+=( --write-earlyfw="${ED}/boot/intel-uc.img" ) + + keepdir /lib/firmware/intel-ucode + opts+=( --write-firmware="${ED}/lib/firmware/intel-ucode" ) + + iucode_tool \ + "${opts[@]}" \ + "${MICROCODE_SRC[@]}" \ + || die "iucode_tool ${opts[@]} ${MICROCODE_SRC[@]}" + + dodoc releasenote +} + +pkg_preinst() { + if [[ ${MICROCODE_BLACKLIST} != ${MICROCODE_BLACKLIST_DEFAULT} ]]; then + ewarn "MICROCODE_BLACKLIST is set to \"${MICROCODE_BLACKLIST}\" instead of default \"${MICROCODE_BLACKLIST_DEFAULT}\". You are on your own!" + fi + + if [[ ${MICROCODE_SIGNATURES} != ${MICROCODE_SIGNATURES_DEFAULT} ]]; then + ewarn "Package was created using advanced options:" + ewarn "MICROCODE_SIGNATURES is set to \"${MICROCODE_SIGNATURES}\" instead of default \"${MICROCODE_SIGNATURES_DEFAULT}\"!" + fi + + # Make sure /boot is available if needed. + use initramfs && mount-boot_pkg_preinst + + local _initramfs_file="${ED}/boot/intel-uc.img" + + if use hostonly; then + # While this output looks redundant we do this check to detect + # rare cases where iucode_tool was unable to detect system's processor(s). + local _detected_processors=$(iucode_tool --scan-system 2>&1) + if [[ -z "${_detected_processors}" ]]; then + ewarn "Looks like iucode_tool was unable to detect any processor!" + else + einfo "Only installing ucode(s) for ${_detected_processors#iucode_tool: system has } due to USE=hostonly ..." + fi + + opts=( + --scan-system + # be strict about what we are doing + --overwrite + --strict-checks + --no-ignore-broken + # we want to install latest version + --no-downgrade + # show everything we find + --list-all + # show what we selected + --list + ) + + # The earlyfw cpio needs to be in /boot because it must be loaded before + # rootfs is mounted. + use initramfs && opts+=( --write-earlyfw=${_initramfs_file} ) + + if use split-ucode; then + opts+=( --write-firmware="${ED}/lib/firmware/intel-ucode" ) + fi + + opts+=( "${ED}/lib/firmware/intel-ucode-temp" ) + + mv "${ED}"/lib/firmware/intel-ucode{,-temp} || die + keepdir /lib/firmware/intel-ucode + + iucode_tool "${opts[@]}" || die "iucode_tool ${opts[@]}" + + rm -r "${ED}"/lib/firmware/intel-ucode-temp || die + + elif ! use split-ucode; then # hostonly disabled + rm -r "${ED}"/lib/firmware/intel-ucode || die + fi + + # Because it is possible that this package will install not one single file + # due to user selection which is still somehow unexpected we add the following + # check to inform user so that the user has at least a chance to detect + # a problem/invalid select. + local _has_installed_something= + if use initramfs && [[ -s "${_initramfs_file}" ]]; then + _has_installed_something="yes" + elif use split-ucode; then + _has_installed_something=$(find "${ED}/lib/firmware/intel-ucode" -maxdepth 0 -not -empty -exec echo yes \;) + fi + + if use hostonly && [[ -n "${_has_installed_something}" ]]; then + elog "You only installed ucode(s) for all currently available (=online)" + elog "processor(s). Remember to re-emerge this package whenever you" + elog "change the system's processor model." + elog "" + elif [[ -z "${_has_installed_something}" ]]; then + ewarn "WARNING:" + if [[ ${MICROCODE_SIGNATURES} != ${MICROCODE_SIGNATURES_DEFAULT} ]]; then + ewarn "No ucode was installed! Because you have created this package" + ewarn "using MICROCODE_SIGNATURES variable please double check if you" + ewarn "have an invalid select." + ewarn "It's rare but it is also possible that just no ucode update" + ewarn "is available for your processor(s). In this case it is safe" + ewarn "to ignore this warning." + else + ewarn "No ucode was installed! It's rare but it is also possible" + ewarn "that just no ucode update is available for your processor(s)." + ewarn "In this case it is safe to ignore this warning." + fi + + ewarn "" + + if use hostonly; then + ewarn "Unset \"hostonly\" USE flag to install all available ucodes." + ewarn "" + fi + fi +} + +pkg_prerm() { + # Make sure /boot is mounted so that we can remove /boot/intel-uc.img! + use initramfs && mount-boot_pkg_prerm +} + +pkg_postrm() { + # Don't forget to umount /boot if it was previously mounted by us. + use initramfs && mount-boot_pkg_postrm +} + +pkg_postinst() { + # Don't forget to umount /boot if it was previously mounted by us. + use initramfs && mount-boot_pkg_postinst + + # We cannot give detailed information if user is affected or not: + # If MICROCODE_BLACKLIST wasn't modified, user can still use MICROCODE_SIGNATURES + # to to force a specific, otherwise blacklisted, microcode. So we + # only show a generic warning based on running kernel version: + if kernel_is -lt 4 14 34; then + ewarn "${P} contains microcode updates which require" + ewarn "additional kernel patches which aren't yet included in kernel <4.14.34." + ewarn "Loading such a microcode through kernel interface from an unpatched kernel" + ewarn "can crash your system!" + ewarn "" + ewarn "Those microcodes are blacklisted per default. However, if you have altered" + ewarn "MICROCODE_BLACKLIST or MICROCODE_SIGNATURES, you maybe have unintentionally" + ewarn "re-enabled those microcodes...!" + ewarn "" + ewarn "Check \"${EROOT}/usr/share/doc/${PN}-*/releasenot*\" if your microcode update" + ewarn "requires additional kernel patches or not." + fi +} diff --git a/sys-firmware/seabios/Manifest b/sys-firmware/seabios/Manifest index 29fbd450ab9c..6673fd79345e 100644 --- a/sys-firmware/seabios/Manifest +++ b/sys-firmware/seabios/Manifest @@ -13,8 +13,8 @@ DIST seabios-1.11.0-bin.tar.xz 158552 BLAKE2B 44c42b9eea70a090ad51296949fe79e536 DIST seabios-1.11.0.tar.gz 607746 BLAKE2B 9f688be6b8f7c0fcbd72b59ac649a9c763fdd9e2971a4d85636c9972efc0ad42082a1622a8c41156ad1e2063907349c2e02cff9aeb444844dc445b5f7d6062bb SHA512 cae79c720bfbba3321777bbc6d5bde432fe56e2ba8f1be8acfebbde0bd453a58e889f5fa24db6055dca0a3a56d35b907761723ea35ef248c5f812129d0a27b77 DIST seabios-1.12.0-bin.tar.xz 162492 BLAKE2B 9a5a349226ed7efbed328493dc057e232203b251677a23f1f09c133743ff0ca6b05270c9d27460be1d8897888fe23ff7bdfa122023fa8ddb23af03d5b9b6f8dd SHA512 f7a0395d621245093bb9a278d95ecc3d4e8d23f620058cd4fddaf885c8b86256f6258f3fd8173c1d24c03306f44d180e768bf8005ee123bc4b699b9f0ca371be DIST seabios-1.12.0.tar.gz 613542 BLAKE2B f145c2db716996bfa9e5c014086ccfaa8ae96ebc158f34303b122b7bf209408c567665d8691364df8d8e886f63e0e72a3f3cd319dfa86ef581023201b5d94e53 SHA512 e52c5363e5bb37b5286e55545aa06bd126218f9d0e3a06ac2e189de68fe3de3256c11ca1bb13357a9c384d7e3af6284083ff3aa587688b5de04ef11b97bdfa27 -EBUILD seabios-1.10.2.ebuild 3380 BLAKE2B 32b6af18bce919ec554023f921dead80a276ba7aae32c5d0ea39198ff7550a372eb0e807eda2459a282fbf5060d7f187d14e932b9f9691e8a8599c2ba9f0d041 SHA512 5e6f4427159e06c1b89fa4293eed8feb864cfe0cbec09d5dbefc3ea603a89132fcd674086d5ae4253de92146e5ef473ba6b889365231a9cb5597c8ab5b551f78 -EBUILD seabios-1.11.0-r1.ebuild 4070 BLAKE2B c36a99931ee27f97dfc82a1fe0d63e7984d04ed878f2c2fada85d9b72fddff6edf0f7d8186199f75baecae1bc2327f557339c1db23ad283ef56317c1c7cebbd1 SHA512 89c30708a4df76038c8f7822c6a9f0181272d50317d1de33e058f0cc239dc48579170e666c9137c864d86ebbdde541dd54a012ac839c1b6bb21573ffe5c073ee -EBUILD seabios-1.11.0.ebuild 3296 BLAKE2B f2d8302393fad03e23334727476262c42a0346d2e42ea69cbaf7376ed291306b78c5d156c32f9e709e5594735be4bfa8a7872ec25e3cd28d02524da5edc7c833 SHA512 f766aa4fbeffd0637c621eb4335710b8f10f2f6163270fdda71e49b49ac83aaacfbd9a5402a7e0a7416ddcc301ae050ef3c006b0f1ee94357b86473e80a8037c -EBUILD seabios-1.12.0.ebuild 3454 BLAKE2B d5f8ef13bf69f98d6d4b3bbc9bf71da7c45bb68358e8f1c47d038b069b9a22774e9b019fd3c926720bdc9e3d662413fd61abe9e537c995653319472e2bd80c38 SHA512 c369ab3fa21fd22041a0e53c1e94c04dc8fc120c38752349eec213f86bd7f2e80b38533f6df10cc5befe33d76a200008efe22728139a3fa95d386546add6f280 +EBUILD seabios-1.10.2.ebuild 3374 BLAKE2B b03cc8d4e7fa19ab22f578c10427ff16af610886688d8965ef1b1bc808efa126996a144b6c622a53b871abe4cb2c68573c452a2fd19848092cbffbfc3b052180 SHA512 8d18fe88ff32765d497f87b155ef1825db06f4c85d995653978d7ad5b7038236dfe81ff755c499ea785398916371fbc7578fdd2ef5dfb3ea8851008091a6abe0 +EBUILD seabios-1.11.0-r1.ebuild 4064 BLAKE2B be8c692ee94ec21bdaac4313a526a0297f14b7a9d809c3ab95e17c534e4378608f4cf4cfeb61c56c309f90433cdb56f5bdd0c30ad02c7ec2c1581c05480c9611 SHA512 2a66969275622ef054b9d398142fc89b8c04d9ad2b7dd545c124fa1d3a53119dc7ed783848c9dae893c4c639def9bae00a2b31aa030150aad8da0e8830019a7c +EBUILD seabios-1.11.0.ebuild 3290 BLAKE2B 174af3ef90af29cd7cc13d5595575c94e4bfe1f456326dd7cab6688439ba07e33b2aaafd513f6b3acebaae55e46b2ca82c32895ab27ec045ddb01dd2976cd1c2 SHA512 1a98a838ae3869e8c0159a4733f841d58fb88f2e8b8b4c16cc0de6c79fab05b01a24ccb16458baa847388c7ee1ed7873393342428a7a481d736a0ab6ec635631 +EBUILD seabios-1.12.0.ebuild 3448 BLAKE2B 68cd34eb037559db86496aeef0e4e148a9c58eb930789bd47d239858b54118c2cb0c4d09164a8eca34c435a0935717640bd7eae9e04d62dd08ba039bc7163a77 SHA512 0cb2bc77f627d8b24a3cee420c1066ba573ab4147c83a3c1e1fabb20a71f9ee0d5c1fa1a5416ff667ee1517130f4d000fcb014e00f297172c79e87e8c845deb9 MISC metadata.xml 551 BLAKE2B 1bc4f5bcc0dd85ff4e14ededc83e631c942995a8f0ba9534d72b6d5b671ad471eeb0c43a02ce4cf7c0b79d7f0d5583d419c46aaa8c297f1544353b8f42cdefa4 SHA512 5a580198036d96152d46c79b19317e35e5ba15f998ccaeade825189ee640a6ca50552a46f56f783ebba288df3953d461695039539c47baa27e3c9da1f8b1ccc0 diff --git a/sys-firmware/seabios/seabios-1.10.2.ebuild b/sys-firmware/seabios/seabios-1.10.2.ebuild index 96b9da9360f2..35dd9f2f363b 100644 --- a/sys-firmware/seabios/seabios-1.10.2.ebuild +++ b/sys-firmware/seabios/seabios-1.10.2.ebuild @@ -3,7 +3,7 @@ EAPI="6" -PYTHON_COMPAT=( python{2_7,3_6} ) +PYTHON_COMPAT=( python3_6 ) inherit eutils toolchain-funcs python-any-r1 diff --git a/sys-firmware/seabios/seabios-1.11.0-r1.ebuild b/sys-firmware/seabios/seabios-1.11.0-r1.ebuild index bcc02d3edef6..bec4935ce78c 100644 --- a/sys-firmware/seabios/seabios-1.11.0-r1.ebuild +++ b/sys-firmware/seabios/seabios-1.11.0-r1.ebuild @@ -3,7 +3,7 @@ EAPI="6" -PYTHON_COMPAT=( python{2_7,3_6} ) +PYTHON_COMPAT=( python3_6 ) inherit eutils toolchain-funcs python-any-r1 diff --git a/sys-firmware/seabios/seabios-1.11.0.ebuild b/sys-firmware/seabios/seabios-1.11.0.ebuild index 44d333f93051..5d966e192c48 100644 --- a/sys-firmware/seabios/seabios-1.11.0.ebuild +++ b/sys-firmware/seabios/seabios-1.11.0.ebuild @@ -3,7 +3,7 @@ EAPI="6" -PYTHON_COMPAT=( python{2_7,3_6} ) +PYTHON_COMPAT=( python3_6 ) inherit eutils toolchain-funcs python-any-r1 diff --git a/sys-firmware/seabios/seabios-1.12.0.ebuild b/sys-firmware/seabios/seabios-1.12.0.ebuild index 05f8b26c7ad5..d09ddbb90979 100644 --- a/sys-firmware/seabios/seabios-1.12.0.ebuild +++ b/sys-firmware/seabios/seabios-1.12.0.ebuild @@ -3,7 +3,7 @@ EAPI="7" -PYTHON_COMPAT=( python{2_7,3_6} ) +PYTHON_COMPAT=( python3_6 ) inherit eutils toolchain-funcs python-any-r1 -- cgit v1.2.3