wok view intel-microcode/receipt @ rev 24334

polkit: CVE-2021-4034
author Pascal Bellard <pascal.bellard@slitaz.org>
date Fri Jan 28 11:07:11 2022 +0000 (2022-01-28)
parents 5ea0ce1cecc0
children 63f5ba2b74dc
line source
1 # SliTaz package receipt.
3 PACKAGE="intel-microcode"
4 VERSION="20210216"
5 CATEGORY="kernel"
6 SHORT_DESC="Intel processor microcode update for Linux."
7 MAINTAINER="al.bobylev@gmail.com"
8 LICENSE="other"
9 WEB_SITE="https://downloadcenter.intel.com/search?keyword=processor+microcode+data+file"
10 # See also: https://wiki.archlinux.org/index.php/Microcode
11 # and https://www.archlinux.org/packages/extra/any/intel-ucode/
14 TARBALL="$PACKAGE-$VERSION.tar.gz"
15 WGET_URL="https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/archive/microcode-$VERSION.tar.gz"
17 DEPENDS="linux"
19 current_version()
20 {
21 wget -O - ${WGET_URL%/arch*}/releases 2>/dev/null | \
22 sed '/archive.*tar/!d;s|.*/microcode-\(.*\).tar.*|\1|;q'
23 }
25 compile_rules()
26 {
27 mkdir -p $install/lib/firmware/
29 cp -r $src/intel-ucode/ $install/lib/firmware/
31 install -Dm644 $stuff/LICENSE $install/usr/share/licenses/$PACKAGE/LICENSE
32 }
34 genpkg_rules()
35 {
36 cp -r $install/* $fs
37 }
39 post_install()
40 {
41 if [ -z "$1" -a -e /sys/devices/system/cpu/microcode/reload ]
42 then
43 echo 1 > /sys/devices/system/cpu/microcode/reload
44 fi
45 }