WARNING: These microcodes are for *compatibility testing* and *kernel SSBD support validation* only. They could interoperate badly with any specific system's firmware or hardware configuration, causing the system to misbehave, up to and including incorrect system operation, data loss, data corruption, and firmware soft-bricking. Use at your own risk. When in doubt, DO NOT use. You are the sole party responsible for any damage that installing these microcode updates could cause to the system or data. Included microcodes: sig 0x000106a5, pf_mask 0x03, 2018-05-11, rev 0x001d, size 12288 sig 0x000206a7, pf_mask 0x12, 2018-04-10, rev 0x002e, size 12288 sig 0x000206c2, pf_mask 0x03, 2018-05-08, rev 0x001f, size 11264 sig 0x000206d6, pf_mask 0x6d, 2018-05-08, rev 0x061d, size 18432 sig 0x000206d7, pf_mask 0x6d, 2018-05-08, rev 0x0714, size 19456 sig 0x000206e6, pf_mask 0x04, 2018-05-15, rev 0x000d, size 9216 sig 0x000206f2, pf_mask 0x05, 2018-05-16, rev 0x003b, size 14336 sig 0x000306a9, pf_mask 0x12, 2018-04-10, rev 0x0020, size 13312 sig 0x000306c3, pf_mask 0x32, 2018-04-02, rev 0x0025, size 23552 sig 0x000306d4, pf_mask 0xc0, 2018-03-22, rev 0x002b, size 18432 sig 0x000306e4, pf_mask 0xed, 2018-04-25, rev 0x042d, size 15360 sig 0x000306e7, pf_mask 0xed, 2018-04-25, rev 0x0714, size 17408 sig 0x000306f2, pf_mask 0x6f, 2018-04-20, rev 0x003d, size 33792 sig 0x000306f4, pf_mask 0x80, 2018-04-20, rev 0x0012, size 17408 sig 0x00040651, pf_mask 0x72, 2018-04-02, rev 0x0024, size 22528 sig 0x00040661, pf_mask 0x32, 2018-04-02, rev 0x001a, size 25600 sig 0x00040671, pf_mask 0x22, 2018-04-03, rev 0x001e, size 13312 sig 0x000406e3, pf_mask 0xc0, 2018-04-17, rev 0x00c6, size 99328 sig 0x000406f1, pf_mask 0xef, 2018-04-19, rev 0xb00002e, size 28672 sig 0x00050654, pf_mask 0xb7, 2018-05-15, rev 0x200004d, size 31744 sig 0x00050662, pf_mask 0x10, 2018-05-25, rev 0x0017, size 31744 sig 0x00050663, pf_mask 0x10, 2018-04-20, rev 0x7000013, size 22528 sig 0x00050664, pf_mask 0x10, 2018-04-20, rev 0xf000012, size 22528 sig 0x00050665, pf_mask 0x10, 2018-04-20, rev 0xe00000a, size 18432 sig 0x000506c9, pf_mask 0x03, 2018-05-11, rev 0x0032, size 16384 sig 0x000506e3, pf_mask 0x36, 2018-04-17, rev 0x00c6, size 99328 sig 0x000706a1, pf_mask 0x01, 2017-12-26, rev 0x0022, size 73728 ** sig 0x000806e9, pf_mask 0xc0, 2018-03-24, rev 0x008e, size 98304 sig 0x000806ea, pf_mask 0xc0, 2018-05-15, rev 0x0096, size 98304 sig 0x000906e9, pf_mask 0x2a, 2018-03-24, rev 0x008e, size 98304 sig 0x000906ea, pf_mask 0x22, 2018-05-02, rev 0x0096, size 97280 sig 0x000906eb, pf_mask 0x02, 2018-03-24, rev 0x008e, size 98304 ** Warning: 0x706a1 rev 0x26 is under recall due to possible issues, the previous production version was included in the meantime to make the need to revert very clear. Warning: Several microcode updates are still missing. How to install: 1. place the extra microcode data file in /usr/share/misc, ensure it is mode 0644, owner root, group root. 2. install the regular intel-microcode package, it will detect the extra microcode pack in /usr/share/misc/intel-microcode* and use it as a possible source of microcode updates. Alternatively, if intel-microcode is already installed, just regenerate the initramfs: update-initramfs -u 3. Reboot. 4. Report any issues or issues to the Debian bug tracking system, package intel-microcode, tag experimental, severity minor. How to remove: 1. rm /usr/share/misc/intel-microcode-* 2. update-initramfs -u 3. reboot. How to temporarily disable it if the system won't boot: 1. enter the command line mode of your bootloader (likely grub2) 2. append to the end of the kernel command line the following command: dis_ucode_ldr 3. boot normally, the microcode update will not be active. Proceed with the how-to-remove section above 4. report the issue. Notes: * Only microcodes declared to be in "production" by Intel in their sa00115 microcode update guidance list, dated 2018-07-13, are included in this data file. * Table of microcodes: https://www.intel.com/content/dam/www/public/us/en/documents/sa00115-microcode-update-guidance.pdf