It can stay there, as that way you continue to get future microcode updates through your normal package update flow.Just a quick question: After updating / patchung the microcode, do we need to removenon-free-firmware
from the sources again or can it be stay there?
Perfect, thank you for the quick response, appreciate that!It can stay there, as that way you continue to get future microcode updates through your normal package update flow.
non-free-firmware
repo to /etc/apt/sources.list (as explained above) then installed the following additional packages on my 3 new PVE nodesapt update && \
apt install -y \
proxmox-secure-boot-support \
fwupd \
udisks2 \
udisks2-bcache \
udisks2-zram \
udisks2-lvm2 \
udisks2-btrfs \
intel-microcode && \
apt full-upgrade -y
/etc/modprobe.d/intel-microcode-blacklist.conf
cat /etc/modprode.d/intel-microcode-blacklist.conf
# The microcode module attempts to apply a microcode update when
# it autoloads. This is not always safe, so we block it by default.
blacklist microcode
blacklist microcode
line would, I believe, be inhibiting microcode "late" updates. The microcode for my Intel i9-13900 updated to version 0x123.journalctl -k --grep=microcode
Aug 09 10:52:36 pve02 kernel: microcode: Current revision: 0x00000123
Aug 09 10:52:36 pve02 kernel: microcode: Updated early from: 0x0000011e
The difference is what Proxmox Server Solutions GmbH is saying about what is most appropriate for most Proxmox installations.We will evaluate if it's practicable and workable to upload the microcode packages to our repositories too in the future, as that would be compatible with having thenon-free-firmware
repository added anyway.