From fdfa50cf77f6fad8d5378f0a67c42d3713673b62 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?J=C3=B6rg=20Sommer?= Date: Thu, 19 Mar 2026 13:26:32 +0100 Subject: [PATCH] spectre-meltdown-checker: Update 0.46 -> git MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit The git repo gained some bugfixes, esp. for arm32. But there was no release since mid 2023. So, use the git repo. a20641f fix: handle non-numeric ARM CPU architecture values d550ea8 fix: harmless 'dmesg: write error' that could happen on some systems 8e33a1d fix: set cpu_* vars to a default value 68b4617 update: fwdb from v345+i20251110+4df2 to v347+i20251110+615b, 2 microcode changes 9fed5ce update: fwdb from v344+i20250811+1523 to v345+i20251110+4df2, 45 microcode changes 72bce72 chore: really fix autoupdate workflow to avoid useless PRs 5f18e67 chore: fix autoupdate workflow a8466b7 fix CVE-2017-5715 reporting when IBRS_FW is enabled b99be23 update: fwdb from v296+i20240514+988c to v344+i20250811+1523, 128 microcode changes ee4cfd0 chore: add autoupdate workflow for fwdb c2c60e0 chore: fix recent shellcheck warnings bae43d8 Replace head -1 by head -n1 34c6095 fix: Linux 6.9+ changed some config options names (#490) e806e4b chore: docker compose v2 388d44e Fix Retpoline detection for Linux 6.9+ (issue #490) bd0c7c9 fix: typo introduced by #483, fixes #486 d70e4c2 fwdb: update to v296+i20240514+988c 4e29fb5 fix: ucode_platformid_mask is hexa (fixes #485) 0f2edb1 feat: blacklist some more microcodes (fixes #475) 8ac2539 fix: microcode check now supports pf_mask (fixes #482) 97f4d5f feat(reptar): add detection and mitigation of Reptar 9b7b09a fix(inception): continued mitigation detection c94811e fix(inception): Zen1/2 results based on kernel mitigations 3e67047 feat(inception): README ecee757 feat(inception): kernel checks + sbpb support detection fb6933d feat(inception): Zen1/2 IBPB and SMT checks dc6921a feat(inception): handle sysfs interface 3167762 feat(inception): start supporting AMD inception 44223c5 fix: bsd: kernel version detection dbe208f enh: downfall: detect kernel mitigation without sysfs aca4e2a enh: move root warning to the bottom c1c1ac4 feat(downfall): detection of the kernel mitigation relying on dmesg ba0daa6 feat: downfall: add kernel soft mitigation support check 227c0aa feat(downfall): add downfall checks 8ba3751 fwdb: update to latest Intel ucode versions d013c0a doc: add kernel src as additional ucode version source cbe8ba1 fix: inteldb: cpuid 0x00090660 and 0x000A0680 9c2587b enh: when CPUID can't be read, built it by ourselves 2a5ddc8 feat: add Intel known affected processors DB 2ef6c1c enh: factorize file download func 3c22401 chore: update disclaimer and FAQ Signed-off-by: Jörg Sommer Signed-off-by: Khem Raj --- ...tdown-checker_0.46.bb => spectre-meltdown-checker_git.bb} | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) rename meta-oe/recipes-security/spectre-meltdown-checker/{spectre-meltdown-checker_0.46.bb => spectre-meltdown-checker_git.bb} (94%) diff --git a/meta-oe/recipes-security/spectre-meltdown-checker/spectre-meltdown-checker_0.46.bb b/meta-oe/recipes-security/spectre-meltdown-checker/spectre-meltdown-checker_git.bb similarity index 94% rename from meta-oe/recipes-security/spectre-meltdown-checker/spectre-meltdown-checker_0.46.bb rename to meta-oe/recipes-security/spectre-meltdown-checker/spectre-meltdown-checker_git.bb index 48f9a738bb..e239770584 100644 --- a/meta-oe/recipes-security/spectre-meltdown-checker/spectre-meltdown-checker_0.46.bb +++ b/meta-oe/recipes-security/spectre-meltdown-checker/spectre-meltdown-checker_git.bb @@ -8,9 +8,10 @@ BUGTRACKER = "https://github.com/speed47/spectre-meltdown-checker/issues" LICENSE = "GPL-3.0-only" LIC_FILES_CHKSUM = "file://spectre-meltdown-checker.sh;beginline=2;endline=2;md5=3ae5399e70af7be9b93f72568069e2f4" -SRC_URI = "git://github.com/speed47/spectre-meltdown-checker;protocol=https;branch=master" -SRCREV = "b8f8c81d519435c0871b13f02b5c4a72c5bffd5e" +PV = "0.46+git" +SRC_URI = "git://github.com/speed47/spectre-meltdown-checker;protocol=https;branch=master" +SRCREV = "a20641fbad57f37da6093203484ca28769e5bb64" # binutils: readelf,objdump might be used for deeper analysis # coreutils: dd with iflag=skip_bytes oflag=seek_bytes in some cases