From 1f604c119bcab1ef96d153775b654330c8ff7f38 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?St=C3=A9phane=20Lesimple?= Date: Sun, 8 Dec 2019 15:25:54 +0100 Subject: [PATCH] fix var typo --- spectre-meltdown-checker.sh | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/spectre-meltdown-checker.sh b/spectre-meltdown-checker.sh index a0ecab9..b83c56c 100755 --- a/spectre-meltdown-checker.sh +++ b/spectre-meltdown-checker.sh @@ -400,7 +400,7 @@ is_cpu_vulnerable() [ -z "$variant3a" ] && variant3a=immune elif [ "$cpu_model" = "$INTEL_FAM6_ATOM_SILVERMONT" ] || \ [ "$cpu_model" = "$INTEL_FAM6_ATOM_SILVERMONT_MID" ] || \ - [ "$cpu_model" = "$INTEL_FAM6_ATOM_SILVERMONT_X" ]; then + [ "$cpu_model" = "$INTEL_FAM6_ATOM_SILVERMONT_D" ]; then # https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html # https://github.com/speed47/spectre-meltdown-checker/issues/310 # => silvermont CPUs (aka cherry lake for tablets and brawsell for mobile/desktop) don't seem to be vulnerable