From 552228339b804d54ae4f0eba4fcb48b84fac408c Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?St=C3=A9phane=20Lesimple?= Date: Sun, 24 Nov 2019 20:19:21 +0100 Subject: [PATCH] fix: variant3a: Silvermont CPUs are not vulnerable to variant 3a --- spectre-meltdown-checker.sh | 11 ++++++++++- 1 file changed, 10 insertions(+), 1 deletion(-) diff --git a/spectre-meltdown-checker.sh b/spectre-meltdown-checker.sh index a4d5ecd..fd0a6f9 100755 --- a/spectre-meltdown-checker.sh +++ b/spectre-meltdown-checker.sh @@ -390,11 +390,20 @@ is_cpu_vulnerable() [ -z "$variant4" ] && variant4=immune _debug "is_cpu_vulnerable: cpu not affected by speculative store bypass so not vuln to variant4" fi - # variant 4a for xeon phi + # variant 3a if [ "$cpu_family" = 6 ]; then if [ "$cpu_model" = "$INTEL_FAM6_XEON_PHI_KNL" ] || [ "$cpu_model" = "$INTEL_FAM6_XEON_PHI_KNM" ]; then _debug "is_cpu_vulnerable: xeon phi immune to variant 3a" [ -z "$variant3a" ] && variant3a=immune + elif [ "$cpu_model" = "$INTEL_FAM6_ATOM_SILVERMONT" ] || \ + [ "$cpu_model" = "$INTEL_FAM6_ATOM_SILVERMONT_MID" ] || \ + [ "$cpu_model" = "$INTEL_FAM6_ATOM_SILVERMONT_X" ]; then + # https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html + # https://github.com/speed47/spectre-meltdown-checker/issues/310 + # => silvermont CPUs (aka cherry lake for tablets and brawsell for mobile/desktop) don't seem to be vulnerable + # => goldmont ARE vulnerable + _debug "is_cpu_vulnerable: silvermont immune to variant 3a" + [ -z "$variant3a" ] && variant3a=immune fi fi # L1TF (RDCL_NO already checked above)