mirror of
				https://github.com/speed47/spectre-meltdown-checker.git
				synced 2025-11-04 15:50:57 +01:00 
			
		
		
		
	fix: variant3a: Silvermont CPUs are not vulnerable to variant 3a
This commit is contained in:
		@@ -390,11 +390,20 @@ is_cpu_vulnerable()
 | 
			
		||||
			[ -z "$variant4" ] && variant4=immune
 | 
			
		||||
			_debug "is_cpu_vulnerable: cpu not affected by speculative store bypass so not vuln to variant4"
 | 
			
		||||
		fi
 | 
			
		||||
		# variant 4a for xeon phi
 | 
			
		||||
		# variant 3a
 | 
			
		||||
		if [ "$cpu_family" = 6 ]; then
 | 
			
		||||
			if [ "$cpu_model" = "$INTEL_FAM6_XEON_PHI_KNL" ] || [ "$cpu_model" = "$INTEL_FAM6_XEON_PHI_KNM" ]; then
 | 
			
		||||
				_debug "is_cpu_vulnerable: xeon phi immune to variant 3a"
 | 
			
		||||
				[ -z "$variant3a" ] && variant3a=immune
 | 
			
		||||
			elif [ "$cpu_model" = "$INTEL_FAM6_ATOM_SILVERMONT" ] || \
 | 
			
		||||
				[ "$cpu_model" = "$INTEL_FAM6_ATOM_SILVERMONT_MID" ] || \
 | 
			
		||||
				[ "$cpu_model" = "$INTEL_FAM6_ATOM_SILVERMONT_X" ]; then
 | 
			
		||||
					# https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html
 | 
			
		||||
					# https://github.com/speed47/spectre-meltdown-checker/issues/310
 | 
			
		||||
					# => silvermont CPUs (aka cherry lake for tablets and brawsell for mobile/desktop) don't seem to be vulnerable
 | 
			
		||||
					# => goldmont ARE vulnerable
 | 
			
		||||
					_debug "is_cpu_vulnerable: silvermont immune to variant 3a"
 | 
			
		||||
					[ -z "$variant3a" ] && variant3a=immune
 | 
			
		||||
			fi
 | 
			
		||||
		fi
 | 
			
		||||
		# L1TF (RDCL_NO already checked above)
 | 
			
		||||
 
 | 
			
		||||
		Reference in New Issue
	
	Block a user