From 6d35e780f4971505a7345fe417a90bf8a04a1b90 Mon Sep 17 00:00:00 2001 From: Zhiyuan Dai Date: Wed, 30 Dec 2020 17:16:40 +0800 Subject: [PATCH] arm64: phytium: Add CPU Implementer Phytium This patch adds 0x70 check for phytium implementer id in function parse_cpu_details. Also adds that Phytium Soc is not vulnerable to variant 3/3a --- spectre-meltdown-checker.sh | 8 ++++++++ 1 file changed, 8 insertions(+) diff --git a/spectre-meltdown-checker.sh b/spectre-meltdown-checker.sh index 22e80d3..12eb279 100755 --- a/spectre-meltdown-checker.sh +++ b/spectre-meltdown-checker.sh @@ -467,6 +467,10 @@ is_cpu_vulnerable() variant3=immune variant3a=immune variantl1tf=immune + elif [ "$cpu_vendor" = PHYTIUM ]; then + variant3=immune + variant3a=immune + variantl1tf=immune elif [ "$cpu_vendor" = ARM ]; then # ARM # reference: https://developer.arm.com/support/security-update @@ -688,6 +692,8 @@ is_cpu_mds_free() return 0 elif [ "$cpu_vendor" = CAVIUM ]; then return 0 + elif [ "$cpu_vendor" = PHYTIUM ]; then + return 0 elif [ "$cpu_vendor" = ARM ]; then return 0 fi @@ -1572,6 +1578,8 @@ parse_cpu_details() elif grep -qi 'CPU implementer[[:space:]]*:[[:space:]]*0x43' "$procfs/cpuinfo"; then cpu_vendor='CAVIUM' + elif grep -qi 'CPU implementer[[:space:]]*:[[:space:]]*0x70' "$procfs/cpuinfo"; then + cpu_vendor='PHYTIUM' fi cpu_family=$( grep '^cpu family' "$procfs/cpuinfo" | awk '{print $4}' | grep -E '^[0-9]+$' | head -1)