From c6ee0358d1e1bbb3b502f7712546372679723cf4 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?St=C3=A9phane=20Lesimple?= Date: Tue, 22 May 2018 09:18:30 +0200 Subject: [PATCH] feat(variant4): report SSB_NO CPUs as not vulnerable --- spectre-meltdown-checker.sh | 7 +++++++ 1 file changed, 7 insertions(+) diff --git a/spectre-meltdown-checker.sh b/spectre-meltdown-checker.sh index 062eec8..900d33c 100755 --- a/spectre-meltdown-checker.sh +++ b/spectre-meltdown-checker.sh @@ -297,6 +297,13 @@ is_cpu_vulnerable() variant3=immune _debug "is_cpu_vulnerable: RDCL_NO is set so not vuln to meltdown" fi + if [ "$capabilities_ssb_no" = 1 ]; then + # capability bit for future Intel processor that will explicitly state + # that they're not vulnerable to Variant 4 + # this var is set in check_cpu() + variant4=immune + _debug "is_cpu_vulnerable: SSB_NO is set so not vuln to variant4" + fi elif is_amd; then # AMD revised their statement about variant2 => vulnerable # https://www.amd.com/en/corporate/speculative-execution