ridl
ridl copied to clipboard
Windows/L1TF: SMT reported vulnerable when no SMT is present
Hi
Using the Windows binary on Windows 7 with an Intel Core i5-4570 (4 cores, no SMT) in the L1TF section SMT is being reported as vulnerable. Yet in the section about MDS SMT is reported as Unaffected. - The first look result looks erroneous to me - correct?
It looks like it boils down to: https://github.com/vusec/ridl/blob/508d549341d785afc59681ed3f219ef72437d637/source/msw/l1tf.c#L42
Also commit 2e13baf4e7c24e38e76b38bd36f132e54b11854d added the use of the function check_smt() for l1tf.c on Linux and macOS but not Windows.
Is check_smt() not available for Windows (yet) or was it forgotten to be added in the process?
Regards Mathieu
Thanks, seems I forgot to implement that. It's been fixed in 7e4fc989fd24f9066bf92f5cd43df7493ae45e8c. I will rebuild the binaries for Microsoft Windows soon.
Thanks for the update, I'll give a test-drive ony my machine, likely by the end of the week if I see new binaries and give feedback.
Any update on these new binaries.. ?