mirror of
https://github.com/speed47/spectre-meltdown-checker
synced 2024-12-23 04:43:37 +01:00
AMD now vuln to variant2 (as per their stmt)
This commit is contained in:
parent
4a2d051285
commit
b47d505689
@ -8,7 +8,7 @@
|
|||||||
#
|
#
|
||||||
# Stephane Lesimple
|
# Stephane Lesimple
|
||||||
#
|
#
|
||||||
VERSION=0.28
|
VERSION=0.29
|
||||||
|
|
||||||
# Script configuration
|
# Script configuration
|
||||||
show_usage()
|
show_usage()
|
||||||
@ -158,8 +158,10 @@ is_cpu_vulnerable()
|
|||||||
variant1=0
|
variant1=0
|
||||||
variant2=0
|
variant2=0
|
||||||
variant3=0
|
variant3=0
|
||||||
|
|
||||||
if grep -q AMD /proc/cpuinfo; then
|
if grep -q AMD /proc/cpuinfo; then
|
||||||
variant2=1
|
# AMD revised their statement about variant2 => vulnerable
|
||||||
|
# https://www.amd.com/en/corporate/speculative-execution
|
||||||
variant3=1
|
variant3=1
|
||||||
elif grep -qi 'CPU implementer\s*:\s*0x41' /proc/cpuinfo; then
|
elif grep -qi 'CPU implementer\s*:\s*0x41' /proc/cpuinfo; then
|
||||||
# ARM
|
# ARM
|
||||||
@ -188,6 +190,7 @@ is_cpu_vulnerable()
|
|||||||
fi
|
fi
|
||||||
fi
|
fi
|
||||||
fi
|
fi
|
||||||
|
|
||||||
[ "$1" = 1 ] && return $variant1
|
[ "$1" = 1 ] && return $variant1
|
||||||
[ "$1" = 2 ] && return $variant2
|
[ "$1" = 2 ] && return $variant2
|
||||||
[ "$1" = 3 ] && return $variant3
|
[ "$1" = 3 ] && return $variant3
|
||||||
|
Loading…
Reference in New Issue
Block a user