1
0
mirror of https://github.com/speed47/spectre-meltdown-checker synced 2024-12-23 04:43:37 +01:00

AMD now vuln to variant2 (as per their stmt)

This commit is contained in:
Stéphane Lesimple 2018-01-13 13:35:13 +01:00
parent 4a2d051285
commit b47d505689

View File

@ -8,7 +8,7 @@
# #
# Stephane Lesimple # Stephane Lesimple
# #
VERSION=0.28 VERSION=0.29
# Script configuration # Script configuration
show_usage() show_usage()
@ -158,8 +158,10 @@ is_cpu_vulnerable()
variant1=0 variant1=0
variant2=0 variant2=0
variant3=0 variant3=0
if grep -q AMD /proc/cpuinfo; then if grep -q AMD /proc/cpuinfo; then
variant2=1 # AMD revised their statement about variant2 => vulnerable
# https://www.amd.com/en/corporate/speculative-execution
variant3=1 variant3=1
elif grep -qi 'CPU implementer\s*:\s*0x41' /proc/cpuinfo; then elif grep -qi 'CPU implementer\s*:\s*0x41' /proc/cpuinfo; then
# ARM # ARM
@ -188,6 +190,7 @@ is_cpu_vulnerable()
fi fi
fi fi
fi fi
[ "$1" = 1 ] && return $variant1 [ "$1" = 1 ] && return $variant1
[ "$1" = 2 ] && return $variant2 [ "$1" = 2 ] && return $variant2
[ "$1" = 3 ] && return $variant3 [ "$1" = 3 ] && return $variant3