aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorStéphane Lesimple <speed47_github@speed47.net>2018-01-14 15:10:39 +0100
committerStéphane Lesimple <speed47_github@speed47.net>2018-01-14 21:32:56 +0100
commit704e54019a6b589bf7679957d678a9f427f6e5d2 (patch)
treec36b44c6904a7388fb0a8c8d84da66e9471bda24
parentd96093171a6e6e3decab08b868abd533223eed37 (diff)
downloadspectre-meltdown-checker-704e54019a6b589bf7679957d678a9f427f6e5d2.tar.lz
spectre-meltdown-checker-704e54019a6b589bf7679957d678a9f427f6e5d2.tar.xz
spectre-meltdown-checker-704e54019a6b589bf7679957d678a9f427f6e5d2.zip
is_cpu_vulnerable: add check for old Atoms
-rwxr-xr-xspectre-meltdown-checker.sh11
1 files changed, 10 insertions, 1 deletions
diff --git a/spectre-meltdown-checker.sh b/spectre-meltdown-checker.sh
index 45e70f5..da5dfda 100755
--- a/spectre-meltdown-checker.sh
+++ b/spectre-meltdown-checker.sh
@@ -163,7 +163,15 @@ is_cpu_vulnerable()
variant2=0
variant3=0
- if grep -q AMD /proc/cpuinfo; then
+ if grep -q GenuineIntel /proc/cpuinfo; then
+ # Intel
+ # Old Atoms are not vulnerable to spectre 2 nor meltdown
+ # https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00088&languageid=en-fr
+ if grep -qE '^model name.+ Atom\(TM\) CPU +(S|D|N|230|330)' /proc/cpuinfo; then
+ variant2=1
+ variant3=1
+ fi
+ elif grep -q AuthenticAMD /proc/cpuinfo; then
# AMD revised their statement about variant2 => vulnerable
# https://www.amd.com/en/corporate/speculative-execution
variant3=1
@@ -185,6 +193,7 @@ is_cpu_vulnerable()
# armv8 vulnerable chips
:
else
+ # others are not vulnerable
variant1=1
variant2=1
fi