diff options
author | Stéphane Lesimple <speed47_github@speed47.net> | 2018-01-14 15:10:39 +0100 |
---|---|---|
committer | Stéphane Lesimple <speed47_github@speed47.net> | 2018-01-14 21:32:56 +0100 |
commit | 704e54019a6b589bf7679957d678a9f427f6e5d2 (patch) | |
tree | c36b44c6904a7388fb0a8c8d84da66e9471bda24 | |
parent | d96093171a6e6e3decab08b868abd533223eed37 (diff) | |
download | spectre-meltdown-checker-704e54019a6b589bf7679957d678a9f427f6e5d2.tar.lz spectre-meltdown-checker-704e54019a6b589bf7679957d678a9f427f6e5d2.tar.xz spectre-meltdown-checker-704e54019a6b589bf7679957d678a9f427f6e5d2.zip |
is_cpu_vulnerable: add check for old Atoms
-rwxr-xr-x | spectre-meltdown-checker.sh | 11 |
1 files changed, 10 insertions, 1 deletions
diff --git a/spectre-meltdown-checker.sh b/spectre-meltdown-checker.sh index 45e70f5..da5dfda 100755 --- a/spectre-meltdown-checker.sh +++ b/spectre-meltdown-checker.sh @@ -163,7 +163,15 @@ is_cpu_vulnerable() variant2=0 variant3=0 - if grep -q AMD /proc/cpuinfo; then + if grep -q GenuineIntel /proc/cpuinfo; then + # Intel + # Old Atoms are not vulnerable to spectre 2 nor meltdown + # https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00088&languageid=en-fr + if grep -qE '^model name.+ Atom\(TM\) CPU +(S|D|N|230|330)' /proc/cpuinfo; then + variant2=1 + variant3=1 + fi + elif grep -q AuthenticAMD /proc/cpuinfo; then # AMD revised their statement about variant2 => vulnerable # https://www.amd.com/en/corporate/speculative-execution variant3=1 @@ -185,6 +193,7 @@ is_cpu_vulnerable() # armv8 vulnerable chips : else + # others are not vulnerable variant1=1 variant2=1 fi |