diff options
author | Stéphane Lesimple <speed47_github@speed47.net> | 2018-01-13 13:35:13 +0100 |
---|---|---|
committer | Stéphane Lesimple <speed47_github@speed47.net> | 2018-01-13 13:35:31 +0100 |
commit | b47d5056899225522a4bc644735cf94e2e908a0e (patch) | |
tree | 2cf88f9156e0a663f8dff1134061c029505b37f7 | |
parent | 4a2d0512850e8da12a2110b33da17c7ec3c7838c (diff) | |
download | spectre-meltdown-checker-b47d5056899225522a4bc644735cf94e2e908a0e.tar.lz spectre-meltdown-checker-b47d5056899225522a4bc644735cf94e2e908a0e.tar.xz spectre-meltdown-checker-b47d5056899225522a4bc644735cf94e2e908a0e.zip |
AMD now vuln to variant2 (as per their stmt)
-rwxr-xr-x | spectre-meltdown-checker.sh | 7 |
1 files changed, 5 insertions, 2 deletions
diff --git a/spectre-meltdown-checker.sh b/spectre-meltdown-checker.sh index 7199de8..87838c3 100755 --- a/spectre-meltdown-checker.sh +++ b/spectre-meltdown-checker.sh @@ -8,7 +8,7 @@ # # Stephane Lesimple # -VERSION=0.28 +VERSION=0.29 # Script configuration show_usage() @@ -158,8 +158,10 @@ is_cpu_vulnerable() variant1=0 variant2=0 variant3=0 + if grep -q AMD /proc/cpuinfo; then - variant2=1 + # AMD revised their statement about variant2 => vulnerable + # https://www.amd.com/en/corporate/speculative-execution variant3=1 elif grep -qi 'CPU implementer\s*:\s*0x41' /proc/cpuinfo; then # ARM @@ -188,6 +190,7 @@ is_cpu_vulnerable() fi fi fi + [ "$1" = 1 ] && return $variant1 [ "$1" = 2 ] && return $variant2 [ "$1" = 3 ] && return $variant3 |