From 77b34d48c68e4b576a93abc515794d1d9e640495 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?St=C3=A9phane=20Lesimple?= Date: Thu, 23 May 2019 14:25:13 +0200 Subject: [PATCH] fix(mds): check MDS_NO bit in is_cpu_mds_free() --- spectre-meltdown-checker.sh | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) diff --git a/spectre-meltdown-checker.sh b/spectre-meltdown-checker.sh index 2a1d900..4f64b1b 100755 --- a/spectre-meltdown-checker.sh +++ b/spectre-meltdown-checker.sh @@ -595,6 +595,7 @@ is_cpu_mds_free() return 0 fi fi + [ "$capabilities_mds_no" = 1 ] && return 0 fi # official statement from AMD says none of their CPUs are vulnerable @@ -2441,7 +2442,7 @@ check_cpu() fi fi - _info_nol " * CPU explicitly indicates not being vulnerable to Meltdown (RDCL_NO): " + _info_nol " * CPU explicitly indicates not being vulnerable to Meltdown/L1TF (RDCL_NO): " if [ "$capabilities_rdcl_no" = -1 ]; then pstatus yellow UNKNOWN elif [ "$capabilities_rdcl_no" = 1 ]; then @@ -2477,7 +2478,7 @@ check_cpu() pstatus blue NO fi - _info_nol " * CPU explicitly indicates not being vulnerable to Microarchitectural Data Sampling (MDC_NO): " + _info_nol " * CPU explicitly indicates not being vulnerable to Microarchitectural Data Sampling (MDS_NO): " if [ "$capabilities_mds_no" = -1 ]; then pstatus yellow UNKNOWN elif [ "$capabilities_mds_no" = 1 ]; then