forked from evolix/evocheck
Well... For Stretch use only /sys/devices/system/cpu/vulnerabilities/
This commit is contained in:
parent
33b19090e6
commit
62b61aabf1
|
@ -707,10 +707,10 @@ if [ -e /etc/debian_version ]; then
|
|||
fi
|
||||
|
||||
if [ "$IS_MELTDOWN_SPECTRE" = 1 ]; then
|
||||
# We check if the running kernel has kaiser loaded
|
||||
if is_debianversion stretch; then
|
||||
grep '^flags' /proc/cpuinfo | grep -qEw '(kaiser|pti)' || echo 'IS_MELTDOWN_SPECTRE FAILED!'
|
||||
test -f /sys/devices/system/cpu/vulnerabilities/spectre_v2 || echo 'IS_MELTDOWN_SPECTRE FAILED!'
|
||||
for vuln in meltdown spectre_v1 spectre_v2; do
|
||||
test -f /sys/devices/system/cpu/vulnerabilities/$vuln || echo 'IS_MELTDOWN_SPECTRE FAILED!'
|
||||
done
|
||||
fi
|
||||
fi
|
||||
fi
|
||||
|
|
Loading…
Reference in a new issue