From 62b61aabf169ebc9e7e741f4190507f177a9642d Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Beno=C3=AEt=20S?= Date: Wed, 27 Jun 2018 17:49:44 +0200 Subject: [PATCH] Well... For Stretch use only /sys/devices/system/cpu/vulnerabilities/ --- evocheck.sh | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/evocheck.sh b/evocheck.sh index 9c11b1a..e634be4 100755 --- a/evocheck.sh +++ b/evocheck.sh @@ -707,10 +707,10 @@ if [ -e /etc/debian_version ]; then fi if [ "$IS_MELTDOWN_SPECTRE" = 1 ]; then - # We check if the running kernel has kaiser loaded if is_debianversion stretch; then - grep '^flags' /proc/cpuinfo | grep -qEw '(kaiser|pti)' || echo 'IS_MELTDOWN_SPECTRE FAILED!' - test -f /sys/devices/system/cpu/vulnerabilities/spectre_v2 || echo 'IS_MELTDOWN_SPECTRE FAILED!' + for vuln in meltdown spectre_v1 spectre_v2; do + test -f /sys/devices/system/cpu/vulnerabilities/$vuln || echo 'IS_MELTDOWN_SPECTRE FAILED!' + done fi fi fi