forked from evolix/evocheck
Well... For Stretch use only /sys/devices/system/cpu/vulnerabilities/
This commit is contained in:
parent
33b19090e6
commit
62b61aabf1
|
@ -707,10 +707,10 @@ if [ -e /etc/debian_version ]; then
|
||||||
fi
|
fi
|
||||||
|
|
||||||
if [ "$IS_MELTDOWN_SPECTRE" = 1 ]; then
|
if [ "$IS_MELTDOWN_SPECTRE" = 1 ]; then
|
||||||
# We check if the running kernel has kaiser loaded
|
|
||||||
if is_debianversion stretch; then
|
if is_debianversion stretch; then
|
||||||
grep '^flags' /proc/cpuinfo | grep -qEw '(kaiser|pti)' || echo 'IS_MELTDOWN_SPECTRE FAILED!'
|
for vuln in meltdown spectre_v1 spectre_v2; do
|
||||||
test -f /sys/devices/system/cpu/vulnerabilities/spectre_v2 || echo 'IS_MELTDOWN_SPECTRE FAILED!'
|
test -f /sys/devices/system/cpu/vulnerabilities/$vuln || echo 'IS_MELTDOWN_SPECTRE FAILED!'
|
||||||
|
done
|
||||||
fi
|
fi
|
||||||
fi
|
fi
|
||||||
fi
|
fi
|
||||||
|
|
Loading…
Reference in a new issue