mirror of
https://github.com/speed47/spectre-meltdown-checker
synced 2024-12-23 04:43:37 +01:00
fix(sysfs): only check for sysfs for spectre2 when in live mode
This commit is contained in:
parent
94857c983d
commit
619b2749d8
@ -2016,7 +2016,7 @@ check_variant2_linux()
|
|||||||
# See gcc commit https://github.com/hjl-tools/gcc/commit/23b517d4a67c02d3ef80b6109218f2aadad7bd79
|
# See gcc commit https://github.com/hjl-tools/gcc/commit/23b517d4a67c02d3ef80b6109218f2aadad7bd79
|
||||||
# In latest retpoline LKML patches, the noretpoline_setup symbol exists only if CONFIG_RETPOLINE is set
|
# In latest retpoline LKML patches, the noretpoline_setup symbol exists only if CONFIG_RETPOLINE is set
|
||||||
# *AND* if the compiler is retpoline-compliant, so look for that symbol
|
# *AND* if the compiler is retpoline-compliant, so look for that symbol
|
||||||
if [ -e "/sys/devices/system/cpu/vulnerabilities/spectre_v2" ]; then
|
if [ "$opt_live" = 1 ] && [ -e "/sys/devices/system/cpu/vulnerabilities/spectre_v2" ]; then
|
||||||
if grep -qw Minimal /sys/devices/system/cpu/vulnerabilities/spectre_v2; then
|
if grep -qw Minimal /sys/devices/system/cpu/vulnerabilities/spectre_v2; then
|
||||||
pstatus yellow NO "kernel reports minimal retpoline compilation"
|
pstatus yellow NO "kernel reports minimal retpoline compilation"
|
||||||
elif grep -qw Full /sys/devices/system/cpu/vulnerabilities/spectre_v2; then
|
elif grep -qw Full /sys/devices/system/cpu/vulnerabilities/spectre_v2; then
|
||||||
|
Loading…
Reference in New Issue
Block a user