1
0
mirror of https://github.com/speed47/spectre-meltdown-checker synced 2024-11-14 01:53:38 +01:00

fix(pti): when PTI activation is unknown, don't say we're vulnerable

This commit is contained in:
Stéphane Lesimple 2018-04-03 12:45:17 +02:00
parent e2d7ed2243
commit aef99d20f3

View File

@ -2323,6 +2323,8 @@ check_variant3_linux()
pvulnstatus $cve OK "Xen Dom0s are safe and do not require PTI"
elif [ "$xen_pv_domu" = 1 ]; then
pvulnstatus $cve VULN "Xen PV DomUs are vulnerable and need to be run in HVM, PVHVM, PVH mode, or the Xen hypervisor must have the Xen's own PTI patch"
elif [ "$kpti_enabled" = -1 ]; then
pvulnstatus $cve UNK "couldn't find any clue of PTI activation due to a truncated dmesg, please reboot and relaunch this script"
else
pvulnstatus $cve VULN "PTI is needed to mitigate the vulnerability"
fi