mirror of
https://github.com/speed47/spectre-meltdown-checker
synced 2025-01-03 10:05:44 +01:00
fix shellcheck warnings
This commit is contained in:
parent
c18b88d745
commit
e0a1c2ec77
@ -639,8 +639,7 @@ is_cpu_taa_free()
|
|||||||
if ! is_intel; then
|
if ! is_intel; then
|
||||||
return 0
|
return 0
|
||||||
# is intel
|
# is intel
|
||||||
elif [ "$capabilities_taa_no" = 0 ] || \
|
elif [ "$capabilities_taa_no" = 0 ] || [ "$cpuid_rtm" = 0 ]; then
|
||||||
[ "$cpuid_rtm" = 0]; then
|
|
||||||
return 0
|
return 0
|
||||||
fi
|
fi
|
||||||
|
|
||||||
@ -4732,13 +4731,13 @@ check_taa()
|
|||||||
|
|
||||||
if [ "$opt_live" != 1 ]; then
|
if [ "$opt_live" != 1 ]; then
|
||||||
pstatus blue N/A "not testable in offline mode"
|
pstatus blue N/A "not testable in offline mode"
|
||||||
pvulnstatus $cve UNK
|
pvulnstatus "$cve" UNK
|
||||||
return
|
return
|
||||||
fi
|
fi
|
||||||
|
|
||||||
if ! is_cpu_vulnerable "$cve" ; then
|
if ! is_cpu_vulnerable "$cve" ; then
|
||||||
# override status & msg in case CPU is not vulnerable after all
|
# override status & msg in case CPU is not vulnerable after all
|
||||||
pvulnstatus $cve OK "your CPU vendor reported your CPU model as not vulnerable"
|
pvulnstatus "$cve" OK "your CPU vendor reported your CPU model as not vulnerable"
|
||||||
return
|
return
|
||||||
fi
|
fi
|
||||||
if sys_interface_check '/sys/devices/system/cpu/vulnerabilities/tsx_async_abort'; then
|
if sys_interface_check '/sys/devices/system/cpu/vulnerabilities/tsx_async_abort'; then
|
||||||
@ -4774,11 +4773,11 @@ check_taa()
|
|||||||
fi
|
fi
|
||||||
|
|
||||||
if [ $taa_mitigated = 0 ];then
|
if [ $taa_mitigated = 0 ];then
|
||||||
pvulnstatus $cve VULN
|
pvulnstatus "$cve" VULN
|
||||||
elif [ $taa_mitigated = 1 ]; then
|
elif [ $taa_mitigated = 1 ]; then
|
||||||
pvulnstatus $cve OK
|
pvulnstatus "$cve" OK
|
||||||
else
|
else
|
||||||
pvulnstatus $cve UNK "further action may be needed to mitigate this vulnerability. For more info check Linux kernel Documentation/admin-guide/hw-vuln/tsx_async_abort.rst"
|
pvulnstatus "$cve" UNK "further action may be needed to mitigate this vulnerability. For more info check Linux kernel Documentation/admin-guide/hw-vuln/tsx_async_abort.rst"
|
||||||
fi
|
fi
|
||||||
}
|
}
|
||||||
|
|
||||||
|
Loading…
Reference in New Issue
Block a user