diff --git a/README.md b/README.md index 1b22e84..6c94a81 100644 --- a/README.md +++ b/README.md @@ -143,7 +143,7 @@ docker run --rm --privileged -v /boot:/boot:ro -v /dev/cpu:/dev/cpu:ro -v /lib/m - Note: These 4 CVEs are similar and collectively named "MDS" vulnerabilities, the mitigation is identical for all - Impact: Kernel - Mitigation: microcode update + kernel update making possible to protect various CPU internal buffers from unprivileged speculative access to data - - Performance impact of the mitigation: TBC + - Performance impact of the mitigation: low to significant ## Understanding what this script does and doesn't diff --git a/spectre-meltdown-checker.sh b/spectre-meltdown-checker.sh index 88794f2..645d6ec 100755 --- a/spectre-meltdown-checker.sh +++ b/spectre-meltdown-checker.sh @@ -841,6 +841,7 @@ while [ -n "$1" ]; do esac elif [ "$1" = "-v" ] || [ "$1" = "--verbose" ]; then opt_verbose=$(( opt_verbose + 1 )) + [ "$opt_verbose" -ge 2 ] && opt_mock=1 shift elif [ "$1" = "--cve" ]; then if [ -z "$2" ]; then