From 42a57dd98083262212b4441693883076ea3fc035 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?St=C3=A9phane=20Lesimple?= Date: Wed, 17 Jan 2018 17:17:39 +0100 Subject: [PATCH] add kern.log as another backend of dmesg output --- spectre-meltdown-checker.sh | 7 +++++++ 1 file changed, 7 insertions(+) diff --git a/spectre-meltdown-checker.sh b/spectre-meltdown-checker.sh index 7db1ebb..ce0e5c5 100755 --- a/spectre-meltdown-checker.sh +++ b/spectre-meltdown-checker.sh @@ -1051,6 +1051,10 @@ check_variant3() # if we can't find the flag in dmesg output, grep in /var/log/dmesg when readable _debug "kpti_enabled: found hint in /var/log/dmesg: "$(grep -E "$dmesg_grep" /var/log/dmesg) kpti_enabled=1 + elif [ -r /var/log/kern.log ] && grep -Eq "$dmesg_grep" /var/log/kern.log; then + # if we can't find the flag in dmesg output, grep in /var/log/kern.log when readable + _debug "kpti_enabled: found hint in /var/log/kern.log: "$(grep -E "$dmesg_grep" /var/log/kern.log) + kpti_enabled=1 else _debug "kpti_enabled: couldn't find any hint that PTI is enabled" kpti_enabled=0 @@ -1097,6 +1101,9 @@ check_variant3() elif [ -r /var/log/dmesg ] && grep -q 'Booting paravirtualized kernel on Xen$' /var/log/dmesg; then pstatus green YES 'Xen PV is not vulnerable' xen_pv=1 + elif [ -r /var/log/kern.log ] && grep -q 'Booting paravirtualized kernel on Xen$' /var/log/kern.log; then + pstatus green YES 'Xen PV is not vulnerable' + xen_pv=1 else pstatus blue NO fi