diff options
author | Stéphane Lesimple <speed47_github@speed47.net> | 2018-01-12 19:07:23 +0100 |
---|---|---|
committer | Stéphane Lesimple <speed47_github@speed47.net> | 2018-01-12 19:08:12 +0100 |
commit | 8f18f53aba743f3a221321391f39a6d684ac93aa (patch) | |
tree | 7d2cb5af07905abdf247dc1daf110e852d816c45 | |
parent | d3f102b3b3fd4db56760b9b9578a36d3bfaca0e4 (diff) | |
download | spectre-meltdown-checker-8f18f53aba743f3a221321391f39a6d684ac93aa.tar.lz spectre-meltdown-checker-8f18f53aba743f3a221321391f39a6d684ac93aa.tar.xz spectre-meltdown-checker-8f18f53aba743f3a221321391f39a6d684ac93aa.zip |
add cpu model in output
-rwxr-xr-x | spectre-meltdown-checker.sh | 3 |
1 files changed, 2 insertions, 1 deletions
diff --git a/spectre-meltdown-checker.sh b/spectre-meltdown-checker.sh index 2d587a7..b80bec6 100755 --- a/spectre-meltdown-checker.sh +++ b/spectre-meltdown-checker.sh @@ -457,7 +457,8 @@ if [ "$opt_live" = 1 ]; then _warn "To run it as root, you can try the following command: sudo $0" _warn fi - _info "Checking for vulnerabilities against live running kernel \033[35m"$(uname -s) $(uname -r) $(uname -v) $(uname -m)"\033[0m" + _info "Checking for vulnerabilities against running kernel \033[35m"$(uname -s) $(uname -r) $(uname -v) $(uname -m)"\033[0m" + _info "CPU is\033[35m"$(grep '^model name' /proc/cpuinfo | cut -d: -f2 | head -1)"\033[0m" # try to find the image of the current running kernel # first, look for the BOOT_IMAGE hint in the kernel cmdline |