Linux Lite Forums
Customization => Desktop Customization => Topic started by: trinidad on January 21, 2018, 12:37:14 PM
-
Since kernel changes, mitigations, and so forth are probably going to be nagging at us for quite a while a simple functional shortcut to the spectre-meltdown-checker in nice to have. Aliasing the commnd and saving to .bashrc is probably the most efficient way to make the application more convenient.
Open a terminal and enter: sudo nano ~/.bashrc
Scroll down to where you see alias listed.
Below the last alias line listed add the following:
alias smck='cd spectre-meltdown-checker/;chmod +x spectre-meltdown-checker.sh;sudo ./spectre-meltdown-checker.sh'
Hit Control X, then Y, then Enter to save.
Exit the terminal.
Re-open the terminal and at the prompt type: smck
Enter your sudo password and spectre-meltdown-checker will run.
Since the alias is added to .bashrc the command smck (for which I found no other unique instances in bash) will run the spectre-meltdown-checker for you.
Simple and clean and sensible since it is a terminal app to begin with.
TC
You may also alias the Ubuntu commands and Rok's memory leak checker in the same way.
i use alias ubusmck and roksmck.
-
I get
$ smck
bash: cd: spectre-meltdown-checker/: No such file or directory
chmod: cannot access 'spectre-meltdown-checker.sh': No such file or directory
this is my bash
enable bash completion in interactive shells
if ! shopt -oq posix; then
if [ -f /usr/share/bash-completion/bash_completion ]; then
. /usr/share/bash-completion/bash_completion
elif [ -f /etc/bash_completion ]; then
. /etc/bash_completion
fi
fi
alias usage='du -sk * | sort -n | perl -ne '\''($s,$f)=split(m{\t});for (qw(K M G)) {if($s<1024) {printf("%.1f",$s);print "$_\t$f"; last};$s=$s/1024}'\'
alias ls="ls --color"
alias smck='cd spectre-meltdown-checker/;chmod +x spectre-meltdown-checker.sh;sudo ./spectre-meltdown-checker.sh'
-
I get
$ smck
bash: cd: spectre-meltdown-checker/: No such file or directory
chmod: cannot access 'spectre-meltdown-checker.sh': No such file or directory
You have to download the script first. here: https://linuxhint.com/check-patch-spectre-meltdown-ubuntu/
-
git clone https://github.com/speed47/spectre-meltdown-checker.git
TC
-
git clone https://github.com/speed47/spectre-meltdown-checker.git
Neither this link nor the other from the one I shared works! Actually, just realized github.com seems to be down :o
-
You paste the git clone link into your terminal not firefox. Works. Just checked it.
TC
-
You paste the git clone link into your terminal not firefox. Works. Just checked it.
Oh..Yes, you're right ::) I just downloaded the script and am about to run it and see what it says. :)
-
I had downloaded it. I'm not quite that daft :D , but it is in my downloads folder in a folder of its won called
"Spectre-Meltdown-Checker-Automated-master"
should I cd to there before running the instructions above?
-
I don't use the LL version because I want the same updated version on all my systems so script changes I might personally make are universal across Ubu platforms. I assume the commands can be aliased the same way but the shell belongs in your home directory. Git clone is the easiest way to install this. I know Jerry automated this for LL users so if it already works for you leave it alone . However, I assume you would just have to add a /downloads/ after ~ in the cd part of the long command to be aliased as long as you have extracted to downloads to begin with.
TC
https://www.ostechnix.com/check-meltdown-spectre-vulnerabilities-patch-linux/
-
I had downloaded it. I'm not quite that daft :D , but it is in my downloads folder in a folder of its won called
"Spectre-Meltdown-Checker-Automated-master"
should I cd to there before running the instructions above?
You could just right-click inside that folder and select "open terminal here" then you can run sudo ./spectre-meltdown-checker.sh
that's how I did it.
By the way @trinidad I read on this "speculative execution" but I still don't fully understand what this is about.
https://www.extremetech.com/computing/261792-what-is-speculative-execution
https://www.extremetech.com/computing/261439-spectre-meltdown-new-critical-security-flaws-explored-explained
-
@Moltke
Take solace in the fact that you are running an Ubuntu based distro with LL, and that the LL developer is very keen to do all he can to mitigate the mess for LL users. Also realize that this is an Enterprise (not home user) high risk vulnerabiity more than anything else, with unfortunate geo-political implications that will make it very expensive for large commerce oriented providers to avoid security breaches, and one likely to use multiple latent (currently inactive or not perceived as threatenting) software presences to acheive an advanced persistance threat and exploit. Just the fact that it is publicly known means that it is already probably tied to some latent APT. Computing is essentially a narrative, and as such this computing security issue will become the most recursively exploited in history, because the only real reslotution is transparency and trust, and to compound it all I fully expect the US government, some EU members, and certainly China to disallow certain of the APT mitigations as we are entering a difficult and very grey area of some nations' security efforts. Truthfully some political sabotage has already happened.
Your PC is not particularly at risk, just all the servers you connect to on the web who do track your information as much as they can in most cases. Pray for the web providers if you are religious. I do.
I will publish my views by the end of February. I will post the site when I do.
TC
-
I don't use the LL version because I want the same updated version on all my systems so script changes I might personally make are universal across Ubu platforms. I assume the commands can be aliased the same way but the shell belongs in your home directory. Git clone is the easiest way to install this. I know Jerry automated this for LL users so if it already works for you leave it alone . However, I assume you would just have to add a /downloads/ after ~ in the cd part of the long command to be aliased as long as you have extracted to downloads to begin with.
TC
https://www.ostechnix.com/check-meltdown-spectre-vulnerabilities-patch-linux/
I created a folder in my home directory called 'spectre-meltdown-checker' and copied the 'spectre-meltdown-checker.sh' file into it. Now it works perfectly.
Thanks for your work on this and your patience with me