CpuVulns - files /sys/devices/system/cpu/vulnerabilities/*
¶
Parser to parse the output of files /sys/devices/system/cpu/vulnerabilities/*
-
class
insights.parsers.cpu_vulns.
CpuVulns
(context)[source]¶ Bases:
insights.core.Parser
Base class to parse
/sys/devices/system/cpu/vulnerabilities/*
files, the file content will be stored in a string.- Sample output for files:
/sys/devices/system/cpu/vulnerabilities/spectre_v1
::- Mitigation: Load fences
/sys/devices/system/cpu/vulnerabilities/spectre_v2
::- Vulnerable: Retpoline without IBPB
/sys/devices/system/cpu/vulnerabilities/meltdown
::- Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass
::- Mitigation: Speculative Store Bypass disabled
Examples
>>> type(sp_v1) <class 'insights.parsers.cpu_vulns.CpuVulns'> >>> type(sp_v1) == type(sp_v2) == type(md) == type(ssb) True >>> sp_v1.value 'Mitigation: Load fences' >>> sp_v2.value 'Vulnerable: Retpoline without IBPB' >>> md.value 'Mitigation: PTI' >>> ssb.value 'Mitigation: Speculative Store Bypass disabled'
-
value
¶ The result parsed
Type: str
Raises: SkipComponent
-- When file content is empty