summaryrefslogtreecommitdiff
path: root/modules
diff options
context:
space:
mode:
authorLeandro Pereira <leandro@hardinfo.org>2019-07-06 13:31:08 -0700
committerLeandro Pereira <leandro@hardinfo.org>2019-07-06 13:31:08 -0700
commitbae7c37d19d1826d660d9cab626c4fc1a939766b (patch)
tree9b1da4046c103b6325012b010f76929ad6dd10a5 /modules
parentffd5a4b3f3a474d7a35772c6f05b0491187a10b9 (diff)
Copy CPU vulnerability name to InfoField
Fixes #392
Diffstat (limited to 'modules')
-rw-r--r--modules/computer.c26
1 files changed, 16 insertions, 10 deletions
diff --git a/modules/computer.c b/modules/computer.c
index 5db291b2..58328290 100644
--- a/modules/computer.c
+++ b/modules/computer.c
@@ -588,37 +588,43 @@ gchar *callback_security(void)
info_set_view_type(info, SHELL_VIEW_DETAIL);
info_add_group(info, _("HardInfo"),
- info_field(_("HardInfo running as"), (getuid() == 0) ? _("Superuser") : _("User")),
- info_field_last());
+ info_field(_("HardInfo running as"),
+ (getuid() == 0) ? _("Superuser") : _("User")),
+ info_field_last());
- info_add_group(info, _("Health"),
+ info_add_group(
+ info, _("Health"),
info_field_update(_("Available entropy in /dev/random"), 1000),
info_field_last());
- info_add_group(info, _("Hardening Features"),
+ info_add_group(
+ info, _("Hardening Features"),
info_field(_("ASLR"), idle_free(computer_get_aslr())),
info_field(_("dmesg"), idle_free(computer_get_dmesg_status())),
info_field_last());
- info_add_group(info, _("Linux Security Modules"),
+ info_add_group(
+ info, _("Linux Security Modules"),
info_field(_("Modules available"), idle_free(computer_get_lsm())),
info_field(_("SELinux status"), computer_get_selinux()),
info_field_last());
GDir *dir = g_dir_open("/sys/devices/system/cpu/vulnerabilities", 0, NULL);
if (dir) {
- struct InfoGroup *vulns = info_add_group(info, _("CPU Vulnerabilities"),
- info_field_last());
+ struct InfoGroup *vulns =
+ info_add_group(info, _("CPU Vulnerabilities"), info_field_last());
vulns->sort = INFO_GROUP_SORT_NAME_ASCENDING;
const gchar *vuln;
while ((vuln = g_dir_read_name(dir))) {
- gchar *contents = h_sysfs_read_string("/sys/devices/system/cpu/vulnerabilities",
- vuln);
+ gchar *contents = h_sysfs_read_string(
+ "/sys/devices/system/cpu/vulnerabilities", vuln);
if (!contents)
continue;
- struct InfoField field = info_field(vuln, idle_free(contents));
+ struct InfoField field =
+ info_field(g_strdup(vuln), idle_free(contents),
+ .free_name_on_flatten = TRUE);
if (g_strstr_len(contents, -1, "Vulnerable") ||
g_strstr_len(contents, -1, "vulnerable"))
field = info_field_with_icon(field, "dialog-warning.png");