Package Details: spectre-meltdown-checker 0.37-1

Git Clone URL: https://aur.archlinux.org/spectre-meltdown-checker.git (read-only)
Package Base: spectre-meltdown-checker
Description: Spectre & Meltdown vulnerability/mitigation checker (CVE-2017-5753, CVE-2017-5715, CVE-2017-5754)
Upstream URL: https://github.com/speed47/spectre-meltdown-checker
Licenses: GPL3
Submitter: simon04
Maintainer: simon04
Last Packager: simon04
Votes: 36
Popularity: 3.206295
First Submitted: 2018-01-15 14:36
Last Updated: 2018-04-19 06:16

Latest Comments

simon04 commented on 2018-03-29 07:29

Updated to 0.36, dropped .sh in executable name

sekret commented on 2018-03-26 20:02

You could have removed the .sh ending on the executable, looks nicer on the commandline ;-)

Kakashi-sensei commented on 2018-02-20 23:10

Actually, running as super user was the fix. And I got all No's, which I expected.

qrwteyrutiyoup commented on 2018-02-20 20:35

@Kakashi-sensei: tried "modprobe msr" yet?

Kakashi-sensei commented on 2018-02-10 06:45

What can I do to resolve the following (I have an AMD FX 8350):

* SPEC_CTRL MSR is available:  UNKNOWN  (couldn't read /dev/cpu/0/msr, is msr support enabled in your kernel?)

* CPU indicates IBRS capability:  UNKNOWN  (couldn't read /dev/cpu/0/cpuid, is cpuid support enabled in your kernel?)
  • Indirect Branch Prediction Barrier (IBPB)

    • PRED_CMD MSR is available: UNKNOWN (couldn't read /dev/cpu/0/msr, is msr support enabled in your kernel?)

    • CPU indicates IBPB capability: UNKNOWN (couldn't read /dev/cpu/0/cpuid, is cpuid support enabled in your kernel?)

  • Single Thread Indirect Branch Predictors (STIBP)

    • SPEC_CTRL MSR is available: UNKNOWN (couldn't read /dev/cpu/0/msr, is msr support enabled in your kernel?)

    • CPU indicates STIBP capability: UNKNOWN (couldn't read /dev/cpu/0/cpuid, is cpuid support enabled in your kernel?)

  • Enhanced IBRS (IBRS_ALL)

    • CPU indicates ARCH_CAPABILITIES MSR availability: UNKNOWN (couldn't read /dev/cpu/0/cpuid, is cpuid support enabled in your kernel?)