Search Criteria
Package Details: spectre-meltdown-checker 0.46-1
Package Actions
Git Clone URL: | https://aur.archlinux.org/spectre-meltdown-checker.git (read-only, click to copy) |
---|---|
Package Base: | spectre-meltdown-checker |
Description: | Spectre, Meltdown, Foreshadow, Fallout, RIDL, ZombieLoad vulnerability/mitigation checker |
Upstream URL: | https://github.com/speed47/spectre-meltdown-checker |
Licenses: | GPL3 |
Submitter: | simon04 |
Maintainer: | iyanmv |
Last Packager: | iyanmv |
Votes: | 87 |
Popularity: | 1.66 |
First Submitted: | 2018-01-15 14:36 (UTC) |
Last Updated: | 2023-08-09 08:38 (UTC) |
Latest Comments
« First ‹ Previous 1 2
simon04 commented on 2018-03-29 07:29 (UTC)
Updated to 0.36, dropped .sh in executable name
sekret commented on 2018-03-26 20:02 (UTC)
You could have removed the .sh ending on the executable, looks nicer on the commandline ;-)
Kakashi-sensei commented on 2018-02-20 23:10 (UTC) (edited on 2018-02-20 23:10 (UTC) by Kakashi-sensei)
Actually, running as super user was the fix. And I got all No's, which I expected.
qrwteyrutiyoup commented on 2018-02-20 20:35 (UTC)
@Kakashi-sensei: tried "modprobe msr" yet?
Kakashi-sensei commented on 2018-02-10 06:45 (UTC) (edited on 2018-02-10 06:46 (UTC) by Kakashi-sensei)
What can I do to resolve the following (I have an AMD FX 8350):
Indirect Branch Prediction Barrier (IBPB)
PRED_CMD MSR is available: UNKNOWN (couldn't read /dev/cpu/0/msr, is msr support enabled in your kernel?)
CPU indicates IBPB capability: UNKNOWN (couldn't read /dev/cpu/0/cpuid, is cpuid support enabled in your kernel?)
Single Thread Indirect Branch Predictors (STIBP)
SPEC_CTRL MSR is available: UNKNOWN (couldn't read /dev/cpu/0/msr, is msr support enabled in your kernel?)
CPU indicates STIBP capability: UNKNOWN (couldn't read /dev/cpu/0/cpuid, is cpuid support enabled in your kernel?)
Enhanced IBRS (IBRS_ALL)
« First ‹ Previous 1 2