Guest User

Intel i7 kernel 4.15.1 spectre check

a guest
Feb 3rd, 2018
143
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 1.39 KB | None | 0 0
  1. CVE-2017-5753 [bounds check bypass] aka 'Spectre Variant 1'
  2. * Mitigated according to the /sys interface: NO (kernel confirms your system is vulnerable)
  3. * Kernel has array_index_mask_nospec: NO
  4. * Checking count of LFENCE instructions following a jump in kernel: NO (only 6 jump-then-lfence instructions found, should be >= 30 (heuristic))
  5. > STATUS: VULNERABLE (Kernel source needs to be patched to mitigate the vulnerability)
  6.  
  7. CVE-2017-5715 [branch target injection] aka 'Spectre Variant 2'
  8. * Mitigated according to the /sys interface: YES (kernel confirms that the mitigation is active)
  9. * Mitigation 1
  10. * Kernel is compiled with IBRS/IBPB support: NO
  11. * Currently enabled features
  12. * IBRS enabled for Kernel space: NO
  13. * IBRS enabled for User space: NO
  14. * IBPB enabled: NO
  15. * Mitigation 2
  16. * Kernel compiled with retpoline option: YES
  17. * Kernel compiled with a retpoline-aware compiler: YES (kernel reports full retpoline compilation)
  18. * Retpoline enabled: YES
  19. > STATUS: NOT VULNERABLE (Mitigation: Full generic retpoline)
  20.  
  21. CVE-2017-5754 [rogue data cache load] aka 'Meltdown' aka 'Variant 3'
  22. * Mitigated according to the /sys interface: YES (kernel confirms that the mitigation is active)
  23. * Kernel supports Page Table Isolation (PTI): YES
  24. * PTI enabled and active: YES
  25. * Running as a Xen PV DomU: NO
  26. > STATUS: NOT VULNERABLE (Mitigation: PTI)
Advertisement
Add Comment
Please, Sign In to add comment