X-Git-Url: https://gerrit.fd.io/r/gitweb?a=blobdiff_plain;f=docs%2Freport%2Fintroduction%2Ftest_environment_sut_meltspec_hsw.rst;h=71787f06914965d4922df79232c0133b32d3d882;hb=36b2dffd55dee362d96aae98d563a0c2b475573e;hp=652b5b2e3c561f0dce3ee54f8ab85372043ca1da;hpb=3bb7803c9e74d4ceeac77480c11e01d5d8d7d589;p=csit.git diff --git a/docs/report/introduction/test_environment_sut_meltspec_hsw.rst b/docs/report/introduction/test_environment_sut_meltspec_hsw.rst index 652b5b2e3c..71787f0691 100644 --- a/docs/report/introduction/test_environment_sut_meltspec_hsw.rst +++ b/docs/report/introduction/test_environment_sut_meltspec_hsw.rst @@ -1,5 +1,5 @@ -SPECTRE - MELTDOWN Checks - Haswell ------------------------------------ +Spectre and Meltdown Checks +~~~~~~~~~~~~~~~~~~~~~~~~~~~ Following section displays the output of a running shell script to tell if system is vulnerable against the several "speculative execution" CVEs that were @@ -16,6 +16,7 @@ made public in 2018. Script is available on `Spectre & Meltdown Checker Github - CVE-2018-3646 [L1 terminal fault] aka 'Foreshadow-NG (VMM)' :: + $ sudo ./spectre-meltdown-checker.sh --no-color Spectre and Meltdown mitigation detection tool v0.40