X-Git-Url: https://gerrit.fd.io/r/gitweb?p=csit.git;a=blobdiff_plain;f=docs%2Freport%2Fintroduction%2Ftest_environment_sut_meltspec_skx.rst;h=443a7fd48476f02c9f4111675cf86fa605e0b4f8;hp=7e852a6bc55edd441c16aa705a108ba40dce1ed0;hb=b659ab3d2638652de0357d29be1ec7704df97555;hpb=3bb7803c9e74d4ceeac77480c11e01d5d8d7d589 diff --git a/docs/report/introduction/test_environment_sut_meltspec_skx.rst b/docs/report/introduction/test_environment_sut_meltspec_skx.rst index 7e852a6bc5..443a7fd484 100644 --- a/docs/report/introduction/test_environment_sut_meltspec_skx.rst +++ b/docs/report/introduction/test_environment_sut_meltspec_skx.rst @@ -1,5 +1,5 @@ -SPECTRE - MELTDOWN Checks - Skylake ------------------------------------ +Spectre and Meltdown Checks +~~~~~~~~~~~~~~~~~~~~~~~~~~~ Following section displays the output of a running shell script to tell if system is vulnerable against the several "speculative execution" CVEs that were @@ -16,6 +16,7 @@ made public in 2018. Script is available on `Spectre & Meltdown Checker Github - CVE-2018-3646 [L1 terminal fault] aka 'Foreshadow-NG (VMM)' :: + $ sudo ./spectre-meltdown-checker.sh --no-color Spectre and Meltdown mitigation detection tool v0.40 @@ -122,4 +123,3 @@ made public in 2018. Script is available on `Spectre & Meltdown Checker Github Need more detailed information about mitigation options? Use --explain A false sense of security is worse than no security at all, see --disclaimer -