Latest revision |
Your text |
Line 1,016: |
Line 1,016: |
| Check itimer virtual... Diff too high: 10105012..[FAIL] | | Check itimer virtual... Diff too high: 10105012..[FAIL] |
| Check itimer prof... Diff too high: 7658809..[FAIL]</ref> | | Check itimer prof... Diff too high: 7658809..[FAIL]</ref> |
| | <references/>
| |
| |-
| |
| | [[User:srkraken|srkraken]]
| |
| | Laptop lenovo T420s Intel(R) Core(TM) i5-4300U, 12gb de ram, HDD 1tb, Fedora 32
| |
| | {{result|pass}}<ref> Test suite called with default
| |
| ./default/cachedrop PASS
| |
| ./default/insert_leap_second PASS
| |
| ./default/libhugetlbfs SKIP
| |
| ./default/memfd PASS
| |
| ./default/modsign PASS
| |
| ./default/mq-memory-corruption PASS
| |
| ./default/paxtest SKIP
| |
| ./default/posix_timers PASS
| |
| ./default/selinux-dac-controls PASS
| |
| ./default/stack-randomness PASS
| |
| ./default/sysfs-perms PASS
| |
| ./default/timer-overhead PASS
| |
|
| |
| Test suite complete PASS
| |
|
| |
| Vulnerability status:
| |
| /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: Split huge pages
| |
| /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable
| |
| /sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT vulnerable
| |
| /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
| |
| /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
| |
| /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
| |
| /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
| |
| /sys/devices/system/cpu/vulnerabilities/srbds:Mitigation: Microcode
| |
| /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected</ref>
| |
| | <references/> | | | <references/> |
| |- | | |- |