diff options
Diffstat (limited to 'pkg/report/testdata/linux')
| -rw-r--r-- | pkg/report/testdata/linux/report/710 | 28 |
1 files changed, 28 insertions, 0 deletions
diff --git a/pkg/report/testdata/linux/report/710 b/pkg/report/testdata/linux/report/710 new file mode 100644 index 000000000..93b1fdaac --- /dev/null +++ b/pkg/report/testdata/linux/report/710 @@ -0,0 +1,28 @@ +TITLE: + + +Spectre V2 : User space: Mitigation: STIBP always-on protection +Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl +Speculative Return Stack Overflow: IBPB-extending microcode not applied! +Speculative Return Stack Overflow: WARNING: See https://kernel.org/doc/html/latest/admin-guide/hw-vuln/srso.html for mitigation options. +Speculative Return Stack Overflow: WARNING: kernel not compiled with CPU_SRSO. +Speculative Return Stack Overflow: Vulnerable: No microcode +x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' +x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' +x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' +x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 +x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'compacted' format. +Freeing SMP alternatives memory: 120K +pid_max: default: 32768 minimum: 301 +LSM: initializing lsm=lockdown,capability,landlock,yama,safesetid,tomoyo,apparmor,bpf,integrity +landlock: Up and running. +Yama: becoming mindful. +TOMOYO Linux initialized +AppArmor: AppArmor initialized +LSM support for eBPF active +Dentry cache hash table entries: 1048576 (order: 11, 8388608 bytes, vmalloc hugepage) +Inode-cache hash table entries: 524288 (order: 10, 4194304 bytes, vmalloc hugepage) +Mount-cache hash table entries: 16384 (order: 5, 131072 bytes, vmalloc) +Mountpoint-cache hash table entries: 16384 (order: 5, 131072 bytes, vmalloc) +Running RCU synchronous self tests +Running RCU synchronous self tests
\ No newline at end of file |
