Michael Lange <klappn...@freenet.de> wrote: > On Fri, 26 Jan 2018 18:38:23 +0100 Sven Hartge <s...@svenhartge.de> wrote: >> Michael Lange <klappn...@freenet.de> wrote: >>> Hardware check >>> * Hardware support (CPU microcode) for mitigation techniques >>> * Indirect Branch Restricted Speculation (IBRS) >>> * SPEC_CTRL MSR is available: UNKNOWN (couldn't >>> read /dev/cpu/0/msr, is msr support enabled in your kernel?) >> You forgot to enable MSR support in your kernel, either as module or >> compiled in.
> Not me, that's the sid kernel :) No. The kernel from Sid has support for MSR as module: root@host:~# modinfo msr filename: /lib/modules/4.14.0-3-amd64/kernel/arch/x86/kernel/msr.ko license: GPL description: x86 generic MSR driver author: H. Peter Anvin <h...@zytor.com> depends: intree: Y name: msr vermagic: 4.14.0-3-amd64 SMP mod_unload modversions Did you run the script as user or as root? I get the same errors as you if I don't run the script as root. For the checks to be reliable, *including* the dmesg-check, you need to run the script as root. Grüße, Sven. -- Sigmentation fault. Core dumped.