Peter Steinmetz wrote:
> This kernel is running as a Dom0-kernel on Xen. Might that be the reason?
Yes. PTI has been disabled on Xen.
S°
--
Sigmentation fault. Core dumped.
> 15. März 2018, 18:05 Uhr, "Henrique de Moraes Holschuh":
>
> On Thu, 15 Mar 2018, Peter Steinmetz wrote:
> > should be fixed wrt meltdown. But I see this
> > # grep -R . /sys/devices/system/cpu/vulnerabilities/
> > /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic
> > r
On Thu, 15 Mar 2018, Peter Steinmetz wrote:
> should be fixed wrt meltdown. But I see this
> # grep -R . /sys/devices/system/cpu/vulnerabilities/
> /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic
> retpoline
> /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigatio
Hi,
according to this
https://security-tracker.debian.org/tracker/CVE-2017-5754
this kernel
# uname -rv
4.9.0-6-amd64 #1 SMP Debian 4.9.82-1+deb9u3 (2018-03-02)
should be fixed wrt meltdown. But I see this
# grep -R . /sys/devices/system/cpu/vulnerabilities/
/sys/devices/system/cpu/vulnerabil
4 matches
Mail list logo