Re: Stretch kernel vulnerable to meltdown

2018-03-16 Thread Sven Hartge
Peter Steinmetz wrote: > This kernel is running as a Dom0-kernel on Xen. Might that be the reason? Yes. PTI has been disabled on Xen. S° -- Sigmentation fault. Core dumped.

Aw: Re: Stretch kernel vulnerable to meltdown

2018-03-15 Thread Peter Steinmetz
> 15. März 2018, 18:05 Uhr, "Henrique de Moraes Holschuh": > > On Thu, 15 Mar 2018, Peter Steinmetz wrote: > > should be fixed wrt meltdown. But I see this > > # grep -R . /sys/devices/system/cpu/vulnerabilities/ > > /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic > > r

Re: Stretch kernel vulnerable to meltdown

2018-03-15 Thread Henrique de Moraes Holschuh
On Thu, 15 Mar 2018, Peter Steinmetz wrote: > should be fixed wrt meltdown. But I see this > # grep -R . /sys/devices/system/cpu/vulnerabilities/ > /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic > retpoline > /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigatio

Stretch kernel vulnerable to meltdown

2018-03-15 Thread Peter Steinmetz
Hi,   according to this https://security-tracker.debian.org/tracker/CVE-2017-5754   this kernel # uname -rv 4.9.0-6-amd64 #1 SMP Debian 4.9.82-1+deb9u3 (2018-03-02)   should be fixed wrt meltdown. But I see this # grep -R . /sys/devices/system/cpu/vulnerabilities/ /sys/devices/system/cpu/vulnerabil