Closed seefood closed 6 years ago
oops. thanks for pointing it out @seefood
:bowing_man:
Only problem now: I already upgraded the kernel on that machine, now I'm not sure if that CPU was vulnerable (it's not in the lists I've searched, it's an 11 YO model of Xeon) or if I should turn off the protection. hmm!
If you want to confirm it without compromising security, reboot with pti disabled and run the test offline. Good luck!
yeah, the point is I didn't want to reboot it too much... it's an old server but people still rely on it... oddly enough, it's a Debian kernel that's supposed to include the KPTI patch but /boot/config-4.9.0-5-686-pae has no CONFIG_PAGE_TABLE_ISOLATION
weirder and weirder. for now I'll assume that old machine has no kernel patch but no CPU vulnerability either. I'll try to find some answers on IRC or something. Also, I'm no able to build the sources they offer in the original whitepaper on any machine and my C is rusty. Hmm :)
the IRC people said the 32 bit kernel isn't patched because meltdown only affects CPUs working in 64bit mode. I'll go read more on that. sounds weird to me.
gcc version 6.3.0 20170516 (Debian 6.3.0-18), Debian 9.3