-
Notifications
You must be signed in to change notification settings - Fork 470
improvements for xen systems #270
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
|
Thanks for your PR, and sorry for the delay! |
|
With Xen 4.12 on Ubuntu 18.04 the hypervisor is not recognized. |
|
Maybe pgrep for "xenstored" can help? |
|
I tried to install Xen, after rebooting I had a qemu process so that's strange it's not catched on your system. |
|
Yes! Well done. Thank you very much:
|
|
You added in your grep also xenbus and xenwatch in lines 3902 and 3908 - but they are running on DomU either. So every Xen-Guest ist recognised as Xen-Dom0. Can you please remove these two search-items? Thank you. |
|
@werk21 removed in latest commit. |
there is no capability to detect mitigation on xen based systems, since they are not exposed properly via /sys/devices/system/cpu/vulnerabilities/l1tf (unknown state -> "Mitigation: PTE Inversion") and /proc/cpuinfo (missing flush_l1d flag)
see https://www.suse.com/support/kb/doc/?id=7023078
improve pti checks for dom0
see https://www.suse.com/support/kb/doc/?id=7022546