similar to: Xen Security Advisory 82 (CVE-2013-6885) - Guest triggerable AMD CPU erratum may cause host hang

Displaying 20 results from an estimated 100 matches similar to: "Xen Security Advisory 82 (CVE-2013-6885) - Guest triggerable AMD CPU erratum may cause host hang"

2006 Oct 31
0
6288246 amd64 kernel needs to detect AMD Opteron erratum 131
Author: kucharsk Repository: /hg/zfs-crypto/gate Revision: b1f167e9bcec854103004aa601a56ab937e1223c Log message: 6288246 amd64 kernel needs to detect AMD Opteron erratum 131 Files: update: usr/src/uts/i86pc/Makefile.workarounds update: usr/src/uts/i86pc/os/cpuid.c update: usr/src/uts/i86pc/os/mp_startup.c update: usr/src/uts/intel/sys/controlregs.h
2019 Dec 04
2
Discuss about the LLVM SW mitigation to Jump Conditional Code Erratum
I will reply those comments tomorrow. -------------- next part -------------- An HTML attachment was scrubbed... URL: <http://lists.llvm.org/pipermail/llvm-dev/attachments/20191204/f1111299/attachment.html>
2011 Jun 29
0
xen 4.1.1 + 3.0.0-rc5 dom0 + blktap2 [erratum]
Hi, Ooops, mistake, please read host# tapdisk2 -n vhd:/storage/test.vhd instead of host# tapdisk2 -n vhc:/storage/test.vhd in my previous post. Kind regards, Sébastien _______________________________________________ Xen-devel mailing list Xen-devel@lists.xensource.com http://lists.xensource.com/xen-devel
2006 Oct 31
0
6295986 False AMD Erratum 123 warning message on stinger dual-core machines
Author: kchow Repository: /hg/zfs-crypto/gate Revision: 1d1ea58da530f01d6bbadddd7bf5d0db64a0c96f Log message: 6295986 False AMD Erratum 123 warning message on stinger dual-core machines Files: update: usr/src/uts/i86pc/Makefile.workarounds update: usr/src/uts/i86pc/os/mp_startup.c
2009 Apr 25
0
qemu 0.10.2 and Solaris snv111 64 Bit /"unexpected erratum #100"
Hi I''ve installed Solaris snv111 in a QEMU virtual machine using qemu 0.10.2 with kqemu 1.4 enabled. The installation worked without problems but after rebooting from the virtual disk Solaris panics: qemu usage: /opt/qemu_0.10.x/bin/qemu-system-x86_64 -net user -net nic -usb -usbdevice tablet -L /usr/local/share/qemu_0.9.x -boot c -m 1024 -net nic,model=rtl8139 -net nic -net nic
2019 May 17
9
[PATCH V2 0/4] Prevent vhost kthread from hogging CPU
Hi: This series try to prevent a guest triggerable CPU hogging through vhost kthread. This is done by introducing and checking the weight after each requrest. The patch has been tested with reproducer of vsock and virtio-net. Only compile test is done for vhost-scsi. Please review. This addresses CVE-2019-3900. Changs from V1: - fix user-ater-free in vosck patch Jason Wang (4): vhost:
2019 May 17
9
[PATCH V2 0/4] Prevent vhost kthread from hogging CPU
Hi: This series try to prevent a guest triggerable CPU hogging through vhost kthread. This is done by introducing and checking the weight after each requrest. The patch has been tested with reproducer of vsock and virtio-net. Only compile test is done for vhost-scsi. Please review. This addresses CVE-2019-3900. Changs from V1: - fix user-ater-free in vosck patch Jason Wang (4): vhost:
2005 Jul 28
2
Dovecot hangs randomly
I have been run into a weird problem with dovecot. We have 4 identical servers running dovecot, serving both IMAP and POP3 clients. Every few hours, clients start timing out after the PASS command. Here is what the process tree looks like at that time: 6718 ? Ss 0:00 /usr/sbin/dovecot 6719 ? S 0:00 \_ dovecot-auth 6881 ? S 0:00 | \_ dovecot-auth 6883
2014 Feb 12
0
CESA-2014:X005 Moderate Xen4CentOS kernel Security Update
CentOS Errata and Security Advisory 2014:X005 (Xen4CentOS) The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) ----------------------------- X86_64 ----------------------------- 4d780927c1273021f707954531d4f8363f96001a09101ac3b828c02dcf640fc5 e1000e-2.5.4-3.10.29.2.el6.centos.alt.x86_64.rpm
2004 Apr 28
1
Wondershaper stops limiting outbound traffic
I have wondershaper to limit my upload at 400kilobits (my line is 600kbps). I do a lot of torrent seeding and I dont want my pings killed when I''m uploading so I set low prority source ports as follows (by the way, I have bittornet to only use ports 6881-6910): NOPRIOPORTSRC="6881 6882 6883 6884 6885 6886 6887 6888 6889 6890 6891 6892 6893 6894 6895 6896 6897 6898 6899 6900 6901
2011 Sep 09
1
[PATCH] drm/nouveau: initialize chan->fence.lock before use
Fence lock needs to be initialized before any call to nouveau_channel_put because it calls nouveau_channel_idle->nouveau_fence_update which uses fence lock. BUG: spinlock bad magic on CPU#0, test/24134 lock: ffff88019f90dba8, .magic: 00000000, .owner: <none>/-1, .owner_cpu: 0 Pid: 24134, comm: test Not tainted 3.0.0-nv+ #800 Call Trace: spin_bug+0x9c/0xa3 do_raw_spin_lock+0x29/0x13c
2003 Jun 11
1
Palm m50x & the USB stack
[It seems the last time this came up was in march, under the heading of "Sony Cybershot should be in hardware notes". This message is intended mainly to document what I've managed to track down.] The m500s still will not sync with pilot-link 0.11.7 in -STABLE. An easily triggerable panic is another issue [1]. The pilot-link code first opens /dev/ugenX and then switches to
2019 May 16
6
[PATCH net 0/4] Prevent vhost kthread from hogging CPU
Hi: This series try to prvernt a guest triggerable CPU hogging through vhost kthread. This is done by introducing and checking the weight after each requrest. The patch has been tested with reproducer of vsock and virtio-net. Only compile test is done for vhost-scsi. Please review. This addresses CVE-2019-3900. Jason Wang (4): vhost: introduce vhost_exceeds_weight() vhost_net: fix possible
2003 Jan 24
1
[patch] Still a problem with cleanup.c
Hello, There is still a problem with the _exit_cleanup() function in cleanup.c despite the patch that was put in last week that prevented recursion. It turns out that sometimes multiple calls in close sequence are done and this causes rsync to spin out of control instead of exiting. This bug was found by Marc Espie and the patch I'm including is his as well. It hasn't been commited
2016 Oct 21
5
Disk near failure
Hi list, on my workstation I've a md raid (mirror) for / on md1. This raid has 2 ssd as members (each corsair GT force 120GB MLC). This disks are ~ 5 years old. Today I've checked my ssds smart status and I get: ID# ATTRIBUTE_NAME FLAG VALUE WORST THRESH TYPE UPDATED WHEN_FAILED RAW_VALUE 1 Raw_Read_Error_Rate 0x000f 100 100 050 Pre-fail Always -
2014 Feb 12
0
CentOS-announce Digest, Vol 108, Issue 7
Send CentOS-announce mailing list submissions to centos-announce at centos.org To subscribe or unsubscribe via the World Wide Web, visit http://lists.centos.org/mailman/listinfo/centos-announce or, via email, send a message with subject or body 'help' to centos-announce-request at centos.org You can reach the person managing the list at centos-announce-owner at centos.org When
2013 Jul 12
17
RFC: removing hardcoded "modprobe blktap" in xencommons
Hi Jan Back before 4.3 release you complaint about the hardcoded modprobe for blktap / blktap2 in xencommons script. I started to look into it this week and tried to do this modprobe automatically in libxl (that''s the idea we discussed before 4.3 IIRC). Unfortunately I didn''t manage to find any canonical documents on how a user space process can trigger a modprobe.
2007 May 01
2
Sound problems with CentOS
Has anyone experienced this before? This happened to me even under CentOS 4.x. But basically what happens is that when I play MP3s, whatever the right speaker crackles at higher volume. And it's always that speaker and only that speaker. If I turn the balance to the other speaker I have no problems. So it feels like it might be a mixer issue. I use Alsa, of course, as that's what the
2008 Feb 07
0
Insensitive screen edges
Hi, You may have seen a thread about this issue on the forums, but I wanted post a mail about it here to be sure that it gets noticed by you compiz developers. The problem is that compiz seems to make the screen edges insensitive to clicks, meaning that e.g. a panel item isn't clickable when the pointer is directly at the screen edge. This breaks Fitt's Law and should therefore be fixed
2013 Dec 10
0
CESA-2013:X017 Xen4CentOS xen Security Update
CentOS Errata and Security Advisory 2013:X017 (Xen4CentOS) The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) ----------------------------- X86_64 ----------------------------- 588443b1936d3da45e5872a1578722fdac5ddf0eaeb02b8e47854a3c1d7a45f5 xen-4.2.3-26.el6.centos.alt.x86_64.rpm