similar to: C6 KPTI cpuinfo flag?

Displaying 20 results from an estimated 1000 matches similar to: "C6 KPTI cpuinfo flag?"

2018 Jan 10
0
Nvidia maximum pixel clock issue in, , kmod-nvidia-384.98
To: CentOS mailing list <centos at centos.org> Thema: Re: [CentOS] Nvidia maximum pixel clock issue in kmod-nvidia-384.98 Dear All, Start BIOS Configuration and go to Graphic Configuration change On Board VGA to PCI Express x16 Automatic is VGA on Board Bis bald Alexander Am 09.01.2018 um 13:00 schrieb centos-request at centos.org: > Send CentOS mailing list submissions to >
2019 Mar 08
1
[RFC PATCH V2 5/5] vhost: access vq metadata through kernel virtual address
On Thu, Mar 07, 2019 at 10:43:12PM -0500, Michael S. Tsirkin wrote: > On Thu, Mar 07, 2019 at 10:40:53PM -0500, Jerome Glisse wrote: > > On Thu, Mar 07, 2019 at 10:16:00PM -0500, Michael S. Tsirkin wrote: > > > On Thu, Mar 07, 2019 at 09:55:39PM -0500, Jerome Glisse wrote: > > > > On Thu, Mar 07, 2019 at 09:21:03PM -0500, Michael S. Tsirkin wrote: > > > >
2019 Mar 08
1
[RFC PATCH V2 5/5] vhost: access vq metadata through kernel virtual address
On Thu, Mar 07, 2019 at 10:43:12PM -0500, Michael S. Tsirkin wrote: > On Thu, Mar 07, 2019 at 10:40:53PM -0500, Jerome Glisse wrote: > > On Thu, Mar 07, 2019 at 10:16:00PM -0500, Michael S. Tsirkin wrote: > > > On Thu, Mar 07, 2019 at 09:55:39PM -0500, Jerome Glisse wrote: > > > > On Thu, Mar 07, 2019 at 09:21:03PM -0500, Michael S. Tsirkin wrote: > > > >
2018 Jan 04
2
possible issue with nvidia and new patches?
Twitter user stintel, in this thread: https://twitter.com/stintel/status/948499157282623488 mentions a possible problem with the new patches and the nvidia driver: "As if the @Intel bug isn't bad enough, #KPTI renders @nvidia driver incompatible due to GPL-only symbol 'cpu_tlbstate'. #epicfail" Also: https://twitter.com/tomasz_gwozdz/status/948590364679655429
2018 Jan 07
2
CentOS 7.4 fails to boot as Xen PV guest: resurfaces (now also) with centosplus kernel 693.11.6.el7
Dear all, Maybe I'm the only one - so before filing it as a bug: it appears that the latest set of kernel patches in 3.10.0-693.11.6.el7 makes issue 0013763 "CentOS 7.4 kernel (3.10.0-693*) fails to boot as Xen PV guest" re-surface *also* with the CentOS PLUS kernel. But maybe in a different way ... Thanks to the (great!) quick work on making the plus kernel available (in #14330,
2015 Jan 19
3
Chromium browser for C6
On Mon, Jan 12, 2015 at 6:22 PM, Robert Arkiletian <robark at gmail.com> wrote: > On Mon, Jan 5, 2015 at 1:13 PM, Robert Arkiletian <robark at gmail.com> > wrote: > > > Johnny, > > > > Any ETA on version 39.0.2171.95 > > > > cheers > > > > > > bump > _______________________________________________ > CentOS mailing list
2015 Jan 19
2
Chromium browser for C6
On Mon, Jan 19, 2015 at 12:24 PM, Johnny Hughes <johnny at centos.org> wrote: > On 01/19/2015 12:23 PM, Phelps, Matthew wrote: > > On Mon, Jan 12, 2015 at 6:22 PM, Robert Arkiletian <robark at gmail.com> > wrote: > > > >> On Mon, Jan 5, 2015 at 1:13 PM, Robert Arkiletian <robark at gmail.com> > >> wrote: > >> > >>> Johnny,
2018 Jan 06
3
PEM file opened without DIRECT I/O which makes private key readable by attacker exploiting MELTDOWN
On Sat, Jan 6, 2018 at 5:38 PM, Philipp Marek <philipp at marek.priv.at> wrote: > I think we are possibly interested in switching to DIRECT IO (given that it >> bypasses any caching system including page cache) when reading *.PEM file >> > Sorry, but this makes no sense. > The data could just as well be read from the SSH process > memory space. > I think
2015 Jan 20
3
Chromium browser for C6
On Mon, Jan 19, 2015 at 05:55:44PM -0600, Johnny Hughes wrote: > On 01/19/2015 04:10 PM, Robert Arkiletian wrote: > > On Mon, Jan 19, 2015 at 12:24 PM, Johnny Hughes <johnny at centos.org> wrote: > > > >> On 01/19/2015 12:23 PM, Phelps, Matthew wrote: > >>> On Mon, Jan 12, 2015 at 6:22 PM, Robert Arkiletian <robark at gmail.com> > >> wrote:
2018 Jan 08
4
Response to Meltdown and Spectre
By now, we're sure most everyone have heard of the Meltdown and Spectre attacks. If not, head over to https://meltdownattack.com/ and get an overview. Additional technical details are available from Google Project Zero. https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html The FreeBSD Security Team was notified of the issue in late December and received a
2018 Jan 08
4
Response to Meltdown and Spectre
By now, we're sure most everyone have heard of the Meltdown and Spectre attacks. If not, head over to https://meltdownattack.com/ and get an overview. Additional technical details are available from Google Project Zero. https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html The FreeBSD Security Team was notified of the issue in late December and received a
2015 Sep 08
3
C6 firefox esr h.264 support on youtube
> Date: Tuesday, September 08, 2015 15:24:50 -0700 > From: Robert Arkiletian <robark at gmail.com> > >> On Tue, Sep 8, 2015 at 3:11 PM, Richard wrote: >> >> >> > Date: Tuesday, September 08, 2015 14:57:22 -0700 >> > From: Robert Arkiletian <robark at gmail.com> >> > >> > I was able to get h.264 support on
2015 Jan 21
3
Chromium browser for C6
On Mon, 19 Jan 2015, Johnny Hughes wrote: > On 01/19/2015 06:49 PM, Fred Smith wrote: >> On Mon, Jan 19, 2015 at 05:55:44PM -0600, Johnny Hughes wrote: >>> On 01/19/2015 04:10 PM, Robert Arkiletian wrote: >>>> On Mon, Jan 19, 2015 at 12:24 PM, Johnny Hughes <johnny at centos.org> wrote: >>>> >>>>> On 01/19/2015 12:23 PM, Phelps,
2015 Jan 05
2
Chromium browser for C6
Johnny, Any ETA on version 39.0.2171.95 cheers On Sat, Nov 15, 2014 at 8:55 AM, Johnny Hughes <johnny at centos.org> wrote: > On 11/14/2014 10:48 AM, Johnny Hughes wrote: > > On 11/12/2014 03:09 PM, Phelps, Matthew wrote: > >> I concur. Enter key, ^M, etc. has no effect in the browser. Same for > number > >> keys. > > > > This is a known issue, I
2019 Mar 08
2
[RFC PATCH V2 5/5] vhost: access vq metadata through kernel virtual address
On Thu, Mar 07, 2019 at 10:16:00PM -0500, Michael S. Tsirkin wrote: > On Thu, Mar 07, 2019 at 09:55:39PM -0500, Jerome Glisse wrote: > > On Thu, Mar 07, 2019 at 09:21:03PM -0500, Michael S. Tsirkin wrote: > > > On Thu, Mar 07, 2019 at 02:17:20PM -0500, Jerome Glisse wrote: > > > > > It's because of all these issues that I preferred just accessing > > >
2019 Mar 08
2
[RFC PATCH V2 5/5] vhost: access vq metadata through kernel virtual address
On Thu, Mar 07, 2019 at 10:16:00PM -0500, Michael S. Tsirkin wrote: > On Thu, Mar 07, 2019 at 09:55:39PM -0500, Jerome Glisse wrote: > > On Thu, Mar 07, 2019 at 09:21:03PM -0500, Michael S. Tsirkin wrote: > > > On Thu, Mar 07, 2019 at 02:17:20PM -0500, Jerome Glisse wrote: > > > > > It's because of all these issues that I preferred just accessing > > >
2015 Jan 20
1
Chromium browser for C6
On Mon, Jan 19, 2015 at 08:01:02PM -0600, Johnny Hughes wrote: > On 01/19/2015 06:49 PM, Fred Smith wrote: > > On Mon, Jan 19, 2015 at 05:55:44PM -0600, Johnny Hughes wrote: > >> On 01/19/2015 04:10 PM, Robert Arkiletian wrote: > >>> On Mon, Jan 19, 2015 at 12:24 PM, Johnny Hughes <johnny at centos.org> wrote: > >>> > >>>> On
2018 Feb 08
5
Re: Nested KVM: L0 guest produces kernel BUG on wakeup from managed save (while a nested VM is running)
>> In short: there is no (live) migration support for nested VMX yet. So as >> soon as your guest is using VMX itself ("nVMX"), this is not expected to >> work. > > Hi David, thanks for getting back to us on this. Hi Florian, (sombeody please correct me if I'm wrong) > > I see your point, except the issue Kashyap and I are describing does > not
2015 Feb 22
2
Chromium browser for C6
Am 22.02.2015 um 07:20 schrieb Robert Arkiletian <robark at gmail.com>: > On Fri, Feb 20, 2015 at 6:47 AM, Leon Fauster <leonfauster at googlemail.com> > wrote: > >> Am 20.02.2015 um 13:53 schrieb "Phelps, Matthew" <mphelps at cfa.harvard.edu >>> : >>> Any new information here? >> >> maybe some cooperation with the fedora
2018 Jan 06
1
CentOS-virt - Kernel Side-Channel Attacks
On 01/05/2018 06:33 AM, George Dunlap wrote: > On Thu, Jan 4, 2018 at 7:12 PM, Sarah Newman <srn at prgmr.com> wrote: >> On 01/04/2018 10:49 AM, Akemi Yagi wrote: >>> On Thu, Jan 4, 2018 at 9:51 AM, <rikske at deds.nl> wrote: >>> >>>> Please patch the CentOS-virt Kernel to fix the >>>> Kernel Side-Channel Attacks vulnerabilities.