Displaying 20 results from an estimated 1000 matches similar to: "C6 KPTI cpuinfo flag?"
2018 Jan 10
0
Nvidia maximum pixel clock issue in, , kmod-nvidia-384.98
To: CentOS mailing list <centos at centos.org>
Thema: Re: [CentOS] Nvidia maximum pixel clock issue in
kmod-nvidia-384.98
Dear All,
Start BIOS Configuration and go to Graphic Configuration change On Board
VGA to PCI Express x16
Automatic is VGA on Board
Bis bald
Alexander
Am 09.01.2018 um 13:00 schrieb centos-request at centos.org:
> Send CentOS mailing list submissions to
>
2019 Mar 08
1
[RFC PATCH V2 5/5] vhost: access vq metadata through kernel virtual address
On Thu, Mar 07, 2019 at 10:43:12PM -0500, Michael S. Tsirkin wrote:
> On Thu, Mar 07, 2019 at 10:40:53PM -0500, Jerome Glisse wrote:
> > On Thu, Mar 07, 2019 at 10:16:00PM -0500, Michael S. Tsirkin wrote:
> > > On Thu, Mar 07, 2019 at 09:55:39PM -0500, Jerome Glisse wrote:
> > > > On Thu, Mar 07, 2019 at 09:21:03PM -0500, Michael S. Tsirkin wrote:
> > > >
2019 Mar 08
1
[RFC PATCH V2 5/5] vhost: access vq metadata through kernel virtual address
On Thu, Mar 07, 2019 at 10:43:12PM -0500, Michael S. Tsirkin wrote:
> On Thu, Mar 07, 2019 at 10:40:53PM -0500, Jerome Glisse wrote:
> > On Thu, Mar 07, 2019 at 10:16:00PM -0500, Michael S. Tsirkin wrote:
> > > On Thu, Mar 07, 2019 at 09:55:39PM -0500, Jerome Glisse wrote:
> > > > On Thu, Mar 07, 2019 at 09:21:03PM -0500, Michael S. Tsirkin wrote:
> > > >
2018 Jan 04
2
possible issue with nvidia and new patches?
Twitter user stintel, in this thread:
https://twitter.com/stintel/status/948499157282623488
mentions a possible problem with the new patches and the
nvidia driver:
"As if the @Intel bug isn't bad enough, #KPTI renders @nvidia driver
incompatible due to GPL-only symbol 'cpu_tlbstate'. #epicfail"
Also:
https://twitter.com/tomasz_gwozdz/status/948590364679655429
2018 Jan 07
2
CentOS 7.4 fails to boot as Xen PV guest: resurfaces (now also) with centosplus kernel 693.11.6.el7
Dear all,
Maybe I'm the only one - so before filing it as a bug: it appears that
the latest set of kernel patches in 3.10.0-693.11.6.el7 makes issue
0013763 "CentOS 7.4 kernel (3.10.0-693*) fails to boot as Xen PV guest"
re-surface *also* with the CentOS PLUS kernel. But maybe in a
different way ...
Thanks to the (great!) quick work on making the plus kernel available
(in #14330,
2015 Jan 19
3
Chromium browser for C6
On Mon, Jan 12, 2015 at 6:22 PM, Robert Arkiletian <robark at gmail.com> wrote:
> On Mon, Jan 5, 2015 at 1:13 PM, Robert Arkiletian <robark at gmail.com>
> wrote:
>
> > Johnny,
> >
> > Any ETA on version 39.0.2171.95
> >
> > cheers
> >
> >
>
> bump
> _______________________________________________
> CentOS mailing list
2015 Jan 19
2
Chromium browser for C6
On Mon, Jan 19, 2015 at 12:24 PM, Johnny Hughes <johnny at centos.org> wrote:
> On 01/19/2015 12:23 PM, Phelps, Matthew wrote:
> > On Mon, Jan 12, 2015 at 6:22 PM, Robert Arkiletian <robark at gmail.com>
> wrote:
> >
> >> On Mon, Jan 5, 2015 at 1:13 PM, Robert Arkiletian <robark at gmail.com>
> >> wrote:
> >>
> >>> Johnny,
2018 Jan 06
3
PEM file opened without DIRECT I/O which makes private key readable by attacker exploiting MELTDOWN
On Sat, Jan 6, 2018 at 5:38 PM, Philipp Marek <philipp at marek.priv.at> wrote:
> I think we are possibly interested in switching to DIRECT IO (given that it
>> bypasses any caching system including page cache) when reading *.PEM file
>>
> Sorry, but this makes no sense.
> The data could just as well be read from the SSH process
> memory space.
>
I think
2015 Jan 20
3
Chromium browser for C6
On Mon, Jan 19, 2015 at 05:55:44PM -0600, Johnny Hughes wrote:
> On 01/19/2015 04:10 PM, Robert Arkiletian wrote:
> > On Mon, Jan 19, 2015 at 12:24 PM, Johnny Hughes <johnny at centos.org> wrote:
> >
> >> On 01/19/2015 12:23 PM, Phelps, Matthew wrote:
> >>> On Mon, Jan 12, 2015 at 6:22 PM, Robert Arkiletian <robark at gmail.com>
> >> wrote:
2018 Jan 08
4
Response to Meltdown and Spectre
By now, we're sure most everyone have heard of the Meltdown and Spectre
attacks. If not, head over to https://meltdownattack.com/ and get an
overview. Additional technical details are available from Google
Project Zero.
https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html
The FreeBSD Security Team was notified of the issue in late December
and received a
2018 Jan 08
4
Response to Meltdown and Spectre
By now, we're sure most everyone have heard of the Meltdown and Spectre
attacks. If not, head over to https://meltdownattack.com/ and get an
overview. Additional technical details are available from Google
Project Zero.
https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html
The FreeBSD Security Team was notified of the issue in late December
and received a
2015 Sep 08
3
C6 firefox esr h.264 support on youtube
> Date: Tuesday, September 08, 2015 15:24:50 -0700
> From: Robert Arkiletian <robark at gmail.com>
>
>> On Tue, Sep 8, 2015 at 3:11 PM, Richard wrote:
>>
>>
>> > Date: Tuesday, September 08, 2015 14:57:22 -0700
>> > From: Robert Arkiletian <robark at gmail.com>
>> >
>> > I was able to get h.264 support on
2015 Jan 21
3
Chromium browser for C6
On Mon, 19 Jan 2015, Johnny Hughes wrote:
> On 01/19/2015 06:49 PM, Fred Smith wrote:
>> On Mon, Jan 19, 2015 at 05:55:44PM -0600, Johnny Hughes wrote:
>>> On 01/19/2015 04:10 PM, Robert Arkiletian wrote:
>>>> On Mon, Jan 19, 2015 at 12:24 PM, Johnny Hughes <johnny at centos.org> wrote:
>>>>
>>>>> On 01/19/2015 12:23 PM, Phelps,
2015 Jan 05
2
Chromium browser for C6
Johnny,
Any ETA on version 39.0.2171.95
cheers
On Sat, Nov 15, 2014 at 8:55 AM, Johnny Hughes <johnny at centos.org> wrote:
> On 11/14/2014 10:48 AM, Johnny Hughes wrote:
> > On 11/12/2014 03:09 PM, Phelps, Matthew wrote:
> >> I concur. Enter key, ^M, etc. has no effect in the browser. Same for
> number
> >> keys.
> >
> > This is a known issue, I
2019 Mar 08
2
[RFC PATCH V2 5/5] vhost: access vq metadata through kernel virtual address
On Thu, Mar 07, 2019 at 10:16:00PM -0500, Michael S. Tsirkin wrote:
> On Thu, Mar 07, 2019 at 09:55:39PM -0500, Jerome Glisse wrote:
> > On Thu, Mar 07, 2019 at 09:21:03PM -0500, Michael S. Tsirkin wrote:
> > > On Thu, Mar 07, 2019 at 02:17:20PM -0500, Jerome Glisse wrote:
> > > > > It's because of all these issues that I preferred just accessing
> > >
2019 Mar 08
2
[RFC PATCH V2 5/5] vhost: access vq metadata through kernel virtual address
On Thu, Mar 07, 2019 at 10:16:00PM -0500, Michael S. Tsirkin wrote:
> On Thu, Mar 07, 2019 at 09:55:39PM -0500, Jerome Glisse wrote:
> > On Thu, Mar 07, 2019 at 09:21:03PM -0500, Michael S. Tsirkin wrote:
> > > On Thu, Mar 07, 2019 at 02:17:20PM -0500, Jerome Glisse wrote:
> > > > > It's because of all these issues that I preferred just accessing
> > >
2015 Jan 20
1
Chromium browser for C6
On Mon, Jan 19, 2015 at 08:01:02PM -0600, Johnny Hughes wrote:
> On 01/19/2015 06:49 PM, Fred Smith wrote:
> > On Mon, Jan 19, 2015 at 05:55:44PM -0600, Johnny Hughes wrote:
> >> On 01/19/2015 04:10 PM, Robert Arkiletian wrote:
> >>> On Mon, Jan 19, 2015 at 12:24 PM, Johnny Hughes <johnny at centos.org> wrote:
> >>>
> >>>> On
2018 Feb 08
5
Re: Nested KVM: L0 guest produces kernel BUG on wakeup from managed save (while a nested VM is running)
>> In short: there is no (live) migration support for nested VMX yet. So as
>> soon as your guest is using VMX itself ("nVMX"), this is not expected to
>> work.
>
> Hi David, thanks for getting back to us on this.
Hi Florian,
(sombeody please correct me if I'm wrong)
>
> I see your point, except the issue Kashyap and I are describing does
> not
2015 Feb 22
2
Chromium browser for C6
Am 22.02.2015 um 07:20 schrieb Robert Arkiletian <robark at gmail.com>:
> On Fri, Feb 20, 2015 at 6:47 AM, Leon Fauster <leonfauster at googlemail.com>
> wrote:
>
>> Am 20.02.2015 um 13:53 schrieb "Phelps, Matthew" <mphelps at cfa.harvard.edu
>>> :
>>> Any new information here?
>>
>> maybe some cooperation with the fedora
2018 Jan 06
1
CentOS-virt - Kernel Side-Channel Attacks
On 01/05/2018 06:33 AM, George Dunlap wrote:
> On Thu, Jan 4, 2018 at 7:12 PM, Sarah Newman <srn at prgmr.com> wrote:
>> On 01/04/2018 10:49 AM, Akemi Yagi wrote:
>>> On Thu, Jan 4, 2018 at 9:51 AM, <rikske at deds.nl> wrote:
>>>
>>>> Please patch the CentOS-virt Kernel to fix the
>>>> Kernel Side-Channel Attacks vulnerabilities.