ole output for a vcpus = 5 start (attached). It
dies right after:
[ 0.007110] cpu 3 spinlock event irq 23
[ 0.007336] installing Xen timer for CPU 4
I think this issue is only affecting some CPUs. So it might be related
to some CPU calculation/allocation code?
I see xl info reports nr_nod
the xl -v create logs, no difference there on either startup.
I grabbed the domU console output for a vcpus = 5 start (attached). It
dies right after:
[ 0.007110] cpu 3 spinlock event irq 23
[ 0.007336] installing Xen timer for CPU 4
Can you please post the hypervisor log ("xl dme
mU console:
[0.001000] cpu 0 spinlock event irq 5
[0.001000] Performance Events: unsupported p6 CPU model 23 no PMU driver,
software events only.
[0.001000] Hierarchical SRCU implementation.
[0.001249] smp: Bringing up secondary CPUs ...
[0.001582] installing Xen timer for CPU 1
[0.0
or a vcpus = 5 start (attached). It
dies right after:
[ 0.007110] cpu 3 spinlock event irq 23
[ 0.007336] installing Xen timer for CPU 4
Can you please post the hypervisor log ("xl dmesg")?
Juergen
Attached.
Can you please try again with "loglvl=all guest_loglvl=all&
Dummy target?
After I‘m done, I wold like to write such a guideline if not existing. Where to
commit it, who will have a review of it?
thx Xensemann
___
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman
ore/xenstored_core.h
index 3d7eb91254..f5b0d70da4 100644
--- a/tools/xenstore/xenstored_core.h
+++ b/tools/xenstore/xenstored_core.h
@@ -174,6 +174,7 @@ void dtrace_io(const struct connection *conn, const struct
buffered_data *data,
void reopen_log(void);
void close_log(void);
+extern bool t
ush(stderr);
}
+#endif
void (*xprintf)(const char *fmt, ...) = default_xprintf;
--
2.24.0
_______
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel
on 4.11.3 but I can rebase it to master.
James
___
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel
report, "[]" },
{ "print", do_control_print, "" },
{ "help", do_control_help, "" },
--
2.24.0
___
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel
quot;, 0, LOG_DAEMON);
+ openlog("xenstored", 0, LOG_DAEMON);
+ if (dofork)
daemonize();
- }
if (pidfile)
write_pidfile(pidfile);
--
2.24.0
___
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory XSA-247
version 2
Missing p2m error checking in PoD code
UPDATES IN VERSION 2
Public release.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2017-17046 / XSA-245
version 2
ARM: Some memory not scrubbed at boot
UPDATES IN VERSION 2
CVE assigned.
NOTE REGARDING LACK OF EMBARGO
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2017-17045 / XSA-247
version 3
Missing p2m error checking in PoD code
UPDATES IN VERSION 3
CVE assigned.
Fixed "Reported-by" tag
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2017-17044 / XSA-246
version 3
x86: infinite loop due to missing PoD error checking
UPDATES IN VERSION 3
CVE assigned.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2017-15591 / XSA-238
version 3
DMOP map/unmap missing argument checks
UPDATES IN VERSION 3
CVE assigned.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory XSA-249
version 2
broken x86 shadow mode refcount overflow check
UPDATES IN VERSION 2
Public release.
Provide metadata file.
ISSUE
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory XSA-251
version 2
improper bug check in x86 log-dirty handling
UPDATES IN VERSION 2
Public release.
Provide information for Xen 4.10
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory XSA-250
version 2
improper x86 shadow mode refcount error handling
UPDATES IN VERSION 2
Public release.
Provide metadata file.
ISSUE
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory XSA-248
version 2
x86 PV guests may gain access to internally used pages
UPDATES IN VERSION 2
Public release.
Provide metadata file.
ISSUE
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2018-10982 / XSA-261
version 3
x86 vHPET interrupt injection errors
UPDATES IN VERSION 3
CVE assigned.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2018-10981 / XSA-262
version 3
qemu may drive Xen into unbounded loop
UPDATES IN VERSION 3
CVE assigned.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory XSA-262
version 2
qemu may drive Xen into unbounded loop
UPDATES IN VERSION 2
Public release.
Updated .meta file
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory XSA-261
version 2
x86 vHPET interrupt injection errors
UPDATES IN VERSION 2
Versions 3.1 ... 3.3 don't appear to be vulnerable.
Public
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2018-8897 / XSA-260
version 2
x86: mishandling of debug exceptions
UPDATES IN VERSION 2
Public release.
Updated .meta file
ISSUE
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2018-12892 / XSA-266
version 3
libxl fails to honour readonly flag on HVM emulated SCSI disks
UPDATES IN VERSION 3
Public release.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2018-12893 / XSA-265
version 3
x86: #DB exception safety check can be triggered by a guest
UPDATES IN VERSION 3
Public release.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2018-12891 / XSA-264
version 3
preemption checks bypassed in x86 PV MM handling
UPDATES IN VERSION 3
Public release.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2018-10472 / XSA-258
version 3
Information leak via crafted user-supplied CDROM
UPDATES IN VERSION 3
CVE assigned.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2018-10471 / XSA-259
version 3
x86: PV guest may crash Xen with XPTI
UPDATES IN VERSION 3
CVE assigned.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2017-5753,CVE-2017-5715,CVE-2017-5754 / XSA-254
version 3
Information leak via side effects of speculative execution
UPDATES IN VERSION 3
Add information
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2017-17563 / XSA-249
version 3
broken x86 shadow mode refcount overflow check
UPDATES IN VERSION 3
CVE assigned.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2017-17564 / XSA-250
version 3
improper x86 shadow mode refcount error handling
UPDATES IN VERSION 3
CVE assigned.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2018-5244 / XSA-253
version 3
x86: memory leak with MSR emulation
UPDATES IN VERSION 3
CVE assigned.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2017-5753,CVE-2017-5715,CVE-2017-5754 / XSA-254
version 9
Information leak via side effects of speculative execution
UPDATES IN VERSION 9
"Stage 1"
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2017-5753,CVE-2017-5715,CVE-2017-5754 / XSA-254
version 8
Information leak via side effects of speculative execution
UPDATES IN VERSION 8
PVH shim ("
... your report is very likely duplicating earlier ones where the
ACPI root point cannot be found without it being properly
propagated through by grub from EFI to Xen. Iirc the only
way around that is to chainload xen.efi, if the grub used
doesn't support the extensions needed to boot Xen via
Hi,
I have configured Xen to boot directly from EFI (with `efibootmgr`).
As explained on the Xen_EFI wiki page, I have added a line "options="
into my file "/boot/efi/EFI/xen/xen.cfg" :
```
# cat /boot/efi/EFI/xen/xen.cfg :
[global]
default=xen
[xen]
options=dom0_
rash_with_dom0_memory.txt".
I attached the result : "result.txt".
We can see inside this file "xen/mmu_pv.c:1548" and
"drivers/firmware/efi/efi.c:558", so I hope it will be helpful.
Is that ok for you ?
Can I do something more ?
Regards,
Guillaume
addr2line -pf
Guillaume, can you try to get symbol+offset for the values on the stack
looking like kernel code addresses (e.g. everything starting with
"82")?
For sure. Just, can you explain me how I can do this, please ?
Guillaume
_______
Xen-dev
(With the attached file)
Xen doesn't crash at all.
With this file, it works, Xen boots :
```
[global]
default=xen
[xen]
options=loglvl=all com1=115200,8n1 console=com1,vga
kernel=vmlinuz root=/dev/md2 ro rootdelay=10 noquiet nosplash
earlyprintk=xen
ramdisk=initrd.img
```
With this file
# About the kernel crash
Did you read the above?
I just wanted to say that I have solved the kernel panic crash that I
had before, when you explained "Xen doesn't crash at all. It's the Dom0
kernel which panics".
Just for information the crash happens if I put the &qu
Xen doesn't crash at all.
With this file, it works, Xen boots :
```
[global]
default=xen
[xen]
options=loglvl=all com1=115200,8n1 console=com1,vga
kernel=vmlinuz root=/dev/md2 ro rootdelay=10 noquiet nosplash
earlyprintk=xen
ramdisk=initrd.img
```
With this file, I have just added
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2017-5753,CVE-2017-5715,CVE-2017-5754 / XSA-254
version 7
Information leak via side effects of speculative execution
UPDATES IN VERSION 7
PVH shim ("
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2017-5753,CVE-2017-5715,CVE-2017-5754 / XSA-254
version 4
Information leak via side effects of speculative execution
UPDATES IN VERSION 4
Added README
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2017-5753,CVE-2017-5715,CVE-2017-5754 / XSA-254
version 11
Information leak via side effects of speculative execution
UPDATES IN VERSION 11
=
Information
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2017-5753,CVE-2017-5715,CVE-2017-5754 / XSA-254
version 12
Information leak via side effects of speculative execution
UPDATES IN VERSION 12
=
Corrections
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory XSA-254
Information leak via side effects of speculative execution
ISSUE DESCRIPTION
=
Processors give the illusion of a sequence of instructions executed
one-by-one. However
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory XSA-253
version 2
x86: memory leak with MSR emulation
UPDATES IN VERSION 2
Public release.
ISSUE DESCRIPTION
=
In Xen
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2018-14678 / XSA-274
version 2
Linux: Uninitialized state in x86 PV failsafe callback path
UPDATES IN VERSION 2
CVE assigned. Fix the title to refer
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2018-14678 / XSA-274
version 3
Linux: Uninitialized state in x86 PV failsafe callback path
UPDATES IN VERSION 3
Fix spelling in CREDITS.
ISSUE
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory XSA-268
version 2
Use of v2 grant tables may cause crash on ARM
UPDATES IN VERSION 2
Public release.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2018-14007 / XSA-271
version 2
XAPI HTTP directory traversal
UPDATES IN VERSION 2
Public release.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory XSA-269
version 2
x86: Incorrect MSR_DEBUGCTL handling lets guests enable BTS
UPDATES IN VERSION 2
Public release.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory XSA-270
version 2
Linux netback driver OOB access in hash handling
UPDATES IN VERSION 2
Public release.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory XSA-272
version 2
oxenstored does not apply quota-maxentity
UPDATES IN VERSION 2
Ammend patch to reference XSA-272 in the commit message
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2018-3620,CVE-2018-3646 / XSA-273
L1 Terminal Fault speculative side channel
ISSUE DESCRIPTION
=
In x86 nomenclature, a Terminal Fault is a pagetable walk which aborts
due to the page
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2018-15471 / XSA-270
version 3
Linux netback driver OOB access in hash handling
UPDATES IN VERSION 3
CVE assigned.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2018-15470 / XSA-272
version 3
oxenstored does not apply quota-maxentity
UPDATES IN VERSION 3
CVE assigned.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2018-15468 / XSA-269
version 3
x86: Incorrect MSR_DEBUGCTL handling lets guests enable BTS
UPDATES IN VERSION 3
CVE assigned.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2018-15469 / XSA-268
version 3
Use of v2 grant tables may cause crash on ARM
UPDATES IN VERSION 3
CVE assigned.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory XSA-274
Linux: Uninitialized state in PV syscall return path
ISSUE DESCRIPTION
=
Linux has a `failsafe` callback, invoked by Xen under certain
conditions. Normally
Yet you'll need to provide the kernel messages
I attached a console log "xen-console-log.txt".
Here, Xen crash even without the "dom0_mem=1G,max:1G" option :
```
# cat /boot/efi/EFI/xen/xen.cfg
[global]
default=xen
[xen]
options=loglvl=all com1=115200,8n1 console=com1,vga
Hi,
I only see 1 CPU core on Xen 4.9 when booted via grub instead of 8.
It's may be related to :
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=820807
- https://xenproject.atlassian.net/browse/XEN-42
It is the first server on which I have this problem.
I can confirm that :
- if I boot
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2018-7541 / XSA-255
version 4
grant table v2 -> v1 transition may crash Xen
UPDATES IN VERSION 4
CVE assigned.
ISSUE DESCRIPT
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2018-7540 / XSA-252
version 3
DoS via non-preemptable L3/L4 pagetable freeing
UPDATES IN VERSION 3
CVE assigned.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2018-7542 / XSA-256
version 3
x86 PVH guest without LAPIC may DoS the host
UPDATES IN VERSION 3
CVE assigned.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory XSA-258
version 2
Information leak via crafted user-supplied CDROM
UPDATES IN VERSION 2
Public release.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory XSA-259
version 2
x86: PV guest may crash Xen with XPTI
UPDATES IN VERSION 2
Public release.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory XSA-256
version 2
x86 PVH guest without LAPIC may DoS the host
UPDATES IN VERSION 2
Public release.
ISSUE DESCRIPTION
=
So
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory XSA-252
version 2
DoS via non-preemptable L3/L4 pagetable freeing
UPDATES IN VERSION 2
Public release.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory XSA-255
version 3
grant table v2 -> v1 transition may crash Xen
UPDATES IN VERSION 3
Public release.
ISSUE DESCRIPT
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory XSA-278
x86: Nested VT-x usable even when disabled
ISSUE DESCRIPTION
=
When running HVM guests, virtual extensions are enabled in hardware because
Xen is using them
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2018-18883 / XSA-278
version 2
x86: Nested VT-x usable even when disabled
UPDATES IN VERSION 2
CVE assigned.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory XSA-282
guest use of HLE constructs may lock up host
ISSUE DESCRIPTION
=
Various Intel CPU models have an erratum listed under the title
"Processor May Hang When Exec
Hi Jan, hi Juergen,
I'm trying again this week to install Xen on a OVH server
(https://www.ovh.com/fr/serveurs_dedies/infra/1801eg02.xml).
It is still impossible to boot Xen with the option "dom0_mem=1G,max:1G"
(boot : EFI->xen).
I have tried with Debian 9 stable/stretch :
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory XSA-275
version 2
insufficient TLB flushing / improper large page mappings with AMD IOMMUs
UPDATES IN VERSION 2
Public release.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory XSA-277
version 2
x86: incorrect error handling for guest p2m page removals
UPDATES IN VERSION 2
Public release.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory XSA-279
version 2
x86: DoS from attempting to use INVPCID with a non-canonical addresses
UPDATES IN VERSION 2
Public release.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory XSA-276
version 2
resource accounting issues in x86 IOREQ server handling
UPDATES IN VERSION 2
Public release.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory XSA-280
version 2
Fix for XSA-240 conflicts with shadow paging
UPDATES IN VERSION 2
Public release.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2018-19965 / XSA-279
version 3
x86: DoS from attempting to use INVPCID with a non-canonical addresses
UPDATES IN VERSION 3
CVE assigned.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2018-19967 / XSA-282
version 2
guest use of HLE constructs may lock up host
UPDATES IN VERSION 2
CVE assigned.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2018-19966 / XSA-280
version 3
Fix for XSA-240 conflicts with shadow paging
UPDATES IN VERSION 3
CVE assigned.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2018-19964 / XSA-277
version 3
x86: incorrect error handling for guest p2m page removals
UPDATES IN VERSION 3
CVE assigned.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2018-19963 / XSA-276
version 3
resource accounting issues in x86 IOREQ server handling
UPDATES IN VERSION 3
CVE assigned.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2018-19961,CVE-2018-19962 / XSA-275
version 3
insufficient TLB flushing / improper large page mappings with AMD IOMMUs
UPDATES IN VERSION 3
CVEs assigned.
ISSUE
/archives/html/xen-devel/2018-01/threads.html#02010
Thanks for your reply,
Guillaume
Le 03/12/2018 à 09:25, Jan Beulich a écrit :
On 30.11.18 at 16:12, wrote:
I'm trying again this week to install Xen on a OVH server
(https://www.ovh.com/fr/serveurs_dedies/infra/1801eg02.xml).
It is still
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory XSA-283
version 2
Withdrawn Xen Security Advisory number
SUMMARY
===
The advisory XSA-283 has been withdrawn.
This is because, on further analysis, we have
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory XSA-294
version 2
x86 shadow: Insufficient TLB flushing when using PCID
UPDATES IN VERSION 2
Public release.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory XSA-290
version 2
missing preemption in x86 PV page table unvalidation
UPDATES IN VERSION 2
Metadata updated to remove dependency on XSA-283
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory XSA-284
version 2
grant table transfer issues on large hosts
UPDATES IN VERSION 2
Metadata updated to remove dependency on XSA-283.
Public
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory XSA-285
version 2
race with pass-through device hotplug
UPDATES IN VERSION 2
Metadata updated to remove dependency on XSA-283.
Public
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory XSA-292
version 2
x86: insufficient TLB flushing when using PCID
UPDATES IN VERSION 2
Metadata updated to remove dependency on XSA-283
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory XSA-287
version 2
x86: steal_page violates page_struct access discipline
UPDATES IN VERSION 2
Metadata updated to remove dependency on XSA-283
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory XSA-288
version 2
x86: Inconsistent PV IOMMU discipline
UPDATES IN VERSION 2
Metadata updated to remove dependency on XSA-283.
4.7
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory XSA-291
version 2
x86/PV: page type reference counting issue with failed IOMMU update
UPDATES IN VERSION 2
Metadata updated to remove dependency on XSA
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory XSA-300
Linux: No grant table and foreign mapping limits
ISSUE DESCRIPTION
=
Virtual device backends and device models running in domain 0, or
other backend driver domains
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory XSA-300
version 2
Linux: No grant table and foreign mapping limits
UPDATES IN VERSION 2
Drop inapplicable "Deployment during em
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2018-12207 / XSA-304
x86: Machine Check Error on Page Size Change DoS
ISSUE DESCRIPTION
=
An erratum exists across some CPUs whereby an instruction fetch may
cause a machine check
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2019-19583 / XSA-308
version 3
VMX: VMentry failure with debug exceptions and blocked states
UPDATES IN VERSION 3
Public release.
Updated metadata
1 - 100 of 281 matches
Mail list logo