<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[&quot;CROSSTalk&quot; CPU vulnerabilty (cross-core data leak)]]></title><description><![CDATA[<h2>Intel CPUs "<a href="https://www.vusec.net/projects/crosstalk/" target="_blank" rel="noopener noreferrer nofollow ugc">CROSSTalk</a>" vulnerability.</h2>
<p dir="auto">Following the disclosure of the CROSSTalk CPU vulnerabilities and the release of updated microcode by Intel, here are update candidates for XCP-ng 8.0 and 8.1. Prompt feedback by all available testers is wanted.</p>
<p dir="auto">The updated microcode has a huge performance impact on specific CPU operations, such as random number generation. Performance impact on common or specific workloads is yet to be evaluated. You are welcome to share your own findings.</p>
<p dir="auto">The updates includes:</p>
<ul>
<li>updated microcode. I think that the mitigation is on if you can find <code>SRBDS_CTRL</code> in <code>/var/log/xen/hypervisor.log</code>. No fix is available at the moment for the IvyBridge CPU family (core i3, i5, i7 for desktop and equivalent Xeons. List at <a href="https://en.wikipedia.org/wiki/Ivy_Bridge_%28microarchitecture%29" target="_blank" rel="noopener noreferrer nofollow ugc">https://en.wikipedia.org/wiki/Ivy_Bridge_(microarchitecture)</a>), which is not supported by Intel anymore.</li>
<li>updated Xen with new options to "offer boot time information, defaults selection, and opt-out controls" - see <code>srb-lock</code> in <a href="https://xenbits.xen.org/docs/unstable-staging/misc/xen-command-line.html#spec-ctrl-x86" target="_blank" rel="noopener noreferrer nofollow ugc">https://xenbits.xen.org/docs/unstable-staging/misc/xen-command-line.html#spec-ctrl-x86</a></li>
<li>updated kernel to lower the performance impact of the microcode update</li>
</ul>
<p dir="auto">Install them on XCP-ng 8.0 or 8.1 with:</p>
<pre><code>yum update kernel microcode_ctl xen-dom0-libs xen-dom0-tools xen-hypervisor xen-libs xen-tools --enablerepo=xcp-ng-testing
</code></pre>
<p dir="auto">Downgrade with:</p>
<pre><code>yum downgrade kernel microcode_ctl xen-dom0-libs xen-dom0-tools xen-hypervisor xen-libs xen-tools
</code></pre>
<p dir="auto">Related:</p>
<ul>
<li>Xen advisory: <a href="http://xenbits.xen.org/xsa/advisory-320.html" target="_blank" rel="noopener noreferrer nofollow ugc">http://xenbits.xen.org/xsa/advisory-320.html</a></li>
<li>Citrix advisory: <a href="https://support.citrix.com/article/CTX275165" target="_blank" rel="noopener noreferrer nofollow ugc">https://support.citrix.com/article/CTX275165</a></li>
</ul>
]]></description><link>https://xcp-ng.org/forum/topic/3151/crosstalk-cpu-vulnerabilty-cross-core-data-leak</link><generator>RSS for Node</generator><lastBuildDate>Sat, 18 Apr 2026 06:27:19 GMT</lastBuildDate><atom:link href="https://xcp-ng.org/forum/topic/3151.rss" rel="self" type="application/rss+xml"/><pubDate>Wed, 10 Jun 2020 10:43:32 GMT</pubDate><ttl>60</ttl><item><title><![CDATA[Reply to &quot;CROSSTalk&quot; CPU vulnerabilty (cross-core data leak) on Mon, 22 Jun 2020 11:19:50 GMT]]></title><description><![CDATA[<p dir="auto"><a class="plugin-mentions-user plugin-mentions-a" href="/forum/user/stormi" aria-label="Profile: stormi">@<bdi>stormi</bdi></a> Exactly. Must've been related to something other than just the latest packages.</p>
]]></description><link>https://xcp-ng.org/forum/post/28057</link><guid isPermaLink="true">https://xcp-ng.org/forum/post/28057</guid><dc:creator><![CDATA[demanzke]]></dc:creator><pubDate>Mon, 22 Jun 2020 11:19:50 GMT</pubDate></item><item><title><![CDATA[Reply to &quot;CROSSTalk&quot; CPU vulnerabilty (cross-core data leak) on Mon, 22 Jun 2020 11:06:30 GMT]]></title><description><![CDATA[<p dir="auto"><a class="plugin-mentions-user plugin-mentions-a" href="/forum/user/demanzke" aria-label="Profile: demanzke">@<bdi>demanzke</bdi></a> So this time no boot issue after installing the update?</p>
]]></description><link>https://xcp-ng.org/forum/post/28055</link><guid isPermaLink="true">https://xcp-ng.org/forum/post/28055</guid><dc:creator><![CDATA[stormi]]></dc:creator><pubDate>Mon, 22 Jun 2020 11:06:30 GMT</pubDate></item><item><title><![CDATA[Reply to &quot;CROSSTalk&quot; CPU vulnerabilty (cross-core data leak) on Sat, 20 Jun 2020 06:43:03 GMT]]></title><description><![CDATA[<p dir="auto">Finally got some time to test your suggestions.<br />
Removing the microcode_ctl package without dependencies did not help.<br />
<a href="https://drive.google.com/file/d/1bne6b7ZkGrdu2ZDf1UOu5_s96ZxH33jk/view?usp=sharing" target="_blank" rel="noopener noreferrer nofollow ugc">Here</a> are both initial ramdisks for anyone interested to look at.</p>
<p dir="auto">Reinstalling XCP, then ZFS, then updating all packages worked fine.</p>
]]></description><link>https://xcp-ng.org/forum/post/27953</link><guid isPermaLink="true">https://xcp-ng.org/forum/post/27953</guid><dc:creator><![CDATA[demanzke]]></dc:creator><pubDate>Sat, 20 Jun 2020 06:43:03 GMT</pubDate></item><item><title><![CDATA[Reply to &quot;CROSSTalk&quot; CPU vulnerabilty (cross-core data leak) on Fri, 19 Jun 2020 10:26:08 GMT]]></title><description><![CDATA[<p dir="auto">Thanks for the clarification. No Skylake present, so I will proceed.</p>
]]></description><link>https://xcp-ng.org/forum/post/27918</link><guid isPermaLink="true">https://xcp-ng.org/forum/post/27918</guid><dc:creator><![CDATA[lefty]]></dc:creator><pubDate>Fri, 19 Jun 2020 10:26:08 GMT</pubDate></item><item><title><![CDATA[Reply to &quot;CROSSTalk&quot; CPU vulnerabilty (cross-core data leak) on Fri, 19 Jun 2020 09:58:17 GMT]]></title><description><![CDATA[<p dir="auto">I'm unsure for Skylake. Not for other CPUs.</p>
]]></description><link>https://xcp-ng.org/forum/post/27917</link><guid isPermaLink="true">https://xcp-ng.org/forum/post/27917</guid><dc:creator><![CDATA[stormi]]></dc:creator><pubDate>Fri, 19 Jun 2020 09:58:17 GMT</pubDate></item><item><title><![CDATA[Reply to &quot;CROSSTalk&quot; CPU vulnerabilty (cross-core data leak) on Fri, 19 Jun 2020 09:55:27 GMT]]></title><description><![CDATA[<p dir="auto"><a class="plugin-mentions-user plugin-mentions-a" href="/forum/user/stormi" aria-label="Profile: stormi">@<bdi>stormi</bdi></a> said in <a href="/forum/post/27796">"CROSSTalk" CPU vulnerabilty (cross-core data leak)</a>:</p>
<blockquote>
<p dir="auto">Intel just released updated microcode (actually it's a revert) for some models: <a href="https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases" target="_blank" rel="noopener noreferrer nofollow ugc">https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases</a></p>
<p dir="auto">I'll update the microcode_ctl package. <s>The "older" microcode that is used instead is still recent enough to contain the fixes against CROSSTalk / SRBDS.</s> Or so I had understood, but I can't find evidence about it.</p>
</blockquote>
<p dir="auto">So should I wait applying these updates? You seem to be unsure of which microcode version to distribute.</p>
]]></description><link>https://xcp-ng.org/forum/post/27916</link><guid isPermaLink="true">https://xcp-ng.org/forum/post/27916</guid><dc:creator><![CDATA[lefty]]></dc:creator><pubDate>Fri, 19 Jun 2020 09:55:27 GMT</pubDate></item><item><title><![CDATA[Reply to &quot;CROSSTalk&quot; CPU vulnerabilty (cross-core data leak) on Thu, 18 Jun 2020 07:46:39 GMT]]></title><description><![CDATA[<p dir="auto">I would say: always apply patches, but you are free to reboot when you want. Obviously, for you, it won't change anything (no microcode update) but keeping your hosts up to date is a good practice <img src="https://xcp-ng.org/forum/assets/plugins/nodebb-plugin-emoji/emoji/android/1f642.png?v=a78c449d9ac" class="not-responsive emoji emoji-android emoji--slightly_smiling_face" style="height:23px;width:auto;vertical-align:middle" title=":)" alt="🙂" /></p>
]]></description><link>https://xcp-ng.org/forum/post/27854</link><guid isPermaLink="true">https://xcp-ng.org/forum/post/27854</guid><dc:creator><![CDATA[olivierlambert]]></dc:creator><pubDate>Thu, 18 Jun 2020 07:46:39 GMT</pubDate></item><item><title><![CDATA[Reply to &quot;CROSSTalk&quot; CPU vulnerabilty (cross-core data leak) on Thu, 18 Jun 2020 07:31:56 GMT]]></title><description><![CDATA[<p dir="auto">Hi do i need to patch my xenserver using AMD EPYC ? Those patches get offered to my AMD nodes by XO.<br />
On intel Xeon nodes it makes sense to me ....</p>
]]></description><link>https://xcp-ng.org/forum/post/27853</link><guid isPermaLink="true">https://xcp-ng.org/forum/post/27853</guid><dc:creator><![CDATA[markxc]]></dc:creator><pubDate>Thu, 18 Jun 2020 07:31:56 GMT</pubDate></item><item><title><![CDATA[Reply to &quot;CROSSTalk&quot; CPU vulnerabilty (cross-core data leak) on Tue, 16 Jun 2020 20:23:28 GMT]]></title><description><![CDATA[<p dir="auto">Thanks <a class="plugin-mentions-user plugin-mentions-a" href="/forum/user/biggen" aria-label="Profile: Biggen">@<bdi>Biggen</bdi></a> and <a class="plugin-mentions-user plugin-mentions-a" href="/forum/user/stormi" aria-label="Profile: stormi">@<bdi>stormi</bdi></a><br />
I'll try updating then removing the microcode_ctl package tomorrow and share the results.</p>
]]></description><link>https://xcp-ng.org/forum/post/27802</link><guid isPermaLink="true">https://xcp-ng.org/forum/post/27802</guid><dc:creator><![CDATA[demanzke]]></dc:creator><pubDate>Tue, 16 Jun 2020 20:23:28 GMT</pubDate></item><item><title><![CDATA[Reply to &quot;CROSSTalk&quot; CPU vulnerabilty (cross-core data leak) on Wed, 17 Jun 2020 08:35:55 GMT]]></title><description><![CDATA[<p dir="auto">Intel just released updated microcode (actually it's a revert) for some models: <a href="https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases" target="_blank" rel="noopener noreferrer nofollow ugc">https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases</a></p>
<p dir="auto">I'll update the microcode_ctl package. <s>The "older" microcode that is used instead is still recent enough to contain the fixes against CROSSTalk / SRBDS.</s> Or so I had understood, but I can't find evidence about it.</p>
]]></description><link>https://xcp-ng.org/forum/post/27796</link><guid isPermaLink="true">https://xcp-ng.org/forum/post/27796</guid><dc:creator><![CDATA[stormi]]></dc:creator><pubDate>Wed, 17 Jun 2020 08:35:55 GMT</pubDate></item><item><title><![CDATA[Reply to &quot;CROSSTalk&quot; CPU vulnerabilty (cross-core data leak) on Tue, 16 Jun 2020 15:21:37 GMT]]></title><description><![CDATA[<p dir="auto">As far as I know, those patches work well on Citrix' test hosts. They also work well on our hosts at Vates. The microcodes underwent Intel's QA so I don't expect them to break on the vast majority of hardware, though there are reports of issues with some specific models. In <a class="plugin-mentions-user plugin-mentions-a" href="/forum/user/demanzke" aria-label="Profile: demanzke">@<bdi>demanzke</bdi></a>'s case, reverting to the previous microcode did not fix the issue so at first it doesn't look like it's related to the microcode.</p>
]]></description><link>https://xcp-ng.org/forum/post/27785</link><guid isPermaLink="true">https://xcp-ng.org/forum/post/27785</guid><dc:creator><![CDATA[stormi]]></dc:creator><pubDate>Tue, 16 Jun 2020 15:21:37 GMT</pubDate></item><item><title><![CDATA[Reply to &quot;CROSSTalk&quot; CPU vulnerabilty (cross-core data leak) on Tue, 16 Jun 2020 15:10:05 GMT]]></title><description><![CDATA[<p dir="auto">Has anyone else encountered this issue? Wondering if these patches should be pulled until this gets resolved.</p>
]]></description><link>https://xcp-ng.org/forum/post/27782</link><guid isPermaLink="true">https://xcp-ng.org/forum/post/27782</guid><dc:creator><![CDATA[Danp]]></dc:creator><pubDate>Tue, 16 Jun 2020 15:10:05 GMT</pubDate></item><item><title><![CDATA[Reply to &quot;CROSSTalk&quot; CPU vulnerabilty (cross-core data leak) on Mon, 15 Jun 2020 19:58:55 GMT]]></title><description><![CDATA[<p dir="auto">When this Crosstalk microcode update hit last week there was an issue with certain Intel CPUs where we coudn't boot after the patch was applied.  I run Linux Mint on my laptop and I couldn't boot it after taking the microcode update.  I had to boot into recovery and then <code>apt remove intel-microcode</code> to get it back to a working state.  Later that day, Ubuntu (or whoever) released a new intel-microcode update that corrected the problem.</p>
<p dir="auto">Not sure if this is even remotely close to the same issue but wanted to put this out there.</p>
]]></description><link>https://xcp-ng.org/forum/post/27721</link><guid isPermaLink="true">https://xcp-ng.org/forum/post/27721</guid><dc:creator><![CDATA[Biggen]]></dc:creator><pubDate>Mon, 15 Jun 2020 19:58:55 GMT</pubDate></item><item><title><![CDATA[Reply to &quot;CROSSTalk&quot; CPU vulnerabilty (cross-core data leak) on Mon, 15 Jun 2020 18:54:01 GMT]]></title><description><![CDATA[<p dir="auto">If we want to understand fully what happens, we could compare the contents of the initial ramdisks:</p>
<ul>
<li>initrd-4.19.0+1.img =&gt; doesn't work anymore</li>
<li>initrd-fallback.img =&gt; still works</li>
</ul>
<p dir="auto">One can extract them with:</p>
<pre><code>mkdir initrd-current
cd initrd-current/
/usr/lib/dracut/skipcpio /boot/initrd-4.19.0+1.img | zcat | cpio -ivd
cd ..
mkdir initrd-fallback
cd initrd-fallback/
/usr/lib/dracut/skipcpio /boot/initrd-fallback.img | zcat | cpio -ivd
</code></pre>
<p dir="auto">I don't know what differences to look for, to be honest. Maybe you could save those files and upload them somewhere for anyone interested to look at?</p>
<p dir="auto">Reinstalling the host then trying the update again, without ZFS first, then with it (which probably means reinstalling again and redoing the steps), could also be interesting to help precisely understand what happens.</p>
<p dir="auto">For now, it mainly looks like it's related to the initrd, which is generated by <code>dracut</code> when the kernel or other kernel modules (such as the kernel module for ZFS) are installed. As you may know, the initrd is the initial ramdisk which contains a minimal system booted before the actual system and which must be able to mount your root filesystem to be able to continue. Unfortunately we don't know from the output you get what the error is so it's all conjectures.</p>
]]></description><link>https://xcp-ng.org/forum/post/27717</link><guid isPermaLink="true">https://xcp-ng.org/forum/post/27717</guid><dc:creator><![CDATA[stormi]]></dc:creator><pubDate>Mon, 15 Jun 2020 18:54:01 GMT</pubDate></item><item><title><![CDATA[Reply to &quot;CROSSTalk&quot; CPU vulnerabilty (cross-core data leak) on Mon, 15 Jun 2020 18:22:55 GMT]]></title><description><![CDATA[<p dir="auto"><a class="plugin-mentions-user plugin-mentions-a" href="/forum/user/stormi" aria-label="Profile: stormi">@<bdi>stormi</bdi></a> said in <a href="/forum/post/27710">"CROSSTalk" CPU vulnerabilty (cross-core data leak)</a>:</p>
<blockquote>
<p dir="auto">Yes, please try:</p>
<pre><code>yum downgrade xen-dom0-libs xen-dom0-tools xen-hypervisor xen-libs xen-tools
</code></pre>
<p dir="auto">Then if it still changes nothing:</p>
<pre><code>yum downgrade microcode_ctl
</code></pre>
<p dir="auto">After all this, you'll be theoretically back to the state from before the update... Though there may be an issue with the initrd generation, which would still not allow you to boot.</p>
</blockquote>
<p dir="auto">Sadly nothing changed after downgrading the packages. The only thing I have changed after the base install was installing your ZFS port.<br />
At this point I would try a fresh install on the weekend and see if the problem reappears unless you have another suggestion.</p>
]]></description><link>https://xcp-ng.org/forum/post/27712</link><guid isPermaLink="true">https://xcp-ng.org/forum/post/27712</guid><dc:creator><![CDATA[demanzke]]></dc:creator><pubDate>Mon, 15 Jun 2020 18:22:55 GMT</pubDate></item><item><title><![CDATA[Reply to &quot;CROSSTalk&quot; CPU vulnerabilty (cross-core data leak) on Mon, 15 Jun 2020 17:56:12 GMT]]></title><description><![CDATA[<p dir="auto"><a class="plugin-mentions-user plugin-mentions-a" href="/forum/user/demanzke" aria-label="Profile: demanzke">@<bdi>demanzke</bdi></a> said in <a href="/forum/post/27708">"CROSSTalk" CPU vulnerabilty (cross-core data leak)</a>:</p>
<blockquote>
<p dir="auto">Installing the suggested kernel 6.0.10 changed nothing. Should I try downgrading other packages or an even older kernel version?</p>
</blockquote>
<p dir="auto">Yes, please try:</p>
<pre><code>yum downgrade xen-dom0-libs xen-dom0-tools xen-hypervisor xen-libs xen-tools
</code></pre>
<p dir="auto">Then if it still changes nothing:</p>
<pre><code>yum downgrade microcode_ctl
</code></pre>
<p dir="auto">After all this, you'll be theoretically back to the state from before the update... Though there may be an issue with the initrd generation, which would still not allow you to boot.</p>
]]></description><link>https://xcp-ng.org/forum/post/27710</link><guid isPermaLink="true">https://xcp-ng.org/forum/post/27710</guid><dc:creator><![CDATA[stormi]]></dc:creator><pubDate>Mon, 15 Jun 2020 17:56:12 GMT</pubDate></item><item><title><![CDATA[Reply to &quot;CROSSTalk&quot; CPU vulnerabilty (cross-core data leak) on Mon, 15 Jun 2020 17:50:36 GMT]]></title><description><![CDATA[<p dir="auto">There is no emergency shell after the failed boot, sadly.</p>
<p dir="auto">This is what happens after the loading bar on default settings:<br />
<img src="/forum/assets/uploads/files/1592242507406-img_20200615_192408-resized.jpg" alt="IMG_20200615_192408.jpg" class=" img-fluid img-markdown" /></p>
<p dir="auto">Right after selecting "Safe Boot":<br />
<img src="/forum/assets/uploads/files/1592242542041-img_20200615_192531-resized.jpg" alt="IMG_20200615_192531.jpg" class=" img-fluid img-markdown" /></p>
<p dir="auto">Installing the suggested kernel 6.0.10 changed nothing. Should I try downgrading other packages or an even older kernel version?</p>
]]></description><link>https://xcp-ng.org/forum/post/27708</link><guid isPermaLink="true">https://xcp-ng.org/forum/post/27708</guid><dc:creator><![CDATA[demanzke]]></dc:creator><pubDate>Mon, 15 Jun 2020 17:50:36 GMT</pubDate></item><item><title><![CDATA[Reply to &quot;CROSSTalk&quot; CPU vulnerabilty (cross-core data leak) on Mon, 15 Jun 2020 10:03:27 GMT]]></title><description><![CDATA[<p dir="auto">Do you get an emergency shell after <code>dracut-initqueue timeout</code>? If yes, there are probably logs that you can read from the current filesystem (which is in RAM at this stage of the boot process so probably disappears afterwards).</p>
]]></description><link>https://xcp-ng.org/forum/post/27666</link><guid isPermaLink="true">https://xcp-ng.org/forum/post/27666</guid><dc:creator><![CDATA[stormi]]></dc:creator><pubDate>Mon, 15 Jun 2020 10:03:27 GMT</pubDate></item><item><title><![CDATA[Reply to &quot;CROSSTalk&quot; CPU vulnerabilty (cross-core data leak) on Mon, 15 Jun 2020 09:38:48 GMT]]></title><description><![CDATA[<p dir="auto"><a class="plugin-mentions-user plugin-mentions-a" href="/forum/user/demanzke" aria-label="Profile: demanzke">@<bdi>demanzke</bdi></a> fixed the picture <img src="https://xcp-ng.org/forum/assets/plugins/nodebb-plugin-emoji/emoji/android/1f642.png?v=a78c449d9ac" class="not-responsive emoji emoji-android emoji--slightly_smiling_face" style="height:23px;width:auto;vertical-align:middle" title=":)" alt="🙂" /></p>
]]></description><link>https://xcp-ng.org/forum/post/27663</link><guid isPermaLink="true">https://xcp-ng.org/forum/post/27663</guid><dc:creator><![CDATA[stormi]]></dc:creator><pubDate>Mon, 15 Jun 2020 09:38:48 GMT</pubDate></item><item><title><![CDATA[Reply to &quot;CROSSTalk&quot; CPU vulnerabilty (cross-core data leak) on Mon, 15 Jun 2020 09:36:53 GMT]]></title><description><![CDATA[<p dir="auto">It is the "Safe Mode" options that results in a kernel panic, not "Serial".<br />
I will grab the screenshots and bugtool logs and test the different kernel later today.</p>
]]></description><link>https://xcp-ng.org/forum/post/27662</link><guid isPermaLink="true">https://xcp-ng.org/forum/post/27662</guid><dc:creator><![CDATA[demanzke]]></dc:creator><pubDate>Mon, 15 Jun 2020 09:36:53 GMT</pubDate></item><item><title><![CDATA[Reply to &quot;CROSSTalk&quot; CPU vulnerabilty (cross-core data leak) on Mon, 15 Jun 2020 09:33:59 GMT]]></title><description><![CDATA[<p dir="auto"><a class="plugin-mentions-user plugin-mentions-a" href="/forum/user/demanzke" aria-label="Profile: demanzke">@<bdi>demanzke</bdi></a> thanks for the report.</p>
<p dir="auto">To be sure I understand, is it like described on the following picture?</p>
<p dir="auto"><img src="/forum/assets/uploads/files/1592213630356-55f25c88-6c74-4828-ad77-7e644f87492e-image.png" alt="55f25c88-6c74-4828-ad77-7e644f87492e-image.png" class=" img-fluid img-markdown" /></p>
<p dir="auto">The <code>XCP-ng (Xen 4.13.0 / Linux 4.19.0+1)</code> uses the Xen and linux Kernel version from the last ISO installation or upgrade.</p>
<p dir="auto">A screenshot from the failed boot could be useful. I think the "dracut-initque timeout" is usually followed by some information about what failed. Could you also run <code>xen-bugtool -y</code> from the booted host, upload the resulting tar.gz somewhere and send me the link in a private message?</p>
<p dir="auto">It looks like it's a kernel issue, but since the boot option that works for you also reverts Xen to a previous version, the way to be sure would be to downgrade the kernel and then boot again:</p>
<pre><code># yum downgrade won't work for the kernel because it's a protected package, so let's use rpm
yumdownloader kernel-4.19.19-6.0.10.1.xcpng8.1
rpm -Uv --oldpackage kernel-4.19.19-6.0.10.1.xcpng8.1.x86_64.rpm
</code></pre>
]]></description><link>https://xcp-ng.org/forum/post/27661</link><guid isPermaLink="true">https://xcp-ng.org/forum/post/27661</guid><dc:creator><![CDATA[stormi]]></dc:creator><pubDate>Mon, 15 Jun 2020 09:33:59 GMT</pubDate></item><item><title><![CDATA[Reply to &quot;CROSSTalk&quot; CPU vulnerabilty (cross-core data leak) on Mon, 15 Jun 2020 07:36:37 GMT]]></title><description><![CDATA[<p dir="auto">Hi stormi,</p>
<p dir="auto">I know I am a bit late to report but I just updated my XCP-ng install from the main repo. I'm using an i3-7350K that shouldn't be vulnerable according to Intels list you posted.<br />
After the update default boot settings don't work, the loading screen stalls for a long time then prints a bunch of messages containing "dracut-initqueue timeout - starting timing scripts" followed by "could not boot" and stops there (I don't have the exact wording as I don't have access to the system right now).<br />
If I select safe boot in GRUB there is a kernel panic during boot "couldn't enable IOMMU and iommu=required/forced".<br />
Selecting the 4.19.0 kernel during boot works as usual.</p>
<p dir="auto">Is there anything else I could try?</p>
]]></description><link>https://xcp-ng.org/forum/post/27657</link><guid isPermaLink="true">https://xcp-ng.org/forum/post/27657</guid><dc:creator><![CDATA[demanzke]]></dc:creator><pubDate>Mon, 15 Jun 2020 07:36:37 GMT</pubDate></item><item><title><![CDATA[Reply to &quot;CROSSTalk&quot; CPU vulnerabilty (cross-core data leak) on Fri, 12 Jun 2020 16:03:25 GMT]]></title><description><![CDATA[<p dir="auto">Update published: <a href="https://xcp-ng.org/blog/2020/06/12/intel-microcode-security-update-crosstalk/" target="_blank" rel="noopener noreferrer nofollow ugc">https://xcp-ng.org/blog/2020/06/12/intel-microcode-security-update-crosstalk/</a></p>
]]></description><link>https://xcp-ng.org/forum/post/27591</link><guid isPermaLink="true">https://xcp-ng.org/forum/post/27591</guid><dc:creator><![CDATA[stormi]]></dc:creator><pubDate>Fri, 12 Jun 2020 16:03:25 GMT</pubDate></item><item><title><![CDATA[Reply to &quot;CROSSTalk&quot; CPU vulnerabilty (cross-core data leak) on Fri, 12 Jun 2020 08:57:24 GMT]]></title><description><![CDATA[<p dir="auto">As part of this update candidate, there is now a kernel update to lower the performance impact of the microcode update.</p>
<p dir="auto">We only have the testing results from one user for now. Can other users spare some hardware and time today?</p>
]]></description><link>https://xcp-ng.org/forum/post/27581</link><guid isPermaLink="true">https://xcp-ng.org/forum/post/27581</guid><dc:creator><![CDATA[stormi]]></dc:creator><pubDate>Fri, 12 Jun 2020 08:57:24 GMT</pubDate></item></channel></rss>