[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] Xen hypervisor external denial of service vulnerability?



On Tue, Feb 08, 2011 at 05:28:35PM +0100, Pim van Riezen wrote:
> On Feb 8, 2011, at 17:10 , Pim van Riezen wrote:
> 
> > 
> > On Feb 8, 2011, at 16:53 , Pasi Kärkkäinen wrote:
> > 
> >> On Tue, Feb 08, 2011 at 01:39:06PM +0100, Pim van Riezen wrote:
> >>> Addendum:
> >>> 
> >>>   The Dells are actually R715.
> >>>   The dom0 kernel is actually vmlinuz-2.6.18-194.32.1.el5xen
> >>> 
> >> 
> >> Have you gived dom0 fixed amount of memory, and also increase dom0 vcpu 
> >> weights
> >> so that dom0 will always get enough cpu time to take care of things? 
> > 
> > Fixed dom0_mem, yes.
> > Weighting, seems not, but just did a testrun with the dom0 weight set to 
> > 512. I got 2 task blocks on one node (that seems a new development) and the 
> > same plus another raw_safe_halt soft lockup on the other:
> 
> Also tried pinning 2 cpus for domain-0. Still soft lockups.
> 

Did you also make sure VMs don't use those 2 pcpus dedicated for dom0? 
You have to explicitly configure each VM not to use those pcpus.

-- Pasi


_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.