[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] Xen hypervisor external denial of service vulnerability?


  • To: xen-devel@xxxxxxxxxxxxxxxxxxx
  • From: Pim van Riezen <pi@xxxxxxxxxxxxx>
  • Date: Tue, 8 Feb 2011 17:28:35 +0100
  • Cc:
  • Delivery-date: Tue, 08 Feb 2011 14:23:05 -0800
  • List-id: Xen developer discussion <xen-devel.lists.xensource.com>

On Feb 8, 2011, at 17:10 , Pim van Riezen wrote:

> 
> On Feb 8, 2011, at 16:53 , Pasi Kärkkäinen wrote:
> 
>> On Tue, Feb 08, 2011 at 01:39:06PM +0100, Pim van Riezen wrote:
>>> Addendum:
>>> 
>>>     The Dells are actually R715.
>>>     The dom0 kernel is actually vmlinuz-2.6.18-194.32.1.el5xen
>>> 
>> 
>> Have you gived dom0 fixed amount of memory, and also increase dom0 vcpu 
>> weights
>> so that dom0 will always get enough cpu time to take care of things? 
> 
> Fixed dom0_mem, yes.
> Weighting, seems not, but just did a testrun with the dom0 weight set to 512. 
> I got 2 task blocks on one node (that seems a new development) and the same 
> plus another raw_safe_halt soft lockup on the other:

Also tried pinning 2 cpus for domain-0. Still soft lockups.

Pi


_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.