From issues-return-90642-archive-asf-public=cust-asf.ponee.io@cloudstack.apache.org Tue Mar 6 10:28:05 2018 Return-Path: X-Original-To: archive-asf-public@cust-asf.ponee.io Delivered-To: archive-asf-public@cust-asf.ponee.io Received: from mail.apache.org (hermes.apache.org [140.211.11.3]) by mx-eu-01.ponee.io (Postfix) with SMTP id 967C5180676 for ; Tue, 6 Mar 2018 10:28:04 +0100 (CET) Received: (qmail 37310 invoked by uid 500); 6 Mar 2018 09:28:03 -0000 Mailing-List: contact issues-help@cloudstack.apache.org; run by ezmlm Precedence: bulk List-Help: List-Unsubscribe: List-Post: List-Id: Reply-To: dev@cloudstack.apache.org Delivered-To: mailing list issues@cloudstack.apache.org Received: (qmail 37301 invoked by uid 500); 6 Mar 2018 09:28:03 -0000 Delivered-To: apmail-incubator-cloudstack-issues@incubator.apache.org Received: (qmail 37298 invoked by uid 99); 6 Mar 2018 09:28:03 -0000 Received: from pnap-us-west-generic-nat.apache.org (HELO spamd1-us-west.apache.org) (209.188.14.142) by apache.org (qpsmtpd/0.29) with ESMTP; Tue, 06 Mar 2018 09:28:03 +0000 Received: from localhost (localhost [127.0.0.1]) by spamd1-us-west.apache.org (ASF Mail Server at spamd1-us-west.apache.org) with ESMTP id 10897C0E25 for ; Tue, 6 Mar 2018 09:28:03 +0000 (UTC) X-Virus-Scanned: Debian amavisd-new at spamd1-us-west.apache.org X-Spam-Flag: NO X-Spam-Score: -109.511 X-Spam-Level: X-Spam-Status: No, score=-109.511 tagged_above=-999 required=6.31 tests=[ENV_AND_HDR_SPF_MATCH=-0.5, KAM_ASCII_DIVIDERS=0.8, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01, USER_IN_DEF_SPF_WL=-7.5, USER_IN_WHITELIST=-100] autolearn=disabled Received: from mx1-lw-eu.apache.org ([10.40.0.8]) by localhost (spamd1-us-west.apache.org [10.40.0.7]) (amavisd-new, port 10024) with ESMTP id 2Vcfy763gacx for ; Tue, 6 Mar 2018 09:28:02 +0000 (UTC) Received: from mailrelay1-us-west.apache.org (mailrelay1-us-west.apache.org [209.188.14.139]) by mx1-lw-eu.apache.org (ASF Mail Server at mx1-lw-eu.apache.org) with ESMTP id D7DB35FACE for ; Tue, 6 Mar 2018 09:28:01 +0000 (UTC) Received: from jira-lw-us.apache.org (unknown [207.244.88.139]) by mailrelay1-us-west.apache.org (ASF Mail Server at mailrelay1-us-west.apache.org) with ESMTP id E1FC9E030E for ; Tue, 6 Mar 2018 09:28:00 +0000 (UTC) Received: from jira-lw-us.apache.org (localhost [127.0.0.1]) by jira-lw-us.apache.org (ASF Mail Server at jira-lw-us.apache.org) with ESMTP id 40BCF21278 for ; Tue, 6 Mar 2018 09:28:00 +0000 (UTC) Date: Tue, 6 Mar 2018 09:28:00 +0000 (UTC) From: "ASF GitHub Bot (JIRA)" To: cloudstack-issues@incubator.apache.org Message-ID: In-Reply-To: References: Subject: [jira] [Commented] (CLOUDSTACK-10232) SystemVMs and VR to run as HVM on XenServer MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 7bit X-JIRA-FingerPrint: 30527f35849b9dde25b450d4833f0394 [ https://issues.apache.org/jira/browse/CLOUDSTACK-10232?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16387515#comment-16387515 ] ASF GitHub Bot commented on CLOUDSTACK-10232: --------------------------------------------- blueorangutan commented on issue #2465: CLOUDSTACK-10232: SystemVMs and VR to run as HVM on XenServer URL: https://github.com/apache/cloudstack/pull/2465#issuecomment-370718248 @DaanHoogland a Jenkins job has been kicked to build packages. I'll keep you posted as I make progress. ---------------------------------------------------------------- This is an automated message from the Apache Git Service. To respond to the message, please log on GitHub and use the URL above to go to the specific comment. For queries about this service, please contact Infrastructure at: users@infra.apache.org > SystemVMs and VR to run as HVM on XenServer > ------------------------------------------- > > Key: CLOUDSTACK-10232 > URL: https://issues.apache.org/jira/browse/CLOUDSTACK-10232 > Project: CloudStack > Issue Type: New Feature > Security Level: Public(Anyone can view this level - this is the default.) > Components: SystemVM, Virtual Router, XenServer > Affects Versions: 4.10.0.0, 4.9.3.0 > Reporter: Pierre-Luc Dion > Priority: Major > > Following the recent Meltdown-Spectre security risk,one of the mitigation,as of Jan 2018, for XenServer Hypervisor is to run Virtual-Machine in HVM mode. > Currently SystemVMs and Virtual-Routers run as PV on XenServer and the eth0 is configured using {{/etc/init.d/cloud-early-config}} using grub params from {{/proc/cmdline}}. When VM run as HVM, it is not possible to push initial boot instruction via pygrub. > Quick tests has been done using xenstore and it look like it would be possible to send same initial boot instruction has pygrub but using xenstore for HVM instances. -- This message was sent by Atlassian JIRA (v7.6.3#76005)