WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
   
 
 
Xen 
 
Home Products Support Community News
 
   
 

xen-devel

Re: [Xen-devel] Xen memory management

To: Jonathan Tripathy <jonnyt@xxxxxxxxxxx>
Subject: Re: [Xen-devel] Xen memory management
From: David Xu <davidxu06@xxxxxxxxx>
Date: Thu, 23 Jun 2011 21:37:06 -0400
Cc: xen-devel@xxxxxxxxxxxxxxxxxxx
Delivery-date: Thu, 23 Jun 2011 18:37:57 -0700
Dkim-signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:mime-version:in-reply-to:references:date :message-id:subject:from:to:cc:content-type; bh=xpr9Y9QgAqBSTOoquL1UK/4/Szdt2Qk/kZ/R9EKzOa8=; b=GRDvJwQ6Ei6/LUJ/aemVhqFvAm/RDzYeOFUEIykCfv3kNaOuM6MnntbPVqX8m2/McA DIOLxUY+J/fOHidd1DoiQEdq9E/ICwISLb0kiIB7qfhpbyBWczexN/nBIMZ/w5RhKgR6 p9xMFBYKrOuaks6uJiISHRVRTNB+vb1wz3j8c=
Domainkey-signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; b=t/8EVmQDK48HlA59jD08GMu9WGXXPggsWX06qfWjqNFrs42KusxCs89PPiQDwyhrH1 9ESo06VQiqpuDmg5d2olntS6iJQQGc39w29K47gRp9Or6RpTtkGdEQ+yTODBDoKBel+j ApYw0ZKtIGBTLaUTlciMe0/P7NPUvX+wRChhI=
Envelope-to: www-data@xxxxxxxxxxxxxxxxxxx
In-reply-to: <4E03D772.8080508@xxxxxxxxxxx>
List-help: <mailto:xen-devel-request@lists.xensource.com?subject=help>
List-id: Xen developer discussion <xen-devel.lists.xensource.com>
List-post: <mailto:xen-devel@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=unsubscribe>
References: <BANLkTinmK9UogogAk0kn6qzNS12BXmfbLQ@xxxxxxxxxxxxxx> <20110623092711.GU17634@xxxxxxxxxxxxxxxxxxxxxxx> <BANLkTi=WzAQ5dugc4Gwm1-5pStcGCt0SpQ@xxxxxxxxxxxxxx> <4E03BA38.6060003@xxxxxxxxxxx> <BANLkTikm5Q8DNHr1VTwO6zmZL_e_Xnea+g@xxxxxxxxxxxxxx> <4E03D772.8080508@xxxxxxxxxxx>
Sender: xen-devel-bounces@xxxxxxxxxxxxxxxxxxx
 On a shared-memory system with multi-core cpu, can one VM occupy all cache and prevent other VMs using cache efficiently?

Thanks for reply from all of you. I am reading a paper which tells some secure problem of Xen VMM. I am not familiar with something that is related to those problems. So I really need your help. Of course, please feel free to post your opinion. Anybody is welcome to have a discuss.

2011/6/23 Jonathan Tripathy <jonnyt@xxxxxxxxxxx>

On 24/06/2011 00:50, David Xu wrote:

2011/6/23 Jonathan Tripathy <jonnyt@xxxxxxxxxxx>

On 23/06/2011 23:08, David Xu wrote:
Thanks. My concern is that if several VMs are mapped to same memory, one VM may get something from the memory which has ever been used by another VM. This may cause some secure problems. 



Someone correct me if I'm wrong, but I'm pretty sure that a DomU kernel (If the flag is set correctly during compile time) will scrub (i.e. "zero") RAM first before releasing it to the Xen Hypervisor. Then hypervisor will then subsequently assign that bit of RAM to another domain.

Sounds good. Does Xen VMM can control the mapping between a part of memory and cache line? That is to say I wander whether Xen can guarantee different VMs will use different cache line. Thanks.

Regards,
Cong

Please don't top post :)

I'm not a Xen dev, so it would be great if a dev could let me know if I'm talking rubbish or not. However from my very limited knowledge of how CPU caches work (which comes from basic single CPU, non VMM related system), common sense would tell me that the cache line would be different for each DomU, as a CPUs cache is inherently linked to main memory (RAM). I believe that the process used to access data from memory is abstracted by the CPU, so assuming that Xen prevents access to RAM from another DomU, I guess it would make sense to say that any data that is cached in the CPU is protected.

Then again, I could be completly wrong......


_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel