[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [Xen-devel] Xen memory management
- To: Srujan Kotikela <ksrujandas@xxxxxxxxx>
- From: David Xu <davidxu06@xxxxxxxxx>
- Date: Fri, 24 Jun 2011 11:28:39 -0400
- Cc: xen-devel@xxxxxxxxxxxxxxxxxxx, Jonathan Tripathy <jonnyt@xxxxxxxxxxx>
- Delivery-date: Fri, 24 Jun 2011 08:29:16 -0700
- Domainkey-signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; b=fZZn1mju+pNHcgoAeul9r2MeZ/TRRAkKnIBFqWpsL2tENf2b1Ml5iAULLX/Hl2ef/o l6o7qWBm3d9gJn0UZPdLaIwprHkIfFu+iqihUIv3w9WZXWLYs/RPWhTVkC9OGKCIHCBC oVn9HVkfl4TEqLQOrJIClWJgiGSCTBsEmNyI4=
- List-id: Xen developer discussion <xen-devel.lists.xensource.com>
Hi,
I've read that paper you sent to me before, and the paper I am reading now isÂtruly related to that paper. The difference is that one is to create covert Âchannels between cooperatingÂprocesses running in diïerent VMs, the other is to infer something important of a victim VM from a attacking VM according to detected cache activity.ÂÂHowever the paper I am reading does not tell me how to trace the owner of the detected cache activity. Usually, there are many VMs on one cloud server. And the vCPUs of those VMs are frequently migrating among pCPUs. So the VM which shares LLC with the attacking VM is indeterminate. I think only detecting some cache activity without knowing its owner is not powerful.
Thanks, Cong 2011/6/24 Srujan Kotikela <ksrujandas@xxxxxxxxx>
ÂOn a shared-memory system with multi-core cpu,Âcan one VM occupy all cache and prevent other VMs using cache efficiently?
Thanks for reply from all of you. I am reading a paper which tells some secure problem of Xen VMM. I am not familiar with something that is related to those problems. So I really need your help. Of course, please feel free to post your opinion. Anybody is welcome to have a discuss.
2011/6/23 Jonathan Tripathy <jonnyt@xxxxxxxxxxx>
On 24/06/2011 00:50, David Xu wrote:
2011/6/23 Jonathan Tripathy <jonnyt@xxxxxxxxxxx>
On 23/06/2011 23:08, David Xu wrote:
Thanks. My concern is that if
several VMs are mapped to same memory, one VM may get
something from the memory which has ever been used by
another VM. This may cause some secure problems.Â
Someone correct me if I'm wrong, but I'm pretty sure that
a DomU kernel (If the flag is set correctly during compile
time) will scrub (i.e. "zero") RAM first before releasing
it to the Xen Hypervisor. Then hypervisor will then
subsequently assign that bit of RAM to another domain.
Sounds good. Does Xen VMM can control the mapping between a part
of memory and cache line? That is to say I wander whether Xen
can guarantee different VMs will use different cache line.
Thanks.
Regards,
Cong
Please don't top post :)
I'm not a Xen dev, so it would be great if a dev could let me know
if I'm talking rubbish or not. However from my very limited
knowledge of how CPU caches work (which comes from basic single CPU,
non VMM related system), common sense would tell me that the cache
line would be different for each DomU, as a CPUs cache is inherently
linked to main memory (RAM). I believe that the process used to
access data from memory is abstracted by the CPU, so assuming that
Xen prevents access to RAM from another DomU, I guess it would make
sense to say that any data that is cached in the CPU is protected.
Then again, I could be completly wrong......
Have a look at this:
_SDK
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel
|