[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Xen Memory Sharing Query


  • To: "xen-devel@xxxxxxxxxxxxxxxxxxxx" <xen-devel@xxxxxxxxxxxxxxxxxxxx>
  • From: Marc Bonnici <Marc.Bonnici@xxxxxxx>
  • Date: Fri, 15 Jul 2022 15:56:46 +0000
  • Accept-language: en-GB, en-US
  • Arc-authentication-results: i=2; mx.microsoft.com 1; spf=pass (sender ip is 63.35.35.123) smtp.rcpttodomain=lists.xenproject.org smtp.mailfrom=arm.com; dmarc=pass (p=none sp=none pct=100) action=none header.from=arm.com; dkim=pass (signature was verified) header.d=armh.onmicrosoft.com; arc=pass (0 oda=1 ltdi=1 spf=[1,1,smtp.mailfrom=arm.com] dkim=[1,1,header.d=arm.com] dmarc=[1,1,header.from=arm.com])
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass header.d=arm.com; arc=none
  • Arc-message-signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=d6NyEoGTV5ehoXG7tuaM9ypqXVWZ0zpVIBlCr4aAS3M=; b=VA5gXmcpBmvTOhhgvOhU1wr8AOwZGt/T79i0GE4FW5BRLqnn8VGeORi8+lIRhZTHDg8hZZ5l3sVZE5Rl2RhJSFodDwTEE/VobTztLybUrhngpudm6O/+lsrJ5qSAM1mExpOjv0f+d5L3NHIE0zDfAGSeyT0GHg9+hXU0Bv5EGXWgUj7j77VNUz9lFIDf0HUxGZElXoWL8ssYii2q6py9OfXyyKmm26FfFA8Ba5q+z/og7trwPfg8W0MqfFl12ehNAjmWdotV9HRwh3NjZaSjNNYoeNxNBXdBOCbY9Zw8ZJqvz/xklc1TRll3X4d26zRyI7WtmiD0f3mj+agFJL3Msw==
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=d6NyEoGTV5ehoXG7tuaM9ypqXVWZ0zpVIBlCr4aAS3M=; b=As1orPsb8ZCqGKvLckMU0IuT+jBRxwbkFosSq7lCgoq+nEwTUikp7t/MvUOsta7Yl33K+AHNsB0eBo/c6DSA2JuiczwcngZHxvMsWSXRqIAMGLsxpCYg1hsldWASwyFspPvnE3jOKsk+9y+iGKEqVC5XjLV3B/Ki2r5gZ5P9Co2/IzyN8eaK7/ueY9MOsDKjW4hEaHo8C1OW8dLDh5YCcq+shNejOZz1nK2ZeZemPZdJhM4nm32z+TutohBuu04xrtSmZ45OluPCmxlw/Z6wOiqViXfvFVEspxcIHyvrG8l0n7aUXna5Aahs+6caYBvvVoG1Uq/6TOZItOYoPA48EQ==
  • Arc-seal: i=2; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=pass; b=DIB3r1lm6OGsylITK6rEPq3CWaScUL0/64Cn+QwFzR3J6ww/vfLBI6l1qe70EJ6QngHV54EC2uh87qqJBNdIEdPPMV2HRqONm0QzrPg0LWpAMxrT8EwpSNxLBvBtX7L5liVtHw3I5+yW7wshrnx6TGuIwMF2V6CnEamztsGuPvqoCLN7hnJM/n+oQxK0uaZBHMOFyS2QVMqO8/8gq5zWqFr85P5X0VHd/FFrZKmA6JdpM7l8dcP2mUN/9ZWY1tXpIi9AryNO7pKqLb8MkqGYTG8Bld9xBK9bgPahK3Kgw7DkoEmR1DhGe3+ARlWFy+JDhK6EZrVVHSm1uMfKy9AFMg==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=WyY4yX/gnNnOgPqA2xEbL6pTqIpJGyz15rR0N/CQVEMeqPZziuX86i/MiOmjSgXaplLCJW6lqwHT7yCDR7LDKV12ujdQtHeVhB7QZStQPVBSqYb3GlzKN97qEibZCESmD5reIM504FzyKNhfXQHh845WqRc95bidPa/8D95HC5jBE40pMBKoB4CLxizrQl1qnILNiK7KPGtfatMTrJK9lvhxCWrYQXekbh/rqjmbFWQtVrbdezWOC9XrYXQfA71dI/37NVl5t9d8O/jIrTviVTx17AtFbPtKQS3d6TUy1EVman2OZQf0FG3G16NYMlOJ86iEx6oQ5VGIVPuns3fE5Q==
  • Authentication-results-original: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=arm.com;
  • Delivery-date: Fri, 15 Jul 2022 15:57:13 +0000
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>
  • Nodisclaimer: true
  • Original-authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=arm.com;
  • Thread-index: AdiXcIvKzj1u3ooYRvOwLKlCsLdCEA==
  • Thread-topic: Xen Memory Sharing Query

Hi All,

I was wondering if someone could help me understand some of the rules of the 
memory sharing implementation in Xen?

Specifically I'm looking to understand what restrictions Xen places on
granting access from one Dom to another from Xen's perspective, and what types 
of grant requests would be allowed/rejected by Xen?

I.e. How would the situation be handled if the same frame of memory was 
attempted 
to be shared multiple times?

As an example scenario, DomA shares 1 physical page of memory in a transaction 
with DomB. And then without releasing any memory, DomA attempts to share
another region of memory, which includes the same physical page of the previous 
share
with DomB again. This would result in two concurrent shares containing an 
overlap.

Apologies if I've missed something but is there any documentation / threat model
that would cover these types of scenarios? So far I have been trying to read 
through 
the code but was wondering if there is something else I could refer to help me 
with my understanding?

Thanks 

Kind Regards,
Marc Bonnici 





 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.