[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Xen Memory Sharing Query
- To: "xen-devel@xxxxxxxxxxxxxxxxxxxx" <xen-devel@xxxxxxxxxxxxxxxxxxxx>
- From: Marc Bonnici <Marc.Bonnici@xxxxxxx>
- Date: Fri, 15 Jul 2022 15:56:46 +0000
- Accept-language: en-GB, en-US
- Arc-authentication-results: i=2; mx.microsoft.com 1; spf=pass (sender ip is 63.35.35.123) smtp.rcpttodomain=lists.xenproject.org smtp.mailfrom=arm.com; dmarc=pass (p=none sp=none pct=100) action=none header.from=arm.com; dkim=pass (signature was verified) header.d=armh.onmicrosoft.com; arc=pass (0 oda=1 ltdi=1 spf=[1,1,smtp.mailfrom=arm.com] dkim=[1,1,header.d=arm.com] dmarc=[1,1,header.from=arm.com])
- Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass header.d=arm.com; arc=none
- Arc-message-signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=d6NyEoGTV5ehoXG7tuaM9ypqXVWZ0zpVIBlCr4aAS3M=; b=VA5gXmcpBmvTOhhgvOhU1wr8AOwZGt/T79i0GE4FW5BRLqnn8VGeORi8+lIRhZTHDg8hZZ5l3sVZE5Rl2RhJSFodDwTEE/VobTztLybUrhngpudm6O/+lsrJ5qSAM1mExpOjv0f+d5L3NHIE0zDfAGSeyT0GHg9+hXU0Bv5EGXWgUj7j77VNUz9lFIDf0HUxGZElXoWL8ssYii2q6py9OfXyyKmm26FfFA8Ba5q+z/og7trwPfg8W0MqfFl12ehNAjmWdotV9HRwh3NjZaSjNNYoeNxNBXdBOCbY9Zw8ZJqvz/xklc1TRll3X4d26zRyI7WtmiD0f3mj+agFJL3Msw==
- Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=d6NyEoGTV5ehoXG7tuaM9ypqXVWZ0zpVIBlCr4aAS3M=; b=As1orPsb8ZCqGKvLckMU0IuT+jBRxwbkFosSq7lCgoq+nEwTUikp7t/MvUOsta7Yl33K+AHNsB0eBo/c6DSA2JuiczwcngZHxvMsWSXRqIAMGLsxpCYg1hsldWASwyFspPvnE3jOKsk+9y+iGKEqVC5XjLV3B/Ki2r5gZ5P9Co2/IzyN8eaK7/ueY9MOsDKjW4hEaHo8C1OW8dLDh5YCcq+shNejOZz1nK2ZeZemPZdJhM4nm32z+TutohBuu04xrtSmZ45OluPCmxlw/Z6wOiqViXfvFVEspxcIHyvrG8l0n7aUXna5Aahs+6caYBvvVoG1Uq/6TOZItOYoPA48EQ==
- Arc-seal: i=2; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=pass; b=DIB3r1lm6OGsylITK6rEPq3CWaScUL0/64Cn+QwFzR3J6ww/vfLBI6l1qe70EJ6QngHV54EC2uh87qqJBNdIEdPPMV2HRqONm0QzrPg0LWpAMxrT8EwpSNxLBvBtX7L5liVtHw3I5+yW7wshrnx6TGuIwMF2V6CnEamztsGuPvqoCLN7hnJM/n+oQxK0uaZBHMOFyS2QVMqO8/8gq5zWqFr85P5X0VHd/FFrZKmA6JdpM7l8dcP2mUN/9ZWY1tXpIi9AryNO7pKqLb8MkqGYTG8Bld9xBK9bgPahK3Kgw7DkoEmR1DhGe3+ARlWFy+JDhK6EZrVVHSm1uMfKy9AFMg==
- Arc-seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=WyY4yX/gnNnOgPqA2xEbL6pTqIpJGyz15rR0N/CQVEMeqPZziuX86i/MiOmjSgXaplLCJW6lqwHT7yCDR7LDKV12ujdQtHeVhB7QZStQPVBSqYb3GlzKN97qEibZCESmD5reIM504FzyKNhfXQHh845WqRc95bidPa/8D95HC5jBE40pMBKoB4CLxizrQl1qnILNiK7KPGtfatMTrJK9lvhxCWrYQXekbh/rqjmbFWQtVrbdezWOC9XrYXQfA71dI/37NVl5t9d8O/jIrTviVTx17AtFbPtKQS3d6TUy1EVman2OZQf0FG3G16NYMlOJ86iEx6oQ5VGIVPuns3fE5Q==
- Authentication-results-original: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=arm.com;
- Delivery-date: Fri, 15 Jul 2022 15:57:13 +0000
- List-id: Xen developer discussion <xen-devel.lists.xenproject.org>
- Nodisclaimer: true
- Original-authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=arm.com;
- Thread-index: AdiXcIvKzj1u3ooYRvOwLKlCsLdCEA==
- Thread-topic: Xen Memory Sharing Query
Hi All,
I was wondering if someone could help me understand some of the rules of the
memory sharing implementation in Xen?
Specifically I'm looking to understand what restrictions Xen places on
granting access from one Dom to another from Xen's perspective, and what types
of grant requests would be allowed/rejected by Xen?
I.e. How would the situation be handled if the same frame of memory was
attempted
to be shared multiple times?
As an example scenario, DomA shares 1 physical page of memory in a transaction
with DomB. And then without releasing any memory, DomA attempts to share
another region of memory, which includes the same physical page of the previous
share
with DomB again. This would result in two concurrent shares containing an
overlap.
Apologies if I've missed something but is there any documentation / threat model
that would cover these types of scenarios? So far I have been trying to read
through
the code but was wondering if there is something else I could refer to help me
with my understanding?
Thanks
Kind Regards,
Marc Bonnici
|