Dear Xen developers,

Recently I read a paper about possible theft of service attacks in Xen hypervisor.

https://arxiv.org/pdf/1103.0759.pdf

Due to the 10 ms intervals between sampling points, a malicious VM is able to run less than a interval and sleep to avoid being accounted.

According to the info page of RTDS, it seems that after V4.7, a RTDS based scheduler achieves a granularity of microsecond. However, is it able that a VM runs for less than a microsecond and relinquish the host actively so as to keep its budget?

A similar problem occurs in earlier Linux kernel, and it is fixed in today's Linux on x86 machines by utilizing a clock source TSC with a granularity of nanoseconds. I'd like to know if there is any reason that the Xen hypervisor does not choose a nanosecond scheduler?

Thanks a lot.

Best,

Wenqiu


_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel

Reply via email to