WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
Xen

xen-devel

[Top] [All Lists]

Re: [Xen-devel] Live migration leaves page tables read-only?

To: Ian Pratt <m+Ian.Pratt@xxxxxxxxxxxx>
Subject: Re: [Xen-devel] Live migration leaves page tables read-only?
From: Joe Bonasera <joe.bonasera@xxxxxxx>
Date: 2006年12月11日 09:00:37 -0800
Cc: Christian Limpach <Christian.Limpach@xxxxxxxxxxxxx>, xen-devel <xen-devel@xxxxxxxxxxxxxxxxxxx>, John Byrne <john.l.byrne@xxxxxx>
Delivery-date: 2006年12月11日 08:53:50 -0800
Envelope-to: www-data@xxxxxxxxxxxxxxxxxx
In-reply-to: <8A87A9A84C201449A0C56B728ACF491E04EE29@xxxxxxxxxxxxxxxxxxxxxxxxxxx>
List-help: <mailto:xen-devel-request@lists.xensource.com?subject=help>
List-id: Xen developer discussion <xen-devel.lists.xensource.com>
List-post: <mailto:xen-devel@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=unsubscribe>
References: <456CD0A5.1060701@xxxxxx> <456CD2DC.2020201@xxxxxx> <8A87A9A84C201449A0C56B728ACF491E01FA12@xxxxxxxxxxxxxxxxxxxxxxxxxxx> <456CF5F9.7070009@xxxxxx> <456F6AF5.2090005@xxxxxx> <8A87A9A84C201449A0C56B728ACF491E01FA69@xxxxxxxxxxxxxxxxxxxxxxxxxxx> <457A4C68.6050800@xxxxxx> <8A87A9A84C201449A0C56B728ACF491E04EE29@xxxxxxxxxxxxxxxxxxxxxxxxxxx>
Sender: xen-devel-bounces@xxxxxxxxxxxxxxxxxxx
User-agent: Thunderbird 1.5.0.5 (X11/20060925)
Ian Pratt wrote:
I finally ran down the problem. SAP is protecting the pages PROT_NONE,
so the page-present bit in the pte is not set and
canonicalize/uncanonicalize code in save/restore ignore the pte. I've
attached a patch. It is possible that this change should be made to
the
l1e tests in xc_ptrace.c; I'm not sure.
That's a good catch, thanks. Interesting that we hadn't seen this
before.
Although your patch works today, it will break when we add PSE (super
page) support for PV guests as it will confuse PROT_NONE with PSE.
Assuming PROT_NONE only makes sense for L1 entries, we can probably gate
the tests on whether the page table page is an L1 or not to fix this.
However, it does point out an issue for other OSes: Taking this patch
effectively makes Linux's PROT_NONE (flags 0x80 for a not present PTE)
part of the Xen API. We need to find out whether this is compatible with
*BSD and Solaris' use of flags for not present ptes.
Ian
Solaris implements PROT_NONE by entirely invalidating the PTE (ie. it
becomes zero). Hence our PTEs always had either zero or have the PRESENT
bit set. The only exception to this was adding some fixage to allow
for the old Xen writable page table approach which temporarily made
the upper table non-PRESENT.
So you can make not-present, but non-zero entries mean anything you want.
As long as it's the guest OS that creates the entries, we'll just not do it.
Joe
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel
<Prev in Thread] Current Thread [Next in Thread>
Previous by Date: Re: [Xen-devel] xm dump-core and analyzing , Dave Anderson
Next by Date: RE: [Xen-devel] Live migration leaves page tables read-only? , Ian Pratt
Previous by Thread: Re: [Xen-devel] Live migration leaves page tables read-only? , Keir Fraser
Next by Thread: RE: [Xen-devel] Live migration leaves page tables read-only? , Ian Pratt
Indexes: [Date] [Thread] [Top] [All Lists]

Copyright ©, Citrix Systems Inc. All rights reserved. Legal and Privacy
Citrix This site is hosted by Citrix

AltStyle によって変換されたページ (->オリジナル) /