WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
   
 
 
Xen 
 
Home Products Support Community News
 
   
 

xen-devel

RE: [Xen-devel] Live migration leaves page tables read-only?

To: "John Byrne" <john.l.byrne@xxxxxx>, "Ian Pratt" <m+Ian.Pratt@xxxxxxxxxxxx>
Subject: RE: [Xen-devel] Live migration leaves page tables read-only?
From: "Ian Pratt" <m+Ian.Pratt@xxxxxxxxxxxx>
Date: Sat, 9 Dec 2006 08:33:54 -0000
Cc: xen-devel <xen-devel@xxxxxxxxxxxxxxxxxxx>, Joe Bonasera <joe.bonasera@xxxxxxx>, Christian Limpach <Christian.Limpach@xxxxxxxxxxxxx>
Delivery-date: Sat, 09 Dec 2006 00:34:30 -0800
Envelope-to: www-data@xxxxxxxxxxxxxxxxxx
List-help: <mailto:xen-devel-request@lists.xensource.com?subject=help>
List-id: Xen developer discussion <xen-devel.lists.xensource.com>
List-post: <mailto:xen-devel@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=unsubscribe>
References: <456CD0A5.1060701@xxxxxx> <456CD2DC.2020201@xxxxxx> <8A87A9A84C201449A0C56B728ACF491E01FA12@xxxxxxxxxxxxxxxxxxxxxxxxxxx> <456CF5F9.7070009@xxxxxx> <456F6AF5.2090005@xxxxxx> <8A87A9A84C201449A0C56B728ACF491E01FA69@xxxxxxxxxxxxxxxxxxxxxxxxxxx> <457A4C68.6050800@xxxxxx>
Sender: xen-devel-bounces@xxxxxxxxxxxxxxxxxxx
Thread-index: AccbVKq1fWrDpnpGTAWeYhhO5z7SFAAFPpWw
Thread-topic: [Xen-devel] Live migration leaves page tables read-only?
 
> I finally ran down the problem. SAP is protecting the pages PROT_NONE,
> so the page-present bit in the pte is not set and
> canonicalize/uncanonicalize code in save/restore ignore the pte. I've
> attached a patch. It is possible that this change should be made to
the
> l1e tests in xc_ptrace.c; I'm not sure.

That's a good catch, thanks. Interesting that we hadn't seen this
before.

Although your patch works today, it will break when we add PSE (super
page) support for PV guests as it will confuse PROT_NONE with PSE.
Assuming PROT_NONE only makes sense for L1 entries, we can probably gate
the tests on whether the page table page is an L1 or not to fix this.

However, it does point out an issue for other OSes: Taking this patch
effectively makes Linux's PROT_NONE (flags 0x80 for a not present PTE)
part of the Xen API. We need to find out whether this is compatible with
*BSD and Solaris' use of flags for not present ptes.

Ian

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel