WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
   
 
 
Xen 
 
Home Products Support Community News
 
   
 

xen-devel

[Xen-devel] page table pages with checkpoint functionality

To: xen-devel@xxxxxxxxxxxxxxxxxxx, brendan@xxxxxxxxx
Subject: [Xen-devel] page table pages with checkpoint functionality
From: 박은병 <peb1611@xxxxxxxxx>
Date: Tue, 11 May 2010 21:04:17 +0900
Cc:
Delivery-date: Tue, 11 May 2010 05:05:23 -0700
Dkim-signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:mime-version:received:received:date:message-id :subject:from:to:content-type; bh=mpe+Ts3/Re1QoLAX2Sv8qzDEhSaQTyGEv2/wwrPQMUI=; b=PhztmLRGyDvoI2VomIpzL833w0FXNDGbS6fRLdO8pF+xBju4Ji8dqOwZc/Y2UEyhSW 4hado3/2gyS8TUUftbBJyTK26onFICETn10ArjB+Dz02lXX8AlfheHFZWiWoLgEljMeY /0Z1E6TBPu9sLsSPW+86Du+3z9iPi6W2UAXxM=
Domainkey-signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:date:message-id:subject:from:to:content-type; b=aaYdJgTNSx+YcvGzaIJLrUeVEWyQosMqE33mmhKIGE6UM0eH2BedALTLPC+AFvFM6X UaMI8UPPwbF2rw5PPAj2RaMCnUoFPcXs+hYpK2BeJSQk8KeP68mvc5XD044oR2qEq83O mFW5QOYxaE9gmNX7XI7o4CRotulkc6eT16XeM=
Envelope-to: www-data@xxxxxxxxxxxxxxxxxxx
List-help: <mailto:xen-devel-request@lists.xensource.com?subject=help>
List-id: Xen developer discussion <xen-devel.lists.xensource.com>
List-post: <mailto:xen-devel@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=unsubscribe>
Sender: xen-devel-bounces@xxxxxxxxxxxxxxxxxxx
Hi, all

I am analyzing the xen source about checkpoint functionality (tools/libxc/xc_domain_save.c, xc_domain_restore.c)

during saving page table pages to disk or another machine( in the case of live migration), those pages should be canonicalized,
which means that references to actual mfns are replaced with references to the corresponding pfns

I can understand that, but I could see the another point that I can't understand

After printing out the page table entries, I found that most of page table entries has _PAGE_DIRTY, _PAGE_ACCESSED, _PAGE_RW bit.

As soon as guest OS's booting is completed, I checkpointed the guest OS. (command is xm save [domainU])

L1 pagetable pages:341
L2 pagetable pages:71
L3 pagetable pages:19
L4 pagetable pages:0
(the number of L4 is 0 because of I have used PAE enabled xen)

As futher investigating, L1 page table entries,

page table entries that have _PAGE_DIRTY :131951
page table entries that have _PAGE_ACCESSED :133960
page table entries that have _PAGE_RW :129787

In PAE enabled level 3 paging, each L1 page table has 512 entries, so total entries 341*512 = 174592
70~80% ptes have those bits

I make sense of many _PAGE_ACCESSED bits.
but, why do those pages have another 2 bits??

Thanks.
--
Eunbyung Park
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel
<Prev in Thread] Current Thread [Next in Thread>
  • [Xen-devel] page table pages with checkpoint functionality, 박은병 <=