WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
   
 
 
Xen 
 
Home Products Support Community News
 
   
 

xen-devel

Re: [Xen-devel] NPT and EPT question

To: Tim Deegan <Tim.Deegan@xxxxxxxxxx>
Subject: Re: [Xen-devel] NPT and EPT question
From: Wei Huang <wei.huang2@xxxxxxx>
Date: Mon, 17 Nov 2008 16:27:42 -0600
Cc: bo ma <kyle.ma83@xxxxxxxxx>, xen-devel@xxxxxxxxxxxxxxxxxxx
Delivery-date: Mon, 17 Nov 2008 14:30:20 -0800
Envelope-to: www-data@xxxxxxxxxxxxxxxxxxx
In-reply-to: <20081117134123.GI25331@xxxxxxxxxxxxxxxxxxxxx>
List-help: <mailto:xen-devel-request@lists.xensource.com?subject=help>
List-id: Xen developer discussion <xen-devel.lists.xensource.com>
List-post: <mailto:xen-devel@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=unsubscribe>
References: <a784cc270811170523w307cfd41o163c5ce9f11090cd@xxxxxxxxxxxxxx> <20081117134123.GI25331@xxxxxxxxxxxxxxxxxxxxx>
Sender: xen-devel-bounces@xxxxxxxxxxxxxxxxxxx
User-agent: Thunderbird 2.0.0.17 (X11/20080914)
I think Tim is right. On my spec (24593, Dec 2005), it is explained as the following:

"Table walks for guest page tables are always treated as user writes at the host level. For this reason, * the page must be writable by user at the host level, or else a #VMEXIT(NPF) is raised, and * the dirty and accessed bits are always set in the host page table entries that were touched during nested page table walks for guest page table entries"

As explained in the second one, CPU needs to update guest table entries (A and D bits, especially A bit) when it walks through guest table. That is why the dirty and accessed bits are set in host table.

-Wei



Tim Deegan wrote:
Hi,

At 21:23 +0800 on 17 Nov (1226957017), bo ma wrote:
Recent I read AMD specification about NPT,and met with a question about a
sentence.

The sentence is : Note that host table walks for guest page tables are
always treated as data writes.I don't know why treated as data writes?

Possibly because the guest-table walker might have to set the A and D
bits, and the hardware doesn't know whether it will do that until
_after_ it's done the host-table walk.

Maybe someone from AMD can clarify.
In intel EPT ,is it the same? or treated as data reads?

My impression is that EPT only requires write permissions if it actually
writes back an A or D bit, but I'm not sure.   It should be easy to check.

Cheers,

Tim



_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel

<Prev in Thread] Current Thread [Next in Thread>