WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
   
 
 
Xen 
 
Home Products Support Community News
 
   
 

xen-devel

Re: [Xen-devel] Shadow Page Tables in Xen

To: Gianluca Guida <glguida@xxxxxxxxx>
Subject: Re: [Xen-devel] Shadow Page Tables in Xen
From: priya sehgal <priyagps@xxxxxxxxxxx>
Date: Fri, 24 Apr 2009 10:03:26 +0530 (IST)
Cc: Tim Deegan <Tim.Deegan@xxxxxxxxxxxxx>, "xen-devel@xxxxxxxxxxxxxxxxxxx" <xen-devel@xxxxxxxxxxxxxxxxxxx>
Delivery-date: Thu, 23 Apr 2009 21:33:51 -0700
Dkim-signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.co.in; s=s1024; t=1240547606; bh=P1p6ifG0Kcw6xLnPIka61mfblJSK/yFMWGrDaV9ngoQ=; h=Message-ID:X-YMail-OSG:Received:X-Mailer:Date:From:Subject:To:Cc:MIME-Version:Content-Type; b=OYdOmM7jEu0CJW8tWcamD9K37xrT6NCh646yWh4zp3KLVQ4jT8Q/iFlLUs1v53cR0015T1IoFV+NUynZmQI4CdJMz5IJpjHJfxP809TsTTCJy1+BoHlrAzbiLft+peNnSWbbANOV2D5F+R10Q8VxjpBays50MbLH4Aa91AX7URQ=
Domainkey-signature: a=rsa-sha1; q=dns; c=nofws; s=s1024; d=yahoo.co.in; h=Message-ID:X-YMail-OSG:Received:X-Mailer:Date:From:Subject:To:Cc:MIME-Version:Content-Type; b=jrP7TV4nu0pCkOBqfDbyxeCSwddpSjggQ4Ces4C0+8s74sx+R/fy4yDWSiRRWTTLWadX9AIBNb8v/THIkL+5FcVf8Gx8TbEz338HnnApbkiO7XSrFyskWuWvij9LCUlxGKFkfDc4OwW46szBhFjzhM8pqax1i27nViuZIpKHAjo=;
Envelope-to: www-data@xxxxxxxxxxxxxxxxxxx
List-help: <mailto:xen-devel-request@lists.xensource.com?subject=help>
List-id: Xen developer discussion <xen-devel.lists.xensource.com>
List-post: <mailto:xen-devel@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=unsubscribe>
Sender: xen-devel-bounces@xxxxxxxxxxxxxxxxxxx
> Ok that seems, but please note that at the moment shadows
> always set the DIRTY bit (unless we're tracking a VRAM
> address), so you might have to set the dirty bit clean when
> propagating the shadow, which is a bit too intrusive
> perhaps. But yes, that would work.
> 

I see one problem, which we might introduce by making the SPTE entries of
all the pages in the group RW, but not marking their corresponding GPTE entry 
as DIRTY -- if the Guest writes to a page (marked as RW in SPTE) and makes it 
dirty, there is no way Hypervisor will know about it, and so it cannot mark 
GPTE's entry as DIRTY. This might lead to inconsistency between the shadow and 
guest page tables. Also, the OS running inside the guest will not see correct 
picture about the dirty pages, thereby not flushing the dirty pages.

Please let me know if I am right about the problem created due to our proposed 
implementation.

Thanks.
Priya


      

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel