WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
   
 
 
Xen 
 
Home Products Support Community News
 
   
 

xen-devel

[Xen-devel] Re: invalid PTE for xen_start-info ?

To: Keir Fraser <Keir.Fraser@xxxxxxxxxxxx>
Subject: [Xen-devel] Re: invalid PTE for xen_start-info ?
From: Rik van Riel <riel@xxxxxxxxxx>
Date: Wed, 04 Oct 2006 09:47:15 -0400
Cc: "xen-devel@xxxxxxxxxxxxxxxxxxx" <xen-devel@xxxxxxxxxxxxxxxxxxx>
Delivery-date: Wed, 04 Oct 2006 06:48:03 -0700
Envelope-to: www-data@xxxxxxxxxxxxxxxxxx
In-reply-to: <C1492AA0.2088%Keir.Fraser@xxxxxxxxxxxx>
List-help: <mailto:xen-devel-request@lists.xensource.com?subject=help>
List-id: Xen developer discussion <xen-devel.lists.xensource.com>
List-post: <mailto:xen-devel@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=unsubscribe>
Organization: Red Hat, Inc
References: <C1492AA0.2088%Keir.Fraser@xxxxxxxxxxxx>
Sender: xen-devel-bounces@xxxxxxxxxxxxxxxxxxx
User-agent: Thunderbird 1.5.0.4 (X11/20060614)
Keir Fraser wrote:
On 3/10/06 7:06 pm, "Rik van Riel" <riel@xxxxxxxxxx> wrote:

pte 0000000019800027 (real 0010000035010027)

That last PTE value does not look like a valid x86-64 PTE
value to me.  That high bit is not the NX bit, nor is it
within the physical address range of the system in question.

What's going on here?

Is this a bug you would like a fix for?

It's not a bug -- it's one of the available-for-software flags that is
stolen by Xen to indicate a kernel PTE. This is done so that we can
distinguish kernel and user mappings, so that the latter can have the global
bit set. Sounds weird, but it avoids flushing user mappings from the TLB
when executing syscalls (we have to change %cr3 value when switching between
guest-user and guest-kernel modes).

OK, so pte_val() just needs to know about these software flags
and mask them out before passing the value to mfn_to_pfn ?

--
"You don't have to be crazy to do this... but it helps." -- Bob Ross

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel