WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
   
 
 
Xen 
 
Home Products Support Community News
 
   
 

xen-devel

Re: [Xen-devel] Live migration leaves page tables read-only?

To: Ian Pratt <m+Ian.Pratt@xxxxxxxxxxxx>, John Byrne <john.l.byrne@xxxxxx>
Subject: Re: [Xen-devel] Live migration leaves page tables read-only?
From: Keir Fraser <keir@xxxxxxxxxxxxx>
Date: Sat, 09 Dec 2006 09:22:42 +0000
Cc: xen-devel <xen-devel@xxxxxxxxxxxxxxxxxxx>, Christian Limpach <Christian.Limpach@xxxxxxxxxxxxx>, Joe Bonasera <joe.bonasera@xxxxxxx>
Delivery-date: Sat, 09 Dec 2006 01:22:58 -0800
Envelope-to: www-data@xxxxxxxxxxxxxxxxxx
In-reply-to: <8A87A9A84C201449A0C56B728ACF491E04EE29@xxxxxxxxxxxxxxxxxxxxxxxxxxx>
List-help: <mailto:xen-devel-request@lists.xensource.com?subject=help>
List-id: Xen developer discussion <xen-devel.lists.xensource.com>
List-post: <mailto:xen-devel@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=unsubscribe>
Sender: xen-devel-bounces@xxxxxxxxxxxxxxxxxxx
Thread-index: AccbVKq1fWrDpnpGTAWeYhhO5z7SFAAFPpWwAAJ7t6M=
Thread-topic: [Xen-devel] Live migration leaves page tables read-only?
User-agent: Microsoft-Entourage/11.2.5.060620
On 9/12/06 8:33 am, "Ian Pratt" <m+Ian.Pratt@xxxxxxxxxxxx> wrote:

> Although your patch works today, it will break when we add PSE (super
> page) support for PV guests as it will confuse PROT_NONE with PSE.
> Assuming PROT_NONE only makes sense for L1 entries, we can probably gate
> the tests on whether the page table page is an L1 or not to fix this.
> 
> However, it does point out an issue for other OSes: Taking this patch
> effectively makes Linux's PROT_NONE (flags 0x80 for a not present PTE)
> part of the Xen API. We need to find out whether this is compatible with
> *BSD and Solaris' use of flags for not present ptes.

If _PAGE_PRESENT is clear then the other N-1 bits can be assumed available
for things like swapcache info. Making assumptions about not-present PTEs is
not really tenable.

 -- Keir


_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel