WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
   
 
 
Xen 
 
Home Products Support Community News
 
   
 

xen-devel

Re: [Xen-devel] a quick question about _PAGE_GLOBAL flag in para virt mo

To: Jeremy Fitzhardinge <jeremy@xxxxxxxx>
Subject: Re: [Xen-devel] a quick question about _PAGE_GLOBAL flag in para virt mode
From: John Levon <levon@xxxxxxxxxxxxxxxxx>
Date: Sun, 15 Feb 2009 18:06:32 -0500
Cc: weiming <zephyr.zhao@xxxxxxxxx>, "xen-devel@xxxxxxxxxxxxxxxxxxx" <xen-devel@xxxxxxxxxxxxxxxxxxx>
Delivery-date: Sun, 15 Feb 2009 15:07:06 -0800
Envelope-to: www-data@xxxxxxxxxxxxxxxxxxx
In-reply-to: <49989685.6020004@xxxxxxxx>
List-help: <mailto:xen-devel-request@lists.xensource.com?subject=help>
List-id: Xen developer discussion <xen-devel.lists.xensource.com>
List-post: <mailto:xen-devel@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=unsubscribe>
References: <add59a3f0902141740j58f0223eu4d04a169885b6f54@xxxxxxxxxxxxxx> <4997E249.1050407@xxxxxxxx> <add59a3f0902150930m57ab843bi5bcdb90b6a4859a8@xxxxxxxxxxxxxx> <49989685.6020004@xxxxxxxx>
Sender: xen-devel-bounces@xxxxxxxxxxxxxxxxxxx
User-agent: Mutt/1.5.9i
On Sun, Feb 15, 2009 at 02:26:13PM -0800, Jeremy Fitzhardinge wrote:

> >why not set global bit for user kernel pages? I guess this is because 
> >when domain switchs, all tlb entries will still be flushed, so it's 
> >not necessary for user kernel pages. Is my understanding right?
> 
> 64-bit Xen uses paging to protect the guest kernel from guest usermode, 
> and protect Xen from the guest kernel, and as a result has to do a cr3 
> reload for any user->kernel switch (which is why it has to go via Xen).  
> We don't want kernel mappings to be visible to usermode, so they have to 
> only be in tlb while we're actually running in guest kernel mode; 

And here's a real example of what happens when you don't get this right:

http://blogs.sun.com/levon/entry/xen_compatibility_with_solaris

regards
john

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel