[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] Migration memory corruption - PV backends need to quiesce
At 12:14 +0200 on 30 Jun (1404126862), Tim Deegan wrote: > At 10:47 +0100 on 30 Jun (1404121679), David Vrabel wrote: > > Shared ring updates are strictly ordered with respect to the writes to > > data pages (either via grant map or grant copy). This means that is the > > guest sees a response in the ring it is guaranteed that all writes to > > the associated pages are also present. > > Is the ring update also strictly ordered wrt the grant unmap operation? > > > The write of the response and the write of the producer index are > > strictly ordered. If the backend is in the process of writing a > > response and the page is saved then the partial (corrupt) response is > > not visible to the guest. The write of the producer index is atomic so > > the saver cannot see a partial producer index write. > > Yes. The (suggested) problem is that live migration does not preserve > that write ordering. So we have to worry about something like this: > > 1. Toolstack pauses the domain for the final pass. Reads the final > LGD bitmap, which happens to include the shared ring but not the > data pages. > 2. Backend writes the data. > 3. Backend unmaps the data page, marking it dirty. > 4. Backend writes the ring. > 5. Toolstack sends the ring page across in the last pass. > 6. Guest resumes, seeing the I/O marked as complete, but without the > data. It occurs to me that the guest should be able to defend against this by taking a local copy of the response producer before migration and using _that_ for the replay logic afterwards. That is guaranteed to exclude any I/O that completed after the VM was paused, and as long as the unmap is guaranteed to happen before the ring update, we're OK. (That still leaves the question that Andrew raised of memcpy() breaking atomicity/ordering of updates.) Tim. _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |