[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[PATCH v4 0/3] xen/mm: limit in-place scrubbing


  • To: xen-devel@xxxxxxxxxxxxxxxxxxxx
  • From: Roger Pau Monne <roger.pau@xxxxxxxxxx>
  • Date: Wed, 28 Jan 2026 13:03:36 +0100
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com; dkim=pass header.d=citrix.com; arc=none
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=AASb60VUGh7C4L8MvrD+m88IZPP9u1JUX4R81RrzRjg=; b=g2adKCzHZuOtThy6SSvtcZEvfBFI1BO7+maitdpBG//bAI9RFsrVaA3DtBCEghw2oL1InoQ3b4NPhqk5wRzeDJc6EJJdiIFTxHsf6rHsgBPuJ6LmJX/CAGQcc0ASntRxs7C+GwWHIY3lAS+qKhaRIoD6gJnTyI9LYzWDUWwGOsUK4T6Yd78YLPbPFL71R5iyXXh3wJPKusq9GB7uiUZwKZZEWHxUrAa1ZGB4uwb5ovJa1MmQPnJt/Lz6ZOxvwGe3xIonutMmwPvIWFrOcAXiIVOkzzEGnj7A+4c/scvbpQ3vu6hMFj6C9lWYTWDhiWFbplG6fj33fgT0mqgWK8KEqw==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=cwfjTNw5oiEP538dN7OsG4dLxvWx7xR+UbQ4vBewMQei5PPrrCxrit526ftUIquR3tJ1D1MJnnH+E7Pd5M3WsHDxOV4sVwR4uOf+knb5yj9CK3ofOMveHAbFbFaQy8Uhc8k2DSlGwsXKeGZ65CurH4eAdGLhB2bNUlL4gX+JcKgjXcL8LbarAKK0ghV2o8mxbhopbp9D4RFjIIfrlX3q2ul9TXZ3xvcaBvECSvlSpycMp9+KzEKH5m9YlS864nLCxsMf5DNwC3+qzPYMuIvOT+wqwuX1iwaOnD3eFbgIHh98+iqpnsmT7Dc+1zl1cxoaIMeW+WfHQdpEaV2JFYr0+A==
  • Authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=citrix.com;
  • Cc: Roger Pau Monne <roger.pau@xxxxxxxxxx>, Andrew Cooper <andrew.cooper3@xxxxxxxxxx>, Anthony PERARD <anthony.perard@xxxxxxxxxx>, Michal Orzel <michal.orzel@xxxxxxx>, Jan Beulich <jbeulich@xxxxxxxx>, Julien Grall <julien@xxxxxxx>, Stefano Stabellini <sstabellini@xxxxxxxxxx>
  • Delivery-date: Wed, 28 Jan 2026 12:03:53 +0000
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>

Hello,

In XenServer we have seen the watchdog occasionally triggering during
domain creation if 1GB pages are scrubbed in-place during physmap
population.  The following series attempt to mitigate this by adding
preemption to page scrubbing in populate_physmap().  Also a new limit
and command line option to signal the maximum allocation order when
doing in-place scrubbing.  This is set by default to
CONFIG_PTDOM_MAX_ORDER.

Thanks, Roger.

Roger Pau Monne (3):
  xen/mm: enforce SCRUB_DEBUG checks for MEMF_no_scrub allocations
  xen/mm: allow deferred scrub of physmap populate allocated pages
  xen/mm: limit non-scrubbed allocations to a specific order

 docs/misc/xen-command-line.pandoc |  13 ++++
 xen/common/domain.c               |  30 +++++++++
 xen/common/memory.c               | 104 ++++++++++++++++++++++++++++--
 xen/common/page_alloc.c           |  30 +++++++--
 xen/include/xen/mm.h              |  14 ++++
 xen/include/xen/sched.h           |   5 ++
 6 files changed, 187 insertions(+), 9 deletions(-)

-- 
2.51.0




 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.