[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[PATCH v5 0/4] xen/mm: limit in-place scrubbing


  • To: xen-devel@xxxxxxxxxxxxxxxxxxxx
  • From: Roger Pau Monne <roger.pau@xxxxxxxxxx>
  • Date: Fri, 30 Jan 2026 15:57:22 +0100
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com; dkim=pass header.d=citrix.com; arc=none
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=iq7LypTnBSn8i0P1LD1jgEQls24ME2uQhILN6C907Xk=; b=jQUXci0zbhTSOKSo75UU3Ub75kMZxeJr9Xv3BT/aQLUZybSqoSO0UU8NfR4XfkNaM2az4C8UKimZZS3SJeP8e91NeyQ1BeV2rtpoCQzbXUtF1Jamv16xUfFbP1Ielh3miAch4JG6n+ZV5Hl87zWOALpihcBJ9Mix9s5kZqRwPiGeP9eTIzhIeNJ9R9V2TI140EOw3ALmZKKYxxGIgvs6F/4Pw6BM0BgqlNCiUbI8AoxdqzTHjf+EUt4sYlSl6KvCaMPN81mgqAaWlqm++bH4dj0arJQN0dG4h5M7eBRLCi90KptyiTy3MlyG/6Zs63UvVR/7DmEz4qr61OMYUfK7yw==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=QdSFwI8CbbaT/VSru3+8GrBlUltiG64RR6XfFjabBRlFjJSzLGneaYqVtlVwVIWMR+auY9ncuHzMGVhjPdq/8XEs5EwfKRIeeTLC5tGxc7PHAZSjrbQ12I9kiVAHDiFE+s0B8ku+Fv3FF8h6wCnJ5InAT+WYtCimEtuyCdSJxxTLG97FeXWq8gYAQyBBxAA3qoD1qzOJXOLCR3qBFFgP/RqZHrH+yKyMX2fQzdP7Ag6fenZk/oiOXXQWe3GuUT5Za4sHt6Fa+X1CsNl78hmxx3wApwUWS+Kf4dTPgTvGxqpKgyU8PObOa7tIPoY4wSUy162C7F0dPtpGlpwb3crOww==
  • Authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=citrix.com;
  • Cc: Roger Pau Monne <roger.pau@xxxxxxxxxx>, Stefano Stabellini <sstabellini@xxxxxxxxxx>, Julien Grall <julien@xxxxxxx>, Bertrand Marquis <bertrand.marquis@xxxxxxx>, Michal Orzel <michal.orzel@xxxxxxx>, Volodymyr Babchuk <Volodymyr_Babchuk@xxxxxxxx>, Andrew Cooper <andrew.cooper3@xxxxxxxxxx>, Anthony PERARD <anthony.perard@xxxxxxxxxx>, Jan Beulich <jbeulich@xxxxxxxx>, Timothy Pearson <tpearson@xxxxxxxxxxxxxxxxxxxxx>, Alistair Francis <alistair.francis@xxxxxxx>, Connor Davis <connojdavis@xxxxxxxxx>, Oleksii Kurochko <oleksii.kurochko@xxxxxxxxx>
  • Delivery-date: Fri, 30 Jan 2026 15:00:11 +0000
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>

Hello,

In XenServer we have seen the watchdog occasionally triggering during
domain creation if 1GB pages are scrubbed in-place during physmap
population.  The following series attempt to mitigate this by adding
preemption to page scrubbing in populate_physmap().  Also a new limit
and command line option to signal the maximum allocation order when
doing in-place scrubbing.  This is set by default to
CONFIG_PTDOM_MAX_ORDER.

Thanks, Roger.

Roger Pau Monne (4):
  xen/mm: remove aliasing of PGC_need_scrub over PGC_allocated
  xen/mm: enforce SCRUB_DEBUG checks for MEMF_no_scrub allocations
  xen/mm: allow deferred scrub of physmap populate allocated pages
  xen/mm: limit non-scrubbed allocations to a specific order

 docs/misc/xen-command-line.pandoc |  13 ++++
 xen/arch/arm/include/asm/mm.h     |  10 +--
 xen/arch/ppc/include/asm/mm.h     |  10 +--
 xen/arch/riscv/include/asm/mm.h   |  10 +--
 xen/arch/x86/include/asm/mm.h     |  18 ++---
 xen/common/domain.c               |  24 +++++++
 xen/common/memory.c               | 108 ++++++++++++++++++++++++++++--
 xen/common/page_alloc.c           |  32 +++++++--
 xen/include/xen/mm.h              |  14 ++++
 xen/include/xen/sched.h           |   5 ++
 10 files changed, 202 insertions(+), 42 deletions(-)

-- 
2.51.0




 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.