[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[PATCH v2 0/3] xen/mm: limit in-place scrubbing


  • To: xen-devel@xxxxxxxxxxxxxxxxxxxx
  • From: Roger Pau Monne <roger.pau@xxxxxxxxxx>
  • Date: Thu, 15 Jan 2026 12:18:01 +0100
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com; dkim=pass header.d=citrix.com; arc=none
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=B9Cibf6lORNw9LbneDyZBJ7456XS35mADhwrOLDAMMw=; b=AqavF1uVKJXO0iCONMio9gCd5W7AheTQ/fAC7ntRzDLWEBClwxe60eJbS7oO5i93VZBnbnXFDwajj4vWbjicAdMCxXLSppg7ADM5qmZudcBwyVaEYd7WIk/z2hnprPJzPAS58vE0iTor/Fe5rBhM+IboNStkaeyXo7M8hNYu0+I8Rr9CgSvDAYmZ6VCnq2KL5P1GEjWhQOobibGGLPjYghcCxkguwKrLm6L4oeelRcTJqudH+eZpDcNGrSSFAJSZPqgNSeo88QA33m3VFsU9b90H08FkCcXikoU0mMtItUn4uPxSn1vTQxC/7ZDaJ4meA+pbtKEF+mZt/Louly3vXQ==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=yVc4aqOFZhHr5uOYPjB2PKpn4p2NFivFsXZy4h2BdorNh/EoH3UPbr9tvHcDI/jY1HGeF6jDaYap1oI1YcFuXi8ZtbxpaQLsvE9WXs8MJ5ktxBqahTugl6RdQDzHt9AIIw8M2ewi3744E2+iKD0qrUAfWqo+4XU+5JLD44VLNjPLiavYdOBi/36uPDCPE7vJnn4dV8f6eJVQJbS/vBz9wVsoIYpqsZ6bK3m9EDnQH8OZFuK4StGwC0WD9+Bb8ElN2obSynw5K7v6uGKQ7gD59NDrkrluR0Qks3cnmPiINMbp4YLh7+SdWjXBY03Nb3trB6zcj1mDvBCq/Qw9h8uxlw==
  • Authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=citrix.com;
  • Cc: Roger Pau Monne <roger.pau@xxxxxxxxxx>, Andrew Cooper <andrew.cooper3@xxxxxxxxxx>, Anthony PERARD <anthony.perard@xxxxxxxxxx>, Michal Orzel <michal.orzel@xxxxxxx>, Jan Beulich <jbeulich@xxxxxxxx>, Julien Grall <julien@xxxxxxx>, Stefano Stabellini <sstabellini@xxxxxxxxxx>
  • Delivery-date: Thu, 15 Jan 2026 11:19:20 +0000
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>

Hello,

In XenServer we have seen the watchdog occasionally triggering during
domain creation if 1GB pages are scrubbed in-place during physmap
population.  The following series attempt to mitigate this by adding
preemption to page scrubbing in populate_physmap().  Also a new limit
and command line option to signal the maximum allocation order when
doing in-place scrubbing.  This is set by default to
CONFIG_DOMU_MAX_ORDER.

Thanks, Roger.

Roger Pau Monne (3):
  xen/mm: enforce SCRUB_DEBUG checks for MEMF_no_scrub allocations
  xen/mm: allow deferred scrub of physmap populate allocated pages
  xen/mm: limit non-scrubbed allocations to a specific order

 docs/misc/xen-command-line.pandoc |   9 +++
 xen/common/domain.c               |  17 +++++
 xen/common/memory.c               | 105 +++++++++++++++++++++++++++++-
 xen/common/page_alloc.c           |  30 +++++++--
 xen/include/xen/mm.h              |   1 +
 xen/include/xen/sched.h           |   5 ++
 6 files changed, 161 insertions(+), 6 deletions(-)

-- 
2.51.0




 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.