From nobody Sat Feb 7 05:14:43 2026 Delivered-To: importer@patchew.org Received-SPF: pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) client-ip=192.237.175.120; envelope-from=xen-devel-bounces@lists.xenproject.org; helo=lists.xenproject.org; Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; arc=pass (i=1 dmarc=pass fromdomain=citrix.com); dmarc=pass(p=reject dis=none) header.from=citrix.com ARC-Seal: i=2; a=rsa-sha256; t=1769785238; cv=pass; d=zohomail.com; s=zohoarc; b=NQS2BgP6Jjs6fdyZhAe88onB7fBFpX1+uRArsdo/C+uUy7mDXzEjze7cbXl+CCvbTxP4rI/1nMM3oYM1Fg1XkwDvDrUKqsMPp+n0x7tyw9N4tVSTy7b1/bOdlP+CRFoVap7WvDplgOMSv3GpTns3jx3nVeriOE4cIEweRuPPwBQ= ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1769785238; h=Content-Type:Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=meYD0sEYsHml9Llwi+NW6eF01LWKICbMJckmF1mY/m0=; b=KXtyUJ9h/LCKr9jZb6brk3Iod8moBP9Gd7IQcvYFf81fWR+CE4aUunJB/+dLuASX3dnZYuf5iEweFbBqzisBfKUH/bVfgiE0bg6t0UE3b5hFHXWs3p+aRzGzvNDcI4L2Ce9nhGyxUF19vR7+Iof+NtAS5ebm9CNnqGLi+koFQpg= ARC-Authentication-Results: i=2; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; arc=pass (i=1 dmarc=pass fromdomain=citrix.com); dmarc=pass header.from= (p=reject dis=none) Return-Path: Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) by mx.zohomail.com with SMTPS id 1769785238164470.8144664835455; Fri, 30 Jan 2026 07:00:38 -0800 (PST) Received: from list by lists.xenproject.org with outflank-mailman.1217649.1527028 (Exim 4.92) (envelope-from ) id 1vlpyh-0007ew-25; Fri, 30 Jan 2026 15:00:07 +0000 Received: by outflank-mailman (output) from mailman id 1217649.1527028; Fri, 30 Jan 2026 15:00:07 +0000 Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1vlpyg-0007ep-TJ; Fri, 30 Jan 2026 15:00:06 +0000 Received: by outflank-mailman (input) for mailman id 1217649; Fri, 30 Jan 2026 15:00:05 +0000 Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50] helo=se1-gles-flk1.inumbo.com) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1vlpyf-0007Ra-A5 for xen-devel@lists.xenproject.org; Fri, 30 Jan 2026 15:00:05 +0000 Received: from BL0PR03CU003.outbound.protection.outlook.com (mail-eastusazlp170120007.outbound.protection.outlook.com [2a01:111:f403:c101::7]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS id 4f70d9df-fdec-11f0-9ccf-f158ae23cfc8; Fri, 30 Jan 2026 15:59:45 +0100 (CET) Received: from CH7PR03MB7860.namprd03.prod.outlook.com (2603:10b6:610:24e::14) by BY5PR03MB5329.namprd03.prod.outlook.com (2603:10b6:a03:22a::23) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9564.7; Fri, 30 Jan 2026 14:59:41 +0000 Received: from CH7PR03MB7860.namprd03.prod.outlook.com ([fe80::f5ba:35df:1c9f:b343]) by CH7PR03MB7860.namprd03.prod.outlook.com ([fe80::f5ba:35df:1c9f:b343%4]) with mapi id 15.20.9564.010; Fri, 30 Jan 2026 14:59:41 +0000 X-Outflank-Mailman: Message body and most headers restored to incoming version X-BeenThere: xen-devel@lists.xenproject.org List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xenproject.org Precedence: list Sender: "Xen-devel" X-Inumbo-ID: 4f70d9df-fdec-11f0-9ccf-f158ae23cfc8 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=Z2x1IMFuX7Zomi/n4dSqdxB0Xsl9uqQuppmyVkLG617Yj/DiQXg+SwzXErTpvo5RlHTuGPK1kTyRNaru1yOsqyflUWCvrO/oF3L3NqGrbtA8ffU5ETFOVOwuEgtTdUfSFhJgaVuhQcDar5/zRmGAqV41lsBPPpFREpIFMWJgoNBCZIYOGXTKZ/IDrt/QcW08bPyH5eifj1zPv3sfrF82oYRjUG7XBotPDVSxZ039KYlHyXly6JHYgQbOrg0m/RMPXM9Lm/uRCt6if5dq9DGw7oRQZz4w+c3us2dqGNUqnoLhXkNfnYmx7FrV8FkbNuUU8HFQwXNjL0TPBj3D6D+NLQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=meYD0sEYsHml9Llwi+NW6eF01LWKICbMJckmF1mY/m0=; b=VAyzHajGiZylf3mnDaSM40Trx9ljutGbBjTfmrOW5sqnxoRYVI8auXVeffHczylFXqvXRCjA0X3S1J9lHitT+IvLyxb+jAIeaXI1C3r20xSg/M39LrlRBXG73W5YSufIB9mjStyH3yNbEuazGp6cQ9GlQfDmMAnSnWV4xrU31RJVT8hcoCwLa67UGvu//Vx3F5sZ1MYxxR+VQNCt/2eprEiVlJaKtkGfYt/+o1fpbyn4C9fBBHIEg03Weo4sgPk58I6ZpreyXyiMw8rjSIKtFUfXmRKhkTUsKqdnSkO2Ukase+YYy69hmVOyvwa/4KSGF4Cit1X/RW90NN9uYFJJCg== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com; dkim=pass header.d=citrix.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=citrix.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=meYD0sEYsHml9Llwi+NW6eF01LWKICbMJckmF1mY/m0=; b=AxHgvW97gqJIJiM/oWIoCFK5AGXJnwHSxC6geyWrbs95xsoQwKU55BzOZvHbOOqsZtbPbBezg3c1YxGA2Yi6Ob9mEZzWqMcIjdw0hPFdZOVAa4UEN8M9maaLyaM5ppTKTqEgaKJNLexbyoXRFP/K6280YTKtChtp0RVw4quuAqM= Authentication-Results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=citrix.com; From: Roger Pau Monne To: xen-devel@lists.xenproject.org Cc: Roger Pau Monne , Stefano Stabellini , Julien Grall , Bertrand Marquis , Michal Orzel , Volodymyr Babchuk , Andrew Cooper , Anthony PERARD , Jan Beulich , Timothy Pearson , Alistair Francis , Connor Davis , Oleksii Kurochko Subject: [PATCH v5 1/4] xen/mm: remove aliasing of PGC_need_scrub over PGC_allocated Date: Fri, 30 Jan 2026 15:57:23 +0100 Message-ID: <20260130145726.85907-2-roger.pau@citrix.com> X-Mailer: git-send-email 2.51.0 In-Reply-To: <20260130145726.85907-1-roger.pau@citrix.com> References: <20260130145726.85907-1-roger.pau@citrix.com> Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable X-ClientProxiedBy: MR2P264CA0152.FRAP264.PROD.OUTLOOK.COM (2603:10a6:501:1::15) To CH7PR03MB7860.namprd03.prod.outlook.com (2603:10b6:610:24e::14) MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: CH7PR03MB7860:EE_|BY5PR03MB5329:EE_ X-MS-Office365-Filtering-Correlation-Id: 43f45895-a2e0-4f78-53e5-08de60103102 X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0;ARA:13230040|1800799024|366016|376014|7416014; X-Microsoft-Antispam-Message-Info: =?utf-8?B?YVZ4RFZXWE9ZL3dBUXlzRWY0NlhSbGhYNTVNK2VCc3V3clFLMFVwVFRJM1U1?= =?utf-8?B?cnNyb2JVcDByOTVyZ0JMZHhlMlBHb05RWDBGelZiZzEzWmZqbHRVaVVRU3JY?= =?utf-8?B?T0dSdGllK3QvelFPcm5aOGIrOEFkYmd4OHpMNzdVT3I2K2pZOWVTemJvM2s1?= =?utf-8?B?eHZESFNKUUp1REJIYmhXTzNCR1JoRXJDeG92MGZGU3RsMFVTeWhXOHdGVzEw?= =?utf-8?B?UTE3VUxEdUtYalBSdnZBdDYvYXk0L21Va3FJQmdqcjdIQnR0MVRnaUhBL1NY?= =?utf-8?B?ZHZmSCtFK2Q2aTNHa2lhc1NyVGlDWmRGeUFlbmRndDNWNy9zM1hyZTNDaWVY?= =?utf-8?B?RTc2MFhiUjN2Z3J1blJFU0FvUEg0N3J1UUM5ME56Znd1NzNNQ1dvS2dXMkR4?= =?utf-8?B?NU5qTHl2akpGNmMyeE5ickdBbXY1T3lYUHhvcXhKY3BtR2tBREczcWJFSElj?= =?utf-8?B?TGxPVWxOWUJ3ODdDSXlwNHV6QlRsT3pkYzZxVk5CcG4wUHN2eFpWTTNzZU5q?= =?utf-8?B?NkdpbG9ueW92Tkt0bXR0QkVkdHowMmowamczUDVaOHVJczRtWTFSSW10Uk9o?= =?utf-8?B?eERWQWNvdVRRS2FyMXl6QlhhemlxMmtMMWRUdUNLUmNvYmhrTjArUmdFYUVM?= =?utf-8?B?OC9hUElvaWlGSE5jb1ZhZnFtcGYwdm5RcUE0VFNvMUR4R2dNUVFDSTBmeFl0?= =?utf-8?B?TXFHYnpRcmYwZDFJbG05RVp5YjFNdE1UVkZKNzVaU3pKeG1TbC9aM2tkMmNP?= =?utf-8?B?NFIzam51aExXc2txeS9NMHA3R3l1NEJqc3ZkV09Wbm5YYkxRNzBYQnp0RFFn?= =?utf-8?B?NXFhaEFwdWl6dktOclpJMmdCS0hxUnhyRXpGMVY0QW1TWkZwNTZjejFiWGw0?= =?utf-8?B?SzkwUlhKYzlsakNXMTA2TmRhVjhCUWJ0V3hwdCtVTFQzQ3psK01tV3RwaFpH?= =?utf-8?B?eTczYzhEK3k1aUQ1SFc5TkJncXNpa2pMSmZKVERSaWt0bjdUWmR2NGc4SEJi?= =?utf-8?B?MlhXTStydVJJdmFsOXRucHUvL3VlbHFvOWk1TDkrQVhtREtXYVZBWmxNN3Vp?= =?utf-8?B?VE56Q2xGcFdiTm9lRUJCdk9ia1dKSUkwenUvMXprSHpvZFFUdnd3Yjh1UUoz?= =?utf-8?B?RWFldlJmR1JWS0Nkd0FEcmlTa2pSbzE0L3lLazlsbjB1UXV4eHNVNklVYVRY?= =?utf-8?B?aEk3MnBZRWtmcDR3cmpFQmdlZmZGSkNqTVJCV2puZENMTmZ4VUpQUmpZRGhJ?= =?utf-8?B?OS8vSm1lcEFUZzlUSzgzQ255bUlWVmp2QXp1VjJWQzVSZmpqNng5S3ZmSE94?= =?utf-8?B?Q0FGdC8wdEFvdUIwQi9nVTc1TEVXWkNpVEs0RUtoQkdLUkhUTFRpRHI2NFBu?= =?utf-8?B?YmZjcmk4RFdqQ3VBUXJzaUV1NXhabFVKb21vVkdWcmtNZFJhbklHYkszUTRC?= =?utf-8?B?TldWTGY5ZW16bGpVVXdKbDE0QUFETGRzVkJuN0JoYThzT3J2RVFaVmdoaHdF?= =?utf-8?B?L0ZNdTIwRjJmRG0xVGlKQ1ZRdjNVbkdtUFNZcGRjWGEvaG4rZmkyQW0vLzU3?= =?utf-8?B?VWNZVytYSVR4d05xdzU2citTU24vcmVOSXlGSC9LZ1pwbUIvcHl1Z0Q4WDVt?= =?utf-8?B?Y0Q0SVYyZVBUK2g1eWpvMm1zNXlPeC9rWDdieW51c0duUFFsK1BnMmx5dDVX?= =?utf-8?B?NE9jTGRTN0JGcmlpMGpOQUhRVHAzRHBDVHV5K0EwVnpWZlhQKzRRQmhJZnVS?= =?utf-8?B?SDVnNXM0enhtNUNoT3NZc01Pc0JEa0xoMklra0N1RkgzL2k3djJEQ3NKZkJX?= =?utf-8?B?UGR5KzlUYmovUzBvWUhxWjYzVTE4WkRwWVl1dDdHc1lGdytIZ21kd0lFWS9X?= =?utf-8?B?NXZUbU96VUtxYW9VU2I1dklRazVkVmlMaTlIUUJhcjhzVW5CVkZDSG9DV3dY?= =?utf-8?B?SEVMYmVCY0I0dWRCLy9Ball2VjBVdTRuUENZbnQzWHl0MzdUQUhxMVB0SFND?= =?utf-8?B?czZzNkR0dDhEdGtHNk1vY29jK0xObXczNTlIcmlXTFAzbnExUlRsbUVYQ1JY?= =?utf-8?B?eGNLbFBra1pvWk02Z0prM1l2aDF2b3oyd0IwbTZxSXM0eVAvalRjc1Bsc0FI?= =?utf-8?Q?Ygno=3D?= X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:CH7PR03MB7860.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(1800799024)(366016)(376014)(7416014);DIR:OUT;SFP:1101; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?QWtxenFrMFc3eDNLR3ovaHZkTlVPZ09mZ0dxUDhnMGZ2SVhZdkVZTlAyMDRl?= =?utf-8?B?cWNMbjZ1RG9oejZleDJhVkhwMFRUbmwzeUFFVGN3NWdpM3oxWVF0Y0JRV2lL?= =?utf-8?B?UU9Ja2hVQWI0Zk5mQWFrNHNXOGpVQnpZK2NEN21yT2UyTWtFaW53WkVYUE9r?= =?utf-8?B?U1pvdU1iYjQzVEFBcy8vNXQ3K2YwVEhoYlcxSnhZUGZ2UDNCZ3I2TTB0MTha?= =?utf-8?B?MEQ5MjNaNHNweUg2Z2lwYXF4SE5VdE55ZjFsczZJMmtqaVBDZzFwdllJU3FX?= =?utf-8?B?VXp2bUoyUFZ2Zjh4dUtVeExWUEZHR0pWZGR4RE0zdEhUaHJmNTRVaWFDUXIx?= =?utf-8?B?K0NKMC9jZnp1cGkzcXlScXEyY01XOFhXaGVRckxlKzBIMzcydG0wMXdPTWtC?= =?utf-8?B?VnRGS1AvN2dQdGkyWFdWOEN4cWkzeTZ5dzByNVU2YjE5YkN5K09pRzhKd0RG?= =?utf-8?B?dUVQVnE0UlFMejV2bzU0QTAzSmY0cFlUeWowS3ZOSEdYODNJTlBWT3MvbVJp?= =?utf-8?B?VGg1VWFGY054Qmg4MDMxTVl3enlNRnJWYVNsT2QycHJ0U21nN3Y5Zk9xdGRr?= =?utf-8?B?ZGVjeWZJTG8raEo1U3Q0eXdjOThsV2V3Z01IMU8vS28xWXdrdy9Oa01pN2hJ?= =?utf-8?B?VWFBeThBY3RTM3JOWHA5Y2o3RTlheVhxNkg4U3dhNDFQeENQUHhKWVp6Zmtq?= =?utf-8?B?MjlRck1BNnY3OVFXWFltK0RkRHR6YnFoYW53Z3VqT0R3MklaOW5Xc2hpTGY5?= =?utf-8?B?Z21ydG4reU43cDRwdlFCUkMycGYxT3M5Y1BNNkRkOWJzd2FGaTZ2aURUU1M1?= =?utf-8?B?NGFJNExuT1kvL3RFY2JROExBTG9SeXlMZ0RIYlRFb0laVFBCMGlyQkVHcVhP?= =?utf-8?B?L0h6M0VNMWJRVHhLNUlFV1NvNHhuMFRkQTN0dnZwVGhMZk9KdzVCL0lxREhE?= =?utf-8?B?cUJZR0VUbzdpOWxnTlpSV0FYeXNsdVFWd3B2bTAzcXpYU2NPUnR1dkY5N09R?= =?utf-8?B?QVRyamRnNkhobWEreGhSQytXZWlCUXV4Tm5GWlAvNnVGSnFKbmc4a2ZxTnVi?= =?utf-8?B?ZDdXdHVJdnFuWGl4THNjRmhIRDh4ZytoMjJEVDdEeGppRXMyUHVkN0dJS2RP?= =?utf-8?B?bmxOSGRaNitTWmw1R1lGUjlRUXpEUmVWd2tVclphWDROYUFlVlhQbW9QOWdw?= =?utf-8?B?U0R4ZkJQWUd2OEpBcUsxUE82YjdHYTNQaDNaTVh1SnJKVWI3dS85YTFxSHVs?= =?utf-8?B?WUx5ZUlGMng4S1M1bFBOamFzMkVwVkVreElIK1VBK3VlZTJVM0k2MGFZTGJW?= =?utf-8?B?QjQzTitrMzVVa0piWk9DM2lmWlZIcitQa0R6Ym0vUHZDNnJKUkhid3FFVVI3?= =?utf-8?B?bVZMNTd3OHpBcDg2a3pWMWlLVnd5czZFTnVxUWZ5M2YrTkY4eWZCOVNVRlQ0?= =?utf-8?B?ZnNXMjhFeGJwM2Y2V2kyaC9vdVZNMkp5M290UEN2LzFUTk1Bc245QURMSWw2?= =?utf-8?B?T2haUmRFd1c4VEhKZ2pGQW9yQzcva250L3ZZWTcyREdWeWRnd1FpQng5a2t5?= =?utf-8?B?VThpUFFnY2czcEpBRkN0RGF4b041UVdzZ3NVK29OOG10QlMxcE9hV0hvR01o?= =?utf-8?B?T3dNZk9xZFFSMVNlZE8ycWNqeDZBUmp3V29sMEN1d1VER2xQU3A1clJPNWl0?= =?utf-8?B?dlFUaVpneGQvZGNJZUVld0VLSWV5RHYwamJ1dkhmZHZybHNsYUJzT09WNlhh?= =?utf-8?B?T1I0Qjl5OVE1bEhWc0RwM0NRM1gzcmNSb1NUd2hiVGdoQzh1KzB3YURSY25z?= =?utf-8?B?YnRaWGpuYTgrY1BpTGY4Rmp4RE1hcG5Nbyt3WHRCY0hGYms0cWdZM211dC8z?= =?utf-8?B?NG5mQk9QbHh0R2RESFNac1hvU1R3dWh3M0RZQndlQVNVVXpTTmw3SXRqQ3Nh?= =?utf-8?B?T0JEa0VLSlIzeEo3cFdTd2h1SHVOK1dkU3NKdlBxZWJMKzA1d1I4OU5XRGo0?= =?utf-8?B?bmpIN2Q4aWtHb1VBeXhEZVFTcXp1OVVMOXdUaVJ2ZFdwL3Z3dUt4V2wxZjRw?= =?utf-8?B?UzJNMnZSTm9hN0swcURyWlROSFc1c3JhUkE1MUJaYk0xaGFCVzhDejhxd1JN?= =?utf-8?B?RUI3b0huSU5CZDNGVmVlVmg4N1VBaFRmOUVHV0ZSQ2FmQjdOd2U0U1dwc0Qz?= =?utf-8?B?RnpoZWhkVDJ3K3RkeFhiQTVMc1FqYmFnd0hHUkxJZnEzQVRpSTZuaCtjdU14?= =?utf-8?B?NTRlU0pPdklqMTNsVmI3aHp0ZHpmanhEWDNYV0U3WEs3dC9mUXQwbWN6OUZX?= =?utf-8?B?YUVnQjBiTTdVbHdTSWUxVTRsbjEzRnRPTUVkK0R2c3VxbnUxVDBOQT09?= X-OriginatorOrg: citrix.com X-MS-Exchange-CrossTenant-Network-Message-Id: 43f45895-a2e0-4f78-53e5-08de60103102 X-MS-Exchange-CrossTenant-AuthSource: CH7PR03MB7860.namprd03.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 30 Jan 2026 14:59:39.3222 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: JJIL+QLsWl47x+eDHwRi8vwVzLNKDMq1Kifpr33mQupXwsfHvluV+/qYCvJCFrQ12dHmBxQzupF8dnJ9cOhKQg== X-MS-Exchange-Transport-CrossTenantHeadersStamped: BY5PR03MB5329 X-ZohoMail-DKIM: pass (identity @citrix.com) X-ZM-MESSAGEID: 1769785240211154100 Future changes will care about the state of the PGC_need_scrub flag even when pages have the PGC_allocated set, and hence it's no longer possible to alias both values. Also introduce PGC_need_scrub to the set of preserved flags, so it's not dropped by assign_pages(). No functional change intended, albeit the page counter on x86 looses a bit. Suggested-by: Jan Beulich Signed-off-by: Roger Pau Monn=C3=A9 Reviewed-by: Jan Beulich --- Changes since v4: - New in this version. --- The PGC space on arches different than x86 is not compact, so I've just used a hole in those. --- xen/arch/arm/include/asm/mm.h | 10 +++------- xen/arch/ppc/include/asm/mm.h | 10 +++------- xen/arch/riscv/include/asm/mm.h | 10 +++------- xen/arch/x86/include/asm/mm.h | 18 +++++++----------- xen/common/page_alloc.c | 2 +- 5 files changed, 17 insertions(+), 33 deletions(-) diff --git a/xen/arch/arm/include/asm/mm.h b/xen/arch/arm/include/asm/mm.h index ec2d2dc5372a..72a692862420 100644 --- a/xen/arch/arm/include/asm/mm.h +++ b/xen/arch/arm/include/asm/mm.h @@ -144,6 +144,9 @@ struct page_info #define _PGC_colored PG_shift(4) #define PGC_colored PG_mask(1, 4) #endif +/* Page needs to be scrubbed. */ +#define _PGC_need_scrub PG_shift(5) +#define PGC_need_scrub PG_mask(1, 5) /* ... */ /* Page is broken? */ #define _PGC_broken PG_shift(7) @@ -163,13 +166,6 @@ struct page_info #define PGC_count_width PG_shift(10) #define PGC_count_mask ((1UL<count_info & PGC_xen_heap) #define is_xen_heap_mfn(mfn) \ diff --git a/xen/arch/ppc/include/asm/mm.h b/xen/arch/ppc/include/asm/mm.h index 91c405876bd0..402d06bdaa9f 100644 --- a/xen/arch/ppc/include/asm/mm.h +++ b/xen/arch/ppc/include/asm/mm.h @@ -57,6 +57,9 @@ static inline struct page_info *virt_to_page(const void *= v) /* Page is Xen heap? */ #define _PGC_xen_heap PG_shift(2) #define PGC_xen_heap PG_mask(1, 2) +/* Page needs to be scrubbed. */ +#define _PGC_need_scrub PG_shift(3) +#define PGC_need_scrub PG_mask(1, 3) /* Page is broken? */ #define _PGC_broken PG_shift(7) #define PGC_broken PG_mask(1, 7) @@ -75,13 +78,6 @@ static inline struct page_info *virt_to_page(const void = *v) #define PGC_count_width PG_shift(10) #define PGC_count_mask ((1UL<count_info & PGC_xen_heap) #define is_xen_heap_mfn(mfn) \ (mfn_valid(mfn) && is_xen_heap_page(mfn_to_page(mfn))) diff --git a/xen/arch/riscv/include/asm/mm.h b/xen/arch/riscv/include/asm/m= m.h index a005d0247a6f..9e28c2495462 100644 --- a/xen/arch/riscv/include/asm/mm.h +++ b/xen/arch/riscv/include/asm/mm.h @@ -273,13 +273,6 @@ static inline bool arch_mfns_in_directmap(unsigned lon= g mfn, unsigned long nr) #define PGT_count_width PG_shift(2) #define PGT_count_mask ((1UL << PGT_count_width) - 1) =20 -/* - * Page needs to be scrubbed. Since this bit can only be set on a page tha= t is - * free (i.e. in PGC_state_free) we can reuse PGC_allocated bit. - */ -#define _PGC_need_scrub _PGC_allocated -#define PGC_need_scrub PGC_allocated - /* Cleared when the owning guest 'frees' this page. */ #define _PGC_allocated PG_shift(1) #define PGC_allocated PG_mask(1, 1) @@ -293,6 +286,9 @@ static inline bool arch_mfns_in_directmap(unsigned long= mfn, unsigned long nr) #else #define PGC_static 0 #endif +/* Page needs to be scrubbed. */ +#define _PGC_need_scrub PG_shift(4) +#define PGC_need_scrub PG_mask(1, 4) /* Page is broken? */ #define _PGC_broken PG_shift(7) #define PGC_broken PG_mask(1, 7) diff --git a/xen/arch/x86/include/asm/mm.h b/xen/arch/x86/include/asm/mm.h index 419fa17a4373..06c20ab8de33 100644 --- a/xen/arch/x86/include/asm/mm.h +++ b/xen/arch/x86/include/asm/mm.h @@ -83,29 +83,25 @@ #define PGC_state_offlined PG_mask(2, 6) #define PGC_state_free PG_mask(3, 6) #define page_state_is(pg, st) (((pg)->count_info&PGC_state) =3D=3D PGC_sta= te_##st) +/* Page needs to be scrubbed. */ +#define _PGC_need_scrub PG_shift(7) +#define PGC_need_scrub PG_mask(1, 7) #ifdef CONFIG_SHADOW_PAGING /* Set when a page table page has been shadowed. */ -#define _PGC_shadowed_pt PG_shift(7) -#define PGC_shadowed_pt PG_mask(1, 7) +#define _PGC_shadowed_pt PG_shift(8) +#define PGC_shadowed_pt PG_mask(1, 8) #else #define PGC_shadowed_pt 0 #endif =20 /* Count of references to this frame. */ #if PGC_shadowed_pt -#define PGC_count_width PG_shift(7) +#define PGC_count_width PG_shift(8) #else -#define PGC_count_width PG_shift(6) +#define PGC_count_width PG_shift(7) #endif #define PGC_count_mask ((1UL< (p=reject dis=none) Return-Path: Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) by mx.zohomail.com with SMTPS id 176978523884932.58090444047275; Fri, 30 Jan 2026 07:00:38 -0800 (PST) Received: from list by lists.xenproject.org with outflank-mailman.1217651.1527047 (Exim 4.92) (envelope-from ) id 1vlpyk-0008CB-HM; Fri, 30 Jan 2026 15:00:10 +0000 Received: by outflank-mailman (output) from mailman id 1217651.1527047; Fri, 30 Jan 2026 15:00:10 +0000 Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1vlpyk-0008C3-Dn; Fri, 30 Jan 2026 15:00:10 +0000 Received: by outflank-mailman (input) for mailman id 1217651; Fri, 30 Jan 2026 15:00:08 +0000 Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50] helo=se1-gles-flk1.inumbo.com) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1vlpyi-0007Ra-L0 for xen-devel@lists.xenproject.org; Fri, 30 Jan 2026 15:00:08 +0000 Received: from BL0PR03CU003.outbound.protection.outlook.com (mail-eastusazlp170120007.outbound.protection.outlook.com [2a01:111:f403:c101::7]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS id 5d520cf2-fdec-11f0-9ccf-f158ae23cfc8; Fri, 30 Jan 2026 16:00:07 +0100 (CET) Received: from CH7PR03MB7860.namprd03.prod.outlook.com (2603:10b6:610:24e::14) by BY5PR03MB5329.namprd03.prod.outlook.com (2603:10b6:a03:22a::23) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9564.7; Fri, 30 Jan 2026 14:59:43 +0000 Received: from CH7PR03MB7860.namprd03.prod.outlook.com ([fe80::f5ba:35df:1c9f:b343]) by CH7PR03MB7860.namprd03.prod.outlook.com ([fe80::f5ba:35df:1c9f:b343%4]) with mapi id 15.20.9564.010; Fri, 30 Jan 2026 14:59:43 +0000 X-Outflank-Mailman: Message body and most headers restored to incoming version X-BeenThere: xen-devel@lists.xenproject.org List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xenproject.org Precedence: list Sender: "Xen-devel" X-Inumbo-ID: 5d520cf2-fdec-11f0-9ccf-f158ae23cfc8 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=NF/3fEv+aVjvTJoXckOAxyfGjJkjZX2ITJYKcBrxjgAr1O3NRMBNzE328vUjN5LpNur3IS68a4wgBgnm12YUkUyv3z6GigQ9xBbYkxLjBiklS8rympkdHI+00YY0mgZGfFtKxlFL4WQh0nEi1MMSRuI4rtxa7PiqrGP7qd95mB5yKZhXIhvf9cBZdcYItSx5a4BeriB/NmxpXplCDCoCaK0gt+80+BK6YRXadjXwA4ONoAFiNlCc38aWIKBnJ1L9o8+cfugpkC+WYKv/ypC28pXAT/LGlx4GIqV1+OJR9TuhPytfR+aA3MgVBpfF66a1z89qXJ/ozGb654FaKOq8+g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=VLyvniffw+rJL9gj6KU+iB92xXBhLAscEsULPJ7TSQ4=; b=xbI4kFUaggKllKIyXWG6SwFAJrtSJGTuxehiRde3dAj7n8du6ELBsxrYOKGTsZPkXO9Svh1BJZbUbxSvNLTRfQ3rWhU4o8Cqk36CZvlnyCv6RsALxP1odixXYxcbIwaIv7DJitG+4v/pqR0PUgz57tO9x+NxcqggwUKKnhJwfDZ16Kxmcqb5L0Qew0bFoVwt2M6okLbH9S6F1c0zq/PxL6xfu7NYe+fb2Mng32DiKd3B178qauUqadFvoSz1uzudq376Mbuu9HdjiIEh2m/987dfGNpXXIB0PnaX1kli4AjalAAtYOYY5lxddI59CDkwyW0oUqQa3ghb+tzGdqAlVA== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com; dkim=pass header.d=citrix.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=citrix.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=VLyvniffw+rJL9gj6KU+iB92xXBhLAscEsULPJ7TSQ4=; b=Z2YyCx8y7mT3baAizvouWWwx3bCJXEqW58w0DuvW4juo9rGc3HxOR8YqlKcl2UplFkVD/cVJgNF9mt9Qxx2KM2HOjbYOaD2IN2v4kEMzUAz5mlI6TFlHREBMnzD7pWJwk7x9IejE9Kr4ZtzP2Fu6eDSbu0+t9mgPQq7qXZDZGAI= Authentication-Results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=citrix.com; From: Roger Pau Monne To: xen-devel@lists.xenproject.org Cc: Roger Pau Monne , Andrew Cooper , Anthony PERARD , Michal Orzel , Jan Beulich , Julien Grall , Stefano Stabellini Subject: [PATCH v5 2/4] xen/mm: enforce SCRUB_DEBUG checks for MEMF_no_scrub allocations Date: Fri, 30 Jan 2026 15:57:24 +0100 Message-ID: <20260130145726.85907-3-roger.pau@citrix.com> X-Mailer: git-send-email 2.51.0 In-Reply-To: <20260130145726.85907-1-roger.pau@citrix.com> References: <20260130145726.85907-1-roger.pau@citrix.com> Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable X-ClientProxiedBy: MR1P264CA0149.FRAP264.PROD.OUTLOOK.COM (2603:10a6:501:54::15) To CH7PR03MB7860.namprd03.prod.outlook.com (2603:10b6:610:24e::14) MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: CH7PR03MB7860:EE_|BY5PR03MB5329:EE_ X-MS-Office365-Filtering-Correlation-Id: a14699a6-f19e-439f-a615-08de60103338 X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0;ARA:13230040|1800799024|366016|376014; X-Microsoft-Antispam-Message-Info: =?utf-8?B?dVN3dXNDcm56WmRTOFZlSDZ0QjNkc3JzaVBqYVN3M01RMTN2SDVSZUIwcFJC?= =?utf-8?B?bk5tb3RBZDVLTHlIYTRNS2I5bVBmc2FnTC9jbDZITDZ4RlFqWklmS2RpbkIr?= =?utf-8?B?UkFBTEFsdHh4VVRtaTJhWnNacHpVSEwxbGhPVE9hUXc1aEJNSERoVkdnUWU0?= =?utf-8?B?NkoxQzBlM2p3TjR3UEpOMEhVRG1uNDJnSHgwdXUzRGpFMVE5eVR3aU5KbU5v?= =?utf-8?B?eWNzTlBDOHAxMmRUdTdzT1dGUWZIam9yQjJRSStUa2U2b2VRKzhLa0MraUpG?= =?utf-8?B?dVhiaXlVMW8wZTBSMTlnTkxzcmJzb081Z002YzlMZ0FoaUNza0ZVc080Z0JV?= =?utf-8?B?L3ozeGs5OFdSVGxCU3p4cTJzVnNsQlo0RHJFTFVSbHpWR1RZeit5VWJteGZO?= =?utf-8?B?bXdpTTE2OEh5SWlqa2t1ZzlrUkR6Skt1R25WUVczWVFnM3RKc2k2ZVlpNkY1?= =?utf-8?B?QWVCNWlvb1lSVUg4cE1FNzFpSDNrbmdzQmtYY0NNVTNNcU14RU1YbGhhNW9B?= =?utf-8?B?Sk5QV1NyL1NkdmJaU3FvMm1ucVV2Z2krTWdobEhSVituLzRuNndKdC8wL1RG?= =?utf-8?B?TklXQVpweUVEckZaZHZZODVYMmJRY2pnK2ZUMTRWc2Y3d3BJeHJjU1hMODcw?= =?utf-8?B?NlFoOFhpYXZXU09RQVZwQ0FUTkRWRTJkK2Era1h1eVppcVNEVDhVYzFOcFMz?= =?utf-8?B?Z2hLTHBvT0ZlTVZYdjlSTk9Ub3BNMk9sWUNDSjdFUmw4aEx4SFc0dGprTE54?= =?utf-8?B?MU0vQmpPS3QzZXFlcjhIa2dJaWZ4UUhJTkd6RThIQWp1Nmxla2g4M096aWZR?= =?utf-8?B?RFJTdGNGQVJqNi9aMmIyRDRUQVRuVllHR0hudndrWlV5bVpYTzFhaW9MdmxO?= =?utf-8?B?R2t4MVduREdQSFhUNTlGREIva2xrNkNock9OZU1XZi9zN0hDREp3S29IL1dl?= =?utf-8?B?a3UvTXhXNkZScnkvOU5JeUU1c0NUa01KVnhmZVNDMVBoMWxBUTNXUTd1ajdq?= =?utf-8?B?Nm1JM2QxUVJYVjhlZnpoYWkrSmRDZ0ZvdTJGWEdya2FQMWhMajAvOGxnNml1?= =?utf-8?B?cU4vQ3V5dC9KdGVaMmV4RWt0WDFhbkpUNDMrVUc1Qkx6Rm9pSmdXdTBKUWxB?= =?utf-8?B?ei9TVEhYOURab3hTc3NSVGJJSXgxUjJYcW9hY0hlMUFYRE0zSFRUWGU1ZG9l?= =?utf-8?B?VU93bzRzblFVb29nT2tNUnA4NmltMk9BWVpjSjBqSjA2aUpZMEpiRXVsWHBr?= =?utf-8?B?cTFub1QvY0EvSDdKVG1Td0ZOTkxSeWNHR0IzZ2t6dm0zTUJFRXN0MGpaek1Q?= =?utf-8?B?VHF0Y1dEVGlYbzJsUlFUdGpieGZhUGsvL3RHK0IxTms5Y0lOWlVUeDI5ZVBY?= =?utf-8?B?azlqL1pyKzJjcXRteGxkWmdBMnpMNGZKM0ZzVk4vOS94dW12Q000Q2hoSkpY?= =?utf-8?B?c0Z6dzNtVXZoa2paZWNpMTZkSEoyTHp0R3F4MGtqdnMyYUxjSXNubGdUL1Ay?= =?utf-8?B?U3J2aUJHeFZuUEljM1d2S2pUQzhiWURxaCt1aXE1UVIxNGVLTlRnS3BiYVdo?= =?utf-8?B?ODMwVnRXWFE4aUlxbHBvU0EvUk5jVDZQYy9pNVJ5OVFmZU53emNRNmhXdG9K?= =?utf-8?B?TmZ2MWtKYml0Rlo2UTN0Um0va2ZPckdpeUFYZWR1VDNUSVBoU2tzNTA3T0Fp?= =?utf-8?B?ZGNvNjFSS2YxVzIvd2IxRFRGZVl0Y2xkK3BGNytmSWVJcTdMM3Z5Vmx2ZmNX?= =?utf-8?B?M2M4YjY1dnJvcGNoaCtKOWFkM3J5Z0xqR2M1cTJVMjRqQ3RxZUJjTUp3UjFY?= =?utf-8?B?SHRCaXVoS1NLMWNJOStHQjRDQi9ESThIM2xMeUJwM2NsaU5TN3NoYS9takZ6?= =?utf-8?B?QXRVb2tjUUhyaXI2MTN2VU5ITlhDMDFjZDlHOVhTRjBlVEZ5Z0ltUlkybzRE?= =?utf-8?B?YzZzeEZkOS9nMjd0WFdlMmh2SkxQTnhVWTFMb21KUnZLaWs3dUg3TzZyV1RZ?= =?utf-8?B?dE5XeVh3S2VtaCt6a2Z1TEpSa09IUXR5ZThmY3FWK0RSVkhFKy9lRTVaYU0y?= =?utf-8?B?ZG83cFlMS3RmMEZxdnhrR3k1blJlWmZtTVhXaG9DOVJkOWZpL0ptdGVxUXZ3?= =?utf-8?Q?ZP44=3D?= X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:CH7PR03MB7860.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(1800799024)(366016)(376014);DIR:OUT;SFP:1101; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?L2l5R1JyK3g2RzNlL1dqOEIxQ053RzU1MmZTa21MMDdEUzNvS1I4aXF2dFUr?= =?utf-8?B?VXFWSDB6RmpRR0Vrc1Q3K3NiWld5NVVQZEsxZGhZZXRHcmdNcGtpRmxWT0Zo?= =?utf-8?B?TzRRa1VQZlpQTWI2eEh4b2hHY0xmOWF2UGdZK2JkaTI2ekFmWUVjQlBEcTRB?= =?utf-8?B?Ym02WEZ3VUtFQm1YUDd0d2xFRTFCZUM0R2g3S3VLL25TdTdaczA1ekZXMEk5?= =?utf-8?B?UU05OEU1WEtGR1JCd1hkNU9ZZTZNVy9KWWJ0Q094WmZYVHNmNnVBR3JrRjhL?= =?utf-8?B?OHFsQUZxUGlhcWFQRVEreWltcndEODFFYXpMNERuam5rYWFrN3kvdW0yaGg3?= =?utf-8?B?UWhaclNwK3NhYmRldExLNUczamFDa2owYzEwbGQxbTVBbmlURitRY2M2d24w?= =?utf-8?B?TjZhR0hxNVV5cDQ5cGcrNndjbG8xRzF1RDdEZTVyQkFnNjF6VmVzTUlmWE1S?= =?utf-8?B?aG1kSmo4dU13bFlTbzZLTWI5b3djVG83cmhsUGJaaThVRkt2Ti81SWZkSTlq?= =?utf-8?B?RE51K0ZtU2g0c0dCK2xya0ZpWTd0UEdUZGx3SmxiNGticXh2N2JkZmhTMGQx?= =?utf-8?B?QzhhZmd5YWtmTHMxb0lpVnJTVGxNM1FCb3IzS0pKb25PZXFjcnJxVE5zb0Nt?= =?utf-8?B?UEt3REU2UWlHWE02SGlIdDRSc2F5emRENTBZNjI4YXhIMUovTjZkNmdaK2lX?= =?utf-8?B?ZkpoeWlSRFM2QnQrb1U5S0xiSzAwWmk2Q0NkY3VtRnA5QlFtQWZhTGJTU3Vr?= =?utf-8?B?QllGZUJyVUFjVkJDcC9CV1VVaVhoTXVDeWpPRlAyUTk1ZlVySDlUSWF3Q09Y?= =?utf-8?B?d0wzbHQ0L2VSRDdVTHhEajF0eC9WU0lzRzZsaG9UbHlLcWloTVdMMjErWG0x?= =?utf-8?B?T2Z2aDIzU1Q4QVNPRFlna0dsNDlvWFNob3NXN3pGQk1aYVFkOTRWaURlQVUx?= =?utf-8?B?aVNUYkJzS0luOXJURitKTDZvNTc2dEh6d2FSeFg4c0swODN6UzMyc2xXQy9Q?= =?utf-8?B?NTZGelhDeHoyV3ZFY21TWitYY2kvTnJCTVM5TWd1TUxSUWYvdVBKL2hybVg0?= =?utf-8?B?ZDBBck15UWdBbnlNTWFMcGxRRnZVS1VVb1BoSzJWWElscjBaU0ZhU1BRYktZ?= =?utf-8?B?YmtoQlJKd3lOTUlZeEJsS0dBeG56TUxzOTduOU90Mkl0WitGelVWMTZxQU9i?= =?utf-8?B?dEFxc3VmWDJJckZPeFo4SW5DSktuekNnS1dyRlVpOFZ3d3c1c2Uwbm12dEg4?= =?utf-8?B?MXNDSTZLQW1ITzhNS1JYOUR4UVZoQXoxT0lTQkpzNXBQMWpTeUtZQmtzSXJp?= =?utf-8?B?cVUwMDZHVTcxWUl6SjhRM2xBV3VVT2k1aWFLcEpvaUtlNGFMaVc0Tm9oZTNj?= =?utf-8?B?OTJEeWlSUUxHVndGMDlheFdRb3pLWTJhM2RpQUJRc05KL1B0Y0RESlVxYVdv?= =?utf-8?B?dTdNSlM1MXNLWEFweWovcS9KbVJ3WitmQUhIR1l5ZW12NXhVUTBVODBpbEhs?= =?utf-8?B?OENHV1pZVHl0Vk5ncU55UHB5VVpRZ21TdWIyUWZPOXFvWXlOdjZUZlNjVG1r?= =?utf-8?B?bHpiT2JrNFJMS2FoMUM5a2pSQVQzQllRTENURDYva1dDL1FrZWtpUEEramN3?= =?utf-8?B?OS9wR0xvRTcvcG84N1pmemRndGNBcEJ4b1B0aUJYM1RRSnd4Y2pSU1gzbVVq?= =?utf-8?B?cHNXQzlUTjhlQW5iZGVBRDUrVStKZG9KZVBIWFJOY2ZBNUVJblEraUQrWXky?= =?utf-8?B?bXhXZVpFZ3JzZG56SktFNWFoZDB0MWJWNW1nN2g5a3hIUkNreC9aZGd2bTU0?= =?utf-8?B?TnYvT21WOEJTUmdzVkpnd0tacUtFTHBVbnlncWV4NnhrUmVuNHIrZFE3VXl3?= =?utf-8?B?Wkgvem5IM0ROOFlvelZ6bTlURGNmdmtNWDN3Z0FOM0E4a0VVR2dibUVVRXo3?= =?utf-8?B?UHVGcUZVOXgyODg3cXAwT0c4K0VjRjZyak0ySEFtRlMrVEg2MkZzU3lZNUdF?= =?utf-8?B?Yi9BMHN0QjZMclZSSUxtNnRESDBsVDFNZkFZV0Vzdk5DNW1IMkpPNmcxak9B?= =?utf-8?B?bTNycVBNNVZWTDVVTHRQUFp1U0F3cFJZV0JBekF0cUpGMzBkTzkyM1hQdERE?= =?utf-8?B?eFJmbzI0dk1pT1F4eUdoODU5SWRHODRUck1vNG00ckZjdU8rbjRERk8xcWwx?= =?utf-8?B?dzY5NGtZQUh4ZnVIaE45Unh5RVd4ZSt5d1AwelJDRVMrK2VIMkRlYVBncVY0?= =?utf-8?B?ZWRIMjNtWm03dGNrRjJOam9mUXVIajZYQitQY0IyWEZTUkpjYnhDRzU5VWRY?= =?utf-8?B?UVNoUE9NMlNDRTVOU3VRM1pXQ0VkN0FBVmpCUkJLYXBQc1lJRjFSUT09?= X-OriginatorOrg: citrix.com X-MS-Exchange-CrossTenant-Network-Message-Id: a14699a6-f19e-439f-a615-08de60103338 X-MS-Exchange-CrossTenant-AuthSource: CH7PR03MB7860.namprd03.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 30 Jan 2026 14:59:43.0202 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: pD8p0251a03R4tFduPIC4nW53BmvAy/bB0GoV7R8ANc+qXpOKr7RYCKvPPJLa7HXFCmzIPrDSQzF7bx7296rQA== X-MS-Exchange-Transport-CrossTenantHeadersStamped: BY5PR03MB5329 X-ZohoMail-DKIM: pass (identity @citrix.com) X-ZM-MESSAGEID: 1769785250707158500 The logic in alloc_heap_pages() only checks for scrubbing pattern correctness when the caller doesn't pass MEMF_no_scrub in memflags. However already scrubbed pages can be checked for correctness, regardless of the caller having requested MEMF_no_scrub. Relax the checking around the check_one_page() call, to allow for calls with MEMF_no_scrub to also check the correctness of pages marked as already scrubbed when allocated. This widens the checking of scrubbing correctness, so it would also check the scrubbing correctness of MEMF_no_scrub allocations. Signed-off-by: Roger Pau Monn=C3=A9 --- After discussing with Jan I've deliberately omitted the tag: Fixes: 0c5f2f9cefac ("mm: Make sure pages are scrubbed") The intended approach might have been to ensure the caller of alloc_heap_pages() gets properly scrubbed pages, rather than asserting the internal state of free pages is as expected. --- xen/common/page_alloc.c | 5 ++--- 1 file changed, 2 insertions(+), 3 deletions(-) diff --git a/xen/common/page_alloc.c b/xen/common/page_alloc.c index 2ee249ac365a..dcb95309b12a 100644 --- a/xen/common/page_alloc.c +++ b/xen/common/page_alloc.c @@ -1105,8 +1105,7 @@ static struct page_info *alloc_heap_pages( =20 spin_unlock(&heap_lock); =20 - if ( first_dirty !=3D INVALID_DIRTY_IDX || - (scrub_debug && !(memflags & MEMF_no_scrub)) ) + if ( first_dirty !=3D INVALID_DIRTY_IDX || scrub_debug ) { bool cold =3D d && d !=3D current->domain; =20 @@ -1119,7 +1118,7 @@ static struct page_info *alloc_heap_pages( =20 dirty_cnt++; } - else if ( !(memflags & MEMF_no_scrub) ) + else check_one_page(&pg[i]); } =20 --=20 2.51.0 From nobody Sat Feb 7 05:14:43 2026 Delivered-To: importer@patchew.org Received-SPF: pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) client-ip=192.237.175.120; envelope-from=xen-devel-bounces@lists.xenproject.org; helo=lists.xenproject.org; Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; arc=pass (i=1 dmarc=pass fromdomain=citrix.com); dmarc=pass(p=reject dis=none) header.from=citrix.com ARC-Seal: i=2; a=rsa-sha256; t=1769785234; cv=pass; d=zohomail.com; s=zohoarc; b=NlK1RqScwrHksFHN7N4JFo2nxSsh1nQ8+iCSismQGTfuRldbbdBiHreHT5rrcQr2gLQS9CvoPZuBQSfWaVpD5Kqrd3AYERY+jv0Sn8jSGtttNneQoRVVC5ibCUBtcLB5eZw6daw91rAIv4yLXRX45cUKCtC3hzfCIW7qQZUbEpI= ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1769785234; h=Content-Type:Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=w4kt3HlIslTe7oWtZiavcZv96YzHLGl9cFCLUCvUUtE=; b=X96agcAFCZR+bH+I+rtwf1tyfAvPckZoL2Wn90/z9OvFHocnmIs/wwLPJ1vUlQ+b3PK+9iDLoBWzpMAbe3FscxtLkpjkpF3rz2E5cSGknb0W7t89rce06hbQMWHemcyjp8TSOK3VYOCHRga0vqbunnR3JsIJ/2Rb19a6ds6UgdY= ARC-Authentication-Results: i=2; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; arc=pass (i=1 dmarc=pass fromdomain=citrix.com); dmarc=pass header.from= (p=reject dis=none) Return-Path: Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) by mx.zohomail.com with SMTPS id 1769785234732357.1387665449472; Fri, 30 Jan 2026 07:00:34 -0800 (PST) Received: from list by lists.xenproject.org with outflank-mailman.1217652.1527057 (Exim 4.92) (envelope-from ) id 1vlpyn-0008Sx-OI; Fri, 30 Jan 2026 15:00:13 +0000 Received: by outflank-mailman (output) from mailman id 1217652.1527057; Fri, 30 Jan 2026 15:00:13 +0000 Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1vlpyn-0008Sq-L5; Fri, 30 Jan 2026 15:00:13 +0000 Received: by outflank-mailman (input) for mailman id 1217652; Fri, 30 Jan 2026 15:00:11 +0000 Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50] helo=se1-gles-flk1.inumbo.com) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1vlpyl-0007Ra-Jw for xen-devel@lists.xenproject.org; Fri, 30 Jan 2026 15:00:11 +0000 Received: from BL0PR03CU003.outbound.protection.outlook.com (mail-eastusazlp170120007.outbound.protection.outlook.com [2a01:111:f403:c101::7]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS id 5ee4d43e-fdec-11f0-9ccf-f158ae23cfc8; Fri, 30 Jan 2026 16:00:09 +0100 (CET) Received: from CH7PR03MB7860.namprd03.prod.outlook.com (2603:10b6:610:24e::14) by BY5PR03MB5329.namprd03.prod.outlook.com (2603:10b6:a03:22a::23) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9564.7; Fri, 30 Jan 2026 14:59:46 +0000 Received: from CH7PR03MB7860.namprd03.prod.outlook.com ([fe80::f5ba:35df:1c9f:b343]) by CH7PR03MB7860.namprd03.prod.outlook.com ([fe80::f5ba:35df:1c9f:b343%4]) with mapi id 15.20.9564.010; Fri, 30 Jan 2026 14:59:46 +0000 X-Outflank-Mailman: Message body and most headers restored to incoming version X-BeenThere: xen-devel@lists.xenproject.org List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xenproject.org Precedence: list Sender: "Xen-devel" X-Inumbo-ID: 5ee4d43e-fdec-11f0-9ccf-f158ae23cfc8 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=fvEm3JLwpDDYawbhGhwAk7PDjIPWqL6yMoH+2fY/CWODaOlw8HSHVnVpblB6th7uPo8XpHEAddaypiRg+PhpoyVpQpiy/wX6JnqwU+aEgfqwhcyQVnluA1Kx7ocI9Do78bhAGTfjxVzvIuGWgEDeodynVnC3Wctvufx8UZGLyRmdYEV9L57sOmRH7Czpl/kQsqjkR156vyLtt06st4Q8dPJ3dLq7z4TNWikQqIo5Eyi0+DdQxawMDHbjx//YIZv7Hsf6N9qlOGKDrxhGmUDG0PkE54J/hF2HrYrWzTa3OWP5WFzfJLHiDT/PEJTnIHnz/meqs9I5tN/oBQgBwUCLJg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=w4kt3HlIslTe7oWtZiavcZv96YzHLGl9cFCLUCvUUtE=; b=R4Qh5CcxLFXBjsoMZk68biKXR/cYqgy34rtYO7CHjgoAGiMgoAl3Q/4hRDjf3JpB5KJzPuo55cNicQfyd7zL+vYlDnbHqnl0f1jiMAoxRcF+00069OeNnEwBE3kohtrtbTZjO0gOtWHWWFdh/4BlujXlI0FogJFWSLw6UepDh9sT21S0vuAd0uBy/Yp4U98UJpoqVOLrlvFZWvkXEjVPIDfjrG7bPPS7nj9gyUzMTKR34mNSqQuuzs5swiHD38U3xPw/gA/fxdj2PSr6nO0CfHvt9i6ZscycNqcb7LDNrBLi4ja+VTVv3IVO5Qc6LdAwwEtpBlZeYLxpjQHgmJGlWw== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com; dkim=pass header.d=citrix.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=citrix.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=w4kt3HlIslTe7oWtZiavcZv96YzHLGl9cFCLUCvUUtE=; b=DKHi6qvy8uij7AcX4kPjA7Ay2kKXBVG2kdZAfuC9d/r//g+hWZJk3MHorrdSzmcLfgL3DrEtO0iWh1IaGtFU0AevLWKAP9H9YpEQCmvu2E2IKu3D4swJYAVredLu+XJOmO/64M6FNsLXm4kBMTl+kXTHDL3kAC8S3RJkhGqn7k0= Authentication-Results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=citrix.com; From: Roger Pau Monne To: xen-devel@lists.xenproject.org Cc: Roger Pau Monne , Andrew Cooper , Anthony PERARD , Michal Orzel , Jan Beulich , Julien Grall , Stefano Stabellini Subject: [PATCH v5 3/4] xen/mm: allow deferred scrub of physmap populate allocated pages Date: Fri, 30 Jan 2026 15:57:25 +0100 Message-ID: <20260130145726.85907-4-roger.pau@citrix.com> X-Mailer: git-send-email 2.51.0 In-Reply-To: <20260130145726.85907-1-roger.pau@citrix.com> References: <20260130145726.85907-1-roger.pau@citrix.com> Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable X-ClientProxiedBy: MR1P264CA0208.FRAP264.PROD.OUTLOOK.COM (2603:10a6:501:56::8) To CH7PR03MB7860.namprd03.prod.outlook.com (2603:10b6:610:24e::14) MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: CH7PR03MB7860:EE_|BY5PR03MB5329:EE_ X-MS-Office365-Filtering-Correlation-Id: 37b8877d-429c-41d6-138a-08de6010353c X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0;ARA:13230040|1800799024|366016|376014; X-Microsoft-Antispam-Message-Info: =?utf-8?B?d0ZqOW5BcTBEWUw5WTRla3NSc3J2eXJBTUdJdHhZaFVXNEM3TWszcFg0UFow?= =?utf-8?B?dXNmKzFwRmFGaFBqTmh0aUFIT2Nxblo3MGZFajRKU0lrS2ZTMlRBUnowZ1dh?= =?utf-8?B?ekZEWkdOaHpkUjZPL0VsMHhZS09NblZZVTVYT2ZscmJFMWZjZzVlTUNqejNG?= =?utf-8?B?NlN6c280WEZmZlVraWFvcGdTdk1xdzdlZXk5VUlZbjd0cStrUW1ZSE5MRkNQ?= =?utf-8?B?bFVsV1dTQjFPQzZrY05TR0EzaG42OG9iZjVpOG01Z2xiQitjL1o5N003Y0dT?= =?utf-8?B?cTU0VEdaZzEwTU8vaXhaMnY2KzJ1eTVCd3ZUMjFPQk5tRFV5a0dEdnRidTVN?= =?utf-8?B?YnJjQmxVa2NJTWFxckhidURoMHpxMkp5aVRmcEhmRmdYM3VGRUttUXFrM2dR?= =?utf-8?B?dnl6dHNISEVXUDNkQk1IQm5TUFdLaG1VTGtxRitaR1BPeFIzUjdHTG1iN21j?= =?utf-8?B?anZvbEd6NTM5UEVJK3krTUw5TitXWlpzbGoxWU0xSjk4RGhlb0VXN1RyRTFG?= =?utf-8?B?c2hUUkYvUVZOczZXdEtTdWlzY1MrdlcrR0RTd0Rlb3ZWdHJzdExzbGZvVDZG?= =?utf-8?B?NG4wWXFMR0REc1FRYk5CVjJWMWJYd3Qza0xpV0QrbG40SXQ2L0ZzVXpKTG50?= =?utf-8?B?REFLZUE5YXNpb1dZNlVtcElUbzZJdWlGbXhNbUdCM0ZjeFJzRDMvV0dSbTlI?= =?utf-8?B?aTZTV0pudjNOczV3U2gwS3N0cE5oaTMvWldMS2VPWkVScXFzS3BvRk9VcU1R?= =?utf-8?B?ZnhzMFZCNkV1SGJMYTg3clNYQXhMcTNId1BHZ085bXpYZTNyUldaUzcxcEZB?= =?utf-8?B?amgycUJWb25XWGxNdU8rVlN4bDRNUzIwenR6VEtyUlR3a1hNVVJ1Q2Fia0FL?= =?utf-8?B?SmJHREYvV2JuYXNLN3pNamZuY2ZTdUhVd3A2VGFtNHYybG8xNkRaRFlDR1pN?= =?utf-8?B?RHZScWdUVldlNXpsNmp5Qm5hUEtHR3E4MktTdm9lV0JqL3kwcDZZSTFuTGFp?= =?utf-8?B?YWVZUTZJMEViZDdBenVUVWRwcndadWJiWFovSVFqbEFrUVNNb0QraTNlRC9L?= =?utf-8?B?UUJ5Qno3dXZYR1NyMzBjcTZuVmFIbnUzemZuUThIQVdDL2VPUktudG9tVDlG?= =?utf-8?B?QXZSZmpiR3psbzVHcnZWY0hjQVpOSnQ1UmNxVXZzc3NmMUI0V1B2cm5nNkVE?= =?utf-8?B?NVBmSHlHUGplSklBNGVkUzBzMjhUZ3U1ZDlSRWo1NElzdkJyZ3BOQTJSZTJv?= =?utf-8?B?RkoraUZzRlJzZEZobmswVUc3YzBGUnMwOS9ualNLRHVaOWw1MDVNNkJtRk5B?= =?utf-8?B?Vkd6NlZMNUtFTGtnR3REb0tGQkdXdGdKc0xoMTljUTZUTForWWRnLzlNbDgx?= =?utf-8?B?Y051dWZLZjFqSUExRUxhZUFoTkNkQVRmWVNuQTFjTWxhZWxrZXVUM2tEUVlN?= =?utf-8?B?M1loUUw1YW9rTWRmUjYybnhYSGdNcmc5V3dPU1FQZC9ibFNxYnBteDI5WGhZ?= =?utf-8?B?UVBPMXNEWm9WZnNPWUtkckNHZ2x0SHNSRlFUaEtvMDBHQWdHV09HWXJjVEl2?= =?utf-8?B?RTdSWlJCck9LZVRZUlR2ZE5jckt4bHdZODlaQXVOQ01HK1JIYUNZdDFJay94?= =?utf-8?B?ZC9tbXdPZkdNWnRDQ0czZlRLdVBVbm40R1RHcU1yeDd6SnJiTXkrTXUvRWJG?= =?utf-8?B?cERiWHJOVzBzWk1KMnltMzhtZCs0ZU44MDVSSVF3a0x4VjUwemZjS1grdm5t?= =?utf-8?B?MFdWNXdDR0R0bnZsZmJKWGtjNUF1V1Voc3luWExub2hCQ1NzRXg0aUFoWXI0?= =?utf-8?B?cGMvQWRXdnJvM0xVbHVaZ3lRdmN2WElMRlZFS3dReSs1UWcyTzF0OHlPdVZ5?= =?utf-8?B?MVRVZ21Ba21aTlJndW5saXZodVJnK3JMcWFMQk1tT1pQN0FCZGFnTExWYjJK?= =?utf-8?B?QlNKbWcxajQxNmJXVTlieG81UUEyOENLOEhhY0sxYnJDMmpyTW5FZWR6ZGpY?= =?utf-8?B?RHBGSTIvQ0crd2NLMGkxY0pramhxYUsram5MK2VIVGg4b0UrYUlLYlB3NHI0?= =?utf-8?B?ang3Y1c5MW82M1ZBQ2RIQTJpMjUvVEZBcUtjb3JuY3FaUTVvdm94WU0zQVln?= =?utf-8?Q?Lk60=3D?= X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:CH7PR03MB7860.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(1800799024)(366016)(376014);DIR:OUT;SFP:1101; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?YytWZEkzRDBudkJEVStMeHJRREt2c05zb2MvQ2hlMkQxQ2xRUmxrODNmRDJ3?= =?utf-8?B?alN0S2laUnBadDNnRWlROVkyaGozUnZNRldjTnhiV1RMbktuY1JBTzF2ZHV1?= =?utf-8?B?WUxjODNITWw3R0VtNVc0OU54aURNTWM3YTNNRWtpSXZqRUlKamhpb0F2bmdv?= =?utf-8?B?Vk9DWDhpRlRkS0ZNWGZFakhlcG5FUFZUSVJETXpreTUwOXk0R2hJc1BQSDJC?= =?utf-8?B?TzZjcmxVRFB4dzVUOVJsTW90WlljNURlSVkvWjgvVmZjWjl6V1FsT0wzRVJ3?= =?utf-8?B?ZjJuK0ZLZldRT0VDWUhtWjFWK2lrSS96cU5nNmw0UFo5UGZYS1ZkQ2dLeXQx?= =?utf-8?B?d25FaFJUeTZaVkpGTVQ0bDQ2YXF4YmV5TnRIZGhWYmlHT05vVGYzQm01Ymdi?= =?utf-8?B?K0NpcWdaVjh1UjZBU1phOEI0VHpyQWtrWUY5WHVTQXI4T2gxN1l6eWwwb2RD?= =?utf-8?B?SUZ4YkI2d3VmMEJ0T1RzeXV1cnlyNTJZWCtrRENHMXd5MmZEYTdWR1M1M1Q4?= =?utf-8?B?U1NpYkVqclBtRUtKV1FOcmduR3Nna3ZVdE80QTF0TWV2bExZZmpPVC95eEFX?= =?utf-8?B?eC8zU2dFNDJibGJVM2ltUXhHVUhORXZDRUlVMk00UU4ySVdKZ3NiT0dOKzVI?= =?utf-8?B?YXRpdmx1WkNIeHBKTDdkektremhKRkFCbzBsTytYanFBZWJmRUMvMGVxQ0xK?= =?utf-8?B?bzFXdnpUaXJVaVpVd0VERmRpci9UM29LMTluSGViVmZMZEFNeU1vNG1tYWJQ?= =?utf-8?B?OGdZZUIvdUpudksxVXFTZE9ONGJXNllwYnNCa0JYM0pUSis1OEJKV3Y4OHYx?= =?utf-8?B?dGNDSTNFVmlsQ3pYclRneVNha3QxRjg1YTQxN1FkcE10Z3lYN3VmdzYyRGxC?= =?utf-8?B?Yk1hemZxMmRKWmJLYXVqNWpTRXR5bGE1bzdOWGdvNHdSbjZGS0oyd2lwN01U?= =?utf-8?B?SWptUkJnU2UxT0xyZkg5UVJPZ0FOd3FLeWZDOVVQVm9QNzdDUi9KQWx6ZGV3?= =?utf-8?B?UU1QdWhYcHlsV2hvVmo5dXJMd1dPZW1TRFR0SzFMMnZwVHcySFNRM2ZCem8r?= =?utf-8?B?WkVqTTltRDErYVZsUFZlZVoyK2pUOEZXS1ZXTTIzMGg4YktFTHV4dUsyeW1V?= =?utf-8?B?amVqMGZkbVBkaGJrc1ZJc09WcFZNcU92RXl1QnNrNHY5UFhVUEUrODYya0hH?= =?utf-8?B?d1ZJRU1UY1VlQUV1UEdHeTJ2NWN2WW9rejIraWQ0emtMc2MyK2xXVHpDUnVJ?= =?utf-8?B?Z2xIUmp4UGVNUk5PdEhwMUJhMk9SSUIyeWJMZzJoTWcyTjlTNzJqek05UkV3?= =?utf-8?B?cjFOSHdEaEl3S0dXaDFzZEN6SnFpdysrUlF3cVIrRjhJN2xrRWk5K1NhT0hL?= =?utf-8?B?YjhEOW9KODIxOWxjVUFIVFk1MTBER1JJL2ZPZTNCaHl0ZjRzOG1mM2V6eU5T?= =?utf-8?B?TlZ6Q2FUQ3lkQXRRb0kxTkc2YWxicFVjcnBZUzR1RGE2ck9POG1ISTM4V2pn?= =?utf-8?B?MDR2VU1TT0ZyMWZHSjNTVmtnM0ErTnhyTnR0Q0NwcmxNR0RheCtTYWY3Y0hv?= =?utf-8?B?Mkg2d2ZNMzFIN2NNWHE4S0d5Tlo1NXJhZUZnMVN6UFU3RkRPUUpiK3dEUW4z?= =?utf-8?B?bVFoMHFOZ05WZFNXeCtBd1c1dDFkSnBrV09NaEFyZFowd3c5TzhrejVrWCsy?= =?utf-8?B?d3hlT3FFZ3l4eHFZSzNKZmhpNVNoYmpmcXE5Z3JjSXN6QkFTdXNNZ29EbDdk?= =?utf-8?B?aDZNTGFseWQ5ZXF3eFU0NUxkY2pNRW5hYSt0SUpoSVU0UmlLZUIvcVFOQkFl?= =?utf-8?B?YktGVWd0VTVxL09tVGJwUlI0WFFZY3FpRzdnVW1ta3ZHT0JqUkZzSE92VTRL?= =?utf-8?B?LzN0MXhyMEN6dVF5YTlpTjJIWjBjVkcxaFNEZ2RCYzZlbFdZWnh4NHZ2ZWlr?= =?utf-8?B?Z0liSENVWVkvT3RDYjNReGhRREFNMTdQWW9ycFNFTFlTLytjbGJQSTBLaU1Z?= =?utf-8?B?Zk9jUjBFdUhjUm5lR3FYSWVvdy9HMzBkWFh6M2hUM3QwWFk5ZUY5MlRUM1U0?= =?utf-8?B?YkxFRUNkaDBsWGhFS2tBRDJvQjArcWc3ZTRGdmVWSmFOSlArNFlMckdtNS9o?= =?utf-8?B?ZTEyNEU1OFBEa1g2Rnc2S25OSWhJNjdEUGxaMXVwZTgzNWhjdFRzcHRTTWtV?= =?utf-8?B?dm1iM0s0RTU4czVLdEJaaWhxQUFNM0d0eDRiWmFhSDFWMWJ6aEVPbElNeWwx?= =?utf-8?B?YmViYlhOVEdIUm8xa25NOVNsWEhXdld0MEhPMVBXWXlrK0RGZGtZdnY2c1JG?= =?utf-8?B?cURHaUNnSmFTbXNlcUJ0VlBGZTN5NmVpckg2bU9QeGVpWVVPaWQ4Zz09?= X-OriginatorOrg: citrix.com X-MS-Exchange-CrossTenant-Network-Message-Id: 37b8877d-429c-41d6-138a-08de6010353c X-MS-Exchange-CrossTenant-AuthSource: CH7PR03MB7860.namprd03.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 30 Jan 2026 14:59:46.4126 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: qewn8ZFA5YbE9kgbFZ1vnef26QGw1SWcDbQCw/+BabJag58lFJPXVrqHcKvZPOvXlDU/Ay8fTBgWCAL8TsX7bg== X-MS-Exchange-Transport-CrossTenantHeadersStamped: BY5PR03MB5329 X-ZohoMail-DKIM: pass (identity @citrix.com) X-ZM-MESSAGEID: 1769785235564158500 Physmap population has the need to use pages as big as possible to reduce p2m shattering. However that triggers issues when big enough pages are not yet scrubbed, and so scrubbing must be done at allocation time. On some scenarios with added contention the watchdog can trigger: Watchdog timer detects that CPU55 is stuck! Reviewed-by: Jan Beulich ----[ Xen-4.17.5-21 x86_64 debug=3Dn Not tainted ]---- CPU: 55 RIP: e008:[] clear_page_sse2+0x1a/0x30 RFLAGS: 0000000000000202 CONTEXT: hypervisor (d0v12) [...] Xen call trace: [] R clear_page_sse2+0x1a/0x30 [] S clear_domain_page+0x11/0x20 [] S common/page_alloc.c#alloc_heap_pages+0x400/0x5a0 [] S alloc_domheap_pages+0x67/0x180 [] S common/memory.c#populate_physmap+0x22f/0x3b0 [] S do_memory_op+0x728/0x1970 Introduce a mechanism to preempt page scrubbing in populate_physmap(). It relies on stashing the dirty page in the domain struct temporarily to preempt to guest context, so the scrubbing can resume when the domain re-enters the hypercall. The added deferral mechanism will only be used for domain construction, and is designed to be used with a single threaded domain builder. If the toolstack makes concurrent calls to XENMEM_populate_physmap for the same target domain it will trash stashed pages, resulting in slow domain physmap population. Note a similar issue is present in increase reservation. However that hypercall is likely to only be used once the domain is already running and the known implementations use 4K pages. It will be deal with in a separate patch using a different approach, that will also take care of the allocation in populate_physmap() once the domain is running. Fixes: 74d2e11ccfd2 ("mm: Scrub pages in alloc_heap_pages() if needed") Signed-off-by: Roger Pau Monn=C3=A9 --- Changes since v4: - Introduce d->is_dying check in stash_allocation(). - Move call to domain_pending_scrub_free() to domain_teardown(). Changes since v3: - Introduce helper to free stashed pages. - Attempt to free stashed pages from domain_unpause_by_systemcontroller() also. - Free stashed page in get_stashed_allocation() if it doesn't match the requested parameters. Changes since v2: - Introduce FREE_DOMHEAP_PAGE{,S}(). - Remove j local counter. - Free page pending scrub in domain_kill() also. - Remove BUG_ON(). - Reorder get_stashed_allocation() flow. - s/dirty/unscrubbed/ in a printk message. Changes since v1: - New in this version, different approach than v1. --- xen/common/domain.c | 23 +++++++++ xen/common/memory.c | 105 +++++++++++++++++++++++++++++++++++++++- xen/common/page_alloc.c | 2 +- xen/include/xen/mm.h | 10 ++++ xen/include/xen/sched.h | 5 ++ 5 files changed, 143 insertions(+), 2 deletions(-) diff --git a/xen/common/domain.c b/xen/common/domain.c index 376351b528c9..163f7fc96658 100644 --- a/xen/common/domain.c +++ b/xen/common/domain.c @@ -615,6 +615,18 @@ static int __init cf_check parse_dom0_param(const char= *s) } custom_param("dom0", parse_dom0_param); =20 +static void domain_pending_scrub_free(struct domain *d) +{ + rspin_lock(&d->page_alloc_lock); + if ( d->pending_scrub ) + { + FREE_DOMHEAP_PAGES(d->pending_scrub, d->pending_scrub_order); + d->pending_scrub_order =3D 0; + d->pending_scrub_index =3D 0; + } + rspin_unlock(&d->page_alloc_lock); +} + /* * Release resources held by a domain. There may or may not be live * references to the domain, and it may or may not be fully constructed. @@ -676,6 +688,7 @@ static int domain_teardown(struct domain *d) =20 /* Trivial teardown, not long-running enough to need a preemption = check. */ domain_llc_coloring_free(d); + domain_pending_scrub_free(d); =20 PROGRESS(gnttab_mappings): rc =3D gnttab_release_mappings(d); @@ -719,6 +732,7 @@ static void _domain_destroy(struct domain *d) { BUG_ON(!d->is_dying); BUG_ON(atomic_read(&d->refcnt) !=3D DOMAIN_DESTROYED); + ASSERT(!d->pending_scrub); =20 XVFREE(d->console); =20 @@ -1678,6 +1692,15 @@ int domain_unpause_by_systemcontroller(struct domain= *d) */ if ( new =3D=3D 0 && !d->creation_finished ) { + if ( d->pending_scrub ) + { + printk(XENLOG_ERR + "%pd: cannot be started with pending unscrubbed pages, = destroying\n", + d); + domain_crash(d); + domain_pending_scrub_free(d); + return -EBUSY; + } d->creation_finished =3D true; arch_domain_creation_finished(d); } diff --git a/xen/common/memory.c b/xen/common/memory.c index 10becf7c1f4c..285546298ed9 100644 --- a/xen/common/memory.c +++ b/xen/common/memory.c @@ -159,6 +159,73 @@ static void increase_reservation(struct memop_args *a) a->nr_done =3D i; } =20 +/* + * Temporary storage for a domain assigned page that's not been fully scru= bbed. + * Stored pages must be domheap ones. + * + * The stashed page can be freed at any time by Xen, the caller must pass = the + * order and NUMA node requirement to the fetch function to ensure the + * currently stashed page matches it's requirements. + */ +static void stash_allocation(struct domain *d, struct page_info *page, + unsigned int order, unsigned int scrub_index) +{ + rspin_lock(&d->page_alloc_lock); + + /* + * Drop the passed page in preference for the already stashed one. Th= is + * interface is designed to be used for single-threaded domain creatio= n. + */ + if ( d->pending_scrub || d->is_dying ) + free_domheap_pages(page, order); + else + { + d->pending_scrub_index =3D scrub_index; + d->pending_scrub_order =3D order; + d->pending_scrub =3D page; + } + + rspin_unlock(&d->page_alloc_lock); +} + +static struct page_info *get_stashed_allocation(struct domain *d, + unsigned int order, + nodeid_t node, + unsigned int *scrub_index) +{ + struct page_info *page =3D NULL; + + rspin_lock(&d->page_alloc_lock); + + /* + * If there's a pending page to scrub check if it satisfies the current + * request. If it doesn't free it and return NULL. + */ + if ( d->pending_scrub ) + { + if ( d->pending_scrub_order =3D=3D order && + (node =3D=3D NUMA_NO_NODE || node =3D=3D page_to_nid(d->pendi= ng_scrub)) ) + { + page =3D d->pending_scrub; + *scrub_index =3D d->pending_scrub_index; + } + else + free_domheap_pages(d->pending_scrub, d->pending_scrub_order); + + /* + * The caller now owns the page or it has been freed, clear stashed + * information. Prevent concurrent usages of get_stashed_allocati= on() + * from returning the same page to different contexts. + */ + d->pending_scrub_index =3D 0; + d->pending_scrub_order =3D 0; + d->pending_scrub =3D NULL; + } + + rspin_unlock(&d->page_alloc_lock); + return page; +} + static void populate_physmap(struct memop_args *a) { struct page_info *page; @@ -275,7 +342,19 @@ static void populate_physmap(struct memop_args *a) } else { - page =3D alloc_domheap_pages(d, a->extent_order, a->memfla= gs); + unsigned int scrub_start =3D 0; + unsigned int memflags =3D + a->memflags | (d->creation_finished ? 0 + : MEMF_no_scrub); + nodeid_t node =3D + (a->memflags & MEMF_exact_node) ? MEMF_get_node(a->mem= flags) + : NUMA_NO_NODE; + + page =3D get_stashed_allocation(d, a->extent_order, node, + &scrub_start); + + if ( !page ) + page =3D alloc_domheap_pages(d, a->extent_order, memfl= ags); =20 if ( unlikely(!page) ) { @@ -286,6 +365,30 @@ static void populate_physmap(struct memop_args *a) goto out; } =20 + if ( memflags & MEMF_no_scrub ) + { + unsigned int dirty_cnt =3D 0; + + /* Check if there's anything to scrub. */ + for ( j =3D scrub_start; j < (1U << a->extent_order); = j++ ) + { + if ( !test_and_clear_bit(_PGC_need_scrub, + &page[j].count_info) ) + continue; + + scrub_one_page(&page[j], true); + + if ( (j + 1) !=3D (1U << a->extent_order) && + !(++dirty_cnt & 0xff) && + hypercall_preempt_check() ) + { + a->preempted =3D 1; + stash_allocation(d, page, a->extent_order, ++j= ); + goto out; + } + } + } + if ( unlikely(a->memflags & MEMF_no_tlbflush) ) { for ( j =3D 0; j < (1U << a->extent_order); j++ ) diff --git a/xen/common/page_alloc.c b/xen/common/page_alloc.c index dcb95309b12a..87ebf5a024dc 100644 --- a/xen/common/page_alloc.c +++ b/xen/common/page_alloc.c @@ -792,7 +792,7 @@ static void page_list_add_scrub(struct page_info *pg, u= nsigned int node, # define scrub_page_cold clear_page_cold #endif =20 -static void scrub_one_page(const struct page_info *pg, bool cold) +void scrub_one_page(const struct page_info *pg, bool cold) { void *ptr; =20 diff --git a/xen/include/xen/mm.h b/xen/include/xen/mm.h index 426362adb2f4..d80bfba6d393 100644 --- a/xen/include/xen/mm.h +++ b/xen/include/xen/mm.h @@ -145,6 +145,16 @@ unsigned long avail_node_heap_pages(unsigned int nodei= d); #define alloc_domheap_page(d,f) (alloc_domheap_pages(d,0,f)) #define free_domheap_page(p) (free_domheap_pages(p,0)) =20 +/* Free an allocation, and zero the pointer to it. */ +#define FREE_DOMHEAP_PAGES(p, o) do { \ + void *_ptr_ =3D (p); \ + (p) =3D NULL; \ + free_domheap_pages(_ptr_, o); \ +} while ( false ) +#define FREE_DOMHEAP_PAGE(p) FREE_DOMHEAP_PAGES(p, 0) + +void scrub_one_page(const struct page_info *pg, bool cold); + int online_page(mfn_t mfn, uint32_t *status); int offline_page(mfn_t mfn, int broken, uint32_t *status); int query_page_offline(mfn_t mfn, uint32_t *status); diff --git a/xen/include/xen/sched.h b/xen/include/xen/sched.h index 91d6a49daf16..735d5b76b411 100644 --- a/xen/include/xen/sched.h +++ b/xen/include/xen/sched.h @@ -661,6 +661,11 @@ struct domain =20 /* Pointer to console settings; NULL for system domains. */ struct domain_console *console; + + /* Pointer to allocated domheap page that possibly needs scrubbing. */ + struct page_info *pending_scrub; + unsigned int pending_scrub_order; + unsigned int pending_scrub_index; } __aligned(PAGE_SIZE); =20 static inline struct page_list_head *page_to_list( --=20 2.51.0 From nobody Sat Feb 7 05:14:43 2026 Delivered-To: importer@patchew.org Received-SPF: pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) client-ip=192.237.175.120; envelope-from=xen-devel-bounces@lists.xenproject.org; helo=lists.xenproject.org; Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; arc=pass (i=1 dmarc=pass fromdomain=citrix.com); dmarc=pass(p=reject dis=none) header.from=citrix.com ARC-Seal: i=2; a=rsa-sha256; t=1769785238; cv=pass; d=zohomail.com; s=zohoarc; b=jCwmhNpHBSghhmFKemp+u7Aa/yfpo4Xni3bYiUEjmf5XMrcKr9xifIht0qyZUHpEgyVnBv5/jLhtMJK0OBysBCLb6DfbcfEtod1cQHbzoNijwf5TPFTDHIrk2/dA4Bl/oWTaDXQNNc1xEC9Pv/JLlPoqYVuY8mkaFud4GJZw8/g= ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1769785238; h=Content-Type:Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=mMY1WE+YoJfenQ/Yslc4hayY+Dxvy/1KaKMmJebvlhM=; b=iCmGiDFhriR91Ax8wX5j+ZuPJoLTg+K3i8/QuOifEvbWTNhrM2ynYlbSx6mQb6fXL8pBPF+ldArfjyxEzW7E1NjELKhP0n+Sj5atovwsCj2SUhBaDXx9z/PnHz5Uer8g2nhWZBSj7zAn9MtVkcXMaHmmPBbFgRaEYSmfSA+6OUQ= ARC-Authentication-Results: i=2; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; arc=pass (i=1 dmarc=pass fromdomain=citrix.com); dmarc=pass header.from= (p=reject dis=none) Return-Path: Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) by mx.zohomail.com with SMTPS id 1769785238145186.9174997893225; Fri, 30 Jan 2026 07:00:38 -0800 (PST) Received: from list by lists.xenproject.org with outflank-mailman.1217653.1527067 (Exim 4.92) (envelope-from ) id 1vlpyp-0000HT-4V; Fri, 30 Jan 2026 15:00:15 +0000 Received: by outflank-mailman (output) from mailman id 1217653.1527067; Fri, 30 Jan 2026 15:00:15 +0000 Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1vlpyp-0000HI-1C; Fri, 30 Jan 2026 15:00:15 +0000 Received: by outflank-mailman (input) for mailman id 1217653; Fri, 30 Jan 2026 15:00:13 +0000 Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50] helo=se1-gles-flk1.inumbo.com) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1vlpyn-0007Ra-Jk for xen-devel@lists.xenproject.org; Fri, 30 Jan 2026 15:00:13 +0000 Received: from BL0PR03CU003.outbound.protection.outlook.com (mail-eastusazlp170120007.outbound.protection.outlook.com [2a01:111:f403:c101::7]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS id 603537b5-fdec-11f0-9ccf-f158ae23cfc8; Fri, 30 Jan 2026 16:00:11 +0100 (CET) Received: from CH7PR03MB7860.namprd03.prod.outlook.com (2603:10b6:610:24e::14) by BY5PR03MB5329.namprd03.prod.outlook.com (2603:10b6:a03:22a::23) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9564.7; Fri, 30 Jan 2026 14:59:50 +0000 Received: from CH7PR03MB7860.namprd03.prod.outlook.com ([fe80::f5ba:35df:1c9f:b343]) by CH7PR03MB7860.namprd03.prod.outlook.com ([fe80::f5ba:35df:1c9f:b343%4]) with mapi id 15.20.9564.010; Fri, 30 Jan 2026 14:59:50 +0000 X-Outflank-Mailman: Message body and most headers restored to incoming version X-BeenThere: xen-devel@lists.xenproject.org List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xenproject.org Precedence: list Sender: "Xen-devel" X-Inumbo-ID: 603537b5-fdec-11f0-9ccf-f158ae23cfc8 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=dxSVNY+H06UcZuHBWayl5UWS6JIFcyHyBgdDoFW421knGu0YV/z8uS/6alyMNbhgUOxXGK84FWgnu5vJ6MOCr+vlYjTtfmgttfQaZH0H2RVBNlERPnC9dLyBa8yF36oX7j3y1+kcgJoVUGNKmYEzQFDMnbVijINvcvIbVxUKVYf0mfZ0Ma7Ws5OQhUxgVw2v9dz70buf1FlmSbhLF/OdgV+KsMDfngO1LewYDJAxbea8wKHMCy+kJq4uJBY+g7jzgXfm7y+85ip6bvZjO3EHloHSc/sq0EOEwQ/MKPEMDarOZtZ5dkyySIE87UAu7OHz7LtQkYUxIBXHiCgYA/1D7Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=mMY1WE+YoJfenQ/Yslc4hayY+Dxvy/1KaKMmJebvlhM=; b=DGu+nZId9U+TlNRFpvPPYQvcR3eUrKQCy6iVK+F3TRCVqEEMCGq4vWGdsBMy3x+adnSV8lZPAtCy+6unYv/YWG9f1NL6xM7HCGPg8gfZJSlSK5VuSTjngwqhZEi0Pfdiornkd5wjUG66qlaMZUmZbv++5xcBVFOHH+SY+nm6F1n3jbTyDiyNHSKyQKhhXpWd53NiSI181PDderQXVITkPZymvoZoQeHBOu7z98TbS9mNjUUnz/SrlkHhUKXUhS8eAhybAI2ZDbGyAxTV4gFeYbN/Yazdm+cavpplKxSODcBtkXVcmH4lLJZXqtiEmnZqAJhEgSV3BTsbDn7VQfNy7A== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com; dkim=pass header.d=citrix.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=citrix.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=mMY1WE+YoJfenQ/Yslc4hayY+Dxvy/1KaKMmJebvlhM=; b=Xkir3ZfghtEgAq5BGkNp7XMN9NWyjV1P0b7Y9yRug42FW+yG7bHZOoIlFdDhX6/mBxclVrIcITH91EIPJyoNqCNGlxuikDeql4O1Sghi7VbBz5sFkaFS90gZ2r5pVWCAcwIKcSoTrQFJVuQhK6BHSNQJ2oSFpRyPj1qVyeoQ9mM= Authentication-Results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=citrix.com; From: Roger Pau Monne To: xen-devel@lists.xenproject.org Cc: Roger Pau Monne , Andrew Cooper , Anthony PERARD , Michal Orzel , Jan Beulich , Julien Grall , Stefano Stabellini Subject: [PATCH v5 4/4] xen/mm: limit non-scrubbed allocations to a specific order Date: Fri, 30 Jan 2026 15:57:26 +0100 Message-ID: <20260130145726.85907-5-roger.pau@citrix.com> X-Mailer: git-send-email 2.51.0 In-Reply-To: <20260130145726.85907-1-roger.pau@citrix.com> References: <20260130145726.85907-1-roger.pau@citrix.com> Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable X-ClientProxiedBy: MR1P264CA0189.FRAP264.PROD.OUTLOOK.COM (2603:10a6:501:58::16) To CH7PR03MB7860.namprd03.prod.outlook.com (2603:10b6:610:24e::14) MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: CH7PR03MB7860:EE_|BY5PR03MB5329:EE_ X-MS-Office365-Filtering-Correlation-Id: 40828875-fd64-4bad-c2cb-08de60103776 X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0;ARA:13230040|1800799024|366016|376014; X-Microsoft-Antispam-Message-Info: =?utf-8?B?aERaYzdqTEt0ZCtlU1hTS1BQakM3KzFvUDVlVzEyYU5nNC9CRlVRNGFkczl3?= =?utf-8?B?WjA2c1JPZFBOdG8yWkJZamJtSlgrZ1FLb0VUR2FPaFNsS28rN3pIT2p3Z0NB?= =?utf-8?B?dnd0cnVyeFFZNC9yMWVjUnJTNFJWUStqSnllU0pTTjNoekxGN0xtblJBWm41?= =?utf-8?B?OG9XYnBMTkNveVpockQyNlpBN0tjYTVOUUk3cDhJNllTRS9GS2MwbURucFIz?= =?utf-8?B?c2NYcWQ0WEkrczk2RDJ6MkFteUJzWnYwblpURnErNUpxRnRody82b0xjWW1l?= =?utf-8?B?MG00akZQMjdPT0ZGNmFoeWZLZGxaSnVTYUpGZm42dEF0cDBNNWtIM05HZnhv?= =?utf-8?B?WFd1eGxIbTVCZWIrbkVWSTB6UEdDaUdaak1JWWpnTmcwMWdpdzN5YlVqOUJC?= =?utf-8?B?VmhhdUtNV0JjUUZXNlhJY1pLazNSVjI0SEpkVzd5eWxOMjJ0ekxSb2wyWWZH?= =?utf-8?B?cnFTbVoyY0ZhZHRoaDg2TVhObmJPOXFLZlVTcnFZdWZ5WDU4QTBOeUNDeURr?= =?utf-8?B?dTRRM2tNQjd1M0RWYlNoOWFFS3NjVE5RY1RYaG0veUQrTFh2WjlnYmx4amxk?= =?utf-8?B?dWRtK1dvd1lCYml3RU1JVzZXakpXb2JhV3d3YmUxOWVHMCtOWWtOVW5aY3BM?= =?utf-8?B?NzlOK01INHo0Q0pycXlPQmRBNmhyNDBnTFV1RFhXQXdrSEZWemk3cXBTV1dY?= =?utf-8?B?SnNSWmMvSHNEM0xuTGdtN2VDYnM3SkM2RFZ5R3pvbjFiTE8xSGFOZ1lCVHNa?= =?utf-8?B?bHBOWS9EYWo5SVFqSGdpdVlLaDNKZnZFbGYzeFY2SFZtYVpSZEViZDhqNytE?= =?utf-8?B?bERSRXNmaTJuOUxYbTQ0M3hCSmV6TlVobDlrRk9reFFQRnRwTEl5WXpaUlhJ?= =?utf-8?B?dFRObzk1a3VBdWNPVWptaVp3eDZ4YzdYNWx3Wi83enVvOWo0UnBqeEh3WjNY?= =?utf-8?B?SUlCMzF0ejVyUXpSNFU4cDZVbVZraDFVaTZrUzlrVkV1VjYzdUp1QVRFb2Rk?= =?utf-8?B?eVpiZEN3VGprU1BXSnN0U21nUmFZLzN4ZjE4N2wxWEdZNlFYbnoxM0YzSTlo?= =?utf-8?B?dDYxTVVWeWpvUDYzRFAvYmNNWGtuYVR2dWRDc25Xd3lxaTdnaW96MmdRODQy?= =?utf-8?B?RTlPWDdxdVdMcEgyVXVFbjU0dzlKQ2kyL0VMSGdxZ3lpdFJWUjZweGM0VGNQ?= =?utf-8?B?YXFNSUZrY2d4TmpBdXF6dkJ1UG1xWXNHRklVWVN0RnNpbWZvam8yM0p2bENC?= =?utf-8?B?QnBrKzYvNnJGa014UVo5ZkNleVpvU1poZHlXdEIzdXNJSDdHVTBpR0E3blhE?= =?utf-8?B?RzFSUnNRbVpVUVZZQUtMbEZ5L3lMczlzdk9VTW1vNXJWeFFQZjN2bXVDZW83?= =?utf-8?B?VE1FOTM5UFlMWHNsVS9qT3RMQ0Y0bFlWTTdrblBqQVlZdjJUNXRSWVdtVjJZ?= =?utf-8?B?SnRkcWU4UTVhOG5zVVgvMjdlMHhVbWZmNXA0MTJGWEswNzloQm4xS3FmNGdJ?= =?utf-8?B?TXplalZvaVNaN2xNNE9ta3F1NEd2QUdFSyt2R3g3THhKYVdhVm1LMkdyTzFD?= =?utf-8?B?Ymd0aXRTRi9zcVpvaGFNaUhuUFE5VHBHdTZvUTdDU2ZjV0FoYXZpVDI1S04z?= =?utf-8?B?Wkt3ckViME5QQ1lrQ09rVWRSci93b3lvRlhIQm1RT1l6Z0VmYW8rZUFzRm1G?= =?utf-8?B?M3RqT3FWamhkK0J4RjlhdGhNRll6Mm1QLytJdzdBRnhMSVdqZFVWZllzL3Ex?= =?utf-8?B?NFR1czdXcFlmaUdOSmlXWEh4dmJHaDdDQTA1R2VvMDkzSXBBWnErcFRrT1Z1?= =?utf-8?B?a1ArSFEyV2xQSmdqNnZOMXMvM0VxSTBtaU9mU25tdGF2b24xWk11QktEQVFz?= =?utf-8?B?M0NYUmlac3F5MFJsWERKc3gydUxoUk9mVUZxeDFhVk9QeWhvUmZSTGNJM2VU?= =?utf-8?B?SWZobmY2T0hJZ3Z5akE5am9qQ25MZFdDRU1aOWZPODFhdGhoMndwTkxUemZG?= =?utf-8?B?MjBQWEdaT0dHTDRkRlJNczFTNGN3S2FnRUFQTzllSlJTTWs0SzZ0UTViY0Zz?= =?utf-8?B?L3ZvWGJPeXo5cENCYm1ObGpDbHVPL1g1TGVrb3U3cmdlS3N0Mm11VWFjTEMy?= =?utf-8?Q?P4ns=3D?= X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:CH7PR03MB7860.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(1800799024)(366016)(376014);DIR:OUT;SFP:1101; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?V1lTNEtuOEkxdHUvUHVNSWJ5cjJ2SUVnRW4zejFVckFyRk5IZkdUU0NlZEVq?= =?utf-8?B?NVpBdkRpdUk1V1Rrd29Xc0pXUlAzbHkrSHZSaEs2UUFOL1J4c25jcnNFNVJM?= =?utf-8?B?RUhzQktoeE1xdkdHVXlhcVI2NmRHZmRHS2diTDZqTjlPRkwvR291SVFVUVVR?= =?utf-8?B?bG02MnM1STJCY3U4VHViYTM3dlRDdmZlQWdRMmtkRC92L1Fld21yY250MWFh?= =?utf-8?B?R0NpVnA2RkhvcFRidlljNlMwSU8zYkJhTzNodFAzMFJ0bG1QbEZSVThjY0w5?= =?utf-8?B?ZkVaYWNmTlpBUEhseXhucFozd1lSSnVzdTd3OEgrY1B6VGRLeXJTNGplTUJ4?= =?utf-8?B?VmRHcUoyQitVSnRyZmdZU1hCdzRSRTk5SklxK0tNVGlVOFhCekswRWNmS0lx?= =?utf-8?B?SHZ5WVhEanVTOHdDUXZWNnVyVkp3OWUrREdNSTZjcWdHbDlGaS9KUWVqR3FV?= =?utf-8?B?MnZjRDFNd25xSWNjcnVuR2NEak9EVVE1KytmdStUcjlzelZvYjNmMlhnbDJs?= =?utf-8?B?ZUhFNzVDQUluVzRDczBiM1hDV2VHbml1aTk1czc2TSsxamVRMFlLeEo2bTJD?= =?utf-8?B?OUF0RWxZeW11dVhxV0Y5RVZFU0s3em9aY09obXdsdVhhbzIzeTJmdU9leUZ1?= =?utf-8?B?TjBVcUloTXdMcit3THlOckcvemM3RHhpYlBNQnYxV0xHZmdxWUVVUXl1VFhG?= =?utf-8?B?Zng3NS80UWlpbTRCYTZnS09ibXFDUW40SittdFF4YUxkTXY2SHg1b1E3Q2Ju?= =?utf-8?B?bmlIbHlFZkZ2MlNBSXBCaWdnMGZib0ZlUVVPanZBRmQ4eVM4dzNtZVdHVFpE?= =?utf-8?B?UkFtd3YzRUU2ZkR1OFIzeUFYbzA4TThhVFhRZXk2UG0yWU5JN00xMEZRd1hi?= =?utf-8?B?U3VYMDFOV2hkeWJzS1RsaTdYM2R2MC91YndYaG8yanU1b2Q0THVDbERheUtn?= =?utf-8?B?THQ4Y3ZNNFd1ZEc1Q3VmZE0zQXE5Zm1xNE0zU0k0Q0ZWcWJwRFh6a3NOVmxL?= =?utf-8?B?SHlVUEQwZTdEaFR3Q2Y5QzR2ZkJreUd4c0pUZ0FPRHJyY0R2ZlFoZmJYSTBh?= =?utf-8?B?RWZURXdoRmR3ZHVpOEFCam5pWXBWaXhySVFlMHVId3k4bXFzcnlBTk5XcXFF?= =?utf-8?B?eWgwelVKKzNwbzJTbVB0bEVKc3NQNDlNNTd0NXBoZUJUN3BMNDBFUmhNVTVN?= =?utf-8?B?NzVwbFNZU05VZmV4UVNmbHJBL1QxRmQ5Z0V4bFluMEVjc1NpZnlwNU05QVZW?= =?utf-8?B?VEhXbm0xY0NZNDJZblUwd1pvYk5CNitHMVI3NEtxOXhTNDRLRTlnQVI0TTJl?= =?utf-8?B?VHN5NVoxcHJIcUt5dkJYNlUxeHRXMDNKQ3ZwVnlrb2U3b3lKS1U4WkV1TEQ4?= =?utf-8?B?OVpKbnJ1V1RkeVpXVTF1dVpDUVE5VWR0YXpRYUI1eHlZL2tOK2l5SkViR3hr?= =?utf-8?B?aVNFbEFsRzg2UzgzV3RuaXp2b0dreVJ5OGYrT3BXM2J0RXJUWVRYc1J6NXc0?= =?utf-8?B?R1JjUEJLcVUzNHBkZUZxeUhmejYzWDkvSzM2VVBoemRJSkdNYkFkN25nbGI0?= =?utf-8?B?ekRjL0xBSG1FTXIvblNMZ05yaHBqaUZpSFY4c0xVNjZBSWErWFFrdHF0b0to?= =?utf-8?B?Qmk0U2ZVeXZydWpQYVkweEtvWTU3NnZML0V4SWFjSTNkblhMcDRDY2hkeVM4?= =?utf-8?B?ZzdYMml3TnJjcjYzOFJYM1phSTNKYlNvS01aYmpwNk1aV0JwQ2l6cFU5TjFs?= =?utf-8?B?ZXlKQnMwMUloMkJZalg0aEs5aHEwTVBWdXZjWFJ6WUhPZmVaYmpSYzl6VHNI?= =?utf-8?B?SlVyZXVQU1VEUkJhRXFQRzdqYWhLbmRzSzUvcmFLNXR1MUF3VSs2d0trcC83?= =?utf-8?B?V2FQaWxwTm9HRi93ajJvdkhhZ2pHZ0c3aGE2NjNOL2kwc054c2N6K3dxTmJC?= =?utf-8?B?WkdrSW5wR2NhamwvSG12VTRuV2R4MEhCNEtJMHg2d2V4MkRWOGQ2ZWUyQW5P?= =?utf-8?B?UWY3MHV2S0NmUmYrOCtGSUdGNjBJakRWUXphcCt6bDJySmYxL1YxSjFJWFVz?= =?utf-8?B?eDhvODVoMy9GL0hwT25EeGtCS2lRZWQ3S29UQVBialJQZ281NytNNmovN1c2?= =?utf-8?B?ejNpczhSUFAvREhKWjUycE02eHVnbWxMWE1uL3NzNUhmeXIyOG9ST1h6RHlJ?= =?utf-8?B?ZTdXTVY2cEtHZE5UaC9ZTmtiNXh1a1lQbXUrTlUwWW52cjkvSktuZHFUUG5q?= =?utf-8?B?ZWhkck81NkZDdm9tSGNRb2JKdCt4b29PeFFwRyt1ZERhNGVWbHIrTHE4aDZt?= =?utf-8?B?anVnZko5QWpLdm9VOWJ2Q1AyNmUxZVZnc0JyT2txV09PRVZ0QlpQZz09?= X-OriginatorOrg: citrix.com X-MS-Exchange-CrossTenant-Network-Message-Id: 40828875-fd64-4bad-c2cb-08de60103776 X-MS-Exchange-CrossTenant-AuthSource: CH7PR03MB7860.namprd03.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 30 Jan 2026 14:59:50.1458 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: KDiA6ntw4JjT2SI5r/rkIF51X5+aOPWCQ0MZcl6El2XJefWJocqqemexQ/vezLfdLd8xYEhGPvs5FBO0tOhGwA== X-MS-Exchange-Transport-CrossTenantHeadersStamped: BY5PR03MB5329 X-ZohoMail-DKIM: pass (identity @citrix.com) X-ZM-MESSAGEID: 1769785240183154100 The current logic allows for up to 1G pages to be scrubbed in place, which can cause the watchdog to trigger in practice. Reduce the limit for in-place scrubbed allocations to a newly introduced define: CONFIG_DIRTY_MAX_ORDER. This currently defaults to CONFIG_PTDOM_MAX_ORDER on all architectures. Also introduce a command line option to set the value. Fixes: 74d2e11ccfd2 ("mm: Scrub pages in alloc_heap_pages() if needed") Signed-off-by: Roger Pau Monn=C3=A9 --- Changes since v3: - Note the order limitation is only post-boot. Changes since v2: - Move placement of the max-order-dirty option help. - Add note in memop-max-order about interactions. - Use CONFIG_PTDOM_MAX_ORDER as the default. Changes since v1: - Split from previous patch. - Introduce a command line option to set the limit. --- docs/misc/xen-command-line.pandoc | 13 +++++++++++++ xen/common/memory.c | 3 --- xen/common/page_alloc.c | 23 ++++++++++++++++++++++- xen/include/xen/mm.h | 4 ++++ 4 files changed, 39 insertions(+), 4 deletions(-) diff --git a/docs/misc/xen-command-line.pandoc b/docs/misc/xen-command-line= .pandoc index 15f7a315a4b5..3577e491e379 100644 --- a/docs/misc/xen-command-line.pandoc +++ b/docs/misc/xen-command-line.pandoc @@ -1837,6 +1837,16 @@ presented as the number of bits needed to encode it.= This must be at least one pending bit to be allocated. Defaults to 20 bits (to cover at most 1048576 interrupts). =20 +### max-order-dirty +> `=3D ` + +Specify the maximum allocation order allowed when scrubbing allocated pages +in-place. The allocation is non-preemptive, and hence the value must be k= eep +low enough to avoid hogging the CPU for too long. + +Defaults to `CONFIG_DIRTY_MAX_ORDER` or if unset to `CONFIG_PTDOM_MAX_ORDE= R`. +Note those are internal per-architecture defines not available from Kconfi= g. + ### mce (x86) > `=3D ` =20 @@ -1878,6 +1888,9 @@ requests issued by the various kinds of domains (in t= his order: ordinary DomU, control domain, hardware domain, and - when supported by the platform - DomU with pass-through device assigned). =20 +Note orders here can be further limited by the value in `max-order-dirty` = for +allocations requesting pages to be scrubbed in-place. + ### mmcfg (x86) > `=3D [,amd-fam10]` =20 diff --git a/xen/common/memory.c b/xen/common/memory.c index 285546298ed9..c2682ecbe5b8 100644 --- a/xen/common/memory.c +++ b/xen/common/memory.c @@ -56,9 +56,6 @@ struct memop_args { #ifndef CONFIG_CTLDOM_MAX_ORDER #define CONFIG_CTLDOM_MAX_ORDER CONFIG_PAGEALLOC_MAX_ORDER #endif -#ifndef CONFIG_PTDOM_MAX_ORDER -#define CONFIG_PTDOM_MAX_ORDER CONFIG_HWDOM_MAX_ORDER -#endif =20 static unsigned int __read_mostly domu_max_order =3D CONFIG_DOMU_MAX_ORDER; static unsigned int __read_mostly ctldom_max_order =3D CONFIG_CTLDOM_MAX_O= RDER; diff --git a/xen/common/page_alloc.c b/xen/common/page_alloc.c index 87ebf5a024dc..725d6ee488a4 100644 --- a/xen/common/page_alloc.c +++ b/xen/common/page_alloc.c @@ -267,6 +267,13 @@ static PAGE_LIST_HEAD(page_offlined_list); /* Broken page list, protected by heap_lock. */ static PAGE_LIST_HEAD(page_broken_list); =20 +/* Maximum order allowed for post-boot allocations with MEMF_no_scrub. */ +#ifndef CONFIG_DIRTY_MAX_ORDER +# define CONFIG_DIRTY_MAX_ORDER CONFIG_PTDOM_MAX_ORDER +#endif +static unsigned int __ro_after_init dirty_max_order =3D CONFIG_DIRTY_MAX_O= RDER; +integer_param("max-order-dirty", dirty_max_order); + /************************* * BOOT-TIME ALLOCATOR */ @@ -1008,7 +1015,13 @@ static struct page_info *alloc_heap_pages( =20 pg =3D get_free_buddy(zone_lo, zone_hi, order, memflags, d); /* Try getting a dirty buddy if we couldn't get a clean one. */ - if ( !pg && !(memflags & MEMF_no_scrub) ) + if ( !pg && !(memflags & MEMF_no_scrub) && + /* + * Allow any order unscrubbed allocations during boot time, we + * compensate by processing softirqs in the scrubbing loop below = once + * irqs are enabled. + */ + (order <=3D dirty_max_order || system_state < SYS_STATE_active) ) pg =3D get_free_buddy(zone_lo, zone_hi, order, memflags | MEMF_no_scrub, d); if ( !pg ) @@ -1117,6 +1130,14 @@ static struct page_info *alloc_heap_pages( scrub_one_page(&pg[i], cold); =20 dirty_cnt++; + + /* + * Use SYS_STATE_smp_boot explicitly; ahead of that state + * interrupts are disabled. + */ + if ( system_state =3D=3D SYS_STATE_smp_boot && + !(dirty_cnt & 0xff) ) + process_pending_softirqs(); } else check_one_page(&pg[i]); diff --git a/xen/include/xen/mm.h b/xen/include/xen/mm.h index d80bfba6d393..cf3796d4286d 100644 --- a/xen/include/xen/mm.h +++ b/xen/include/xen/mm.h @@ -232,6 +232,10 @@ struct npfec { #else #define MAX_ORDER 20 /* 2^20 contiguous pages */ #endif +#ifndef CONFIG_PTDOM_MAX_ORDER +# define CONFIG_PTDOM_MAX_ORDER CONFIG_HWDOM_MAX_ORDER +#endif + mfn_t acquire_reserved_page(struct domain *d, unsigned int memflags); =20 /* Private domain structs for DOMID_XEN, DOMID_IO, etc. */ --=20 2.51.0