blob: fdfc64f5aceaa807e392b887d278daf466de3eae [file] [log] [blame]
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -07001/******************************************************************************
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -07002 * Xen balloon driver - enables returning/claiming memory to/from Xen.
3 *
4 * Copyright (c) 2003, B Dragovic
5 * Copyright (c) 2003-2004, M Williamson, K Fraser
6 * Copyright (c) 2005 Dan M. Smith, IBM Corporation
Daniel Kiper080e2be2011-07-25 17:12:06 -07007 * Copyright (c) 2010 Daniel Kiper
8 *
9 * Memory hotplug support was written by Daniel Kiper. Work on
10 * it was sponsored by Google under Google Summer of Code 2010
11 * program. Jeremy Fitzhardinge from Citrix was the mentor for
12 * this project.
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -070013 *
14 * This program is free software; you can redistribute it and/or
15 * modify it under the terms of the GNU General Public License version 2
16 * as published by the Free Software Foundation; or, when distributed
17 * separately from the Linux kernel or incorporated into other
18 * software packages, subject to the following license:
19 *
20 * Permission is hereby granted, free of charge, to any person obtaining a copy
21 * of this source file (the "Software"), to deal in the Software without
22 * restriction, including without limitation the rights to use, copy, modify,
23 * merge, publish, distribute, sublicense, and/or sell copies of the Software,
24 * and to permit persons to whom the Software is furnished to do so, subject to
25 * the following conditions:
26 *
27 * The above copyright notice and this permission notice shall be included in
28 * all copies or substantial portions of the Software.
29 *
30 * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
31 * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
32 * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
33 * AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
34 * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING
35 * FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS
36 * IN THE SOFTWARE.
37 */
38
Joe Perches283c0972013-06-28 03:21:41 -070039#define pr_fmt(fmt) "xen:" KBUILD_MODNAME ": " fmt
40
Stefano Stabellinicd9151e2013-08-04 15:39:40 +010041#include <linux/cpu.h>
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -070042#include <linux/kernel.h>
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -070043#include <linux/sched.h>
Ingo Molnar5b825c32017-02-02 17:54:15 +010044#include <linux/cred.h>
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -070045#include <linux/errno.h>
46#include <linux/mm.h>
Mike Rapoport57c8a662018-10-30 15:09:49 -070047#include <linux/memblock.h>
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -070048#include <linux/pagemap.h>
49#include <linux/highmem.h>
50#include <linux/mutex.h>
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -070051#include <linux/list.h>
Tejun Heo5a0e3ad2010-03-24 17:04:11 +090052#include <linux/gfp.h>
Daniel Kiper080e2be2011-07-25 17:12:06 -070053#include <linux/notifier.h>
54#include <linux/memory.h>
55#include <linux/memory_hotplug.h>
Stefano Stabellinicd9151e2013-08-04 15:39:40 +010056#include <linux/percpu-defs.h>
David Vrabel55b3da92015-06-24 15:58:42 +010057#include <linux/slab.h>
David Vrabel1cf6a6c2015-06-25 16:29:18 +010058#include <linux/sysctl.h>
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -070059
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -070060#include <asm/page.h>
61#include <asm/pgalloc.h>
62#include <asm/pgtable.h>
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -070063#include <asm/tlb.h>
64
Jeremy Fitzhardingeecbf29c2008-12-16 12:37:07 -080065#include <asm/xen/hypervisor.h>
66#include <asm/xen/hypercall.h>
Jeremy Fitzhardinge1ccbf532009-10-06 15:11:14 -070067
68#include <xen/xen.h>
Jeremy Fitzhardingeecbf29c2008-12-16 12:37:07 -080069#include <xen/interface/xen.h>
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -070070#include <xen/interface/memory.h>
Daniel De Graaf803eb042011-03-14 11:29:37 -040071#include <xen/balloon.h>
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -070072#include <xen/features.h>
73#include <xen/page.h>
Oleksandr Andrushchenkoae4c51a2018-07-20 12:01:44 +030074#include <xen/mem-reservation.h>
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -070075
David Vrabel1cf6a6c2015-06-25 16:29:18 +010076static int xen_hotplug_unpopulated;
77
78#ifdef CONFIG_XEN_BALLOON_MEMORY_HOTPLUG
79
80static int zero;
81static int one = 1;
82
83static struct ctl_table balloon_table[] = {
84 {
85 .procname = "hotplug_unpopulated",
86 .data = &xen_hotplug_unpopulated,
87 .maxlen = sizeof(int),
88 .mode = 0644,
89 .proc_handler = proc_dointvec_minmax,
90 .extra1 = &zero,
91 .extra2 = &one,
92 },
93 { }
94};
95
96static struct ctl_table balloon_root[] = {
97 {
98 .procname = "balloon",
99 .mode = 0555,
100 .child = balloon_table,
101 },
102 { }
103};
104
105static struct ctl_table xen_root[] = {
106 {
107 .procname = "xen",
108 .mode = 0555,
109 .child = balloon_root,
110 },
111 { }
112};
113
114#endif
115
Daniel Kiper95d2ac42011-03-08 22:48:24 +0100116/*
Julien Grall30756c62015-05-04 15:39:08 +0100117 * Use one extent per PAGE_SIZE to avoid to break down the page into
118 * multiple frame.
119 */
120#define EXTENT_ORDER (fls(XEN_PFN_PER_PAGE) - 1)
121
122/*
Daniel Kiper95d2ac42011-03-08 22:48:24 +0100123 * balloon_process() state:
124 *
125 * BP_DONE: done or nothing to do,
David Vrabelb2ac6aa2015-06-25 12:10:28 +0100126 * BP_WAIT: wait to be rescheduled,
Daniel Kiper95d2ac42011-03-08 22:48:24 +0100127 * BP_EAGAIN: error, go to sleep,
128 * BP_ECANCELED: error, balloon operation canceled.
129 */
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700130
Daniel Kiper95d2ac42011-03-08 22:48:24 +0100131enum bp_state {
132 BP_DONE,
David Vrabelb2ac6aa2015-06-25 12:10:28 +0100133 BP_WAIT,
Daniel Kiper95d2ac42011-03-08 22:48:24 +0100134 BP_EAGAIN,
135 BP_ECANCELED
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700136};
137
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700138
139static DEFINE_MUTEX(balloon_mutex);
140
Daniel De Graaf803eb042011-03-14 11:29:37 -0400141struct balloon_stats balloon_stats;
142EXPORT_SYMBOL_GPL(balloon_stats);
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700143
144/* We increase/decrease in batches which fit in a page */
Julien Grall3990dd22015-10-07 14:04:33 +0100145static xen_pfn_t frame_list[PAGE_SIZE / sizeof(xen_pfn_t)];
Stefano Stabellinicd9151e2013-08-04 15:39:40 +0100146
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700147
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700148/* List of ballooned pages, threaded through the mem_map array. */
149static LIST_HEAD(ballooned_pages);
David Vrabel1cf6a6c2015-06-25 16:29:18 +0100150static DECLARE_WAIT_QUEUE_HEAD(balloon_wq);
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700151
152/* Main work function, always executed in process context. */
153static void balloon_process(struct work_struct *work);
Daniel Kiper95170b22011-03-08 22:47:39 +0100154static DECLARE_DELAYED_WORK(balloon_worker, balloon_process);
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700155
156/* When ballooning out (allocating memory to return to Xen) we don't really
157 want the kernel to try too hard since that can trigger the oom killer. */
158#define GFP_BALLOON \
159 (GFP_HIGHUSER | __GFP_NOWARN | __GFP_NORETRY | __GFP_NOMEMALLOC)
160
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700161/* balloon_append: add the given page to the balloon. */
Jeremy Fitzhardinge9be4d452010-08-31 15:01:16 -0700162static void __balloon_append(struct page *page)
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700163{
164 /* Lowmem is re-populated first, so highmem pages go at list tail. */
165 if (PageHighMem(page)) {
166 list_add_tail(&page->lru, &ballooned_pages);
167 balloon_stats.balloon_high++;
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700168 } else {
169 list_add(&page->lru, &ballooned_pages);
170 balloon_stats.balloon_low++;
171 }
David Vrabel1cf6a6c2015-06-25 16:29:18 +0100172 wake_up(&balloon_wq);
Jeremy Fitzhardinge9be4d452010-08-31 15:01:16 -0700173}
Gianluca Guida3d65c942009-07-30 22:54:36 +0100174
Jeremy Fitzhardinge9be4d452010-08-31 15:01:16 -0700175static void balloon_append(struct page *page)
176{
177 __balloon_append(page);
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700178}
179
180/* balloon_retrieve: rescue a page from the balloon, if it is not empty. */
David Vrabel81b286e2015-06-25 13:12:46 +0100181static struct page *balloon_retrieve(bool require_lowmem)
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700182{
183 struct page *page;
184
185 if (list_empty(&ballooned_pages))
186 return NULL;
187
David Vrabel81b286e2015-06-25 13:12:46 +0100188 page = list_entry(ballooned_pages.next, struct page, lru);
189 if (require_lowmem && PageHighMem(page))
190 return NULL;
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700191 list_del(&page->lru);
192
Jiang Liu3dcc0572013-07-03 15:03:21 -0700193 if (PageHighMem(page))
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700194 balloon_stats.balloon_high--;
Jiang Liu3dcc0572013-07-03 15:03:21 -0700195 else
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700196 balloon_stats.balloon_low--;
197
198 return page;
199}
200
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700201static struct page *balloon_next_page(struct page *page)
202{
203 struct list_head *next = page->lru.next;
204 if (next == &ballooned_pages)
205 return NULL;
206 return list_entry(next, struct page, lru);
207}
208
Daniel Kiper95d2ac42011-03-08 22:48:24 +0100209static enum bp_state update_schedule(enum bp_state state)
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700210{
David Vrabelb2ac6aa2015-06-25 12:10:28 +0100211 if (state == BP_WAIT)
212 return BP_WAIT;
213
Boris Ostrovskyfd8b7952014-10-07 17:00:07 -0400214 if (state == BP_ECANCELED)
215 return BP_ECANCELED;
216
Daniel Kiper95d2ac42011-03-08 22:48:24 +0100217 if (state == BP_DONE) {
218 balloon_stats.schedule_delay = 1;
219 balloon_stats.retry_count = 1;
220 return BP_DONE;
221 }
222
Daniel Kiper95d2ac42011-03-08 22:48:24 +0100223 ++balloon_stats.retry_count;
224
225 if (balloon_stats.max_retry_count != RETRY_UNLIMITED &&
226 balloon_stats.retry_count > balloon_stats.max_retry_count) {
Daniel Kiper95d2ac42011-03-08 22:48:24 +0100227 balloon_stats.schedule_delay = 1;
228 balloon_stats.retry_count = 1;
229 return BP_ECANCELED;
230 }
231
232 balloon_stats.schedule_delay <<= 1;
233
234 if (balloon_stats.schedule_delay > balloon_stats.max_schedule_delay)
235 balloon_stats.schedule_delay = balloon_stats.max_schedule_delay;
236
237 return BP_EAGAIN;
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700238}
239
Daniel Kiper080e2be2011-07-25 17:12:06 -0700240#ifdef CONFIG_XEN_BALLOON_MEMORY_HOTPLUG
Ross Lagerwall842775f2016-05-10 10:27:54 +0100241static void release_memory_resource(struct resource *resource)
242{
243 if (!resource)
244 return;
245
246 /*
247 * No need to reset region to identity mapped since we now
248 * know that no I/O can be in this region
249 */
250 release_resource(resource);
251 kfree(resource);
252}
253
Boris Ostrovskyb3cf8522017-12-12 15:08:21 -0500254/*
255 * Host memory not allocated to dom0. We can use this range for hotplug-based
256 * ballooning.
257 *
258 * It's a type-less resource. Setting IORESOURCE_MEM will make resource
259 * management algorithms (arch_remove_reservations()) look into guest e820,
260 * which we don't want.
261 */
262static struct resource hostmem_resource = {
263 .name = "Host RAM",
264};
265
266void __attribute__((weak)) __init arch_xen_balloon_init(struct resource *res)
267{}
268
David Vrabel55b3da92015-06-24 15:58:42 +0100269static struct resource *additional_memory_resource(phys_addr_t size)
270{
Boris Ostrovskyb3cf8522017-12-12 15:08:21 -0500271 struct resource *res, *res_hostmem;
272 int ret = -ENOMEM;
David Vrabel55b3da92015-06-24 15:58:42 +0100273
274 res = kzalloc(sizeof(*res), GFP_KERNEL);
275 if (!res)
276 return NULL;
277
278 res->name = "System RAM";
Toshi Kani782b8662016-01-26 21:57:24 +0100279 res->flags = IORESOURCE_SYSTEM_RAM | IORESOURCE_BUSY;
David Vrabel55b3da92015-06-24 15:58:42 +0100280
Boris Ostrovskyb3cf8522017-12-12 15:08:21 -0500281 res_hostmem = kzalloc(sizeof(*res), GFP_KERNEL);
282 if (res_hostmem) {
283 /* Try to grab a range from hostmem */
284 res_hostmem->name = "Host memory";
285 ret = allocate_resource(&hostmem_resource, res_hostmem,
286 size, 0, -1,
287 PAGES_PER_SECTION * PAGE_SIZE, NULL, NULL);
288 }
289
290 if (!ret) {
291 /*
292 * Insert this resource into iomem. Because hostmem_resource
293 * tracks portion of guest e820 marked as UNUSABLE noone else
294 * should try to use it.
295 */
296 res->start = res_hostmem->start;
297 res->end = res_hostmem->end;
298 ret = insert_resource(&iomem_resource, res);
299 if (ret < 0) {
300 pr_err("Can't insert iomem_resource [%llx - %llx]\n",
301 res->start, res->end);
302 release_memory_resource(res_hostmem);
303 res_hostmem = NULL;
304 res->start = res->end = 0;
305 }
306 }
307
308 if (ret) {
309 ret = allocate_resource(&iomem_resource, res,
310 size, 0, -1,
311 PAGES_PER_SECTION * PAGE_SIZE, NULL, NULL);
312 if (ret < 0) {
313 pr_err("Cannot allocate new System RAM resource\n");
314 kfree(res);
315 return NULL;
316 }
David Vrabel55b3da92015-06-24 15:58:42 +0100317 }
318
Ross Lagerwalldfd74a12016-03-17 16:52:00 +0000319#ifdef CONFIG_SPARSEMEM
320 {
321 unsigned long limit = 1UL << (MAX_PHYSMEM_BITS - PAGE_SHIFT);
322 unsigned long pfn = res->start >> PAGE_SHIFT;
323
324 if (pfn > limit) {
325 pr_err("New System RAM resource outside addressable RAM (%lu > %lu)\n",
326 pfn, limit);
327 release_memory_resource(res);
Boris Ostrovskyb3cf8522017-12-12 15:08:21 -0500328 release_memory_resource(res_hostmem);
Ross Lagerwalldfd74a12016-03-17 16:52:00 +0000329 return NULL;
330 }
331 }
332#endif
333
David Vrabel55b3da92015-06-24 15:58:42 +0100334 return res;
335}
336
David Vrabelb2ac6aa2015-06-25 12:10:28 +0100337static enum bp_state reserve_additional_memory(void)
Daniel Kiper080e2be2011-07-25 17:12:06 -0700338{
David Vrabelb2ac6aa2015-06-25 12:10:28 +0100339 long credit;
David Vrabel55b3da92015-06-24 15:58:42 +0100340 struct resource *resource;
Daniel Kiper080e2be2011-07-25 17:12:06 -0700341 int nid, rc;
David Vrabel55b3da92015-06-24 15:58:42 +0100342 unsigned long balloon_hotplug;
Daniel Kiper080e2be2011-07-25 17:12:06 -0700343
David Vrabel1cf6a6c2015-06-25 16:29:18 +0100344 credit = balloon_stats.target_pages + balloon_stats.target_unpopulated
345 - balloon_stats.total_pages;
David Vrabelb2ac6aa2015-06-25 12:10:28 +0100346
347 /*
348 * Already hotplugged enough pages? Wait for them to be
349 * onlined.
350 */
351 if (credit <= 0)
352 return BP_WAIT;
353
David Vrabel55b3da92015-06-24 15:58:42 +0100354 balloon_hotplug = round_up(credit, PAGES_PER_SECTION);
355
356 resource = additional_memory_resource(balloon_hotplug * PAGE_SIZE);
357 if (!resource)
358 goto err;
359
360 nid = memory_add_physaddr_to_nid(resource->start);
Daniel Kiper080e2be2011-07-25 17:12:06 -0700361
Juergen Gross3c56b3a12015-03-20 13:55:39 +0100362#ifdef CONFIG_XEN_HAVE_PVMMU
Julien Grall30756c62015-05-04 15:39:08 +0100363 /*
364 * We don't support PV MMU when Linux and Xen is using
365 * different page granularity.
366 */
367 BUILD_BUG_ON(XEN_PAGE_SIZE != PAGE_SIZE);
368
Juergen Gross3c56b3a12015-03-20 13:55:39 +0100369 /*
370 * add_memory() will build page tables for the new memory so
371 * the p2m must contain invalid entries so the correct
372 * non-present PTEs will be written.
373 *
374 * If a failure occurs, the original (identity) p2m entries
375 * are not restored since this region is now known not to
376 * conflict with any devices.
377 */
378 if (!xen_feature(XENFEAT_auto_translated_physmap)) {
379 unsigned long pfn, i;
380
David Vrabel55b3da92015-06-24 15:58:42 +0100381 pfn = PFN_DOWN(resource->start);
Juergen Gross3c56b3a12015-03-20 13:55:39 +0100382 for (i = 0; i < balloon_hotplug; i++) {
383 if (!set_phys_to_machine(pfn + i, INVALID_P2M_ENTRY)) {
384 pr_warn("set_phys_to_machine() failed, no memory added\n");
David Vrabel55b3da92015-06-24 15:58:42 +0100385 goto err;
Juergen Gross3c56b3a12015-03-20 13:55:39 +0100386 }
387 }
388 }
389#endif
390
Vitaly Kuznetsov703fc132016-03-15 14:56:52 -0700391 /*
392 * add_memory_resource() will call online_pages() which in its turn
393 * will call xen_online_page() callback causing deadlock if we don't
394 * release balloon_mutex here. Unlocking here is safe because the
395 * callers drop the mutex before trying again.
396 */
397 mutex_unlock(&balloon_mutex);
David Hildenbrand8df1d0e2018-10-30 15:10:24 -0700398 /* add_memory_resource() requires the device_hotplug lock */
399 lock_device_hotplug();
Vitaly Kuznetsov703fc132016-03-15 14:56:52 -0700400 rc = add_memory_resource(nid, resource, memhp_auto_online);
David Hildenbrand8df1d0e2018-10-30 15:10:24 -0700401 unlock_device_hotplug();
Vitaly Kuznetsov703fc132016-03-15 14:56:52 -0700402 mutex_lock(&balloon_mutex);
403
Daniel Kiper080e2be2011-07-25 17:12:06 -0700404 if (rc) {
David Vrabel3dcf6362014-09-01 18:52:44 +0100405 pr_warn("Cannot add additional memory (%i)\n", rc);
David Vrabel55b3da92015-06-24 15:58:42 +0100406 goto err;
Daniel Kiper080e2be2011-07-25 17:12:06 -0700407 }
408
David Vrabelde5a77d2015-06-25 12:08:20 +0100409 balloon_stats.total_pages += balloon_hotplug;
Daniel Kiper080e2be2011-07-25 17:12:06 -0700410
David Vrabelb2ac6aa2015-06-25 12:10:28 +0100411 return BP_WAIT;
David Vrabel55b3da92015-06-24 15:58:42 +0100412 err:
413 release_memory_resource(resource);
414 return BP_ECANCELED;
Daniel Kiper080e2be2011-07-25 17:12:06 -0700415}
416
417static void xen_online_page(struct page *page)
418{
419 __online_page_set_limits(page);
420
421 mutex_lock(&balloon_mutex);
422
423 __balloon_append(page);
424
Daniel Kiper080e2be2011-07-25 17:12:06 -0700425 mutex_unlock(&balloon_mutex);
426}
427
428static int xen_memory_notifier(struct notifier_block *nb, unsigned long val, void *v)
429{
430 if (val == MEM_ONLINE)
431 schedule_delayed_work(&balloon_worker, 0);
432
433 return NOTIFY_OK;
434}
435
436static struct notifier_block xen_memory_nb = {
437 .notifier_call = xen_memory_notifier,
438 .priority = 0
439};
440#else
David Vrabelb2ac6aa2015-06-25 12:10:28 +0100441static enum bp_state reserve_additional_memory(void)
Daniel Kiper080e2be2011-07-25 17:12:06 -0700442{
443 balloon_stats.target_pages = balloon_stats.current_pages;
David Vrabel1cf6a6c2015-06-25 16:29:18 +0100444 return BP_ECANCELED;
Daniel Kiper080e2be2011-07-25 17:12:06 -0700445}
446#endif /* CONFIG_XEN_BALLOON_MEMORY_HOTPLUG */
447
David Vrabelde5a77d2015-06-25 12:08:20 +0100448static long current_credit(void)
449{
450 return balloon_stats.target_pages - balloon_stats.current_pages;
451}
452
453static bool balloon_is_inflated(void)
454{
455 return balloon_stats.balloon_low || balloon_stats.balloon_high;
456}
457
Daniel Kiper95d2ac42011-03-08 22:48:24 +0100458static enum bp_state increase_reservation(unsigned long nr_pages)
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700459{
Daniel Kiper95d2ac42011-03-08 22:48:24 +0100460 int rc;
Julien Grall30756c62015-05-04 15:39:08 +0100461 unsigned long i;
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700462 struct page *page;
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700463
464 if (nr_pages > ARRAY_SIZE(frame_list))
465 nr_pages = ARRAY_SIZE(frame_list);
466
Jie Liu9346c2a2013-11-13 20:59:58 +0800467 page = list_first_entry_or_null(&ballooned_pages, struct page, lru);
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700468 for (i = 0; i < nr_pages; i++) {
Daniel Kiper95d2ac42011-03-08 22:48:24 +0100469 if (!page) {
470 nr_pages = i;
471 break;
472 }
Julien Grall30756c62015-05-04 15:39:08 +0100473
Julien Grall30756c62015-05-04 15:39:08 +0100474 frame_list[i] = page_to_xen_pfn(page);
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700475 page = balloon_next_page(page);
476 }
477
Oleksandr Andrushchenkoae4c51a2018-07-20 12:01:44 +0300478 rc = xenmem_reservation_increase(nr_pages, frame_list);
Konrad Rzeszutek Wilk40095de2011-03-14 11:42:40 -0400479 if (rc <= 0)
Daniel Kiper95d2ac42011-03-08 22:48:24 +0100480 return BP_EAGAIN;
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700481
Ian Campbellbc2c0302009-06-05 11:58:37 +0100482 for (i = 0; i < rc; i++) {
Konrad Rzeszutek Wilkb6f30672011-03-15 10:23:57 -0400483 page = balloon_retrieve(false);
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700484 BUG_ON(page == NULL);
485
Oleksandr Andrushchenkoae4c51a2018-07-20 12:01:44 +0300486 xenmem_reservation_va_mapping_update(1, &page, &frame_list[i]);
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700487
488 /* Relinquish the page back to the allocator. */
Ross Lagerwall709613a2016-12-09 17:10:22 +0000489 free_reserved_page(page);
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700490 }
491
Ian Campbellbc2c0302009-06-05 11:58:37 +0100492 balloon_stats.current_pages += rc;
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700493
Daniel Kiper95d2ac42011-03-08 22:48:24 +0100494 return BP_DONE;
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700495}
496
Konrad Rzeszutek Wilkb6f30672011-03-15 10:23:57 -0400497static enum bp_state decrease_reservation(unsigned long nr_pages, gfp_t gfp)
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700498{
Daniel Kiper95d2ac42011-03-08 22:48:24 +0100499 enum bp_state state = BP_DONE;
Julien Grall30756c62015-05-04 15:39:08 +0100500 unsigned long i;
501 struct page *page, *tmp;
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700502 int ret;
Julien Grall30756c62015-05-04 15:39:08 +0100503 LIST_HEAD(pages);
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700504
505 if (nr_pages > ARRAY_SIZE(frame_list))
506 nr_pages = ARRAY_SIZE(frame_list);
507
508 for (i = 0; i < nr_pages; i++) {
Lisa Nguyenfce92682013-05-15 22:59:40 -0700509 page = alloc_page(gfp);
510 if (page == NULL) {
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700511 nr_pages = i;
Daniel Kiper95d2ac42011-03-08 22:48:24 +0100512 state = BP_EAGAIN;
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700513 break;
514 }
Ross Lagerwall709613a2016-12-09 17:10:22 +0000515 adjust_managed_page_count(page, -1);
Oleksandr Andrushchenkoae4c51a2018-07-20 12:01:44 +0300516 xenmem_reservation_scrub_page(page);
Julien Grall30756c62015-05-04 15:39:08 +0100517 list_add(&page->lru, &pages);
Wei Liu09ed3d52014-03-15 16:11:47 +0000518 }
519
520 /*
521 * Ensure that ballooned highmem pages don't have kmaps.
522 *
523 * Do this before changing the p2m as kmap_flush_unused()
524 * reads PTEs to obtain pages (and hence needs the original
525 * p2m entry).
526 */
527 kmap_flush_unused();
528
Julien Grall30756c62015-05-04 15:39:08 +0100529 /*
530 * Setup the frame, update direct mapping, invalidate P2M,
531 * and add to balloon.
532 */
533 i = 0;
534 list_for_each_entry_safe(page, tmp, &pages, lru) {
Julien Grall30756c62015-05-04 15:39:08 +0100535 frame_list[i++] = xen_page_to_gfn(page);
Wei Liu09ed3d52014-03-15 16:11:47 +0000536
Oleksandr Andrushchenkoae4c51a2018-07-20 12:01:44 +0300537 xenmem_reservation_va_mapping_reset(1, &page);
Julien Grall30756c62015-05-04 15:39:08 +0100538
Julien Grall30756c62015-05-04 15:39:08 +0100539 list_del(&page->lru);
David Vrabel24f69372013-09-19 17:14:53 +0100540
Wei Liu09ed3d52014-03-15 16:11:47 +0000541 balloon_append(page);
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700542 }
543
David Vrabel24f69372013-09-19 17:14:53 +0100544 flush_tlb_all();
David Vrabel2bad07c2013-09-11 17:45:44 +0000545
Oleksandr Andrushchenkoae4c51a2018-07-20 12:01:44 +0300546 ret = xenmem_reservation_decrease(nr_pages, frame_list);
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700547 BUG_ON(ret != nr_pages);
548
549 balloon_stats.current_pages -= nr_pages;
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700550
Daniel Kiper95d2ac42011-03-08 22:48:24 +0100551 return state;
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700552}
553
554/*
Juergen Gross929423f2015-07-20 13:49:39 +0200555 * As this is a work item it is guaranteed to run as a single instance only.
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700556 * We may of course race updates of the target counts (which are protected
557 * by the balloon lock), or with changes to the Xen hard limit, but we will
558 * recover from these in time.
559 */
560static void balloon_process(struct work_struct *work)
561{
Daniel Kiper95d2ac42011-03-08 22:48:24 +0100562 enum bp_state state = BP_DONE;
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700563 long credit;
564
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700565
566 do {
Juergen Gross929423f2015-07-20 13:49:39 +0200567 mutex_lock(&balloon_mutex);
568
Daniel Kiper83be7e52011-03-28 11:34:10 +0200569 credit = current_credit();
Daniel Kiper95d2ac42011-03-08 22:48:24 +0100570
Daniel Kiper080e2be2011-07-25 17:12:06 -0700571 if (credit > 0) {
572 if (balloon_is_inflated())
573 state = increase_reservation(credit);
574 else
David Vrabelb2ac6aa2015-06-25 12:10:28 +0100575 state = reserve_additional_memory();
Daniel Kiper080e2be2011-07-25 17:12:06 -0700576 }
Daniel Kiper95d2ac42011-03-08 22:48:24 +0100577
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700578 if (credit < 0)
Konrad Rzeszutek Wilkb6f30672011-03-15 10:23:57 -0400579 state = decrease_reservation(-credit, GFP_BALLOON);
Daniel Kiper95d2ac42011-03-08 22:48:24 +0100580
581 state = update_schedule(state);
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700582
Juergen Gross929423f2015-07-20 13:49:39 +0200583 mutex_unlock(&balloon_mutex);
584
585 cond_resched();
586
Daniel Kiper95d2ac42011-03-08 22:48:24 +0100587 } while (credit && state == BP_DONE);
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700588
589 /* Schedule more work if there is some still to be done. */
Daniel Kiper95d2ac42011-03-08 22:48:24 +0100590 if (state == BP_EAGAIN)
591 schedule_delayed_work(&balloon_worker, balloon_stats.schedule_delay * HZ);
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700592}
593
594/* Resets the Xen limit, sets new target, and kicks off processing. */
Daniel De Graaf803eb042011-03-14 11:29:37 -0400595void balloon_set_new_target(unsigned long target)
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700596{
597 /* No need for lock. Not read-modify-write updates. */
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700598 balloon_stats.target_pages = target;
Daniel Kiper95170b22011-03-08 22:47:39 +0100599 schedule_delayed_work(&balloon_worker, 0);
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700600}
Daniel De Graaf803eb042011-03-14 11:29:37 -0400601EXPORT_SYMBOL_GPL(balloon_set_new_target);
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700602
David Vrabel1cf6a6c2015-06-25 16:29:18 +0100603static int add_ballooned_pages(int nr_pages)
604{
605 enum bp_state st;
606
607 if (xen_hotplug_unpopulated) {
608 st = reserve_additional_memory();
609 if (st != BP_ECANCELED) {
610 mutex_unlock(&balloon_mutex);
611 wait_event(balloon_wq,
612 !list_empty(&ballooned_pages));
613 mutex_lock(&balloon_mutex);
614 return 0;
615 }
616 }
617
618 st = decrease_reservation(nr_pages, GFP_USER);
619 if (st != BP_DONE)
620 return -ENOMEM;
621
622 return 0;
623}
624
Konrad Rzeszutek Wilkb6f30672011-03-15 10:23:57 -0400625/**
626 * alloc_xenballooned_pages - get pages that have been ballooned out
627 * @nr_pages: Number of pages to get
628 * @pages: pages returned
629 * @return 0 on success, error otherwise
630 */
David Vrabel81b286e2015-06-25 13:12:46 +0100631int alloc_xenballooned_pages(int nr_pages, struct page **pages)
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700632{
Konrad Rzeszutek Wilkb6f30672011-03-15 10:23:57 -0400633 int pgno = 0;
Ruslan Pisareve882dc92011-07-26 14:15:59 +0300634 struct page *page;
David Vrabel1cf6a6c2015-06-25 16:29:18 +0100635 int ret;
636
Konrad Rzeszutek Wilkb6f30672011-03-15 10:23:57 -0400637 mutex_lock(&balloon_mutex);
David Vrabel1cf6a6c2015-06-25 16:29:18 +0100638
639 balloon_stats.target_unpopulated += nr_pages;
640
Konrad Rzeszutek Wilkb6f30672011-03-15 10:23:57 -0400641 while (pgno < nr_pages) {
David Vrabel81b286e2015-06-25 13:12:46 +0100642 page = balloon_retrieve(true);
643 if (page) {
Konrad Rzeszutek Wilkb6f30672011-03-15 10:23:57 -0400644 pages[pgno++] = page;
David Vrabel4a69c902015-07-22 14:50:37 +0100645#ifdef CONFIG_XEN_HAVE_PVMMU
Julien Grall30756c62015-05-04 15:39:08 +0100646 /*
647 * We don't support PV MMU when Linux and Xen is using
648 * different page granularity.
649 */
650 BUILD_BUG_ON(XEN_PAGE_SIZE != PAGE_SIZE);
651
Boris Ostrovskyb194da22017-08-23 18:27:04 -0400652 if (!xen_feature(XENFEAT_auto_translated_physmap)) {
653 ret = xen_alloc_p2m_entry(page_to_pfn(page));
654 if (ret < 0)
655 goto out_undo;
656 }
David Vrabel4a69c902015-07-22 14:50:37 +0100657#endif
Konrad Rzeszutek Wilkb6f30672011-03-15 10:23:57 -0400658 } else {
David Vrabel1cf6a6c2015-06-25 16:29:18 +0100659 ret = add_ballooned_pages(nr_pages - pgno);
660 if (ret < 0)
Konrad Rzeszutek Wilkb6f30672011-03-15 10:23:57 -0400661 goto out_undo;
662 }
663 }
664 mutex_unlock(&balloon_mutex);
665 return 0;
666 out_undo:
Konrad Rzeszutek Wilkb6f30672011-03-15 10:23:57 -0400667 mutex_unlock(&balloon_mutex);
David Vrabel1cf6a6c2015-06-25 16:29:18 +0100668 free_xenballooned_pages(pgno, pages);
669 return ret;
Konrad Rzeszutek Wilkb6f30672011-03-15 10:23:57 -0400670}
671EXPORT_SYMBOL(alloc_xenballooned_pages);
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700672
Konrad Rzeszutek Wilkb6f30672011-03-15 10:23:57 -0400673/**
674 * free_xenballooned_pages - return pages retrieved with get_ballooned_pages
675 * @nr_pages: Number of pages
676 * @pages: pages to return
677 */
Ruslan Pisareve882dc92011-07-26 14:15:59 +0300678void free_xenballooned_pages(int nr_pages, struct page **pages)
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700679{
Konrad Rzeszutek Wilkb6f30672011-03-15 10:23:57 -0400680 int i;
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700681
Konrad Rzeszutek Wilkb6f30672011-03-15 10:23:57 -0400682 mutex_lock(&balloon_mutex);
683
684 for (i = 0; i < nr_pages; i++) {
685 if (pages[i])
686 balloon_append(pages[i]);
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700687 }
688
David Vrabel1cf6a6c2015-06-25 16:29:18 +0100689 balloon_stats.target_unpopulated -= nr_pages;
690
Konrad Rzeszutek Wilkb6f30672011-03-15 10:23:57 -0400691 /* The balloon may be too large now. Shrink it if needed. */
Daniel Kiper83be7e52011-03-28 11:34:10 +0200692 if (current_credit())
Konrad Rzeszutek Wilkb6f30672011-03-15 10:23:57 -0400693 schedule_delayed_work(&balloon_worker, 0);
694
695 mutex_unlock(&balloon_mutex);
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700696}
Konrad Rzeszutek Wilkb6f30672011-03-15 10:23:57 -0400697EXPORT_SYMBOL(free_xenballooned_pages);
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700698
Vitaly Kuznetsov4fee9ad2017-03-14 18:35:53 +0100699#ifdef CONFIG_XEN_PV
David Vrabel8b5d44a2011-09-28 17:46:34 +0100700static void __init balloon_add_region(unsigned long start_pfn,
701 unsigned long pages)
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700702{
Daniel Kiper4dfe22f2011-03-28 11:33:18 +0200703 unsigned long pfn, extra_pfn_end;
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700704 struct page *page;
705
David Vrabel8b5d44a2011-09-28 17:46:34 +0100706 /*
707 * If the amount of usable memory has been limited (e.g., with
708 * the 'mem' command line parameter), don't add pages beyond
709 * this limit.
710 */
711 extra_pfn_end = min(max_pfn, start_pfn + pages);
712
713 for (pfn = start_pfn; pfn < extra_pfn_end; pfn++) {
714 page = pfn_to_page(pfn);
715 /* totalram_pages and totalhigh_pages do not
716 include the boot-time balloon extension, so
717 don't subtract from it. */
718 __balloon_append(page);
719 }
David Vrabelde5a77d2015-06-25 12:08:20 +0100720
721 balloon_stats.total_pages += extra_pfn_end - start_pfn;
David Vrabel8b5d44a2011-09-28 17:46:34 +0100722}
Vitaly Kuznetsov4fee9ad2017-03-14 18:35:53 +0100723#endif
David Vrabel8b5d44a2011-09-28 17:46:34 +0100724
725static int __init balloon_init(void)
726{
Stefano Stabellini53d55222010-12-02 17:55:05 +0000727 if (!xen_domain())
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700728 return -ENODEV;
729
Joe Perches283c0972013-06-28 03:21:41 -0700730 pr_info("Initialising balloon driver\n");
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700731
Vitaly Kuznetsov4fee9ad2017-03-14 18:35:53 +0100732#ifdef CONFIG_XEN_PV
David Vrabelaa244112011-09-28 17:46:32 +0100733 balloon_stats.current_pages = xen_pv_domain()
734 ? min(xen_start_info->nr_pages - xen_released_pages, max_pfn)
Boris Ostrovskyc275a572013-11-06 15:37:40 -0500735 : get_num_physpages();
Vitaly Kuznetsov4fee9ad2017-03-14 18:35:53 +0100736#else
737 balloon_stats.current_pages = get_num_physpages();
738#endif
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700739 balloon_stats.target_pages = balloon_stats.current_pages;
740 balloon_stats.balloon_low = 0;
741 balloon_stats.balloon_high = 0;
David Vrabelde5a77d2015-06-25 12:08:20 +0100742 balloon_stats.total_pages = balloon_stats.current_pages;
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700743
Daniel Kiper95d2ac42011-03-08 22:48:24 +0100744 balloon_stats.schedule_delay = 1;
745 balloon_stats.max_schedule_delay = 32;
746 balloon_stats.retry_count = 1;
Konrad Rzeszutek Wilk40095de2011-03-14 11:42:40 -0400747 balloon_stats.max_retry_count = RETRY_UNLIMITED;
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700748
Daniel Kiper080e2be2011-07-25 17:12:06 -0700749#ifdef CONFIG_XEN_BALLOON_MEMORY_HOTPLUG
Daniel Kiper080e2be2011-07-25 17:12:06 -0700750 set_online_page_callback(&xen_online_page);
751 register_memory_notifier(&xen_memory_nb);
David Vrabel1cf6a6c2015-06-25 16:29:18 +0100752 register_sysctl_table(xen_root);
Boris Ostrovskyb3cf8522017-12-12 15:08:21 -0500753
754 arch_xen_balloon_init(&hostmem_resource);
Daniel Kiper080e2be2011-07-25 17:12:06 -0700755#endif
756
Vitaly Kuznetsov4fee9ad2017-03-14 18:35:53 +0100757#ifdef CONFIG_XEN_PV
758 {
759 int i;
760
761 /*
762 * Initialize the balloon with pages from the extra memory
763 * regions (see arch/x86/xen/setup.c).
764 */
765 for (i = 0; i < XEN_EXTRA_MEM_MAX_REGIONS; i++)
766 if (xen_extra_mem[i].n_pfns)
767 balloon_add_region(xen_extra_mem[i].start_pfn,
768 xen_extra_mem[i].n_pfns);
769 }
770#endif
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700771
Juergen Gross96edd612017-07-10 10:10:45 +0200772 /* Init the xen-balloon driver. */
773 xen_balloon_init();
774
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700775 return 0;
776}
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700777subsys_initcall(balloon_init);