blob: 065f0b607373402a0d4dd7520b9820503390fb0a [file] [log] [blame]
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -07001/******************************************************************************
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -07002 * Xen balloon driver - enables returning/claiming memory to/from Xen.
3 *
4 * Copyright (c) 2003, B Dragovic
5 * Copyright (c) 2003-2004, M Williamson, K Fraser
6 * Copyright (c) 2005 Dan M. Smith, IBM Corporation
Daniel Kiper080e2be2011-07-25 17:12:06 -07007 * Copyright (c) 2010 Daniel Kiper
8 *
9 * Memory hotplug support was written by Daniel Kiper. Work on
10 * it was sponsored by Google under Google Summer of Code 2010
11 * program. Jeremy Fitzhardinge from Citrix was the mentor for
12 * this project.
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -070013 *
14 * This program is free software; you can redistribute it and/or
15 * modify it under the terms of the GNU General Public License version 2
16 * as published by the Free Software Foundation; or, when distributed
17 * separately from the Linux kernel or incorporated into other
18 * software packages, subject to the following license:
19 *
20 * Permission is hereby granted, free of charge, to any person obtaining a copy
21 * of this source file (the "Software"), to deal in the Software without
22 * restriction, including without limitation the rights to use, copy, modify,
23 * merge, publish, distribute, sublicense, and/or sell copies of the Software,
24 * and to permit persons to whom the Software is furnished to do so, subject to
25 * the following conditions:
26 *
27 * The above copyright notice and this permission notice shall be included in
28 * all copies or substantial portions of the Software.
29 *
30 * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
31 * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
32 * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
33 * AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
34 * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING
35 * FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS
36 * IN THE SOFTWARE.
37 */
38
Joe Perches283c0972013-06-28 03:21:41 -070039#define pr_fmt(fmt) "xen:" KBUILD_MODNAME ": " fmt
40
Stefano Stabellinicd9151e2013-08-04 15:39:40 +010041#include <linux/cpu.h>
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -070042#include <linux/kernel.h>
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -070043#include <linux/sched.h>
Ingo Molnar5b825c32017-02-02 17:54:15 +010044#include <linux/cred.h>
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -070045#include <linux/errno.h>
46#include <linux/mm.h>
47#include <linux/bootmem.h>
48#include <linux/pagemap.h>
49#include <linux/highmem.h>
50#include <linux/mutex.h>
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -070051#include <linux/list.h>
Tejun Heo5a0e3ad2010-03-24 17:04:11 +090052#include <linux/gfp.h>
Daniel Kiper080e2be2011-07-25 17:12:06 -070053#include <linux/notifier.h>
54#include <linux/memory.h>
55#include <linux/memory_hotplug.h>
Stefano Stabellinicd9151e2013-08-04 15:39:40 +010056#include <linux/percpu-defs.h>
David Vrabel55b3da92015-06-24 15:58:42 +010057#include <linux/slab.h>
David Vrabel1cf6a6c2015-06-25 16:29:18 +010058#include <linux/sysctl.h>
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -070059
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -070060#include <asm/page.h>
61#include <asm/pgalloc.h>
62#include <asm/pgtable.h>
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -070063#include <asm/tlb.h>
64
Jeremy Fitzhardingeecbf29c2008-12-16 12:37:07 -080065#include <asm/xen/hypervisor.h>
66#include <asm/xen/hypercall.h>
Jeremy Fitzhardinge1ccbf532009-10-06 15:11:14 -070067
68#include <xen/xen.h>
Jeremy Fitzhardingeecbf29c2008-12-16 12:37:07 -080069#include <xen/interface/xen.h>
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -070070#include <xen/interface/memory.h>
Daniel De Graaf803eb042011-03-14 11:29:37 -040071#include <xen/balloon.h>
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -070072#include <xen/features.h>
73#include <xen/page.h>
74
David Vrabel1cf6a6c2015-06-25 16:29:18 +010075static int xen_hotplug_unpopulated;
76
77#ifdef CONFIG_XEN_BALLOON_MEMORY_HOTPLUG
78
79static int zero;
80static int one = 1;
81
82static struct ctl_table balloon_table[] = {
83 {
84 .procname = "hotplug_unpopulated",
85 .data = &xen_hotplug_unpopulated,
86 .maxlen = sizeof(int),
87 .mode = 0644,
88 .proc_handler = proc_dointvec_minmax,
89 .extra1 = &zero,
90 .extra2 = &one,
91 },
92 { }
93};
94
95static struct ctl_table balloon_root[] = {
96 {
97 .procname = "balloon",
98 .mode = 0555,
99 .child = balloon_table,
100 },
101 { }
102};
103
104static struct ctl_table xen_root[] = {
105 {
106 .procname = "xen",
107 .mode = 0555,
108 .child = balloon_root,
109 },
110 { }
111};
112
113#endif
114
Daniel Kiper95d2ac42011-03-08 22:48:24 +0100115/*
Julien Grall30756c62015-05-04 15:39:08 +0100116 * Use one extent per PAGE_SIZE to avoid to break down the page into
117 * multiple frame.
118 */
119#define EXTENT_ORDER (fls(XEN_PFN_PER_PAGE) - 1)
120
121/*
Daniel Kiper95d2ac42011-03-08 22:48:24 +0100122 * balloon_process() state:
123 *
124 * BP_DONE: done or nothing to do,
David Vrabelb2ac6aa2015-06-25 12:10:28 +0100125 * BP_WAIT: wait to be rescheduled,
Daniel Kiper95d2ac42011-03-08 22:48:24 +0100126 * BP_EAGAIN: error, go to sleep,
127 * BP_ECANCELED: error, balloon operation canceled.
128 */
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700129
Daniel Kiper95d2ac42011-03-08 22:48:24 +0100130enum bp_state {
131 BP_DONE,
David Vrabelb2ac6aa2015-06-25 12:10:28 +0100132 BP_WAIT,
Daniel Kiper95d2ac42011-03-08 22:48:24 +0100133 BP_EAGAIN,
134 BP_ECANCELED
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700135};
136
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700137
138static DEFINE_MUTEX(balloon_mutex);
139
Daniel De Graaf803eb042011-03-14 11:29:37 -0400140struct balloon_stats balloon_stats;
141EXPORT_SYMBOL_GPL(balloon_stats);
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700142
143/* We increase/decrease in batches which fit in a page */
Julien Grall3990dd22015-10-07 14:04:33 +0100144static xen_pfn_t frame_list[PAGE_SIZE / sizeof(xen_pfn_t)];
Stefano Stabellinicd9151e2013-08-04 15:39:40 +0100145
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700146
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700147/* List of ballooned pages, threaded through the mem_map array. */
148static LIST_HEAD(ballooned_pages);
David Vrabel1cf6a6c2015-06-25 16:29:18 +0100149static DECLARE_WAIT_QUEUE_HEAD(balloon_wq);
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700150
151/* Main work function, always executed in process context. */
152static void balloon_process(struct work_struct *work);
Daniel Kiper95170b22011-03-08 22:47:39 +0100153static DECLARE_DELAYED_WORK(balloon_worker, balloon_process);
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700154
155/* When ballooning out (allocating memory to return to Xen) we don't really
156 want the kernel to try too hard since that can trigger the oom killer. */
157#define GFP_BALLOON \
158 (GFP_HIGHUSER | __GFP_NOWARN | __GFP_NORETRY | __GFP_NOMEMALLOC)
159
160static void scrub_page(struct page *page)
161{
162#ifdef CONFIG_XEN_SCRUB_PAGES
Jeremy Fitzhardinge26a3e992008-11-17 09:35:00 -0800163 clear_highpage(page);
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700164#endif
165}
166
167/* balloon_append: add the given page to the balloon. */
Jeremy Fitzhardinge9be4d452010-08-31 15:01:16 -0700168static void __balloon_append(struct page *page)
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700169{
170 /* Lowmem is re-populated first, so highmem pages go at list tail. */
171 if (PageHighMem(page)) {
172 list_add_tail(&page->lru, &ballooned_pages);
173 balloon_stats.balloon_high++;
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700174 } else {
175 list_add(&page->lru, &ballooned_pages);
176 balloon_stats.balloon_low++;
177 }
David Vrabel1cf6a6c2015-06-25 16:29:18 +0100178 wake_up(&balloon_wq);
Jeremy Fitzhardinge9be4d452010-08-31 15:01:16 -0700179}
Gianluca Guida3d65c942009-07-30 22:54:36 +0100180
Jeremy Fitzhardinge9be4d452010-08-31 15:01:16 -0700181static void balloon_append(struct page *page)
182{
183 __balloon_append(page);
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700184}
185
186/* balloon_retrieve: rescue a page from the balloon, if it is not empty. */
David Vrabel81b286e2015-06-25 13:12:46 +0100187static struct page *balloon_retrieve(bool require_lowmem)
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700188{
189 struct page *page;
190
191 if (list_empty(&ballooned_pages))
192 return NULL;
193
David Vrabel81b286e2015-06-25 13:12:46 +0100194 page = list_entry(ballooned_pages.next, struct page, lru);
195 if (require_lowmem && PageHighMem(page))
196 return NULL;
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700197 list_del(&page->lru);
198
Jiang Liu3dcc0572013-07-03 15:03:21 -0700199 if (PageHighMem(page))
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700200 balloon_stats.balloon_high--;
Jiang Liu3dcc0572013-07-03 15:03:21 -0700201 else
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700202 balloon_stats.balloon_low--;
203
204 return page;
205}
206
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700207static struct page *balloon_next_page(struct page *page)
208{
209 struct list_head *next = page->lru.next;
210 if (next == &ballooned_pages)
211 return NULL;
212 return list_entry(next, struct page, lru);
213}
214
Daniel Kiper95d2ac42011-03-08 22:48:24 +0100215static enum bp_state update_schedule(enum bp_state state)
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700216{
David Vrabelb2ac6aa2015-06-25 12:10:28 +0100217 if (state == BP_WAIT)
218 return BP_WAIT;
219
Boris Ostrovskyfd8b7952014-10-07 17:00:07 -0400220 if (state == BP_ECANCELED)
221 return BP_ECANCELED;
222
Daniel Kiper95d2ac42011-03-08 22:48:24 +0100223 if (state == BP_DONE) {
224 balloon_stats.schedule_delay = 1;
225 balloon_stats.retry_count = 1;
226 return BP_DONE;
227 }
228
Daniel Kiper95d2ac42011-03-08 22:48:24 +0100229 ++balloon_stats.retry_count;
230
231 if (balloon_stats.max_retry_count != RETRY_UNLIMITED &&
232 balloon_stats.retry_count > balloon_stats.max_retry_count) {
Daniel Kiper95d2ac42011-03-08 22:48:24 +0100233 balloon_stats.schedule_delay = 1;
234 balloon_stats.retry_count = 1;
235 return BP_ECANCELED;
236 }
237
238 balloon_stats.schedule_delay <<= 1;
239
240 if (balloon_stats.schedule_delay > balloon_stats.max_schedule_delay)
241 balloon_stats.schedule_delay = balloon_stats.max_schedule_delay;
242
243 return BP_EAGAIN;
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700244}
245
Daniel Kiper080e2be2011-07-25 17:12:06 -0700246#ifdef CONFIG_XEN_BALLOON_MEMORY_HOTPLUG
Ross Lagerwall842775f2016-05-10 10:27:54 +0100247static void release_memory_resource(struct resource *resource)
248{
249 if (!resource)
250 return;
251
252 /*
253 * No need to reset region to identity mapped since we now
254 * know that no I/O can be in this region
255 */
256 release_resource(resource);
257 kfree(resource);
258}
259
Boris Ostrovskyb3cf8522017-12-12 15:08:21 -0500260/*
261 * Host memory not allocated to dom0. We can use this range for hotplug-based
262 * ballooning.
263 *
264 * It's a type-less resource. Setting IORESOURCE_MEM will make resource
265 * management algorithms (arch_remove_reservations()) look into guest e820,
266 * which we don't want.
267 */
268static struct resource hostmem_resource = {
269 .name = "Host RAM",
270};
271
272void __attribute__((weak)) __init arch_xen_balloon_init(struct resource *res)
273{}
274
David Vrabel55b3da92015-06-24 15:58:42 +0100275static struct resource *additional_memory_resource(phys_addr_t size)
276{
Boris Ostrovskyb3cf8522017-12-12 15:08:21 -0500277 struct resource *res, *res_hostmem;
278 int ret = -ENOMEM;
David Vrabel55b3da92015-06-24 15:58:42 +0100279
280 res = kzalloc(sizeof(*res), GFP_KERNEL);
281 if (!res)
282 return NULL;
283
284 res->name = "System RAM";
Toshi Kani782b8662016-01-26 21:57:24 +0100285 res->flags = IORESOURCE_SYSTEM_RAM | IORESOURCE_BUSY;
David Vrabel55b3da92015-06-24 15:58:42 +0100286
Boris Ostrovskyb3cf8522017-12-12 15:08:21 -0500287 res_hostmem = kzalloc(sizeof(*res), GFP_KERNEL);
288 if (res_hostmem) {
289 /* Try to grab a range from hostmem */
290 res_hostmem->name = "Host memory";
291 ret = allocate_resource(&hostmem_resource, res_hostmem,
292 size, 0, -1,
293 PAGES_PER_SECTION * PAGE_SIZE, NULL, NULL);
294 }
295
296 if (!ret) {
297 /*
298 * Insert this resource into iomem. Because hostmem_resource
299 * tracks portion of guest e820 marked as UNUSABLE noone else
300 * should try to use it.
301 */
302 res->start = res_hostmem->start;
303 res->end = res_hostmem->end;
304 ret = insert_resource(&iomem_resource, res);
305 if (ret < 0) {
306 pr_err("Can't insert iomem_resource [%llx - %llx]\n",
307 res->start, res->end);
308 release_memory_resource(res_hostmem);
309 res_hostmem = NULL;
310 res->start = res->end = 0;
311 }
312 }
313
314 if (ret) {
315 ret = allocate_resource(&iomem_resource, res,
316 size, 0, -1,
317 PAGES_PER_SECTION * PAGE_SIZE, NULL, NULL);
318 if (ret < 0) {
319 pr_err("Cannot allocate new System RAM resource\n");
320 kfree(res);
321 return NULL;
322 }
David Vrabel55b3da92015-06-24 15:58:42 +0100323 }
324
Ross Lagerwalldfd74a12016-03-17 16:52:00 +0000325#ifdef CONFIG_SPARSEMEM
326 {
327 unsigned long limit = 1UL << (MAX_PHYSMEM_BITS - PAGE_SHIFT);
328 unsigned long pfn = res->start >> PAGE_SHIFT;
329
330 if (pfn > limit) {
331 pr_err("New System RAM resource outside addressable RAM (%lu > %lu)\n",
332 pfn, limit);
333 release_memory_resource(res);
Boris Ostrovskyb3cf8522017-12-12 15:08:21 -0500334 release_memory_resource(res_hostmem);
Ross Lagerwalldfd74a12016-03-17 16:52:00 +0000335 return NULL;
336 }
337 }
338#endif
339
David Vrabel55b3da92015-06-24 15:58:42 +0100340 return res;
341}
342
David Vrabelb2ac6aa2015-06-25 12:10:28 +0100343static enum bp_state reserve_additional_memory(void)
Daniel Kiper080e2be2011-07-25 17:12:06 -0700344{
David Vrabelb2ac6aa2015-06-25 12:10:28 +0100345 long credit;
David Vrabel55b3da92015-06-24 15:58:42 +0100346 struct resource *resource;
Daniel Kiper080e2be2011-07-25 17:12:06 -0700347 int nid, rc;
David Vrabel55b3da92015-06-24 15:58:42 +0100348 unsigned long balloon_hotplug;
Daniel Kiper080e2be2011-07-25 17:12:06 -0700349
David Vrabel1cf6a6c2015-06-25 16:29:18 +0100350 credit = balloon_stats.target_pages + balloon_stats.target_unpopulated
351 - balloon_stats.total_pages;
David Vrabelb2ac6aa2015-06-25 12:10:28 +0100352
353 /*
354 * Already hotplugged enough pages? Wait for them to be
355 * onlined.
356 */
357 if (credit <= 0)
358 return BP_WAIT;
359
David Vrabel55b3da92015-06-24 15:58:42 +0100360 balloon_hotplug = round_up(credit, PAGES_PER_SECTION);
361
362 resource = additional_memory_resource(balloon_hotplug * PAGE_SIZE);
363 if (!resource)
364 goto err;
365
366 nid = memory_add_physaddr_to_nid(resource->start);
Daniel Kiper080e2be2011-07-25 17:12:06 -0700367
Juergen Gross3c56b3a12015-03-20 13:55:39 +0100368#ifdef CONFIG_XEN_HAVE_PVMMU
Julien Grall30756c62015-05-04 15:39:08 +0100369 /*
370 * We don't support PV MMU when Linux and Xen is using
371 * different page granularity.
372 */
373 BUILD_BUG_ON(XEN_PAGE_SIZE != PAGE_SIZE);
374
Juergen Gross3c56b3a12015-03-20 13:55:39 +0100375 /*
376 * add_memory() will build page tables for the new memory so
377 * the p2m must contain invalid entries so the correct
378 * non-present PTEs will be written.
379 *
380 * If a failure occurs, the original (identity) p2m entries
381 * are not restored since this region is now known not to
382 * conflict with any devices.
383 */
384 if (!xen_feature(XENFEAT_auto_translated_physmap)) {
385 unsigned long pfn, i;
386
David Vrabel55b3da92015-06-24 15:58:42 +0100387 pfn = PFN_DOWN(resource->start);
Juergen Gross3c56b3a12015-03-20 13:55:39 +0100388 for (i = 0; i < balloon_hotplug; i++) {
389 if (!set_phys_to_machine(pfn + i, INVALID_P2M_ENTRY)) {
390 pr_warn("set_phys_to_machine() failed, no memory added\n");
David Vrabel55b3da92015-06-24 15:58:42 +0100391 goto err;
Juergen Gross3c56b3a12015-03-20 13:55:39 +0100392 }
393 }
394 }
395#endif
396
Vitaly Kuznetsov703fc132016-03-15 14:56:52 -0700397 /*
398 * add_memory_resource() will call online_pages() which in its turn
399 * will call xen_online_page() callback causing deadlock if we don't
400 * release balloon_mutex here. Unlocking here is safe because the
401 * callers drop the mutex before trying again.
402 */
403 mutex_unlock(&balloon_mutex);
404 rc = add_memory_resource(nid, resource, memhp_auto_online);
405 mutex_lock(&balloon_mutex);
406
Daniel Kiper080e2be2011-07-25 17:12:06 -0700407 if (rc) {
David Vrabel3dcf6362014-09-01 18:52:44 +0100408 pr_warn("Cannot add additional memory (%i)\n", rc);
David Vrabel55b3da92015-06-24 15:58:42 +0100409 goto err;
Daniel Kiper080e2be2011-07-25 17:12:06 -0700410 }
411
David Vrabelde5a77d2015-06-25 12:08:20 +0100412 balloon_stats.total_pages += balloon_hotplug;
Daniel Kiper080e2be2011-07-25 17:12:06 -0700413
David Vrabelb2ac6aa2015-06-25 12:10:28 +0100414 return BP_WAIT;
David Vrabel55b3da92015-06-24 15:58:42 +0100415 err:
416 release_memory_resource(resource);
417 return BP_ECANCELED;
Daniel Kiper080e2be2011-07-25 17:12:06 -0700418}
419
420static void xen_online_page(struct page *page)
421{
422 __online_page_set_limits(page);
423
424 mutex_lock(&balloon_mutex);
425
426 __balloon_append(page);
427
Daniel Kiper080e2be2011-07-25 17:12:06 -0700428 mutex_unlock(&balloon_mutex);
429}
430
431static int xen_memory_notifier(struct notifier_block *nb, unsigned long val, void *v)
432{
433 if (val == MEM_ONLINE)
434 schedule_delayed_work(&balloon_worker, 0);
435
436 return NOTIFY_OK;
437}
438
439static struct notifier_block xen_memory_nb = {
440 .notifier_call = xen_memory_notifier,
441 .priority = 0
442};
443#else
David Vrabelb2ac6aa2015-06-25 12:10:28 +0100444static enum bp_state reserve_additional_memory(void)
Daniel Kiper080e2be2011-07-25 17:12:06 -0700445{
446 balloon_stats.target_pages = balloon_stats.current_pages;
David Vrabel1cf6a6c2015-06-25 16:29:18 +0100447 return BP_ECANCELED;
Daniel Kiper080e2be2011-07-25 17:12:06 -0700448}
449#endif /* CONFIG_XEN_BALLOON_MEMORY_HOTPLUG */
450
David Vrabelde5a77d2015-06-25 12:08:20 +0100451static long current_credit(void)
452{
453 return balloon_stats.target_pages - balloon_stats.current_pages;
454}
455
456static bool balloon_is_inflated(void)
457{
458 return balloon_stats.balloon_low || balloon_stats.balloon_high;
459}
460
Daniel Kiper95d2ac42011-03-08 22:48:24 +0100461static enum bp_state increase_reservation(unsigned long nr_pages)
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700462{
Daniel Kiper95d2ac42011-03-08 22:48:24 +0100463 int rc;
Julien Grall30756c62015-05-04 15:39:08 +0100464 unsigned long i;
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700465 struct page *page;
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700466 struct xen_memory_reservation reservation = {
467 .address_bits = 0,
Julien Grall30756c62015-05-04 15:39:08 +0100468 .extent_order = EXTENT_ORDER,
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700469 .domid = DOMID_SELF
470 };
471
472 if (nr_pages > ARRAY_SIZE(frame_list))
473 nr_pages = ARRAY_SIZE(frame_list);
474
Jie Liu9346c2a2013-11-13 20:59:58 +0800475 page = list_first_entry_or_null(&ballooned_pages, struct page, lru);
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700476 for (i = 0; i < nr_pages; i++) {
Daniel Kiper95d2ac42011-03-08 22:48:24 +0100477 if (!page) {
478 nr_pages = i;
479 break;
480 }
Julien Grall30756c62015-05-04 15:39:08 +0100481
482 /* XENMEM_populate_physmap requires a PFN based on Xen
483 * granularity.
484 */
485 frame_list[i] = page_to_xen_pfn(page);
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700486 page = balloon_next_page(page);
487 }
488
Isaku Yamahataa90971e2008-05-26 23:31:14 +0100489 set_xen_guest_handle(reservation.extent_start, frame_list);
Jeremy Fitzhardingefde28e82008-07-24 16:28:00 -0700490 reservation.nr_extents = nr_pages;
491 rc = HYPERVISOR_memory_op(XENMEM_populate_physmap, &reservation);
Konrad Rzeszutek Wilk40095de2011-03-14 11:42:40 -0400492 if (rc <= 0)
Daniel Kiper95d2ac42011-03-08 22:48:24 +0100493 return BP_EAGAIN;
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700494
Ian Campbellbc2c0302009-06-05 11:58:37 +0100495 for (i = 0; i < rc; i++) {
Konrad Rzeszutek Wilkb6f30672011-03-15 10:23:57 -0400496 page = balloon_retrieve(false);
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700497 BUG_ON(page == NULL);
498
Ian Campbellc2374bf2012-10-03 12:17:50 +0100499#ifdef CONFIG_XEN_HAVE_PVMMU
Julien Grall30756c62015-05-04 15:39:08 +0100500 /*
501 * We don't support PV MMU when Linux and Xen is using
502 * different page granularity.
503 */
504 BUILD_BUG_ON(XEN_PAGE_SIZE != PAGE_SIZE);
505
Stefano Stabellinic1d15f52013-12-11 16:58:42 +0000506 if (!xen_feature(XENFEAT_auto_translated_physmap)) {
Julien Grall30756c62015-05-04 15:39:08 +0100507 unsigned long pfn = page_to_pfn(page);
508
Stefano Stabellinic1d15f52013-12-11 16:58:42 +0000509 set_phys_to_machine(pfn, frame_list[i]);
510
511 /* Link back into the page tables if not highmem. */
512 if (!PageHighMem(page)) {
513 int ret;
514 ret = HYPERVISOR_update_va_mapping(
515 (unsigned long)__va(pfn << PAGE_SHIFT),
516 mfn_pte(frame_list[i], PAGE_KERNEL),
517 0);
518 BUG_ON(ret);
519 }
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700520 }
Ian Campbellc2374bf2012-10-03 12:17:50 +0100521#endif
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700522
523 /* Relinquish the page back to the allocator. */
Ross Lagerwall709613a2016-12-09 17:10:22 +0000524 free_reserved_page(page);
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700525 }
526
Ian Campbellbc2c0302009-06-05 11:58:37 +0100527 balloon_stats.current_pages += rc;
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700528
Daniel Kiper95d2ac42011-03-08 22:48:24 +0100529 return BP_DONE;
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700530}
531
Konrad Rzeszutek Wilkb6f30672011-03-15 10:23:57 -0400532static enum bp_state decrease_reservation(unsigned long nr_pages, gfp_t gfp)
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700533{
Daniel Kiper95d2ac42011-03-08 22:48:24 +0100534 enum bp_state state = BP_DONE;
Julien Grall30756c62015-05-04 15:39:08 +0100535 unsigned long i;
536 struct page *page, *tmp;
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700537 int ret;
538 struct xen_memory_reservation reservation = {
539 .address_bits = 0,
Julien Grall30756c62015-05-04 15:39:08 +0100540 .extent_order = EXTENT_ORDER,
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700541 .domid = DOMID_SELF
542 };
Julien Grall30756c62015-05-04 15:39:08 +0100543 LIST_HEAD(pages);
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700544
545 if (nr_pages > ARRAY_SIZE(frame_list))
546 nr_pages = ARRAY_SIZE(frame_list);
547
548 for (i = 0; i < nr_pages; i++) {
Lisa Nguyenfce92682013-05-15 22:59:40 -0700549 page = alloc_page(gfp);
550 if (page == NULL) {
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700551 nr_pages = i;
Daniel Kiper95d2ac42011-03-08 22:48:24 +0100552 state = BP_EAGAIN;
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700553 break;
554 }
Ross Lagerwall709613a2016-12-09 17:10:22 +0000555 adjust_managed_page_count(page, -1);
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700556 scrub_page(page);
Julien Grall30756c62015-05-04 15:39:08 +0100557 list_add(&page->lru, &pages);
Wei Liu09ed3d52014-03-15 16:11:47 +0000558 }
559
560 /*
561 * Ensure that ballooned highmem pages don't have kmaps.
562 *
563 * Do this before changing the p2m as kmap_flush_unused()
564 * reads PTEs to obtain pages (and hence needs the original
565 * p2m entry).
566 */
567 kmap_flush_unused();
568
Julien Grall30756c62015-05-04 15:39:08 +0100569 /*
570 * Setup the frame, update direct mapping, invalidate P2M,
571 * and add to balloon.
572 */
573 i = 0;
574 list_for_each_entry_safe(page, tmp, &pages, lru) {
575 /* XENMEM_decrease_reservation requires a GFN */
576 frame_list[i++] = xen_page_to_gfn(page);
Wei Liu09ed3d52014-03-15 16:11:47 +0000577
Stefano Stabellinic1d15f52013-12-11 16:58:42 +0000578#ifdef CONFIG_XEN_HAVE_PVMMU
Julien Grall30756c62015-05-04 15:39:08 +0100579 /*
580 * We don't support PV MMU when Linux and Xen is using
581 * different page granularity.
582 */
583 BUILD_BUG_ON(XEN_PAGE_SIZE != PAGE_SIZE);
584
Wei Liu04660bb2013-08-27 16:17:25 +0100585 if (!xen_feature(XENFEAT_auto_translated_physmap)) {
Julien Grall30756c62015-05-04 15:39:08 +0100586 unsigned long pfn = page_to_pfn(page);
587
Stefano Stabellinic1d15f52013-12-11 16:58:42 +0000588 if (!PageHighMem(page)) {
589 ret = HYPERVISOR_update_va_mapping(
590 (unsigned long)__va(pfn << PAGE_SHIFT),
David Vrabel0bb599f2015-01-05 17:06:01 +0000591 __pte_ma(0), 0);
Stefano Stabellinic1d15f52013-12-11 16:58:42 +0000592 BUG_ON(ret);
David Vrabelfb9a0c42014-06-27 10:42:03 +0100593 }
594 __set_phys_to_machine(pfn, INVALID_P2M_ENTRY);
Wei Liu04660bb2013-08-27 16:17:25 +0100595 }
Stefano Stabellinic1d15f52013-12-11 16:58:42 +0000596#endif
Julien Grall30756c62015-05-04 15:39:08 +0100597 list_del(&page->lru);
David Vrabel24f69372013-09-19 17:14:53 +0100598
Wei Liu09ed3d52014-03-15 16:11:47 +0000599 balloon_append(page);
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700600 }
601
David Vrabel24f69372013-09-19 17:14:53 +0100602 flush_tlb_all();
David Vrabel2bad07c2013-09-11 17:45:44 +0000603
Isaku Yamahataa90971e2008-05-26 23:31:14 +0100604 set_xen_guest_handle(reservation.extent_start, frame_list);
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700605 reservation.nr_extents = nr_pages;
606 ret = HYPERVISOR_memory_op(XENMEM_decrease_reservation, &reservation);
607 BUG_ON(ret != nr_pages);
608
609 balloon_stats.current_pages -= nr_pages;
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700610
Daniel Kiper95d2ac42011-03-08 22:48:24 +0100611 return state;
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700612}
613
614/*
Juergen Gross929423f2015-07-20 13:49:39 +0200615 * As this is a work item it is guaranteed to run as a single instance only.
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700616 * We may of course race updates of the target counts (which are protected
617 * by the balloon lock), or with changes to the Xen hard limit, but we will
618 * recover from these in time.
619 */
620static void balloon_process(struct work_struct *work)
621{
Daniel Kiper95d2ac42011-03-08 22:48:24 +0100622 enum bp_state state = BP_DONE;
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700623 long credit;
624
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700625
626 do {
Juergen Gross929423f2015-07-20 13:49:39 +0200627 mutex_lock(&balloon_mutex);
628
Daniel Kiper83be7e52011-03-28 11:34:10 +0200629 credit = current_credit();
Daniel Kiper95d2ac42011-03-08 22:48:24 +0100630
Daniel Kiper080e2be2011-07-25 17:12:06 -0700631 if (credit > 0) {
632 if (balloon_is_inflated())
633 state = increase_reservation(credit);
634 else
David Vrabelb2ac6aa2015-06-25 12:10:28 +0100635 state = reserve_additional_memory();
Daniel Kiper080e2be2011-07-25 17:12:06 -0700636 }
Daniel Kiper95d2ac42011-03-08 22:48:24 +0100637
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700638 if (credit < 0)
Konrad Rzeszutek Wilkb6f30672011-03-15 10:23:57 -0400639 state = decrease_reservation(-credit, GFP_BALLOON);
Daniel Kiper95d2ac42011-03-08 22:48:24 +0100640
641 state = update_schedule(state);
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700642
Juergen Gross929423f2015-07-20 13:49:39 +0200643 mutex_unlock(&balloon_mutex);
644
645 cond_resched();
646
Daniel Kiper95d2ac42011-03-08 22:48:24 +0100647 } while (credit && state == BP_DONE);
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700648
649 /* Schedule more work if there is some still to be done. */
Daniel Kiper95d2ac42011-03-08 22:48:24 +0100650 if (state == BP_EAGAIN)
651 schedule_delayed_work(&balloon_worker, balloon_stats.schedule_delay * HZ);
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700652}
653
654/* Resets the Xen limit, sets new target, and kicks off processing. */
Daniel De Graaf803eb042011-03-14 11:29:37 -0400655void balloon_set_new_target(unsigned long target)
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700656{
657 /* No need for lock. Not read-modify-write updates. */
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700658 balloon_stats.target_pages = target;
Daniel Kiper95170b22011-03-08 22:47:39 +0100659 schedule_delayed_work(&balloon_worker, 0);
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700660}
Daniel De Graaf803eb042011-03-14 11:29:37 -0400661EXPORT_SYMBOL_GPL(balloon_set_new_target);
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700662
David Vrabel1cf6a6c2015-06-25 16:29:18 +0100663static int add_ballooned_pages(int nr_pages)
664{
665 enum bp_state st;
666
667 if (xen_hotplug_unpopulated) {
668 st = reserve_additional_memory();
669 if (st != BP_ECANCELED) {
670 mutex_unlock(&balloon_mutex);
671 wait_event(balloon_wq,
672 !list_empty(&ballooned_pages));
673 mutex_lock(&balloon_mutex);
674 return 0;
675 }
676 }
677
678 st = decrease_reservation(nr_pages, GFP_USER);
679 if (st != BP_DONE)
680 return -ENOMEM;
681
682 return 0;
683}
684
Konrad Rzeszutek Wilkb6f30672011-03-15 10:23:57 -0400685/**
686 * alloc_xenballooned_pages - get pages that have been ballooned out
687 * @nr_pages: Number of pages to get
688 * @pages: pages returned
689 * @return 0 on success, error otherwise
690 */
David Vrabel81b286e2015-06-25 13:12:46 +0100691int alloc_xenballooned_pages(int nr_pages, struct page **pages)
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700692{
Konrad Rzeszutek Wilkb6f30672011-03-15 10:23:57 -0400693 int pgno = 0;
Ruslan Pisareve882dc92011-07-26 14:15:59 +0300694 struct page *page;
David Vrabel1cf6a6c2015-06-25 16:29:18 +0100695 int ret;
696
Konrad Rzeszutek Wilkb6f30672011-03-15 10:23:57 -0400697 mutex_lock(&balloon_mutex);
David Vrabel1cf6a6c2015-06-25 16:29:18 +0100698
699 balloon_stats.target_unpopulated += nr_pages;
700
Konrad Rzeszutek Wilkb6f30672011-03-15 10:23:57 -0400701 while (pgno < nr_pages) {
David Vrabel81b286e2015-06-25 13:12:46 +0100702 page = balloon_retrieve(true);
703 if (page) {
Konrad Rzeszutek Wilkb6f30672011-03-15 10:23:57 -0400704 pages[pgno++] = page;
David Vrabel4a69c902015-07-22 14:50:37 +0100705#ifdef CONFIG_XEN_HAVE_PVMMU
Julien Grall30756c62015-05-04 15:39:08 +0100706 /*
707 * We don't support PV MMU when Linux and Xen is using
708 * different page granularity.
709 */
710 BUILD_BUG_ON(XEN_PAGE_SIZE != PAGE_SIZE);
711
Boris Ostrovskyb194da22017-08-23 18:27:04 -0400712 if (!xen_feature(XENFEAT_auto_translated_physmap)) {
713 ret = xen_alloc_p2m_entry(page_to_pfn(page));
714 if (ret < 0)
715 goto out_undo;
716 }
David Vrabel4a69c902015-07-22 14:50:37 +0100717#endif
Konrad Rzeszutek Wilkb6f30672011-03-15 10:23:57 -0400718 } else {
David Vrabel1cf6a6c2015-06-25 16:29:18 +0100719 ret = add_ballooned_pages(nr_pages - pgno);
720 if (ret < 0)
Konrad Rzeszutek Wilkb6f30672011-03-15 10:23:57 -0400721 goto out_undo;
722 }
723 }
724 mutex_unlock(&balloon_mutex);
725 return 0;
726 out_undo:
Konrad Rzeszutek Wilkb6f30672011-03-15 10:23:57 -0400727 mutex_unlock(&balloon_mutex);
David Vrabel1cf6a6c2015-06-25 16:29:18 +0100728 free_xenballooned_pages(pgno, pages);
729 return ret;
Konrad Rzeszutek Wilkb6f30672011-03-15 10:23:57 -0400730}
731EXPORT_SYMBOL(alloc_xenballooned_pages);
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700732
Konrad Rzeszutek Wilkb6f30672011-03-15 10:23:57 -0400733/**
734 * free_xenballooned_pages - return pages retrieved with get_ballooned_pages
735 * @nr_pages: Number of pages
736 * @pages: pages to return
737 */
Ruslan Pisareve882dc92011-07-26 14:15:59 +0300738void free_xenballooned_pages(int nr_pages, struct page **pages)
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700739{
Konrad Rzeszutek Wilkb6f30672011-03-15 10:23:57 -0400740 int i;
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700741
Konrad Rzeszutek Wilkb6f30672011-03-15 10:23:57 -0400742 mutex_lock(&balloon_mutex);
743
744 for (i = 0; i < nr_pages; i++) {
745 if (pages[i])
746 balloon_append(pages[i]);
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700747 }
748
David Vrabel1cf6a6c2015-06-25 16:29:18 +0100749 balloon_stats.target_unpopulated -= nr_pages;
750
Konrad Rzeszutek Wilkb6f30672011-03-15 10:23:57 -0400751 /* The balloon may be too large now. Shrink it if needed. */
Daniel Kiper83be7e52011-03-28 11:34:10 +0200752 if (current_credit())
Konrad Rzeszutek Wilkb6f30672011-03-15 10:23:57 -0400753 schedule_delayed_work(&balloon_worker, 0);
754
755 mutex_unlock(&balloon_mutex);
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700756}
Konrad Rzeszutek Wilkb6f30672011-03-15 10:23:57 -0400757EXPORT_SYMBOL(free_xenballooned_pages);
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700758
Vitaly Kuznetsov4fee9ad2017-03-14 18:35:53 +0100759#ifdef CONFIG_XEN_PV
David Vrabel8b5d44a2011-09-28 17:46:34 +0100760static void __init balloon_add_region(unsigned long start_pfn,
761 unsigned long pages)
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700762{
Daniel Kiper4dfe22f2011-03-28 11:33:18 +0200763 unsigned long pfn, extra_pfn_end;
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700764 struct page *page;
765
David Vrabel8b5d44a2011-09-28 17:46:34 +0100766 /*
767 * If the amount of usable memory has been limited (e.g., with
768 * the 'mem' command line parameter), don't add pages beyond
769 * this limit.
770 */
771 extra_pfn_end = min(max_pfn, start_pfn + pages);
772
773 for (pfn = start_pfn; pfn < extra_pfn_end; pfn++) {
774 page = pfn_to_page(pfn);
775 /* totalram_pages and totalhigh_pages do not
776 include the boot-time balloon extension, so
777 don't subtract from it. */
778 __balloon_append(page);
779 }
David Vrabelde5a77d2015-06-25 12:08:20 +0100780
781 balloon_stats.total_pages += extra_pfn_end - start_pfn;
David Vrabel8b5d44a2011-09-28 17:46:34 +0100782}
Vitaly Kuznetsov4fee9ad2017-03-14 18:35:53 +0100783#endif
David Vrabel8b5d44a2011-09-28 17:46:34 +0100784
785static int __init balloon_init(void)
786{
Stefano Stabellini53d55222010-12-02 17:55:05 +0000787 if (!xen_domain())
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700788 return -ENODEV;
789
Joe Perches283c0972013-06-28 03:21:41 -0700790 pr_info("Initialising balloon driver\n");
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700791
Vitaly Kuznetsov4fee9ad2017-03-14 18:35:53 +0100792#ifdef CONFIG_XEN_PV
David Vrabelaa244112011-09-28 17:46:32 +0100793 balloon_stats.current_pages = xen_pv_domain()
794 ? min(xen_start_info->nr_pages - xen_released_pages, max_pfn)
Boris Ostrovskyc275a572013-11-06 15:37:40 -0500795 : get_num_physpages();
Vitaly Kuznetsov4fee9ad2017-03-14 18:35:53 +0100796#else
797 balloon_stats.current_pages = get_num_physpages();
798#endif
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700799 balloon_stats.target_pages = balloon_stats.current_pages;
800 balloon_stats.balloon_low = 0;
801 balloon_stats.balloon_high = 0;
David Vrabelde5a77d2015-06-25 12:08:20 +0100802 balloon_stats.total_pages = balloon_stats.current_pages;
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700803
Daniel Kiper95d2ac42011-03-08 22:48:24 +0100804 balloon_stats.schedule_delay = 1;
805 balloon_stats.max_schedule_delay = 32;
806 balloon_stats.retry_count = 1;
Konrad Rzeszutek Wilk40095de2011-03-14 11:42:40 -0400807 balloon_stats.max_retry_count = RETRY_UNLIMITED;
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700808
Daniel Kiper080e2be2011-07-25 17:12:06 -0700809#ifdef CONFIG_XEN_BALLOON_MEMORY_HOTPLUG
Daniel Kiper080e2be2011-07-25 17:12:06 -0700810 set_online_page_callback(&xen_online_page);
811 register_memory_notifier(&xen_memory_nb);
David Vrabel1cf6a6c2015-06-25 16:29:18 +0100812 register_sysctl_table(xen_root);
Boris Ostrovskyb3cf8522017-12-12 15:08:21 -0500813
814 arch_xen_balloon_init(&hostmem_resource);
Daniel Kiper080e2be2011-07-25 17:12:06 -0700815#endif
816
Vitaly Kuznetsov4fee9ad2017-03-14 18:35:53 +0100817#ifdef CONFIG_XEN_PV
818 {
819 int i;
820
821 /*
822 * Initialize the balloon with pages from the extra memory
823 * regions (see arch/x86/xen/setup.c).
824 */
825 for (i = 0; i < XEN_EXTRA_MEM_MAX_REGIONS; i++)
826 if (xen_extra_mem[i].n_pfns)
827 balloon_add_region(xen_extra_mem[i].start_pfn,
828 xen_extra_mem[i].n_pfns);
829 }
830#endif
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700831
Juergen Gross96edd612017-07-10 10:10:45 +0200832 /* Init the xen-balloon driver. */
833 xen_balloon_init();
834
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700835 return 0;
836}
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700837subsys_initcall(balloon_init);