Jeremy Fitzhardinge | 1775826 | 2008-04-02 10:54:13 -0700 | [diff] [blame] | 1 | /****************************************************************************** |
Jeremy Fitzhardinge | 1775826 | 2008-04-02 10:54:13 -0700 | [diff] [blame] | 2 | * Xen balloon driver - enables returning/claiming memory to/from Xen. |
| 3 | * |
| 4 | * Copyright (c) 2003, B Dragovic |
| 5 | * Copyright (c) 2003-2004, M Williamson, K Fraser |
| 6 | * Copyright (c) 2005 Dan M. Smith, IBM Corporation |
Daniel Kiper | 080e2be | 2011-07-25 17:12:06 -0700 | [diff] [blame] | 7 | * Copyright (c) 2010 Daniel Kiper |
| 8 | * |
| 9 | * Memory hotplug support was written by Daniel Kiper. Work on |
| 10 | * it was sponsored by Google under Google Summer of Code 2010 |
| 11 | * program. Jeremy Fitzhardinge from Citrix was the mentor for |
| 12 | * this project. |
Jeremy Fitzhardinge | 1775826 | 2008-04-02 10:54:13 -0700 | [diff] [blame] | 13 | * |
| 14 | * This program is free software; you can redistribute it and/or |
| 15 | * modify it under the terms of the GNU General Public License version 2 |
| 16 | * as published by the Free Software Foundation; or, when distributed |
| 17 | * separately from the Linux kernel or incorporated into other |
| 18 | * software packages, subject to the following license: |
| 19 | * |
| 20 | * Permission is hereby granted, free of charge, to any person obtaining a copy |
| 21 | * of this source file (the "Software"), to deal in the Software without |
| 22 | * restriction, including without limitation the rights to use, copy, modify, |
| 23 | * merge, publish, distribute, sublicense, and/or sell copies of the Software, |
| 24 | * and to permit persons to whom the Software is furnished to do so, subject to |
| 25 | * the following conditions: |
| 26 | * |
| 27 | * The above copyright notice and this permission notice shall be included in |
| 28 | * all copies or substantial portions of the Software. |
| 29 | * |
| 30 | * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR |
| 31 | * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, |
| 32 | * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE |
| 33 | * AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER |
| 34 | * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING |
| 35 | * FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS |
| 36 | * IN THE SOFTWARE. |
| 37 | */ |
| 38 | |
Joe Perches | 283c097 | 2013-06-28 03:21:41 -0700 | [diff] [blame] | 39 | #define pr_fmt(fmt) "xen:" KBUILD_MODNAME ": " fmt |
| 40 | |
Stefano Stabellini | cd9151e | 2013-08-04 15:39:40 +0100 | [diff] [blame] | 41 | #include <linux/cpu.h> |
Jeremy Fitzhardinge | 1775826 | 2008-04-02 10:54:13 -0700 | [diff] [blame] | 42 | #include <linux/kernel.h> |
Jeremy Fitzhardinge | 1775826 | 2008-04-02 10:54:13 -0700 | [diff] [blame] | 43 | #include <linux/sched.h> |
Ingo Molnar | 5b825c3 | 2017-02-02 17:54:15 +0100 | [diff] [blame] | 44 | #include <linux/cred.h> |
Jeremy Fitzhardinge | 1775826 | 2008-04-02 10:54:13 -0700 | [diff] [blame] | 45 | #include <linux/errno.h> |
| 46 | #include <linux/mm.h> |
| 47 | #include <linux/bootmem.h> |
| 48 | #include <linux/pagemap.h> |
| 49 | #include <linux/highmem.h> |
| 50 | #include <linux/mutex.h> |
Jeremy Fitzhardinge | 1775826 | 2008-04-02 10:54:13 -0700 | [diff] [blame] | 51 | #include <linux/list.h> |
Tejun Heo | 5a0e3ad | 2010-03-24 17:04:11 +0900 | [diff] [blame] | 52 | #include <linux/gfp.h> |
Daniel Kiper | 080e2be | 2011-07-25 17:12:06 -0700 | [diff] [blame] | 53 | #include <linux/notifier.h> |
| 54 | #include <linux/memory.h> |
| 55 | #include <linux/memory_hotplug.h> |
Stefano Stabellini | cd9151e | 2013-08-04 15:39:40 +0100 | [diff] [blame] | 56 | #include <linux/percpu-defs.h> |
David Vrabel | 55b3da9 | 2015-06-24 15:58:42 +0100 | [diff] [blame] | 57 | #include <linux/slab.h> |
David Vrabel | 1cf6a6c | 2015-06-25 16:29:18 +0100 | [diff] [blame] | 58 | #include <linux/sysctl.h> |
Jeremy Fitzhardinge | 1775826 | 2008-04-02 10:54:13 -0700 | [diff] [blame] | 59 | |
Jeremy Fitzhardinge | 1775826 | 2008-04-02 10:54:13 -0700 | [diff] [blame] | 60 | #include <asm/page.h> |
| 61 | #include <asm/pgalloc.h> |
| 62 | #include <asm/pgtable.h> |
Jeremy Fitzhardinge | 1775826 | 2008-04-02 10:54:13 -0700 | [diff] [blame] | 63 | #include <asm/tlb.h> |
| 64 | |
Jeremy Fitzhardinge | ecbf29c | 2008-12-16 12:37:07 -0800 | [diff] [blame] | 65 | #include <asm/xen/hypervisor.h> |
| 66 | #include <asm/xen/hypercall.h> |
Jeremy Fitzhardinge | 1ccbf53 | 2009-10-06 15:11:14 -0700 | [diff] [blame] | 67 | |
| 68 | #include <xen/xen.h> |
Jeremy Fitzhardinge | ecbf29c | 2008-12-16 12:37:07 -0800 | [diff] [blame] | 69 | #include <xen/interface/xen.h> |
Jeremy Fitzhardinge | 1775826 | 2008-04-02 10:54:13 -0700 | [diff] [blame] | 70 | #include <xen/interface/memory.h> |
Daniel De Graaf | 803eb04 | 2011-03-14 11:29:37 -0400 | [diff] [blame] | 71 | #include <xen/balloon.h> |
Jeremy Fitzhardinge | 1775826 | 2008-04-02 10:54:13 -0700 | [diff] [blame] | 72 | #include <xen/features.h> |
| 73 | #include <xen/page.h> |
| 74 | |
David Vrabel | 1cf6a6c | 2015-06-25 16:29:18 +0100 | [diff] [blame] | 75 | static int xen_hotplug_unpopulated; |
| 76 | |
| 77 | #ifdef CONFIG_XEN_BALLOON_MEMORY_HOTPLUG |
| 78 | |
| 79 | static int zero; |
| 80 | static int one = 1; |
| 81 | |
| 82 | static struct ctl_table balloon_table[] = { |
| 83 | { |
| 84 | .procname = "hotplug_unpopulated", |
| 85 | .data = &xen_hotplug_unpopulated, |
| 86 | .maxlen = sizeof(int), |
| 87 | .mode = 0644, |
| 88 | .proc_handler = proc_dointvec_minmax, |
| 89 | .extra1 = &zero, |
| 90 | .extra2 = &one, |
| 91 | }, |
| 92 | { } |
| 93 | }; |
| 94 | |
| 95 | static struct ctl_table balloon_root[] = { |
| 96 | { |
| 97 | .procname = "balloon", |
| 98 | .mode = 0555, |
| 99 | .child = balloon_table, |
| 100 | }, |
| 101 | { } |
| 102 | }; |
| 103 | |
| 104 | static struct ctl_table xen_root[] = { |
| 105 | { |
| 106 | .procname = "xen", |
| 107 | .mode = 0555, |
| 108 | .child = balloon_root, |
| 109 | }, |
| 110 | { } |
| 111 | }; |
| 112 | |
| 113 | #endif |
| 114 | |
Daniel Kiper | 95d2ac4 | 2011-03-08 22:48:24 +0100 | [diff] [blame] | 115 | /* |
Julien Grall | 30756c6 | 2015-05-04 15:39:08 +0100 | [diff] [blame] | 116 | * Use one extent per PAGE_SIZE to avoid to break down the page into |
| 117 | * multiple frame. |
| 118 | */ |
| 119 | #define EXTENT_ORDER (fls(XEN_PFN_PER_PAGE) - 1) |
| 120 | |
| 121 | /* |
Daniel Kiper | 95d2ac4 | 2011-03-08 22:48:24 +0100 | [diff] [blame] | 122 | * balloon_process() state: |
| 123 | * |
| 124 | * BP_DONE: done or nothing to do, |
David Vrabel | b2ac6aa | 2015-06-25 12:10:28 +0100 | [diff] [blame] | 125 | * BP_WAIT: wait to be rescheduled, |
Daniel Kiper | 95d2ac4 | 2011-03-08 22:48:24 +0100 | [diff] [blame] | 126 | * BP_EAGAIN: error, go to sleep, |
| 127 | * BP_ECANCELED: error, balloon operation canceled. |
| 128 | */ |
Jeremy Fitzhardinge | 1775826 | 2008-04-02 10:54:13 -0700 | [diff] [blame] | 129 | |
Daniel Kiper | 95d2ac4 | 2011-03-08 22:48:24 +0100 | [diff] [blame] | 130 | enum bp_state { |
| 131 | BP_DONE, |
David Vrabel | b2ac6aa | 2015-06-25 12:10:28 +0100 | [diff] [blame] | 132 | BP_WAIT, |
Daniel Kiper | 95d2ac4 | 2011-03-08 22:48:24 +0100 | [diff] [blame] | 133 | BP_EAGAIN, |
| 134 | BP_ECANCELED |
Jeremy Fitzhardinge | 1775826 | 2008-04-02 10:54:13 -0700 | [diff] [blame] | 135 | }; |
| 136 | |
Jeremy Fitzhardinge | 1775826 | 2008-04-02 10:54:13 -0700 | [diff] [blame] | 137 | |
| 138 | static DEFINE_MUTEX(balloon_mutex); |
| 139 | |
Daniel De Graaf | 803eb04 | 2011-03-14 11:29:37 -0400 | [diff] [blame] | 140 | struct balloon_stats balloon_stats; |
| 141 | EXPORT_SYMBOL_GPL(balloon_stats); |
Jeremy Fitzhardinge | 1775826 | 2008-04-02 10:54:13 -0700 | [diff] [blame] | 142 | |
| 143 | /* We increase/decrease in batches which fit in a page */ |
Julien Grall | 3990dd2 | 2015-10-07 14:04:33 +0100 | [diff] [blame] | 144 | static xen_pfn_t frame_list[PAGE_SIZE / sizeof(xen_pfn_t)]; |
Stefano Stabellini | cd9151e | 2013-08-04 15:39:40 +0100 | [diff] [blame] | 145 | |
Jeremy Fitzhardinge | 1775826 | 2008-04-02 10:54:13 -0700 | [diff] [blame] | 146 | |
Jeremy Fitzhardinge | 1775826 | 2008-04-02 10:54:13 -0700 | [diff] [blame] | 147 | /* List of ballooned pages, threaded through the mem_map array. */ |
| 148 | static LIST_HEAD(ballooned_pages); |
David Vrabel | 1cf6a6c | 2015-06-25 16:29:18 +0100 | [diff] [blame] | 149 | static DECLARE_WAIT_QUEUE_HEAD(balloon_wq); |
Jeremy Fitzhardinge | 1775826 | 2008-04-02 10:54:13 -0700 | [diff] [blame] | 150 | |
| 151 | /* Main work function, always executed in process context. */ |
| 152 | static void balloon_process(struct work_struct *work); |
Daniel Kiper | 95170b2 | 2011-03-08 22:47:39 +0100 | [diff] [blame] | 153 | static DECLARE_DELAYED_WORK(balloon_worker, balloon_process); |
Jeremy Fitzhardinge | 1775826 | 2008-04-02 10:54:13 -0700 | [diff] [blame] | 154 | |
| 155 | /* When ballooning out (allocating memory to return to Xen) we don't really |
| 156 | want the kernel to try too hard since that can trigger the oom killer. */ |
| 157 | #define GFP_BALLOON \ |
| 158 | (GFP_HIGHUSER | __GFP_NOWARN | __GFP_NORETRY | __GFP_NOMEMALLOC) |
| 159 | |
| 160 | static void scrub_page(struct page *page) |
| 161 | { |
| 162 | #ifdef CONFIG_XEN_SCRUB_PAGES |
Jeremy Fitzhardinge | 26a3e99 | 2008-11-17 09:35:00 -0800 | [diff] [blame] | 163 | clear_highpage(page); |
Jeremy Fitzhardinge | 1775826 | 2008-04-02 10:54:13 -0700 | [diff] [blame] | 164 | #endif |
| 165 | } |
| 166 | |
| 167 | /* balloon_append: add the given page to the balloon. */ |
Jeremy Fitzhardinge | 9be4d45 | 2010-08-31 15:01:16 -0700 | [diff] [blame] | 168 | static void __balloon_append(struct page *page) |
Jeremy Fitzhardinge | 1775826 | 2008-04-02 10:54:13 -0700 | [diff] [blame] | 169 | { |
| 170 | /* Lowmem is re-populated first, so highmem pages go at list tail. */ |
| 171 | if (PageHighMem(page)) { |
| 172 | list_add_tail(&page->lru, &ballooned_pages); |
| 173 | balloon_stats.balloon_high++; |
Jeremy Fitzhardinge | 1775826 | 2008-04-02 10:54:13 -0700 | [diff] [blame] | 174 | } else { |
| 175 | list_add(&page->lru, &ballooned_pages); |
| 176 | balloon_stats.balloon_low++; |
| 177 | } |
David Vrabel | 1cf6a6c | 2015-06-25 16:29:18 +0100 | [diff] [blame] | 178 | wake_up(&balloon_wq); |
Jeremy Fitzhardinge | 9be4d45 | 2010-08-31 15:01:16 -0700 | [diff] [blame] | 179 | } |
Gianluca Guida | 3d65c94 | 2009-07-30 22:54:36 +0100 | [diff] [blame] | 180 | |
Jeremy Fitzhardinge | 9be4d45 | 2010-08-31 15:01:16 -0700 | [diff] [blame] | 181 | static void balloon_append(struct page *page) |
| 182 | { |
| 183 | __balloon_append(page); |
Jeremy Fitzhardinge | 1775826 | 2008-04-02 10:54:13 -0700 | [diff] [blame] | 184 | } |
| 185 | |
| 186 | /* balloon_retrieve: rescue a page from the balloon, if it is not empty. */ |
David Vrabel | 81b286e | 2015-06-25 13:12:46 +0100 | [diff] [blame] | 187 | static struct page *balloon_retrieve(bool require_lowmem) |
Jeremy Fitzhardinge | 1775826 | 2008-04-02 10:54:13 -0700 | [diff] [blame] | 188 | { |
| 189 | struct page *page; |
| 190 | |
| 191 | if (list_empty(&ballooned_pages)) |
| 192 | return NULL; |
| 193 | |
David Vrabel | 81b286e | 2015-06-25 13:12:46 +0100 | [diff] [blame] | 194 | page = list_entry(ballooned_pages.next, struct page, lru); |
| 195 | if (require_lowmem && PageHighMem(page)) |
| 196 | return NULL; |
Jeremy Fitzhardinge | 1775826 | 2008-04-02 10:54:13 -0700 | [diff] [blame] | 197 | list_del(&page->lru); |
| 198 | |
Jiang Liu | 3dcc057 | 2013-07-03 15:03:21 -0700 | [diff] [blame] | 199 | if (PageHighMem(page)) |
Jeremy Fitzhardinge | 1775826 | 2008-04-02 10:54:13 -0700 | [diff] [blame] | 200 | balloon_stats.balloon_high--; |
Jiang Liu | 3dcc057 | 2013-07-03 15:03:21 -0700 | [diff] [blame] | 201 | else |
Jeremy Fitzhardinge | 1775826 | 2008-04-02 10:54:13 -0700 | [diff] [blame] | 202 | balloon_stats.balloon_low--; |
| 203 | |
| 204 | return page; |
| 205 | } |
| 206 | |
Jeremy Fitzhardinge | 1775826 | 2008-04-02 10:54:13 -0700 | [diff] [blame] | 207 | static struct page *balloon_next_page(struct page *page) |
| 208 | { |
| 209 | struct list_head *next = page->lru.next; |
| 210 | if (next == &ballooned_pages) |
| 211 | return NULL; |
| 212 | return list_entry(next, struct page, lru); |
| 213 | } |
| 214 | |
Daniel Kiper | 95d2ac4 | 2011-03-08 22:48:24 +0100 | [diff] [blame] | 215 | static enum bp_state update_schedule(enum bp_state state) |
Jeremy Fitzhardinge | 1775826 | 2008-04-02 10:54:13 -0700 | [diff] [blame] | 216 | { |
David Vrabel | b2ac6aa | 2015-06-25 12:10:28 +0100 | [diff] [blame] | 217 | if (state == BP_WAIT) |
| 218 | return BP_WAIT; |
| 219 | |
Boris Ostrovsky | fd8b795 | 2014-10-07 17:00:07 -0400 | [diff] [blame] | 220 | if (state == BP_ECANCELED) |
| 221 | return BP_ECANCELED; |
| 222 | |
Daniel Kiper | 95d2ac4 | 2011-03-08 22:48:24 +0100 | [diff] [blame] | 223 | if (state == BP_DONE) { |
| 224 | balloon_stats.schedule_delay = 1; |
| 225 | balloon_stats.retry_count = 1; |
| 226 | return BP_DONE; |
| 227 | } |
| 228 | |
Daniel Kiper | 95d2ac4 | 2011-03-08 22:48:24 +0100 | [diff] [blame] | 229 | ++balloon_stats.retry_count; |
| 230 | |
| 231 | if (balloon_stats.max_retry_count != RETRY_UNLIMITED && |
| 232 | balloon_stats.retry_count > balloon_stats.max_retry_count) { |
Daniel Kiper | 95d2ac4 | 2011-03-08 22:48:24 +0100 | [diff] [blame] | 233 | balloon_stats.schedule_delay = 1; |
| 234 | balloon_stats.retry_count = 1; |
| 235 | return BP_ECANCELED; |
| 236 | } |
| 237 | |
| 238 | balloon_stats.schedule_delay <<= 1; |
| 239 | |
| 240 | if (balloon_stats.schedule_delay > balloon_stats.max_schedule_delay) |
| 241 | balloon_stats.schedule_delay = balloon_stats.max_schedule_delay; |
| 242 | |
| 243 | return BP_EAGAIN; |
Jeremy Fitzhardinge | 1775826 | 2008-04-02 10:54:13 -0700 | [diff] [blame] | 244 | } |
| 245 | |
Daniel Kiper | 080e2be | 2011-07-25 17:12:06 -0700 | [diff] [blame] | 246 | #ifdef CONFIG_XEN_BALLOON_MEMORY_HOTPLUG |
Ross Lagerwall | 842775f | 2016-05-10 10:27:54 +0100 | [diff] [blame] | 247 | static void release_memory_resource(struct resource *resource) |
| 248 | { |
| 249 | if (!resource) |
| 250 | return; |
| 251 | |
| 252 | /* |
| 253 | * No need to reset region to identity mapped since we now |
| 254 | * know that no I/O can be in this region |
| 255 | */ |
| 256 | release_resource(resource); |
| 257 | kfree(resource); |
| 258 | } |
| 259 | |
Boris Ostrovsky | b3cf852 | 2017-12-12 15:08:21 -0500 | [diff] [blame] | 260 | /* |
| 261 | * Host memory not allocated to dom0. We can use this range for hotplug-based |
| 262 | * ballooning. |
| 263 | * |
| 264 | * It's a type-less resource. Setting IORESOURCE_MEM will make resource |
| 265 | * management algorithms (arch_remove_reservations()) look into guest e820, |
| 266 | * which we don't want. |
| 267 | */ |
| 268 | static struct resource hostmem_resource = { |
| 269 | .name = "Host RAM", |
| 270 | }; |
| 271 | |
| 272 | void __attribute__((weak)) __init arch_xen_balloon_init(struct resource *res) |
| 273 | {} |
| 274 | |
David Vrabel | 55b3da9 | 2015-06-24 15:58:42 +0100 | [diff] [blame] | 275 | static struct resource *additional_memory_resource(phys_addr_t size) |
| 276 | { |
Boris Ostrovsky | b3cf852 | 2017-12-12 15:08:21 -0500 | [diff] [blame] | 277 | struct resource *res, *res_hostmem; |
| 278 | int ret = -ENOMEM; |
David Vrabel | 55b3da9 | 2015-06-24 15:58:42 +0100 | [diff] [blame] | 279 | |
| 280 | res = kzalloc(sizeof(*res), GFP_KERNEL); |
| 281 | if (!res) |
| 282 | return NULL; |
| 283 | |
| 284 | res->name = "System RAM"; |
Toshi Kani | 782b866 | 2016-01-26 21:57:24 +0100 | [diff] [blame] | 285 | res->flags = IORESOURCE_SYSTEM_RAM | IORESOURCE_BUSY; |
David Vrabel | 55b3da9 | 2015-06-24 15:58:42 +0100 | [diff] [blame] | 286 | |
Boris Ostrovsky | b3cf852 | 2017-12-12 15:08:21 -0500 | [diff] [blame] | 287 | res_hostmem = kzalloc(sizeof(*res), GFP_KERNEL); |
| 288 | if (res_hostmem) { |
| 289 | /* Try to grab a range from hostmem */ |
| 290 | res_hostmem->name = "Host memory"; |
| 291 | ret = allocate_resource(&hostmem_resource, res_hostmem, |
| 292 | size, 0, -1, |
| 293 | PAGES_PER_SECTION * PAGE_SIZE, NULL, NULL); |
| 294 | } |
| 295 | |
| 296 | if (!ret) { |
| 297 | /* |
| 298 | * Insert this resource into iomem. Because hostmem_resource |
| 299 | * tracks portion of guest e820 marked as UNUSABLE noone else |
| 300 | * should try to use it. |
| 301 | */ |
| 302 | res->start = res_hostmem->start; |
| 303 | res->end = res_hostmem->end; |
| 304 | ret = insert_resource(&iomem_resource, res); |
| 305 | if (ret < 0) { |
| 306 | pr_err("Can't insert iomem_resource [%llx - %llx]\n", |
| 307 | res->start, res->end); |
| 308 | release_memory_resource(res_hostmem); |
| 309 | res_hostmem = NULL; |
| 310 | res->start = res->end = 0; |
| 311 | } |
| 312 | } |
| 313 | |
| 314 | if (ret) { |
| 315 | ret = allocate_resource(&iomem_resource, res, |
| 316 | size, 0, -1, |
| 317 | PAGES_PER_SECTION * PAGE_SIZE, NULL, NULL); |
| 318 | if (ret < 0) { |
| 319 | pr_err("Cannot allocate new System RAM resource\n"); |
| 320 | kfree(res); |
| 321 | return NULL; |
| 322 | } |
David Vrabel | 55b3da9 | 2015-06-24 15:58:42 +0100 | [diff] [blame] | 323 | } |
| 324 | |
Ross Lagerwall | dfd74a1 | 2016-03-17 16:52:00 +0000 | [diff] [blame] | 325 | #ifdef CONFIG_SPARSEMEM |
| 326 | { |
| 327 | unsigned long limit = 1UL << (MAX_PHYSMEM_BITS - PAGE_SHIFT); |
| 328 | unsigned long pfn = res->start >> PAGE_SHIFT; |
| 329 | |
| 330 | if (pfn > limit) { |
| 331 | pr_err("New System RAM resource outside addressable RAM (%lu > %lu)\n", |
| 332 | pfn, limit); |
| 333 | release_memory_resource(res); |
Boris Ostrovsky | b3cf852 | 2017-12-12 15:08:21 -0500 | [diff] [blame] | 334 | release_memory_resource(res_hostmem); |
Ross Lagerwall | dfd74a1 | 2016-03-17 16:52:00 +0000 | [diff] [blame] | 335 | return NULL; |
| 336 | } |
| 337 | } |
| 338 | #endif |
| 339 | |
David Vrabel | 55b3da9 | 2015-06-24 15:58:42 +0100 | [diff] [blame] | 340 | return res; |
| 341 | } |
| 342 | |
David Vrabel | b2ac6aa | 2015-06-25 12:10:28 +0100 | [diff] [blame] | 343 | static enum bp_state reserve_additional_memory(void) |
Daniel Kiper | 080e2be | 2011-07-25 17:12:06 -0700 | [diff] [blame] | 344 | { |
David Vrabel | b2ac6aa | 2015-06-25 12:10:28 +0100 | [diff] [blame] | 345 | long credit; |
David Vrabel | 55b3da9 | 2015-06-24 15:58:42 +0100 | [diff] [blame] | 346 | struct resource *resource; |
Daniel Kiper | 080e2be | 2011-07-25 17:12:06 -0700 | [diff] [blame] | 347 | int nid, rc; |
David Vrabel | 55b3da9 | 2015-06-24 15:58:42 +0100 | [diff] [blame] | 348 | unsigned long balloon_hotplug; |
Daniel Kiper | 080e2be | 2011-07-25 17:12:06 -0700 | [diff] [blame] | 349 | |
David Vrabel | 1cf6a6c | 2015-06-25 16:29:18 +0100 | [diff] [blame] | 350 | credit = balloon_stats.target_pages + balloon_stats.target_unpopulated |
| 351 | - balloon_stats.total_pages; |
David Vrabel | b2ac6aa | 2015-06-25 12:10:28 +0100 | [diff] [blame] | 352 | |
| 353 | /* |
| 354 | * Already hotplugged enough pages? Wait for them to be |
| 355 | * onlined. |
| 356 | */ |
| 357 | if (credit <= 0) |
| 358 | return BP_WAIT; |
| 359 | |
David Vrabel | 55b3da9 | 2015-06-24 15:58:42 +0100 | [diff] [blame] | 360 | balloon_hotplug = round_up(credit, PAGES_PER_SECTION); |
| 361 | |
| 362 | resource = additional_memory_resource(balloon_hotplug * PAGE_SIZE); |
| 363 | if (!resource) |
| 364 | goto err; |
| 365 | |
| 366 | nid = memory_add_physaddr_to_nid(resource->start); |
Daniel Kiper | 080e2be | 2011-07-25 17:12:06 -0700 | [diff] [blame] | 367 | |
Juergen Gross | 3c56b3a1 | 2015-03-20 13:55:39 +0100 | [diff] [blame] | 368 | #ifdef CONFIG_XEN_HAVE_PVMMU |
Julien Grall | 30756c6 | 2015-05-04 15:39:08 +0100 | [diff] [blame] | 369 | /* |
| 370 | * We don't support PV MMU when Linux and Xen is using |
| 371 | * different page granularity. |
| 372 | */ |
| 373 | BUILD_BUG_ON(XEN_PAGE_SIZE != PAGE_SIZE); |
| 374 | |
Juergen Gross | 3c56b3a1 | 2015-03-20 13:55:39 +0100 | [diff] [blame] | 375 | /* |
| 376 | * add_memory() will build page tables for the new memory so |
| 377 | * the p2m must contain invalid entries so the correct |
| 378 | * non-present PTEs will be written. |
| 379 | * |
| 380 | * If a failure occurs, the original (identity) p2m entries |
| 381 | * are not restored since this region is now known not to |
| 382 | * conflict with any devices. |
| 383 | */ |
| 384 | if (!xen_feature(XENFEAT_auto_translated_physmap)) { |
| 385 | unsigned long pfn, i; |
| 386 | |
David Vrabel | 55b3da9 | 2015-06-24 15:58:42 +0100 | [diff] [blame] | 387 | pfn = PFN_DOWN(resource->start); |
Juergen Gross | 3c56b3a1 | 2015-03-20 13:55:39 +0100 | [diff] [blame] | 388 | for (i = 0; i < balloon_hotplug; i++) { |
| 389 | if (!set_phys_to_machine(pfn + i, INVALID_P2M_ENTRY)) { |
| 390 | pr_warn("set_phys_to_machine() failed, no memory added\n"); |
David Vrabel | 55b3da9 | 2015-06-24 15:58:42 +0100 | [diff] [blame] | 391 | goto err; |
Juergen Gross | 3c56b3a1 | 2015-03-20 13:55:39 +0100 | [diff] [blame] | 392 | } |
| 393 | } |
| 394 | } |
| 395 | #endif |
| 396 | |
Vitaly Kuznetsov | 703fc13 | 2016-03-15 14:56:52 -0700 | [diff] [blame] | 397 | /* |
| 398 | * add_memory_resource() will call online_pages() which in its turn |
| 399 | * will call xen_online_page() callback causing deadlock if we don't |
| 400 | * release balloon_mutex here. Unlocking here is safe because the |
| 401 | * callers drop the mutex before trying again. |
| 402 | */ |
| 403 | mutex_unlock(&balloon_mutex); |
| 404 | rc = add_memory_resource(nid, resource, memhp_auto_online); |
| 405 | mutex_lock(&balloon_mutex); |
| 406 | |
Daniel Kiper | 080e2be | 2011-07-25 17:12:06 -0700 | [diff] [blame] | 407 | if (rc) { |
David Vrabel | 3dcf636 | 2014-09-01 18:52:44 +0100 | [diff] [blame] | 408 | pr_warn("Cannot add additional memory (%i)\n", rc); |
David Vrabel | 55b3da9 | 2015-06-24 15:58:42 +0100 | [diff] [blame] | 409 | goto err; |
Daniel Kiper | 080e2be | 2011-07-25 17:12:06 -0700 | [diff] [blame] | 410 | } |
| 411 | |
David Vrabel | de5a77d | 2015-06-25 12:08:20 +0100 | [diff] [blame] | 412 | balloon_stats.total_pages += balloon_hotplug; |
Daniel Kiper | 080e2be | 2011-07-25 17:12:06 -0700 | [diff] [blame] | 413 | |
David Vrabel | b2ac6aa | 2015-06-25 12:10:28 +0100 | [diff] [blame] | 414 | return BP_WAIT; |
David Vrabel | 55b3da9 | 2015-06-24 15:58:42 +0100 | [diff] [blame] | 415 | err: |
| 416 | release_memory_resource(resource); |
| 417 | return BP_ECANCELED; |
Daniel Kiper | 080e2be | 2011-07-25 17:12:06 -0700 | [diff] [blame] | 418 | } |
| 419 | |
| 420 | static void xen_online_page(struct page *page) |
| 421 | { |
| 422 | __online_page_set_limits(page); |
| 423 | |
| 424 | mutex_lock(&balloon_mutex); |
| 425 | |
| 426 | __balloon_append(page); |
| 427 | |
Daniel Kiper | 080e2be | 2011-07-25 17:12:06 -0700 | [diff] [blame] | 428 | mutex_unlock(&balloon_mutex); |
| 429 | } |
| 430 | |
| 431 | static int xen_memory_notifier(struct notifier_block *nb, unsigned long val, void *v) |
| 432 | { |
| 433 | if (val == MEM_ONLINE) |
| 434 | schedule_delayed_work(&balloon_worker, 0); |
| 435 | |
| 436 | return NOTIFY_OK; |
| 437 | } |
| 438 | |
| 439 | static struct notifier_block xen_memory_nb = { |
| 440 | .notifier_call = xen_memory_notifier, |
| 441 | .priority = 0 |
| 442 | }; |
| 443 | #else |
David Vrabel | b2ac6aa | 2015-06-25 12:10:28 +0100 | [diff] [blame] | 444 | static enum bp_state reserve_additional_memory(void) |
Daniel Kiper | 080e2be | 2011-07-25 17:12:06 -0700 | [diff] [blame] | 445 | { |
| 446 | balloon_stats.target_pages = balloon_stats.current_pages; |
David Vrabel | 1cf6a6c | 2015-06-25 16:29:18 +0100 | [diff] [blame] | 447 | return BP_ECANCELED; |
Daniel Kiper | 080e2be | 2011-07-25 17:12:06 -0700 | [diff] [blame] | 448 | } |
| 449 | #endif /* CONFIG_XEN_BALLOON_MEMORY_HOTPLUG */ |
| 450 | |
David Vrabel | de5a77d | 2015-06-25 12:08:20 +0100 | [diff] [blame] | 451 | static long current_credit(void) |
| 452 | { |
| 453 | return balloon_stats.target_pages - balloon_stats.current_pages; |
| 454 | } |
| 455 | |
| 456 | static bool balloon_is_inflated(void) |
| 457 | { |
| 458 | return balloon_stats.balloon_low || balloon_stats.balloon_high; |
| 459 | } |
| 460 | |
Daniel Kiper | 95d2ac4 | 2011-03-08 22:48:24 +0100 | [diff] [blame] | 461 | static enum bp_state increase_reservation(unsigned long nr_pages) |
Jeremy Fitzhardinge | 1775826 | 2008-04-02 10:54:13 -0700 | [diff] [blame] | 462 | { |
Daniel Kiper | 95d2ac4 | 2011-03-08 22:48:24 +0100 | [diff] [blame] | 463 | int rc; |
Julien Grall | 30756c6 | 2015-05-04 15:39:08 +0100 | [diff] [blame] | 464 | unsigned long i; |
Jeremy Fitzhardinge | 1775826 | 2008-04-02 10:54:13 -0700 | [diff] [blame] | 465 | struct page *page; |
Jeremy Fitzhardinge | 1775826 | 2008-04-02 10:54:13 -0700 | [diff] [blame] | 466 | struct xen_memory_reservation reservation = { |
| 467 | .address_bits = 0, |
Julien Grall | 30756c6 | 2015-05-04 15:39:08 +0100 | [diff] [blame] | 468 | .extent_order = EXTENT_ORDER, |
Jeremy Fitzhardinge | 1775826 | 2008-04-02 10:54:13 -0700 | [diff] [blame] | 469 | .domid = DOMID_SELF |
| 470 | }; |
| 471 | |
| 472 | if (nr_pages > ARRAY_SIZE(frame_list)) |
| 473 | nr_pages = ARRAY_SIZE(frame_list); |
| 474 | |
Jie Liu | 9346c2a | 2013-11-13 20:59:58 +0800 | [diff] [blame] | 475 | page = list_first_entry_or_null(&ballooned_pages, struct page, lru); |
Jeremy Fitzhardinge | 1775826 | 2008-04-02 10:54:13 -0700 | [diff] [blame] | 476 | for (i = 0; i < nr_pages; i++) { |
Daniel Kiper | 95d2ac4 | 2011-03-08 22:48:24 +0100 | [diff] [blame] | 477 | if (!page) { |
| 478 | nr_pages = i; |
| 479 | break; |
| 480 | } |
Julien Grall | 30756c6 | 2015-05-04 15:39:08 +0100 | [diff] [blame] | 481 | |
| 482 | /* XENMEM_populate_physmap requires a PFN based on Xen |
| 483 | * granularity. |
| 484 | */ |
| 485 | frame_list[i] = page_to_xen_pfn(page); |
Jeremy Fitzhardinge | 1775826 | 2008-04-02 10:54:13 -0700 | [diff] [blame] | 486 | page = balloon_next_page(page); |
| 487 | } |
| 488 | |
Isaku Yamahata | a90971e | 2008-05-26 23:31:14 +0100 | [diff] [blame] | 489 | set_xen_guest_handle(reservation.extent_start, frame_list); |
Jeremy Fitzhardinge | fde28e8 | 2008-07-24 16:28:00 -0700 | [diff] [blame] | 490 | reservation.nr_extents = nr_pages; |
| 491 | rc = HYPERVISOR_memory_op(XENMEM_populate_physmap, &reservation); |
Konrad Rzeszutek Wilk | 40095de | 2011-03-14 11:42:40 -0400 | [diff] [blame] | 492 | if (rc <= 0) |
Daniel Kiper | 95d2ac4 | 2011-03-08 22:48:24 +0100 | [diff] [blame] | 493 | return BP_EAGAIN; |
Jeremy Fitzhardinge | 1775826 | 2008-04-02 10:54:13 -0700 | [diff] [blame] | 494 | |
Ian Campbell | bc2c030 | 2009-06-05 11:58:37 +0100 | [diff] [blame] | 495 | for (i = 0; i < rc; i++) { |
Konrad Rzeszutek Wilk | b6f3067 | 2011-03-15 10:23:57 -0400 | [diff] [blame] | 496 | page = balloon_retrieve(false); |
Jeremy Fitzhardinge | 1775826 | 2008-04-02 10:54:13 -0700 | [diff] [blame] | 497 | BUG_ON(page == NULL); |
| 498 | |
Ian Campbell | c2374bf | 2012-10-03 12:17:50 +0100 | [diff] [blame] | 499 | #ifdef CONFIG_XEN_HAVE_PVMMU |
Julien Grall | 30756c6 | 2015-05-04 15:39:08 +0100 | [diff] [blame] | 500 | /* |
| 501 | * We don't support PV MMU when Linux and Xen is using |
| 502 | * different page granularity. |
| 503 | */ |
| 504 | BUILD_BUG_ON(XEN_PAGE_SIZE != PAGE_SIZE); |
| 505 | |
Stefano Stabellini | c1d15f5 | 2013-12-11 16:58:42 +0000 | [diff] [blame] | 506 | if (!xen_feature(XENFEAT_auto_translated_physmap)) { |
Julien Grall | 30756c6 | 2015-05-04 15:39:08 +0100 | [diff] [blame] | 507 | unsigned long pfn = page_to_pfn(page); |
| 508 | |
Stefano Stabellini | c1d15f5 | 2013-12-11 16:58:42 +0000 | [diff] [blame] | 509 | set_phys_to_machine(pfn, frame_list[i]); |
| 510 | |
| 511 | /* Link back into the page tables if not highmem. */ |
| 512 | if (!PageHighMem(page)) { |
| 513 | int ret; |
| 514 | ret = HYPERVISOR_update_va_mapping( |
| 515 | (unsigned long)__va(pfn << PAGE_SHIFT), |
| 516 | mfn_pte(frame_list[i], PAGE_KERNEL), |
| 517 | 0); |
| 518 | BUG_ON(ret); |
| 519 | } |
Jeremy Fitzhardinge | 1775826 | 2008-04-02 10:54:13 -0700 | [diff] [blame] | 520 | } |
Ian Campbell | c2374bf | 2012-10-03 12:17:50 +0100 | [diff] [blame] | 521 | #endif |
Jeremy Fitzhardinge | 1775826 | 2008-04-02 10:54:13 -0700 | [diff] [blame] | 522 | |
| 523 | /* Relinquish the page back to the allocator. */ |
Ross Lagerwall | 709613a | 2016-12-09 17:10:22 +0000 | [diff] [blame] | 524 | free_reserved_page(page); |
Jeremy Fitzhardinge | 1775826 | 2008-04-02 10:54:13 -0700 | [diff] [blame] | 525 | } |
| 526 | |
Ian Campbell | bc2c030 | 2009-06-05 11:58:37 +0100 | [diff] [blame] | 527 | balloon_stats.current_pages += rc; |
Jeremy Fitzhardinge | 1775826 | 2008-04-02 10:54:13 -0700 | [diff] [blame] | 528 | |
Daniel Kiper | 95d2ac4 | 2011-03-08 22:48:24 +0100 | [diff] [blame] | 529 | return BP_DONE; |
Jeremy Fitzhardinge | 1775826 | 2008-04-02 10:54:13 -0700 | [diff] [blame] | 530 | } |
| 531 | |
Konrad Rzeszutek Wilk | b6f3067 | 2011-03-15 10:23:57 -0400 | [diff] [blame] | 532 | static enum bp_state decrease_reservation(unsigned long nr_pages, gfp_t gfp) |
Jeremy Fitzhardinge | 1775826 | 2008-04-02 10:54:13 -0700 | [diff] [blame] | 533 | { |
Daniel Kiper | 95d2ac4 | 2011-03-08 22:48:24 +0100 | [diff] [blame] | 534 | enum bp_state state = BP_DONE; |
Julien Grall | 30756c6 | 2015-05-04 15:39:08 +0100 | [diff] [blame] | 535 | unsigned long i; |
| 536 | struct page *page, *tmp; |
Jeremy Fitzhardinge | 1775826 | 2008-04-02 10:54:13 -0700 | [diff] [blame] | 537 | int ret; |
| 538 | struct xen_memory_reservation reservation = { |
| 539 | .address_bits = 0, |
Julien Grall | 30756c6 | 2015-05-04 15:39:08 +0100 | [diff] [blame] | 540 | .extent_order = EXTENT_ORDER, |
Jeremy Fitzhardinge | 1775826 | 2008-04-02 10:54:13 -0700 | [diff] [blame] | 541 | .domid = DOMID_SELF |
| 542 | }; |
Julien Grall | 30756c6 | 2015-05-04 15:39:08 +0100 | [diff] [blame] | 543 | LIST_HEAD(pages); |
Jeremy Fitzhardinge | 1775826 | 2008-04-02 10:54:13 -0700 | [diff] [blame] | 544 | |
| 545 | if (nr_pages > ARRAY_SIZE(frame_list)) |
| 546 | nr_pages = ARRAY_SIZE(frame_list); |
| 547 | |
| 548 | for (i = 0; i < nr_pages; i++) { |
Lisa Nguyen | fce9268 | 2013-05-15 22:59:40 -0700 | [diff] [blame] | 549 | page = alloc_page(gfp); |
| 550 | if (page == NULL) { |
Jeremy Fitzhardinge | 1775826 | 2008-04-02 10:54:13 -0700 | [diff] [blame] | 551 | nr_pages = i; |
Daniel Kiper | 95d2ac4 | 2011-03-08 22:48:24 +0100 | [diff] [blame] | 552 | state = BP_EAGAIN; |
Jeremy Fitzhardinge | 1775826 | 2008-04-02 10:54:13 -0700 | [diff] [blame] | 553 | break; |
| 554 | } |
Ross Lagerwall | 709613a | 2016-12-09 17:10:22 +0000 | [diff] [blame] | 555 | adjust_managed_page_count(page, -1); |
Jeremy Fitzhardinge | 1775826 | 2008-04-02 10:54:13 -0700 | [diff] [blame] | 556 | scrub_page(page); |
Julien Grall | 30756c6 | 2015-05-04 15:39:08 +0100 | [diff] [blame] | 557 | list_add(&page->lru, &pages); |
Wei Liu | 09ed3d5 | 2014-03-15 16:11:47 +0000 | [diff] [blame] | 558 | } |
| 559 | |
| 560 | /* |
| 561 | * Ensure that ballooned highmem pages don't have kmaps. |
| 562 | * |
| 563 | * Do this before changing the p2m as kmap_flush_unused() |
| 564 | * reads PTEs to obtain pages (and hence needs the original |
| 565 | * p2m entry). |
| 566 | */ |
| 567 | kmap_flush_unused(); |
| 568 | |
Julien Grall | 30756c6 | 2015-05-04 15:39:08 +0100 | [diff] [blame] | 569 | /* |
| 570 | * Setup the frame, update direct mapping, invalidate P2M, |
| 571 | * and add to balloon. |
| 572 | */ |
| 573 | i = 0; |
| 574 | list_for_each_entry_safe(page, tmp, &pages, lru) { |
| 575 | /* XENMEM_decrease_reservation requires a GFN */ |
| 576 | frame_list[i++] = xen_page_to_gfn(page); |
Wei Liu | 09ed3d5 | 2014-03-15 16:11:47 +0000 | [diff] [blame] | 577 | |
Stefano Stabellini | c1d15f5 | 2013-12-11 16:58:42 +0000 | [diff] [blame] | 578 | #ifdef CONFIG_XEN_HAVE_PVMMU |
Julien Grall | 30756c6 | 2015-05-04 15:39:08 +0100 | [diff] [blame] | 579 | /* |
| 580 | * We don't support PV MMU when Linux and Xen is using |
| 581 | * different page granularity. |
| 582 | */ |
| 583 | BUILD_BUG_ON(XEN_PAGE_SIZE != PAGE_SIZE); |
| 584 | |
Wei Liu | 04660bb | 2013-08-27 16:17:25 +0100 | [diff] [blame] | 585 | if (!xen_feature(XENFEAT_auto_translated_physmap)) { |
Julien Grall | 30756c6 | 2015-05-04 15:39:08 +0100 | [diff] [blame] | 586 | unsigned long pfn = page_to_pfn(page); |
| 587 | |
Stefano Stabellini | c1d15f5 | 2013-12-11 16:58:42 +0000 | [diff] [blame] | 588 | if (!PageHighMem(page)) { |
| 589 | ret = HYPERVISOR_update_va_mapping( |
| 590 | (unsigned long)__va(pfn << PAGE_SHIFT), |
David Vrabel | 0bb599f | 2015-01-05 17:06:01 +0000 | [diff] [blame] | 591 | __pte_ma(0), 0); |
Stefano Stabellini | c1d15f5 | 2013-12-11 16:58:42 +0000 | [diff] [blame] | 592 | BUG_ON(ret); |
David Vrabel | fb9a0c4 | 2014-06-27 10:42:03 +0100 | [diff] [blame] | 593 | } |
| 594 | __set_phys_to_machine(pfn, INVALID_P2M_ENTRY); |
Wei Liu | 04660bb | 2013-08-27 16:17:25 +0100 | [diff] [blame] | 595 | } |
Stefano Stabellini | c1d15f5 | 2013-12-11 16:58:42 +0000 | [diff] [blame] | 596 | #endif |
Julien Grall | 30756c6 | 2015-05-04 15:39:08 +0100 | [diff] [blame] | 597 | list_del(&page->lru); |
David Vrabel | 24f6937 | 2013-09-19 17:14:53 +0100 | [diff] [blame] | 598 | |
Wei Liu | 09ed3d5 | 2014-03-15 16:11:47 +0000 | [diff] [blame] | 599 | balloon_append(page); |
Jeremy Fitzhardinge | 1775826 | 2008-04-02 10:54:13 -0700 | [diff] [blame] | 600 | } |
| 601 | |
David Vrabel | 24f6937 | 2013-09-19 17:14:53 +0100 | [diff] [blame] | 602 | flush_tlb_all(); |
David Vrabel | 2bad07c | 2013-09-11 17:45:44 +0000 | [diff] [blame] | 603 | |
Isaku Yamahata | a90971e | 2008-05-26 23:31:14 +0100 | [diff] [blame] | 604 | set_xen_guest_handle(reservation.extent_start, frame_list); |
Jeremy Fitzhardinge | 1775826 | 2008-04-02 10:54:13 -0700 | [diff] [blame] | 605 | reservation.nr_extents = nr_pages; |
| 606 | ret = HYPERVISOR_memory_op(XENMEM_decrease_reservation, &reservation); |
| 607 | BUG_ON(ret != nr_pages); |
| 608 | |
| 609 | balloon_stats.current_pages -= nr_pages; |
Jeremy Fitzhardinge | 1775826 | 2008-04-02 10:54:13 -0700 | [diff] [blame] | 610 | |
Daniel Kiper | 95d2ac4 | 2011-03-08 22:48:24 +0100 | [diff] [blame] | 611 | return state; |
Jeremy Fitzhardinge | 1775826 | 2008-04-02 10:54:13 -0700 | [diff] [blame] | 612 | } |
| 613 | |
| 614 | /* |
Juergen Gross | 929423f | 2015-07-20 13:49:39 +0200 | [diff] [blame] | 615 | * As this is a work item it is guaranteed to run as a single instance only. |
Jeremy Fitzhardinge | 1775826 | 2008-04-02 10:54:13 -0700 | [diff] [blame] | 616 | * We may of course race updates of the target counts (which are protected |
| 617 | * by the balloon lock), or with changes to the Xen hard limit, but we will |
| 618 | * recover from these in time. |
| 619 | */ |
| 620 | static void balloon_process(struct work_struct *work) |
| 621 | { |
Daniel Kiper | 95d2ac4 | 2011-03-08 22:48:24 +0100 | [diff] [blame] | 622 | enum bp_state state = BP_DONE; |
Jeremy Fitzhardinge | 1775826 | 2008-04-02 10:54:13 -0700 | [diff] [blame] | 623 | long credit; |
| 624 | |
Jeremy Fitzhardinge | 1775826 | 2008-04-02 10:54:13 -0700 | [diff] [blame] | 625 | |
| 626 | do { |
Juergen Gross | 929423f | 2015-07-20 13:49:39 +0200 | [diff] [blame] | 627 | mutex_lock(&balloon_mutex); |
| 628 | |
Daniel Kiper | 83be7e5 | 2011-03-28 11:34:10 +0200 | [diff] [blame] | 629 | credit = current_credit(); |
Daniel Kiper | 95d2ac4 | 2011-03-08 22:48:24 +0100 | [diff] [blame] | 630 | |
Daniel Kiper | 080e2be | 2011-07-25 17:12:06 -0700 | [diff] [blame] | 631 | if (credit > 0) { |
| 632 | if (balloon_is_inflated()) |
| 633 | state = increase_reservation(credit); |
| 634 | else |
David Vrabel | b2ac6aa | 2015-06-25 12:10:28 +0100 | [diff] [blame] | 635 | state = reserve_additional_memory(); |
Daniel Kiper | 080e2be | 2011-07-25 17:12:06 -0700 | [diff] [blame] | 636 | } |
Daniel Kiper | 95d2ac4 | 2011-03-08 22:48:24 +0100 | [diff] [blame] | 637 | |
Jeremy Fitzhardinge | 1775826 | 2008-04-02 10:54:13 -0700 | [diff] [blame] | 638 | if (credit < 0) |
Konrad Rzeszutek Wilk | b6f3067 | 2011-03-15 10:23:57 -0400 | [diff] [blame] | 639 | state = decrease_reservation(-credit, GFP_BALLOON); |
Daniel Kiper | 95d2ac4 | 2011-03-08 22:48:24 +0100 | [diff] [blame] | 640 | |
| 641 | state = update_schedule(state); |
Jeremy Fitzhardinge | 1775826 | 2008-04-02 10:54:13 -0700 | [diff] [blame] | 642 | |
Juergen Gross | 929423f | 2015-07-20 13:49:39 +0200 | [diff] [blame] | 643 | mutex_unlock(&balloon_mutex); |
| 644 | |
| 645 | cond_resched(); |
| 646 | |
Daniel Kiper | 95d2ac4 | 2011-03-08 22:48:24 +0100 | [diff] [blame] | 647 | } while (credit && state == BP_DONE); |
Jeremy Fitzhardinge | 1775826 | 2008-04-02 10:54:13 -0700 | [diff] [blame] | 648 | |
| 649 | /* Schedule more work if there is some still to be done. */ |
Daniel Kiper | 95d2ac4 | 2011-03-08 22:48:24 +0100 | [diff] [blame] | 650 | if (state == BP_EAGAIN) |
| 651 | schedule_delayed_work(&balloon_worker, balloon_stats.schedule_delay * HZ); |
Jeremy Fitzhardinge | 1775826 | 2008-04-02 10:54:13 -0700 | [diff] [blame] | 652 | } |
| 653 | |
| 654 | /* Resets the Xen limit, sets new target, and kicks off processing. */ |
Daniel De Graaf | 803eb04 | 2011-03-14 11:29:37 -0400 | [diff] [blame] | 655 | void balloon_set_new_target(unsigned long target) |
Jeremy Fitzhardinge | 1775826 | 2008-04-02 10:54:13 -0700 | [diff] [blame] | 656 | { |
| 657 | /* No need for lock. Not read-modify-write updates. */ |
Jeremy Fitzhardinge | 1775826 | 2008-04-02 10:54:13 -0700 | [diff] [blame] | 658 | balloon_stats.target_pages = target; |
Daniel Kiper | 95170b2 | 2011-03-08 22:47:39 +0100 | [diff] [blame] | 659 | schedule_delayed_work(&balloon_worker, 0); |
Jeremy Fitzhardinge | 1775826 | 2008-04-02 10:54:13 -0700 | [diff] [blame] | 660 | } |
Daniel De Graaf | 803eb04 | 2011-03-14 11:29:37 -0400 | [diff] [blame] | 661 | EXPORT_SYMBOL_GPL(balloon_set_new_target); |
Jeremy Fitzhardinge | 1775826 | 2008-04-02 10:54:13 -0700 | [diff] [blame] | 662 | |
David Vrabel | 1cf6a6c | 2015-06-25 16:29:18 +0100 | [diff] [blame] | 663 | static int add_ballooned_pages(int nr_pages) |
| 664 | { |
| 665 | enum bp_state st; |
| 666 | |
| 667 | if (xen_hotplug_unpopulated) { |
| 668 | st = reserve_additional_memory(); |
| 669 | if (st != BP_ECANCELED) { |
| 670 | mutex_unlock(&balloon_mutex); |
| 671 | wait_event(balloon_wq, |
| 672 | !list_empty(&ballooned_pages)); |
| 673 | mutex_lock(&balloon_mutex); |
| 674 | return 0; |
| 675 | } |
| 676 | } |
| 677 | |
| 678 | st = decrease_reservation(nr_pages, GFP_USER); |
| 679 | if (st != BP_DONE) |
| 680 | return -ENOMEM; |
| 681 | |
| 682 | return 0; |
| 683 | } |
| 684 | |
Konrad Rzeszutek Wilk | b6f3067 | 2011-03-15 10:23:57 -0400 | [diff] [blame] | 685 | /** |
| 686 | * alloc_xenballooned_pages - get pages that have been ballooned out |
| 687 | * @nr_pages: Number of pages to get |
| 688 | * @pages: pages returned |
| 689 | * @return 0 on success, error otherwise |
| 690 | */ |
David Vrabel | 81b286e | 2015-06-25 13:12:46 +0100 | [diff] [blame] | 691 | int alloc_xenballooned_pages(int nr_pages, struct page **pages) |
Jeremy Fitzhardinge | 1775826 | 2008-04-02 10:54:13 -0700 | [diff] [blame] | 692 | { |
Konrad Rzeszutek Wilk | b6f3067 | 2011-03-15 10:23:57 -0400 | [diff] [blame] | 693 | int pgno = 0; |
Ruslan Pisarev | e882dc9 | 2011-07-26 14:15:59 +0300 | [diff] [blame] | 694 | struct page *page; |
David Vrabel | 1cf6a6c | 2015-06-25 16:29:18 +0100 | [diff] [blame] | 695 | int ret; |
| 696 | |
Konrad Rzeszutek Wilk | b6f3067 | 2011-03-15 10:23:57 -0400 | [diff] [blame] | 697 | mutex_lock(&balloon_mutex); |
David Vrabel | 1cf6a6c | 2015-06-25 16:29:18 +0100 | [diff] [blame] | 698 | |
| 699 | balloon_stats.target_unpopulated += nr_pages; |
| 700 | |
Konrad Rzeszutek Wilk | b6f3067 | 2011-03-15 10:23:57 -0400 | [diff] [blame] | 701 | while (pgno < nr_pages) { |
David Vrabel | 81b286e | 2015-06-25 13:12:46 +0100 | [diff] [blame] | 702 | page = balloon_retrieve(true); |
| 703 | if (page) { |
Konrad Rzeszutek Wilk | b6f3067 | 2011-03-15 10:23:57 -0400 | [diff] [blame] | 704 | pages[pgno++] = page; |
David Vrabel | 4a69c90 | 2015-07-22 14:50:37 +0100 | [diff] [blame] | 705 | #ifdef CONFIG_XEN_HAVE_PVMMU |
Julien Grall | 30756c6 | 2015-05-04 15:39:08 +0100 | [diff] [blame] | 706 | /* |
| 707 | * We don't support PV MMU when Linux and Xen is using |
| 708 | * different page granularity. |
| 709 | */ |
| 710 | BUILD_BUG_ON(XEN_PAGE_SIZE != PAGE_SIZE); |
| 711 | |
Boris Ostrovsky | b194da2 | 2017-08-23 18:27:04 -0400 | [diff] [blame] | 712 | if (!xen_feature(XENFEAT_auto_translated_physmap)) { |
| 713 | ret = xen_alloc_p2m_entry(page_to_pfn(page)); |
| 714 | if (ret < 0) |
| 715 | goto out_undo; |
| 716 | } |
David Vrabel | 4a69c90 | 2015-07-22 14:50:37 +0100 | [diff] [blame] | 717 | #endif |
Konrad Rzeszutek Wilk | b6f3067 | 2011-03-15 10:23:57 -0400 | [diff] [blame] | 718 | } else { |
David Vrabel | 1cf6a6c | 2015-06-25 16:29:18 +0100 | [diff] [blame] | 719 | ret = add_ballooned_pages(nr_pages - pgno); |
| 720 | if (ret < 0) |
Konrad Rzeszutek Wilk | b6f3067 | 2011-03-15 10:23:57 -0400 | [diff] [blame] | 721 | goto out_undo; |
| 722 | } |
| 723 | } |
| 724 | mutex_unlock(&balloon_mutex); |
| 725 | return 0; |
| 726 | out_undo: |
Konrad Rzeszutek Wilk | b6f3067 | 2011-03-15 10:23:57 -0400 | [diff] [blame] | 727 | mutex_unlock(&balloon_mutex); |
David Vrabel | 1cf6a6c | 2015-06-25 16:29:18 +0100 | [diff] [blame] | 728 | free_xenballooned_pages(pgno, pages); |
| 729 | return ret; |
Konrad Rzeszutek Wilk | b6f3067 | 2011-03-15 10:23:57 -0400 | [diff] [blame] | 730 | } |
| 731 | EXPORT_SYMBOL(alloc_xenballooned_pages); |
Jeremy Fitzhardinge | 1775826 | 2008-04-02 10:54:13 -0700 | [diff] [blame] | 732 | |
Konrad Rzeszutek Wilk | b6f3067 | 2011-03-15 10:23:57 -0400 | [diff] [blame] | 733 | /** |
| 734 | * free_xenballooned_pages - return pages retrieved with get_ballooned_pages |
| 735 | * @nr_pages: Number of pages |
| 736 | * @pages: pages to return |
| 737 | */ |
Ruslan Pisarev | e882dc9 | 2011-07-26 14:15:59 +0300 | [diff] [blame] | 738 | void free_xenballooned_pages(int nr_pages, struct page **pages) |
Jeremy Fitzhardinge | 1775826 | 2008-04-02 10:54:13 -0700 | [diff] [blame] | 739 | { |
Konrad Rzeszutek Wilk | b6f3067 | 2011-03-15 10:23:57 -0400 | [diff] [blame] | 740 | int i; |
Jeremy Fitzhardinge | 1775826 | 2008-04-02 10:54:13 -0700 | [diff] [blame] | 741 | |
Konrad Rzeszutek Wilk | b6f3067 | 2011-03-15 10:23:57 -0400 | [diff] [blame] | 742 | mutex_lock(&balloon_mutex); |
| 743 | |
| 744 | for (i = 0; i < nr_pages; i++) { |
| 745 | if (pages[i]) |
| 746 | balloon_append(pages[i]); |
Jeremy Fitzhardinge | 1775826 | 2008-04-02 10:54:13 -0700 | [diff] [blame] | 747 | } |
| 748 | |
David Vrabel | 1cf6a6c | 2015-06-25 16:29:18 +0100 | [diff] [blame] | 749 | balloon_stats.target_unpopulated -= nr_pages; |
| 750 | |
Konrad Rzeszutek Wilk | b6f3067 | 2011-03-15 10:23:57 -0400 | [diff] [blame] | 751 | /* The balloon may be too large now. Shrink it if needed. */ |
Daniel Kiper | 83be7e5 | 2011-03-28 11:34:10 +0200 | [diff] [blame] | 752 | if (current_credit()) |
Konrad Rzeszutek Wilk | b6f3067 | 2011-03-15 10:23:57 -0400 | [diff] [blame] | 753 | schedule_delayed_work(&balloon_worker, 0); |
| 754 | |
| 755 | mutex_unlock(&balloon_mutex); |
Jeremy Fitzhardinge | 1775826 | 2008-04-02 10:54:13 -0700 | [diff] [blame] | 756 | } |
Konrad Rzeszutek Wilk | b6f3067 | 2011-03-15 10:23:57 -0400 | [diff] [blame] | 757 | EXPORT_SYMBOL(free_xenballooned_pages); |
Jeremy Fitzhardinge | 1775826 | 2008-04-02 10:54:13 -0700 | [diff] [blame] | 758 | |
Vitaly Kuznetsov | 4fee9ad | 2017-03-14 18:35:53 +0100 | [diff] [blame] | 759 | #ifdef CONFIG_XEN_PV |
David Vrabel | 8b5d44a | 2011-09-28 17:46:34 +0100 | [diff] [blame] | 760 | static void __init balloon_add_region(unsigned long start_pfn, |
| 761 | unsigned long pages) |
Jeremy Fitzhardinge | 1775826 | 2008-04-02 10:54:13 -0700 | [diff] [blame] | 762 | { |
Daniel Kiper | 4dfe22f | 2011-03-28 11:33:18 +0200 | [diff] [blame] | 763 | unsigned long pfn, extra_pfn_end; |
Jeremy Fitzhardinge | 1775826 | 2008-04-02 10:54:13 -0700 | [diff] [blame] | 764 | struct page *page; |
| 765 | |
David Vrabel | 8b5d44a | 2011-09-28 17:46:34 +0100 | [diff] [blame] | 766 | /* |
| 767 | * If the amount of usable memory has been limited (e.g., with |
| 768 | * the 'mem' command line parameter), don't add pages beyond |
| 769 | * this limit. |
| 770 | */ |
| 771 | extra_pfn_end = min(max_pfn, start_pfn + pages); |
| 772 | |
| 773 | for (pfn = start_pfn; pfn < extra_pfn_end; pfn++) { |
| 774 | page = pfn_to_page(pfn); |
| 775 | /* totalram_pages and totalhigh_pages do not |
| 776 | include the boot-time balloon extension, so |
| 777 | don't subtract from it. */ |
| 778 | __balloon_append(page); |
| 779 | } |
David Vrabel | de5a77d | 2015-06-25 12:08:20 +0100 | [diff] [blame] | 780 | |
| 781 | balloon_stats.total_pages += extra_pfn_end - start_pfn; |
David Vrabel | 8b5d44a | 2011-09-28 17:46:34 +0100 | [diff] [blame] | 782 | } |
Vitaly Kuznetsov | 4fee9ad | 2017-03-14 18:35:53 +0100 | [diff] [blame] | 783 | #endif |
David Vrabel | 8b5d44a | 2011-09-28 17:46:34 +0100 | [diff] [blame] | 784 | |
| 785 | static int __init balloon_init(void) |
| 786 | { |
Stefano Stabellini | 53d5522 | 2010-12-02 17:55:05 +0000 | [diff] [blame] | 787 | if (!xen_domain()) |
Jeremy Fitzhardinge | 1775826 | 2008-04-02 10:54:13 -0700 | [diff] [blame] | 788 | return -ENODEV; |
| 789 | |
Joe Perches | 283c097 | 2013-06-28 03:21:41 -0700 | [diff] [blame] | 790 | pr_info("Initialising balloon driver\n"); |
Jeremy Fitzhardinge | 1775826 | 2008-04-02 10:54:13 -0700 | [diff] [blame] | 791 | |
Vitaly Kuznetsov | 4fee9ad | 2017-03-14 18:35:53 +0100 | [diff] [blame] | 792 | #ifdef CONFIG_XEN_PV |
David Vrabel | aa24411 | 2011-09-28 17:46:32 +0100 | [diff] [blame] | 793 | balloon_stats.current_pages = xen_pv_domain() |
| 794 | ? min(xen_start_info->nr_pages - xen_released_pages, max_pfn) |
Boris Ostrovsky | c275a57 | 2013-11-06 15:37:40 -0500 | [diff] [blame] | 795 | : get_num_physpages(); |
Vitaly Kuznetsov | 4fee9ad | 2017-03-14 18:35:53 +0100 | [diff] [blame] | 796 | #else |
| 797 | balloon_stats.current_pages = get_num_physpages(); |
| 798 | #endif |
Jeremy Fitzhardinge | 1775826 | 2008-04-02 10:54:13 -0700 | [diff] [blame] | 799 | balloon_stats.target_pages = balloon_stats.current_pages; |
| 800 | balloon_stats.balloon_low = 0; |
| 801 | balloon_stats.balloon_high = 0; |
David Vrabel | de5a77d | 2015-06-25 12:08:20 +0100 | [diff] [blame] | 802 | balloon_stats.total_pages = balloon_stats.current_pages; |
Jeremy Fitzhardinge | 1775826 | 2008-04-02 10:54:13 -0700 | [diff] [blame] | 803 | |
Daniel Kiper | 95d2ac4 | 2011-03-08 22:48:24 +0100 | [diff] [blame] | 804 | balloon_stats.schedule_delay = 1; |
| 805 | balloon_stats.max_schedule_delay = 32; |
| 806 | balloon_stats.retry_count = 1; |
Konrad Rzeszutek Wilk | 40095de | 2011-03-14 11:42:40 -0400 | [diff] [blame] | 807 | balloon_stats.max_retry_count = RETRY_UNLIMITED; |
Jeremy Fitzhardinge | 1775826 | 2008-04-02 10:54:13 -0700 | [diff] [blame] | 808 | |
Daniel Kiper | 080e2be | 2011-07-25 17:12:06 -0700 | [diff] [blame] | 809 | #ifdef CONFIG_XEN_BALLOON_MEMORY_HOTPLUG |
Daniel Kiper | 080e2be | 2011-07-25 17:12:06 -0700 | [diff] [blame] | 810 | set_online_page_callback(&xen_online_page); |
| 811 | register_memory_notifier(&xen_memory_nb); |
David Vrabel | 1cf6a6c | 2015-06-25 16:29:18 +0100 | [diff] [blame] | 812 | register_sysctl_table(xen_root); |
Boris Ostrovsky | b3cf852 | 2017-12-12 15:08:21 -0500 | [diff] [blame] | 813 | |
| 814 | arch_xen_balloon_init(&hostmem_resource); |
Daniel Kiper | 080e2be | 2011-07-25 17:12:06 -0700 | [diff] [blame] | 815 | #endif |
| 816 | |
Vitaly Kuznetsov | 4fee9ad | 2017-03-14 18:35:53 +0100 | [diff] [blame] | 817 | #ifdef CONFIG_XEN_PV |
| 818 | { |
| 819 | int i; |
| 820 | |
| 821 | /* |
| 822 | * Initialize the balloon with pages from the extra memory |
| 823 | * regions (see arch/x86/xen/setup.c). |
| 824 | */ |
| 825 | for (i = 0; i < XEN_EXTRA_MEM_MAX_REGIONS; i++) |
| 826 | if (xen_extra_mem[i].n_pfns) |
| 827 | balloon_add_region(xen_extra_mem[i].start_pfn, |
| 828 | xen_extra_mem[i].n_pfns); |
| 829 | } |
| 830 | #endif |
Jeremy Fitzhardinge | 1775826 | 2008-04-02 10:54:13 -0700 | [diff] [blame] | 831 | |
Juergen Gross | 96edd61 | 2017-07-10 10:10:45 +0200 | [diff] [blame] | 832 | /* Init the xen-balloon driver. */ |
| 833 | xen_balloon_init(); |
| 834 | |
Jeremy Fitzhardinge | 1775826 | 2008-04-02 10:54:13 -0700 | [diff] [blame] | 835 | return 0; |
| 836 | } |
Jeremy Fitzhardinge | 1775826 | 2008-04-02 10:54:13 -0700 | [diff] [blame] | 837 | subsys_initcall(balloon_init); |