blob: 4e11de6cde81f398ead5005c3ca003d2e1fbcfc6 [file] [log] [blame]
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -07001/******************************************************************************
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -07002 * Xen balloon driver - enables returning/claiming memory to/from Xen.
3 *
4 * Copyright (c) 2003, B Dragovic
5 * Copyright (c) 2003-2004, M Williamson, K Fraser
6 * Copyright (c) 2005 Dan M. Smith, IBM Corporation
Daniel Kiper080e2be2011-07-25 17:12:06 -07007 * Copyright (c) 2010 Daniel Kiper
8 *
9 * Memory hotplug support was written by Daniel Kiper. Work on
10 * it was sponsored by Google under Google Summer of Code 2010
11 * program. Jeremy Fitzhardinge from Citrix was the mentor for
12 * this project.
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -070013 *
14 * This program is free software; you can redistribute it and/or
15 * modify it under the terms of the GNU General Public License version 2
16 * as published by the Free Software Foundation; or, when distributed
17 * separately from the Linux kernel or incorporated into other
18 * software packages, subject to the following license:
19 *
20 * Permission is hereby granted, free of charge, to any person obtaining a copy
21 * of this source file (the "Software"), to deal in the Software without
22 * restriction, including without limitation the rights to use, copy, modify,
23 * merge, publish, distribute, sublicense, and/or sell copies of the Software,
24 * and to permit persons to whom the Software is furnished to do so, subject to
25 * the following conditions:
26 *
27 * The above copyright notice and this permission notice shall be included in
28 * all copies or substantial portions of the Software.
29 *
30 * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
31 * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
32 * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
33 * AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
34 * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING
35 * FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS
36 * IN THE SOFTWARE.
37 */
38
Joe Perches283c0972013-06-28 03:21:41 -070039#define pr_fmt(fmt) "xen:" KBUILD_MODNAME ": " fmt
40
Stefano Stabellinicd9151e2013-08-04 15:39:40 +010041#include <linux/cpu.h>
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -070042#include <linux/kernel.h>
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -070043#include <linux/sched.h>
Ingo Molnar5b825c32017-02-02 17:54:15 +010044#include <linux/cred.h>
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -070045#include <linux/errno.h>
46#include <linux/mm.h>
Mike Rapoport57c8a662018-10-30 15:09:49 -070047#include <linux/memblock.h>
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -070048#include <linux/pagemap.h>
49#include <linux/highmem.h>
50#include <linux/mutex.h>
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -070051#include <linux/list.h>
Tejun Heo5a0e3ad2010-03-24 17:04:11 +090052#include <linux/gfp.h>
Daniel Kiper080e2be2011-07-25 17:12:06 -070053#include <linux/notifier.h>
54#include <linux/memory.h>
55#include <linux/memory_hotplug.h>
Stefano Stabellinicd9151e2013-08-04 15:39:40 +010056#include <linux/percpu-defs.h>
David Vrabel55b3da92015-06-24 15:58:42 +010057#include <linux/slab.h>
David Vrabel1cf6a6c2015-06-25 16:29:18 +010058#include <linux/sysctl.h>
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -070059
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -070060#include <asm/page.h>
61#include <asm/pgalloc.h>
62#include <asm/pgtable.h>
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -070063#include <asm/tlb.h>
64
Jeremy Fitzhardingeecbf29c2008-12-16 12:37:07 -080065#include <asm/xen/hypervisor.h>
66#include <asm/xen/hypercall.h>
Jeremy Fitzhardinge1ccbf532009-10-06 15:11:14 -070067
68#include <xen/xen.h>
Jeremy Fitzhardingeecbf29c2008-12-16 12:37:07 -080069#include <xen/interface/xen.h>
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -070070#include <xen/interface/memory.h>
Daniel De Graaf803eb042011-03-14 11:29:37 -040071#include <xen/balloon.h>
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -070072#include <xen/features.h>
73#include <xen/page.h>
Oleksandr Andrushchenkoae4c51a2018-07-20 12:01:44 +030074#include <xen/mem-reservation.h>
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -070075
David Vrabel1cf6a6c2015-06-25 16:29:18 +010076static int xen_hotplug_unpopulated;
77
78#ifdef CONFIG_XEN_BALLOON_MEMORY_HOTPLUG
79
David Vrabel1cf6a6c2015-06-25 16:29:18 +010080static struct ctl_table balloon_table[] = {
81 {
82 .procname = "hotplug_unpopulated",
83 .data = &xen_hotplug_unpopulated,
84 .maxlen = sizeof(int),
85 .mode = 0644,
86 .proc_handler = proc_dointvec_minmax,
Matteo Croceeec48442019-07-18 15:58:50 -070087 .extra1 = SYSCTL_ZERO,
88 .extra2 = SYSCTL_ONE,
David Vrabel1cf6a6c2015-06-25 16:29:18 +010089 },
90 { }
91};
92
93static struct ctl_table balloon_root[] = {
94 {
95 .procname = "balloon",
96 .mode = 0555,
97 .child = balloon_table,
98 },
99 { }
100};
101
102static struct ctl_table xen_root[] = {
103 {
104 .procname = "xen",
105 .mode = 0555,
106 .child = balloon_root,
107 },
108 { }
109};
110
111#endif
112
Daniel Kiper95d2ac42011-03-08 22:48:24 +0100113/*
Julien Grall30756c62015-05-04 15:39:08 +0100114 * Use one extent per PAGE_SIZE to avoid to break down the page into
115 * multiple frame.
116 */
117#define EXTENT_ORDER (fls(XEN_PFN_PER_PAGE) - 1)
118
119/*
Daniel Kiper95d2ac42011-03-08 22:48:24 +0100120 * balloon_process() state:
121 *
122 * BP_DONE: done or nothing to do,
David Vrabelb2ac6aa2015-06-25 12:10:28 +0100123 * BP_WAIT: wait to be rescheduled,
Daniel Kiper95d2ac42011-03-08 22:48:24 +0100124 * BP_EAGAIN: error, go to sleep,
125 * BP_ECANCELED: error, balloon operation canceled.
126 */
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700127
Daniel Kiper95d2ac42011-03-08 22:48:24 +0100128enum bp_state {
129 BP_DONE,
David Vrabelb2ac6aa2015-06-25 12:10:28 +0100130 BP_WAIT,
Daniel Kiper95d2ac42011-03-08 22:48:24 +0100131 BP_EAGAIN,
132 BP_ECANCELED
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700133};
134
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700135
136static DEFINE_MUTEX(balloon_mutex);
137
Daniel De Graaf803eb042011-03-14 11:29:37 -0400138struct balloon_stats balloon_stats;
139EXPORT_SYMBOL_GPL(balloon_stats);
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700140
141/* We increase/decrease in batches which fit in a page */
Julien Grall3990dd22015-10-07 14:04:33 +0100142static xen_pfn_t frame_list[PAGE_SIZE / sizeof(xen_pfn_t)];
Stefano Stabellinicd9151e2013-08-04 15:39:40 +0100143
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700144
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700145/* List of ballooned pages, threaded through the mem_map array. */
146static LIST_HEAD(ballooned_pages);
David Vrabel1cf6a6c2015-06-25 16:29:18 +0100147static DECLARE_WAIT_QUEUE_HEAD(balloon_wq);
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700148
149/* Main work function, always executed in process context. */
150static void balloon_process(struct work_struct *work);
Daniel Kiper95170b22011-03-08 22:47:39 +0100151static DECLARE_DELAYED_WORK(balloon_worker, balloon_process);
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700152
153/* When ballooning out (allocating memory to return to Xen) we don't really
154 want the kernel to try too hard since that can trigger the oom killer. */
155#define GFP_BALLOON \
156 (GFP_HIGHUSER | __GFP_NOWARN | __GFP_NORETRY | __GFP_NOMEMALLOC)
157
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700158/* balloon_append: add the given page to the balloon. */
Jeremy Fitzhardinge9be4d452010-08-31 15:01:16 -0700159static void __balloon_append(struct page *page)
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700160{
161 /* Lowmem is re-populated first, so highmem pages go at list tail. */
162 if (PageHighMem(page)) {
163 list_add_tail(&page->lru, &ballooned_pages);
164 balloon_stats.balloon_high++;
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700165 } else {
166 list_add(&page->lru, &ballooned_pages);
167 balloon_stats.balloon_low++;
168 }
David Vrabel1cf6a6c2015-06-25 16:29:18 +0100169 wake_up(&balloon_wq);
Jeremy Fitzhardinge9be4d452010-08-31 15:01:16 -0700170}
Gianluca Guida3d65c942009-07-30 22:54:36 +0100171
Jeremy Fitzhardinge9be4d452010-08-31 15:01:16 -0700172static void balloon_append(struct page *page)
173{
174 __balloon_append(page);
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700175}
176
177/* balloon_retrieve: rescue a page from the balloon, if it is not empty. */
David Vrabel81b286e2015-06-25 13:12:46 +0100178static struct page *balloon_retrieve(bool require_lowmem)
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700179{
180 struct page *page;
181
182 if (list_empty(&ballooned_pages))
183 return NULL;
184
David Vrabel81b286e2015-06-25 13:12:46 +0100185 page = list_entry(ballooned_pages.next, struct page, lru);
186 if (require_lowmem && PageHighMem(page))
187 return NULL;
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700188 list_del(&page->lru);
189
Jiang Liu3dcc0572013-07-03 15:03:21 -0700190 if (PageHighMem(page))
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700191 balloon_stats.balloon_high--;
Jiang Liu3dcc0572013-07-03 15:03:21 -0700192 else
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700193 balloon_stats.balloon_low--;
194
195 return page;
196}
197
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700198static struct page *balloon_next_page(struct page *page)
199{
200 struct list_head *next = page->lru.next;
201 if (next == &ballooned_pages)
202 return NULL;
203 return list_entry(next, struct page, lru);
204}
205
Daniel Kiper95d2ac42011-03-08 22:48:24 +0100206static enum bp_state update_schedule(enum bp_state state)
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700207{
David Vrabelb2ac6aa2015-06-25 12:10:28 +0100208 if (state == BP_WAIT)
209 return BP_WAIT;
210
Boris Ostrovskyfd8b7952014-10-07 17:00:07 -0400211 if (state == BP_ECANCELED)
212 return BP_ECANCELED;
213
Daniel Kiper95d2ac42011-03-08 22:48:24 +0100214 if (state == BP_DONE) {
215 balloon_stats.schedule_delay = 1;
216 balloon_stats.retry_count = 1;
217 return BP_DONE;
218 }
219
Daniel Kiper95d2ac42011-03-08 22:48:24 +0100220 ++balloon_stats.retry_count;
221
222 if (balloon_stats.max_retry_count != RETRY_UNLIMITED &&
223 balloon_stats.retry_count > balloon_stats.max_retry_count) {
Daniel Kiper95d2ac42011-03-08 22:48:24 +0100224 balloon_stats.schedule_delay = 1;
225 balloon_stats.retry_count = 1;
226 return BP_ECANCELED;
227 }
228
229 balloon_stats.schedule_delay <<= 1;
230
231 if (balloon_stats.schedule_delay > balloon_stats.max_schedule_delay)
232 balloon_stats.schedule_delay = balloon_stats.max_schedule_delay;
233
234 return BP_EAGAIN;
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700235}
236
Daniel Kiper080e2be2011-07-25 17:12:06 -0700237#ifdef CONFIG_XEN_BALLOON_MEMORY_HOTPLUG
Ross Lagerwall842775f2016-05-10 10:27:54 +0100238static void release_memory_resource(struct resource *resource)
239{
240 if (!resource)
241 return;
242
243 /*
244 * No need to reset region to identity mapped since we now
245 * know that no I/O can be in this region
246 */
247 release_resource(resource);
248 kfree(resource);
249}
250
David Vrabel55b3da92015-06-24 15:58:42 +0100251static struct resource *additional_memory_resource(phys_addr_t size)
252{
Igor Druzhinin12366412018-11-27 20:58:21 +0000253 struct resource *res;
254 int ret;
David Vrabel55b3da92015-06-24 15:58:42 +0100255
256 res = kzalloc(sizeof(*res), GFP_KERNEL);
257 if (!res)
258 return NULL;
259
260 res->name = "System RAM";
Toshi Kani782b8662016-01-26 21:57:24 +0100261 res->flags = IORESOURCE_SYSTEM_RAM | IORESOURCE_BUSY;
David Vrabel55b3da92015-06-24 15:58:42 +0100262
Igor Druzhinin12366412018-11-27 20:58:21 +0000263 ret = allocate_resource(&iomem_resource, res,
264 size, 0, -1,
265 PAGES_PER_SECTION * PAGE_SIZE, NULL, NULL);
266 if (ret < 0) {
267 pr_err("Cannot allocate new System RAM resource\n");
268 kfree(res);
269 return NULL;
David Vrabel55b3da92015-06-24 15:58:42 +0100270 }
271
Ross Lagerwalldfd74a12016-03-17 16:52:00 +0000272#ifdef CONFIG_SPARSEMEM
273 {
274 unsigned long limit = 1UL << (MAX_PHYSMEM_BITS - PAGE_SHIFT);
275 unsigned long pfn = res->start >> PAGE_SHIFT;
276
277 if (pfn > limit) {
278 pr_err("New System RAM resource outside addressable RAM (%lu > %lu)\n",
279 pfn, limit);
280 release_memory_resource(res);
281 return NULL;
282 }
283 }
284#endif
285
David Vrabel55b3da92015-06-24 15:58:42 +0100286 return res;
287}
288
David Vrabelb2ac6aa2015-06-25 12:10:28 +0100289static enum bp_state reserve_additional_memory(void)
Daniel Kiper080e2be2011-07-25 17:12:06 -0700290{
David Vrabelb2ac6aa2015-06-25 12:10:28 +0100291 long credit;
David Vrabel55b3da92015-06-24 15:58:42 +0100292 struct resource *resource;
Daniel Kiper080e2be2011-07-25 17:12:06 -0700293 int nid, rc;
David Vrabel55b3da92015-06-24 15:58:42 +0100294 unsigned long balloon_hotplug;
Daniel Kiper080e2be2011-07-25 17:12:06 -0700295
David Vrabel1cf6a6c2015-06-25 16:29:18 +0100296 credit = balloon_stats.target_pages + balloon_stats.target_unpopulated
297 - balloon_stats.total_pages;
David Vrabelb2ac6aa2015-06-25 12:10:28 +0100298
299 /*
300 * Already hotplugged enough pages? Wait for them to be
301 * onlined.
302 */
303 if (credit <= 0)
304 return BP_WAIT;
305
David Vrabel55b3da92015-06-24 15:58:42 +0100306 balloon_hotplug = round_up(credit, PAGES_PER_SECTION);
307
308 resource = additional_memory_resource(balloon_hotplug * PAGE_SIZE);
309 if (!resource)
310 goto err;
311
312 nid = memory_add_physaddr_to_nid(resource->start);
Daniel Kiper080e2be2011-07-25 17:12:06 -0700313
Juergen Gross3c56b3a12015-03-20 13:55:39 +0100314#ifdef CONFIG_XEN_HAVE_PVMMU
Julien Grall30756c62015-05-04 15:39:08 +0100315 /*
316 * We don't support PV MMU when Linux and Xen is using
317 * different page granularity.
318 */
319 BUILD_BUG_ON(XEN_PAGE_SIZE != PAGE_SIZE);
320
Juergen Gross3c56b3a12015-03-20 13:55:39 +0100321 /*
322 * add_memory() will build page tables for the new memory so
323 * the p2m must contain invalid entries so the correct
324 * non-present PTEs will be written.
325 *
326 * If a failure occurs, the original (identity) p2m entries
327 * are not restored since this region is now known not to
328 * conflict with any devices.
329 */
330 if (!xen_feature(XENFEAT_auto_translated_physmap)) {
331 unsigned long pfn, i;
332
David Vrabel55b3da92015-06-24 15:58:42 +0100333 pfn = PFN_DOWN(resource->start);
Juergen Gross3c56b3a12015-03-20 13:55:39 +0100334 for (i = 0; i < balloon_hotplug; i++) {
335 if (!set_phys_to_machine(pfn + i, INVALID_P2M_ENTRY)) {
336 pr_warn("set_phys_to_machine() failed, no memory added\n");
David Vrabel55b3da92015-06-24 15:58:42 +0100337 goto err;
Juergen Gross3c56b3a12015-03-20 13:55:39 +0100338 }
339 }
340 }
341#endif
342
Vitaly Kuznetsov703fc132016-03-15 14:56:52 -0700343 /*
344 * add_memory_resource() will call online_pages() which in its turn
345 * will call xen_online_page() callback causing deadlock if we don't
346 * release balloon_mutex here. Unlocking here is safe because the
347 * callers drop the mutex before trying again.
348 */
349 mutex_unlock(&balloon_mutex);
David Hildenbrand8df1d0e2018-10-30 15:10:24 -0700350 /* add_memory_resource() requires the device_hotplug lock */
351 lock_device_hotplug();
David Hildenbrandf29d8e9c02018-12-28 00:35:36 -0800352 rc = add_memory_resource(nid, resource);
David Hildenbrand8df1d0e2018-10-30 15:10:24 -0700353 unlock_device_hotplug();
Vitaly Kuznetsov703fc132016-03-15 14:56:52 -0700354 mutex_lock(&balloon_mutex);
355
Daniel Kiper080e2be2011-07-25 17:12:06 -0700356 if (rc) {
David Vrabel3dcf6362014-09-01 18:52:44 +0100357 pr_warn("Cannot add additional memory (%i)\n", rc);
David Vrabel55b3da92015-06-24 15:58:42 +0100358 goto err;
Daniel Kiper080e2be2011-07-25 17:12:06 -0700359 }
360
David Vrabelde5a77d2015-06-25 12:08:20 +0100361 balloon_stats.total_pages += balloon_hotplug;
Daniel Kiper080e2be2011-07-25 17:12:06 -0700362
David Vrabelb2ac6aa2015-06-25 12:10:28 +0100363 return BP_WAIT;
David Vrabel55b3da92015-06-24 15:58:42 +0100364 err:
365 release_memory_resource(resource);
366 return BP_ECANCELED;
Daniel Kiper080e2be2011-07-25 17:12:06 -0700367}
368
Arun KSa9cd4102019-03-05 15:42:14 -0800369static void xen_online_page(struct page *page, unsigned int order)
Daniel Kiper080e2be2011-07-25 17:12:06 -0700370{
Arun KSa9cd4102019-03-05 15:42:14 -0800371 unsigned long i, size = (1 << order);
372 unsigned long start_pfn = page_to_pfn(page);
373 struct page *p;
Daniel Kiper080e2be2011-07-25 17:12:06 -0700374
Arun KSa9cd4102019-03-05 15:42:14 -0800375 pr_debug("Online %lu pages starting at pfn 0x%lx\n", size, start_pfn);
Daniel Kiper080e2be2011-07-25 17:12:06 -0700376 mutex_lock(&balloon_mutex);
Arun KSa9cd4102019-03-05 15:42:14 -0800377 for (i = 0; i < size; i++) {
378 p = pfn_to_page(start_pfn + i);
379 __online_page_set_limits(p);
David Hildenbrand77c4adf2019-03-05 15:42:32 -0800380 __SetPageOffline(p);
Arun KSa9cd4102019-03-05 15:42:14 -0800381 __balloon_append(p);
382 }
Daniel Kiper080e2be2011-07-25 17:12:06 -0700383 mutex_unlock(&balloon_mutex);
384}
385
386static int xen_memory_notifier(struct notifier_block *nb, unsigned long val, void *v)
387{
388 if (val == MEM_ONLINE)
389 schedule_delayed_work(&balloon_worker, 0);
390
391 return NOTIFY_OK;
392}
393
394static struct notifier_block xen_memory_nb = {
395 .notifier_call = xen_memory_notifier,
396 .priority = 0
397};
398#else
David Vrabelb2ac6aa2015-06-25 12:10:28 +0100399static enum bp_state reserve_additional_memory(void)
Daniel Kiper080e2be2011-07-25 17:12:06 -0700400{
401 balloon_stats.target_pages = balloon_stats.current_pages;
David Vrabel1cf6a6c2015-06-25 16:29:18 +0100402 return BP_ECANCELED;
Daniel Kiper080e2be2011-07-25 17:12:06 -0700403}
404#endif /* CONFIG_XEN_BALLOON_MEMORY_HOTPLUG */
405
David Vrabelde5a77d2015-06-25 12:08:20 +0100406static long current_credit(void)
407{
408 return balloon_stats.target_pages - balloon_stats.current_pages;
409}
410
411static bool balloon_is_inflated(void)
412{
413 return balloon_stats.balloon_low || balloon_stats.balloon_high;
414}
415
Daniel Kiper95d2ac42011-03-08 22:48:24 +0100416static enum bp_state increase_reservation(unsigned long nr_pages)
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700417{
Daniel Kiper95d2ac42011-03-08 22:48:24 +0100418 int rc;
Julien Grall30756c62015-05-04 15:39:08 +0100419 unsigned long i;
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700420 struct page *page;
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700421
422 if (nr_pages > ARRAY_SIZE(frame_list))
423 nr_pages = ARRAY_SIZE(frame_list);
424
Jie Liu9346c2a2013-11-13 20:59:58 +0800425 page = list_first_entry_or_null(&ballooned_pages, struct page, lru);
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700426 for (i = 0; i < nr_pages; i++) {
Daniel Kiper95d2ac42011-03-08 22:48:24 +0100427 if (!page) {
428 nr_pages = i;
429 break;
430 }
Julien Grall30756c62015-05-04 15:39:08 +0100431
Julien Grall30756c62015-05-04 15:39:08 +0100432 frame_list[i] = page_to_xen_pfn(page);
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700433 page = balloon_next_page(page);
434 }
435
Oleksandr Andrushchenkoae4c51a2018-07-20 12:01:44 +0300436 rc = xenmem_reservation_increase(nr_pages, frame_list);
Konrad Rzeszutek Wilk40095de2011-03-14 11:42:40 -0400437 if (rc <= 0)
Daniel Kiper95d2ac42011-03-08 22:48:24 +0100438 return BP_EAGAIN;
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700439
Ian Campbellbc2c0302009-06-05 11:58:37 +0100440 for (i = 0; i < rc; i++) {
Konrad Rzeszutek Wilkb6f30672011-03-15 10:23:57 -0400441 page = balloon_retrieve(false);
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700442 BUG_ON(page == NULL);
443
Oleksandr Andrushchenkoae4c51a2018-07-20 12:01:44 +0300444 xenmem_reservation_va_mapping_update(1, &page, &frame_list[i]);
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700445
446 /* Relinquish the page back to the allocator. */
David Hildenbrand77c4adf2019-03-05 15:42:32 -0800447 __ClearPageOffline(page);
Ross Lagerwall709613a2016-12-09 17:10:22 +0000448 free_reserved_page(page);
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700449 }
450
Ian Campbellbc2c0302009-06-05 11:58:37 +0100451 balloon_stats.current_pages += rc;
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700452
Daniel Kiper95d2ac42011-03-08 22:48:24 +0100453 return BP_DONE;
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700454}
455
Konrad Rzeszutek Wilkb6f30672011-03-15 10:23:57 -0400456static enum bp_state decrease_reservation(unsigned long nr_pages, gfp_t gfp)
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700457{
Daniel Kiper95d2ac42011-03-08 22:48:24 +0100458 enum bp_state state = BP_DONE;
Julien Grall30756c62015-05-04 15:39:08 +0100459 unsigned long i;
460 struct page *page, *tmp;
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700461 int ret;
Julien Grall30756c62015-05-04 15:39:08 +0100462 LIST_HEAD(pages);
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700463
464 if (nr_pages > ARRAY_SIZE(frame_list))
465 nr_pages = ARRAY_SIZE(frame_list);
466
467 for (i = 0; i < nr_pages; i++) {
Lisa Nguyenfce92682013-05-15 22:59:40 -0700468 page = alloc_page(gfp);
469 if (page == NULL) {
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700470 nr_pages = i;
Daniel Kiper95d2ac42011-03-08 22:48:24 +0100471 state = BP_EAGAIN;
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700472 break;
473 }
David Hildenbrand77c4adf2019-03-05 15:42:32 -0800474 __SetPageOffline(page);
Ross Lagerwall709613a2016-12-09 17:10:22 +0000475 adjust_managed_page_count(page, -1);
Oleksandr Andrushchenkoae4c51a2018-07-20 12:01:44 +0300476 xenmem_reservation_scrub_page(page);
Julien Grall30756c62015-05-04 15:39:08 +0100477 list_add(&page->lru, &pages);
Wei Liu09ed3d52014-03-15 16:11:47 +0000478 }
479
480 /*
481 * Ensure that ballooned highmem pages don't have kmaps.
482 *
483 * Do this before changing the p2m as kmap_flush_unused()
484 * reads PTEs to obtain pages (and hence needs the original
485 * p2m entry).
486 */
487 kmap_flush_unused();
488
Julien Grall30756c62015-05-04 15:39:08 +0100489 /*
490 * Setup the frame, update direct mapping, invalidate P2M,
491 * and add to balloon.
492 */
493 i = 0;
494 list_for_each_entry_safe(page, tmp, &pages, lru) {
Julien Grall30756c62015-05-04 15:39:08 +0100495 frame_list[i++] = xen_page_to_gfn(page);
Wei Liu09ed3d52014-03-15 16:11:47 +0000496
Oleksandr Andrushchenkoae4c51a2018-07-20 12:01:44 +0300497 xenmem_reservation_va_mapping_reset(1, &page);
Julien Grall30756c62015-05-04 15:39:08 +0100498
Julien Grall30756c62015-05-04 15:39:08 +0100499 list_del(&page->lru);
David Vrabel24f69372013-09-19 17:14:53 +0100500
Wei Liu09ed3d52014-03-15 16:11:47 +0000501 balloon_append(page);
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700502 }
503
David Vrabel24f69372013-09-19 17:14:53 +0100504 flush_tlb_all();
David Vrabel2bad07c2013-09-11 17:45:44 +0000505
Oleksandr Andrushchenkoae4c51a2018-07-20 12:01:44 +0300506 ret = xenmem_reservation_decrease(nr_pages, frame_list);
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700507 BUG_ON(ret != nr_pages);
508
509 balloon_stats.current_pages -= nr_pages;
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700510
Daniel Kiper95d2ac42011-03-08 22:48:24 +0100511 return state;
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700512}
513
514/*
Juergen Gross929423f2015-07-20 13:49:39 +0200515 * As this is a work item it is guaranteed to run as a single instance only.
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700516 * We may of course race updates of the target counts (which are protected
517 * by the balloon lock), or with changes to the Xen hard limit, but we will
518 * recover from these in time.
519 */
520static void balloon_process(struct work_struct *work)
521{
Daniel Kiper95d2ac42011-03-08 22:48:24 +0100522 enum bp_state state = BP_DONE;
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700523 long credit;
524
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700525
526 do {
Juergen Gross929423f2015-07-20 13:49:39 +0200527 mutex_lock(&balloon_mutex);
528
Daniel Kiper83be7e52011-03-28 11:34:10 +0200529 credit = current_credit();
Daniel Kiper95d2ac42011-03-08 22:48:24 +0100530
Daniel Kiper080e2be2011-07-25 17:12:06 -0700531 if (credit > 0) {
532 if (balloon_is_inflated())
533 state = increase_reservation(credit);
534 else
David Vrabelb2ac6aa2015-06-25 12:10:28 +0100535 state = reserve_additional_memory();
Daniel Kiper080e2be2011-07-25 17:12:06 -0700536 }
Daniel Kiper95d2ac42011-03-08 22:48:24 +0100537
Juergen Grossa1078e82019-06-19 11:00:56 +0200538 if (credit < 0) {
539 long n_pages;
540
541 n_pages = min(-credit, si_mem_available());
542 state = decrease_reservation(n_pages, GFP_BALLOON);
543 if (state == BP_DONE && n_pages != -credit &&
544 n_pages < totalreserve_pages)
545 state = BP_EAGAIN;
546 }
Daniel Kiper95d2ac42011-03-08 22:48:24 +0100547
548 state = update_schedule(state);
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700549
Juergen Gross929423f2015-07-20 13:49:39 +0200550 mutex_unlock(&balloon_mutex);
551
552 cond_resched();
553
Daniel Kiper95d2ac42011-03-08 22:48:24 +0100554 } while (credit && state == BP_DONE);
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700555
556 /* Schedule more work if there is some still to be done. */
Daniel Kiper95d2ac42011-03-08 22:48:24 +0100557 if (state == BP_EAGAIN)
558 schedule_delayed_work(&balloon_worker, balloon_stats.schedule_delay * HZ);
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700559}
560
561/* Resets the Xen limit, sets new target, and kicks off processing. */
Daniel De Graaf803eb042011-03-14 11:29:37 -0400562void balloon_set_new_target(unsigned long target)
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700563{
564 /* No need for lock. Not read-modify-write updates. */
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700565 balloon_stats.target_pages = target;
Daniel Kiper95170b22011-03-08 22:47:39 +0100566 schedule_delayed_work(&balloon_worker, 0);
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700567}
Daniel De Graaf803eb042011-03-14 11:29:37 -0400568EXPORT_SYMBOL_GPL(balloon_set_new_target);
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700569
David Vrabel1cf6a6c2015-06-25 16:29:18 +0100570static int add_ballooned_pages(int nr_pages)
571{
572 enum bp_state st;
573
574 if (xen_hotplug_unpopulated) {
575 st = reserve_additional_memory();
576 if (st != BP_ECANCELED) {
577 mutex_unlock(&balloon_mutex);
578 wait_event(balloon_wq,
579 !list_empty(&ballooned_pages));
580 mutex_lock(&balloon_mutex);
581 return 0;
582 }
583 }
584
Juergen Grossa1078e82019-06-19 11:00:56 +0200585 if (si_mem_available() < nr_pages)
586 return -ENOMEM;
587
David Vrabel1cf6a6c2015-06-25 16:29:18 +0100588 st = decrease_reservation(nr_pages, GFP_USER);
589 if (st != BP_DONE)
590 return -ENOMEM;
591
592 return 0;
593}
594
Konrad Rzeszutek Wilkb6f30672011-03-15 10:23:57 -0400595/**
596 * alloc_xenballooned_pages - get pages that have been ballooned out
597 * @nr_pages: Number of pages to get
598 * @pages: pages returned
599 * @return 0 on success, error otherwise
600 */
David Vrabel81b286e2015-06-25 13:12:46 +0100601int alloc_xenballooned_pages(int nr_pages, struct page **pages)
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700602{
Konrad Rzeszutek Wilkb6f30672011-03-15 10:23:57 -0400603 int pgno = 0;
Ruslan Pisareve882dc92011-07-26 14:15:59 +0300604 struct page *page;
David Vrabel1cf6a6c2015-06-25 16:29:18 +0100605 int ret;
606
Konrad Rzeszutek Wilkb6f30672011-03-15 10:23:57 -0400607 mutex_lock(&balloon_mutex);
David Vrabel1cf6a6c2015-06-25 16:29:18 +0100608
609 balloon_stats.target_unpopulated += nr_pages;
610
Konrad Rzeszutek Wilkb6f30672011-03-15 10:23:57 -0400611 while (pgno < nr_pages) {
David Vrabel81b286e2015-06-25 13:12:46 +0100612 page = balloon_retrieve(true);
613 if (page) {
David Hildenbrand0266def2019-03-14 17:02:56 +0100614 __ClearPageOffline(page);
Konrad Rzeszutek Wilkb6f30672011-03-15 10:23:57 -0400615 pages[pgno++] = page;
David Vrabel4a69c902015-07-22 14:50:37 +0100616#ifdef CONFIG_XEN_HAVE_PVMMU
Julien Grall30756c62015-05-04 15:39:08 +0100617 /*
618 * We don't support PV MMU when Linux and Xen is using
619 * different page granularity.
620 */
621 BUILD_BUG_ON(XEN_PAGE_SIZE != PAGE_SIZE);
622
Boris Ostrovskyb194da22017-08-23 18:27:04 -0400623 if (!xen_feature(XENFEAT_auto_translated_physmap)) {
624 ret = xen_alloc_p2m_entry(page_to_pfn(page));
625 if (ret < 0)
626 goto out_undo;
627 }
David Vrabel4a69c902015-07-22 14:50:37 +0100628#endif
Konrad Rzeszutek Wilkb6f30672011-03-15 10:23:57 -0400629 } else {
David Vrabel1cf6a6c2015-06-25 16:29:18 +0100630 ret = add_ballooned_pages(nr_pages - pgno);
631 if (ret < 0)
Konrad Rzeszutek Wilkb6f30672011-03-15 10:23:57 -0400632 goto out_undo;
633 }
634 }
635 mutex_unlock(&balloon_mutex);
636 return 0;
637 out_undo:
Konrad Rzeszutek Wilkb6f30672011-03-15 10:23:57 -0400638 mutex_unlock(&balloon_mutex);
David Vrabel1cf6a6c2015-06-25 16:29:18 +0100639 free_xenballooned_pages(pgno, pages);
640 return ret;
Konrad Rzeszutek Wilkb6f30672011-03-15 10:23:57 -0400641}
642EXPORT_SYMBOL(alloc_xenballooned_pages);
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700643
Konrad Rzeszutek Wilkb6f30672011-03-15 10:23:57 -0400644/**
645 * free_xenballooned_pages - return pages retrieved with get_ballooned_pages
646 * @nr_pages: Number of pages
647 * @pages: pages to return
648 */
Ruslan Pisareve882dc92011-07-26 14:15:59 +0300649void free_xenballooned_pages(int nr_pages, struct page **pages)
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700650{
Konrad Rzeszutek Wilkb6f30672011-03-15 10:23:57 -0400651 int i;
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700652
Konrad Rzeszutek Wilkb6f30672011-03-15 10:23:57 -0400653 mutex_lock(&balloon_mutex);
654
655 for (i = 0; i < nr_pages; i++) {
David Hildenbrand0266def2019-03-14 17:02:56 +0100656 if (pages[i]) {
657 __SetPageOffline(pages[i]);
Konrad Rzeszutek Wilkb6f30672011-03-15 10:23:57 -0400658 balloon_append(pages[i]);
David Hildenbrand0266def2019-03-14 17:02:56 +0100659 }
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700660 }
661
David Vrabel1cf6a6c2015-06-25 16:29:18 +0100662 balloon_stats.target_unpopulated -= nr_pages;
663
Konrad Rzeszutek Wilkb6f30672011-03-15 10:23:57 -0400664 /* The balloon may be too large now. Shrink it if needed. */
Daniel Kiper83be7e52011-03-28 11:34:10 +0200665 if (current_credit())
Konrad Rzeszutek Wilkb6f30672011-03-15 10:23:57 -0400666 schedule_delayed_work(&balloon_worker, 0);
667
668 mutex_unlock(&balloon_mutex);
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700669}
Konrad Rzeszutek Wilkb6f30672011-03-15 10:23:57 -0400670EXPORT_SYMBOL(free_xenballooned_pages);
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700671
Vitaly Kuznetsov4fee9ad2017-03-14 18:35:53 +0100672#ifdef CONFIG_XEN_PV
David Vrabel8b5d44a2011-09-28 17:46:34 +0100673static void __init balloon_add_region(unsigned long start_pfn,
674 unsigned long pages)
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700675{
Daniel Kiper4dfe22f2011-03-28 11:33:18 +0200676 unsigned long pfn, extra_pfn_end;
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700677 struct page *page;
678
David Vrabel8b5d44a2011-09-28 17:46:34 +0100679 /*
680 * If the amount of usable memory has been limited (e.g., with
681 * the 'mem' command line parameter), don't add pages beyond
682 * this limit.
683 */
684 extra_pfn_end = min(max_pfn, start_pfn + pages);
685
686 for (pfn = start_pfn; pfn < extra_pfn_end; pfn++) {
687 page = pfn_to_page(pfn);
688 /* totalram_pages and totalhigh_pages do not
689 include the boot-time balloon extension, so
690 don't subtract from it. */
691 __balloon_append(page);
692 }
David Vrabelde5a77d2015-06-25 12:08:20 +0100693
694 balloon_stats.total_pages += extra_pfn_end - start_pfn;
David Vrabel8b5d44a2011-09-28 17:46:34 +0100695}
Vitaly Kuznetsov4fee9ad2017-03-14 18:35:53 +0100696#endif
David Vrabel8b5d44a2011-09-28 17:46:34 +0100697
698static int __init balloon_init(void)
699{
Stefano Stabellini53d55222010-12-02 17:55:05 +0000700 if (!xen_domain())
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700701 return -ENODEV;
702
Joe Perches283c0972013-06-28 03:21:41 -0700703 pr_info("Initialising balloon driver\n");
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700704
Vitaly Kuznetsov4fee9ad2017-03-14 18:35:53 +0100705#ifdef CONFIG_XEN_PV
David Vrabelaa244112011-09-28 17:46:32 +0100706 balloon_stats.current_pages = xen_pv_domain()
707 ? min(xen_start_info->nr_pages - xen_released_pages, max_pfn)
Boris Ostrovskyc275a572013-11-06 15:37:40 -0500708 : get_num_physpages();
Vitaly Kuznetsov4fee9ad2017-03-14 18:35:53 +0100709#else
710 balloon_stats.current_pages = get_num_physpages();
711#endif
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700712 balloon_stats.target_pages = balloon_stats.current_pages;
713 balloon_stats.balloon_low = 0;
714 balloon_stats.balloon_high = 0;
David Vrabelde5a77d2015-06-25 12:08:20 +0100715 balloon_stats.total_pages = balloon_stats.current_pages;
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700716
Daniel Kiper95d2ac42011-03-08 22:48:24 +0100717 balloon_stats.schedule_delay = 1;
718 balloon_stats.max_schedule_delay = 32;
719 balloon_stats.retry_count = 1;
Juergen Grossa1078e82019-06-19 11:00:56 +0200720 balloon_stats.max_retry_count = 4;
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700721
Daniel Kiper080e2be2011-07-25 17:12:06 -0700722#ifdef CONFIG_XEN_BALLOON_MEMORY_HOTPLUG
Daniel Kiper080e2be2011-07-25 17:12:06 -0700723 set_online_page_callback(&xen_online_page);
724 register_memory_notifier(&xen_memory_nb);
David Vrabel1cf6a6c2015-06-25 16:29:18 +0100725 register_sysctl_table(xen_root);
Daniel Kiper080e2be2011-07-25 17:12:06 -0700726#endif
727
Vitaly Kuznetsov4fee9ad2017-03-14 18:35:53 +0100728#ifdef CONFIG_XEN_PV
729 {
730 int i;
731
732 /*
733 * Initialize the balloon with pages from the extra memory
734 * regions (see arch/x86/xen/setup.c).
735 */
736 for (i = 0; i < XEN_EXTRA_MEM_MAX_REGIONS; i++)
737 if (xen_extra_mem[i].n_pfns)
738 balloon_add_region(xen_extra_mem[i].start_pfn,
739 xen_extra_mem[i].n_pfns);
740 }
741#endif
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700742
Juergen Gross96edd612017-07-10 10:10:45 +0200743 /* Init the xen-balloon driver. */
744 xen_balloon_init();
745
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700746 return 0;
747}
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700748subsys_initcall(balloon_init);