blob: a2c4fc49c4833c8f87d21d35270a7fb489252393 [file] [log] [blame]
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -07001/******************************************************************************
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -07002 * Xen balloon driver - enables returning/claiming memory to/from Xen.
3 *
4 * Copyright (c) 2003, B Dragovic
5 * Copyright (c) 2003-2004, M Williamson, K Fraser
6 * Copyright (c) 2005 Dan M. Smith, IBM Corporation
Daniel Kiper080e2be2011-07-25 17:12:06 -07007 * Copyright (c) 2010 Daniel Kiper
8 *
9 * Memory hotplug support was written by Daniel Kiper. Work on
10 * it was sponsored by Google under Google Summer of Code 2010
11 * program. Jeremy Fitzhardinge from Citrix was the mentor for
12 * this project.
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -070013 *
14 * This program is free software; you can redistribute it and/or
15 * modify it under the terms of the GNU General Public License version 2
16 * as published by the Free Software Foundation; or, when distributed
17 * separately from the Linux kernel or incorporated into other
18 * software packages, subject to the following license:
19 *
20 * Permission is hereby granted, free of charge, to any person obtaining a copy
21 * of this source file (the "Software"), to deal in the Software without
22 * restriction, including without limitation the rights to use, copy, modify,
23 * merge, publish, distribute, sublicense, and/or sell copies of the Software,
24 * and to permit persons to whom the Software is furnished to do so, subject to
25 * the following conditions:
26 *
27 * The above copyright notice and this permission notice shall be included in
28 * all copies or substantial portions of the Software.
29 *
30 * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
31 * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
32 * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
33 * AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
34 * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING
35 * FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS
36 * IN THE SOFTWARE.
37 */
38
Joe Perches283c0972013-06-28 03:21:41 -070039#define pr_fmt(fmt) "xen:" KBUILD_MODNAME ": " fmt
40
Stefano Stabellinicd9151e2013-08-04 15:39:40 +010041#include <linux/cpu.h>
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -070042#include <linux/kernel.h>
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -070043#include <linux/sched.h>
Ingo Molnar5b825c32017-02-02 17:54:15 +010044#include <linux/cred.h>
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -070045#include <linux/errno.h>
Juergen Gross8480ed92021-08-27 14:32:06 +020046#include <linux/freezer.h>
47#include <linux/kthread.h>
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -070048#include <linux/mm.h>
Mike Rapoport57c8a662018-10-30 15:09:49 -070049#include <linux/memblock.h>
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -070050#include <linux/pagemap.h>
51#include <linux/highmem.h>
52#include <linux/mutex.h>
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -070053#include <linux/list.h>
Tejun Heo5a0e3ad2010-03-24 17:04:11 +090054#include <linux/gfp.h>
Daniel Kiper080e2be2011-07-25 17:12:06 -070055#include <linux/notifier.h>
56#include <linux/memory.h>
57#include <linux/memory_hotplug.h>
Stefano Stabellinicd9151e2013-08-04 15:39:40 +010058#include <linux/percpu-defs.h>
David Vrabel55b3da92015-06-24 15:58:42 +010059#include <linux/slab.h>
David Vrabel1cf6a6c2015-06-25 16:29:18 +010060#include <linux/sysctl.h>
Juergen Gross40fdea02021-11-02 10:19:44 +010061#include <linux/moduleparam.h>
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -070062
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -070063#include <asm/page.h>
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -070064#include <asm/tlb.h>
65
Jeremy Fitzhardingeecbf29c2008-12-16 12:37:07 -080066#include <asm/xen/hypervisor.h>
67#include <asm/xen/hypercall.h>
Jeremy Fitzhardinge1ccbf532009-10-06 15:11:14 -070068
69#include <xen/xen.h>
Jeremy Fitzhardingeecbf29c2008-12-16 12:37:07 -080070#include <xen/interface/xen.h>
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -070071#include <xen/interface/memory.h>
Daniel De Graaf803eb042011-03-14 11:29:37 -040072#include <xen/balloon.h>
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -070073#include <xen/features.h>
74#include <xen/page.h>
Oleksandr Andrushchenkoae4c51a2018-07-20 12:01:44 +030075#include <xen/mem-reservation.h>
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -070076
Juergen Gross40fdea02021-11-02 10:19:44 +010077#undef MODULE_PARAM_PREFIX
78#define MODULE_PARAM_PREFIX "xen."
79
80static uint __read_mostly balloon_boot_timeout = 180;
81module_param(balloon_boot_timeout, uint, 0444);
82
David Vrabel1cf6a6c2015-06-25 16:29:18 +010083#ifdef CONFIG_XEN_BALLOON_MEMORY_HOTPLUG
Arnd Bergmann501586e2021-11-08 12:14:02 +010084static int xen_hotplug_unpopulated;
David Vrabel1cf6a6c2015-06-25 16:29:18 +010085
David Vrabel1cf6a6c2015-06-25 16:29:18 +010086static struct ctl_table balloon_table[] = {
87 {
88 .procname = "hotplug_unpopulated",
89 .data = &xen_hotplug_unpopulated,
90 .maxlen = sizeof(int),
91 .mode = 0644,
92 .proc_handler = proc_dointvec_minmax,
Matteo Croceeec48442019-07-18 15:58:50 -070093 .extra1 = SYSCTL_ZERO,
94 .extra2 = SYSCTL_ONE,
David Vrabel1cf6a6c2015-06-25 16:29:18 +010095 },
96 { }
97};
98
99static struct ctl_table balloon_root[] = {
100 {
101 .procname = "balloon",
102 .mode = 0555,
103 .child = balloon_table,
104 },
105 { }
106};
107
108static struct ctl_table xen_root[] = {
109 {
110 .procname = "xen",
111 .mode = 0555,
112 .child = balloon_root,
113 },
114 { }
115};
116
Arnd Bergmann501586e2021-11-08 12:14:02 +0100117#else
118#define xen_hotplug_unpopulated 0
David Vrabel1cf6a6c2015-06-25 16:29:18 +0100119#endif
120
Daniel Kiper95d2ac42011-03-08 22:48:24 +0100121/*
Julien Grall30756c62015-05-04 15:39:08 +0100122 * Use one extent per PAGE_SIZE to avoid to break down the page into
123 * multiple frame.
124 */
125#define EXTENT_ORDER (fls(XEN_PFN_PER_PAGE) - 1)
126
127/*
Juergen Gross8480ed92021-08-27 14:32:06 +0200128 * balloon_thread() state:
Daniel Kiper95d2ac42011-03-08 22:48:24 +0100129 *
130 * BP_DONE: done or nothing to do,
David Vrabelb2ac6aa2015-06-25 12:10:28 +0100131 * BP_WAIT: wait to be rescheduled,
Daniel Kiper95d2ac42011-03-08 22:48:24 +0100132 * BP_EAGAIN: error, go to sleep,
133 * BP_ECANCELED: error, balloon operation canceled.
134 */
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700135
Juergen Gross40fdea02021-11-02 10:19:44 +0100136static enum bp_state {
Daniel Kiper95d2ac42011-03-08 22:48:24 +0100137 BP_DONE,
David Vrabelb2ac6aa2015-06-25 12:10:28 +0100138 BP_WAIT,
Daniel Kiper95d2ac42011-03-08 22:48:24 +0100139 BP_EAGAIN,
140 BP_ECANCELED
Juergen Gross40fdea02021-11-02 10:19:44 +0100141} balloon_state = BP_DONE;
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700142
Juergen Gross8480ed92021-08-27 14:32:06 +0200143/* Main waiting point for xen-balloon thread. */
144static DECLARE_WAIT_QUEUE_HEAD(balloon_thread_wq);
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700145
146static DEFINE_MUTEX(balloon_mutex);
147
Daniel De Graaf803eb042011-03-14 11:29:37 -0400148struct balloon_stats balloon_stats;
149EXPORT_SYMBOL_GPL(balloon_stats);
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700150
151/* We increase/decrease in batches which fit in a page */
Julien Grall3990dd22015-10-07 14:04:33 +0100152static xen_pfn_t frame_list[PAGE_SIZE / sizeof(xen_pfn_t)];
Stefano Stabellinicd9151e2013-08-04 15:39:40 +0100153
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700154
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700155/* List of ballooned pages, threaded through the mem_map array. */
156static LIST_HEAD(ballooned_pages);
David Vrabel1cf6a6c2015-06-25 16:29:18 +0100157static DECLARE_WAIT_QUEUE_HEAD(balloon_wq);
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700158
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700159/* When ballooning out (allocating memory to return to Xen) we don't really
160 want the kernel to try too hard since that can trigger the oom killer. */
161#define GFP_BALLOON \
162 (GFP_HIGHUSER | __GFP_NOWARN | __GFP_NORETRY | __GFP_NOMEMALLOC)
163
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700164/* balloon_append: add the given page to the balloon. */
David Hildenbranddde32852019-10-01 11:01:50 +0200165static void balloon_append(struct page *page)
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700166{
David Hildenbrand59b52f12019-10-01 11:01:51 +0200167 __SetPageOffline(page);
168
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700169 /* Lowmem is re-populated first, so highmem pages go at list tail. */
170 if (PageHighMem(page)) {
171 list_add_tail(&page->lru, &ballooned_pages);
172 balloon_stats.balloon_high++;
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700173 } else {
174 list_add(&page->lru, &ballooned_pages);
175 balloon_stats.balloon_low++;
176 }
David Vrabel1cf6a6c2015-06-25 16:29:18 +0100177 wake_up(&balloon_wq);
Jeremy Fitzhardinge9be4d452010-08-31 15:01:16 -0700178}
Gianluca Guida3d65c942009-07-30 22:54:36 +0100179
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700180/* balloon_retrieve: rescue a page from the balloon, if it is not empty. */
David Vrabel81b286e2015-06-25 13:12:46 +0100181static struct page *balloon_retrieve(bool require_lowmem)
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700182{
183 struct page *page;
184
185 if (list_empty(&ballooned_pages))
186 return NULL;
187
David Vrabel81b286e2015-06-25 13:12:46 +0100188 page = list_entry(ballooned_pages.next, struct page, lru);
189 if (require_lowmem && PageHighMem(page))
190 return NULL;
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700191 list_del(&page->lru);
192
Jiang Liu3dcc0572013-07-03 15:03:21 -0700193 if (PageHighMem(page))
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700194 balloon_stats.balloon_high--;
Jiang Liu3dcc0572013-07-03 15:03:21 -0700195 else
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700196 balloon_stats.balloon_low--;
197
David Hildenbrand04ccbdc2019-10-01 11:01:52 +0200198 __ClearPageOffline(page);
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700199 return page;
200}
201
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700202static struct page *balloon_next_page(struct page *page)
203{
204 struct list_head *next = page->lru.next;
205 if (next == &ballooned_pages)
206 return NULL;
207 return list_entry(next, struct page, lru);
208}
209
Juergen Gross40fdea02021-11-02 10:19:44 +0100210static void update_schedule(void)
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700211{
Juergen Gross40fdea02021-11-02 10:19:44 +0100212 if (balloon_state == BP_WAIT || balloon_state == BP_ECANCELED)
213 return;
David Vrabelb2ac6aa2015-06-25 12:10:28 +0100214
Juergen Gross40fdea02021-11-02 10:19:44 +0100215 if (balloon_state == BP_DONE) {
Daniel Kiper95d2ac42011-03-08 22:48:24 +0100216 balloon_stats.schedule_delay = 1;
217 balloon_stats.retry_count = 1;
Juergen Gross40fdea02021-11-02 10:19:44 +0100218 return;
Daniel Kiper95d2ac42011-03-08 22:48:24 +0100219 }
220
Daniel Kiper95d2ac42011-03-08 22:48:24 +0100221 ++balloon_stats.retry_count;
222
223 if (balloon_stats.max_retry_count != RETRY_UNLIMITED &&
224 balloon_stats.retry_count > balloon_stats.max_retry_count) {
Daniel Kiper95d2ac42011-03-08 22:48:24 +0100225 balloon_stats.schedule_delay = 1;
226 balloon_stats.retry_count = 1;
Juergen Gross40fdea02021-11-02 10:19:44 +0100227 balloon_state = BP_ECANCELED;
228 return;
Daniel Kiper95d2ac42011-03-08 22:48:24 +0100229 }
230
231 balloon_stats.schedule_delay <<= 1;
232
233 if (balloon_stats.schedule_delay > balloon_stats.max_schedule_delay)
234 balloon_stats.schedule_delay = balloon_stats.max_schedule_delay;
235
Juergen Gross40fdea02021-11-02 10:19:44 +0100236 balloon_state = BP_EAGAIN;
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700237}
238
Daniel Kiper080e2be2011-07-25 17:12:06 -0700239#ifdef CONFIG_XEN_BALLOON_MEMORY_HOTPLUG
Ross Lagerwall842775f2016-05-10 10:27:54 +0100240static void release_memory_resource(struct resource *resource)
241{
242 if (!resource)
243 return;
244
245 /*
246 * No need to reset region to identity mapped since we now
247 * know that no I/O can be in this region
248 */
249 release_resource(resource);
250 kfree(resource);
251}
252
David Vrabel55b3da92015-06-24 15:58:42 +0100253static struct resource *additional_memory_resource(phys_addr_t size)
254{
Igor Druzhinin12366412018-11-27 20:58:21 +0000255 struct resource *res;
256 int ret;
David Vrabel55b3da92015-06-24 15:58:42 +0100257
258 res = kzalloc(sizeof(*res), GFP_KERNEL);
259 if (!res)
260 return NULL;
261
262 res->name = "System RAM";
Toshi Kani782b8662016-01-26 21:57:24 +0100263 res->flags = IORESOURCE_SYSTEM_RAM | IORESOURCE_BUSY;
David Vrabel55b3da92015-06-24 15:58:42 +0100264
Igor Druzhinin12366412018-11-27 20:58:21 +0000265 ret = allocate_resource(&iomem_resource, res,
266 size, 0, -1,
267 PAGES_PER_SECTION * PAGE_SIZE, NULL, NULL);
268 if (ret < 0) {
269 pr_err("Cannot allocate new System RAM resource\n");
270 kfree(res);
271 return NULL;
David Vrabel55b3da92015-06-24 15:58:42 +0100272 }
273
274 return res;
275}
276
David Vrabelb2ac6aa2015-06-25 12:10:28 +0100277static enum bp_state reserve_additional_memory(void)
Daniel Kiper080e2be2011-07-25 17:12:06 -0700278{
David Vrabelb2ac6aa2015-06-25 12:10:28 +0100279 long credit;
David Vrabel55b3da92015-06-24 15:58:42 +0100280 struct resource *resource;
Daniel Kiper080e2be2011-07-25 17:12:06 -0700281 int nid, rc;
David Vrabel55b3da92015-06-24 15:58:42 +0100282 unsigned long balloon_hotplug;
Daniel Kiper080e2be2011-07-25 17:12:06 -0700283
David Vrabel1cf6a6c2015-06-25 16:29:18 +0100284 credit = balloon_stats.target_pages + balloon_stats.target_unpopulated
285 - balloon_stats.total_pages;
David Vrabelb2ac6aa2015-06-25 12:10:28 +0100286
287 /*
288 * Already hotplugged enough pages? Wait for them to be
289 * onlined.
290 */
291 if (credit <= 0)
292 return BP_WAIT;
293
David Vrabel55b3da92015-06-24 15:58:42 +0100294 balloon_hotplug = round_up(credit, PAGES_PER_SECTION);
295
296 resource = additional_memory_resource(balloon_hotplug * PAGE_SIZE);
297 if (!resource)
298 goto err;
299
300 nid = memory_add_physaddr_to_nid(resource->start);
Daniel Kiper080e2be2011-07-25 17:12:06 -0700301
Juergen Gross3c56b3a12015-03-20 13:55:39 +0100302#ifdef CONFIG_XEN_HAVE_PVMMU
Julien Grall30756c62015-05-04 15:39:08 +0100303 /*
304 * We don't support PV MMU when Linux and Xen is using
305 * different page granularity.
306 */
307 BUILD_BUG_ON(XEN_PAGE_SIZE != PAGE_SIZE);
308
Juergen Gross3c56b3a12015-03-20 13:55:39 +0100309 /*
310 * add_memory() will build page tables for the new memory so
311 * the p2m must contain invalid entries so the correct
312 * non-present PTEs will be written.
313 *
314 * If a failure occurs, the original (identity) p2m entries
315 * are not restored since this region is now known not to
316 * conflict with any devices.
317 */
318 if (!xen_feature(XENFEAT_auto_translated_physmap)) {
319 unsigned long pfn, i;
320
David Vrabel55b3da92015-06-24 15:58:42 +0100321 pfn = PFN_DOWN(resource->start);
Juergen Gross3c56b3a12015-03-20 13:55:39 +0100322 for (i = 0; i < balloon_hotplug; i++) {
323 if (!set_phys_to_machine(pfn + i, INVALID_P2M_ENTRY)) {
324 pr_warn("set_phys_to_machine() failed, no memory added\n");
David Vrabel55b3da92015-06-24 15:58:42 +0100325 goto err;
Juergen Gross3c56b3a12015-03-20 13:55:39 +0100326 }
327 }
328 }
329#endif
330
Vitaly Kuznetsov703fc132016-03-15 14:56:52 -0700331 /*
332 * add_memory_resource() will call online_pages() which in its turn
333 * will call xen_online_page() callback causing deadlock if we don't
334 * release balloon_mutex here. Unlocking here is safe because the
335 * callers drop the mutex before trying again.
336 */
337 mutex_unlock(&balloon_mutex);
David Hildenbrand8df1d0e2018-10-30 15:10:24 -0700338 /* add_memory_resource() requires the device_hotplug lock */
339 lock_device_hotplug();
David Hildenbrand26011262021-02-25 17:17:17 -0800340 rc = add_memory_resource(nid, resource, MHP_MERGE_RESOURCE);
David Hildenbrand8df1d0e2018-10-30 15:10:24 -0700341 unlock_device_hotplug();
Vitaly Kuznetsov703fc132016-03-15 14:56:52 -0700342 mutex_lock(&balloon_mutex);
343
Daniel Kiper080e2be2011-07-25 17:12:06 -0700344 if (rc) {
David Vrabel3dcf6362014-09-01 18:52:44 +0100345 pr_warn("Cannot add additional memory (%i)\n", rc);
David Vrabel55b3da92015-06-24 15:58:42 +0100346 goto err;
Daniel Kiper080e2be2011-07-25 17:12:06 -0700347 }
348
David Vrabelde5a77d2015-06-25 12:08:20 +0100349 balloon_stats.total_pages += balloon_hotplug;
Daniel Kiper080e2be2011-07-25 17:12:06 -0700350
David Vrabelb2ac6aa2015-06-25 12:10:28 +0100351 return BP_WAIT;
David Vrabel55b3da92015-06-24 15:58:42 +0100352 err:
353 release_memory_resource(resource);
354 return BP_ECANCELED;
Daniel Kiper080e2be2011-07-25 17:12:06 -0700355}
356
Arun KSa9cd4102019-03-05 15:42:14 -0800357static void xen_online_page(struct page *page, unsigned int order)
Daniel Kiper080e2be2011-07-25 17:12:06 -0700358{
Arun KSa9cd4102019-03-05 15:42:14 -0800359 unsigned long i, size = (1 << order);
360 unsigned long start_pfn = page_to_pfn(page);
361 struct page *p;
Daniel Kiper080e2be2011-07-25 17:12:06 -0700362
Arun KSa9cd4102019-03-05 15:42:14 -0800363 pr_debug("Online %lu pages starting at pfn 0x%lx\n", size, start_pfn);
Daniel Kiper080e2be2011-07-25 17:12:06 -0700364 mutex_lock(&balloon_mutex);
Arun KSa9cd4102019-03-05 15:42:14 -0800365 for (i = 0; i < size; i++) {
366 p = pfn_to_page(start_pfn + i);
David Hildenbranddde32852019-10-01 11:01:50 +0200367 balloon_append(p);
Arun KSa9cd4102019-03-05 15:42:14 -0800368 }
Daniel Kiper080e2be2011-07-25 17:12:06 -0700369 mutex_unlock(&balloon_mutex);
370}
371
372static int xen_memory_notifier(struct notifier_block *nb, unsigned long val, void *v)
373{
374 if (val == MEM_ONLINE)
Juergen Gross8480ed92021-08-27 14:32:06 +0200375 wake_up(&balloon_thread_wq);
Daniel Kiper080e2be2011-07-25 17:12:06 -0700376
377 return NOTIFY_OK;
378}
379
380static struct notifier_block xen_memory_nb = {
381 .notifier_call = xen_memory_notifier,
382 .priority = 0
383};
384#else
David Vrabelb2ac6aa2015-06-25 12:10:28 +0100385static enum bp_state reserve_additional_memory(void)
Daniel Kiper080e2be2011-07-25 17:12:06 -0700386{
Juergen Grossc673ec62019-12-12 15:17:50 +0100387 balloon_stats.target_pages = balloon_stats.current_pages +
388 balloon_stats.target_unpopulated;
David Vrabel1cf6a6c2015-06-25 16:29:18 +0100389 return BP_ECANCELED;
Daniel Kiper080e2be2011-07-25 17:12:06 -0700390}
391#endif /* CONFIG_XEN_BALLOON_MEMORY_HOTPLUG */
392
David Vrabelde5a77d2015-06-25 12:08:20 +0100393static long current_credit(void)
394{
395 return balloon_stats.target_pages - balloon_stats.current_pages;
396}
397
398static bool balloon_is_inflated(void)
399{
400 return balloon_stats.balloon_low || balloon_stats.balloon_high;
401}
402
Daniel Kiper95d2ac42011-03-08 22:48:24 +0100403static enum bp_state increase_reservation(unsigned long nr_pages)
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700404{
Daniel Kiper95d2ac42011-03-08 22:48:24 +0100405 int rc;
Julien Grall30756c62015-05-04 15:39:08 +0100406 unsigned long i;
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700407 struct page *page;
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700408
409 if (nr_pages > ARRAY_SIZE(frame_list))
410 nr_pages = ARRAY_SIZE(frame_list);
411
Jie Liu9346c2a2013-11-13 20:59:58 +0800412 page = list_first_entry_or_null(&ballooned_pages, struct page, lru);
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700413 for (i = 0; i < nr_pages; i++) {
Daniel Kiper95d2ac42011-03-08 22:48:24 +0100414 if (!page) {
415 nr_pages = i;
416 break;
417 }
Julien Grall30756c62015-05-04 15:39:08 +0100418
Julien Grall30756c62015-05-04 15:39:08 +0100419 frame_list[i] = page_to_xen_pfn(page);
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700420 page = balloon_next_page(page);
421 }
422
Oleksandr Andrushchenkoae4c51a2018-07-20 12:01:44 +0300423 rc = xenmem_reservation_increase(nr_pages, frame_list);
Konrad Rzeszutek Wilk40095de2011-03-14 11:42:40 -0400424 if (rc <= 0)
Daniel Kiper95d2ac42011-03-08 22:48:24 +0100425 return BP_EAGAIN;
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700426
Ian Campbellbc2c0302009-06-05 11:58:37 +0100427 for (i = 0; i < rc; i++) {
Konrad Rzeszutek Wilkb6f30672011-03-15 10:23:57 -0400428 page = balloon_retrieve(false);
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700429 BUG_ON(page == NULL);
430
Oleksandr Andrushchenkoae4c51a2018-07-20 12:01:44 +0300431 xenmem_reservation_va_mapping_update(1, &page, &frame_list[i]);
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700432
433 /* Relinquish the page back to the allocator. */
Ross Lagerwall709613a2016-12-09 17:10:22 +0000434 free_reserved_page(page);
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700435 }
436
Ian Campbellbc2c0302009-06-05 11:58:37 +0100437 balloon_stats.current_pages += rc;
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700438
Daniel Kiper95d2ac42011-03-08 22:48:24 +0100439 return BP_DONE;
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700440}
441
Konrad Rzeszutek Wilkb6f30672011-03-15 10:23:57 -0400442static enum bp_state decrease_reservation(unsigned long nr_pages, gfp_t gfp)
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700443{
Daniel Kiper95d2ac42011-03-08 22:48:24 +0100444 enum bp_state state = BP_DONE;
Julien Grall30756c62015-05-04 15:39:08 +0100445 unsigned long i;
446 struct page *page, *tmp;
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700447 int ret;
Julien Grall30756c62015-05-04 15:39:08 +0100448 LIST_HEAD(pages);
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700449
450 if (nr_pages > ARRAY_SIZE(frame_list))
451 nr_pages = ARRAY_SIZE(frame_list);
452
453 for (i = 0; i < nr_pages; i++) {
Lisa Nguyenfce92682013-05-15 22:59:40 -0700454 page = alloc_page(gfp);
455 if (page == NULL) {
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700456 nr_pages = i;
Daniel Kiper95d2ac42011-03-08 22:48:24 +0100457 state = BP_EAGAIN;
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700458 break;
459 }
Ross Lagerwall709613a2016-12-09 17:10:22 +0000460 adjust_managed_page_count(page, -1);
Oleksandr Andrushchenkoae4c51a2018-07-20 12:01:44 +0300461 xenmem_reservation_scrub_page(page);
Julien Grall30756c62015-05-04 15:39:08 +0100462 list_add(&page->lru, &pages);
Wei Liu09ed3d52014-03-15 16:11:47 +0000463 }
464
465 /*
466 * Ensure that ballooned highmem pages don't have kmaps.
467 *
468 * Do this before changing the p2m as kmap_flush_unused()
469 * reads PTEs to obtain pages (and hence needs the original
470 * p2m entry).
471 */
472 kmap_flush_unused();
473
Julien Grall30756c62015-05-04 15:39:08 +0100474 /*
475 * Setup the frame, update direct mapping, invalidate P2M,
476 * and add to balloon.
477 */
478 i = 0;
479 list_for_each_entry_safe(page, tmp, &pages, lru) {
Julien Grall30756c62015-05-04 15:39:08 +0100480 frame_list[i++] = xen_page_to_gfn(page);
Wei Liu09ed3d52014-03-15 16:11:47 +0000481
Oleksandr Andrushchenkoae4c51a2018-07-20 12:01:44 +0300482 xenmem_reservation_va_mapping_reset(1, &page);
Julien Grall30756c62015-05-04 15:39:08 +0100483
Julien Grall30756c62015-05-04 15:39:08 +0100484 list_del(&page->lru);
David Vrabel24f69372013-09-19 17:14:53 +0100485
Wei Liu09ed3d52014-03-15 16:11:47 +0000486 balloon_append(page);
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700487 }
488
David Vrabel24f69372013-09-19 17:14:53 +0100489 flush_tlb_all();
David Vrabel2bad07c2013-09-11 17:45:44 +0000490
Oleksandr Andrushchenkoae4c51a2018-07-20 12:01:44 +0300491 ret = xenmem_reservation_decrease(nr_pages, frame_list);
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700492 BUG_ON(ret != nr_pages);
493
494 balloon_stats.current_pages -= nr_pages;
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700495
Daniel Kiper95d2ac42011-03-08 22:48:24 +0100496 return state;
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700497}
498
499/*
Juergen Gross319933a2021-10-05 15:34:33 +0200500 * Stop waiting if either state is BP_DONE and ballooning action is
501 * needed, or if the credit has changed while state is not BP_DONE.
Juergen Gross8480ed92021-08-27 14:32:06 +0200502 */
Juergen Gross40fdea02021-11-02 10:19:44 +0100503static bool balloon_thread_cond(long credit)
Juergen Gross8480ed92021-08-27 14:32:06 +0200504{
Juergen Gross40fdea02021-11-02 10:19:44 +0100505 if (balloon_state == BP_DONE)
Juergen Gross8480ed92021-08-27 14:32:06 +0200506 credit = 0;
507
508 return current_credit() != credit || kthread_should_stop();
509}
510
511/*
512 * As this is a kthread it is guaranteed to run as a single instance only.
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700513 * We may of course race updates of the target counts (which are protected
514 * by the balloon lock), or with changes to the Xen hard limit, but we will
515 * recover from these in time.
516 */
Juergen Gross8480ed92021-08-27 14:32:06 +0200517static int balloon_thread(void *unused)
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700518{
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700519 long credit;
Juergen Gross8480ed92021-08-27 14:32:06 +0200520 unsigned long timeout;
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700521
Juergen Gross8480ed92021-08-27 14:32:06 +0200522 set_freezable();
523 for (;;) {
Juergen Gross40fdea02021-11-02 10:19:44 +0100524 switch (balloon_state) {
Juergen Gross319933a2021-10-05 15:34:33 +0200525 case BP_DONE:
526 case BP_ECANCELED:
Juergen Gross8480ed92021-08-27 14:32:06 +0200527 timeout = 3600 * HZ;
Juergen Gross319933a2021-10-05 15:34:33 +0200528 break;
529 case BP_EAGAIN:
530 timeout = balloon_stats.schedule_delay * HZ;
531 break;
532 case BP_WAIT:
533 timeout = HZ;
534 break;
535 }
536
Juergen Gross8480ed92021-08-27 14:32:06 +0200537 credit = current_credit();
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700538
Juergen Gross96f5bd02021-09-20 12:03:45 +0200539 wait_event_freezable_timeout(balloon_thread_wq,
Juergen Gross40fdea02021-11-02 10:19:44 +0100540 balloon_thread_cond(credit), timeout);
Juergen Gross8480ed92021-08-27 14:32:06 +0200541
542 if (kthread_should_stop())
543 return 0;
544
Juergen Gross929423f2015-07-20 13:49:39 +0200545 mutex_lock(&balloon_mutex);
546
Daniel Kiper83be7e52011-03-28 11:34:10 +0200547 credit = current_credit();
Daniel Kiper95d2ac42011-03-08 22:48:24 +0100548
Daniel Kiper080e2be2011-07-25 17:12:06 -0700549 if (credit > 0) {
550 if (balloon_is_inflated())
Juergen Gross40fdea02021-11-02 10:19:44 +0100551 balloon_state = increase_reservation(credit);
Daniel Kiper080e2be2011-07-25 17:12:06 -0700552 else
Juergen Gross40fdea02021-11-02 10:19:44 +0100553 balloon_state = reserve_additional_memory();
Daniel Kiper080e2be2011-07-25 17:12:06 -0700554 }
Daniel Kiper95d2ac42011-03-08 22:48:24 +0100555
Juergen Grossa1078e82019-06-19 11:00:56 +0200556 if (credit < 0) {
557 long n_pages;
558
559 n_pages = min(-credit, si_mem_available());
Juergen Gross40fdea02021-11-02 10:19:44 +0100560 balloon_state = decrease_reservation(n_pages,
561 GFP_BALLOON);
562 if (balloon_state == BP_DONE && n_pages != -credit &&
Juergen Grossa1078e82019-06-19 11:00:56 +0200563 n_pages < totalreserve_pages)
Juergen Gross40fdea02021-11-02 10:19:44 +0100564 balloon_state = BP_EAGAIN;
Juergen Grossa1078e82019-06-19 11:00:56 +0200565 }
Daniel Kiper95d2ac42011-03-08 22:48:24 +0100566
Juergen Gross40fdea02021-11-02 10:19:44 +0100567 update_schedule();
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700568
Juergen Gross929423f2015-07-20 13:49:39 +0200569 mutex_unlock(&balloon_mutex);
570
571 cond_resched();
Juergen Gross8480ed92021-08-27 14:32:06 +0200572 }
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700573}
574
575/* Resets the Xen limit, sets new target, and kicks off processing. */
Daniel De Graaf803eb042011-03-14 11:29:37 -0400576void balloon_set_new_target(unsigned long target)
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700577{
578 /* No need for lock. Not read-modify-write updates. */
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700579 balloon_stats.target_pages = target;
Juergen Gross8480ed92021-08-27 14:32:06 +0200580 wake_up(&balloon_thread_wq);
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700581}
Daniel De Graaf803eb042011-03-14 11:29:37 -0400582EXPORT_SYMBOL_GPL(balloon_set_new_target);
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700583
Juergen Gross121f2fa2021-11-02 10:22:34 +0100584static int add_ballooned_pages(unsigned int nr_pages)
David Vrabel1cf6a6c2015-06-25 16:29:18 +0100585{
586 enum bp_state st;
587
588 if (xen_hotplug_unpopulated) {
589 st = reserve_additional_memory();
590 if (st != BP_ECANCELED) {
Roger Pau Monne88a479f2020-07-27 11:13:40 +0200591 int rc;
592
David Vrabel1cf6a6c2015-06-25 16:29:18 +0100593 mutex_unlock(&balloon_mutex);
Roger Pau Monne88a479f2020-07-27 11:13:40 +0200594 rc = wait_event_interruptible(balloon_wq,
David Vrabel1cf6a6c2015-06-25 16:29:18 +0100595 !list_empty(&ballooned_pages));
596 mutex_lock(&balloon_mutex);
Roger Pau Monne88a479f2020-07-27 11:13:40 +0200597 return rc ? -ENOMEM : 0;
David Vrabel1cf6a6c2015-06-25 16:29:18 +0100598 }
599 }
600
Juergen Grossa1078e82019-06-19 11:00:56 +0200601 if (si_mem_available() < nr_pages)
602 return -ENOMEM;
603
David Vrabel1cf6a6c2015-06-25 16:29:18 +0100604 st = decrease_reservation(nr_pages, GFP_USER);
605 if (st != BP_DONE)
606 return -ENOMEM;
607
608 return 0;
609}
610
Konrad Rzeszutek Wilkb6f30672011-03-15 10:23:57 -0400611/**
Oleksandr Tyshchenko9dd060a2021-12-09 22:05:33 +0200612 * xen_alloc_ballooned_pages - get pages that have been ballooned out
Konrad Rzeszutek Wilkb6f30672011-03-15 10:23:57 -0400613 * @nr_pages: Number of pages to get
614 * @pages: pages returned
615 * @return 0 on success, error otherwise
616 */
Oleksandr Tyshchenko9dd060a2021-12-09 22:05:33 +0200617int xen_alloc_ballooned_pages(unsigned int nr_pages, struct page **pages)
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700618{
Juergen Gross121f2fa2021-11-02 10:22:34 +0100619 unsigned int pgno = 0;
Ruslan Pisareve882dc92011-07-26 14:15:59 +0300620 struct page *page;
David Vrabel1cf6a6c2015-06-25 16:29:18 +0100621 int ret;
622
Konrad Rzeszutek Wilkb6f30672011-03-15 10:23:57 -0400623 mutex_lock(&balloon_mutex);
David Vrabel1cf6a6c2015-06-25 16:29:18 +0100624
625 balloon_stats.target_unpopulated += nr_pages;
626
Konrad Rzeszutek Wilkb6f30672011-03-15 10:23:57 -0400627 while (pgno < nr_pages) {
David Vrabel81b286e2015-06-25 13:12:46 +0100628 page = balloon_retrieve(true);
629 if (page) {
Konrad Rzeszutek Wilkb6f30672011-03-15 10:23:57 -0400630 pages[pgno++] = page;
David Vrabel4a69c902015-07-22 14:50:37 +0100631#ifdef CONFIG_XEN_HAVE_PVMMU
Julien Grall30756c62015-05-04 15:39:08 +0100632 /*
633 * We don't support PV MMU when Linux and Xen is using
634 * different page granularity.
635 */
636 BUILD_BUG_ON(XEN_PAGE_SIZE != PAGE_SIZE);
637
Boris Ostrovskyb194da22017-08-23 18:27:04 -0400638 if (!xen_feature(XENFEAT_auto_translated_physmap)) {
639 ret = xen_alloc_p2m_entry(page_to_pfn(page));
640 if (ret < 0)
641 goto out_undo;
642 }
David Vrabel4a69c902015-07-22 14:50:37 +0100643#endif
Konrad Rzeszutek Wilkb6f30672011-03-15 10:23:57 -0400644 } else {
David Vrabel1cf6a6c2015-06-25 16:29:18 +0100645 ret = add_ballooned_pages(nr_pages - pgno);
646 if (ret < 0)
Konrad Rzeszutek Wilkb6f30672011-03-15 10:23:57 -0400647 goto out_undo;
648 }
649 }
650 mutex_unlock(&balloon_mutex);
651 return 0;
652 out_undo:
Konrad Rzeszutek Wilkb6f30672011-03-15 10:23:57 -0400653 mutex_unlock(&balloon_mutex);
Oleksandr Tyshchenko9dd060a2021-12-09 22:05:33 +0200654 xen_free_ballooned_pages(pgno, pages);
Roger Pau Monne1951fa32020-07-27 11:13:39 +0200655 /*
Oleksandr Tyshchenko9dd060a2021-12-09 22:05:33 +0200656 * NB: xen_free_ballooned_pages will only subtract pgno pages, but since
Roger Pau Monne1951fa32020-07-27 11:13:39 +0200657 * target_unpopulated is incremented with nr_pages at the start we need
658 * to remove the remaining ones also, or accounting will be screwed.
659 */
660 balloon_stats.target_unpopulated -= nr_pages - pgno;
David Vrabel1cf6a6c2015-06-25 16:29:18 +0100661 return ret;
Konrad Rzeszutek Wilkb6f30672011-03-15 10:23:57 -0400662}
Oleksandr Tyshchenko9dd060a2021-12-09 22:05:33 +0200663EXPORT_SYMBOL(xen_alloc_ballooned_pages);
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700664
Konrad Rzeszutek Wilkb6f30672011-03-15 10:23:57 -0400665/**
Oleksandr Tyshchenko9dd060a2021-12-09 22:05:33 +0200666 * xen_free_ballooned_pages - return pages retrieved with get_ballooned_pages
Konrad Rzeszutek Wilkb6f30672011-03-15 10:23:57 -0400667 * @nr_pages: Number of pages
668 * @pages: pages to return
669 */
Oleksandr Tyshchenko9dd060a2021-12-09 22:05:33 +0200670void xen_free_ballooned_pages(unsigned int nr_pages, struct page **pages)
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700671{
Juergen Gross121f2fa2021-11-02 10:22:34 +0100672 unsigned int i;
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700673
Konrad Rzeszutek Wilkb6f30672011-03-15 10:23:57 -0400674 mutex_lock(&balloon_mutex);
675
676 for (i = 0; i < nr_pages; i++) {
David Hildenbrand59b52f12019-10-01 11:01:51 +0200677 if (pages[i])
Konrad Rzeszutek Wilkb6f30672011-03-15 10:23:57 -0400678 balloon_append(pages[i]);
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700679 }
680
David Vrabel1cf6a6c2015-06-25 16:29:18 +0100681 balloon_stats.target_unpopulated -= nr_pages;
682
Konrad Rzeszutek Wilkb6f30672011-03-15 10:23:57 -0400683 /* The balloon may be too large now. Shrink it if needed. */
Daniel Kiper83be7e52011-03-28 11:34:10 +0200684 if (current_credit())
Juergen Gross8480ed92021-08-27 14:32:06 +0200685 wake_up(&balloon_thread_wq);
Konrad Rzeszutek Wilkb6f30672011-03-15 10:23:57 -0400686
687 mutex_unlock(&balloon_mutex);
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700688}
Oleksandr Tyshchenko9dd060a2021-12-09 22:05:33 +0200689EXPORT_SYMBOL(xen_free_ballooned_pages);
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700690
Oleksandr Tyshchenko9dd060a2021-12-09 22:05:33 +0200691#if defined(CONFIG_XEN_PV) && !defined(CONFIG_XEN_UNPOPULATED_ALLOC)
David Vrabel8b5d44a2011-09-28 17:46:34 +0100692static void __init balloon_add_region(unsigned long start_pfn,
693 unsigned long pages)
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700694{
Daniel Kiper4dfe22f2011-03-28 11:33:18 +0200695 unsigned long pfn, extra_pfn_end;
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700696
David Vrabel8b5d44a2011-09-28 17:46:34 +0100697 /*
698 * If the amount of usable memory has been limited (e.g., with
699 * the 'mem' command line parameter), don't add pages beyond
700 * this limit.
701 */
702 extra_pfn_end = min(max_pfn, start_pfn + pages);
703
704 for (pfn = start_pfn; pfn < extra_pfn_end; pfn++) {
David Vrabel8b5d44a2011-09-28 17:46:34 +0100705 /* totalram_pages and totalhigh_pages do not
706 include the boot-time balloon extension, so
707 don't subtract from it. */
David Hildenbrand59b52f12019-10-01 11:01:51 +0200708 balloon_append(pfn_to_page(pfn));
David Vrabel8b5d44a2011-09-28 17:46:34 +0100709 }
David Vrabelde5a77d2015-06-25 12:08:20 +0100710
711 balloon_stats.total_pages += extra_pfn_end - start_pfn;
David Vrabel8b5d44a2011-09-28 17:46:34 +0100712}
Vitaly Kuznetsov4fee9ad2017-03-14 18:35:53 +0100713#endif
David Vrabel8b5d44a2011-09-28 17:46:34 +0100714
715static int __init balloon_init(void)
716{
Juergen Gross8480ed92021-08-27 14:32:06 +0200717 struct task_struct *task;
718
Stefano Stabellini53d55222010-12-02 17:55:05 +0000719 if (!xen_domain())
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700720 return -ENODEV;
721
Joe Perches283c0972013-06-28 03:21:41 -0700722 pr_info("Initialising balloon driver\n");
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700723
Vitaly Kuznetsov4fee9ad2017-03-14 18:35:53 +0100724#ifdef CONFIG_XEN_PV
David Vrabelaa244112011-09-28 17:46:32 +0100725 balloon_stats.current_pages = xen_pv_domain()
726 ? min(xen_start_info->nr_pages - xen_released_pages, max_pfn)
Boris Ostrovskyc275a572013-11-06 15:37:40 -0500727 : get_num_physpages();
Vitaly Kuznetsov4fee9ad2017-03-14 18:35:53 +0100728#else
729 balloon_stats.current_pages = get_num_physpages();
730#endif
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700731 balloon_stats.target_pages = balloon_stats.current_pages;
732 balloon_stats.balloon_low = 0;
733 balloon_stats.balloon_high = 0;
David Vrabelde5a77d2015-06-25 12:08:20 +0100734 balloon_stats.total_pages = balloon_stats.current_pages;
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700735
Daniel Kiper95d2ac42011-03-08 22:48:24 +0100736 balloon_stats.schedule_delay = 1;
737 balloon_stats.max_schedule_delay = 32;
738 balloon_stats.retry_count = 1;
Juergen Grossa1078e82019-06-19 11:00:56 +0200739 balloon_stats.max_retry_count = 4;
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700740
Daniel Kiper080e2be2011-07-25 17:12:06 -0700741#ifdef CONFIG_XEN_BALLOON_MEMORY_HOTPLUG
Daniel Kiper080e2be2011-07-25 17:12:06 -0700742 set_online_page_callback(&xen_online_page);
743 register_memory_notifier(&xen_memory_nb);
David Vrabel1cf6a6c2015-06-25 16:29:18 +0100744 register_sysctl_table(xen_root);
Daniel Kiper080e2be2011-07-25 17:12:06 -0700745#endif
746
Roger Pau Monne9e2369c2020-09-01 10:33:26 +0200747#if defined(CONFIG_XEN_PV) && !defined(CONFIG_XEN_UNPOPULATED_ALLOC)
Vitaly Kuznetsov4fee9ad2017-03-14 18:35:53 +0100748 {
749 int i;
750
751 /*
752 * Initialize the balloon with pages from the extra memory
753 * regions (see arch/x86/xen/setup.c).
754 */
755 for (i = 0; i < XEN_EXTRA_MEM_MAX_REGIONS; i++)
756 if (xen_extra_mem[i].n_pfns)
757 balloon_add_region(xen_extra_mem[i].start_pfn,
758 xen_extra_mem[i].n_pfns);
759 }
760#endif
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700761
Juergen Gross8480ed92021-08-27 14:32:06 +0200762 task = kthread_run(balloon_thread, NULL, "xen-balloon");
763 if (IS_ERR(task)) {
764 pr_err("xen-balloon thread could not be started, ballooning will not work!\n");
765 return PTR_ERR(task);
766 }
767
Juergen Gross96edd612017-07-10 10:10:45 +0200768 /* Init the xen-balloon driver. */
769 xen_balloon_init();
770
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700771 return 0;
772}
Jeremy Fitzhardinge17758262008-04-02 10:54:13 -0700773subsys_initcall(balloon_init);
Juergen Gross40fdea02021-11-02 10:19:44 +0100774
775static int __init balloon_wait_finish(void)
776{
777 long credit, last_credit = 0;
778 unsigned long last_changed = 0;
779
780 if (!xen_domain())
781 return -ENODEV;
782
783 /* PV guests don't need to wait. */
784 if (xen_pv_domain() || !current_credit())
785 return 0;
786
787 pr_notice("Waiting for initial ballooning down having finished.\n");
788
789 while ((credit = current_credit()) < 0) {
790 if (credit != last_credit) {
791 last_changed = jiffies;
792 last_credit = credit;
793 }
794 if (balloon_state == BP_ECANCELED) {
795 pr_warn_once("Initial ballooning failed, %ld pages need to be freed.\n",
796 -credit);
797 if (jiffies - last_changed >= HZ * balloon_boot_timeout)
798 panic("Initial ballooning failed!\n");
799 }
800
801 schedule_timeout_interruptible(HZ / 10);
802 }
803
804 pr_notice("Initial ballooning down finished.\n");
805
806 return 0;
807}
808late_initcall_sync(balloon_wait_finish);