Merge tag 'vfs-6.9.super' of git://git.kernel.org/pub/scm/linux/kernel/git/vfs/vfs
[linux-block.git] / drivers / xen / balloon.c
CommitLineData
1775826c 1/******************************************************************************
1775826c
JF
2 * Xen balloon driver - enables returning/claiming memory to/from Xen.
3 *
4 * Copyright (c) 2003, B Dragovic
5 * Copyright (c) 2003-2004, M Williamson, K Fraser
6 * Copyright (c) 2005 Dan M. Smith, IBM Corporation
080e2be7
DK
7 * Copyright (c) 2010 Daniel Kiper
8 *
9 * Memory hotplug support was written by Daniel Kiper. Work on
10 * it was sponsored by Google under Google Summer of Code 2010
11 * program. Jeremy Fitzhardinge from Citrix was the mentor for
12 * this project.
1775826c
JF
13 *
14 * This program is free software; you can redistribute it and/or
15 * modify it under the terms of the GNU General Public License version 2
16 * as published by the Free Software Foundation; or, when distributed
17 * separately from the Linux kernel or incorporated into other
18 * software packages, subject to the following license:
19 *
20 * Permission is hereby granted, free of charge, to any person obtaining a copy
21 * of this source file (the "Software"), to deal in the Software without
22 * restriction, including without limitation the rights to use, copy, modify,
23 * merge, publish, distribute, sublicense, and/or sell copies of the Software,
24 * and to permit persons to whom the Software is furnished to do so, subject to
25 * the following conditions:
26 *
27 * The above copyright notice and this permission notice shall be included in
28 * all copies or substantial portions of the Software.
29 *
30 * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
31 * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
32 * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
33 * AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
34 * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING
35 * FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS
36 * IN THE SOFTWARE.
37 */
38
283c0972
JP
39#define pr_fmt(fmt) "xen:" KBUILD_MODNAME ": " fmt
40
cd9151e2 41#include <linux/cpu.h>
1775826c 42#include <linux/kernel.h>
1775826c 43#include <linux/sched.h>
5b825c3a 44#include <linux/cred.h>
1775826c 45#include <linux/errno.h>
8480ed9c
JG
46#include <linux/freezer.h>
47#include <linux/kthread.h>
1775826c 48#include <linux/mm.h>
57c8a661 49#include <linux/memblock.h>
1775826c
JF
50#include <linux/pagemap.h>
51#include <linux/highmem.h>
52#include <linux/mutex.h>
1775826c 53#include <linux/list.h>
5a0e3ad6 54#include <linux/gfp.h>
080e2be7
DK
55#include <linux/notifier.h>
56#include <linux/memory.h>
57#include <linux/memory_hotplug.h>
cd9151e2 58#include <linux/percpu-defs.h>
55b3da98 59#include <linux/slab.h>
1cf6a6c8 60#include <linux/sysctl.h>
40fdea02 61#include <linux/moduleparam.h>
b537bf42 62#include <linux/jiffies.h>
1775826c 63
1775826c 64#include <asm/page.h>
1775826c
JF
65#include <asm/tlb.h>
66
ecbf29cd
JF
67#include <asm/xen/hypervisor.h>
68#include <asm/xen/hypercall.h>
1ccbf534
JF
69
70#include <xen/xen.h>
ecbf29cd 71#include <xen/interface/xen.h>
1775826c 72#include <xen/interface/memory.h>
803eb047 73#include <xen/balloon.h>
1775826c
JF
74#include <xen/features.h>
75#include <xen/page.h>
ae4c51a5 76#include <xen/mem-reservation.h>
1775826c 77
40fdea02
JG
78#undef MODULE_PARAM_PREFIX
79#define MODULE_PARAM_PREFIX "xen."
80
81static uint __read_mostly balloon_boot_timeout = 180;
82module_param(balloon_boot_timeout, uint, 0444);
83
1cf6a6c8 84#ifdef CONFIG_XEN_BALLOON_MEMORY_HOTPLUG
501586ea 85static int xen_hotplug_unpopulated;
1cf6a6c8 86
1cf6a6c8
DV
87static struct ctl_table balloon_table[] = {
88 {
89 .procname = "hotplug_unpopulated",
90 .data = &xen_hotplug_unpopulated,
91 .maxlen = sizeof(int),
92 .mode = 0644,
93 .proc_handler = proc_dointvec_minmax,
eec4844f
MC
94 .extra1 = SYSCTL_ZERO,
95 .extra2 = SYSCTL_ONE,
1cf6a6c8 96 },
1cf6a6c8
DV
97};
98
501586ea
AB
99#else
100#define xen_hotplug_unpopulated 0
1cf6a6c8
DV
101#endif
102
30756c62
JG
103/*
104 * Use one extent per PAGE_SIZE to avoid to break down the page into
105 * multiple frame.
106 */
107#define EXTENT_ORDER (fls(XEN_PFN_PER_PAGE) - 1)
108
95d2ac4a 109/*
8480ed9c 110 * balloon_thread() state:
95d2ac4a
DK
111 *
112 * BP_DONE: done or nothing to do,
b2ac6aa8 113 * BP_WAIT: wait to be rescheduled,
95d2ac4a
DK
114 * BP_EAGAIN: error, go to sleep,
115 * BP_ECANCELED: error, balloon operation canceled.
116 */
1775826c 117
40fdea02 118static enum bp_state {
95d2ac4a 119 BP_DONE,
b2ac6aa8 120 BP_WAIT,
95d2ac4a
DK
121 BP_EAGAIN,
122 BP_ECANCELED
40fdea02 123} balloon_state = BP_DONE;
1775826c 124
8480ed9c
JG
125/* Main waiting point for xen-balloon thread. */
126static DECLARE_WAIT_QUEUE_HEAD(balloon_thread_wq);
1775826c 127
1775826c 128static DEFINE_MUTEX(balloon_mutex);
1775826c 129
803eb047
DDG
130struct balloon_stats balloon_stats;
131EXPORT_SYMBOL_GPL(balloon_stats);
1775826c
JF
132
133/* We increase/decrease in batches which fit in a page */
3990dd27 134static xen_pfn_t frame_list[PAGE_SIZE / sizeof(xen_pfn_t)];
cd9151e2 135
1775826c 136
1775826c
JF
137/* List of ballooned pages, threaded through the mem_map array. */
138static LIST_HEAD(ballooned_pages);
1cf6a6c8 139static DECLARE_WAIT_QUEUE_HEAD(balloon_wq);
1775826c 140
1775826c
JF
141/* When ballooning out (allocating memory to return to Xen) we don't really
142 want the kernel to try too hard since that can trigger the oom killer. */
143#define GFP_BALLOON \
144 (GFP_HIGHUSER | __GFP_NOWARN | __GFP_NORETRY | __GFP_NOMEMALLOC)
145
1775826c 146/* balloon_append: add the given page to the balloon. */
dde3285f 147static void balloon_append(struct page *page)
1775826c 148{
59b52f10
DH
149 __SetPageOffline(page);
150
1775826c
JF
151 /* Lowmem is re-populated first, so highmem pages go at list tail. */
152 if (PageHighMem(page)) {
153 list_add_tail(&page->lru, &ballooned_pages);
154 balloon_stats.balloon_high++;
1775826c
JF
155 } else {
156 list_add(&page->lru, &ballooned_pages);
157 balloon_stats.balloon_low++;
158 }
1cf6a6c8 159 wake_up(&balloon_wq);
9be4d457 160}
3d65c948 161
1775826c 162/* balloon_retrieve: rescue a page from the balloon, if it is not empty. */
81b286e0 163static struct page *balloon_retrieve(bool require_lowmem)
1775826c
JF
164{
165 struct page *page;
166
167 if (list_empty(&ballooned_pages))
168 return NULL;
169
81b286e0
DV
170 page = list_entry(ballooned_pages.next, struct page, lru);
171 if (require_lowmem && PageHighMem(page))
172 return NULL;
1775826c
JF
173 list_del(&page->lru);
174
3dcc0571 175 if (PageHighMem(page))
1775826c 176 balloon_stats.balloon_high--;
3dcc0571 177 else
1775826c
JF
178 balloon_stats.balloon_low--;
179
04ccbdc3 180 __ClearPageOffline(page);
1775826c
JF
181 return page;
182}
183
1775826c
JF
184static struct page *balloon_next_page(struct page *page)
185{
186 struct list_head *next = page->lru.next;
187 if (next == &ballooned_pages)
188 return NULL;
189 return list_entry(next, struct page, lru);
190}
191
40fdea02 192static void update_schedule(void)
1775826c 193{
40fdea02
JG
194 if (balloon_state == BP_WAIT || balloon_state == BP_ECANCELED)
195 return;
fd8b7951 196
40fdea02 197 if (balloon_state == BP_DONE) {
95d2ac4a
DK
198 balloon_stats.schedule_delay = 1;
199 balloon_stats.retry_count = 1;
40fdea02 200 return;
95d2ac4a
DK
201 }
202
95d2ac4a
DK
203 ++balloon_stats.retry_count;
204
205 if (balloon_stats.max_retry_count != RETRY_UNLIMITED &&
206 balloon_stats.retry_count > balloon_stats.max_retry_count) {
95d2ac4a
DK
207 balloon_stats.schedule_delay = 1;
208 balloon_stats.retry_count = 1;
40fdea02
JG
209 balloon_state = BP_ECANCELED;
210 return;
95d2ac4a
DK
211 }
212
213 balloon_stats.schedule_delay <<= 1;
214
215 if (balloon_stats.schedule_delay > balloon_stats.max_schedule_delay)
216 balloon_stats.schedule_delay = balloon_stats.max_schedule_delay;
217
40fdea02 218 balloon_state = BP_EAGAIN;
1775826c
JF
219}
220
080e2be7 221#ifdef CONFIG_XEN_BALLOON_MEMORY_HOTPLUG
842775f1
RL
222static void release_memory_resource(struct resource *resource)
223{
224 if (!resource)
225 return;
226
227 /*
228 * No need to reset region to identity mapped since we now
229 * know that no I/O can be in this region
230 */
231 release_resource(resource);
232 kfree(resource);
233}
234
55b3da98
DV
235static struct resource *additional_memory_resource(phys_addr_t size)
236{
12366410
ID
237 struct resource *res;
238 int ret;
55b3da98
DV
239
240 res = kzalloc(sizeof(*res), GFP_KERNEL);
241 if (!res)
242 return NULL;
243
244 res->name = "System RAM";
782b8664 245 res->flags = IORESOURCE_SYSTEM_RAM | IORESOURCE_BUSY;
55b3da98 246
12366410
ID
247 ret = allocate_resource(&iomem_resource, res,
248 size, 0, -1,
249 PAGES_PER_SECTION * PAGE_SIZE, NULL, NULL);
250 if (ret < 0) {
251 pr_err("Cannot allocate new System RAM resource\n");
252 kfree(res);
253 return NULL;
55b3da98
DV
254 }
255
256 return res;
257}
258
b2ac6aa8 259static enum bp_state reserve_additional_memory(void)
080e2be7 260{
b2ac6aa8 261 long credit;
55b3da98 262 struct resource *resource;
080e2be7 263 int nid, rc;
55b3da98 264 unsigned long balloon_hotplug;
080e2be7 265
1cf6a6c8
DV
266 credit = balloon_stats.target_pages + balloon_stats.target_unpopulated
267 - balloon_stats.total_pages;
b2ac6aa8
DV
268
269 /*
270 * Already hotplugged enough pages? Wait for them to be
271 * onlined.
272 */
273 if (credit <= 0)
274 return BP_WAIT;
275
55b3da98
DV
276 balloon_hotplug = round_up(credit, PAGES_PER_SECTION);
277
278 resource = additional_memory_resource(balloon_hotplug * PAGE_SIZE);
279 if (!resource)
280 goto err;
281
282 nid = memory_add_physaddr_to_nid(resource->start);
080e2be7 283
3c56b3a1 284#ifdef CONFIG_XEN_HAVE_PVMMU
30756c62
JG
285 /*
286 * We don't support PV MMU when Linux and Xen is using
287 * different page granularity.
288 */
289 BUILD_BUG_ON(XEN_PAGE_SIZE != PAGE_SIZE);
290
3c56b3a1
JG
291 /*
292 * add_memory() will build page tables for the new memory so
293 * the p2m must contain invalid entries so the correct
294 * non-present PTEs will be written.
295 *
296 * If a failure occurs, the original (identity) p2m entries
297 * are not restored since this region is now known not to
298 * conflict with any devices.
299 */
300 if (!xen_feature(XENFEAT_auto_translated_physmap)) {
301 unsigned long pfn, i;
302
55b3da98 303 pfn = PFN_DOWN(resource->start);
3c56b3a1
JG
304 for (i = 0; i < balloon_hotplug; i++) {
305 if (!set_phys_to_machine(pfn + i, INVALID_P2M_ENTRY)) {
306 pr_warn("set_phys_to_machine() failed, no memory added\n");
55b3da98 307 goto err;
3c56b3a1
JG
308 }
309 }
310 }
311#endif
312
703fc13a
VK
313 /*
314 * add_memory_resource() will call online_pages() which in its turn
315 * will call xen_online_page() callback causing deadlock if we don't
316 * release balloon_mutex here. Unlocking here is safe because the
317 * callers drop the mutex before trying again.
318 */
319 mutex_unlock(&balloon_mutex);
8df1d0e4
DH
320 /* add_memory_resource() requires the device_hotplug lock */
321 lock_device_hotplug();
26011267 322 rc = add_memory_resource(nid, resource, MHP_MERGE_RESOURCE);
8df1d0e4 323 unlock_device_hotplug();
703fc13a
VK
324 mutex_lock(&balloon_mutex);
325
080e2be7 326 if (rc) {
3dcf6367 327 pr_warn("Cannot add additional memory (%i)\n", rc);
55b3da98 328 goto err;
080e2be7
DK
329 }
330
de5a77d8 331 balloon_stats.total_pages += balloon_hotplug;
080e2be7 332
b2ac6aa8 333 return BP_WAIT;
55b3da98
DV
334 err:
335 release_memory_resource(resource);
336 return BP_ECANCELED;
080e2be7
DK
337}
338
a9cd410a 339static void xen_online_page(struct page *page, unsigned int order)
080e2be7 340{
a9cd410a
AK
341 unsigned long i, size = (1 << order);
342 unsigned long start_pfn = page_to_pfn(page);
343 struct page *p;
080e2be7 344
a9cd410a 345 pr_debug("Online %lu pages starting at pfn 0x%lx\n", size, start_pfn);
080e2be7 346 mutex_lock(&balloon_mutex);
a9cd410a
AK
347 for (i = 0; i < size; i++) {
348 p = pfn_to_page(start_pfn + i);
dde3285f 349 balloon_append(p);
a9cd410a 350 }
080e2be7
DK
351 mutex_unlock(&balloon_mutex);
352}
353
354static int xen_memory_notifier(struct notifier_block *nb, unsigned long val, void *v)
355{
356 if (val == MEM_ONLINE)
8480ed9c 357 wake_up(&balloon_thread_wq);
080e2be7
DK
358
359 return NOTIFY_OK;
360}
361
362static struct notifier_block xen_memory_nb = {
363 .notifier_call = xen_memory_notifier,
364 .priority = 0
365};
366#else
b2ac6aa8 367static enum bp_state reserve_additional_memory(void)
1775826c 368{
c673ec61
JG
369 balloon_stats.target_pages = balloon_stats.current_pages +
370 balloon_stats.target_unpopulated;
1cf6a6c8 371 return BP_ECANCELED;
1775826c 372}
de5a77d8 373#endif /* CONFIG_XEN_BALLOON_MEMORY_HOTPLUG */
1775826c 374
de5a77d8 375static long current_credit(void)
080e2be7 376{
de5a77d8 377 return balloon_stats.target_pages - balloon_stats.current_pages;
080e2be7
DK
378}
379
de5a77d8 380static bool balloon_is_inflated(void)
080e2be7 381{
de5a77d8 382 return balloon_stats.balloon_low || balloon_stats.balloon_high;
080e2be7 383}
080e2be7 384
95d2ac4a 385static enum bp_state increase_reservation(unsigned long nr_pages)
1775826c 386{
95d2ac4a 387 int rc;
30756c62 388 unsigned long i;
1775826c 389 struct page *page;
1775826c
JF
390
391 if (nr_pages > ARRAY_SIZE(frame_list))
392 nr_pages = ARRAY_SIZE(frame_list);
393
9346c2a8 394 page = list_first_entry_or_null(&ballooned_pages, struct page, lru);
1775826c 395 for (i = 0; i < nr_pages; i++) {
95d2ac4a
DK
396 if (!page) {
397 nr_pages = i;
398 break;
399 }
30756c62 400
30756c62 401 frame_list[i] = page_to_xen_pfn(page);
1775826c
JF
402 page = balloon_next_page(page);
403 }
404
ae4c51a5 405 rc = xenmem_reservation_increase(nr_pages, frame_list);
40095de1 406 if (rc <= 0)
95d2ac4a 407 return BP_EAGAIN;
1775826c 408
bc2c0303 409 for (i = 0; i < rc; i++) {
b6f30679 410 page = balloon_retrieve(false);
1775826c
JF
411 BUG_ON(page == NULL);
412
ae4c51a5 413 xenmem_reservation_va_mapping_update(1, &page, &frame_list[i]);
1775826c
JF
414
415 /* Relinquish the page back to the allocator. */
709613ad 416 free_reserved_page(page);
1775826c
JF
417 }
418
bc2c0303 419 balloon_stats.current_pages += rc;
1775826c 420
95d2ac4a 421 return BP_DONE;
1775826c
JF
422}
423
b6f30679 424static enum bp_state decrease_reservation(unsigned long nr_pages, gfp_t gfp)
1775826c 425{
95d2ac4a 426 enum bp_state state = BP_DONE;
30756c62
JG
427 unsigned long i;
428 struct page *page, *tmp;
1775826c 429 int ret;
30756c62 430 LIST_HEAD(pages);
1775826c
JF
431
432 if (nr_pages > ARRAY_SIZE(frame_list))
433 nr_pages = ARRAY_SIZE(frame_list);
434
435 for (i = 0; i < nr_pages; i++) {
fce92683
LN
436 page = alloc_page(gfp);
437 if (page == NULL) {
1775826c 438 nr_pages = i;
95d2ac4a 439 state = BP_EAGAIN;
1775826c
JF
440 break;
441 }
709613ad 442 adjust_managed_page_count(page, -1);
ae4c51a5 443 xenmem_reservation_scrub_page(page);
30756c62 444 list_add(&page->lru, &pages);
09ed3d5b 445 }
1775826c 446
09ed3d5b
WL
447 /*
448 * Ensure that ballooned highmem pages don't have kmaps.
449 *
450 * Do this before changing the p2m as kmap_flush_unused()
451 * reads PTEs to obtain pages (and hence needs the original
452 * p2m entry).
453 */
454 kmap_flush_unused();
455
30756c62
JG
456 /*
457 * Setup the frame, update direct mapping, invalidate P2M,
458 * and add to balloon.
459 */
460 i = 0;
461 list_for_each_entry_safe(page, tmp, &pages, lru) {
30756c62 462 frame_list[i++] = xen_page_to_gfn(page);
1058a75f 463
ae4c51a5 464 xenmem_reservation_va_mapping_reset(1, &page);
30756c62 465
30756c62 466 list_del(&page->lru);
24f69373 467
09ed3d5b 468 balloon_append(page);
1775826c
JF
469 }
470
24f69373 471 flush_tlb_all();
2bad07ce 472
ae4c51a5 473 ret = xenmem_reservation_decrease(nr_pages, frame_list);
1775826c
JF
474 BUG_ON(ret != nr_pages);
475
476 balloon_stats.current_pages -= nr_pages;
1775826c 477
95d2ac4a 478 return state;
1775826c
JF
479}
480
481/*
319933a8
JG
482 * Stop waiting if either state is BP_DONE and ballooning action is
483 * needed, or if the credit has changed while state is not BP_DONE.
8480ed9c 484 */
40fdea02 485static bool balloon_thread_cond(long credit)
8480ed9c 486{
40fdea02 487 if (balloon_state == BP_DONE)
8480ed9c
JG
488 credit = 0;
489
490 return current_credit() != credit || kthread_should_stop();
491}
492
493/*
494 * As this is a kthread it is guaranteed to run as a single instance only.
1775826c
JF
495 * We may of course race updates of the target counts (which are protected
496 * by the balloon lock), or with changes to the Xen hard limit, but we will
497 * recover from these in time.
498 */
8480ed9c 499static int balloon_thread(void *unused)
1775826c 500{
1775826c 501 long credit;
8480ed9c
JG
502 unsigned long timeout;
503
504 set_freezable();
505 for (;;) {
40fdea02 506 switch (balloon_state) {
319933a8
JG
507 case BP_DONE:
508 case BP_ECANCELED:
8480ed9c 509 timeout = 3600 * HZ;
319933a8
JG
510 break;
511 case BP_EAGAIN:
512 timeout = balloon_stats.schedule_delay * HZ;
513 break;
514 case BP_WAIT:
515 timeout = HZ;
516 break;
517 }
518
8480ed9c 519 credit = current_credit();
1775826c 520
96f5bd03 521 wait_event_freezable_timeout(balloon_thread_wq,
40fdea02 522 balloon_thread_cond(credit), timeout);
8480ed9c
JG
523
524 if (kthread_should_stop())
525 return 0;
1775826c 526
929423fa
JG
527 mutex_lock(&balloon_mutex);
528
83be7e52 529 credit = current_credit();
95d2ac4a 530
080e2be7
DK
531 if (credit > 0) {
532 if (balloon_is_inflated())
40fdea02 533 balloon_state = increase_reservation(credit);
080e2be7 534 else
40fdea02 535 balloon_state = reserve_additional_memory();
080e2be7 536 }
95d2ac4a 537
a1078e82
JG
538 if (credit < 0) {
539 long n_pages;
540
541 n_pages = min(-credit, si_mem_available());
40fdea02
JG
542 balloon_state = decrease_reservation(n_pages,
543 GFP_BALLOON);
544 if (balloon_state == BP_DONE && n_pages != -credit &&
a1078e82 545 n_pages < totalreserve_pages)
40fdea02 546 balloon_state = BP_EAGAIN;
a1078e82 547 }
95d2ac4a 548
40fdea02 549 update_schedule();
1775826c 550
929423fa
JG
551 mutex_unlock(&balloon_mutex);
552
553 cond_resched();
8480ed9c 554 }
1775826c
JF
555}
556
557/* Resets the Xen limit, sets new target, and kicks off processing. */
803eb047 558void balloon_set_new_target(unsigned long target)
1775826c
JF
559{
560 /* No need for lock. Not read-modify-write updates. */
1775826c 561 balloon_stats.target_pages = target;
8480ed9c 562 wake_up(&balloon_thread_wq);
1775826c 563}
803eb047 564EXPORT_SYMBOL_GPL(balloon_set_new_target);
1775826c 565
121f2fac 566static int add_ballooned_pages(unsigned int nr_pages)
1cf6a6c8
DV
567{
568 enum bp_state st;
569
570 if (xen_hotplug_unpopulated) {
571 st = reserve_additional_memory();
572 if (st != BP_ECANCELED) {
88a479ff
RPM
573 int rc;
574
1cf6a6c8 575 mutex_unlock(&balloon_mutex);
88a479ff 576 rc = wait_event_interruptible(balloon_wq,
1cf6a6c8
DV
577 !list_empty(&ballooned_pages));
578 mutex_lock(&balloon_mutex);
88a479ff 579 return rc ? -ENOMEM : 0;
1cf6a6c8
DV
580 }
581 }
582
a1078e82
JG
583 if (si_mem_available() < nr_pages)
584 return -ENOMEM;
585
1cf6a6c8
DV
586 st = decrease_reservation(nr_pages, GFP_USER);
587 if (st != BP_DONE)
588 return -ENOMEM;
589
590 return 0;
591}
592
b6f30679 593/**
9dd060af 594 * xen_alloc_ballooned_pages - get pages that have been ballooned out
b6f30679
KRW
595 * @nr_pages: Number of pages to get
596 * @pages: pages returned
597 * @return 0 on success, error otherwise
598 */
9dd060af 599int xen_alloc_ballooned_pages(unsigned int nr_pages, struct page **pages)
1775826c 600{
121f2fac 601 unsigned int pgno = 0;
e882dc9c 602 struct page *page;
1cf6a6c8
DV
603 int ret;
604
b6f30679 605 mutex_lock(&balloon_mutex);
1cf6a6c8
DV
606
607 balloon_stats.target_unpopulated += nr_pages;
608
b6f30679 609 while (pgno < nr_pages) {
81b286e0
DV
610 page = balloon_retrieve(true);
611 if (page) {
b6f30679 612 pages[pgno++] = page;
4a69c909 613#ifdef CONFIG_XEN_HAVE_PVMMU
30756c62
JG
614 /*
615 * We don't support PV MMU when Linux and Xen is using
616 * different page granularity.
617 */
618 BUILD_BUG_ON(XEN_PAGE_SIZE != PAGE_SIZE);
619
b194da25
BO
620 if (!xen_feature(XENFEAT_auto_translated_physmap)) {
621 ret = xen_alloc_p2m_entry(page_to_pfn(page));
622 if (ret < 0)
623 goto out_undo;
624 }
4a69c909 625#endif
b6f30679 626 } else {
1cf6a6c8
DV
627 ret = add_ballooned_pages(nr_pages - pgno);
628 if (ret < 0)
b6f30679
KRW
629 goto out_undo;
630 }
1775826c 631 }
b6f30679
KRW
632 mutex_unlock(&balloon_mutex);
633 return 0;
634 out_undo:
b6f30679 635 mutex_unlock(&balloon_mutex);
9dd060af 636 xen_free_ballooned_pages(pgno, pages);
1951fa33 637 /*
9dd060af 638 * NB: xen_free_ballooned_pages will only subtract pgno pages, but since
1951fa33
RPM
639 * target_unpopulated is incremented with nr_pages at the start we need
640 * to remove the remaining ones also, or accounting will be screwed.
641 */
642 balloon_stats.target_unpopulated -= nr_pages - pgno;
1cf6a6c8 643 return ret;
1775826c 644}
9dd060af 645EXPORT_SYMBOL(xen_alloc_ballooned_pages);
1775826c 646
b6f30679 647/**
9dd060af 648 * xen_free_ballooned_pages - return pages retrieved with get_ballooned_pages
b6f30679
KRW
649 * @nr_pages: Number of pages
650 * @pages: pages to return
651 */
9dd060af 652void xen_free_ballooned_pages(unsigned int nr_pages, struct page **pages)
1775826c 653{
121f2fac 654 unsigned int i;
1775826c 655
b6f30679 656 mutex_lock(&balloon_mutex);
1775826c 657
b6f30679 658 for (i = 0; i < nr_pages; i++) {
59b52f10 659 if (pages[i])
b6f30679
KRW
660 balloon_append(pages[i]);
661 }
662
1cf6a6c8
DV
663 balloon_stats.target_unpopulated -= nr_pages;
664
b6f30679 665 /* The balloon may be too large now. Shrink it if needed. */
83be7e52 666 if (current_credit())
8480ed9c 667 wake_up(&balloon_thread_wq);
1775826c 668
b6f30679
KRW
669 mutex_unlock(&balloon_mutex);
670}
9dd060af 671EXPORT_SYMBOL(xen_free_ballooned_pages);
1775826c 672
262fc47a 673static void __init balloon_add_regions(void)
1775826c 674{
262fc47a
JG
675#if defined(CONFIG_XEN_PV)
676 unsigned long start_pfn, pages;
4dfe22f5 677 unsigned long pfn, extra_pfn_end;
262fc47a 678 unsigned int i;
1775826c 679
262fc47a
JG
680 for (i = 0; i < XEN_EXTRA_MEM_MAX_REGIONS; i++) {
681 pages = xen_extra_mem[i].n_pfns;
682 if (!pages)
683 continue;
8b5d44a5 684
262fc47a 685 start_pfn = xen_extra_mem[i].start_pfn;
de5a77d8 686
262fc47a
JG
687 /*
688 * If the amount of usable memory has been limited (e.g., with
689 * the 'mem' command line parameter), don't add pages beyond
690 * this limit.
691 */
692 extra_pfn_end = min(max_pfn, start_pfn + pages);
693
694 for (pfn = start_pfn; pfn < extra_pfn_end; pfn++)
695 balloon_append(pfn_to_page(pfn));
696
697 balloon_stats.total_pages += extra_pfn_end - start_pfn;
698 }
4fee9ad8 699#endif
262fc47a 700}
8b5d44a5
DV
701
702static int __init balloon_init(void)
703{
8480ed9c
JG
704 struct task_struct *task;
705
53d5522c 706 if (!xen_domain())
1775826c
JF
707 return -ENODEV;
708
283c0972 709 pr_info("Initialising balloon driver\n");
1775826c 710
4fee9ad8 711#ifdef CONFIG_XEN_PV
aa24411b
DV
712 balloon_stats.current_pages = xen_pv_domain()
713 ? min(xen_start_info->nr_pages - xen_released_pages, max_pfn)
c275a57f 714 : get_num_physpages();
4fee9ad8
VK
715#else
716 balloon_stats.current_pages = get_num_physpages();
717#endif
1775826c
JF
718 balloon_stats.target_pages = balloon_stats.current_pages;
719 balloon_stats.balloon_low = 0;
720 balloon_stats.balloon_high = 0;
de5a77d8 721 balloon_stats.total_pages = balloon_stats.current_pages;
1775826c 722
95d2ac4a
DK
723 balloon_stats.schedule_delay = 1;
724 balloon_stats.max_schedule_delay = 32;
725 balloon_stats.retry_count = 1;
a1078e82 726 balloon_stats.max_retry_count = 4;
1775826c 727
080e2be7 728#ifdef CONFIG_XEN_BALLOON_MEMORY_HOTPLUG
080e2be7
DK
729 set_online_page_callback(&xen_online_page);
730 register_memory_notifier(&xen_memory_nb);
9f17a75b 731 register_sysctl_init("xen/balloon", balloon_table);
080e2be7
DK
732#endif
733
262fc47a 734 balloon_add_regions();
1775826c 735
8480ed9c
JG
736 task = kthread_run(balloon_thread, NULL, "xen-balloon");
737 if (IS_ERR(task)) {
738 pr_err("xen-balloon thread could not be started, ballooning will not work!\n");
739 return PTR_ERR(task);
740 }
741
96edd61d
JG
742 /* Init the xen-balloon driver. */
743 xen_balloon_init();
744
1775826c
JF
745 return 0;
746}
1775826c 747subsys_initcall(balloon_init);
40fdea02
JG
748
749static int __init balloon_wait_finish(void)
750{
751 long credit, last_credit = 0;
752 unsigned long last_changed = 0;
753
754 if (!xen_domain())
755 return -ENODEV;
756
757 /* PV guests don't need to wait. */
758 if (xen_pv_domain() || !current_credit())
759 return 0;
760
761 pr_notice("Waiting for initial ballooning down having finished.\n");
762
763 while ((credit = current_credit()) < 0) {
764 if (credit != last_credit) {
765 last_changed = jiffies;
766 last_credit = credit;
767 }
768 if (balloon_state == BP_ECANCELED) {
769 pr_warn_once("Initial ballooning failed, %ld pages need to be freed.\n",
770 -credit);
b537bf42 771 if (time_is_before_eq_jiffies(last_changed + HZ * balloon_boot_timeout))
40fdea02
JG
772 panic("Initial ballooning failed!\n");
773 }
774
775 schedule_timeout_interruptible(HZ / 10);
776 }
777
778 pr_notice("Initial ballooning down finished.\n");
779
780 return 0;
781}
782late_initcall_sync(balloon_wait_finish);