]> git.proxmox.com Git - mirror_ubuntu-jammy-kernel.git/blame - drivers/xen/balloon.c
Merge tag 'kbuild-v5.15' of git://git.kernel.org/pub/scm/linux/kernel/git/masahiroy...
[mirror_ubuntu-jammy-kernel.git] / drivers / xen / balloon.c
CommitLineData
1775826c 1/******************************************************************************
1775826c
JF
2 * Xen balloon driver - enables returning/claiming memory to/from Xen.
3 *
4 * Copyright (c) 2003, B Dragovic
5 * Copyright (c) 2003-2004, M Williamson, K Fraser
6 * Copyright (c) 2005 Dan M. Smith, IBM Corporation
080e2be7
DK
7 * Copyright (c) 2010 Daniel Kiper
8 *
9 * Memory hotplug support was written by Daniel Kiper. Work on
10 * it was sponsored by Google under Google Summer of Code 2010
11 * program. Jeremy Fitzhardinge from Citrix was the mentor for
12 * this project.
1775826c
JF
13 *
14 * This program is free software; you can redistribute it and/or
15 * modify it under the terms of the GNU General Public License version 2
16 * as published by the Free Software Foundation; or, when distributed
17 * separately from the Linux kernel or incorporated into other
18 * software packages, subject to the following license:
19 *
20 * Permission is hereby granted, free of charge, to any person obtaining a copy
21 * of this source file (the "Software"), to deal in the Software without
22 * restriction, including without limitation the rights to use, copy, modify,
23 * merge, publish, distribute, sublicense, and/or sell copies of the Software,
24 * and to permit persons to whom the Software is furnished to do so, subject to
25 * the following conditions:
26 *
27 * The above copyright notice and this permission notice shall be included in
28 * all copies or substantial portions of the Software.
29 *
30 * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
31 * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
32 * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
33 * AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
34 * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING
35 * FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS
36 * IN THE SOFTWARE.
37 */
38
283c0972
JP
39#define pr_fmt(fmt) "xen:" KBUILD_MODNAME ": " fmt
40
cd9151e2 41#include <linux/cpu.h>
1775826c 42#include <linux/kernel.h>
1775826c 43#include <linux/sched.h>
5b825c3a 44#include <linux/cred.h>
1775826c
JF
45#include <linux/errno.h>
46#include <linux/mm.h>
57c8a661 47#include <linux/memblock.h>
1775826c
JF
48#include <linux/pagemap.h>
49#include <linux/highmem.h>
50#include <linux/mutex.h>
1775826c 51#include <linux/list.h>
5a0e3ad6 52#include <linux/gfp.h>
080e2be7
DK
53#include <linux/notifier.h>
54#include <linux/memory.h>
55#include <linux/memory_hotplug.h>
cd9151e2 56#include <linux/percpu-defs.h>
55b3da98 57#include <linux/slab.h>
1cf6a6c8 58#include <linux/sysctl.h>
1775826c 59
1775826c 60#include <asm/page.h>
1775826c
JF
61#include <asm/tlb.h>
62
ecbf29cd
JF
63#include <asm/xen/hypervisor.h>
64#include <asm/xen/hypercall.h>
1ccbf534
JF
65
66#include <xen/xen.h>
ecbf29cd 67#include <xen/interface/xen.h>
1775826c 68#include <xen/interface/memory.h>
803eb047 69#include <xen/balloon.h>
1775826c
JF
70#include <xen/features.h>
71#include <xen/page.h>
ae4c51a5 72#include <xen/mem-reservation.h>
1775826c 73
1cf6a6c8
DV
74static int xen_hotplug_unpopulated;
75
76#ifdef CONFIG_XEN_BALLOON_MEMORY_HOTPLUG
77
1cf6a6c8
DV
78static struct ctl_table balloon_table[] = {
79 {
80 .procname = "hotplug_unpopulated",
81 .data = &xen_hotplug_unpopulated,
82 .maxlen = sizeof(int),
83 .mode = 0644,
84 .proc_handler = proc_dointvec_minmax,
eec4844f
MC
85 .extra1 = SYSCTL_ZERO,
86 .extra2 = SYSCTL_ONE,
1cf6a6c8
DV
87 },
88 { }
89};
90
91static struct ctl_table balloon_root[] = {
92 {
93 .procname = "balloon",
94 .mode = 0555,
95 .child = balloon_table,
96 },
97 { }
98};
99
100static struct ctl_table xen_root[] = {
101 {
102 .procname = "xen",
103 .mode = 0555,
104 .child = balloon_root,
105 },
106 { }
107};
108
109#endif
110
30756c62
JG
111/*
112 * Use one extent per PAGE_SIZE to avoid to break down the page into
113 * multiple frame.
114 */
115#define EXTENT_ORDER (fls(XEN_PFN_PER_PAGE) - 1)
116
95d2ac4a
DK
117/*
118 * balloon_process() state:
119 *
120 * BP_DONE: done or nothing to do,
b2ac6aa8 121 * BP_WAIT: wait to be rescheduled,
95d2ac4a
DK
122 * BP_EAGAIN: error, go to sleep,
123 * BP_ECANCELED: error, balloon operation canceled.
124 */
1775826c 125
95d2ac4a
DK
126enum bp_state {
127 BP_DONE,
b2ac6aa8 128 BP_WAIT,
95d2ac4a
DK
129 BP_EAGAIN,
130 BP_ECANCELED
1775826c
JF
131};
132
1775826c 133
1775826c 134static DEFINE_MUTEX(balloon_mutex);
1775826c 135
803eb047
DDG
136struct balloon_stats balloon_stats;
137EXPORT_SYMBOL_GPL(balloon_stats);
1775826c
JF
138
139/* We increase/decrease in batches which fit in a page */
3990dd27 140static xen_pfn_t frame_list[PAGE_SIZE / sizeof(xen_pfn_t)];
cd9151e2 141
1775826c 142
1775826c
JF
143/* List of ballooned pages, threaded through the mem_map array. */
144static LIST_HEAD(ballooned_pages);
1cf6a6c8 145static DECLARE_WAIT_QUEUE_HEAD(balloon_wq);
1775826c
JF
146
147/* Main work function, always executed in process context. */
148static void balloon_process(struct work_struct *work);
95170b2e 149static DECLARE_DELAYED_WORK(balloon_worker, balloon_process);
1775826c
JF
150
151/* When ballooning out (allocating memory to return to Xen) we don't really
152 want the kernel to try too hard since that can trigger the oom killer. */
153#define GFP_BALLOON \
154 (GFP_HIGHUSER | __GFP_NOWARN | __GFP_NORETRY | __GFP_NOMEMALLOC)
155
1775826c 156/* balloon_append: add the given page to the balloon. */
dde3285f 157static void balloon_append(struct page *page)
1775826c 158{
59b52f10
DH
159 __SetPageOffline(page);
160
1775826c
JF
161 /* Lowmem is re-populated first, so highmem pages go at list tail. */
162 if (PageHighMem(page)) {
163 list_add_tail(&page->lru, &ballooned_pages);
164 balloon_stats.balloon_high++;
1775826c
JF
165 } else {
166 list_add(&page->lru, &ballooned_pages);
167 balloon_stats.balloon_low++;
168 }
1cf6a6c8 169 wake_up(&balloon_wq);
9be4d457 170}
3d65c948 171
1775826c 172/* balloon_retrieve: rescue a page from the balloon, if it is not empty. */
81b286e0 173static struct page *balloon_retrieve(bool require_lowmem)
1775826c
JF
174{
175 struct page *page;
176
177 if (list_empty(&ballooned_pages))
178 return NULL;
179
81b286e0
DV
180 page = list_entry(ballooned_pages.next, struct page, lru);
181 if (require_lowmem && PageHighMem(page))
182 return NULL;
1775826c
JF
183 list_del(&page->lru);
184
3dcc0571 185 if (PageHighMem(page))
1775826c 186 balloon_stats.balloon_high--;
3dcc0571 187 else
1775826c
JF
188 balloon_stats.balloon_low--;
189
04ccbdc3 190 __ClearPageOffline(page);
1775826c
JF
191 return page;
192}
193
1775826c
JF
194static struct page *balloon_next_page(struct page *page)
195{
196 struct list_head *next = page->lru.next;
197 if (next == &ballooned_pages)
198 return NULL;
199 return list_entry(next, struct page, lru);
200}
201
95d2ac4a 202static enum bp_state update_schedule(enum bp_state state)
1775826c 203{
b2ac6aa8
DV
204 if (state == BP_WAIT)
205 return BP_WAIT;
206
fd8b7951
BO
207 if (state == BP_ECANCELED)
208 return BP_ECANCELED;
209
95d2ac4a
DK
210 if (state == BP_DONE) {
211 balloon_stats.schedule_delay = 1;
212 balloon_stats.retry_count = 1;
213 return BP_DONE;
214 }
215
95d2ac4a
DK
216 ++balloon_stats.retry_count;
217
218 if (balloon_stats.max_retry_count != RETRY_UNLIMITED &&
219 balloon_stats.retry_count > balloon_stats.max_retry_count) {
95d2ac4a
DK
220 balloon_stats.schedule_delay = 1;
221 balloon_stats.retry_count = 1;
222 return BP_ECANCELED;
223 }
224
225 balloon_stats.schedule_delay <<= 1;
226
227 if (balloon_stats.schedule_delay > balloon_stats.max_schedule_delay)
228 balloon_stats.schedule_delay = balloon_stats.max_schedule_delay;
229
230 return BP_EAGAIN;
1775826c
JF
231}
232
080e2be7 233#ifdef CONFIG_XEN_BALLOON_MEMORY_HOTPLUG
842775f1
RL
234static void release_memory_resource(struct resource *resource)
235{
236 if (!resource)
237 return;
238
239 /*
240 * No need to reset region to identity mapped since we now
241 * know that no I/O can be in this region
242 */
243 release_resource(resource);
244 kfree(resource);
245}
246
55b3da98
DV
247static struct resource *additional_memory_resource(phys_addr_t size)
248{
12366410
ID
249 struct resource *res;
250 int ret;
55b3da98
DV
251
252 res = kzalloc(sizeof(*res), GFP_KERNEL);
253 if (!res)
254 return NULL;
255
256 res->name = "System RAM";
782b8664 257 res->flags = IORESOURCE_SYSTEM_RAM | IORESOURCE_BUSY;
55b3da98 258
12366410
ID
259 ret = allocate_resource(&iomem_resource, res,
260 size, 0, -1,
261 PAGES_PER_SECTION * PAGE_SIZE, NULL, NULL);
262 if (ret < 0) {
263 pr_err("Cannot allocate new System RAM resource\n");
264 kfree(res);
265 return NULL;
55b3da98
DV
266 }
267
268 return res;
269}
270
b2ac6aa8 271static enum bp_state reserve_additional_memory(void)
080e2be7 272{
b2ac6aa8 273 long credit;
55b3da98 274 struct resource *resource;
080e2be7 275 int nid, rc;
55b3da98 276 unsigned long balloon_hotplug;
080e2be7 277
1cf6a6c8
DV
278 credit = balloon_stats.target_pages + balloon_stats.target_unpopulated
279 - balloon_stats.total_pages;
b2ac6aa8
DV
280
281 /*
282 * Already hotplugged enough pages? Wait for them to be
283 * onlined.
284 */
285 if (credit <= 0)
286 return BP_WAIT;
287
55b3da98
DV
288 balloon_hotplug = round_up(credit, PAGES_PER_SECTION);
289
290 resource = additional_memory_resource(balloon_hotplug * PAGE_SIZE);
291 if (!resource)
292 goto err;
293
294 nid = memory_add_physaddr_to_nid(resource->start);
080e2be7 295
3c56b3a1 296#ifdef CONFIG_XEN_HAVE_PVMMU
30756c62
JG
297 /*
298 * We don't support PV MMU when Linux and Xen is using
299 * different page granularity.
300 */
301 BUILD_BUG_ON(XEN_PAGE_SIZE != PAGE_SIZE);
302
3c56b3a1
JG
303 /*
304 * add_memory() will build page tables for the new memory so
305 * the p2m must contain invalid entries so the correct
306 * non-present PTEs will be written.
307 *
308 * If a failure occurs, the original (identity) p2m entries
309 * are not restored since this region is now known not to
310 * conflict with any devices.
311 */
312 if (!xen_feature(XENFEAT_auto_translated_physmap)) {
313 unsigned long pfn, i;
314
55b3da98 315 pfn = PFN_DOWN(resource->start);
3c56b3a1
JG
316 for (i = 0; i < balloon_hotplug; i++) {
317 if (!set_phys_to_machine(pfn + i, INVALID_P2M_ENTRY)) {
318 pr_warn("set_phys_to_machine() failed, no memory added\n");
55b3da98 319 goto err;
3c56b3a1
JG
320 }
321 }
322 }
323#endif
324
703fc13a
VK
325 /*
326 * add_memory_resource() will call online_pages() which in its turn
327 * will call xen_online_page() callback causing deadlock if we don't
328 * release balloon_mutex here. Unlocking here is safe because the
329 * callers drop the mutex before trying again.
330 */
331 mutex_unlock(&balloon_mutex);
8df1d0e4
DH
332 /* add_memory_resource() requires the device_hotplug lock */
333 lock_device_hotplug();
26011267 334 rc = add_memory_resource(nid, resource, MHP_MERGE_RESOURCE);
8df1d0e4 335 unlock_device_hotplug();
703fc13a
VK
336 mutex_lock(&balloon_mutex);
337
080e2be7 338 if (rc) {
3dcf6367 339 pr_warn("Cannot add additional memory (%i)\n", rc);
55b3da98 340 goto err;
080e2be7
DK
341 }
342
de5a77d8 343 balloon_stats.total_pages += balloon_hotplug;
080e2be7 344
b2ac6aa8 345 return BP_WAIT;
55b3da98
DV
346 err:
347 release_memory_resource(resource);
348 return BP_ECANCELED;
080e2be7
DK
349}
350
a9cd410a 351static void xen_online_page(struct page *page, unsigned int order)
080e2be7 352{
a9cd410a
AK
353 unsigned long i, size = (1 << order);
354 unsigned long start_pfn = page_to_pfn(page);
355 struct page *p;
080e2be7 356
a9cd410a 357 pr_debug("Online %lu pages starting at pfn 0x%lx\n", size, start_pfn);
080e2be7 358 mutex_lock(&balloon_mutex);
a9cd410a
AK
359 for (i = 0; i < size; i++) {
360 p = pfn_to_page(start_pfn + i);
dde3285f 361 balloon_append(p);
a9cd410a 362 }
080e2be7
DK
363 mutex_unlock(&balloon_mutex);
364}
365
366static int xen_memory_notifier(struct notifier_block *nb, unsigned long val, void *v)
367{
368 if (val == MEM_ONLINE)
369 schedule_delayed_work(&balloon_worker, 0);
370
371 return NOTIFY_OK;
372}
373
374static struct notifier_block xen_memory_nb = {
375 .notifier_call = xen_memory_notifier,
376 .priority = 0
377};
378#else
b2ac6aa8 379static enum bp_state reserve_additional_memory(void)
1775826c 380{
c673ec61
JG
381 balloon_stats.target_pages = balloon_stats.current_pages +
382 balloon_stats.target_unpopulated;
1cf6a6c8 383 return BP_ECANCELED;
1775826c 384}
de5a77d8 385#endif /* CONFIG_XEN_BALLOON_MEMORY_HOTPLUG */
1775826c 386
de5a77d8 387static long current_credit(void)
080e2be7 388{
de5a77d8 389 return balloon_stats.target_pages - balloon_stats.current_pages;
080e2be7
DK
390}
391
de5a77d8 392static bool balloon_is_inflated(void)
080e2be7 393{
de5a77d8 394 return balloon_stats.balloon_low || balloon_stats.balloon_high;
080e2be7 395}
080e2be7 396
95d2ac4a 397static enum bp_state increase_reservation(unsigned long nr_pages)
1775826c 398{
95d2ac4a 399 int rc;
30756c62 400 unsigned long i;
1775826c 401 struct page *page;
1775826c
JF
402
403 if (nr_pages > ARRAY_SIZE(frame_list))
404 nr_pages = ARRAY_SIZE(frame_list);
405
9346c2a8 406 page = list_first_entry_or_null(&ballooned_pages, struct page, lru);
1775826c 407 for (i = 0; i < nr_pages; i++) {
95d2ac4a
DK
408 if (!page) {
409 nr_pages = i;
410 break;
411 }
30756c62 412
30756c62 413 frame_list[i] = page_to_xen_pfn(page);
1775826c
JF
414 page = balloon_next_page(page);
415 }
416
ae4c51a5 417 rc = xenmem_reservation_increase(nr_pages, frame_list);
40095de1 418 if (rc <= 0)
95d2ac4a 419 return BP_EAGAIN;
1775826c 420
bc2c0303 421 for (i = 0; i < rc; i++) {
b6f30679 422 page = balloon_retrieve(false);
1775826c
JF
423 BUG_ON(page == NULL);
424
ae4c51a5 425 xenmem_reservation_va_mapping_update(1, &page, &frame_list[i]);
1775826c
JF
426
427 /* Relinquish the page back to the allocator. */
709613ad 428 free_reserved_page(page);
1775826c
JF
429 }
430
bc2c0303 431 balloon_stats.current_pages += rc;
1775826c 432
95d2ac4a 433 return BP_DONE;
1775826c
JF
434}
435
b6f30679 436static enum bp_state decrease_reservation(unsigned long nr_pages, gfp_t gfp)
1775826c 437{
95d2ac4a 438 enum bp_state state = BP_DONE;
30756c62
JG
439 unsigned long i;
440 struct page *page, *tmp;
1775826c 441 int ret;
30756c62 442 LIST_HEAD(pages);
1775826c
JF
443
444 if (nr_pages > ARRAY_SIZE(frame_list))
445 nr_pages = ARRAY_SIZE(frame_list);
446
447 for (i = 0; i < nr_pages; i++) {
fce92683
LN
448 page = alloc_page(gfp);
449 if (page == NULL) {
1775826c 450 nr_pages = i;
95d2ac4a 451 state = BP_EAGAIN;
1775826c
JF
452 break;
453 }
709613ad 454 adjust_managed_page_count(page, -1);
ae4c51a5 455 xenmem_reservation_scrub_page(page);
30756c62 456 list_add(&page->lru, &pages);
09ed3d5b 457 }
1775826c 458
09ed3d5b
WL
459 /*
460 * Ensure that ballooned highmem pages don't have kmaps.
461 *
462 * Do this before changing the p2m as kmap_flush_unused()
463 * reads PTEs to obtain pages (and hence needs the original
464 * p2m entry).
465 */
466 kmap_flush_unused();
467
30756c62
JG
468 /*
469 * Setup the frame, update direct mapping, invalidate P2M,
470 * and add to balloon.
471 */
472 i = 0;
473 list_for_each_entry_safe(page, tmp, &pages, lru) {
30756c62 474 frame_list[i++] = xen_page_to_gfn(page);
1058a75f 475
ae4c51a5 476 xenmem_reservation_va_mapping_reset(1, &page);
30756c62 477
30756c62 478 list_del(&page->lru);
24f69373 479
09ed3d5b 480 balloon_append(page);
1775826c
JF
481 }
482
24f69373 483 flush_tlb_all();
2bad07ce 484
ae4c51a5 485 ret = xenmem_reservation_decrease(nr_pages, frame_list);
1775826c
JF
486 BUG_ON(ret != nr_pages);
487
488 balloon_stats.current_pages -= nr_pages;
1775826c 489
95d2ac4a 490 return state;
1775826c
JF
491}
492
493/*
929423fa 494 * As this is a work item it is guaranteed to run as a single instance only.
1775826c
JF
495 * We may of course race updates of the target counts (which are protected
496 * by the balloon lock), or with changes to the Xen hard limit, but we will
497 * recover from these in time.
498 */
499static void balloon_process(struct work_struct *work)
500{
95d2ac4a 501 enum bp_state state = BP_DONE;
1775826c
JF
502 long credit;
503
1775826c
JF
504
505 do {
929423fa
JG
506 mutex_lock(&balloon_mutex);
507
83be7e52 508 credit = current_credit();
95d2ac4a 509
080e2be7
DK
510 if (credit > 0) {
511 if (balloon_is_inflated())
512 state = increase_reservation(credit);
513 else
b2ac6aa8 514 state = reserve_additional_memory();
080e2be7 515 }
95d2ac4a 516
a1078e82
JG
517 if (credit < 0) {
518 long n_pages;
519
520 n_pages = min(-credit, si_mem_available());
521 state = decrease_reservation(n_pages, GFP_BALLOON);
522 if (state == BP_DONE && n_pages != -credit &&
523 n_pages < totalreserve_pages)
524 state = BP_EAGAIN;
525 }
95d2ac4a
DK
526
527 state = update_schedule(state);
1775826c 528
929423fa
JG
529 mutex_unlock(&balloon_mutex);
530
531 cond_resched();
532
95d2ac4a 533 } while (credit && state == BP_DONE);
1775826c
JF
534
535 /* Schedule more work if there is some still to be done. */
95d2ac4a
DK
536 if (state == BP_EAGAIN)
537 schedule_delayed_work(&balloon_worker, balloon_stats.schedule_delay * HZ);
1775826c
JF
538}
539
540/* Resets the Xen limit, sets new target, and kicks off processing. */
803eb047 541void balloon_set_new_target(unsigned long target)
1775826c
JF
542{
543 /* No need for lock. Not read-modify-write updates. */
1775826c 544 balloon_stats.target_pages = target;
95170b2e 545 schedule_delayed_work(&balloon_worker, 0);
1775826c 546}
803eb047 547EXPORT_SYMBOL_GPL(balloon_set_new_target);
1775826c 548
1cf6a6c8
DV
549static int add_ballooned_pages(int nr_pages)
550{
551 enum bp_state st;
552
553 if (xen_hotplug_unpopulated) {
554 st = reserve_additional_memory();
555 if (st != BP_ECANCELED) {
88a479ff
RPM
556 int rc;
557
1cf6a6c8 558 mutex_unlock(&balloon_mutex);
88a479ff 559 rc = wait_event_interruptible(balloon_wq,
1cf6a6c8
DV
560 !list_empty(&ballooned_pages));
561 mutex_lock(&balloon_mutex);
88a479ff 562 return rc ? -ENOMEM : 0;
1cf6a6c8
DV
563 }
564 }
565
a1078e82
JG
566 if (si_mem_available() < nr_pages)
567 return -ENOMEM;
568
1cf6a6c8
DV
569 st = decrease_reservation(nr_pages, GFP_USER);
570 if (st != BP_DONE)
571 return -ENOMEM;
572
573 return 0;
574}
575
b6f30679
KRW
576/**
577 * alloc_xenballooned_pages - get pages that have been ballooned out
578 * @nr_pages: Number of pages to get
579 * @pages: pages returned
580 * @return 0 on success, error otherwise
581 */
81b286e0 582int alloc_xenballooned_pages(int nr_pages, struct page **pages)
1775826c 583{
b6f30679 584 int pgno = 0;
e882dc9c 585 struct page *page;
1cf6a6c8
DV
586 int ret;
587
b6f30679 588 mutex_lock(&balloon_mutex);
1cf6a6c8
DV
589
590 balloon_stats.target_unpopulated += nr_pages;
591
b6f30679 592 while (pgno < nr_pages) {
81b286e0
DV
593 page = balloon_retrieve(true);
594 if (page) {
b6f30679 595 pages[pgno++] = page;
4a69c909 596#ifdef CONFIG_XEN_HAVE_PVMMU
30756c62
JG
597 /*
598 * We don't support PV MMU when Linux and Xen is using
599 * different page granularity.
600 */
601 BUILD_BUG_ON(XEN_PAGE_SIZE != PAGE_SIZE);
602
b194da25
BO
603 if (!xen_feature(XENFEAT_auto_translated_physmap)) {
604 ret = xen_alloc_p2m_entry(page_to_pfn(page));
605 if (ret < 0)
606 goto out_undo;
607 }
4a69c909 608#endif
b6f30679 609 } else {
1cf6a6c8
DV
610 ret = add_ballooned_pages(nr_pages - pgno);
611 if (ret < 0)
b6f30679
KRW
612 goto out_undo;
613 }
1775826c 614 }
b6f30679
KRW
615 mutex_unlock(&balloon_mutex);
616 return 0;
617 out_undo:
b6f30679 618 mutex_unlock(&balloon_mutex);
1cf6a6c8 619 free_xenballooned_pages(pgno, pages);
1951fa33
RPM
620 /*
621 * NB: free_xenballooned_pages will only subtract pgno pages, but since
622 * target_unpopulated is incremented with nr_pages at the start we need
623 * to remove the remaining ones also, or accounting will be screwed.
624 */
625 balloon_stats.target_unpopulated -= nr_pages - pgno;
1cf6a6c8 626 return ret;
1775826c 627}
b6f30679 628EXPORT_SYMBOL(alloc_xenballooned_pages);
1775826c 629
b6f30679
KRW
630/**
631 * free_xenballooned_pages - return pages retrieved with get_ballooned_pages
632 * @nr_pages: Number of pages
633 * @pages: pages to return
634 */
e882dc9c 635void free_xenballooned_pages(int nr_pages, struct page **pages)
1775826c 636{
b6f30679 637 int i;
1775826c 638
b6f30679 639 mutex_lock(&balloon_mutex);
1775826c 640
b6f30679 641 for (i = 0; i < nr_pages; i++) {
59b52f10 642 if (pages[i])
b6f30679
KRW
643 balloon_append(pages[i]);
644 }
645
1cf6a6c8
DV
646 balloon_stats.target_unpopulated -= nr_pages;
647
b6f30679 648 /* The balloon may be too large now. Shrink it if needed. */
83be7e52 649 if (current_credit())
b6f30679 650 schedule_delayed_work(&balloon_worker, 0);
1775826c 651
b6f30679
KRW
652 mutex_unlock(&balloon_mutex);
653}
654EXPORT_SYMBOL(free_xenballooned_pages);
1775826c 655
9e2369c0 656#if defined(CONFIG_XEN_PV) && !defined(CONFIG_XEN_UNPOPULATED_ALLOC)
8b5d44a5
DV
657static void __init balloon_add_region(unsigned long start_pfn,
658 unsigned long pages)
1775826c 659{
4dfe22f5 660 unsigned long pfn, extra_pfn_end;
1775826c 661
8b5d44a5
DV
662 /*
663 * If the amount of usable memory has been limited (e.g., with
664 * the 'mem' command line parameter), don't add pages beyond
665 * this limit.
666 */
667 extra_pfn_end = min(max_pfn, start_pfn + pages);
668
669 for (pfn = start_pfn; pfn < extra_pfn_end; pfn++) {
8b5d44a5
DV
670 /* totalram_pages and totalhigh_pages do not
671 include the boot-time balloon extension, so
672 don't subtract from it. */
59b52f10 673 balloon_append(pfn_to_page(pfn));
8b5d44a5 674 }
de5a77d8
DV
675
676 balloon_stats.total_pages += extra_pfn_end - start_pfn;
8b5d44a5 677}
4fee9ad8 678#endif
8b5d44a5
DV
679
680static int __init balloon_init(void)
681{
53d5522c 682 if (!xen_domain())
1775826c
JF
683 return -ENODEV;
684
283c0972 685 pr_info("Initialising balloon driver\n");
1775826c 686
4fee9ad8 687#ifdef CONFIG_XEN_PV
aa24411b
DV
688 balloon_stats.current_pages = xen_pv_domain()
689 ? min(xen_start_info->nr_pages - xen_released_pages, max_pfn)
c275a57f 690 : get_num_physpages();
4fee9ad8
VK
691#else
692 balloon_stats.current_pages = get_num_physpages();
693#endif
1775826c
JF
694 balloon_stats.target_pages = balloon_stats.current_pages;
695 balloon_stats.balloon_low = 0;
696 balloon_stats.balloon_high = 0;
de5a77d8 697 balloon_stats.total_pages = balloon_stats.current_pages;
1775826c 698
95d2ac4a
DK
699 balloon_stats.schedule_delay = 1;
700 balloon_stats.max_schedule_delay = 32;
701 balloon_stats.retry_count = 1;
a1078e82 702 balloon_stats.max_retry_count = 4;
1775826c 703
080e2be7 704#ifdef CONFIG_XEN_BALLOON_MEMORY_HOTPLUG
080e2be7
DK
705 set_online_page_callback(&xen_online_page);
706 register_memory_notifier(&xen_memory_nb);
1cf6a6c8 707 register_sysctl_table(xen_root);
080e2be7
DK
708#endif
709
9e2369c0 710#if defined(CONFIG_XEN_PV) && !defined(CONFIG_XEN_UNPOPULATED_ALLOC)
4fee9ad8
VK
711 {
712 int i;
713
714 /*
715 * Initialize the balloon with pages from the extra memory
716 * regions (see arch/x86/xen/setup.c).
717 */
718 for (i = 0; i < XEN_EXTRA_MEM_MAX_REGIONS; i++)
719 if (xen_extra_mem[i].n_pfns)
720 balloon_add_region(xen_extra_mem[i].start_pfn,
721 xen_extra_mem[i].n_pfns);
722 }
723#endif
1775826c 724
96edd61d
JG
725 /* Init the xen-balloon driver. */
726 xen_balloon_init();
727
1775826c
JF
728 return 0;
729}
1775826c 730subsys_initcall(balloon_init);