]>
Commit | Line | Data |
---|---|---|
1775826c | 1 | /****************************************************************************** |
1775826c JF |
2 | * Xen balloon driver - enables returning/claiming memory to/from Xen. |
3 | * | |
4 | * Copyright (c) 2003, B Dragovic | |
5 | * Copyright (c) 2003-2004, M Williamson, K Fraser | |
6 | * Copyright (c) 2005 Dan M. Smith, IBM Corporation | |
080e2be7 DK |
7 | * Copyright (c) 2010 Daniel Kiper |
8 | * | |
9 | * Memory hotplug support was written by Daniel Kiper. Work on | |
10 | * it was sponsored by Google under Google Summer of Code 2010 | |
11 | * program. Jeremy Fitzhardinge from Citrix was the mentor for | |
12 | * this project. | |
1775826c JF |
13 | * |
14 | * This program is free software; you can redistribute it and/or | |
15 | * modify it under the terms of the GNU General Public License version 2 | |
16 | * as published by the Free Software Foundation; or, when distributed | |
17 | * separately from the Linux kernel or incorporated into other | |
18 | * software packages, subject to the following license: | |
19 | * | |
20 | * Permission is hereby granted, free of charge, to any person obtaining a copy | |
21 | * of this source file (the "Software"), to deal in the Software without | |
22 | * restriction, including without limitation the rights to use, copy, modify, | |
23 | * merge, publish, distribute, sublicense, and/or sell copies of the Software, | |
24 | * and to permit persons to whom the Software is furnished to do so, subject to | |
25 | * the following conditions: | |
26 | * | |
27 | * The above copyright notice and this permission notice shall be included in | |
28 | * all copies or substantial portions of the Software. | |
29 | * | |
30 | * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR | |
31 | * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, | |
32 | * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE | |
33 | * AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER | |
34 | * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING | |
35 | * FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS | |
36 | * IN THE SOFTWARE. | |
37 | */ | |
38 | ||
283c0972 JP |
39 | #define pr_fmt(fmt) "xen:" KBUILD_MODNAME ": " fmt |
40 | ||
cd9151e2 | 41 | #include <linux/cpu.h> |
1775826c | 42 | #include <linux/kernel.h> |
1775826c | 43 | #include <linux/sched.h> |
5b825c3a | 44 | #include <linux/cred.h> |
1775826c JF |
45 | #include <linux/errno.h> |
46 | #include <linux/mm.h> | |
47 | #include <linux/bootmem.h> | |
48 | #include <linux/pagemap.h> | |
49 | #include <linux/highmem.h> | |
50 | #include <linux/mutex.h> | |
1775826c | 51 | #include <linux/list.h> |
5a0e3ad6 | 52 | #include <linux/gfp.h> |
080e2be7 DK |
53 | #include <linux/notifier.h> |
54 | #include <linux/memory.h> | |
55 | #include <linux/memory_hotplug.h> | |
cd9151e2 | 56 | #include <linux/percpu-defs.h> |
55b3da98 | 57 | #include <linux/slab.h> |
1cf6a6c8 | 58 | #include <linux/sysctl.h> |
1775826c | 59 | |
1775826c JF |
60 | #include <asm/page.h> |
61 | #include <asm/pgalloc.h> | |
62 | #include <asm/pgtable.h> | |
1775826c JF |
63 | #include <asm/tlb.h> |
64 | ||
ecbf29cd JF |
65 | #include <asm/xen/hypervisor.h> |
66 | #include <asm/xen/hypercall.h> | |
1ccbf534 JF |
67 | |
68 | #include <xen/xen.h> | |
ecbf29cd | 69 | #include <xen/interface/xen.h> |
1775826c | 70 | #include <xen/interface/memory.h> |
803eb047 | 71 | #include <xen/balloon.h> |
1775826c JF |
72 | #include <xen/features.h> |
73 | #include <xen/page.h> | |
74 | ||
1cf6a6c8 DV |
75 | static int xen_hotplug_unpopulated; |
76 | ||
77 | #ifdef CONFIG_XEN_BALLOON_MEMORY_HOTPLUG | |
78 | ||
79 | static int zero; | |
80 | static int one = 1; | |
81 | ||
82 | static struct ctl_table balloon_table[] = { | |
83 | { | |
84 | .procname = "hotplug_unpopulated", | |
85 | .data = &xen_hotplug_unpopulated, | |
86 | .maxlen = sizeof(int), | |
87 | .mode = 0644, | |
88 | .proc_handler = proc_dointvec_minmax, | |
89 | .extra1 = &zero, | |
90 | .extra2 = &one, | |
91 | }, | |
92 | { } | |
93 | }; | |
94 | ||
95 | static struct ctl_table balloon_root[] = { | |
96 | { | |
97 | .procname = "balloon", | |
98 | .mode = 0555, | |
99 | .child = balloon_table, | |
100 | }, | |
101 | { } | |
102 | }; | |
103 | ||
104 | static struct ctl_table xen_root[] = { | |
105 | { | |
106 | .procname = "xen", | |
107 | .mode = 0555, | |
108 | .child = balloon_root, | |
109 | }, | |
110 | { } | |
111 | }; | |
112 | ||
113 | #endif | |
114 | ||
30756c62 JG |
115 | /* |
116 | * Use one extent per PAGE_SIZE to avoid to break down the page into | |
117 | * multiple frame. | |
118 | */ | |
119 | #define EXTENT_ORDER (fls(XEN_PFN_PER_PAGE) - 1) | |
120 | ||
95d2ac4a DK |
121 | /* |
122 | * balloon_process() state: | |
123 | * | |
124 | * BP_DONE: done or nothing to do, | |
b2ac6aa8 | 125 | * BP_WAIT: wait to be rescheduled, |
95d2ac4a DK |
126 | * BP_EAGAIN: error, go to sleep, |
127 | * BP_ECANCELED: error, balloon operation canceled. | |
128 | */ | |
1775826c | 129 | |
95d2ac4a DK |
130 | enum bp_state { |
131 | BP_DONE, | |
b2ac6aa8 | 132 | BP_WAIT, |
95d2ac4a DK |
133 | BP_EAGAIN, |
134 | BP_ECANCELED | |
1775826c JF |
135 | }; |
136 | ||
1775826c | 137 | |
1775826c | 138 | static DEFINE_MUTEX(balloon_mutex); |
1775826c | 139 | |
803eb047 DDG |
140 | struct balloon_stats balloon_stats; |
141 | EXPORT_SYMBOL_GPL(balloon_stats); | |
1775826c JF |
142 | |
143 | /* We increase/decrease in batches which fit in a page */ | |
3990dd27 | 144 | static xen_pfn_t frame_list[PAGE_SIZE / sizeof(xen_pfn_t)]; |
cd9151e2 | 145 | |
1775826c | 146 | |
1775826c JF |
147 | /* List of ballooned pages, threaded through the mem_map array. */ |
148 | static LIST_HEAD(ballooned_pages); | |
1cf6a6c8 | 149 | static DECLARE_WAIT_QUEUE_HEAD(balloon_wq); |
1775826c JF |
150 | |
151 | /* Main work function, always executed in process context. */ | |
152 | static void balloon_process(struct work_struct *work); | |
95170b2e | 153 | static DECLARE_DELAYED_WORK(balloon_worker, balloon_process); |
1775826c JF |
154 | |
155 | /* When ballooning out (allocating memory to return to Xen) we don't really | |
156 | want the kernel to try too hard since that can trigger the oom killer. */ | |
157 | #define GFP_BALLOON \ | |
158 | (GFP_HIGHUSER | __GFP_NOWARN | __GFP_NORETRY | __GFP_NOMEMALLOC) | |
159 | ||
160 | static void scrub_page(struct page *page) | |
161 | { | |
162 | #ifdef CONFIG_XEN_SCRUB_PAGES | |
26a3e991 | 163 | clear_highpage(page); |
1775826c JF |
164 | #endif |
165 | } | |
166 | ||
167 | /* balloon_append: add the given page to the balloon. */ | |
9be4d457 | 168 | static void __balloon_append(struct page *page) |
1775826c JF |
169 | { |
170 | /* Lowmem is re-populated first, so highmem pages go at list tail. */ | |
171 | if (PageHighMem(page)) { | |
172 | list_add_tail(&page->lru, &ballooned_pages); | |
173 | balloon_stats.balloon_high++; | |
1775826c JF |
174 | } else { |
175 | list_add(&page->lru, &ballooned_pages); | |
176 | balloon_stats.balloon_low++; | |
177 | } | |
1cf6a6c8 | 178 | wake_up(&balloon_wq); |
9be4d457 | 179 | } |
3d65c948 | 180 | |
9be4d457 JF |
181 | static void balloon_append(struct page *page) |
182 | { | |
183 | __balloon_append(page); | |
1775826c JF |
184 | } |
185 | ||
186 | /* balloon_retrieve: rescue a page from the balloon, if it is not empty. */ | |
81b286e0 | 187 | static struct page *balloon_retrieve(bool require_lowmem) |
1775826c JF |
188 | { |
189 | struct page *page; | |
190 | ||
191 | if (list_empty(&ballooned_pages)) | |
192 | return NULL; | |
193 | ||
81b286e0 DV |
194 | page = list_entry(ballooned_pages.next, struct page, lru); |
195 | if (require_lowmem && PageHighMem(page)) | |
196 | return NULL; | |
1775826c JF |
197 | list_del(&page->lru); |
198 | ||
3dcc0571 | 199 | if (PageHighMem(page)) |
1775826c | 200 | balloon_stats.balloon_high--; |
3dcc0571 | 201 | else |
1775826c JF |
202 | balloon_stats.balloon_low--; |
203 | ||
204 | return page; | |
205 | } | |
206 | ||
1775826c JF |
207 | static struct page *balloon_next_page(struct page *page) |
208 | { | |
209 | struct list_head *next = page->lru.next; | |
210 | if (next == &ballooned_pages) | |
211 | return NULL; | |
212 | return list_entry(next, struct page, lru); | |
213 | } | |
214 | ||
95d2ac4a | 215 | static enum bp_state update_schedule(enum bp_state state) |
1775826c | 216 | { |
b2ac6aa8 DV |
217 | if (state == BP_WAIT) |
218 | return BP_WAIT; | |
219 | ||
fd8b7951 BO |
220 | if (state == BP_ECANCELED) |
221 | return BP_ECANCELED; | |
222 | ||
95d2ac4a DK |
223 | if (state == BP_DONE) { |
224 | balloon_stats.schedule_delay = 1; | |
225 | balloon_stats.retry_count = 1; | |
226 | return BP_DONE; | |
227 | } | |
228 | ||
95d2ac4a DK |
229 | ++balloon_stats.retry_count; |
230 | ||
231 | if (balloon_stats.max_retry_count != RETRY_UNLIMITED && | |
232 | balloon_stats.retry_count > balloon_stats.max_retry_count) { | |
95d2ac4a DK |
233 | balloon_stats.schedule_delay = 1; |
234 | balloon_stats.retry_count = 1; | |
235 | return BP_ECANCELED; | |
236 | } | |
237 | ||
238 | balloon_stats.schedule_delay <<= 1; | |
239 | ||
240 | if (balloon_stats.schedule_delay > balloon_stats.max_schedule_delay) | |
241 | balloon_stats.schedule_delay = balloon_stats.max_schedule_delay; | |
242 | ||
243 | return BP_EAGAIN; | |
1775826c JF |
244 | } |
245 | ||
080e2be7 | 246 | #ifdef CONFIG_XEN_BALLOON_MEMORY_HOTPLUG |
842775f1 RL |
247 | static void release_memory_resource(struct resource *resource) |
248 | { | |
249 | if (!resource) | |
250 | return; | |
251 | ||
252 | /* | |
253 | * No need to reset region to identity mapped since we now | |
254 | * know that no I/O can be in this region | |
255 | */ | |
256 | release_resource(resource); | |
257 | kfree(resource); | |
258 | } | |
259 | ||
55b3da98 DV |
260 | static struct resource *additional_memory_resource(phys_addr_t size) |
261 | { | |
262 | struct resource *res; | |
263 | int ret; | |
264 | ||
265 | res = kzalloc(sizeof(*res), GFP_KERNEL); | |
266 | if (!res) | |
267 | return NULL; | |
268 | ||
269 | res->name = "System RAM"; | |
782b8664 | 270 | res->flags = IORESOURCE_SYSTEM_RAM | IORESOURCE_BUSY; |
55b3da98 DV |
271 | |
272 | ret = allocate_resource(&iomem_resource, res, | |
273 | size, 0, -1, | |
274 | PAGES_PER_SECTION * PAGE_SIZE, NULL, NULL); | |
275 | if (ret < 0) { | |
276 | pr_err("Cannot allocate new System RAM resource\n"); | |
277 | kfree(res); | |
278 | return NULL; | |
279 | } | |
280 | ||
dfd74a1e RL |
281 | #ifdef CONFIG_SPARSEMEM |
282 | { | |
283 | unsigned long limit = 1UL << (MAX_PHYSMEM_BITS - PAGE_SHIFT); | |
284 | unsigned long pfn = res->start >> PAGE_SHIFT; | |
285 | ||
286 | if (pfn > limit) { | |
287 | pr_err("New System RAM resource outside addressable RAM (%lu > %lu)\n", | |
288 | pfn, limit); | |
289 | release_memory_resource(res); | |
290 | return NULL; | |
291 | } | |
292 | } | |
293 | #endif | |
294 | ||
55b3da98 DV |
295 | return res; |
296 | } | |
297 | ||
b2ac6aa8 | 298 | static enum bp_state reserve_additional_memory(void) |
080e2be7 | 299 | { |
b2ac6aa8 | 300 | long credit; |
55b3da98 | 301 | struct resource *resource; |
080e2be7 | 302 | int nid, rc; |
55b3da98 | 303 | unsigned long balloon_hotplug; |
080e2be7 | 304 | |
1cf6a6c8 DV |
305 | credit = balloon_stats.target_pages + balloon_stats.target_unpopulated |
306 | - balloon_stats.total_pages; | |
b2ac6aa8 DV |
307 | |
308 | /* | |
309 | * Already hotplugged enough pages? Wait for them to be | |
310 | * onlined. | |
311 | */ | |
312 | if (credit <= 0) | |
313 | return BP_WAIT; | |
314 | ||
55b3da98 DV |
315 | balloon_hotplug = round_up(credit, PAGES_PER_SECTION); |
316 | ||
317 | resource = additional_memory_resource(balloon_hotplug * PAGE_SIZE); | |
318 | if (!resource) | |
319 | goto err; | |
320 | ||
321 | nid = memory_add_physaddr_to_nid(resource->start); | |
080e2be7 | 322 | |
3c56b3a1 | 323 | #ifdef CONFIG_XEN_HAVE_PVMMU |
30756c62 JG |
324 | /* |
325 | * We don't support PV MMU when Linux and Xen is using | |
326 | * different page granularity. | |
327 | */ | |
328 | BUILD_BUG_ON(XEN_PAGE_SIZE != PAGE_SIZE); | |
329 | ||
3c56b3a1 JG |
330 | /* |
331 | * add_memory() will build page tables for the new memory so | |
332 | * the p2m must contain invalid entries so the correct | |
333 | * non-present PTEs will be written. | |
334 | * | |
335 | * If a failure occurs, the original (identity) p2m entries | |
336 | * are not restored since this region is now known not to | |
337 | * conflict with any devices. | |
338 | */ | |
339 | if (!xen_feature(XENFEAT_auto_translated_physmap)) { | |
340 | unsigned long pfn, i; | |
341 | ||
55b3da98 | 342 | pfn = PFN_DOWN(resource->start); |
3c56b3a1 JG |
343 | for (i = 0; i < balloon_hotplug; i++) { |
344 | if (!set_phys_to_machine(pfn + i, INVALID_P2M_ENTRY)) { | |
345 | pr_warn("set_phys_to_machine() failed, no memory added\n"); | |
55b3da98 | 346 | goto err; |
3c56b3a1 JG |
347 | } |
348 | } | |
349 | } | |
350 | #endif | |
351 | ||
703fc13a VK |
352 | /* |
353 | * add_memory_resource() will call online_pages() which in its turn | |
354 | * will call xen_online_page() callback causing deadlock if we don't | |
355 | * release balloon_mutex here. Unlocking here is safe because the | |
356 | * callers drop the mutex before trying again. | |
357 | */ | |
358 | mutex_unlock(&balloon_mutex); | |
359 | rc = add_memory_resource(nid, resource, memhp_auto_online); | |
360 | mutex_lock(&balloon_mutex); | |
361 | ||
080e2be7 | 362 | if (rc) { |
3dcf6367 | 363 | pr_warn("Cannot add additional memory (%i)\n", rc); |
55b3da98 | 364 | goto err; |
080e2be7 DK |
365 | } |
366 | ||
de5a77d8 | 367 | balloon_stats.total_pages += balloon_hotplug; |
080e2be7 | 368 | |
b2ac6aa8 | 369 | return BP_WAIT; |
55b3da98 DV |
370 | err: |
371 | release_memory_resource(resource); | |
372 | return BP_ECANCELED; | |
080e2be7 DK |
373 | } |
374 | ||
375 | static void xen_online_page(struct page *page) | |
376 | { | |
377 | __online_page_set_limits(page); | |
378 | ||
379 | mutex_lock(&balloon_mutex); | |
380 | ||
381 | __balloon_append(page); | |
382 | ||
080e2be7 DK |
383 | mutex_unlock(&balloon_mutex); |
384 | } | |
385 | ||
386 | static int xen_memory_notifier(struct notifier_block *nb, unsigned long val, void *v) | |
387 | { | |
388 | if (val == MEM_ONLINE) | |
389 | schedule_delayed_work(&balloon_worker, 0); | |
390 | ||
391 | return NOTIFY_OK; | |
392 | } | |
393 | ||
394 | static struct notifier_block xen_memory_nb = { | |
395 | .notifier_call = xen_memory_notifier, | |
396 | .priority = 0 | |
397 | }; | |
398 | #else | |
b2ac6aa8 | 399 | static enum bp_state reserve_additional_memory(void) |
1775826c | 400 | { |
de5a77d8 | 401 | balloon_stats.target_pages = balloon_stats.current_pages; |
1cf6a6c8 | 402 | return BP_ECANCELED; |
1775826c | 403 | } |
de5a77d8 | 404 | #endif /* CONFIG_XEN_BALLOON_MEMORY_HOTPLUG */ |
1775826c | 405 | |
de5a77d8 | 406 | static long current_credit(void) |
080e2be7 | 407 | { |
de5a77d8 | 408 | return balloon_stats.target_pages - balloon_stats.current_pages; |
080e2be7 DK |
409 | } |
410 | ||
de5a77d8 | 411 | static bool balloon_is_inflated(void) |
080e2be7 | 412 | { |
de5a77d8 | 413 | return balloon_stats.balloon_low || balloon_stats.balloon_high; |
080e2be7 | 414 | } |
080e2be7 | 415 | |
95d2ac4a | 416 | static enum bp_state increase_reservation(unsigned long nr_pages) |
1775826c | 417 | { |
95d2ac4a | 418 | int rc; |
30756c62 | 419 | unsigned long i; |
1775826c | 420 | struct page *page; |
1775826c JF |
421 | struct xen_memory_reservation reservation = { |
422 | .address_bits = 0, | |
30756c62 | 423 | .extent_order = EXTENT_ORDER, |
1775826c JF |
424 | .domid = DOMID_SELF |
425 | }; | |
426 | ||
427 | if (nr_pages > ARRAY_SIZE(frame_list)) | |
428 | nr_pages = ARRAY_SIZE(frame_list); | |
429 | ||
9346c2a8 | 430 | page = list_first_entry_or_null(&ballooned_pages, struct page, lru); |
1775826c | 431 | for (i = 0; i < nr_pages; i++) { |
95d2ac4a DK |
432 | if (!page) { |
433 | nr_pages = i; | |
434 | break; | |
435 | } | |
30756c62 JG |
436 | |
437 | /* XENMEM_populate_physmap requires a PFN based on Xen | |
438 | * granularity. | |
439 | */ | |
440 | frame_list[i] = page_to_xen_pfn(page); | |
1775826c JF |
441 | page = balloon_next_page(page); |
442 | } | |
443 | ||
a90971eb | 444 | set_xen_guest_handle(reservation.extent_start, frame_list); |
fde28e8f JF |
445 | reservation.nr_extents = nr_pages; |
446 | rc = HYPERVISOR_memory_op(XENMEM_populate_physmap, &reservation); | |
40095de1 | 447 | if (rc <= 0) |
95d2ac4a | 448 | return BP_EAGAIN; |
1775826c | 449 | |
bc2c0303 | 450 | for (i = 0; i < rc; i++) { |
b6f30679 | 451 | page = balloon_retrieve(false); |
1775826c JF |
452 | BUG_ON(page == NULL); |
453 | ||
c2374bf5 | 454 | #ifdef CONFIG_XEN_HAVE_PVMMU |
30756c62 JG |
455 | /* |
456 | * We don't support PV MMU when Linux and Xen is using | |
457 | * different page granularity. | |
458 | */ | |
459 | BUILD_BUG_ON(XEN_PAGE_SIZE != PAGE_SIZE); | |
460 | ||
c1d15f5c | 461 | if (!xen_feature(XENFEAT_auto_translated_physmap)) { |
30756c62 JG |
462 | unsigned long pfn = page_to_pfn(page); |
463 | ||
c1d15f5c SS |
464 | set_phys_to_machine(pfn, frame_list[i]); |
465 | ||
466 | /* Link back into the page tables if not highmem. */ | |
467 | if (!PageHighMem(page)) { | |
468 | int ret; | |
469 | ret = HYPERVISOR_update_va_mapping( | |
470 | (unsigned long)__va(pfn << PAGE_SHIFT), | |
471 | mfn_pte(frame_list[i], PAGE_KERNEL), | |
472 | 0); | |
473 | BUG_ON(ret); | |
474 | } | |
1775826c | 475 | } |
c2374bf5 | 476 | #endif |
1775826c JF |
477 | |
478 | /* Relinquish the page back to the allocator. */ | |
709613ad | 479 | free_reserved_page(page); |
1775826c JF |
480 | } |
481 | ||
bc2c0303 | 482 | balloon_stats.current_pages += rc; |
1775826c | 483 | |
95d2ac4a | 484 | return BP_DONE; |
1775826c JF |
485 | } |
486 | ||
b6f30679 | 487 | static enum bp_state decrease_reservation(unsigned long nr_pages, gfp_t gfp) |
1775826c | 488 | { |
95d2ac4a | 489 | enum bp_state state = BP_DONE; |
30756c62 JG |
490 | unsigned long i; |
491 | struct page *page, *tmp; | |
1775826c JF |
492 | int ret; |
493 | struct xen_memory_reservation reservation = { | |
494 | .address_bits = 0, | |
30756c62 | 495 | .extent_order = EXTENT_ORDER, |
1775826c JF |
496 | .domid = DOMID_SELF |
497 | }; | |
30756c62 | 498 | LIST_HEAD(pages); |
1775826c JF |
499 | |
500 | if (nr_pages > ARRAY_SIZE(frame_list)) | |
501 | nr_pages = ARRAY_SIZE(frame_list); | |
502 | ||
503 | for (i = 0; i < nr_pages; i++) { | |
fce92683 LN |
504 | page = alloc_page(gfp); |
505 | if (page == NULL) { | |
1775826c | 506 | nr_pages = i; |
95d2ac4a | 507 | state = BP_EAGAIN; |
1775826c JF |
508 | break; |
509 | } | |
709613ad | 510 | adjust_managed_page_count(page, -1); |
09ed3d5b | 511 | scrub_page(page); |
30756c62 | 512 | list_add(&page->lru, &pages); |
09ed3d5b | 513 | } |
1775826c | 514 | |
09ed3d5b WL |
515 | /* |
516 | * Ensure that ballooned highmem pages don't have kmaps. | |
517 | * | |
518 | * Do this before changing the p2m as kmap_flush_unused() | |
519 | * reads PTEs to obtain pages (and hence needs the original | |
520 | * p2m entry). | |
521 | */ | |
522 | kmap_flush_unused(); | |
523 | ||
30756c62 JG |
524 | /* |
525 | * Setup the frame, update direct mapping, invalidate P2M, | |
526 | * and add to balloon. | |
527 | */ | |
528 | i = 0; | |
529 | list_for_each_entry_safe(page, tmp, &pages, lru) { | |
530 | /* XENMEM_decrease_reservation requires a GFN */ | |
531 | frame_list[i++] = xen_page_to_gfn(page); | |
1058a75f | 532 | |
c1d15f5c | 533 | #ifdef CONFIG_XEN_HAVE_PVMMU |
30756c62 JG |
534 | /* |
535 | * We don't support PV MMU when Linux and Xen is using | |
536 | * different page granularity. | |
537 | */ | |
538 | BUILD_BUG_ON(XEN_PAGE_SIZE != PAGE_SIZE); | |
539 | ||
04660bb5 | 540 | if (!xen_feature(XENFEAT_auto_translated_physmap)) { |
30756c62 JG |
541 | unsigned long pfn = page_to_pfn(page); |
542 | ||
c1d15f5c SS |
543 | if (!PageHighMem(page)) { |
544 | ret = HYPERVISOR_update_va_mapping( | |
545 | (unsigned long)__va(pfn << PAGE_SHIFT), | |
0bb599fd | 546 | __pte_ma(0), 0); |
c1d15f5c | 547 | BUG_ON(ret); |
fb9a0c44 DV |
548 | } |
549 | __set_phys_to_machine(pfn, INVALID_P2M_ENTRY); | |
04660bb5 | 550 | } |
c1d15f5c | 551 | #endif |
30756c62 | 552 | list_del(&page->lru); |
24f69373 | 553 | |
09ed3d5b | 554 | balloon_append(page); |
1775826c JF |
555 | } |
556 | ||
24f69373 | 557 | flush_tlb_all(); |
2bad07ce | 558 | |
a90971eb | 559 | set_xen_guest_handle(reservation.extent_start, frame_list); |
1775826c JF |
560 | reservation.nr_extents = nr_pages; |
561 | ret = HYPERVISOR_memory_op(XENMEM_decrease_reservation, &reservation); | |
562 | BUG_ON(ret != nr_pages); | |
563 | ||
564 | balloon_stats.current_pages -= nr_pages; | |
1775826c | 565 | |
95d2ac4a | 566 | return state; |
1775826c JF |
567 | } |
568 | ||
569 | /* | |
929423fa | 570 | * As this is a work item it is guaranteed to run as a single instance only. |
1775826c JF |
571 | * We may of course race updates of the target counts (which are protected |
572 | * by the balloon lock), or with changes to the Xen hard limit, but we will | |
573 | * recover from these in time. | |
574 | */ | |
575 | static void balloon_process(struct work_struct *work) | |
576 | { | |
95d2ac4a | 577 | enum bp_state state = BP_DONE; |
1775826c JF |
578 | long credit; |
579 | ||
1775826c JF |
580 | |
581 | do { | |
929423fa JG |
582 | mutex_lock(&balloon_mutex); |
583 | ||
83be7e52 | 584 | credit = current_credit(); |
95d2ac4a | 585 | |
080e2be7 DK |
586 | if (credit > 0) { |
587 | if (balloon_is_inflated()) | |
588 | state = increase_reservation(credit); | |
589 | else | |
b2ac6aa8 | 590 | state = reserve_additional_memory(); |
080e2be7 | 591 | } |
95d2ac4a | 592 | |
1775826c | 593 | if (credit < 0) |
b6f30679 | 594 | state = decrease_reservation(-credit, GFP_BALLOON); |
95d2ac4a DK |
595 | |
596 | state = update_schedule(state); | |
1775826c | 597 | |
929423fa JG |
598 | mutex_unlock(&balloon_mutex); |
599 | ||
600 | cond_resched(); | |
601 | ||
95d2ac4a | 602 | } while (credit && state == BP_DONE); |
1775826c JF |
603 | |
604 | /* Schedule more work if there is some still to be done. */ | |
95d2ac4a DK |
605 | if (state == BP_EAGAIN) |
606 | schedule_delayed_work(&balloon_worker, balloon_stats.schedule_delay * HZ); | |
1775826c JF |
607 | } |
608 | ||
609 | /* Resets the Xen limit, sets new target, and kicks off processing. */ | |
803eb047 | 610 | void balloon_set_new_target(unsigned long target) |
1775826c JF |
611 | { |
612 | /* No need for lock. Not read-modify-write updates. */ | |
1775826c | 613 | balloon_stats.target_pages = target; |
95170b2e | 614 | schedule_delayed_work(&balloon_worker, 0); |
1775826c | 615 | } |
803eb047 | 616 | EXPORT_SYMBOL_GPL(balloon_set_new_target); |
1775826c | 617 | |
1cf6a6c8 DV |
618 | static int add_ballooned_pages(int nr_pages) |
619 | { | |
620 | enum bp_state st; | |
621 | ||
622 | if (xen_hotplug_unpopulated) { | |
623 | st = reserve_additional_memory(); | |
624 | if (st != BP_ECANCELED) { | |
625 | mutex_unlock(&balloon_mutex); | |
626 | wait_event(balloon_wq, | |
627 | !list_empty(&ballooned_pages)); | |
628 | mutex_lock(&balloon_mutex); | |
629 | return 0; | |
630 | } | |
631 | } | |
632 | ||
633 | st = decrease_reservation(nr_pages, GFP_USER); | |
634 | if (st != BP_DONE) | |
635 | return -ENOMEM; | |
636 | ||
637 | return 0; | |
638 | } | |
639 | ||
b6f30679 KRW |
640 | /** |
641 | * alloc_xenballooned_pages - get pages that have been ballooned out | |
642 | * @nr_pages: Number of pages to get | |
643 | * @pages: pages returned | |
644 | * @return 0 on success, error otherwise | |
645 | */ | |
81b286e0 | 646 | int alloc_xenballooned_pages(int nr_pages, struct page **pages) |
1775826c | 647 | { |
b6f30679 | 648 | int pgno = 0; |
e882dc9c | 649 | struct page *page; |
1cf6a6c8 DV |
650 | int ret; |
651 | ||
b6f30679 | 652 | mutex_lock(&balloon_mutex); |
1cf6a6c8 DV |
653 | |
654 | balloon_stats.target_unpopulated += nr_pages; | |
655 | ||
b6f30679 | 656 | while (pgno < nr_pages) { |
81b286e0 DV |
657 | page = balloon_retrieve(true); |
658 | if (page) { | |
b6f30679 | 659 | pages[pgno++] = page; |
4a69c909 | 660 | #ifdef CONFIG_XEN_HAVE_PVMMU |
30756c62 JG |
661 | /* |
662 | * We don't support PV MMU when Linux and Xen is using | |
663 | * different page granularity. | |
664 | */ | |
665 | BUILD_BUG_ON(XEN_PAGE_SIZE != PAGE_SIZE); | |
666 | ||
4a69c909 DV |
667 | ret = xen_alloc_p2m_entry(page_to_pfn(page)); |
668 | if (ret < 0) | |
669 | goto out_undo; | |
670 | #endif | |
b6f30679 | 671 | } else { |
1cf6a6c8 DV |
672 | ret = add_ballooned_pages(nr_pages - pgno); |
673 | if (ret < 0) | |
b6f30679 KRW |
674 | goto out_undo; |
675 | } | |
1775826c | 676 | } |
b6f30679 KRW |
677 | mutex_unlock(&balloon_mutex); |
678 | return 0; | |
679 | out_undo: | |
b6f30679 | 680 | mutex_unlock(&balloon_mutex); |
1cf6a6c8 DV |
681 | free_xenballooned_pages(pgno, pages); |
682 | return ret; | |
1775826c | 683 | } |
b6f30679 | 684 | EXPORT_SYMBOL(alloc_xenballooned_pages); |
1775826c | 685 | |
b6f30679 KRW |
686 | /** |
687 | * free_xenballooned_pages - return pages retrieved with get_ballooned_pages | |
688 | * @nr_pages: Number of pages | |
689 | * @pages: pages to return | |
690 | */ | |
e882dc9c | 691 | void free_xenballooned_pages(int nr_pages, struct page **pages) |
1775826c | 692 | { |
b6f30679 | 693 | int i; |
1775826c | 694 | |
b6f30679 | 695 | mutex_lock(&balloon_mutex); |
1775826c | 696 | |
b6f30679 KRW |
697 | for (i = 0; i < nr_pages; i++) { |
698 | if (pages[i]) | |
699 | balloon_append(pages[i]); | |
700 | } | |
701 | ||
1cf6a6c8 DV |
702 | balloon_stats.target_unpopulated -= nr_pages; |
703 | ||
b6f30679 | 704 | /* The balloon may be too large now. Shrink it if needed. */ |
83be7e52 | 705 | if (current_credit()) |
b6f30679 | 706 | schedule_delayed_work(&balloon_worker, 0); |
1775826c | 707 | |
b6f30679 KRW |
708 | mutex_unlock(&balloon_mutex); |
709 | } | |
710 | EXPORT_SYMBOL(free_xenballooned_pages); | |
1775826c | 711 | |
4fee9ad8 | 712 | #ifdef CONFIG_XEN_PV |
8b5d44a5 DV |
713 | static void __init balloon_add_region(unsigned long start_pfn, |
714 | unsigned long pages) | |
1775826c | 715 | { |
4dfe22f5 | 716 | unsigned long pfn, extra_pfn_end; |
1775826c JF |
717 | struct page *page; |
718 | ||
8b5d44a5 DV |
719 | /* |
720 | * If the amount of usable memory has been limited (e.g., with | |
721 | * the 'mem' command line parameter), don't add pages beyond | |
722 | * this limit. | |
723 | */ | |
724 | extra_pfn_end = min(max_pfn, start_pfn + pages); | |
725 | ||
726 | for (pfn = start_pfn; pfn < extra_pfn_end; pfn++) { | |
727 | page = pfn_to_page(pfn); | |
728 | /* totalram_pages and totalhigh_pages do not | |
729 | include the boot-time balloon extension, so | |
730 | don't subtract from it. */ | |
731 | __balloon_append(page); | |
732 | } | |
de5a77d8 DV |
733 | |
734 | balloon_stats.total_pages += extra_pfn_end - start_pfn; | |
8b5d44a5 | 735 | } |
4fee9ad8 | 736 | #endif |
8b5d44a5 DV |
737 | |
738 | static int __init balloon_init(void) | |
739 | { | |
53d5522c | 740 | if (!xen_domain()) |
1775826c JF |
741 | return -ENODEV; |
742 | ||
283c0972 | 743 | pr_info("Initialising balloon driver\n"); |
1775826c | 744 | |
4fee9ad8 | 745 | #ifdef CONFIG_XEN_PV |
aa24411b DV |
746 | balloon_stats.current_pages = xen_pv_domain() |
747 | ? min(xen_start_info->nr_pages - xen_released_pages, max_pfn) | |
c275a57f | 748 | : get_num_physpages(); |
4fee9ad8 VK |
749 | #else |
750 | balloon_stats.current_pages = get_num_physpages(); | |
751 | #endif | |
1775826c JF |
752 | balloon_stats.target_pages = balloon_stats.current_pages; |
753 | balloon_stats.balloon_low = 0; | |
754 | balloon_stats.balloon_high = 0; | |
de5a77d8 | 755 | balloon_stats.total_pages = balloon_stats.current_pages; |
1775826c | 756 | |
95d2ac4a DK |
757 | balloon_stats.schedule_delay = 1; |
758 | balloon_stats.max_schedule_delay = 32; | |
759 | balloon_stats.retry_count = 1; | |
40095de1 | 760 | balloon_stats.max_retry_count = RETRY_UNLIMITED; |
1775826c | 761 | |
080e2be7 | 762 | #ifdef CONFIG_XEN_BALLOON_MEMORY_HOTPLUG |
080e2be7 DK |
763 | set_online_page_callback(&xen_online_page); |
764 | register_memory_notifier(&xen_memory_nb); | |
1cf6a6c8 | 765 | register_sysctl_table(xen_root); |
080e2be7 DK |
766 | #endif |
767 | ||
4fee9ad8 VK |
768 | #ifdef CONFIG_XEN_PV |
769 | { | |
770 | int i; | |
771 | ||
772 | /* | |
773 | * Initialize the balloon with pages from the extra memory | |
774 | * regions (see arch/x86/xen/setup.c). | |
775 | */ | |
776 | for (i = 0; i < XEN_EXTRA_MEM_MAX_REGIONS; i++) | |
777 | if (xen_extra_mem[i].n_pfns) | |
778 | balloon_add_region(xen_extra_mem[i].start_pfn, | |
779 | xen_extra_mem[i].n_pfns); | |
780 | } | |
781 | #endif | |
1775826c | 782 | |
96edd61d JG |
783 | /* Init the xen-balloon driver. */ |
784 | xen_balloon_init(); | |
785 | ||
1775826c JF |
786 | return 0; |
787 | } | |
1775826c | 788 | subsys_initcall(balloon_init); |