]> git.proxmox.com Git - mirror_ubuntu-jammy-kernel.git/blame - drivers/xen/balloon.c
xen/balloon: Drop __balloon_append()
[mirror_ubuntu-jammy-kernel.git] / drivers / xen / balloon.c
CommitLineData
1775826c 1/******************************************************************************
1775826c
JF
2 * Xen balloon driver - enables returning/claiming memory to/from Xen.
3 *
4 * Copyright (c) 2003, B Dragovic
5 * Copyright (c) 2003-2004, M Williamson, K Fraser
6 * Copyright (c) 2005 Dan M. Smith, IBM Corporation
080e2be7
DK
7 * Copyright (c) 2010 Daniel Kiper
8 *
9 * Memory hotplug support was written by Daniel Kiper. Work on
10 * it was sponsored by Google under Google Summer of Code 2010
11 * program. Jeremy Fitzhardinge from Citrix was the mentor for
12 * this project.
1775826c
JF
13 *
14 * This program is free software; you can redistribute it and/or
15 * modify it under the terms of the GNU General Public License version 2
16 * as published by the Free Software Foundation; or, when distributed
17 * separately from the Linux kernel or incorporated into other
18 * software packages, subject to the following license:
19 *
20 * Permission is hereby granted, free of charge, to any person obtaining a copy
21 * of this source file (the "Software"), to deal in the Software without
22 * restriction, including without limitation the rights to use, copy, modify,
23 * merge, publish, distribute, sublicense, and/or sell copies of the Software,
24 * and to permit persons to whom the Software is furnished to do so, subject to
25 * the following conditions:
26 *
27 * The above copyright notice and this permission notice shall be included in
28 * all copies or substantial portions of the Software.
29 *
30 * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
31 * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
32 * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
33 * AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
34 * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING
35 * FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS
36 * IN THE SOFTWARE.
37 */
38
283c0972
JP
39#define pr_fmt(fmt) "xen:" KBUILD_MODNAME ": " fmt
40
cd9151e2 41#include <linux/cpu.h>
1775826c 42#include <linux/kernel.h>
1775826c 43#include <linux/sched.h>
5b825c3a 44#include <linux/cred.h>
1775826c
JF
45#include <linux/errno.h>
46#include <linux/mm.h>
57c8a661 47#include <linux/memblock.h>
1775826c
JF
48#include <linux/pagemap.h>
49#include <linux/highmem.h>
50#include <linux/mutex.h>
1775826c 51#include <linux/list.h>
5a0e3ad6 52#include <linux/gfp.h>
080e2be7
DK
53#include <linux/notifier.h>
54#include <linux/memory.h>
55#include <linux/memory_hotplug.h>
cd9151e2 56#include <linux/percpu-defs.h>
55b3da98 57#include <linux/slab.h>
1cf6a6c8 58#include <linux/sysctl.h>
1775826c 59
1775826c
JF
60#include <asm/page.h>
61#include <asm/pgalloc.h>
62#include <asm/pgtable.h>
1775826c
JF
63#include <asm/tlb.h>
64
ecbf29cd
JF
65#include <asm/xen/hypervisor.h>
66#include <asm/xen/hypercall.h>
1ccbf534
JF
67
68#include <xen/xen.h>
ecbf29cd 69#include <xen/interface/xen.h>
1775826c 70#include <xen/interface/memory.h>
803eb047 71#include <xen/balloon.h>
1775826c
JF
72#include <xen/features.h>
73#include <xen/page.h>
ae4c51a5 74#include <xen/mem-reservation.h>
1775826c 75
1cf6a6c8
DV
76static int xen_hotplug_unpopulated;
77
78#ifdef CONFIG_XEN_BALLOON_MEMORY_HOTPLUG
79
1cf6a6c8
DV
80static struct ctl_table balloon_table[] = {
81 {
82 .procname = "hotplug_unpopulated",
83 .data = &xen_hotplug_unpopulated,
84 .maxlen = sizeof(int),
85 .mode = 0644,
86 .proc_handler = proc_dointvec_minmax,
eec4844f
MC
87 .extra1 = SYSCTL_ZERO,
88 .extra2 = SYSCTL_ONE,
1cf6a6c8
DV
89 },
90 { }
91};
92
93static struct ctl_table balloon_root[] = {
94 {
95 .procname = "balloon",
96 .mode = 0555,
97 .child = balloon_table,
98 },
99 { }
100};
101
102static struct ctl_table xen_root[] = {
103 {
104 .procname = "xen",
105 .mode = 0555,
106 .child = balloon_root,
107 },
108 { }
109};
110
111#endif
112
30756c62
JG
113/*
114 * Use one extent per PAGE_SIZE to avoid to break down the page into
115 * multiple frame.
116 */
117#define EXTENT_ORDER (fls(XEN_PFN_PER_PAGE) - 1)
118
95d2ac4a
DK
119/*
120 * balloon_process() state:
121 *
122 * BP_DONE: done or nothing to do,
b2ac6aa8 123 * BP_WAIT: wait to be rescheduled,
95d2ac4a
DK
124 * BP_EAGAIN: error, go to sleep,
125 * BP_ECANCELED: error, balloon operation canceled.
126 */
1775826c 127
95d2ac4a
DK
128enum bp_state {
129 BP_DONE,
b2ac6aa8 130 BP_WAIT,
95d2ac4a
DK
131 BP_EAGAIN,
132 BP_ECANCELED
1775826c
JF
133};
134
1775826c 135
1775826c 136static DEFINE_MUTEX(balloon_mutex);
1775826c 137
803eb047
DDG
138struct balloon_stats balloon_stats;
139EXPORT_SYMBOL_GPL(balloon_stats);
1775826c
JF
140
141/* We increase/decrease in batches which fit in a page */
3990dd27 142static xen_pfn_t frame_list[PAGE_SIZE / sizeof(xen_pfn_t)];
cd9151e2 143
1775826c 144
1775826c
JF
145/* List of ballooned pages, threaded through the mem_map array. */
146static LIST_HEAD(ballooned_pages);
1cf6a6c8 147static DECLARE_WAIT_QUEUE_HEAD(balloon_wq);
1775826c
JF
148
149/* Main work function, always executed in process context. */
150static void balloon_process(struct work_struct *work);
95170b2e 151static DECLARE_DELAYED_WORK(balloon_worker, balloon_process);
1775826c
JF
152
153/* When ballooning out (allocating memory to return to Xen) we don't really
154 want the kernel to try too hard since that can trigger the oom killer. */
155#define GFP_BALLOON \
156 (GFP_HIGHUSER | __GFP_NOWARN | __GFP_NORETRY | __GFP_NOMEMALLOC)
157
1775826c 158/* balloon_append: add the given page to the balloon. */
dde3285f 159static void balloon_append(struct page *page)
1775826c
JF
160{
161 /* Lowmem is re-populated first, so highmem pages go at list tail. */
162 if (PageHighMem(page)) {
163 list_add_tail(&page->lru, &ballooned_pages);
164 balloon_stats.balloon_high++;
1775826c
JF
165 } else {
166 list_add(&page->lru, &ballooned_pages);
167 balloon_stats.balloon_low++;
168 }
1cf6a6c8 169 wake_up(&balloon_wq);
9be4d457 170}
3d65c948 171
1775826c 172/* balloon_retrieve: rescue a page from the balloon, if it is not empty. */
81b286e0 173static struct page *balloon_retrieve(bool require_lowmem)
1775826c
JF
174{
175 struct page *page;
176
177 if (list_empty(&ballooned_pages))
178 return NULL;
179
81b286e0
DV
180 page = list_entry(ballooned_pages.next, struct page, lru);
181 if (require_lowmem && PageHighMem(page))
182 return NULL;
1775826c
JF
183 list_del(&page->lru);
184
3dcc0571 185 if (PageHighMem(page))
1775826c 186 balloon_stats.balloon_high--;
3dcc0571 187 else
1775826c
JF
188 balloon_stats.balloon_low--;
189
190 return page;
191}
192
1775826c
JF
193static struct page *balloon_next_page(struct page *page)
194{
195 struct list_head *next = page->lru.next;
196 if (next == &ballooned_pages)
197 return NULL;
198 return list_entry(next, struct page, lru);
199}
200
95d2ac4a 201static enum bp_state update_schedule(enum bp_state state)
1775826c 202{
b2ac6aa8
DV
203 if (state == BP_WAIT)
204 return BP_WAIT;
205
fd8b7951
BO
206 if (state == BP_ECANCELED)
207 return BP_ECANCELED;
208
95d2ac4a
DK
209 if (state == BP_DONE) {
210 balloon_stats.schedule_delay = 1;
211 balloon_stats.retry_count = 1;
212 return BP_DONE;
213 }
214
95d2ac4a
DK
215 ++balloon_stats.retry_count;
216
217 if (balloon_stats.max_retry_count != RETRY_UNLIMITED &&
218 balloon_stats.retry_count > balloon_stats.max_retry_count) {
95d2ac4a
DK
219 balloon_stats.schedule_delay = 1;
220 balloon_stats.retry_count = 1;
221 return BP_ECANCELED;
222 }
223
224 balloon_stats.schedule_delay <<= 1;
225
226 if (balloon_stats.schedule_delay > balloon_stats.max_schedule_delay)
227 balloon_stats.schedule_delay = balloon_stats.max_schedule_delay;
228
229 return BP_EAGAIN;
1775826c
JF
230}
231
080e2be7 232#ifdef CONFIG_XEN_BALLOON_MEMORY_HOTPLUG
842775f1
RL
233static void release_memory_resource(struct resource *resource)
234{
235 if (!resource)
236 return;
237
238 /*
239 * No need to reset region to identity mapped since we now
240 * know that no I/O can be in this region
241 */
242 release_resource(resource);
243 kfree(resource);
244}
245
55b3da98
DV
246static struct resource *additional_memory_resource(phys_addr_t size)
247{
12366410
ID
248 struct resource *res;
249 int ret;
55b3da98
DV
250
251 res = kzalloc(sizeof(*res), GFP_KERNEL);
252 if (!res)
253 return NULL;
254
255 res->name = "System RAM";
782b8664 256 res->flags = IORESOURCE_SYSTEM_RAM | IORESOURCE_BUSY;
55b3da98 257
12366410
ID
258 ret = allocate_resource(&iomem_resource, res,
259 size, 0, -1,
260 PAGES_PER_SECTION * PAGE_SIZE, NULL, NULL);
261 if (ret < 0) {
262 pr_err("Cannot allocate new System RAM resource\n");
263 kfree(res);
264 return NULL;
55b3da98
DV
265 }
266
dfd74a1e
RL
267#ifdef CONFIG_SPARSEMEM
268 {
269 unsigned long limit = 1UL << (MAX_PHYSMEM_BITS - PAGE_SHIFT);
270 unsigned long pfn = res->start >> PAGE_SHIFT;
271
272 if (pfn > limit) {
273 pr_err("New System RAM resource outside addressable RAM (%lu > %lu)\n",
274 pfn, limit);
275 release_memory_resource(res);
276 return NULL;
277 }
278 }
279#endif
280
55b3da98
DV
281 return res;
282}
283
b2ac6aa8 284static enum bp_state reserve_additional_memory(void)
080e2be7 285{
b2ac6aa8 286 long credit;
55b3da98 287 struct resource *resource;
080e2be7 288 int nid, rc;
55b3da98 289 unsigned long balloon_hotplug;
080e2be7 290
1cf6a6c8
DV
291 credit = balloon_stats.target_pages + balloon_stats.target_unpopulated
292 - balloon_stats.total_pages;
b2ac6aa8
DV
293
294 /*
295 * Already hotplugged enough pages? Wait for them to be
296 * onlined.
297 */
298 if (credit <= 0)
299 return BP_WAIT;
300
55b3da98
DV
301 balloon_hotplug = round_up(credit, PAGES_PER_SECTION);
302
303 resource = additional_memory_resource(balloon_hotplug * PAGE_SIZE);
304 if (!resource)
305 goto err;
306
307 nid = memory_add_physaddr_to_nid(resource->start);
080e2be7 308
3c56b3a1 309#ifdef CONFIG_XEN_HAVE_PVMMU
30756c62
JG
310 /*
311 * We don't support PV MMU when Linux and Xen is using
312 * different page granularity.
313 */
314 BUILD_BUG_ON(XEN_PAGE_SIZE != PAGE_SIZE);
315
3c56b3a1
JG
316 /*
317 * add_memory() will build page tables for the new memory so
318 * the p2m must contain invalid entries so the correct
319 * non-present PTEs will be written.
320 *
321 * If a failure occurs, the original (identity) p2m entries
322 * are not restored since this region is now known not to
323 * conflict with any devices.
324 */
325 if (!xen_feature(XENFEAT_auto_translated_physmap)) {
326 unsigned long pfn, i;
327
55b3da98 328 pfn = PFN_DOWN(resource->start);
3c56b3a1
JG
329 for (i = 0; i < balloon_hotplug; i++) {
330 if (!set_phys_to_machine(pfn + i, INVALID_P2M_ENTRY)) {
331 pr_warn("set_phys_to_machine() failed, no memory added\n");
55b3da98 332 goto err;
3c56b3a1
JG
333 }
334 }
335 }
336#endif
337
703fc13a
VK
338 /*
339 * add_memory_resource() will call online_pages() which in its turn
340 * will call xen_online_page() callback causing deadlock if we don't
341 * release balloon_mutex here. Unlocking here is safe because the
342 * callers drop the mutex before trying again.
343 */
344 mutex_unlock(&balloon_mutex);
8df1d0e4
DH
345 /* add_memory_resource() requires the device_hotplug lock */
346 lock_device_hotplug();
f29d8e9c 347 rc = add_memory_resource(nid, resource);
8df1d0e4 348 unlock_device_hotplug();
703fc13a
VK
349 mutex_lock(&balloon_mutex);
350
080e2be7 351 if (rc) {
3dcf6367 352 pr_warn("Cannot add additional memory (%i)\n", rc);
55b3da98 353 goto err;
080e2be7
DK
354 }
355
de5a77d8 356 balloon_stats.total_pages += balloon_hotplug;
080e2be7 357
b2ac6aa8 358 return BP_WAIT;
55b3da98
DV
359 err:
360 release_memory_resource(resource);
361 return BP_ECANCELED;
080e2be7
DK
362}
363
a9cd410a 364static void xen_online_page(struct page *page, unsigned int order)
080e2be7 365{
a9cd410a
AK
366 unsigned long i, size = (1 << order);
367 unsigned long start_pfn = page_to_pfn(page);
368 struct page *p;
080e2be7 369
a9cd410a 370 pr_debug("Online %lu pages starting at pfn 0x%lx\n", size, start_pfn);
080e2be7 371 mutex_lock(&balloon_mutex);
a9cd410a
AK
372 for (i = 0; i < size; i++) {
373 p = pfn_to_page(start_pfn + i);
374 __online_page_set_limits(p);
77c4adf6 375 __SetPageOffline(p);
dde3285f 376 balloon_append(p);
a9cd410a 377 }
080e2be7
DK
378 mutex_unlock(&balloon_mutex);
379}
380
381static int xen_memory_notifier(struct notifier_block *nb, unsigned long val, void *v)
382{
383 if (val == MEM_ONLINE)
384 schedule_delayed_work(&balloon_worker, 0);
385
386 return NOTIFY_OK;
387}
388
389static struct notifier_block xen_memory_nb = {
390 .notifier_call = xen_memory_notifier,
391 .priority = 0
392};
393#else
b2ac6aa8 394static enum bp_state reserve_additional_memory(void)
1775826c 395{
de5a77d8 396 balloon_stats.target_pages = balloon_stats.current_pages;
1cf6a6c8 397 return BP_ECANCELED;
1775826c 398}
de5a77d8 399#endif /* CONFIG_XEN_BALLOON_MEMORY_HOTPLUG */
1775826c 400
de5a77d8 401static long current_credit(void)
080e2be7 402{
de5a77d8 403 return balloon_stats.target_pages - balloon_stats.current_pages;
080e2be7
DK
404}
405
de5a77d8 406static bool balloon_is_inflated(void)
080e2be7 407{
de5a77d8 408 return balloon_stats.balloon_low || balloon_stats.balloon_high;
080e2be7 409}
080e2be7 410
95d2ac4a 411static enum bp_state increase_reservation(unsigned long nr_pages)
1775826c 412{
95d2ac4a 413 int rc;
30756c62 414 unsigned long i;
1775826c 415 struct page *page;
1775826c
JF
416
417 if (nr_pages > ARRAY_SIZE(frame_list))
418 nr_pages = ARRAY_SIZE(frame_list);
419
9346c2a8 420 page = list_first_entry_or_null(&ballooned_pages, struct page, lru);
1775826c 421 for (i = 0; i < nr_pages; i++) {
95d2ac4a
DK
422 if (!page) {
423 nr_pages = i;
424 break;
425 }
30756c62 426
30756c62 427 frame_list[i] = page_to_xen_pfn(page);
1775826c
JF
428 page = balloon_next_page(page);
429 }
430
ae4c51a5 431 rc = xenmem_reservation_increase(nr_pages, frame_list);
40095de1 432 if (rc <= 0)
95d2ac4a 433 return BP_EAGAIN;
1775826c 434
bc2c0303 435 for (i = 0; i < rc; i++) {
b6f30679 436 page = balloon_retrieve(false);
1775826c
JF
437 BUG_ON(page == NULL);
438
ae4c51a5 439 xenmem_reservation_va_mapping_update(1, &page, &frame_list[i]);
1775826c
JF
440
441 /* Relinquish the page back to the allocator. */
77c4adf6 442 __ClearPageOffline(page);
709613ad 443 free_reserved_page(page);
1775826c
JF
444 }
445
bc2c0303 446 balloon_stats.current_pages += rc;
1775826c 447
95d2ac4a 448 return BP_DONE;
1775826c
JF
449}
450
b6f30679 451static enum bp_state decrease_reservation(unsigned long nr_pages, gfp_t gfp)
1775826c 452{
95d2ac4a 453 enum bp_state state = BP_DONE;
30756c62
JG
454 unsigned long i;
455 struct page *page, *tmp;
1775826c 456 int ret;
30756c62 457 LIST_HEAD(pages);
1775826c
JF
458
459 if (nr_pages > ARRAY_SIZE(frame_list))
460 nr_pages = ARRAY_SIZE(frame_list);
461
462 for (i = 0; i < nr_pages; i++) {
fce92683
LN
463 page = alloc_page(gfp);
464 if (page == NULL) {
1775826c 465 nr_pages = i;
95d2ac4a 466 state = BP_EAGAIN;
1775826c
JF
467 break;
468 }
77c4adf6 469 __SetPageOffline(page);
709613ad 470 adjust_managed_page_count(page, -1);
ae4c51a5 471 xenmem_reservation_scrub_page(page);
30756c62 472 list_add(&page->lru, &pages);
09ed3d5b 473 }
1775826c 474
09ed3d5b
WL
475 /*
476 * Ensure that ballooned highmem pages don't have kmaps.
477 *
478 * Do this before changing the p2m as kmap_flush_unused()
479 * reads PTEs to obtain pages (and hence needs the original
480 * p2m entry).
481 */
482 kmap_flush_unused();
483
30756c62
JG
484 /*
485 * Setup the frame, update direct mapping, invalidate P2M,
486 * and add to balloon.
487 */
488 i = 0;
489 list_for_each_entry_safe(page, tmp, &pages, lru) {
30756c62 490 frame_list[i++] = xen_page_to_gfn(page);
1058a75f 491
ae4c51a5 492 xenmem_reservation_va_mapping_reset(1, &page);
30756c62 493
30756c62 494 list_del(&page->lru);
24f69373 495
09ed3d5b 496 balloon_append(page);
1775826c
JF
497 }
498
24f69373 499 flush_tlb_all();
2bad07ce 500
ae4c51a5 501 ret = xenmem_reservation_decrease(nr_pages, frame_list);
1775826c
JF
502 BUG_ON(ret != nr_pages);
503
504 balloon_stats.current_pages -= nr_pages;
1775826c 505
95d2ac4a 506 return state;
1775826c
JF
507}
508
509/*
929423fa 510 * As this is a work item it is guaranteed to run as a single instance only.
1775826c
JF
511 * We may of course race updates of the target counts (which are protected
512 * by the balloon lock), or with changes to the Xen hard limit, but we will
513 * recover from these in time.
514 */
515static void balloon_process(struct work_struct *work)
516{
95d2ac4a 517 enum bp_state state = BP_DONE;
1775826c
JF
518 long credit;
519
1775826c
JF
520
521 do {
929423fa
JG
522 mutex_lock(&balloon_mutex);
523
83be7e52 524 credit = current_credit();
95d2ac4a 525
080e2be7
DK
526 if (credit > 0) {
527 if (balloon_is_inflated())
528 state = increase_reservation(credit);
529 else
b2ac6aa8 530 state = reserve_additional_memory();
080e2be7 531 }
95d2ac4a 532
a1078e82
JG
533 if (credit < 0) {
534 long n_pages;
535
536 n_pages = min(-credit, si_mem_available());
537 state = decrease_reservation(n_pages, GFP_BALLOON);
538 if (state == BP_DONE && n_pages != -credit &&
539 n_pages < totalreserve_pages)
540 state = BP_EAGAIN;
541 }
95d2ac4a
DK
542
543 state = update_schedule(state);
1775826c 544
929423fa
JG
545 mutex_unlock(&balloon_mutex);
546
547 cond_resched();
548
95d2ac4a 549 } while (credit && state == BP_DONE);
1775826c
JF
550
551 /* Schedule more work if there is some still to be done. */
95d2ac4a
DK
552 if (state == BP_EAGAIN)
553 schedule_delayed_work(&balloon_worker, balloon_stats.schedule_delay * HZ);
1775826c
JF
554}
555
556/* Resets the Xen limit, sets new target, and kicks off processing. */
803eb047 557void balloon_set_new_target(unsigned long target)
1775826c
JF
558{
559 /* No need for lock. Not read-modify-write updates. */
1775826c 560 balloon_stats.target_pages = target;
95170b2e 561 schedule_delayed_work(&balloon_worker, 0);
1775826c 562}
803eb047 563EXPORT_SYMBOL_GPL(balloon_set_new_target);
1775826c 564
1cf6a6c8
DV
565static int add_ballooned_pages(int nr_pages)
566{
567 enum bp_state st;
568
569 if (xen_hotplug_unpopulated) {
570 st = reserve_additional_memory();
571 if (st != BP_ECANCELED) {
572 mutex_unlock(&balloon_mutex);
573 wait_event(balloon_wq,
574 !list_empty(&ballooned_pages));
575 mutex_lock(&balloon_mutex);
576 return 0;
577 }
578 }
579
a1078e82
JG
580 if (si_mem_available() < nr_pages)
581 return -ENOMEM;
582
1cf6a6c8
DV
583 st = decrease_reservation(nr_pages, GFP_USER);
584 if (st != BP_DONE)
585 return -ENOMEM;
586
587 return 0;
588}
589
b6f30679
KRW
590/**
591 * alloc_xenballooned_pages - get pages that have been ballooned out
592 * @nr_pages: Number of pages to get
593 * @pages: pages returned
594 * @return 0 on success, error otherwise
595 */
81b286e0 596int alloc_xenballooned_pages(int nr_pages, struct page **pages)
1775826c 597{
b6f30679 598 int pgno = 0;
e882dc9c 599 struct page *page;
1cf6a6c8
DV
600 int ret;
601
b6f30679 602 mutex_lock(&balloon_mutex);
1cf6a6c8
DV
603
604 balloon_stats.target_unpopulated += nr_pages;
605
b6f30679 606 while (pgno < nr_pages) {
81b286e0
DV
607 page = balloon_retrieve(true);
608 if (page) {
0266def9 609 __ClearPageOffline(page);
b6f30679 610 pages[pgno++] = page;
4a69c909 611#ifdef CONFIG_XEN_HAVE_PVMMU
30756c62
JG
612 /*
613 * We don't support PV MMU when Linux and Xen is using
614 * different page granularity.
615 */
616 BUILD_BUG_ON(XEN_PAGE_SIZE != PAGE_SIZE);
617
b194da25
BO
618 if (!xen_feature(XENFEAT_auto_translated_physmap)) {
619 ret = xen_alloc_p2m_entry(page_to_pfn(page));
620 if (ret < 0)
621 goto out_undo;
622 }
4a69c909 623#endif
b6f30679 624 } else {
1cf6a6c8
DV
625 ret = add_ballooned_pages(nr_pages - pgno);
626 if (ret < 0)
b6f30679
KRW
627 goto out_undo;
628 }
1775826c 629 }
b6f30679
KRW
630 mutex_unlock(&balloon_mutex);
631 return 0;
632 out_undo:
b6f30679 633 mutex_unlock(&balloon_mutex);
1cf6a6c8
DV
634 free_xenballooned_pages(pgno, pages);
635 return ret;
1775826c 636}
b6f30679 637EXPORT_SYMBOL(alloc_xenballooned_pages);
1775826c 638
b6f30679
KRW
639/**
640 * free_xenballooned_pages - return pages retrieved with get_ballooned_pages
641 * @nr_pages: Number of pages
642 * @pages: pages to return
643 */
e882dc9c 644void free_xenballooned_pages(int nr_pages, struct page **pages)
1775826c 645{
b6f30679 646 int i;
1775826c 647
b6f30679 648 mutex_lock(&balloon_mutex);
1775826c 649
b6f30679 650 for (i = 0; i < nr_pages; i++) {
0266def9
DH
651 if (pages[i]) {
652 __SetPageOffline(pages[i]);
b6f30679 653 balloon_append(pages[i]);
0266def9 654 }
b6f30679
KRW
655 }
656
1cf6a6c8
DV
657 balloon_stats.target_unpopulated -= nr_pages;
658
b6f30679 659 /* The balloon may be too large now. Shrink it if needed. */
83be7e52 660 if (current_credit())
b6f30679 661 schedule_delayed_work(&balloon_worker, 0);
1775826c 662
b6f30679
KRW
663 mutex_unlock(&balloon_mutex);
664}
665EXPORT_SYMBOL(free_xenballooned_pages);
1775826c 666
4fee9ad8 667#ifdef CONFIG_XEN_PV
8b5d44a5
DV
668static void __init balloon_add_region(unsigned long start_pfn,
669 unsigned long pages)
1775826c 670{
4dfe22f5 671 unsigned long pfn, extra_pfn_end;
1775826c
JF
672 struct page *page;
673
8b5d44a5
DV
674 /*
675 * If the amount of usable memory has been limited (e.g., with
676 * the 'mem' command line parameter), don't add pages beyond
677 * this limit.
678 */
679 extra_pfn_end = min(max_pfn, start_pfn + pages);
680
681 for (pfn = start_pfn; pfn < extra_pfn_end; pfn++) {
682 page = pfn_to_page(pfn);
683 /* totalram_pages and totalhigh_pages do not
684 include the boot-time balloon extension, so
685 don't subtract from it. */
c5ad81eb 686 __SetPageOffline(page);
dde3285f 687 balloon_append(page);
8b5d44a5 688 }
de5a77d8
DV
689
690 balloon_stats.total_pages += extra_pfn_end - start_pfn;
8b5d44a5 691}
4fee9ad8 692#endif
8b5d44a5
DV
693
694static int __init balloon_init(void)
695{
53d5522c 696 if (!xen_domain())
1775826c
JF
697 return -ENODEV;
698
283c0972 699 pr_info("Initialising balloon driver\n");
1775826c 700
4fee9ad8 701#ifdef CONFIG_XEN_PV
aa24411b
DV
702 balloon_stats.current_pages = xen_pv_domain()
703 ? min(xen_start_info->nr_pages - xen_released_pages, max_pfn)
c275a57f 704 : get_num_physpages();
4fee9ad8
VK
705#else
706 balloon_stats.current_pages = get_num_physpages();
707#endif
1775826c
JF
708 balloon_stats.target_pages = balloon_stats.current_pages;
709 balloon_stats.balloon_low = 0;
710 balloon_stats.balloon_high = 0;
de5a77d8 711 balloon_stats.total_pages = balloon_stats.current_pages;
1775826c 712
95d2ac4a
DK
713 balloon_stats.schedule_delay = 1;
714 balloon_stats.max_schedule_delay = 32;
715 balloon_stats.retry_count = 1;
a1078e82 716 balloon_stats.max_retry_count = 4;
1775826c 717
080e2be7 718#ifdef CONFIG_XEN_BALLOON_MEMORY_HOTPLUG
080e2be7
DK
719 set_online_page_callback(&xen_online_page);
720 register_memory_notifier(&xen_memory_nb);
1cf6a6c8 721 register_sysctl_table(xen_root);
080e2be7
DK
722#endif
723
4fee9ad8
VK
724#ifdef CONFIG_XEN_PV
725 {
726 int i;
727
728 /*
729 * Initialize the balloon with pages from the extra memory
730 * regions (see arch/x86/xen/setup.c).
731 */
732 for (i = 0; i < XEN_EXTRA_MEM_MAX_REGIONS; i++)
733 if (xen_extra_mem[i].n_pfns)
734 balloon_add_region(xen_extra_mem[i].start_pfn,
735 xen_extra_mem[i].n_pfns);
736 }
737#endif
1775826c 738
96edd61d
JG
739 /* Init the xen-balloon driver. */
740 xen_balloon_init();
741
1775826c
JF
742 return 0;
743}
1775826c 744subsys_initcall(balloon_init);