Received: by 2002:ac0:a5a6:0:0:0:0:0 with SMTP id m35-v6csp1832210imm; Thu, 23 Aug 2018 09:27:33 -0700 (PDT) X-Google-Smtp-Source: AA+uWPwBpTsslJ80xt9R4q65KZ8S1uyiOgLGxrglXDvZwpAZ7nw+EjCFRB5FhIpgDpOuQVeqP9ln X-Received: by 2002:aa7:83cd:: with SMTP id j13-v6mr63267564pfn.236.1535041653068; Thu, 23 Aug 2018 09:27:33 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1535041653; cv=none; d=google.com; s=arc-20160816; b=YbzUmndu/XGToLOous3P7cnYZ5iR0+txHswWaWO/fNhpzBEjBTMf04TFOBgCKL38pa G34H1JFL2dMteqEwWbAdJIl8KejUUpC97//LRpHYaMjRSI6SxcJRrVhrPpp6JNDd/mOP 6YdA6WMxmmPHTVuvtvjtvTWUXEAu0iXnZylrgjv5tEXrdkmpPw3yIHuqLVrfJ2qaDLzR CNv4RiRsKqn2oUX940YxACLT2n+tJK446DcgArX14yNeqgLP0ZF57peLcaoyIJfteGlT DTpgfIo5gaFiQEjlNcChnuVI0cKzOAZtgEPoRhVGNY1qf57xmH5GjYHhYuXgXawSDojM UBPQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from:arc-authentication-results; bh=r0fs2eeOEX3JFdo1sbwIBTAxZ0e69KaYsT/NqY0gXYQ=; b=hb16g8Zo976xwlCfrDPVX3608fJGKWYn1hD9sW1xLAWyytahLxC7g5byevplEyeGi2 QEmTb5iHHNs+sknouedaABP7CSaDtlq4+29tP/b6Pg8qNoCahvqZHwuCpNuCgkBVindU ugrlcbTqbc+D2NMsPUB5WHeUwF9qDfTdKFSGS4T4KAGWklMHQM94NdwBBgjGGpfAarrJ UEaFbuOH+7cQTSNAQptaN+n7ezyin56j+ryv+Dibar0ELSlEl12XlHIQtGG6PcQfQxer 6QTWhVHzgFvv2hV+NEYcE2MoClqGm5wgHJTSviHp5k8O6PUrSBovylQUTHkuLq0/HSYf KhuQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id u27-v6si2486878pga.112.2018.08.23.09.27.17; Thu, 23 Aug 2018 09:27:33 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1732120AbeHWR6V (ORCPT + 99 others); Thu, 23 Aug 2018 13:58:21 -0400 Received: from mx2.suse.de ([195.135.220.15]:32954 "EHLO mx1.suse.de" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1727597AbeHWR6U (ORCPT ); Thu, 23 Aug 2018 13:58:20 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.220.254]) by mx1.suse.de (Postfix) with ESMTP id F2015ADD6; Thu, 23 Aug 2018 14:28:23 +0000 (UTC) From: Vlastimil Babka To: Thomas Gleixner , Ingo Molnar Cc: "H . Peter Anvin" , x86@kernel.org, linux-kernel@vger.kernel.org, Linus Torvalds , Andi Kleen , Dave Hansen , Michal Hocko , Vlastimil Babka , stable@vger.kernel.org, Michal Hocko Subject: [PATCH] x86/speculation/l1tf: suggest what to do on systems with too much RAM Date: Thu, 23 Aug 2018 16:28:12 +0200 Message-Id: <20180823142812.7363-1-vbabka@suse.cz> X-Mailer: git-send-email 2.18.0 In-Reply-To: <20180823134418.17008-1-vbabka@suse.cz> References: <20180823134418.17008-1-vbabka@suse.cz> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Two users have reported [1] that they have an "extremely unlikely" system with more than MAX_PA/2 memory and L1TF mitigation is not effective. Let's make the warning more helpful by suggesting the proper mem=X kernel boot param, a rough calculation of how much RAM can be lost (not precise if there's holes between MAX_PA/2 and max_pfn in the e820 map) and a link to the L1TF document to help decide if the mitigation is worth the unusable RAM. [1] https://bugzilla.suse.com/show_bug.cgi?id=1105536 Suggested-by: Michal Hocko Cc: stable@vger.kernel.org Signed-off-by: Vlastimil Babka --- arch/x86/kernel/cpu/bugs.c | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/arch/x86/kernel/cpu/bugs.c b/arch/x86/kernel/cpu/bugs.c index cb4a16292aa7..4b820bb6c504 100644 --- a/arch/x86/kernel/cpu/bugs.c +++ b/arch/x86/kernel/cpu/bugs.c @@ -702,6 +702,11 @@ static void __init l1tf_select_mitigation(void) half_pa = (u64)l1tf_pfn_limit() << PAGE_SHIFT; if (e820__mapped_any(half_pa, ULLONG_MAX - half_pa, E820_TYPE_RAM)) { pr_warn("System has more than MAX_PA/2 memory. L1TF mitigation not effective.\n"); + pr_info("You may make it effective by booting the kernel with mem=%llu parameter.\n", + half_pa); + pr_info("However, doing so will make up to %llu bytes of RAM unusable.\n", + ((u64) max_pfn << PAGE_SHIFT) - half_pa); + pr_info("Reading Documentation/admin-guide/l1tf.rst might help you decide."); return; } -- 2.18.0