Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp5624654imu; Wed, 30 Jan 2019 00:23:56 -0800 (PST) X-Google-Smtp-Source: ALg8bN7PNg3y5M/jiSojbS2/jcF8cqj95aOiTQTpvrVWQYovM0bxufzT7d15vbcqQS5vTmr5ijPA X-Received: by 2002:a63:c748:: with SMTP id v8mr27211689pgg.108.1548836636410; Wed, 30 Jan 2019 00:23:56 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1548836636; cv=none; d=google.com; s=arc-20160816; b=OQHlOCcsVdRdm6/ecPcdGhpSVL/1abvSZGriL8k8mTftGy4OT+lTTTBNm6hPs+6dBb EwS+L0Xj7V6TtE9NKQk4nfcLQEU9UvjNq1nFZWFoX4JW7/uOSkKzzL9qUrKmXFvtsJeY V0i+mF/GPUuM4bf9fy12peoaOf37Usv9TsZsr4XfbH0keSoBfQIA1SdUO7xBfA1DRmow LQPdoBPcJmj/Q9NsOq9ihKtdyeYJ0o7hMODufwG1DlNhGDE7IN8ZZNohMBT211/JBo/u GTkYP+QbVOi6BalLCOQPJT7ZQPWoqqd16bRP9xDEtNQlgCq9oyIQk+oD8nA1oyQX88KE 66Bg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:date:subject:cc:to:from; bh=97GfHJsuY7z9DglSQHAcESJQYBbQ6uYaAcoF4hnggAw=; b=Tw0q2xgEERZ/TtagyFMHB5GLqiSfeZlnG08LmbYQSojGSUDhegUKkBJqFfVbrTZh1Z I5KxpGFShx+Ul7MEBBRdPrxBFYvKFyGWPGI8RBcWvVWnc4/koAB7sGbBpvpbPbTXJz87 eWTXQsjdAPVPS6R2R6h/cYFpPeARQNcA7+aRZjGlVbisXA+dpc8QTmvJ3Byktcr6z+c6 swnIMcCpF48+C1xhDNNuzdQlqzF8VeVFs59rZjCQT2O0+208jBOsss5a+5+HJJlcCGPR cuyHEp9xk5e0BFCWIgBNJaEValBj1HrAO3f9Gar0BQiIh9Y2aBvuFIqG79kPMejycEhv eduA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id j132si916398pfc.84.2019.01.30.00.23.40; Wed, 30 Jan 2019 00:23:56 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730261AbfA3IWi (ORCPT + 99 others); Wed, 30 Jan 2019 03:22:38 -0500 Received: from mx2.suse.de ([195.135.220.15]:52732 "EHLO mx1.suse.de" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1726452AbfA3IWi (ORCPT ); Wed, 30 Jan 2019 03:22:38 -0500 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.220.254]) by mx1.suse.de (Postfix) with ESMTP id DE5C6B0DB; Wed, 30 Jan 2019 08:22:36 +0000 (UTC) From: Juergen Gross To: linux-kernel@vger.kernel.org, xen-devel@lists.xenproject.org, x86@kernel.org, linux-mm@kvack.org Cc: boris.ostrovsky@oracle.com, sstabellini@kernel.org, hpa@zytor.com, tglx@linutronix.de, mingo@redhat.com, bp@alien8.de, Juergen Gross Subject: [PATCH v2 0/2] x86: respect memory size limits Date: Wed, 30 Jan 2019 09:22:31 +0100 Message-Id: <20190130082233.23840-1-jgross@suse.com> X-Mailer: git-send-email 2.16.4 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On a customer system running Xen a boot problem was observed due to the kernel not respecting the memory size limit imposed by the Xen hypervisor. During analysis I found the same problem should be able to occur on bare metal in case the memory would be limited via the "mem=" boot parameter. The system this problem has been observed on has tons of memory added via PCI. So while in the E820 map the not to be used memory has been wiped out the additional PCI memory is detected during ACPI scan and it is added via __add_memory(). This small series tries to repair the issue by testing the imposed memory limit during the memory hotplug process and refusing to add it in case the limit is being violated. I've chosen to refuse adding the complete memory chunk in case the limit is reached instead of adding only some of the memory, as I thought this would result in less problems (e.g. avoiding to add only parts of a 128MB memory bar which might be difficult to remove later). Changes in V2: - patch 1: set initial allowed size to U64_MAX instead -1 - patch 2: set initial allowed size to end of E820 RAM Juergen Gross (2): x86: respect memory size limiting via mem= parameter x86/xen: dont add memory above max allowed allocation arch/x86/kernel/e820.c | 5 +++++ arch/x86/xen/setup.c | 10 ++++++++++ drivers/xen/xen-balloon.c | 6 ++++++ include/linux/memory_hotplug.h | 2 ++ mm/memory_hotplug.c | 6 ++++++ 5 files changed, 29 insertions(+) -- 2.16.4