Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp5625178imu; Wed, 30 Jan 2019 00:24:39 -0800 (PST) X-Google-Smtp-Source: ALg8bN5SHeeX9B0uT5o4Qlf1BQdzozPPIBEZIXliRkbVh3YbLrGo5QCdxL1BiI6HQBp4cNg8bxDz X-Received: by 2002:a17:902:b48b:: with SMTP id y11mr28285263plr.200.1548836679831; Wed, 30 Jan 2019 00:24:39 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1548836679; cv=none; d=google.com; s=arc-20160816; b=PUtsePgfI9BOwkwdCqgmcoZmJxDX5E4laRH3/EmhAMkjC3JMJE80xSxbWDyZ1C3S+3 4XXaUBdnGflKWaLwvIidrjRwlv9Lv5u4osLgf5/2fOeCniWrSo2aBtDnv+76jTVVNvgU lKI83SXyO6WFIYz3fgJz35CiI3ba32Hg0SNCqf1szwchxJN5i16vHptPmV18vP6gd10n uLSmx4yqsh1GXfEswhAcFsFl0Re0oCRAWYwO2bxOQtujHhxqFnkioOTozZCQ8BOJcnnk 9Awk3/pPgNlSvJa/ijObug6aj3JmPl+UspvT4HDsSLMoCN0I2f8L09wUMXBTATTqL8xk 5noA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from; bh=TJO0Zx3zgr6bZWGM/Nb2zUxhbxoNhDHQOJxHEZaXWl4=; b=BABrv16SxgozkrsodBDM/hoO/+K3lQ5RiWGkMnom0BAVyxalJV7Cez4a/PasuBQl/D w/fTFDSOZmjZUragNIeCrtpknmYMKtgGC/pRg2dGnzgq4nN0L/1ps9fG8FofkUrSuutf bXV63vSpzU/uq2SMbTNW7AKykdU8ANMTqXlkqCuS3ljFo/r3Z8yZwSiVqm9Gva+laWPE nLoXZzSsNcVwenbi0Qep03KO7mstuoWVMyv1xzGSUsQFUwrr229O9iAYULr2+hcYrA5j oucnYKZYlKPOkfFQZVxw1Io/zyms4TQNk0OQyH6bIysAi0wLYRbSV+RHFW6oL/byGSkL fziw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 82si937703pfa.115.2019.01.30.00.24.23; Wed, 30 Jan 2019 00:24:39 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730248AbfA3IWi (ORCPT + 99 others); Wed, 30 Jan 2019 03:22:38 -0500 Received: from mx2.suse.de ([195.135.220.15]:52712 "EHLO mx1.suse.de" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1725834AbfA3IWi (ORCPT ); Wed, 30 Jan 2019 03:22:38 -0500 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.220.254]) by mx1.suse.de (Postfix) with ESMTP id ED07CB0DC; Wed, 30 Jan 2019 08:22:36 +0000 (UTC) From: Juergen Gross To: linux-kernel@vger.kernel.org, xen-devel@lists.xenproject.org, x86@kernel.org, linux-mm@kvack.org Cc: boris.ostrovsky@oracle.com, sstabellini@kernel.org, hpa@zytor.com, tglx@linutronix.de, mingo@redhat.com, bp@alien8.de, Juergen Gross Subject: [PATCH v2 1/2] x86: respect memory size limiting via mem= parameter Date: Wed, 30 Jan 2019 09:22:32 +0100 Message-Id: <20190130082233.23840-2-jgross@suse.com> X-Mailer: git-send-email 2.16.4 In-Reply-To: <20190130082233.23840-1-jgross@suse.com> References: <20190130082233.23840-1-jgross@suse.com> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org When limiting memory size via kernel parameter "mem=" this should be respected even in case of memory made accessible via a PCI card. Today this kind of memory won't be made usable in initial memory setup as the memory won't be visible in E820 map, but it might be added when adding PCI devices due to corresponding ACPI table entries. Not respecting "mem=" can be corrected by adding a global max_mem_size variable set by parse_memopt() which will result in rejecting adding memory areas resulting in a memory size above the allowed limit. Signed-off-by: Juergen Gross --- arch/x86/kernel/e820.c | 5 +++++ include/linux/memory_hotplug.h | 2 ++ mm/memory_hotplug.c | 6 ++++++ 3 files changed, 13 insertions(+) diff --git a/arch/x86/kernel/e820.c b/arch/x86/kernel/e820.c index 50895c2f937d..e67513e2cbbb 100644 --- a/arch/x86/kernel/e820.c +++ b/arch/x86/kernel/e820.c @@ -14,6 +14,7 @@ #include #include #include +#include #include #include @@ -881,6 +882,10 @@ static int __init parse_memopt(char *p) e820__range_remove(mem_size, ULLONG_MAX - mem_size, E820_TYPE_RAM, 1); +#ifdef CONFIG_MEMORY_HOTPLUG + max_mem_size = mem_size; +#endif + return 0; } early_param("mem", parse_memopt); diff --git a/include/linux/memory_hotplug.h b/include/linux/memory_hotplug.h index 07da5c6c5ba0..fb6bd0022d41 100644 --- a/include/linux/memory_hotplug.h +++ b/include/linux/memory_hotplug.h @@ -98,6 +98,8 @@ extern void __online_page_free(struct page *page); extern int try_online_node(int nid); +extern u64 max_mem_size; + extern bool memhp_auto_online; /* If movable_node boot option specified */ extern bool movable_node_enabled; diff --git a/mm/memory_hotplug.c b/mm/memory_hotplug.c index b9a667d36c55..94f81c596151 100644 --- a/mm/memory_hotplug.c +++ b/mm/memory_hotplug.c @@ -96,10 +96,16 @@ void mem_hotplug_done(void) cpus_read_unlock(); } +u64 max_mem_size = U64_MAX; + /* add this memory to iomem resource */ static struct resource *register_memory_resource(u64 start, u64 size) { struct resource *res, *conflict; + + if (start + size > max_mem_size) + return ERR_PTR(-E2BIG); + res = kzalloc(sizeof(struct resource), GFP_KERNEL); if (!res) return ERR_PTR(-ENOMEM); -- 2.16.4