Received: by 2002:a25:c593:0:0:0:0:0 with SMTP id v141csp442660ybe; Wed, 4 Sep 2019 02:09:54 -0700 (PDT) X-Google-Smtp-Source: APXvYqwxMXSnW2qbHMxloWg4vqAovH5fnZJdxkEA2L7D1asyKF9j0zJMW34KjV+HGYcMo4sTDfuM X-Received: by 2002:a17:902:968e:: with SMTP id n14mr39596793plp.312.1567588194229; Wed, 04 Sep 2019 02:09:54 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1567588194; cv=none; d=google.com; s=arc-20160816; b=oUILI4GL/gMv2wNHkShmOOBxegvaYa184XfdREszKSvoJO57mPQP7SKb9N0O9qMxze rscfMaPXi3XoivUFqU8TBnvao9KtOitK1lr4nvXblQwwMC36UUSr1GX7S6i4fQWUgd6A 155GFq/wCS8X9AnTYioUg056ZB+Umi0Zq/oYCrE7BAMqkkNLlFcdqmH9ulk9/GOWcIR1 9Az80S1LZpTBSoW7Uub5tTuUlj92ThgScTWYj1hS1hP+K5vju+mVkvwMMQIfpjhy0e6Q QM7dqiiNIox/zrY/3e+Pzn5YKUCpPRkx4OXl9SUMenHqpVyny2dzsHeMaMJMsrBLdYQz D6vA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject; bh=EtbejuMN2MfTSyMSv8ipXkSKKSR7de2H4ehu61+STFo=; b=OCBNtEk8bd10IPzMw1ojPjLkSMDKphGOERmiHcftrKsvPKeVNucjTfFKvUTOqF1+4c 7c4X3fFG2JNi9scYhT4wPaWkku05PMS4r01e/4UTcWOXcf1Zyi3uugmjCN1By3tzVFk/ btEQBYwrp0Qb1KX/nFSyuGeHSCw6rqEeJl0RdOrgdfIetkcw4h4cJ4V5XUu4Tt6ABgVc MnMX+OYkkPKymByQQ6IPUfS2hpFvUh8upA5zQJ+H10ygbtANiYXPaqcSo3qWLQVh+XMy prbtgIr13ATXSvtMvfAt9EEdhWs5xZEW7Ot9z/xPJFEsJJZ++yx8LYvdeXGJRQjqhIRR RGKA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id b16si16617432pgh.296.2019.09.04.02.09.34; Wed, 04 Sep 2019 02:09:54 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727426AbfIDJIk (ORCPT + 99 others); Wed, 4 Sep 2019 05:08:40 -0400 Received: from mx2.suse.de ([195.135.220.15]:42698 "EHLO mx1.suse.de" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1726358AbfIDJIk (ORCPT ); Wed, 4 Sep 2019 05:08:40 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.220.254]) by mx1.suse.de (Postfix) with ESMTP id 703BEB667; Wed, 4 Sep 2019 09:08:39 +0000 (UTC) Subject: Re: [PATCH] xen/pci: try to reserve MCFG areas earlier To: Igor Druzhinin , Andrew Cooper Cc: xen-devel@lists.xenproject.org, linux-kernel@vger.kernel.org, boris.ostrovsky@oracle.com, Juergen Gross References: <1567556431-9809-1-git-send-email-igor.druzhinin@citrix.com> From: Jan Beulich Message-ID: <52fe7f67-ffd0-2d22-90fb-f3462ea059cd@suse.com> Date: Wed, 4 Sep 2019 11:08:45 +0200 User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:60.0) Gecko/20100101 Thunderbird/60.8.0 MIME-Version: 1.0 In-Reply-To: <1567556431-9809-1-git-send-email-igor.druzhinin@citrix.com> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 04.09.2019 02:20, Igor Druzhinin wrote: > If MCFG area is not reserved in E820, Xen by default will defer its usage > until Dom0 registers it explicitly after ACPI parser recognizes it as > a reserved resource in DSDT. Having it reserved in E820 is not > mandatory according to "PCI Firmware Specification, rev 3.2" (par. 4.1.2) > and firmware is free to keep a hole E820 in that place. Xen doesn't know > what exactly is inside this hole since it lacks full ACPI view of the > platform therefore it's potentially harmful to access MCFG region > without additional checks as some machines are known to provide > inconsistent information on the size of the region. Irrespective of this being a good change, I've had another thought while reading this paragraph, for a hypervisor side control: Linux has a "memopt=" command line option allowing fine grained control over the E820 map. We could have something similar to allow inserting an E820_RESERVED region into a hole (it would be the responsibility of the admin to guarantee no other conflicts, i.e. it should generally be used only if e.g. the MCFG is indeed known to live at the specified place, and being properly represented in the ACPI tables). Thoughts? Jan