Received: by 2002:a25:c593:0:0:0:0:0 with SMTP id v141csp581525ybe; Wed, 4 Sep 2019 04:44:30 -0700 (PDT) X-Google-Smtp-Source: APXvYqzZrSPBC//MD66AC/HxU2ZfERiRdHEKF+l9QSkFD8IYuPTp0OWHRhq5uc8RDKYjfY9ey5jl X-Received: by 2002:a17:902:7791:: with SMTP id o17mr24022611pll.10.1567597470850; Wed, 04 Sep 2019 04:44:30 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1567597470; cv=none; d=google.com; s=arc-20160816; b=ZczCTxvfi3pFYIylXz1D3CnlzagBsY+9Nz+YZU/JA3NoRqVbbmGIx3ugVrj26/5KtQ f7RPpsk7OpGDyV9i6V2WZu1KUzvj+levotDgFg7K3w2WFRsvrXpCUSqikGzRWI3Muy1b BgIlM/Il5kzQmsyT2c2USH2klq1czoBlKDn0N3r63KDjhvKYHdnNnlKqo9JKnFjgvQFe LB4sk3qHdBpbFjvWSpaO7NNdzJjwp3i0RRc6Fg9xxFFmFBjT52hRm1jQzK85CwsSh0CW EjxW0tomoevb7leqHrFB4kU96/9d1HaaaHplrgumo+GwBPSVbEJACq4BJzXrqgSQ0mgi APuQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject:ironport-sdr :dkim-signature; bh=0L5D1GP1/6FeQ2PBU42CVDZiXFAQKIuRk7bWYkXbH/g=; b=pX1rVwwDz8qJ5rTijRUCZYUL82r8FjuP+WaihER7djIU/pTzxwdg6RLFld+6rQbVQ8 58uiA+vrg4ZxrJhDjK3YFKZxbft1xjrElMq1/sHWtK9C2rBqPj3270zfxVcCchuGLL9t 80Eb6ov6eHLSvZCRi2xny2VM2aT0UHPE0Qo++gb4z3QQn20fCVBASAOWnSRet6iPF1J+ A1QMXBZStFgGckwnGzsganCYoJCz7JtFmfYYNzZWisPduFJ9YTWMiKaT+aRAS4eYidl4 u6WFZ3foeEgAALT3SdbBDhu1NSs30kjbaDc3G/X8gKV+UEO2xuRh3XXl7qef49PC1dna G+Ag== ARC-Authentication-Results: i=1; mx.google.com; dkim=fail header.i=@citrix.com header.s=securemail header.b=HcwA6HCP; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id r26si16628289pgv.189.2019.09.04.04.44.14; Wed, 04 Sep 2019 04:44:30 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=fail header.i=@citrix.com header.s=securemail header.b=HcwA6HCP; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729594AbfIDLnM (ORCPT + 99 others); Wed, 4 Sep 2019 07:43:12 -0400 Received: from esa2.hc3370-68.iphmx.com ([216.71.145.153]:46457 "EHLO esa2.hc3370-68.iphmx.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729122AbfIDLnL (ORCPT ); Wed, 4 Sep 2019 07:43:11 -0400 X-Greylist: delayed 425 seconds by postgrey-1.27 at vger.kernel.org; Wed, 04 Sep 2019 07:43:10 EDT DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=citrix.com; s=securemail; t=1567597390; h=subject:to:cc:references:from:message-id:date: mime-version:in-reply-to:content-transfer-encoding; bh=Py2ZD8CCSw/9B0rd6D03QDD9TGSgz5D84ZWXYCCdtq8=; b=HcwA6HCPbB/1iVnFtUqzUlucAdDgvgwiGR+nadl55l/HoVIqjfW/6cnK Kp0nLo0GFXKXOFbfv05Po6A8H3krhCeXWm6tJxltLUT6dI3R71j6NULIm NKYB3ygq9k9hEC3lFyWJkz48pEh+kO7AOHXKUtKyuy6FXCnYnaZnMijjG g=; Authentication-Results: esa2.hc3370-68.iphmx.com; dkim=none (message not signed) header.i=none; spf=None smtp.pra=igor.druzhinin@citrix.com; spf=Pass smtp.mailfrom=igor.druzhinin@citrix.com; spf=None smtp.helo=postmaster@mail.citrix.com Received-SPF: None (esa2.hc3370-68.iphmx.com: no sender authenticity information available from domain of igor.druzhinin@citrix.com) identity=pra; client-ip=162.221.158.21; receiver=esa2.hc3370-68.iphmx.com; envelope-from="igor.druzhinin@citrix.com"; x-sender="igor.druzhinin@citrix.com"; x-conformance=sidf_compatible Received-SPF: Pass (esa2.hc3370-68.iphmx.com: domain of igor.druzhinin@citrix.com designates 162.221.158.21 as permitted sender) identity=mailfrom; client-ip=162.221.158.21; receiver=esa2.hc3370-68.iphmx.com; envelope-from="igor.druzhinin@citrix.com"; x-sender="igor.druzhinin@citrix.com"; x-conformance=sidf_compatible; x-record-type="v=spf1"; x-record-text="v=spf1 ip4:209.167.231.154 ip4:178.63.86.133 ip4:195.66.111.40/30 ip4:85.115.9.32/28 ip4:199.102.83.4 ip4:192.28.146.160 ip4:192.28.146.107 ip4:216.52.6.88 ip4:216.52.6.188 ip4:162.221.158.21 ip4:162.221.156.83 ~all" Received-SPF: None (esa2.hc3370-68.iphmx.com: no sender authenticity information available from domain of postmaster@mail.citrix.com) identity=helo; client-ip=162.221.158.21; receiver=esa2.hc3370-68.iphmx.com; envelope-from="igor.druzhinin@citrix.com"; x-sender="postmaster@mail.citrix.com"; x-conformance=sidf_compatible IronPort-SDR: 2PTu1kolVbKh7SpgBh5Drp1q5mHyou+YZiM+VEqUUyr78eZkRLs3AGIVi00rAA/BJKspJQfYBF 3GaJIe+PrYIECgWU8inhCmA2FqHQuR6bT2blqwD12xI7+Ex/yHfCghPkbiJdJQeGlW+lAF3+Tf P+TXL70gVl1Pfc+zaH3Qsns+LKZK5zKh3s4xAKoEOPAbSRWWHjSUkkTHA5TdlBVQPu8S+0+5gz K/l+8Z/vM4LGBuHVLdB2pl6V9xUjd+9AlnGcbL5Ldl/wr520/JWn1LfIvVmKmsZHASjVFg7yDg Fjc= X-SBRS: 2.7 X-MesageID: 5111376 X-Ironport-Server: esa2.hc3370-68.iphmx.com X-Remote-IP: 162.221.158.21 X-Policy: $RELAYED X-IronPort-AV: E=Sophos;i="5.64,465,1559534400"; d="scan'208";a="5111376" Subject: Re: [PATCH] xen/pci: try to reserve MCFG areas earlier To: Jan Beulich , Andrew Cooper CC: , , , Juergen Gross References: <1567556431-9809-1-git-send-email-igor.druzhinin@citrix.com> <52fe7f67-ffd0-2d22-90fb-f3462ea059cd@suse.com> From: Igor Druzhinin Message-ID: Date: Wed, 4 Sep 2019 12:36:02 +0100 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Thunderbird/60.8.0 MIME-Version: 1.0 In-Reply-To: <52fe7f67-ffd0-2d22-90fb-f3462ea059cd@suse.com> Content-Type: text/plain; charset="utf-8" Content-Language: en-US Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 04/09/2019 10:08, Jan Beulich wrote: > On 04.09.2019 02:20, Igor Druzhinin wrote: >> If MCFG area is not reserved in E820, Xen by default will defer its usage >> until Dom0 registers it explicitly after ACPI parser recognizes it as >> a reserved resource in DSDT. Having it reserved in E820 is not >> mandatory according to "PCI Firmware Specification, rev 3.2" (par. 4.1.2) >> and firmware is free to keep a hole E820 in that place. Xen doesn't know >> what exactly is inside this hole since it lacks full ACPI view of the >> platform therefore it's potentially harmful to access MCFG region >> without additional checks as some machines are known to provide >> inconsistent information on the size of the region. > > Irrespective of this being a good change, I've had another thought > while reading this paragraph, for a hypervisor side control: Linux > has a "memopt=" command line option allowing fine grained control > over the E820 map. We could have something similar to allow > inserting an E820_RESERVED region into a hole (it would be the > responsibility of the admin to guarantee no other conflicts, i.e. > it should generally be used only if e.g. the MCFG is indeed known > to live at the specified place, and being properly represented in > the ACPI tables). Thoughts? What other use cases can you think of in case we'd have this option? From the top of my head, it might be providing a memmap for a second Xen after doing kexec from Xen to Xen. What benefits do you think it might have over just accepting a hole using "mcfg=relaxed" option from admin perspective? Igor