From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id 0AC5EC433F5 for ; Thu, 19 May 2022 15:22:16 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S239096AbiESPWO (ORCPT ); Thu, 19 May 2022 11:22:14 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:35694 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S234696AbiESPWJ (ORCPT ); Thu, 19 May 2022 11:22:09 -0400 Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.133.124]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id E1813606E7 for ; Thu, 19 May 2022 08:22:05 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1652973724; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=oCOOhtQfOiUeAUzQCMYzedVhc/AxXpBqy3Rjtp7VL80=; b=A1BEiz+mSoBNSorMn/olS37fEWAQu5KWdVlQmZYUpZ1VM+e6B/ZjCZPOuuQNbdnZv+A/G1 AhKJApyFrgiOREGRPJsONd8T6DfMl+P2RBfdwvbM/W6fFzenW/xSC79vp9A+DCbCuMv/g6 tuUlhbiDRuNyVz+grZbGm5wSeEtQXf0= Received: from mimecast-mx02.redhat.com (mimecast-mx02.redhat.com [66.187.233.88]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id us-mta-440-YY1iGLTzPw6ZpLeDJu6pFg-1; Thu, 19 May 2022 11:21:59 -0400 X-MC-Unique: YY1iGLTzPw6ZpLeDJu6pFg-1 Received: from smtp.corp.redhat.com (int-mx03.intmail.prod.int.rdu2.redhat.com [10.11.54.3]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx02.redhat.com (Postfix) with ESMTPS id 960F0811E80; Thu, 19 May 2022 15:21:58 +0000 (UTC) Received: from localhost.localdomain (unknown [10.39.192.117]) by smtp.corp.redhat.com (Postfix) with ESMTP id 2FA471121314; Thu, 19 May 2022 15:21:56 +0000 (UTC) From: Hans de Goede To: "Rafael J . Wysocki" , Mika Westerberg , =?UTF-8?q?Krzysztof=20Wilczy=C5=84ski?= , Bjorn Helgaas , Myron Stowe , Juha-Pekka Heikkila , Thomas Gleixner , Ingo Molnar , Borislav Petkov , "H . Peter Anvin" Cc: Hans de Goede , =?UTF-8?q?Benoit=20Gr=C3=A9goire?= , Hui Wang , linux-acpi@vger.kernel.org, linux-pci@vger.kernel.org, x86@kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH v9 0/3] x86/PCI: Ignore E820 reservations for bridge windows on future systems Date: Thu, 19 May 2022 17:21:47 +0200 Message-Id: <20220519152150.6135-1-hdegoede@redhat.com> MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Scanned-By: MIMEDefang 2.78 on 10.11.54.3 Precedence: bulk List-ID: X-Mailing-List: linux-acpi@vger.kernel.org Hi All, Here is v9 of my patch to address the E820 reservations vs PCI host bridge ranges issue which are causing touchpad and/or thunderbolt issues on many different laptop models. After previous attempts to identify these systems by looking for E820 reservations covering the entire bridge window, which broke the boot on some coreboot based ChromeBooks we are now back to using a bios date + DMI quirks based approach. Changes in v9: - Split making use_e820=false the default for BIOS year >= 2023 out into a separate patch - Split the addition of DMI quirks out into a separate patch - Add a DMI quirk for the TUXEDO Book XUX7 - Gen12 Changes in v8: - Change the cut-off for no longer excluding E820 reservations from the bridge window to BIOS year >= 2023 so that this only applies to upcoming systems. - Use DMI quirks for existing systems on which excluding E820 reservations from the _CRS returned bridge window is an issue. This is based on top of Bjorn's pci/resource branch: https://git.kernel.org/pub/scm/linux/kernel/git/helgaas/pci.git/log/?h=pci/resource Regards, Hans Hans de Goede (3): x86/PCI: Add kernel cmdline options to use/ignore E820 reserved regions x86/PCI: Add DMI quirks to ignore E820 reserved regions on some systems x86/PCI: Ignore E820 reserved regions for bridge windows on future systems .../admin-guide/kernel-parameters.txt | 9 ++ arch/x86/include/asm/pci_x86.h | 2 + arch/x86/pci/acpi.c | 121 +++++++++++++++++- arch/x86/pci/common.c | 8 ++ 4 files changed, 138 insertions(+), 2 deletions(-) -- 2.36.0