From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id AD307C433FE for ; Mon, 9 May 2022 18:22:20 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S240126AbiEISZv (ORCPT ); Mon, 9 May 2022 14:25:51 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:37454 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S240102AbiEISZu (ORCPT ); Mon, 9 May 2022 14:25:50 -0400 Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.133.124]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 1A96850B15 for ; Mon, 9 May 2022 11:21:54 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1652120514; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=GLELIP05cS2Sasoe6+b4wWsLybRsaa11r2u6OkGVZbE=; b=f0s52int0JelmBqnOPR54/R/iT71rBi56fmkqJCsr21g+/0Z6PJ6RFlW7y0YJa2B9Sau4M lztJBLYGwL0js/sdG8My6ERzwrCNGslm1SUFOqOKWkZ8h43T6rNdkRKVbtMhe5/s9Ecy2Q k0lkh1F29w5350smM2QuSK3o+HquFbs= Received: from mail-ed1-f72.google.com (mail-ed1-f72.google.com [209.85.208.72]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id us-mta-146-NshYIJKfOga7-0MqirvqzA-1; Mon, 09 May 2022 14:21:52 -0400 X-MC-Unique: NshYIJKfOga7-0MqirvqzA-1 Received: by mail-ed1-f72.google.com with SMTP id s24-20020a05640217d800b00425e19e7deaso8729148edy.3 for ; Mon, 09 May 2022 11:21:52 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:message-id:date:mime-version:user-agent:subject :content-language:from:to:cc:references:in-reply-to :content-transfer-encoding; bh=GLELIP05cS2Sasoe6+b4wWsLybRsaa11r2u6OkGVZbE=; b=c+espc5SnJEZa+6m9YAoySOtpOZU/5oVu3thzRprFsFG+TgQVjG1yfg8ncBTFWa7sK QX2eI5oIm9cmGaWHUtrlb80N/XOb4i9EG0FAM3IokwF33kjBRfgRUHkmzGO115KiywGM T7uvc2VtTe8hEX7EihdFfc56hRFMtw5H68BzcrZ22L6UTeGuizeQmm+/gxrfaQltP0Wp ThZDhsfgJbnHaCeLDBPIPprm8f4T5wgjS92c9Oj6lTiyR/OgUxvILMAIiDzVIElZWLwO RW2qANM2ypXyaxR+OgqDMubRGgjJWP3oISs8DaO2ZhwfwKbJvwQWEDi42de7StVuPl5T ec9g== X-Gm-Message-State: AOAM533qIEcrgFdSvDQxe9TXSjfCigjVkLJEakwcDNYpn1EhPPmES+bk 9EU832cuocXopJ4ynoHgf8XLAlwUh4cMWJwybNUsgpzabMXN0DSp2l56vvt4nzVcijf02mL6is5 RxRQWZZ0woh0DcJLLxMnA X-Received: by 2002:a17:907:a40f:b0:6f4:d2af:b720 with SMTP id sg15-20020a170907a40f00b006f4d2afb720mr15610566ejc.305.1652120511563; Mon, 09 May 2022 11:21:51 -0700 (PDT) X-Google-Smtp-Source: ABdhPJy/h0R6H0k8bGlFW4rRwRK5rVBv4TH8gq9z/VHyMkltf2eYOwIrrjQygUl+WxGrXFrMCy4GKg== X-Received: by 2002:a17:907:a40f:b0:6f4:d2af:b720 with SMTP id sg15-20020a170907a40f00b006f4d2afb720mr15610545ejc.305.1652120511231; Mon, 09 May 2022 11:21:51 -0700 (PDT) Received: from ?IPV6:2001:1c00:c1e:bf00:d69d:5353:dba5:ee81? (2001-1c00-0c1e-bf00-d69d-5353-dba5-ee81.cable.dynamic.v6.ziggo.nl. [2001:1c00:c1e:bf00:d69d:5353:dba5:ee81]) by smtp.gmail.com with ESMTPSA id gg19-20020a170906899300b006f3ef214dfbsm5303192ejc.97.2022.05.09.11.21.50 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Mon, 09 May 2022 11:21:50 -0700 (PDT) Message-ID: Date: Mon, 9 May 2022 20:21:49 +0200 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101 Thunderbird/91.8.0 Subject: Re: [PATCH v7 1/1] x86/PCI: Ignore E820 reservations for bridge windows on newer systems Content-Language: en-US From: Hans de Goede To: Bjorn Helgaas Cc: "Rafael J . Wysocki" , Mika Westerberg , =?UTF-8?Q?Krzysztof_Wilczy=c5=84ski?= , Bjorn Helgaas , Myron Stowe , Juha-Pekka Heikkila , Thomas Gleixner , Ingo Molnar , Borislav Petkov , "H . Peter Anvin" , =?UTF-8?Q?Benoit_Gr=c3=a9goire?= , Hui Wang , linux-acpi@vger.kernel.org, linux-pci@vger.kernel.org, x86@kernel.org, linux-kernel@vger.kernel.org References: <20220507153142.GA568130@bhelgaas> <3e92c4b6-8976-2bd4-ebe2-465990eb66d2@redhat.com> In-Reply-To: <3e92c4b6-8976-2bd4-ebe2-465990eb66d2@redhat.com> Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-pci@vger.kernel.org Hi, On 5/9/22 19:33, Hans de Goede wrote: > Hi Bjorn, > > On 5/7/22 17:31, Bjorn Helgaas wrote: >> On Sat, May 07, 2022 at 12:09:03PM +0200, Hans de Goede wrote: >>> Hi Bjorn, >>> >>> On 5/6/22 18:51, Bjorn Helgaas wrote: >>>> On Thu, May 05, 2022 at 05:20:16PM +0200, Hans de Goede wrote: >>>>> Some BIOS-es contain bugs where they add addresses which are already >>>>> used in some other manner to the PCI host bridge window returned by >>>>> the ACPI _CRS method. To avoid this Linux by default excludes >>>>> E820 reservations when allocating addresses since 2010, see: >>>>> commit 4dc2287c1805 ("x86: avoid E820 regions when allocating address >>>>> space"). >>>>> >>>>> Recently (2019) some systems have shown-up with E820 reservations which >>>>> cover the entire _CRS returned PCI bridge memory window, causing all >>>>> attempts to assign memory to PCI BARs which have not been setup by the >>>>> BIOS to fail. For example here are the relevant dmesg bits from a >>>>> Lenovo IdeaPad 3 15IIL 81WE: >>>>> >>>>> [mem 0x000000004bc50000-0x00000000cfffffff] reserved >>>>> pci_bus 0000:00: root bus resource [mem 0x65400000-0xbfffffff window] >>>>> >>>>> The ACPI specifications appear to allow this new behavior: >>>>> >>>>> The relationship between E820 and ACPI _CRS is not really very clear. >>>>> ACPI v6.3, sec 15, table 15-374, says AddressRangeReserved means: >>>>> >>>>> This range of addresses is in use or reserved by the system and is >>>>> not to be included in the allocatable memory pool of the operating >>>>> system's memory manager. >>>>> >>>>> and it may be used when: >>>>> >>>>> The address range is in use by a memory-mapped system device. >>>>> >>>>> Furthermore, sec 15.2 says: >>>>> >>>>> Address ranges defined for baseboard memory-mapped I/O devices, such >>>>> as APICs, are returned as reserved. >>>>> >>>>> A PCI host bridge qualifies as a baseboard memory-mapped I/O device, >>>>> and its apertures are in use and certainly should not be included in >>>>> the general allocatable pool, so the fact that some BIOS-es reports >>>>> the PCI aperture as "reserved" in E820 doesn't seem like a BIOS bug. >>>>> >>>>> So it seems that the excluding of E820 reserved addresses is a mistake. >>>>> >>>>> Ideally Linux would fully stop excluding E820 reserved addresses, >>>>> but then various old systems will regress. >>>>> Instead keep the old behavior for old systems, while ignoring >>>>> the E820 reservations for any systems from now on. >>>>> >>>>> Old systems are defined here as BIOS year < 2018, this was chosen to >>>>> make sure that pci_use_e820 will not be set on the currently affected >>>>> systems, the oldest known one is from 2019. >>>>> >>>>> Testing has shown that some newer systems also have a bad _CRS return. >>>>> The pci_crs_quirks DMI table is used to keep excluding E820 reservations >>>>> from the bridge window on these systems. >>>>> >>>>> Also add pci=no_e820 and pci=use_e820 options to allow overriding >>>>> the BIOS year + DMI matching logic. >>>>> >>>>> BugLink: https://bugzilla.kernel.org/show_bug.cgi?id=206459 >>>>> BugLink: https://bugzilla.redhat.com/show_bug.cgi?id=1868899 >>>>> BugLink: https://bugzilla.redhat.com/show_bug.cgi?id=1871793 >>>>> BugLink: https://bugs.launchpad.net/bugs/1878279 >>>>> BugLink: https://bugs.launchpad.net/bugs/1931715 >>>>> BugLink: https://bugs.launchpad.net/bugs/1932069 >>>>> BugLink: https://bugs.launchpad.net/bugs/1921649 >>>>> Cc: Benoit Grégoire >>>>> Cc: Hui Wang >>>>> Signed-off-by: Hans de Goede >>>> >>>>> + * Ideally Linux would fully stop using E820 reservations, but then >>>>> + * various old systems will regress. Instead keep the old behavior for >>>>> + * old systems + known to be broken newer systems in pci_crs_quirks. >>>>> + */ >>>>> + if (year >= 0 && year < 2018) >>>>> + pci_use_e820 = true; >>>> >>>> How did you pick 2018? Prior to this patch, we used E820 reservations >>>> for all machines. This patch would change that for 2019-2022 >>>> machines, so there's a risk of breaking some of them. >>> >>> Correct. I picked 2018 because the first devices where using E820 >>> reservations are causing issues (i2c controller not getting resources >>> leading to non working touchpad / thunderbolt hotplug issues) have >>> BIOS dates starting in 2019. I added a year margin, so we could make >>> this 2019. >>> >>>> I'm hesitant about changing the behavior for machines already in the >>>> field because if they were tested at all with Linux, it was without >>>> this patch. So I would lean toward preserving the current behavior >>>> for BIOS year < 2023. >>> >>> I see, I presume the idea is to then use DMI to disable E820 clipping >>> on current devices where this is known to cause problems ? >>> >>> So for v8 I would: >>> >>> 1. Change the cut-off check to < 2023 >>> 2. Drop the DMI quirks I added for models which are known to need E820 >>> clipping hit by the < 2018 check >>> 3. Add DMI quirks for models for which it is known that we must _not_ >>> do E820 clipping >>> >>> Is this the direction you want to go / does that sound right? >> >> Yes, I think that's what we should do. All the machines in the field >> will be unaffected, except that we add quirks for known problems. > > I've been working on this today. I've mostly been going through > the all the existing bugs about this, to make a list of DMI matches > for devices on which we should _not_ do e820 clipping to fix th > kernel being unable to assign BARs there. > > I've found an interesting pattern there, all affected devices > are Lenovo devices with "IIL" in there device name, e.g. : > "IdeaPad 3 15IIL05". I've looked up all Lenovo devices which > have "IIL" as part of their DMI_PRODUCT_VERSION string here: > https://github.com/linuxhw/DMI/ > > And then looked them up at https://linux-hardware.org/ and checked > their dmesg to see if they have the e820 problem other ideapads > have. I've gone through approx. half the list now and all > except one model seem to have the e820 problem. > > So it looks like we might be able to match all problem models > with a single DMI match. > > So the problem seems to be limited to one specific device > series / range and this is making me have second thoughts > about doing a date based cut-off at all. Trying to switch > over any models which are new in 2023 is fine, the problem > with a DMI BIOS date approach though is that as soon as some > new management-engine CVE comes out we will also see BIOS > updates with a year of 2023 for many existing models, of > up to 3-4 years old at least; and chances are that some of > those older models getting BIOS updates will be bitten by > this change. > > So as said I'm having second thoughts about the date based > approach. Bjorn, what do you think of just using DMI quirks > to disable e820 clipping on known problematic models and > otherwise keeping things as is ? > > Note I'm also fine with going with the 2023 date based > approach, I'm just wondering if that will be a good idea > and not something which we might regret later. > > Regards, > > Hans > > > p.s. > > I've seen your email about the Acer laptop; I'll take > a look at that coming Wednesday. So I couldn't help myself and I took a quick peek. This definitely is the same issue as on the various lenovo devices, with an E820 reserved region covering the entire bridge window, causing assigning unassigned BARs like for the I2C controller for the touchpad to not work. Interestingly enough, this is the first non Lenovo machine with this issue I have heard about. Regards, Hans