From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id 5B012C433F5 for ; Thu, 12 May 2022 20:25:33 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1358353AbiELUZb (ORCPT ); Thu, 12 May 2022 16:25:31 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:34830 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1358344AbiELUZa (ORCPT ); Thu, 12 May 2022 16:25:30 -0400 Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.129.124]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id CA3F92734F6 for ; Thu, 12 May 2022 13:25:28 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1652387127; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=A+SVmp8Ec1mwAnRL9D+3Iqr0uC2bLC542T8P5rVpM1s=; b=Q/E4IUpkNaIzMopSj/wUebb5lSg8J56WdJLzeqyYG+BedGA7VptboXfFSY6mceAW79VyOk //KV0zBeNf62XYyuyCkmglfo2JVGw/mf2++lpsPRpxlE58f2ha3m12Sb2EHsTxETszVxP3 qjUDCYfozXH+V7uwUJYis4NCul1QZt4= Received: from mimecast-mx02.redhat.com (mimecast-mx02.redhat.com [66.187.233.88]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id us-mta-107-qKjpMjsnNjyiSDCCJcbD4Q-1; Thu, 12 May 2022 16:25:24 -0400 X-MC-Unique: qKjpMjsnNjyiSDCCJcbD4Q-1 Received: from smtp.corp.redhat.com (int-mx04.intmail.prod.int.rdu2.redhat.com [10.11.54.4]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx02.redhat.com (Postfix) with ESMTPS id 92FC1101A52C; Thu, 12 May 2022 20:25:23 +0000 (UTC) Received: from shalem.redhat.com (unknown [10.39.192.5]) by smtp.corp.redhat.com (Postfix) with ESMTP id 993EA2026D6A; Thu, 12 May 2022 20:25:12 +0000 (UTC) From: Hans de Goede To: "Rafael J . Wysocki" , Mika Westerberg , =?UTF-8?q?Krzysztof=20Wilczy=C5=84ski?= , Bjorn Helgaas , Myron Stowe , Juha-Pekka Heikkila , Thomas Gleixner , Ingo Molnar , Borislav Petkov , "H . Peter Anvin" Cc: Hans de Goede , =?UTF-8?q?Benoit=20Gr=C3=A9goire?= , Hui Wang , linux-acpi@vger.kernel.org, linux-pci@vger.kernel.org, x86@kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH v8 0/1] x86/PCI: Ignore E820 reservations for bridge windows on future systems Date: Thu, 12 May 2022 22:25:10 +0200 Message-Id: <20220512202511.34197-1-hdegoede@redhat.com> MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Scanned-By: MIMEDefang 2.78 on 10.11.54.4 Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi All, Here is v8 of my patch to address the E820 reservations vs PCI host bridge ranges issue which are causing touchpad and/or thunderbolt issues on many different laptop models. After previous attemps to identify these systems by looking for E820 reservations covering the entire bridge window, which broke the boot on some coreboot based ChromeBooks we are now back to using a bios date based approach. Changes in v8: - Change the cut-off for no longer excluding E820 reservations from the bridge window to BIOS year >= 2023 so that this only applies to upcoming systems. - Use DMI quirks for existing systems on which excluding E820 reservations from the _CRS returned bridge window is an issue. This is based on top of Bjorn's pci/resource branch: https://git.kernel.org/pub/scm/linux/kernel/git/helgaas/pci.git/log/?h=pci/resource Regards, Hans Hans de Goede (1): x86/PCI: Ignore E820 reservations for bridge windows on future systems .../admin-guide/kernel-parameters.txt | 9 ++ arch/x86/include/asm/pci_x86.h | 2 + arch/x86/pci/acpi.c | 109 +++++++++++++++++- arch/x86/pci/common.c | 8 ++ 4 files changed, 126 insertions(+), 2 deletions(-) -- 2.36.0