Due to an influx of spam, we have had to impose restrictions on new accounts. Please see this wiki page for instructions on how to get full permissions. Sorry for the inconvenience.
Admin message
The migration is almost done, at least the rest should happen in the background. There are still a few technical difference between the old cluster and the new ones, and they are summarized in this issue. Please pay attention to the TL:DR at the end of the comment.
But with a proper UEFI level (TCG OPAL i guess) encrypted drive it does not work because the NVME is put in such a deep sleep that the decrypted state is reset. Either the NVME password would have to be asked again as it is at System start from the UEFI or the drive should not be powered off completely to retain its decrypted state.
It is working perfectly fine with Windows 10. I do not even need to enter a password, the NVME stays decrypted or they somehow restore the decryption state without user intervention. I also have an Intel yoga slim 7i with hardware encrypted NVME and suspend is working there too with Linux. There is also no point to switch off an NVME completely, because in the lowest power states it draws only 2.5 milliwatt.
Can you run the study for longer - 30 minutes or so? You can see in that graph at least in that duration of test (~12 minutes), it never went into HW DRIPS (SOC deepest state). So either that is indicating Windows is blocking it from HW drips (due to OPAL) or it didn't have enough time.
So it seems that i have to really install to the internal NVME... I have to backup my data first, resize partitions and install Windows 10. This might take some time and i will report back with newly generated sleep data.
No, I don't have binaries, this was just an idea I'm suggesting. However having talked to the power architect, the SOC requirements don't change from OPAL to non-OPAL. I expect you're going to still have problems by making that change.
As I mentioned before, the architecture for Intel laptops when it comes to s0i3 are different than the architecture in the AMD SOC's on the market today. Renoir and Cezanne both require that the NVME SSD goes into D3 in order to accomplish modern standby.
Well i just switched to an unencrypted drive and a UEFI password. By the way sedutil-cli does not recognize the NVME so the encryption is proprietary lenovo stuff.
Well i just switched to an unencrypted drive and a UEFI password. By the way sedutil-cli does not recognize the NVME so the encryption is proprietary lenovo stuff.
I thought you said it was a TCG OPAL drive? That's a standard. If it is a Lenovo proprietary encryption, you'll need to talk to Lenovo about getting the details used for encryption and decryption to extend the kernel ioctl for this encryption stuff.
This is the new dmesg, but i guess it is not AMDs fault...
You should attach your logs to that bug for the iwlwifi maintainer to look at your situation better.
Something to mention off hand I notice in your logs the card supports both D3hot and D3cold:
[ 0.327823] pci 0000:03:00.0: PME# supported from D0 D3hot D3cold
You might try to set the sysfs attribute d3cold_allowed in /sys/bus/pci/devices? If that helps, maybe iwlwifi needs to set policy accordingly..
Okay - I think I finally understand what's going on. This is a Lenovo specific implementation in the BIOS that is having problems.
Can you please share the output from nvme id-ctrl so we can record what ssd details you have in this bug report?
For now I suggest to keep iommu=pt which will unfortunately effectively disable the iommu for all devices but will work around the root issue. Properly addressing it will require a firmware update from Lenovo.
OK from the internal investigation at AMD - both #1910 (closed) and #1689 (closed) are the same root cause. The Lenovo firmware needs to be fixed to avoid it.
There are a few ways that Lenovo can address it, and that will be up to them which way they choose to do it. Their firmware team can discuss details with AMD if necessary.
From an end user perspective the best workaround until Lenovo has issued a fix will remain to use iommu=pt on the kernel command line.
As such, I'm closing this issue in AMD's bug tracker.
Correct; I don't believe it will help for encrypted NVME resume (your problem) on the Ideapads. You should keep using the iommu=pt workaround there until a firmware solution is come up with.
To make encrypted NVME work you'll need that SMI. BTW - if you want to avoid using encrypted NVME, you can probably port the same set of patches to ideapad-laptop. Feel free to CC me on any patches if you would like a review.