Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp68761imu; Mon, 19 Nov 2018 17:55:22 -0800 (PST) X-Google-Smtp-Source: AFSGD/UeQ5cT3gLQPybtBXg/6g26W9m8qj/6411rIsyRtzsUVwSvr9KStzVaNBWgtoJz+QmskdjO X-Received: by 2002:a17:902:560f:: with SMTP id h15-v6mr139753pli.160.1542678921955; Mon, 19 Nov 2018 17:55:21 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1542678921; cv=none; d=google.com; s=arc-20160816; b=QeMM0oAaS0LGUJ+0lMju8gzhL7nU5EI63m6XO2Oc+e2O88JlSgBtje+AO5bOXvwaCd Nulqw14Gh2znk4agASO4hw8Ux2PVVWX/yeo6ileoKN94zVAS/hkQ+1NLaRpWHevuBuFb pMRA0TDRvXJ8ENAC7SiWr/SiTwuM3yiB+fBtqCzPEMERvMSCf7mffNO/rk0GyeiO2tkX wjRNhUqvvfxAz8MkzRLGMwzxdkLcXrFzYlRgdZsY334BXYFvwtuuAq5Q4K4OB6C9p6VW xwKYXGLqfi9eHcLzxtyc4UVGY78FYzwWfUAPuGbSsRFPJEljBk86wdqTMhRZmhyvVNS0 34tA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject:dkim-signature; bh=g7VnL/9TUfjo/4wDGxMTTKUltfFMXpu2wKIrjHzfZyU=; b=UVik801V/0YxdBwvaFIcMOiPVJvA3c5f2d5O+s6MlIfwaqLN1mO43fXeFuKoK/PPhG FywOzM4jfKSTMzmEmuNNR3NEix4nQsI/iiO8EYxnkiDuqgWgmH/3MbsRjuA/Vevs+zrs 0tCOKpxYcubvvxYLuDv4UeeFdZ01GnZIcV5QBPsgOU5eaGuI/H2G5yAo5BpdmL+AqMwJ horq48wsoTrsVlAP3kJUkZm+8R0/wFMlTEdD2fMVi32CyfBbIdm/EpKNbYPa2O1Po1cx hymnEWQZc07BVWVS1iAdCbtuy3dMf+ky9ZRkYkU8fAi3H01hKi/lscLv3fLJsuxl4kps wCtQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=bBK1FpuK; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id n24si5467677pgv.119.2018.11.19.17.55.03; Mon, 19 Nov 2018 17:55:21 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=bBK1FpuK; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1732707AbeKTMVE (ORCPT + 99 others); Tue, 20 Nov 2018 07:21:04 -0500 Received: from mail.kernel.org ([198.145.29.99]:38182 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1730044AbeKTMVE (ORCPT ); Tue, 20 Nov 2018 07:21:04 -0500 Received: from [192.168.0.109] (cpe-174-109-247-98.nc.res.rr.com [174.109.247.98]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id A5CA22080C; Tue, 20 Nov 2018 01:54:23 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1542678865; bh=SKyjJA+9q/5M5jSNQgYSS65jciomRDOHucw5o12BtcQ=; h=Subject:To:Cc:References:From:Date:In-Reply-To:From; b=bBK1FpuKT6phXZvtPCDoi+Gl7M6r44TxJA73vBXa1h4NYBI2uMGB1s+q6QOox3IFS 0IBMJG4GiyVN0lXvFxK+OImrLYaNsaBX7GNzevBL4PPcT/CGtdM8+topoM6hWTa8db gAojzIXBhYa/8ZDZ4xh9cYiVatjt2TJI4Uc8UPN0= Subject: Re: [PATCH 0/2] PCI/AER: Consistently use _OSC to determine who owns AER To: Alex_Gagniuc@Dellteam.com, mr.nuke.me@gmail.com, keith.busch@intel.com Cc: baicar.tyler@gmail.com, Austin.Bolen@dell.com, Shyam.Iyer@dell.com, lukas@wunner.de, bhelgaas@google.com, rjw@rjwysocki.net, lenb@kernel.org, ruscur@russell.cc, sbobroff@linux.ibm.com, oohall@gmail.com, linux-pci@vger.kernel.org, linux-acpi@vger.kernel.org, linux-kernel@vger.kernel.org, linuxppc-dev@lists.ozlabs.org References: <20181115231605.24352-1-mr.nuke.me@gmail.com> <20181119165318.GB26595@localhost.localdomain> <74f2c527-0890-5e14-5e2d-48934a42dae6@kernel.org> <20181119174127.GE26595@localhost.localdomain> <20181119181051.GA26707@localhost.localdomain> <3f923367-2cc1-c0d6-bca6-bf9a03d1b9ca@gmail.com> <84013a8a-287d-d700-6710-91cc35f507c8@kernel.org> <9c9531c7efb846438f03f744b9afc466@ausx13mps321.AMER.DELL.COM> From: Sinan Kaya Message-ID: <3b18a9fa-7bdd-0fb4-285d-4efb454be50a@kernel.org> Date: Mon, 19 Nov 2018 20:54:21 -0500 User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:60.0) Gecko/20100101 Thunderbird/60.3.1 MIME-Version: 1.0 In-Reply-To: <9c9531c7efb846438f03f744b9afc466@ausx13mps321.AMER.DELL.COM> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 11/19/2018 6:49 PM, Alex_Gagniuc@Dellteam.com wrote: > On 11/19/2018 02:33 PM, Sinan Kaya wrote: >> However; table assumes governance about for which entities firmware first >> should be enabled. There is no cross reference to _OSC or permission >> negotiation like _OST. > > Well, from an OSPM perspective, is FFS something that can be enabled or > disabled? FFS seems to be static to OSPM, which would change the sort of > assumptions we can reasonably make here. IMO, it can be enabled/disabled in BIOS. I have seen this implementation before. If the trigger is the presence of a statically compiled ACPI HEST table (as the current code does); presence of FFS would be static from OSPM perspective. BIOS could patch this table or hide it during boot. If FFS were to be negotiated via _OSC as indirectly implied in this series, then same BIOS could patch the ACPI table to return different values for the _OSC return. > > >>>> As I said in my previous email, the right place to talk about this is UEFI >>>> forum. >>> >>> The way I would present the problem to he spec writers is that, although >>> the spec appears to be consistent, we've seen firmware vendors that made >>> the wrong assumptions about HEST/_OSC. Instead of describing AER >>> ownership with _OSC, they attempted to do it with HEST. So we should add >>> an implementation note, or clarification about this. >> >> I agree. > > Cool. While the UEFI Secret Society debates, can we figure out if/how > [patch 1/2] breaks those systems, or is it only [patch 2/2] of this > series that we suspect? I went back and looked at both patches. Both of them are removing references to HEST table. I think both patches are impacted by this discussion. > > Alex >