Received: by 2002:a05:6a10:f3d0:0:0:0:0 with SMTP id a16csp1309380pxv; Fri, 2 Jul 2021 00:06:48 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwc6RZONf4Lb+i24/h1yi6LgnxIvnoYKeIrxia+Ex9H5nrPjWPgWrXaAngjvCFok6Ts4BiL X-Received: by 2002:a5e:dc48:: with SMTP id s8mr75799iop.71.1625209608352; Fri, 02 Jul 2021 00:06:48 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1625209608; cv=none; d=google.com; s=arc-20160816; b=S8TBF+lw4vfdIGRxM+2XsLlktFUnn0DI4SeDgox0mbYX91M62MT/MufLrEuXN4ZokK VbXm0eWvs9nBKbItPGrwzfd5zihpWKgPH2RzGfFG0nc3ax32wW+vl3/3uvQouLT3Z0Gv mbMP0sOXjComJD5OB1Q4EHSfs81uoRDcH6SdhgpYvtdWpGtocQTeYvMfjihuWIjFL2GV IeUlDhxGFE+kFfKzfUUCRr6kW/Psw+9xYnx08Ea8O9hgtfXYCjxaV6F/Pa9YVU1KzoYY 98J8hOZuDHBIZKlX89C3BJo5bAXIbfrkoFBqCqoOsdQiguCWUxgb9CyoCMjHgHpiT9YJ /C2g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:references:in-reply-to:message-id:date:subject :cc:to:from; bh=u4xRSpPkBeeYeW1GUit0ddiNl7s7TgRU46/WvL+seXM=; b=CG7vnrb56Gr0qZaru1hsQYtZ8DPmls3k1C6J8kMofVnikVHGi2rVJXJt3xH/LvaIwh FEOzFun2Z5QXIzVjdqgyV2jPLVb/Xf8pCG+ZVWiIhCcF0tft/lvEmMsVyzT8iHKs5ffQ pwFNBv68/+srrY8FYKL17LKaXC9pnKmTHhx97S6WfIVjIcnqoJtPrDacg7F2hcAR6qfQ ocsm77t15SeFA5RqifgND1FhBhy8Hoo1StKD32yd89GPxBZLzuhThJzZpLfHzVsqbKOu CRoPXc+jOnT3IWEDo4Uj3RNNwLUZdjNx/kjrCjKgMmrs/a1BhslHlI3qRm3fvixRWyH4 i8BA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id n28si2239491jap.124.2021.07.02.00.06.36; Fri, 02 Jul 2021 00:06:48 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230235AbhGBHGI (ORCPT + 99 others); Fri, 2 Jul 2021 03:06:08 -0400 Received: from mga01.intel.com ([192.55.52.88]:46298 "EHLO mga01.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230147AbhGBHGC (ORCPT ); Fri, 2 Jul 2021 03:06:02 -0400 X-IronPort-AV: E=McAfee;i="6200,9189,10032"; a="230353255" X-IronPort-AV: E=Sophos;i="5.83,316,1616482800"; d="scan'208";a="230353255" Received: from fmsmga003.fm.intel.com ([10.253.24.29]) by fmsmga101.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 02 Jul 2021 00:03:30 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.83,316,1616482800"; d="scan'208";a="482194015" Received: from aubrey-ubuntu.sh.intel.com ([10.239.53.122]) by FMSMGA003.fm.intel.com with ESMTP; 02 Jul 2021 00:03:28 -0700 From: Aubrey Li To: rjw@rjwysocki.net, lenb@kernel.org Cc: linux-acpi@vger.kernel.org, linux-kernel@vger.kernel.org, Aubrey Li , Dan Williams , Aubrey Li Subject: [PATCH 2/2] ACPI: let BIOS fall back to legacy handling if PRM disabled Date: Fri, 2 Jul 2021 15:03:50 +0800 Message-Id: <1625209430-19934-2-git-send-email-aubrey.li@intel.com> X-Mailer: git-send-email 2.7.4 In-Reply-To: <1625209430-19934-1-git-send-email-aubrey.li@intel.com> References: <1625209430-19934-1-git-send-email-aubrey.li@intel.com> Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Based on _OSC PRM bit, BIOS can choose switch from legacy handling to using PRM. So if CONFIG_ACPI_PRMT is disabled, this bit should not be set to let BIOS fall back to the legacy handling (such as SMI). Cc: Dan Williams Signed-off-by: Aubrey Li --- drivers/acpi/bus.c | 2 ++ 1 file changed, 2 insertions(+) diff --git a/drivers/acpi/bus.c b/drivers/acpi/bus.c index 60fb6a84..30a3d4a 100644 --- a/drivers/acpi/bus.c +++ b/drivers/acpi/bus.c @@ -303,7 +303,9 @@ static void acpi_bus_osc_negotiate_platform_control(void) capbuf[OSC_SUPPORT_DWORD] |= OSC_SB_HOTPLUG_OST_SUPPORT; capbuf[OSC_SUPPORT_DWORD] |= OSC_SB_PCLPI_SUPPORT; +#ifdef CONFIG_ACPI_PRMT capbuf[OSC_SUPPORT_DWORD] |= OSC_SB_PRM_SUPPORT; +#endif #ifdef CONFIG_ARM64 capbuf[OSC_SUPPORT_DWORD] |= OSC_SB_GENERIC_INITIATOR_SUPPORT; -- 2.7.4