Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp2461156yba; Mon, 15 Apr 2019 12:07:51 -0700 (PDT) X-Google-Smtp-Source: APXvYqxA0YGQ+OeYqai71yAjcLpwTPxLwcEGFPkvoppn+oSPSkk2HyRjZWNoecr+saBRe7X9TWZ9 X-Received: by 2002:a63:ff66:: with SMTP id s38mr72699351pgk.120.1555355271387; Mon, 15 Apr 2019 12:07:51 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1555355271; cv=none; d=google.com; s=arc-20160816; b=HvDQI6Gl3+EeMwOopKBeapQ55coGBhVd0JA8vPpoS0ntTrXtdGUB7sGnUg9l+flCSz AG42xKfIaYw2AgdzG7oybuO0J0Kiiru9DY+CKc0nxqoJzwKzpiZBbz0CJw+fvCiIxQfC 6ws+f38p7S55a8D8EluwNe9RoMAhu1I4ru/PuoxzzBML6zhPIPz92cxTNqWVUGnYkIf5 m6H1Td4OgIaw9jDA1UCrOL9nYMFMmX3/ekjL9qo77z84Z2xxm61iAIPOMhe+nwTzxzJg Nw5wAmWnvPbfGrLnd5UwGgG1WHK6qvZjMHasY22jzIFP74o6RLim8KtMU8UP8+/cFkBV sExg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=z409OLYaHrv8wFuiDUxQxrIJkAMgcwANF7cWyPseNpM=; b=1DssuVAhjDV94pcT1JYF9IrEqMW5vgdVaSzORiluJeLait4EcGPiDZtepiaC/3y4ci yDuRlQyUE/H5HzXzQwnIygbu5irkpqf2KDivhBhx/baZ1bTU/vdv0ejqpusOl5uWMZqn HVOv84/zaeMXV8trjV2u8USqnoJItgI0KYEX9FIyPa+1D/hAjdzVf9kXl7lEuAmXmZtZ SfI2qg/JiLaxLhSAwg3q1kJo8IHdmhZ/IbVkngaXruFkOL/kOn6i1gK5zSVWK+UtEsrK Kml9MFY4vUnXp6vkRdWcUqt+sYZYOSYJ0AmKpnteUi2lp60QYMf+JSyDLTVVgBGdR6LK GfcQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=edHbIpAh; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id t12si28825996pgv.415.2019.04.15.12.07.33; Mon, 15 Apr 2019 12:07:51 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=edHbIpAh; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729451AbfDOTGF (ORCPT + 99 others); Mon, 15 Apr 2019 15:06:05 -0400 Received: from mail.kernel.org ([198.145.29.99]:40194 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729395AbfDOTGC (ORCPT ); Mon, 15 Apr 2019 15:06:02 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 660822087C; Mon, 15 Apr 2019 19:06:01 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1555355161; bh=USdfmdbMrqHRgb3bmdgZVUb3RW25bcLPEmbinb0gWx8=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=edHbIpAhkKdhL+7CyipFchWdBcgJpw20LE1N4rp0wwXqCtLf+Xra30MZO9RjZPZ9c lbNQg4PCRBbVgMjuLlZ8JhdQBzVyQ8shDPo18HT/eI05Sd9sJCR85FskeM+Owzg76A J2xKU/Tx6RiLFXRAylOgx0Z0GXGZ7qYcnNG8PYIs= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Heiner Kallweit , "David S. Miller" , Sasha Levin Subject: [PATCH 4.19 019/101] r8169: disable ASPM again Date: Mon, 15 Apr 2019 20:58:17 +0200 Message-Id: <20190415183741.385744117@linuxfoundation.org> X-Mailer: git-send-email 2.21.0 In-Reply-To: <20190415183740.341577907@linuxfoundation.org> References: <20190415183740.341577907@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org [ Upstream commit b75bb8a5b755d0c7bf1ac071e4df2349a7644a1e ] There's a significant number of reports that re-enabling ASPM causes different issues, ranging from decreased performance to system not booting at all. This affects only a minority of users, but the number of affected users is big enough that we better switch off ASPM again. This will hurt notebook users who are not affected by the issues, they may see decreased battery runtime w/o ASPM. With the PCI core folks is being discussed to add generic sysfs attributes to control ASPM. Once this is in place brave enough users can re-enable ASPM on their system. Fixes: a99790bf5c7f ("r8169: Reinstate ASPM Support") Signed-off-by: Heiner Kallweit Signed-off-by: David S. Miller Signed-off-by: Sasha Levin --- drivers/net/ethernet/realtek/r8169.c | 6 ++++++ 1 file changed, 6 insertions(+) diff --git a/drivers/net/ethernet/realtek/r8169.c b/drivers/net/ethernet/realtek/r8169.c index 5f45ffeeecb4..1d24884e9897 100644 --- a/drivers/net/ethernet/realtek/r8169.c +++ b/drivers/net/ethernet/realtek/r8169.c @@ -28,6 +28,7 @@ #include #include #include +#include #include #include @@ -7324,6 +7325,11 @@ static int rtl_init_one(struct pci_dev *pdev, const struct pci_device_id *ent) return rc; } + /* Disable ASPM completely as that cause random device stop working + * problems as well as full system hangs for some PCIe devices users. + */ + pci_disable_link_state(pdev, PCIE_LINK_STATE_L0S | PCIE_LINK_STATE_L1); + /* enable device (incl. PCI PM wakeup and hotplug setup) */ rc = pcim_enable_device(pdev); if (rc < 0) { -- 2.19.1