Received: by 2002:a25:ab43:0:0:0:0:0 with SMTP id u61csp249843ybi; Wed, 29 May 2019 20:38:20 -0700 (PDT) X-Google-Smtp-Source: APXvYqyWCeJ4Cim/wVYKPq6DGm14lxRDfpa3rAjI985FbJdARWp1xVem+YBNggiq6Mq8jDsABQCc X-Received: by 2002:a63:1b0e:: with SMTP id b14mr1733388pgb.365.1559187500290; Wed, 29 May 2019 20:38:20 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1559187500; cv=none; d=google.com; s=arc-20160816; b=e9D0+/ohtvhhsiQQpU6VN5E/3IqqFGX9Im8KRpl6KTEpW/g+qCeButiDCuBDFV3/8W PD9Uvl86+Wp3rhaMtA9xsI5SiC54rRdLE6lS6tVORCj5YnXh89VGOpVwgd1St5BnVkCm uubQtKWCK5xtqzpNIru3xbkH1MvMk4F9EiS4CGX6w0JS27wbkVbB7EadOk+674VyPtpU 10JZKsNkQPjC3AEQflJrcHDrmvRLkOM5ugLHk9K5HB2jrf7cXnxao5FVYJhtTxkOoSRK IkFKc0ZzYiV5/Cas85aUSksokJjTLSKGWpTOb4vCqTbtMyJ5K2tfhFaKeaV3cRg4Le0c jN7w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=Rk8XmliV4BkIXKKUvM/r8QLOeiI0CxuunnD/S0O6Ao4=; b=EJmyaOom3UbNJM8qEbBO0cgCO6evGWTAAG6hYryUz7+IZs4qYh6ZwVqATSDLswtm0n B5iXYeSQecv419F3Ujvfw9BalFiDXkR14ZXJsBwD6eGz/QaTqa71blgB+w0bHP2oqE1U 24JRgbJuR3f0Pl/WHe56MdUAKCP5lhqqCw8HmiIEg1QVY5JJYvLfEl2DZkasOs48n424 d7mFVsVbdyM0udfaflUg8X2IODVB1oU3ebGsbBxTbb21iz7ewNhiPUZIEWFpI+jotQ4B k41Y1W4LpPDXzviZ1R+IxSQJldWlvywBq6ZovwZbvApKuttpxgN9rja6L984GVoD+Ptf KpJA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=rjDgGtpT; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id a37si1824568pgm.574.2019.05.29.20.38.03; Wed, 29 May 2019 20:38:20 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=rjDgGtpT; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1733307AbfE3DYc (ORCPT + 99 others); Wed, 29 May 2019 23:24:32 -0400 Received: from mail.kernel.org ([198.145.29.99]:50012 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1731445AbfE3DSK (ORCPT ); Wed, 29 May 2019 23:18:10 -0400 Received: from localhost (ip67-88-213-2.z213-88-67.customer.algx.net [67.88.213.2]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 804BD24778; Thu, 30 May 2019 03:18:09 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1559186289; bh=70s3YOyXPI3ofGOKPOZfbV7HhpNjL5lq8q5a97hEo7k=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=rjDgGtpTuFy2hyiy26XD8rmYrE9F4ny39Z9u32PFnUXevmv7bThX3LRgvC3S3k5Cl GUAHOMZek1/TtaDxut7SZa89DeYU6y0bXYwKUNqy2vWQaBNFCNJ7d399l6JaZgR2bd xXp4WLrkiOn9bXnVpjqdquntIlquW3KbYPHbz3cc= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Kai-Heng Feng , Aaron Brown , Jeff Kirsher , Sasha Levin Subject: [PATCH 4.19 246/276] e1000e: Disable runtime PM on CNP+ Date: Wed, 29 May 2019 20:06:44 -0700 Message-Id: <20190530030540.530777016@linuxfoundation.org> X-Mailer: git-send-email 2.21.0 In-Reply-To: <20190530030523.133519668@linuxfoundation.org> References: <20190530030523.133519668@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org [ Upstream commit 459d69c407f9ba122f12216555c3012284dc9fd7 ] There are some new e1000e devices can only be woken up from D3 one time, by plugging Ethernet cable. Subsequent cable plugging does set PME bit correctly, but it still doesn't get woken up. Since e1000e connects to the root complex directly, we rely on ACPI to wake it up. In this case, the GPE from _PRW only works once and stops working after that. Though it appears to be a platform bug, e1000e maintainers confirmed that I219 does not support D3. So disable runtime PM on CNP+ chips. We may need to disable earlier generations if this bug also hit older platforms. Bugzilla: https://bugzilla.kernel.org/attachment.cgi?id=280819 Signed-off-by: Kai-Heng Feng Tested-by: Aaron Brown Signed-off-by: Jeff Kirsher Signed-off-by: Sasha Levin --- drivers/net/ethernet/intel/e1000e/netdev.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/drivers/net/ethernet/intel/e1000e/netdev.c b/drivers/net/ethernet/intel/e1000e/netdev.c index 8b11682ebba22..8cd339c92c1af 100644 --- a/drivers/net/ethernet/intel/e1000e/netdev.c +++ b/drivers/net/ethernet/intel/e1000e/netdev.c @@ -7329,7 +7329,7 @@ static int e1000_probe(struct pci_dev *pdev, const struct pci_device_id *ent) dev_pm_set_driver_flags(&pdev->dev, DPM_FLAG_NEVER_SKIP); - if (pci_dev_run_wake(pdev)) + if (pci_dev_run_wake(pdev) && hw->mac.type < e1000_pch_cnp) pm_runtime_put_noidle(&pdev->dev); return 0; -- 2.20.1