Received: by 2002:a25:ad19:0:0:0:0:0 with SMTP id y25csp1157700ybi; Sat, 27 Jul 2019 03:52:44 -0700 (PDT) X-Google-Smtp-Source: APXvYqxXc/KeGWwBCYJN2/33UEGT4b/WyFu9slx6Byq/cDKcz9wof7jXlULHOR22KW7s3npxozoO X-Received: by 2002:a63:6686:: with SMTP id a128mr87713637pgc.361.1564224764155; Sat, 27 Jul 2019 03:52:44 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1564224764; cv=none; d=google.com; s=arc-20160816; b=WG9rS7N8A4vNU4ZmbxghskNEE6zNghD+YedlTrrRpGN8JEg5wlQf1H3sCqBa70kqaw EVhAJml2MduBuM5RVhAkxGYOAXT3DhH30pmISViBaJwSL4+InYQhtMZXe/Lr9Mujgpwz v04jSkw31LsPPBIetPYBHzxVDI9DY+OGEgIIE31bRv3OnFQ6VOz+MUiFB2rv9d2fMM68 67s4nutgtv1am439nn5usDbibscoCSEGR/YEuzC3Kci4px8Z0PU65IpTQaHiWjpooxAv GZygm9KpLczlB6otgCXCrF/7df70nLKp2fUBjH0xfhqqhopX3YgeU71ur3YdzGUi8XX5 WWGQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature; bh=s2S3+pM9YIC0KAlrhasuznuVAIyBDTDahoImMNfO/FE=; b=cIinNOeIal0dZS+6QN1BfLzKGRnjtN9nV8nbRwfnt+nKS8rRG0LfAxZU13HgNyl7+L meOPfnSYcUMyCQ+4Jfppo4Zv21aO1G4uUNpAEJRMobMiEwize076YpjW+IRB82Y+s1DT ZWWUbOxT/31eqtr8TMyPW9vSwE2zT/GxlYJ4VVnza9zAPuv+sKhCtzOJ5yWPxyeAwJbN zThX6DOy7VKeoVKZQ653EC2MjyzXkfUHo0nH+a8pXzTGbhmR7e2btzYMSYct1XUYMsAu s7T8/2Z1tX8hJUxHFXdSvnVZK8Oa1FkInnzNiyfhCD9/JZJhPuYBIJGIiN1kubUZ2lNR R+Eg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=aCmqiLu0; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id t15si21370500plo.360.2019.07.27.03.52.28; Sat, 27 Jul 2019 03:52:44 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=aCmqiLu0; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728840AbfG0KvZ (ORCPT + 99 others); Sat, 27 Jul 2019 06:51:25 -0400 Received: from mail.kernel.org ([198.145.29.99]:38308 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725875AbfG0KvY (ORCPT ); Sat, 27 Jul 2019 06:51:24 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 8313F2075C; Sat, 27 Jul 2019 10:51:23 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1564224684; bh=DzM4H3u7OLbCY6a0MB4TM5xKh/mEPchjAjLVVKcHTuk=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=aCmqiLu0NnvrbRdYRHctT9VUChrEtsQBVv4w6xXulx7x5LfsVfLufF/6vbxB/LnNn Xjvjo4kkEJPtJjng50DvHYSEsjr3eVX1pUq+borYdaj4T/uLqsVul8HJbs6+DCMrEA 9rG0hISS1Yri28IKQd/qX9f8TZ1Vx7i9LXoUrwUI= Date: Sat, 27 Jul 2019 12:51:21 +0200 From: Greg Kroah-Hartman To: Pavel Machek Cc: linux-kernel@vger.kernel.org, stable@vger.kernel.org, Furquan Shaikh , Mika Westerberg , "Rafael J. Wysocki" , Sasha Levin Subject: Re: [PATCH 4.19 085/271] ACPICA: Clear status of GPEs on first direct enable Message-ID: <20190727105121.GC32555@kroah.com> References: <20190724191655.268628197@linuxfoundation.org> <20190724191702.469790760@linuxfoundation.org> <20190726175706.GB5945@xo-6d-61-c0.localdomain> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20190726175706.GB5945@xo-6d-61-c0.localdomain> User-Agent: Mutt/1.12.1 (2019-06-15) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Jul 26, 2019 at 07:57:06PM +0200, Pavel Machek wrote: > On Wed 2019-07-24 21:19:14, Greg Kroah-Hartman wrote: > > [ Upstream commit 44758bafa53602f2581a6857bb20b55d4d8ad5b2 ] > > > > ACPI GPEs (other than the EC one) can be enabled in two situations. > > First, the GPEs with existing _Lxx and _Exx methods are enabled > > implicitly by ACPICA during system initialization. Second, the > > GPEs without these methods (like GPEs listed by _PRW objects for > > wakeup devices) need to be enabled directly by the code that is > > going to use them (e.g. ACPI power management or device drivers). > > > > In the former case, if the status of a given GPE is set to start > > with, its handler method (either _Lxx or _Exx) needs to be invoked > > to take care of the events (possibly) signaled before the GPE was > > enabled. In the latter case, however, the first caller of > > acpi_enable_gpe() for a given GPE should not be expected to care > > about any events that might be signaled through it earlier. In > > that case, it is better to clear the status of the GPE before > > enabling it, to prevent stale events from triggering unwanted > > actions (like spurious system resume, for example). > > Given the complexity of ACPI and number of implementations, I don't > think this is safe for stable. So it's better to have a regression later rather than sooner? > Notebooks are not part of automated test farms, so it did not get > nearly enough testing... But by finding problems with a patch when it is closer to having been created is always better than waiting 6+ months to find the issue then. And if this patch does cause problems, we can easily revert it. thanks, greg k-h