lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-Id: <20190513121027.2039-1-jwollrath@web.de> Date: Mon, 13 May 2019 14:10:28 +0200 From: Julian Wollrath <jwollrath@....de> To: netdev@...r.kernel.org Cc: Julian Wollrath <jwollrath@....de> Subject: [PATCH] e1000e: Disable runtime PM on SPT+ 459d69c407f9 disabled runtime PM for CNP+ chips. This broke my I219-LM on a SPT chip. So disable runtime PM also for SPT. Signed-off-by: Julian Wollrath <jwollrath@....de> --- drivers/net/ethernet/intel/e1000e/netdev.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/drivers/net/ethernet/intel/e1000e/netdev.c b/drivers/net/ethernet/intel/e1000e/netdev.c index 0e09bede42a2..24c1946139cf 100644 --- a/drivers/net/ethernet/intel/e1000e/netdev.c +++ b/drivers/net/ethernet/intel/e1000e/netdev.c @@ -7343,7 +7343,7 @@ static int e1000_probe(struct pci_dev *pdev, const struct pci_device_id *ent) dev_pm_set_driver_flags(&pdev->dev, DPM_FLAG_NEVER_SKIP); - if (pci_dev_run_wake(pdev) && hw->mac.type < e1000_pch_cnp) + if (pci_dev_run_wake(pdev) && hw->mac.type < e1000_pch_spt) pm_runtime_put_noidle(&pdev->dev); return 0; -- 2.20.1
Powered by blists - more mailing lists