From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-8.6 required=3.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,FAKE_REPLY_C,INCLUDES_PATCH,MAILING_LIST_MULTI, SIGNED_OFF_BY,SPF_HELO_NONE,SPF_PASS,USER_AGENT_SANE_1 autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id BBCC2C4332D for ; Wed, 18 Mar 2020 23:13:52 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.kernel.org (Postfix) with ESMTP id 7D7EA2076F for ; Wed, 18 Mar 2020 23:13:52 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1584573232; bh=oFy9zaUxFZZJmaRDFLzCKtAEprfj3oqdBpvxcG2rk8k=; h=Date:From:To:Cc:Subject:In-Reply-To:List-ID:From; b=mSvxNDznby88wsflB9OJUMPa/HbS70mYAbdYIkt6EpnvLnfgw13UnIK51FXx4Dv7O T19Im7oaFkXBj5eSgnPCJu8ABj+PzygEByDLzITGBkynJ9/2z9M8ohTBrpymJe3+Wh oW0ssy4hb3ZWq6XrW9Tj+ycJRwD9ozqD4xmX0XEw= Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726647AbgCRXNw (ORCPT ); Wed, 18 Mar 2020 19:13:52 -0400 Received: from mail.kernel.org ([198.145.29.99]:40224 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726619AbgCRXNv (ORCPT ); Wed, 18 Mar 2020 19:13:51 -0400 Received: from localhost (mobile-166-175-186-165.mycingular.net [166.175.186.165]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id DD2C92076C; Wed, 18 Mar 2020 23:13:50 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1584573231; bh=oFy9zaUxFZZJmaRDFLzCKtAEprfj3oqdBpvxcG2rk8k=; h=Date:From:To:Cc:Subject:In-Reply-To:From; b=DzpZj5+8msW57avSvGgNIEAwIntQcyPVC0z0zfdOwSqCS4B8BIynnP/AjLzlVp87e WmAel2zgAp0zu8KDdv9CPTxak6CuSCSIAHsuESHXVqryOJB7C5lUAUbPreMfNkpWHE HrHEks/wwnAvs2pS0qX4q58qMpUYAEPdtDIps/eY= Date: Wed, 18 Mar 2020 18:13:49 -0500 From: Bjorn Helgaas To: Andrew Maier Cc: linux-pci@vger.kernel.org, linux-kernel@vger.kernel.org, logang@deltatee.com Subject: Re: [PATCH v2] PCI/P2PDMA: Add the remaining Intel Sky Lake-E root ports to the whitelist Message-ID: <20200318231349.GA3278@google.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20200207221219.4309-1-andrew.maier@eideticom.com> User-Agent: Mutt/1.12.2 (2019-09-21) Sender: linux-pci-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-pci@vger.kernel.org On Fri, Feb 07, 2020 at 03:12:19PM -0700, Andrew Maier wrote: > Add the three remaining Intel Sky Lake-E host root ports to the > whitelist of p2pdma. > > P2P has been tested and is working on this system. > > Signed-off-by: Andrew Maier Applied with Logan's reviewed-by to pci/p2pdma for v5.7, thanks! > --- > Resending this as I rebased it onto the latest patches. > drivers/pci/p2pdma.c | 3 +++ > 1 file changed, 3 insertions(+) > > diff --git a/drivers/pci/p2pdma.c b/drivers/pci/p2pdma.c > index 9a8a38384121..b73b10bce0df 100644 > --- a/drivers/pci/p2pdma.c > +++ b/drivers/pci/p2pdma.c > @@ -291,6 +291,9 @@ static const struct pci_p2pdma_whitelist_entry { > {PCI_VENDOR_ID_INTEL, 0x2f01, REQ_SAME_HOST_BRIDGE}, > /* Intel SkyLake-E */ > {PCI_VENDOR_ID_INTEL, 0x2030, 0}, > + {PCI_VENDOR_ID_INTEL, 0x2031, 0}, > + {PCI_VENDOR_ID_INTEL, 0x2032, 0}, > + {PCI_VENDOR_ID_INTEL, 0x2033, 0}, > {PCI_VENDOR_ID_INTEL, 0x2020, 0}, > {} > }; > -- > 2.17.1 >