Received: by 2002:a6b:fb09:0:0:0:0:0 with SMTP id h9csp2927629iog; Mon, 20 Jun 2022 07:40:10 -0700 (PDT) X-Google-Smtp-Source: AGRyM1ubMhlKBHsRFNF4t2bbelMIGICIzDzKhrEc3opZb8UB4EWbUOtbizqJlnV+uvjQJD4N5jTn X-Received: by 2002:a17:90a:304b:b0:1ec:86b7:2f4f with SMTP id q11-20020a17090a304b00b001ec86b72f4fmr15800930pjl.107.1655736010251; Mon, 20 Jun 2022 07:40:10 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1655736010; cv=none; d=google.com; s=arc-20160816; b=fcvYBdSgAOk2CVhCh6ificXRl3o6oRjZlTu8FZOUzqlX4EfVOHBMD0TrfmzJL1C+n/ 27opw+ND3+OmQwwHCEaIzsvMrZBpD4gvCnlWxFvxUSEqVZIB39fH1zpVzxB2rZm3sl+T Qb3c/rvTsJO/DvPbQgT6q/iHeCxfCyWFfecLFLj4LHTVp9bUzxZGZb15e45zi0xA+F/c +4cqQhzpDJQhOliL0CD7HpLi/SBvyQzxJy776JkOZhNOy0CefbuRuO5OxlbeVWcaix1C l7mx3l0W3Uoxq9emKRyIxE/QyK8POWaP6kJwmRy4K5H5xPjganmnvVoInHNAbVnYnNhz HwXg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=wND7tWnSRQ+6ejug3pC9Jy+NlcrF0/2ajKf8rdcW8S8=; b=HnAiY0ks5cyUSYdfplFVZyBmBNySPpW1HK8nMVPAKwItm+esqoIPOfqNfdlLQNj1Ko 5pFXJ0irEdJ1+l5UYYO2LZ38T92NmySS/nvJx7B+lK01D1n+nkH8det40Tp8zHgXFa4/ ABArHbHP6IwKO2eTJVO+z+P2v+FNRGQlb9Rk1G9p6FMmvuP6+7JfTuOKXDvvH44LFHCI mYPm4Jl+aFUblOhGWKoGG9pLmFbi+s/JibUgAZEFtfIdaqF31p4oPJpMm2P7pvK5XESv o8Zj6sIrZxRx48VzwROoKes/ci3L6vcTQM7If8E72xC+LXPGd9cORBSGjM/X5QxJYgmb j1eQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=TUmUV2lg; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id e125-20020a636983000000b0040c25d6612fsi15275562pgc.335.2022.06.20.07.39.57; Mon, 20 Jun 2022 07:40:10 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=TUmUV2lg; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1344296AbiFTNSu (ORCPT + 99 others); Mon, 20 Jun 2022 09:18:50 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:37554 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1345285AbiFTNOT (ORCPT ); Mon, 20 Jun 2022 09:14:19 -0400 Received: from dfw.source.kernel.org (dfw.source.kernel.org [IPv6:2604:1380:4641:c500::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 6F13E1FCE6; Mon, 20 Jun 2022 06:07:00 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 329BC614E9; Mon, 20 Jun 2022 13:04:18 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 201A5C3411C; Mon, 20 Jun 2022 13:04:16 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1655730257; bh=02UmM0q3jA33fUQBUc8MJyNymoomP4LfNrzJVtLqnjU=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=TUmUV2lgltgwb4bYAwT3OsdO8hjBRCEtXaIFRCAZEyZue0gGsRG99kDKYAcEh5JEw J7z/TPHYRZaRpsxb0ad0hy1mEXEriOiRv5aFhwzpDCFUGKNPx0BfHd4NOSbYpd+r98 r/q8rHFm8aj4akFud2iII77Z9LbjrVZ0cCoaTwRY= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Vinicius Costa Gomes , Bjorn Helgaas , Tony Nguyen , Meng Tang Subject: [PATCH 5.10 81/84] Revert "PCI: Make pci_enable_ptm() private" Date: Mon, 20 Jun 2022 14:51:44 +0200 Message-Id: <20220620124723.283894071@linuxfoundation.org> X-Mailer: git-send-email 2.36.1 In-Reply-To: <20220620124720.882450983@linuxfoundation.org> References: <20220620124720.882450983@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-7.7 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Vinicius Costa Gomes commit 1d71eb53e45187f58089d32b51e27784c791d90e upstream. Make pci_enable_ptm() accessible from the drivers. Exposing this to the driver enables the driver to use the 'ptm_enabled' field of 'pci_dev' to check if PTM is enabled or not. This reverts commit ac6c26da29c1 ("PCI: Make pci_enable_ptm() private"). Signed-off-by: Vinicius Costa Gomes Acked-by: Bjorn Helgaas Signed-off-by: Tony Nguyen Signed-off-by: Meng Tang Signed-off-by: Greg Kroah-Hartman --- drivers/pci/pci.h | 3 --- include/linux/pci.h | 7 +++++++ 2 files changed, 7 insertions(+), 3 deletions(-) --- a/drivers/pci/pci.h +++ b/drivers/pci/pci.h @@ -585,11 +585,8 @@ static inline void pcie_ecrc_get_policy( #ifdef CONFIG_PCIE_PTM void pci_ptm_init(struct pci_dev *dev); -int pci_enable_ptm(struct pci_dev *dev, u8 *granularity); #else static inline void pci_ptm_init(struct pci_dev *dev) { } -static inline int pci_enable_ptm(struct pci_dev *dev, u8 *granularity) -{ return -EINVAL; } #endif struct pci_dev_reset_methods { --- a/include/linux/pci.h +++ b/include/linux/pci.h @@ -1599,6 +1599,13 @@ static inline bool pci_aer_available(voi bool pci_ats_disabled(void); +#ifdef CONFIG_PCIE_PTM +int pci_enable_ptm(struct pci_dev *dev, u8 *granularity); +#else +static inline int pci_enable_ptm(struct pci_dev *dev, u8 *granularity) +{ return -EINVAL; } +#endif + void pci_cfg_access_lock(struct pci_dev *dev); bool pci_cfg_access_trylock(struct pci_dev *dev); void pci_cfg_access_unlock(struct pci_dev *dev);