Received: by 2002:a05:7412:b10a:b0:f3:1519:9f41 with SMTP id az10csp981968rdb; Fri, 1 Dec 2023 04:10:41 -0800 (PST) X-Google-Smtp-Source: AGHT+IFYqorbfp/R7emdUWzTpPZvANE/0Soxcgw+ZiZJgQTwEbQJXX7ErdO4uAuIWN4XoqUihjon X-Received: by 2002:a6b:fc0c:0:b0:7b3:df76:3613 with SMTP id r12-20020a6bfc0c000000b007b3df763613mr10835947ioh.0.1701432621171; Fri, 01 Dec 2023 04:10:21 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1701432621; cv=none; d=google.com; s=arc-20160816; b=KIU/1AGUOnbco0O+x/Oq2JDd+0wheZBEH2IeqoH22+ynOeTGik47ruc0OPIYn8d1AU VrwfYbNwv//3xIFsO0NHWfzS3PoyzNVTVNJB/k7Iu5hFgAqkQcMCh6FzH91yMRrtI9xx zj2+fIzcZyjqS3HbYOtp/45KwrmDSpyacSLgMghpeKaiLaI2+x9Et7z0AD48m1SyTZgJ eeqfbeBqvvbYscKGsXNAThCn4Ljq2BA8BwnzMNZLOk6C7TBvpswguhe63Dc20JIx0Zuq nLsCtKB/fYh6XiUrR1icPKQzDzS3Z3Uculg582dvP5j50gJrpCG+9tmmQ5jZu9+KpAmn l3rg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from; bh=TwVdEZfAByhuuLYhsIEM4gScya7vXiCGu5IUcuVk17Y=; fh=l9IBQTR3JGzmComeJ3VEfXzGuHzyK7ZINzrVU4nybbQ=; b=e+VTYTzdikxt69LwttKWRw6UmoZb+hmDwxUoE2q40yWTw4H1qzcFvstaWMreCQXl8Y YHuN5IiFFBGWPvMNLlZlQgm9H1EgEM6MyMuV4QHArzYD/7axiqJT+nMGbJtceeQX4StT HR4yCIqgmELkDRwPK1maj+E2G6XDeqeuBtGOfwsgRclyR5z5xlWhwEMREUVEBaNQMB7Y dLdOmOyBTFYXGKE6rnuvoPYz+PIwiSXvfwVt2sysIJX5Vcu/EmYPLEmpmdC/8VDmJi3a IMHOkIrt0eOFnDjweo5Gqkos5CAoaDsTI6hBeKyR2XXlh+wCH2/Kh/WZ56bfE+WeipG3 3CTw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:2 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from agentk.vger.email (agentk.vger.email. [2620:137:e000::3:2]) by mx.google.com with ESMTPS id bj11-20020a056a02018b00b00577f4d85fdbsi3634385pgb.548.2023.12.01.04.10.04 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 01 Dec 2023 04:10:21 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:2 as permitted sender) client-ip=2620:137:e000::3:2; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:2 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by agentk.vger.email (Postfix) with ESMTP id ED0CE80FCE02; Fri, 1 Dec 2023 04:10:02 -0800 (PST) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.11 at agentk.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1378719AbjLAMJn (ORCPT + 99 others); Fri, 1 Dec 2023 07:09:43 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:47426 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1378702AbjLAMJm (ORCPT ); Fri, 1 Dec 2023 07:09:42 -0500 Received: from mx2.zhaoxin.com (mx2.zhaoxin.com [203.110.167.99]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id EDB6313E for ; Fri, 1 Dec 2023 04:09:47 -0800 (PST) X-ASG-Debug-ID: 1701432584-1eb14e538d26c50001-xx1T2L Received: from ZXSHMBX2.zhaoxin.com (ZXSHMBX2.zhaoxin.com [10.28.252.164]) by mx2.zhaoxin.com with ESMTP id ACybemeJXW88gc2e (version=TLSv1.2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128 verify=NO); Fri, 01 Dec 2023 20:09:44 +0800 (CST) X-Barracuda-Envelope-From: LeoLiu-oc@zhaoxin.com X-Barracuda-RBL-Trusted-Forwarder: 10.28.252.164 Received: from ZXBJMBX03.zhaoxin.com (10.29.252.7) by ZXSHMBX2.zhaoxin.com (10.28.252.164) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.27; Fri, 1 Dec 2023 20:09:44 +0800 Received: from xin.lan (10.32.64.1) by ZXBJMBX03.zhaoxin.com (10.29.252.7) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.27; Fri, 1 Dec 2023 20:09:43 +0800 X-Barracuda-RBL-Trusted-Forwarder: 10.28.252.164 From: LeoLiu-oc X-Barracuda-RBL-Trusted-Forwarder: 10.29.252.7 To: , , CC: , , , , leoliu-oc Subject: [PATCH] PCI: Extend PCI root port device IDs for Zhaoxin platforms Date: Fri, 1 Dec 2023 20:09:42 +0800 X-ASG-Orig-Subj: [PATCH] PCI: Extend PCI root port device IDs for Zhaoxin platforms Message-ID: <20231201120942.680075-1-LeoLiu-oc@zhaoxin.com> X-Mailer: git-send-email 2.34.1 MIME-Version: 1.0 Content-Transfer-Encoding: 7BIT Content-Type: text/plain; charset=US-ASCII X-Originating-IP: [10.32.64.1] X-ClientProxiedBy: zxbjmbx1.zhaoxin.com (10.29.252.163) To ZXBJMBX03.zhaoxin.com (10.29.252.7) X-Barracuda-Connect: ZXSHMBX2.zhaoxin.com[10.28.252.164] X-Barracuda-Start-Time: 1701432584 X-Barracuda-Encrypted: ECDHE-RSA-AES128-GCM-SHA256 X-Barracuda-URL: https://10.28.252.36:4443/cgi-mod/mark.cgi X-Virus-Scanned: by bsmtpd at zhaoxin.com X-Barracuda-Scan-Msg-Size: 792 X-Barracuda-BRTS-Status: 0 X-Barracuda-Bayes: INNOCENT GLOBAL 0.0000 1.0000 -2.0210 X-Barracuda-Spam-Score: -2.02 X-Barracuda-Spam-Status: No, SCORE=-2.02 using global scores of TAG_LEVEL=1000.0 QUARANTINE_LEVEL=1000.0 KILL_LEVEL=9.0 tests= X-Barracuda-Spam-Report: Code version 3.2, rules version 3.2.3.117509 Rule breakdown below pts rule name description ---- ---------------------- -------------------------------------------------- X-Spam-Status: No, score=-0.8 required=5.0 tests=HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on agentk.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (agentk.vger.email [0.0.0.0]); Fri, 01 Dec 2023 04:10:03 -0800 (PST) From: leoliu-oc Add more PCI root port device IDs to the pci_quirk_zhaoxin_pcie_ports_acs() for some new Zhaoxin platforms. Signed-off-by: leoliu-oc --- drivers/pci/quirks.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/drivers/pci/quirks.c b/drivers/pci/quirks.c index ea476252280a..db74f8f07096 100644 --- a/drivers/pci/quirks.c +++ b/drivers/pci/quirks.c @@ -4709,7 +4709,7 @@ static int pci_quirk_zhaoxin_pcie_ports_acs(struct pci_dev *dev, u16 acs_flags) switch (dev->device) { case 0x0710 ... 0x071e: case 0x0721: - case 0x0723 ... 0x0732: + case 0x0723 ... 0x073b: return pci_acs_ctrl_enabled(acs_flags, PCI_ACS_SV | PCI_ACS_RR | PCI_ACS_CR | PCI_ACS_UF); } -- 2.34.1