lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date:	Wed, 1 Nov 2006 17:01:15 +0800
From:	"Peer Chen" <pchen@...dia.com>
To:	<linux-ide@...r.kernel.org>, <linux-kernel@...r.kernel.org>
Cc:	<jgarzik@...ox.com>, "Alan Cox" <alan@...rguk.ukuu.org.uk>
Subject: [PATCH 2/2] sata_nv: Add nvidia SATA controllers of MCP67 support to sata_nv.c

Add device IDs of SATA controllers of MCP67 to pci_ids.h.
The patch will be applied to kernel 2.6.19-rc4-git1.

Signed-off-by: Peer Chen <pchen@...dia.com>

=============================================
--- linux-2.6.19-rc4-git1/include/linux/pci_ids.h.orig
+++ linux-2.6.19-rc4-git1/include/linux/pci_ids.h
@@ -1213,6 +1213,15 @@
 #define PCI_DEVICE_ID_NVIDIA_NVENET_21              0x0451
 #define PCI_DEVICE_ID_NVIDIA_NVENET_22              0x0452
 #define PCI_DEVICE_ID_NVIDIA_NVENET_23              0x0453
+#define PCI_DEVICE_ID_NVIDIA_NFORCE_MCP65_SATA      0x045C
+#define PCI_DEVICE_ID_NVIDIA_NFORCE_MCP65_SATA2     0x045D
+#define PCI_DEVICE_ID_NVIDIA_NFORCE_MCP65_SATA3     0x045E
+#define PCI_DEVICE_ID_NVIDIA_NFORCE_MCP65_SATA4     0x045F
+#define PCI_DEVICE_ID_NVIDIA_NFORCE_MCP67_SATA      0x0550
+#define PCI_DEVICE_ID_NVIDIA_NFORCE_MCP67_SATA2     0x0551
+#define PCI_DEVICE_ID_NVIDIA_NFORCE_MCP67_SATA3     0x0552
+#define PCI_DEVICE_ID_NVIDIA_NFORCE_MCP67_SATA4     0x0553
+#define PCI_DEVICE_ID_NVIDIA_NFORCE_MCP67_IDE       0x0560
 
 #define PCI_VENDOR_ID_IMS		0x10e0
 #define PCI_DEVICE_ID_IMS_TT128		0x9128
-----------------------------------------------------------------------------------
This email message is for the sole use of the intended recipient(s) and may contain
confidential information.  Any unauthorized review, use, disclosure or distribution
is prohibited.  If you are not the intended recipient, please contact the sender by
reply email and destroy all copies of the original message.
-----------------------------------------------------------------------------------
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ