lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <20200201002307.4520-1-andrew.maier@eideticom.com>
Date:   Fri, 31 Jan 2020 17:23:07 -0700
From:   Andrew Maier <andrew.maier@...eticom.com>
To:     bhelgaas@...gle.com, linux-pci@...r.kernel.org,
        linux-kernel@...r.kernel.org
Cc:     logang@...tatee.com, Andrew Maier <andrew.maier@...eticom.com>
Subject: [PATCH] PCI/P2PDMA: Add the Intel Sky Lake-E root ports to the whitelist

Add the four Intel Sky Lake-E host root ports to the whitelist of
p2pdma.

P2P has been tested and is working on this system.

Signed-off-by: Andrew Maier <andrew.maier@...eticom.com>
---
 drivers/pci/p2pdma.c | 5 +++++
 1 file changed, 5 insertions(+)

diff --git a/drivers/pci/p2pdma.c b/drivers/pci/p2pdma.c
index 6d6c64415087..d7601a49eb3e 100644
--- a/drivers/pci/p2pdma.c
+++ b/drivers/pci/p2pdma.c
@@ -325,6 +325,11 @@ static const struct pci_p2pdma_whitelist_entry {
 	/* Intel Xeon E7 v3/Xeon E5 v3/Core i7 */
 	{PCI_VENDOR_ID_INTEL,	0x2f00, REQ_SAME_HOST_BRIDGE},
 	{PCI_VENDOR_ID_INTEL,	0x2f01, REQ_SAME_HOST_BRIDGE},
+	/* Intel Sky Lake-E */
+	{PCI_VENDOR_ID_INTEL,	0x2030, REQ_SAME_HOST_BRIDGE},
+	{PCI_VENDOR_ID_INTEL,	0x2031, REQ_SAME_HOST_BRIDGE},
+	{PCI_VENDOR_ID_INTEL,	0x2032, REQ_SAME_HOST_BRIDGE},
+	{PCI_VENDOR_ID_INTEL,	0x2033, REQ_SAME_HOST_BRIDGE},
 	{}
 };
 
-- 
2.17.1

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ