From patchwork Thu Oct 22 05:51:46 2020 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: Kai-Heng Feng X-Patchwork-Id: 1385959 Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@bilbo.ozlabs.org Authentication-Results: ozlabs.org; spf=none (no SPF record) smtp.mailfrom=lists.ubuntu.com (client-ip=91.189.94.19; helo=huckleberry.canonical.com; envelope-from=kernel-team-bounces@lists.ubuntu.com; receiver=) Authentication-Results: ozlabs.org; dmarc=fail (p=none dis=none) header.from=canonical.com Received: from huckleberry.canonical.com (huckleberry.canonical.com [91.189.94.19]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ozlabs.org (Postfix) with ESMTPS id 4CGxMM4cC8z9sVR; Thu, 22 Oct 2020 16:51:59 +1100 (AEDT) Received: from localhost ([127.0.0.1] helo=huckleberry.canonical.com) by huckleberry.canonical.com with esmtp (Exim 4.86_2) (envelope-from ) id 1kVTW0-0002N4-HP; Thu, 22 Oct 2020 05:51:56 +0000 Received: from youngberry.canonical.com ([91.189.89.112]) by huckleberry.canonical.com with esmtps (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.86_2) (envelope-from ) id 1kVTVx-0002Mf-N3 for kernel-team@lists.ubuntu.com; Thu, 22 Oct 2020 05:51:53 +0000 Received: from 61-220-137-37.hinet-ip.hinet.net ([61.220.137.37] helo=localhost) by youngberry.canonical.com with esmtpsa (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.86_2) (envelope-from ) id 1kVTVw-0006gI-Vt for kernel-team@lists.ubuntu.com; Thu, 22 Oct 2020 05:51:53 +0000 From: Kai-Heng Feng To: kernel-team@lists.ubuntu.com Subject: [PATCH v2] UBUNTU: SAUCE: PCI: Enable ACS quirk on all CML root ports Date: Thu, 22 Oct 2020 13:51:46 +0800 Message-Id: <20201022055146.15875-2-kai.heng.feng@canonical.com> X-Mailer: git-send-email 2.17.1 In-Reply-To: <20201022055146.15875-1-kai.heng.feng@canonical.com> References: <20201022055146.15875-1-kai.heng.feng@canonical.com> MIME-Version: 1.0 X-BeenThere: kernel-team@lists.ubuntu.com X-Mailman-Version: 2.1.20 Precedence: list List-Id: Kernel team discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: kernel-team-bounces@lists.ubuntu.com Sender: "kernel-team" BugLink: https://bugs.launchpad.net/bugs/1895718 In addition to KIOXIA NVMe, Intel NVMe under another root port also has the same ACS violation issue. According to Intel, all CML root ports need this workaround, so add all root ports from [1] to existing quirk. [1] IntelĀ® 400 Series Chipset Family Platform Controller Hub (PCH) Datasheet, Volume 1 of 2, Content ID: 620854 Version: 002 Signed-off-by: Kai-Heng Feng Acked-by: Stefan Bader Acked-by: Kleber Sacilotto de Souza --- drivers/pci/quirks.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/drivers/pci/quirks.c b/drivers/pci/quirks.c index cfa7387a12b9..706f27a86a8e 100644 --- a/drivers/pci/quirks.c +++ b/drivers/pci/quirks.c @@ -4665,7 +4665,7 @@ static bool pci_quirk_intel_spt_pch_acs_match(struct pci_dev *dev) return false; switch (dev->device) { - case 0x06ac: /* Comet Lake */ + case 0x06ac ... 0x06c3: /* Comet Lake */ case 0xa110 ... 0xa11f: case 0xa167 ... 0xa16a: /* Sunrise Point */ case 0xa290 ... 0xa29f: case 0xa2e7 ... 0xa2ee: /* Union Point */ case 0x9d10 ... 0x9d1b: /* 7th & 8th Gen Mobile */