From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-4.1 required=3.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,MAILING_LIST_MULTI,SPF_HELO_NONE, SPF_PASS autolearn=no autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id A9350C433E4 for ; Wed, 22 Jul 2020 12:15:10 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by mail.kernel.org (Postfix) with ESMTP id 880E320771 for ; Wed, 22 Jul 2020 12:15:10 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1595420110; bh=s9F70o+YVHAylQobk1Z1T7okng//DF/Q8/fYk4nXsVY=; h=Date:From:To:To:To:Cc:Cc:Cc:Cc:Subject:In-Reply-To:References: List-ID:From; b=sCp2XUuFKk8oC9Ml9vuzH3J5FyIxFZfEfeAm42b7qDoG/dn6DbWWnV2ExzI7rL+N3 7eKvDnzcNuROqBpTg8Qm0a9FbL7cdRZFpVysNBlDOdNE2n338mYx7jV0OPGZmsmj76 xAprw3PO2M1Y//TddDh0ZiFkHQMMhjmJCXlqqZ1k= Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1732161AbgGVMPK (ORCPT ); Wed, 22 Jul 2020 08:15:10 -0400 Received: from mail.kernel.org ([198.145.29.99]:58546 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1732154AbgGVMPJ (ORCPT ); Wed, 22 Jul 2020 08:15:09 -0400 Received: from localhost (unknown [137.135.114.1]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 6BF4520787; Wed, 22 Jul 2020 12:15:08 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1595420108; bh=s9F70o+YVHAylQobk1Z1T7okng//DF/Q8/fYk4nXsVY=; h=Date:From:To:To:To:Cc:Cc:Cc:Cc:Subject:In-Reply-To:References: From; b=OvLlFsjXfF4zCTQuA/rg6KQ4f15pMkWZryxs64I6lHqYruftm6cSeJ9VLsWRK+sAL 8Gtw50PaFz36SOj3SJBciBvpXXCZuXWEViw1Ydk03V/e144PWrYFUQs6oZ/erScTAv kgLWLHmsfrwI2c5u2r90sNx/4QxsZiT7QQhfyGrs= Date: Wed, 22 Jul 2020 12:15:07 +0000 From: Sasha Levin To: Sasha Levin To: Lu Baolu To: Joerg Roedel Cc: Koba Ko , iommu@lists.linux-foundation.org Cc: Ashok Raj Cc: stable@vger.kernel.org Cc: stable@vger.kernel.org Subject: Re: [PATCH 1/1] iommu/vt-d: Skip TE disabling on quirky gfx dedicated iommu In-Reply-To: <20200721001713.24282-1-baolu.lu@linux.intel.com> References: <20200721001713.24282-1-baolu.lu@linux.intel.com> Message-Id: <20200722121508.6BF4520787@mail.kernel.org> Sender: stable-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: stable@vger.kernel.org Hi [This is an automated email] This commit has been processed because it contains a "Fixes:" tag fixing commit: . The bot has tested the following trees: v5.7.9, v5.4.52, v4.19.133, v4.14.188, v4.9.230, v4.4.230. v5.7.9: Failed to apply! Possible dependencies: Unable to calculate v5.4.52: Failed to apply! Possible dependencies: Unable to calculate v4.19.133: Failed to apply! Possible dependencies: e5e04d051979d ("iommu/vt-d: Check whether device requires bounce buffer") v4.14.188: Failed to apply! Possible dependencies: 85319dcc8955f ("iommu/vt-d: Add for_each_device_domain() helper") 9ddbfb42138d8 ("iommu/vt-d: Move device_domain_info to header") e5e04d051979d ("iommu/vt-d: Check whether device requires bounce buffer") v4.9.230: Failed to apply! Possible dependencies: 161b28aae1651 ("iommu/vt-d: Make sure IOMMUs are off when intel_iommu=off") 61012985eb132 ("iommu/vt-d: Use lo_hi_readq() / lo_hi_writeq()") 85319dcc8955f ("iommu/vt-d: Add for_each_device_domain() helper") 9ddbfb42138d8 ("iommu/vt-d: Move device_domain_info to header") a7fdb6e648fb1 ("iommu/vt-d: Fix crash when accessing VT-d sysfs entries") b0119e870837d ("iommu: Introduce new 'struct iommu_device'") b316d02a13c3a ("iommu/vt-d: Unwrap __get_valid_domain_for_dev()") bfd20f1cc8501 ("x86, iommu/vt-d: Add an option to disable Intel IOMMU force on") e5e04d051979d ("iommu/vt-d: Check whether device requires bounce buffer") v4.4.230: Failed to apply! Possible dependencies: 0824c5920b16f ("iommu/vt-d: avoid dev iotlb logic for domains with no dev iotlbs") 161b28aae1651 ("iommu/vt-d: Make sure IOMMUs are off when intel_iommu=off") 314f1dc140844 ("iommu/vt-d: refactoring of deferred flush entries") 53c92d793395f ("iommu: of: enforce const-ness of struct iommu_ops") 57f98d2f61e19 ("iommu: Introduce iommu_fwspec") 592033790e827 ("iommu/vt-d: Check the return value of iommu_device_create()") 85319dcc8955f ("iommu/vt-d: Add for_each_device_domain() helper") 8d54d6c8b8f3e ("iommu/amd: Implement apply_dm_region call-back") 9ddbfb42138d8 ("iommu/vt-d: Move device_domain_info to header") a7fdb6e648fb1 ("iommu/vt-d: Fix crash when accessing VT-d sysfs entries") aa4732406e129 ("iommu/vt-d: per-cpu deferred invalidation queues") b0119e870837d ("iommu: Introduce new 'struct iommu_device'") b996444cf35e7 ("iommu/of: Handle iommu-map property for PCI") bc8474549e94e ("iommu/vt-d: Fix up error handling in alloc_iommu") bfd20f1cc8501 ("x86, iommu/vt-d: Add an option to disable Intel IOMMU force on") e5e04d051979d ("iommu/vt-d: Check whether device requires bounce buffer") NOTE: The patch will not be queued to stable trees until it is upstream. How should we proceed with this patch? -- Thanks Sasha