Received: by 2002:a05:6358:d09b:b0:dc:cd0c:909e with SMTP id jc27csp2900841rwb; Fri, 2 Dec 2022 17:29:44 -0800 (PST) X-Google-Smtp-Source: AA0mqf4OnMNZ/Kb/r/R0Zc+P/R+D1PkpbjAl5mSjNRgdXJ+F7VS7FzG+RegzlhkV/iv6S5Rg0l0W X-Received: by 2002:a17:902:b692:b0:188:fc5f:84f2 with SMTP id c18-20020a170902b69200b00188fc5f84f2mr57500778pls.137.1670030984070; Fri, 02 Dec 2022 17:29:44 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1670030984; cv=none; d=google.com; s=arc-20160816; b=GHAA56OkVUKh7RuO0PjjlmFPkB11/Cu+3lacNdTI6rX7gFRBoKQVAke/ywdChH6aO3 4KFEoAg8nN0vOk/D+NhdJrXDVtVNeVgdRPiTb5dp7GfC+q+F8hr5w4Lir7TAq74dvxVV sCwP4LIIPHR4HGGhUZ+lY43KwOZRcg2aY3RiCIQC8oHNRy9gogbsFUhpdhwD18TL77+z M8ToE4hzp9NsspDl2WoWT2ahFArIfm+J5eEp61/VdWrEr0ScYZygOS8dFrIsI2exauCy 1HkArrLCOgMJKtq/IVakVYChD11+eYktWD73Tm/ky8TaklIYYoO7qbT32BI0XZgyJw66 ir9Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :organization:references:in-reply-to:message-id:subject:cc:to:from :date:dkim-signature; bh=JZLiE+DvMcBj07WMrXMpjT1Vr6eSp60NuRv/gbQnmdw=; b=aF3xCHKikgL/eGS8m7Nu+0TToERtXc0iXlMv0dTJcXf7d9s1k/I1eedDTs6LeAqe7d zmAKVpeH4tMEt+A3kooXZFyPzYyXn3nAxqNfuxUtrj8tFs/2a71LonCs528hv0vr/Vqj TJLS9w83uGBgRhTTZzPxkl4alfoivWOUpsjb+4nCrD65DezjvUh04q3H9L6WDboLGEyb d5EDJSlTBzauFppJJnCU2uuBQSXnadhsOkJo6xVyrVJd1fAI2ldRxjWFW4N6mckQpk5U vpMiGJzt2VKAtwialIDhjH0mxe5nensWHCaru7UtJxx6VZfGicRw5ASdwFaQLw0hrOle cL4w== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=P6komMzg; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id g22-20020a632016000000b0046b3ba2c806si8120629pgg.145.2022.12.02.17.29.32; Fri, 02 Dec 2022 17:29:44 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=P6komMzg; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S235114AbiLCAyV (ORCPT + 82 others); Fri, 2 Dec 2022 19:54:21 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:41560 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S235082AbiLCAyF (ORCPT ); Fri, 2 Dec 2022 19:54:05 -0500 Received: from mga12.intel.com (mga12.intel.com [192.55.52.136]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 665472E0 for ; Fri, 2 Dec 2022 16:50:17 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1670028617; x=1701564617; h=date:from:to:cc:subject:message-id:in-reply-to: references:mime-version:content-transfer-encoding; bh=9vIXaYbbqArKlbNUcGZT4O2VFsT2UZnPQbUk/fLylKA=; b=P6komMzgbJ6EE+TCdD8dNX87ykh7stt9YIltvJhgnfAZZe39duArx24o nCybUDPnvE7UVc+0xDeSqcVhMO/Gf6bKlj1psR0vBjQCUvJjSjfj0jUCE 5Uwp8hEe6Z9HyQ/zogqDHhiKv+dwHqGbUIwf8R+BzPQggC0B0LsuCYy6S 8KRt6/ykLeiKAQlNWXex1eGe/Nzubz3g2LCDZjtbu4b2A8QwlMKv8ott3 Vcq7iuo5zuX5dfQjKAMoHwDe1qnRas+B8wMnbGsxJ4b7cC4ieb1+AICHs 4sGVGcUJscdfvlsz1DevdHlxthtWHdXggXmEqe61sUE/c9ZWtQMM9LUGs A==; X-IronPort-AV: E=McAfee;i="6500,9779,10549"; a="295769886" X-IronPort-AV: E=Sophos;i="5.96,213,1665471600"; d="scan'208";a="295769886" Received: from fmsmga008.fm.intel.com ([10.253.24.58]) by fmsmga106.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 02 Dec 2022 16:50:12 -0800 X-IronPort-AV: E=McAfee;i="6500,9779,10549"; a="708670328" X-IronPort-AV: E=Sophos;i="5.96,213,1665471600"; d="scan'208";a="708670328" Received: from jacob-builder.jf.intel.com (HELO jacob-builder) ([10.24.100.114]) by fmsmga008-auth.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 02 Dec 2022 16:50:11 -0800 Date: Fri, 2 Dec 2022 16:54:05 -0800 From: Jacob Pan To: Joerg Roedel Cc: Lu Baolu , Xiongfeng Wang , Yang Yingliang , iommu@lists.linux.dev, linux-kernel@vger.kernel.org, jacob.jun.pan@linux.intel.com Subject: Re: [PATCH 0/4] [PULL REQUEST] iommu/vt-d: Fixes for v6.1-rc8 Message-ID: <20221202165405.50be86a6@jacob-builder> In-Reply-To: References: <20221201040127.1962750-1-baolu.lu@linux.intel.com> Organization: OTC X-Mailer: Claws Mail 3.17.5 (GTK+ 2.24.32; x86_64-pc-linux-gnu) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit X-Spam-Status: No, score=-4.3 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_EF,RCVD_IN_DNSWL_MED,SPF_HELO_PASS, SPF_NONE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Joerg, On Fri, 2 Dec 2022 11:47:23 +0100, Joerg Roedel wrote: > On Thu, Dec 01, 2022 at 12:01:23PM +0800, Lu Baolu wrote: > > Jacob Pan (1): > > iommu/vt-d: Add a fix for devices need extra dtlb flush There is a bug in this patch, I will send a fix patch. Or can you squash the fix below? From: Jacob Pan Date: Fri, 2 Dec 2022 16:22:42 -0800 Subject: [PATCH] iommu/vt-d: Fix buggy QAT device mask Impacted QAT device IDs that need extra dtlb flush quirk is ranging from 0x4940 to 0x4943. After bitwise AND device ID with 0xfffc the result should be 0x4940 instead of 0x494c to identify these devices. Reported-by: Raghunathan Srinivasan Signed-off-by: Jacob Pan --- drivers/iommu/intel/iommu.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/drivers/iommu/intel/iommu.c b/drivers/iommu/intel/iommu.c index d8759f445aff..0b10104c4b99 100644 --- a/drivers/iommu/intel/iommu.c +++ b/drivers/iommu/intel/iommu.c @@ -1401,7 +1401,7 @@ static void domain_update_iotlb(struct dmar_domain *domain) * This quirk is exempted from risky_device() check because it applies only * to the built-in QAT devices and it doesn't grant additional privileges. */ -#define BUGGY_QAT_DEVID_MASK 0x494c +#define BUGGY_QAT_DEVID_MASK 0x4940 static bool dev_needs_extra_dtlb_flush(struct pci_dev *pdev) { if (pdev->vendor != PCI_VENDOR_ID_INTEL) sorry about that, Thanks, Jacob