Received: by 2002:a05:6a10:8c0a:0:0:0:0 with SMTP id go10csp2384046pxb; Sat, 27 Feb 2021 22:44:35 -0800 (PST) X-Google-Smtp-Source: ABdhPJy/eHXjKbGMoOCB9436VbCwYEofDKDZQdgfu3IQgI8VDZIryBMcs234UdCApy2emp+0jBm0 X-Received: by 2002:aa7:c84b:: with SMTP id g11mr10711764edt.169.1614494675311; Sat, 27 Feb 2021 22:44:35 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1614494675; cv=none; d=google.com; s=arc-20160816; b=tIBsZb2shsw5SKxDPBviSPj5CZXUG+xJpdBkuG0SuSNxRQJnb2p0qNAqt3P6Git5e5 5ofxXOktSFGJXg7olgJf4gWk9eV3/m3F7PM6kdXtmaRnjef2u/qiyCKg3uaPrG+1XDS/ ev0eZNpOZ1fMTpDvb3+weMIGVlEdvlMNxqx9+8yEd/l6HPX9pfO6tdH3SPaabTFKoCCN lDjnV5Y4HYyBtjYknBjt+QsZEW34zJKMnh4os7j6qrFR1vEeuI1sxrPcT8PBNPcVILui b3bK+kis8rtcjcULFdl7IxG9P7Je6ITQrWLbzlS1GmhfevIHnR6Igi/U+H8k1Z/7zLQ8 6cLA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:references:in-reply-to:message-id:date:subject :cc:to:from:ironport-sdr:ironport-sdr; bh=pbk6YgwU398c2MzFPU8QgGj2+i5mV5bsxrMTsOUsWVg=; b=nFMlAVEUxhAktIjRZbJJo9B3BckkQTj1gjADRQOYFVhuO+0hITkdENKua7NqsYzdDg CMXAn1mac2l7YbWTrBZ6sTGrJh4eMLogIHnPOnPKV27bwsVK1ftj20xvwJDaDgKXJ75+ pm7LAOPF++DHG75DP8ZXZYuFsGP/g33Hm9lbynD8uxZ/9CzXAYTwNGCiLwI1sEN/88ZY 6Dj0/s2tUs1ozbGgtssfODj79f/JEpmqosZsrkJN59J+HYWMAdYrRMbQE9idMkfzPLhS Zmkc1J5GRphj/GZ2OSZqhNsSXXk7LUj8tClnYMh2e/I1SGTZmAIp0zYUoRo9kQs5TBrh Ouow== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id q2si6879905edw.238.2021.02.27.22.44.13; Sat, 27 Feb 2021 22:44:35 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230480AbhB1Gkq (ORCPT + 99 others); Sun, 28 Feb 2021 01:40:46 -0500 Received: from mga09.intel.com ([134.134.136.24]:58906 "EHLO mga09.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230442AbhB1Gki (ORCPT ); Sun, 28 Feb 2021 01:40:38 -0500 IronPort-SDR: EvUfhXfas66MLjB0D2b4vI+rMo7QsJ0kvxuZa9UtQDK0e0iu/NaZW63Khh6iwfmS43e6q7UudW XxasijIH1DFw== X-IronPort-AV: E=McAfee;i="6000,8403,9908"; a="186323904" X-IronPort-AV: E=Sophos;i="5.81,211,1610438400"; d="scan'208";a="186323904" Received: from orsmga004.jf.intel.com ([10.7.209.38]) by orsmga102.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 27 Feb 2021 22:33:10 -0800 IronPort-SDR: ZQMYI6AaWKQnl0GwWA6VKAvPIUZYucjCp6vofbUAVWe6A8qt84ahb66+Pq49XgsyBVoWGc5uKg Kyi7K407u3YQ== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.81,211,1610438400"; d="scan'208";a="517029731" Received: from otc-wp-03.jf.intel.com ([10.54.39.79]) by orsmga004.jf.intel.com with ESMTP; 27 Feb 2021 22:33:10 -0800 From: Jacob Pan To: LKML , Joerg Roedel , "Lu Baolu" , David Woodhouse , iommu@lists.linux-foundation.org, cgroups@vger.kernel.org, Tejun Heo , Li Zefan , Johannes Weiner , Jean-Philippe Brucker Cc: Alex Williamson , Eric Auger , Jason Gunthorpe , Jonathan Corbet , Raj Ashok , "Tian, Kevin" , Yi Liu , Wu Hao , Dave Jiang , Jacob Pan Subject: [PATCH V4 12/18] iommu/vt-d: Remove mm reference for guest SVA Date: Sat, 27 Feb 2021 14:01:20 -0800 Message-Id: <1614463286-97618-13-git-send-email-jacob.jun.pan@linux.intel.com> X-Mailer: git-send-email 2.7.4 In-Reply-To: <1614463286-97618-1-git-send-email-jacob.jun.pan@linux.intel.com> References: <1614463286-97618-1-git-send-email-jacob.jun.pan@linux.intel.com> Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Now that IOASID core keeps track of the IOASID to mm_struct ownership in the forms of ioasid_set with IOASID_SET_TYPE_MM token type, there is no need to keep the same mapping in VT-d driver specific data. Native SVM usage is not affected by the change. Signed-off-by: Jacob Pan --- drivers/iommu/intel/svm.c | 7 ------- 1 file changed, 7 deletions(-) diff --git a/drivers/iommu/intel/svm.c b/drivers/iommu/intel/svm.c index c469c24d23f5..f75699ddb923 100644 --- a/drivers/iommu/intel/svm.c +++ b/drivers/iommu/intel/svm.c @@ -363,12 +363,6 @@ int intel_svm_bind_gpasid(struct iommu_domain *domain, struct device *dev, ret = -ENOMEM; goto out; } - /* REVISIT: upper layer/VFIO can track host process that bind - * the PASID. ioasid_set = mm might be sufficient for vfio to - * check pasid VMM ownership. We can drop the following line - * once VFIO and IOASID set check is in place. - */ - svm->mm = get_task_mm(current); svm->pasid = data->hpasid; if (data->flags & IOMMU_SVA_GPASID_VAL) { svm->gpasid = data->gpasid; @@ -376,7 +370,6 @@ int intel_svm_bind_gpasid(struct iommu_domain *domain, struct device *dev, } ioasid_attach_data(data->hpasid, svm); INIT_LIST_HEAD_RCU(&svm->devs); - mmput(svm->mm); } sdev = kzalloc(sizeof(*sdev), GFP_KERNEL); if (!sdev) { -- 2.25.1