From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-0.6 required=3.0 tests=DKIM_INVALID,DKIM_SIGNED, HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS autolearn=no autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 7E125C35E04 for ; Tue, 25 Feb 2020 19:10:40 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.kernel.org (Postfix) with ESMTP id 56B8621744 for ; Tue, 25 Feb 2020 19:10:40 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=fail reason="signature verification failed" (2048-bit key) header.d=infradead.org header.i=@infradead.org header.b="a2+ao7c9" Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731694AbgBYTKi (ORCPT ); Tue, 25 Feb 2020 14:10:38 -0500 Received: from bombadil.infradead.org ([198.137.202.133]:52516 "EHLO bombadil.infradead.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728065AbgBYTKh (ORCPT ); Tue, 25 Feb 2020 14:10:37 -0500 DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=infradead.org; s=bombadil.20170209; h=In-Reply-To:Content-Type:MIME-Version :References:Message-ID:Subject:Cc:To:From:Date:Sender:Reply-To: Content-Transfer-Encoding:Content-ID:Content-Description; bh=/QPdaZH+DsUudIW2GdY/uk6YzgGjD4GCaet27A7iu4Q=; b=a2+ao7c9edC3GjXQUaEmUb/HTT hGvinhlKAZkBaIiM4qb96MUs2X0Q4fRunGkB/CeQARPEpMClpLIQKcKBb5rTezSOsV64m559qLGiR 3saeYmoNvg4raBqUeMGE7xiqMAcXlVqS/pW4goL2Lyd+V3kM0jEELT9iBfsdNnaVd+1qif0otTydH TkgO1N1uYu5RFWYaIQ1w+Viu7/I9ta3Dwr1Gt8B6TbdhPWWFwPqtTdIUdhP8zDFwA8BUJUyQOZyAn rcb8SQa10L2M87oDjwKIWAZOas6e5R4DhX3dgJfAupdWwyey767howjeF3tzZ/SHDR/eZXWl593m5 voledIJQ==; Received: from hch by bombadil.infradead.org with local (Exim 4.92.3 #3 (Red Hat Linux)) id 1j6fbG-0000xA-RV; Tue, 25 Feb 2020 19:10:34 +0000 Date: Tue, 25 Feb 2020 11:10:34 -0800 From: Christoph Hellwig To: Jacob Pan Cc: iommu@lists.linux-foundation.org, LKML , Lu Baolu , Joerg Roedel , David Woodhouse , "Tian, Kevin" , Dave Jiang , Raj Ashok , Jean-Philippe Brucker Subject: Re: [PATCH 2/2] iommu/vt-d: Replace intel SVM APIs with generic SVA APIs Message-ID: <20200225191034.GA29045@infradead.org> References: <1582586797-61697-1-git-send-email-jacob.jun.pan@linux.intel.com> <1582586797-61697-4-git-send-email-jacob.jun.pan@linux.intel.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <1582586797-61697-4-git-send-email-jacob.jun.pan@linux.intel.com> X-SRS-Rewrite: SMTP reverse-path rewritten from by bombadil.infradead.org. See http://www.infradead.org/rpr.html Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, Feb 24, 2020 at 03:26:37PM -0800, Jacob Pan wrote: > This patch is an initial step to replace Intel SVM code with the > following IOMMU SVA ops: > intel_svm_bind_mm() => iommu_sva_bind_device() > intel_svm_unbind_mm() => iommu_sva_unbind_device() > intel_svm_is_pasid_valid() => iommu_sva_get_pasid() How did either set APIs end up being added to the kernel without users to start with? Please remove both the old intel and the iommu ones given that neither has any users.