From patchwork Tue Oct 24 21:07:39 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Oliver Upton X-Patchwork-Id: 13435257 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id 8FE19C07545 for ; Tue, 24 Oct 2023 21:07:57 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1344095AbjJXVH5 (ORCPT ); Tue, 24 Oct 2023 17:07:57 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:37006 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232399AbjJXVH4 (ORCPT ); Tue, 24 Oct 2023 17:07:56 -0400 Received: from out-190.mta0.migadu.com (out-190.mta0.migadu.com [91.218.175.190]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 5973810CE for ; Tue, 24 Oct 2023 14:07:54 -0700 (PDT) X-Report-Abuse: Please report any abuse attempt to abuse@migadu.com and include these headers. DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linux.dev; s=key1; t=1698181672; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding; bh=fSyLTmEne5H15gCAbFAp7YdAG90zxia/5FU2XX1Ko80=; b=SgF8VpK96lCgNxnxzktqS5kjoR4CnoHvdxy6ggkwkdubuJa8oX2IY9Bx9xGzPbjlqKwdQi 77iks9pC4t3xHic6WhHU6ZpJuNOS4vEODgaHJIvAPxr9frvkih/bh9j9Hz3/Gn6Cy6/Gel rBN+jeWaoilfjELzlfFZayzJxa0r1yY= From: Oliver Upton To: kvmarm@lists.linux.dev Cc: kvm@vger.kernel.org, Marc Zyngier , James Morse , Suzuki K Poulose , Zenghui Yu , Oliver Upton Subject: [PATCH] KVM: arm64: Stop printing about MMIO accesses where ISV==0 Date: Tue, 24 Oct 2023 21:07:39 +0000 Message-ID: <20231024210739.1729723-1-oliver.upton@linux.dev> MIME-Version: 1.0 X-Migadu-Flow: FLOW_OUT Precedence: bulk List-ID: X-Mailing-List: kvm@vger.kernel.org It is a pretty well known fact that KVM does not support MMIO emulation without valid instruction syndrome information (ESR_EL2.ISV == 0). The dmesg is useless as it provides zero context and just winds up polluting logs. Let's just delete it. Any userspace that cares should just use KVM_CAP_ARM_NISV_TO_USER, which inherently ties to a vCPU context. Signed-off-by: Oliver Upton --- arch/arm64/kvm/mmio.c | 1 - 1 file changed, 1 deletion(-) base-commit: 6465e260f48790807eef06b583b38ca9789b6072 diff --git a/arch/arm64/kvm/mmio.c b/arch/arm64/kvm/mmio.c index 3dd38a151d2a..a53721be32ec 100644 --- a/arch/arm64/kvm/mmio.c +++ b/arch/arm64/kvm/mmio.c @@ -143,7 +143,6 @@ int io_mem_abort(struct kvm_vcpu *vcpu, phys_addr_t fault_ipa) return 0; } - kvm_pr_unimpl("Data abort outside memslots with no valid syndrome info\n"); return -ENOSYS; }