Received: by 2002:a05:6a10:7420:0:0:0:0 with SMTP id hk32csp4422267pxb; Mon, 21 Feb 2022 21:06:45 -0800 (PST) X-Google-Smtp-Source: ABdhPJxv8e3c8NTFtcVNMZgurZLd1VK1rhziFtHoFK4bcjQxKR56mpl0M4cJrpwHjeCxo2YS/8RY X-Received: by 2002:a63:a1c:0:b0:341:760a:1b03 with SMTP id 28-20020a630a1c000000b00341760a1b03mr18405253pgk.484.1645506405109; Mon, 21 Feb 2022 21:06:45 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1645506405; cv=none; d=google.com; s=arc-20160816; b=ijnGGD456KWvfP4xh8FNUx1VJxJgkV7A+80nzAbOvOEeww6JkKVi7i47KWkq/v30o2 zhN07JbtIQuMdX8PFLV2eZnkycBip0rJd3FcNrqXFf5z0N0DMwpzSL8VjRUqTP7EUv/Z NvDAO3Rref3OPEkxd7as+k0XWOnPbd46xyr6HmKgY2hUz3C4+Mv+Lm6F0PE4Wre5f9pe JqEMWFixFVX/8s/nYZs5Cmqpv36TCw3YJ5by4IrFG77DxMNyNk5j7uLYJLuX1y1rE9lc 3pKIq+FfYNsnmVO9ZqIhTi4ciZwAQ8pZs8199Z82Zv1TyvCn8KOqAarGYzw0/uox9MTP vAsg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=NcKRugjielA5jFK1pBvkZK/xQ1bR3E3QaoFByjpOKVQ=; b=sldeCEjhhSHoawgznpzFpsiI36MkqZQQRJLsTwYpedjAJEZf6FOk9WBHBxJE289gPu TJKyzQuw0XlvsnTPULYlpMwNbzM+RnJfurkVSEARBagN9Tj27IIZ/bzY/2eHNYETuyeD KULDr9VaGT+1vbyxYY2oSvcFxd1MdD3tY+468gNS/dKwOk0mjSNwStKPUzPsGljuGxgm UruGfLjgGKO1RswPzzvRb80PqIgLKOavMbOVckXFBVsD6GlEV0iJK3DYxAqBy6Os1FQv 8lMk1P10uormD+m3QPfrq2qAwAS9zlhS8Xs+8VfsMlx/ZmYy482bN3+d+2xXHTHFH3Hq gwIA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=imOh8pCz; spf=softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from lindbergh.monkeyblade.net (lindbergh.monkeyblade.net. [23.128.96.19]) by mx.google.com with ESMTPS id k20si8814951pgl.576.2022.02.21.21.06.44 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 21 Feb 2022 21:06:45 -0800 (PST) Received-SPF: softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) client-ip=23.128.96.19; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=imOh8pCz; spf=softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 34F68C0863; Mon, 21 Feb 2022 20:39:56 -0800 (PST) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S240246AbiBUJuI (ORCPT + 99 others); Mon, 21 Feb 2022 04:50:08 -0500 Received: from mxb-00190b01.gslb.pphosted.com ([23.128.96.19]:59638 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1351367AbiBUJpY (ORCPT ); Mon, 21 Feb 2022 04:45:24 -0500 Received: from sin.source.kernel.org (sin.source.kernel.org [IPv6:2604:1380:40e1:4800::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 204763F33A; Mon, 21 Feb 2022 01:18:23 -0800 (PST) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by sin.source.kernel.org (Postfix) with ESMTPS id 8282FCE0EA6; Mon, 21 Feb 2022 09:18:21 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 75275C340E9; Mon, 21 Feb 2022 09:18:19 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1645435100; bh=6wwCy+7tkebM8/7dK4CKcqnK1CtFIcuPJOwlQ8zq+bc=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=imOh8pCzKkoYebuXY8VIT6Mr3iykDaNxnsmlheR5K9GyjayNzAew0pToHEBBJD+WM EAOMjLdr1kxcpvWcXNFvkqfdxfu3XYBHfRDE9T81m3q/i8hYaFNfv4d2GHIvLx4Fjd /zYZuTMuuLhCdmiL9+mc02HZZSnFXAA774ZkrE3Y= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Sean Christopherson , Paolo Bonzini Subject: [PATCH 5.16 012/227] Revert "svm: Add warning message for AVIC IPI invalid target" Date: Mon, 21 Feb 2022 09:47:11 +0100 Message-Id: <20220221084935.246938526@linuxfoundation.org> X-Mailer: git-send-email 2.35.1 In-Reply-To: <20220221084934.836145070@linuxfoundation.org> References: <20220221084934.836145070@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-2.0 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,RDNS_NONE,SPF_HELO_NONE,T_SCC_BODY_TEXT_LINE autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Sean Christopherson commit dd4589eee99db8f61f7b8f7df1531cad3f74a64d upstream. Remove a WARN on an "AVIC IPI invalid target" exit, the WARN is trivial to trigger from guest as it will fail on any destination APIC ID that doesn't exist from the guest's perspective. Don't bother recording anything in the kernel log, the common tracepoint for kvm_avic_incomplete_ipi() is sufficient for debugging. This reverts commit 37ef0c4414c9743ba7f1af4392f0a27a99649f2a. Cc: stable@vger.kernel.org Signed-off-by: Sean Christopherson Message-Id: <20220204214205.3306634-2-seanjc@google.com> Signed-off-by: Paolo Bonzini Signed-off-by: Greg Kroah-Hartman --- arch/x86/kvm/svm/avic.c | 2 -- 1 file changed, 2 deletions(-) --- a/arch/x86/kvm/svm/avic.c +++ b/arch/x86/kvm/svm/avic.c @@ -342,8 +342,6 @@ int avic_incomplete_ipi_interception(str avic_kick_target_vcpus(vcpu->kvm, apic, icrl, icrh); break; case AVIC_IPI_FAILURE_INVALID_TARGET: - WARN_ONCE(1, "Invalid IPI target: index=%u, vcpu=%d, icr=%#0x:%#0x\n", - index, vcpu->vcpu_id, icrh, icrl); break; case AVIC_IPI_FAILURE_INVALID_BACKING_PAGE: WARN_ONCE(1, "Invalid backing page\n");