diff options
author | Will Deacon <will@kernel.org> | 2024-12-02 14:57:29 +0000 |
---|---|---|
committer | Catalin Marinas <catalin.marinas@arm.com> | 2024-12-03 18:10:20 +0000 |
commit | d44679fb954ffea961036ed1aeb7d65035f78489 (patch) | |
tree | fab43124bb397ee70e13a7c5e3b2c1e368646539 | |
parent | 8d09e2d569f6e34301387f24433b42062517ca85 (diff) | |
download | lwn-d44679fb954ffea961036ed1aeb7d65035f78489.tar.gz lwn-d44679fb954ffea961036ed1aeb7d65035f78489.zip |
drivers/virt: pkvm: Don't fail ioremap() call if MMIO_GUARD fails
Calling the MMIO_GUARD hypercall from guests which have not been
enrolled (e.g. because they are running without pvmfw) results in
-EINVAL being returned. In this case, MMIO_GUARD is not active
and so we can simply proceed with the normal ioremap() routine.
Don't fail ioremap() if MMIO_GUARD fails; instead WARN_ON_ONCE()
to highlight that the pvm environment is slightly wonky.
Fixes: 0f1269495800 ("drivers/virt: pkvm: Intercept ioremap using pKVM MMIO_GUARD hypercall")
Signed-off-by: Will Deacon <will@kernel.org>
Link: https://lore.kernel.org/r/20241202145731.6422-2-will@kernel.org
Signed-off-by: Catalin Marinas <catalin.marinas@arm.com>
-rw-r--r-- | drivers/virt/coco/pkvm-guest/arm-pkvm-guest.c | 6 |
1 files changed, 1 insertions, 5 deletions
diff --git a/drivers/virt/coco/pkvm-guest/arm-pkvm-guest.c b/drivers/virt/coco/pkvm-guest/arm-pkvm-guest.c index 56a3859dda8a..4230b817a80b 100644 --- a/drivers/virt/coco/pkvm-guest/arm-pkvm-guest.c +++ b/drivers/virt/coco/pkvm-guest/arm-pkvm-guest.c @@ -87,12 +87,8 @@ static int mmio_guard_ioremap_hook(phys_addr_t phys, size_t size, while (phys < end) { const int func_id = ARM_SMCCC_VENDOR_HYP_KVM_MMIO_GUARD_FUNC_ID; - int err; - - err = arm_smccc_do_one_page(func_id, phys); - if (err) - return err; + WARN_ON_ONCE(arm_smccc_do_one_page(func_id, phys)); phys += PAGE_SIZE; } |