From: Sean Christopherson <seanjc@google.com>
To: Thorsten Glaser <t.glaser@tarent.de>
Cc: kvm <kvm@vger.kernel.org>, Paolo Bonzini <pbonzini@redhat.com>
Subject: Re: [PATCH] KVM: VMX: Require KVM_SET_TSS_ADDR being called prior to running a VCPU
Date: Wed, 28 Jun 2023 09:21:05 -0700 [thread overview]
Message-ID: <ZJxd8StU25UJKBSk@google.com> (raw)
In-Reply-To: <f1afa6c0-cde2-ab8b-ea71-bfa62a45b956@tarent.de>
Dropped all the old maintainers from Cc. This is one of the more impressive
displays of thread necromancy I've seen :-)
On Wed, Jun 28, 2023, Thorsten Glaser wrote:
> Hi,
>
> I just saw a new message after reboot today and searched for it and got
> https://patchwork.kernel.org/project/kvm/patch/5142D010.7060303@web.de/
> and you might be interested that I ran into it.
>
> [ 70.747068] kvm: KVM_SET_TSS_ADDR need to be called before entering vcpu
>
> Full dmesg attached. This is on reboot, no VMs are running yet.
Heh, there are no VMs that _you_ deliberately created, but that doesn't mean there
aren't VMs in the system. IIRC, libvirt (or maybe systemd?) probes KVM by doing
modprobe *and* creating a dummy VM. If whatever is creating a VM also creates a
vCPU, then the "soft" warning about KVM_SET_TSS_ADDR will trigger.
Another possibility is that KVM sefltests are being run during boot. KVM's selftests
stuff register state to force the vCPU into 64-bit mode, and so they don't bother
setting KVM_SET_TSS_ADDR, e.g. the soft warning can be triggered by doing
sudo modprobe kvm_intel unrestricted_guest=0
and running pretty much any KVM selftest.
> I don’t get any extra weird messages on VM start, and they come up fine.
So long as the VMs you care about don't have issues, the message is completely
benign, and expected since you are running on Nehalem, which doesn't support
unrestricted guest.
> [ 0.000000] DMI: Gigabyte Technology Co., Ltd. X58-USB3/X58-USB3, BIOS F5 09/07/2011
> [ 0.330068] smpboot: CPU0: Intel(R) Core(TM) i7 CPU 950 @ 3.07GHz (family: 0x6, model: 0x1a, stepping: 0x5)
> [ 70.747068] kvm: KVM_SET_TSS_ADDR need to be called before entering vcpu
next prev parent reply other threads:[~2023-06-28 16:21 UTC|newest]
Thread overview: 7+ messages / expand[flat|nested] mbox.gz Atom feed top
2013-03-15 7:38 [PATCH] KVM: VMX: Require KVM_SET_TSS_ADDR being called prior to running a VCPU Jan Kiszka
2013-03-15 11:43 ` Gleb Natapov
2013-03-18 16:50 ` Marcelo Tosatti
2023-06-28 1:29 ` Thorsten Glaser
2023-06-28 16:21 ` Sean Christopherson [this message]
2023-06-28 17:53 ` Thorsten Glaser
2023-06-28 19:07 ` Sean Christopherson
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=ZJxd8StU25UJKBSk@google.com \
--to=seanjc@google.com \
--cc=kvm@vger.kernel.org \
--cc=pbonzini@redhat.com \
--cc=t.glaser@tarent.de \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox