Received: by 2002:a05:6a10:1d13:0:0:0:0 with SMTP id pp19csp386064pxb; Wed, 18 Aug 2021 04:53:14 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzcf+Z2o2CKCS+QhMu/fbtMlYbE8HQ0scRMV/pGMqYpJmxeI8afl8b9mDw0JVsAQw1zH01F X-Received: by 2002:a05:6e02:194c:: with SMTP id x12mr5981603ilu.155.1629287594116; Wed, 18 Aug 2021 04:53:14 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1629287594; cv=none; d=google.com; s=arc-20160816; b=OkRJWYqibVONp5JCS16tR/q7RykhxzGoaE8N4+zLSjc0zT12/+5q6y9818y+AWJMY/ qpYPnA5C3OHjW7LmrO1/9pEpSwLghjgIPDpKL/FDmN51xqdz+XjXqptmdjLZPaHq6Ym3 f1kqBabZ9bqv2IxmlNJEttW8PlaSdUsrO/VnDpDCDVbHYhiRLTYirOiqDupHIrtlnWNO /qRxzqDeD3hh0NmNnZt4YSrPFmCmWG0Ib14/NZbQtuzBisn3PntfF7Ivlr7VAz9+YVce MPwSOTX84taS7oFv6ce1/XMPqv64OzIDtH8NV8n2cXBVPu2KJ0mxDjkt0szRv6GqayHF f61Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from; bh=DknmZnJexbLqinphUt9B6HE9EdOXWNS7dpVQbMV54wc=; b=hbTdpNf3bcrQbbDTVk+5qBT87mxMteCiEcFMpi6vUkxri1OoFam38f8xdFGCPUEygG Q4Tr6uRWQzPed+Dqd8PhjErwDrcT75i8yjW+zhLlJPbMeK0RAGx4HEDESFLTxr6qU+Lw zs7/eisKT3zCApRWYzvPJI57SOilZIn9vQy1WIDvSloSW5Xt80l9RLXOvvM0V7CExe1+ XY+e+ytfNNAOTC7g10R2fyDGpwQ484Mk3lhKBsYFWpE8Chk9ZxlwY+V+FcB4pvXnqMv6 Obd1NW93ZJQVhnKTe4HxlZJGYNNomydpZoE0261iesRKi2FMNIBXIbzbkUMkNup1xHmI 2Hxw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id r6si4840075ilb.145.2021.08.18.04.53.02; Wed, 18 Aug 2021 04:53:14 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233655AbhHRLur (ORCPT + 99 others); Wed, 18 Aug 2021 07:50:47 -0400 Received: from mx3.molgen.mpg.de ([141.14.17.11]:50173 "EHLO mx1.molgen.mpg.de" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S229889AbhHRLuq (ORCPT ); Wed, 18 Aug 2021 07:50:46 -0400 Received: from ersatz.molgen.mpg.de (g258.RadioFreeInternet.molgen.mpg.de [141.14.13.3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) (Authenticated sender: pmenzel) by mx.molgen.mpg.de (Postfix) with ESMTPSA id DA74661E5FE33; Wed, 18 Aug 2021 13:50:09 +0200 (CEST) From: Paul Menzel To: Paolo Bonzini , Sean Christopherson , Vitaly Kuznetsov , Wanpeng Li , Jim Mattson , Joerg Roedel , Thomas Gleixner , Ingo Molnar , Borislav Petkov , x86@kernel.org, "H. Peter Anvin" Cc: Paul Menzel , kvm@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH] x86: kvm: Demote level of already loaded message from error to info Date: Wed, 18 Aug 2021 13:49:56 +0200 Message-Id: <20210818114956.7171-1-pmenzel@molgen.mpg.de> X-Mailer: git-send-email 2.33.0 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org In scripts, running modprobe kvm_amd 2>/dev/null modprobe kvm_intel 2>/dev/null to ensure the modules are loaded causes Linux to log errors. $ dmesg --level=err [ 0.641747] [Firmware Bug]: TSC_DEADLINE disabled due to Errata; please update microcode to version: 0x3a (or later) [ 40.196868] kvm: already loaded the other module [ 40.219857] kvm: already loaded the other module [ 55.501362] kvm [1177]: vcpu0, guest rIP: 0xffffffff96e5b644 disabled perfctr wrmsr: 0xc2 data 0xffff [ 56.397974] kvm [1418]: vcpu0, guest rIP: 0xffffffff81046158 disabled perfctr wrmsr: 0xc1 data 0xabcd [1007981.827781] kvm: already loaded the other module [1008000.394089] kvm: already loaded the other module [1008030.706999] kvm: already loaded the other module [1020396.054470] kvm: already loaded the other module [1020405.614774] kvm: already loaded the other module [1020410.140069] kvm: already loaded the other module [1020704.049231] kvm: already loaded the other module As one of the two KVM modules is already loaded, KVM is functioning, and their is no error condition. Therefore, demote the log message level to informational. Signed-off-by: Paul Menzel --- arch/x86/kvm/x86.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c index e5d5c5ed7dd4..411c58ae0c97 100644 --- a/arch/x86/kvm/x86.c +++ b/arch/x86/kvm/x86.c @@ -8372,7 +8372,7 @@ int kvm_arch_init(void *opaque) int r; if (kvm_x86_ops.hardware_enable) { - printk(KERN_ERR "kvm: already loaded the other module\n"); + printk(KERN_INFO "kvm: already loaded the other module\n"); r = -EEXIST; goto out; } -- 2.33.0