RE: [patch v2 8/8] KVM: x86: Disable intercept for Intel processor trace MSRs

2017-11-13 Thread Kang, Luwei
> > + if (pt_mode == PT_MODE_HOST_GUEST) { > > + u32 i, eax, ebx, ecx, edx; > > + > > + cpuid_count(0x14, 1, &eax, &ebx, &ecx, &edx); > > + vmx_disable_intercept_for_msr(MSR_IA32_RTIT_STATUS, false); > > + vmx_disable_intercept_for_msr(MSR_IA32_RTIT_OUTPUT_

Re: [patch v2 8/8] KVM: x86: Disable intercept for Intel processor trace MSRs

2017-11-13 Thread Paolo Bonzini
On 30/10/2017 23:05, Luwei Kang wrote: > From: Chao Peng > > Pass through Intel processor trace to guest directly. > > Signed-off-by: Chao Peng > Signed-off-by: Luwei Kang > --- > arch/x86/kvm/vmx.c | 13 + > 1 file changed, 13 insertions(+) > > diff --git a/arch/x86/kvm/vmx.c b/

[patch v2 8/8] KVM: x86: Disable intercept for Intel processor trace MSRs

2017-10-31 Thread Luwei Kang
From: Chao Peng Pass through Intel processor trace to guest directly. Signed-off-by: Chao Peng Signed-off-by: Luwei Kang --- arch/x86/kvm/vmx.c | 13 + 1 file changed, 13 insertions(+) diff --git a/arch/x86/kvm/vmx.c b/arch/x86/kvm/vmx.c index 8f61a8d..01447e2 100644 --- a/arch/x