> +     case KVM_CAP_X86_GUEST_LBR:
> +             r = -EINVAL;
> +             if (cap->args[0] &&
> +                 x86_perf_get_lbr_stack(&kvm->arch.lbr_stack)) {
> +                     pr_err("Failed to enable the guest lbr feature\n");

Remove the pr_err. We don't want unprivileged users trigger unlimited
kernel printk.



Reply via email to