RE: [patch v2 8/8] KVM: x86: Disable intercept for Intel processor trace MSRs

2017-11-13 Thread Kang, Luwei
> > + if (pt_mode == PT_MODE_HOST_GUEST) { > > + u32 i, eax, ebx, ecx, edx; > > + > > + cpuid_count(0x14, 1, , , , ); > > + vmx_disable_intercept_for_msr(MSR_IA32_RTIT_STATUS, false); > > + vmx_disable_intercept_for_msr(MSR_IA32_RTIT_OUTPUT_BASE, false); >

RE: [patch v2 8/8] KVM: x86: Disable intercept for Intel processor trace MSRs

2017-11-13 Thread Kang, Luwei
> > + if (pt_mode == PT_MODE_HOST_GUEST) { > > + u32 i, eax, ebx, ecx, edx; > > + > > + cpuid_count(0x14, 1, , , , ); > > + vmx_disable_intercept_for_msr(MSR_IA32_RTIT_STATUS, false); > > + vmx_disable_intercept_for_msr(MSR_IA32_RTIT_OUTPUT_BASE, false); >

Re: [patch v2 8/8] KVM: x86: Disable intercept for Intel processor trace MSRs

2017-11-13 Thread Paolo Bonzini
On 30/10/2017 23:05, Luwei Kang wrote: > From: Chao Peng > > Pass through Intel processor trace to guest directly. > > Signed-off-by: Chao Peng > Signed-off-by: Luwei Kang > --- > arch/x86/kvm/vmx.c | 13

Re: [patch v2 8/8] KVM: x86: Disable intercept for Intel processor trace MSRs

2017-11-13 Thread Paolo Bonzini
On 30/10/2017 23:05, Luwei Kang wrote: > From: Chao Peng > > Pass through Intel processor trace to guest directly. > > Signed-off-by: Chao Peng > Signed-off-by: Luwei Kang > --- > arch/x86/kvm/vmx.c | 13 + > 1 file changed, 13 insertions(+) > > diff --git a/arch/x86/kvm/vmx.c