From mboxrd@z Thu Jan 1 00:00:00 1970 From: Andi Kleen Subject: Re: [PATCH V2 2/3] perf protect LBR when Intel PT is enabled. Date: Thu, 3 Jul 2014 04:44:20 +0200 Message-ID: <20140703024420.GO5714@two.firstfloor.org> References: <1404324855-15166-1-git-send-email-kan.liang@intel.com> <1404324855-15166-2-git-send-email-kan.liang@intel.com> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Cc: peterz@infradead.org, linux-kernel@vger.kernel.org, kvm@vger.kernel.org, andi@firstfloor.org To: kan.liang@intel.com Return-path: Content-Disposition: inline In-Reply-To: <1404324855-15166-2-git-send-email-kan.liang@intel.com> Sender: linux-kernel-owner@vger.kernel.org List-Id: kvm.vger.kernel.org On Wed, Jul 02, 2014 at 11:14:14AM -0700, kan.liang@intel.com wrote: > From: Kan Liang > > If RTIT_CTL.TraceEn=1, any attempt to read or write the LBR or LER MSRs, including LBR_TOS, will result in a #GP. > Since Intel PT can be enabled/disabled at runtime, LBR MSRs have to be protected by _safe() at runtime. > > Signed-off-by: Kan Liang Patch looks good to me. -Andi