> + case KVM_CAP_X86_GUEST_LBR: > + r = -EINVAL; > + if (cap->args[0] && > + x86_perf_get_lbr_stack(&kvm->arch.lbr_stack)) { > + pr_err("Failed to enable the guest lbr feature\n"); Remove the pr_err. We don't want unprivileged users trigger unlimited kernel printk.