events-msr.txt 700 B

12345678910111213141516171819202122232425262728293031323334353637
  1. The x86 kernel supports tracing most MSR (Model Specific Register) accesses.
  2. To see the definition of the MSRs on Intel systems please see the SDM
  3. at http://www.intel.com/sdm (Volume 3)
  4. Available trace points:
  5. /sys/kernel/debug/tracing/events/msr/
  6. Trace MSR reads
  7. read_msr
  8. msr: MSR number
  9. val: Value written
  10. failed: 1 if the access failed, otherwise 0
  11. Trace MSR writes
  12. write_msr
  13. msr: MSR number
  14. val: Value written
  15. failed: 1 if the access failed, otherwise 0
  16. Trace RDPMC in kernel
  17. rdpmc
  18. The trace data can be post processed with the postprocess/decode_msr.py script
  19. cat /sys/kernel/debug/tracing/trace | decode_msr.py /usr/src/linux/include/asm/msr-index.h
  20. to add symbolic MSR names.