Training courses

Kernel and Embedded Linux

Bootlin training courses

Embedded Linux, kernel,
Yocto Project, Buildroot, real-time,
graphics, boot time, debugging...

Bootlin logo

Elixir Cross Referencer


The x86 kernel supports tracing most MSR (Model Specific Register) accesses.
To see the definition of the MSRs on Intel systems please see the SDM
at http://www.intel.com/sdm (Volume 3)

Available trace points:

/sys/kernel/debug/tracing/events/msr/

Trace MSR reads

read_msr

msr: MSR number
val: Value written
failed: 1 if the access failed, otherwise 0


Trace MSR writes

write_msr

msr: MSR number
val: Value written
failed: 1 if the access failed, otherwise 0


Trace RDPMC in kernel

rdpmc

The trace data can be post processed with the postprocess/decode_msr.py script

cat /sys/kernel/debug/tracing/trace | decode_msr.py /usr/src/linux/include/asm/msr-index.h

to add symbolic MSR names.