|
|
|
|
|
|
|
|
|
|
xen-users
[Xen-devel] RE: general protection fault: 0000 [#1]
No. In Xen, kernel and modules for PV guests run
in ring 1, Xen provide virtualization for some MSRs enabling access to them from
ring 1, but this is not available for performance counter MSRs.
For OProfile we have a Xen component (xenoprof) that acess the performance
counters. Oprofile kernel module for Xen is modified to use
hypercalls in order to get the performance counters programmed instead of
accessing MSRs directly.
Regards
Renato
hi,
I have written a small kernel module to profile an event
in xen. When i invoke "rdmsr", I get general protection error. As far as i
understand, any kernel module is in CPL0, then rdmsr should work in kernel
module. Any help ? Below is log from syslog
-John
general
protection fault: 0000 [#1] SMP Modules linked in: hello_printk autofs4
hidp l2cap bluetooth sunrpc ipv6 binfmt_misc dm_mirror dm_multipath dm_mod
video thermal processor fan container button battery ac lp nvram tsdev evdev
i2c_i801 i2c_core piix tg3 r8169 parport_pc parport serio_raw serial_core
usbhid rtc ahci libata shpchp pci_hotplug ext3 jbd ehci_hcd ohci_hcd uhci_hcd
usbcore CPU: 0 EIP:
0061:[<ee07e023>] Not tainted VLI EFLAGS:
00010296 (2.6.16.33-xen #337) EIP is at hello_init+0x23/0x8d
[hello_printk] eax: 00000000 ebx: 00000119 ecx:
00000119 edx: ff1bbfb4 esi: d9de86b0 edi:
d9de8400 ebp: d9de86d8 esp: d9eafe1c ds:
007b es: 007b ss: 0069 Process insmod (pid: 11521,
threadinfo=d9eae000 task=c0713030) Stack: <0>ee1df034 ca680746
0000b06e c0135f05 c013d301 ee1df400 d9de86b0 d9de8400
c0137381 ee1df448 c03916c1 ee1df40c
00000000 00000008 00000003 00000000
ee1df40c ee1df448 ee1df400 00000000 00000000 00000000 00000000 00000000
Call Trace: [<c0135f05>]
__link_module+0x0/0x1f [<c013d301>]
stop_machine_run+0x2e/0x34 [<c0137381>]
sys_init_module+0x13e/0x1afb [<c011e45a>]
printk+0x0/0x1f [<c0162dc1>]
do_sync_read+0xc3/0xff [<c0130e9e>]
autoremove_wake_function+0x0/0x37 [<c01540e7>]
do_brk+0x21b/0x220 [<c01c4ca4>]
_atomic_dec_and_lock+0x40/0x5c [<c0179452>]
dput+0xc3/0x12a [<c0163fe5>]
__fput+0x137/0x18c [<c017d1e0>]
mntput_no_expire+0x13/0x6c [<c0105289>]
syscall_call+0x7/0xb Code: Bad EIP
value.
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel
|
|
|
|
|