|
|
|
|
|
|
|
|
|
|
xen-users
[Xen-devel] RE: general protection fault: 0000 [#1]
Actually, it's not exactly that way - as long as an MSR can be read by
Xen (i.e. is implemented), guests are permitted to read them (see the
default case in the rdmsr handling part of emulate_privileged_op().
However, I have a hard time understanding what need profiling code
would have to access MSR 0x119 (which, according to my docs, is
PentiumPro/II/III specific).
Jan
>>> "Santos, Jose Renato G" <joserenato.santos@xxxxxx> 05.03.08 19:12 >>>
No. In Xen, kernel and modules for PV guests run in ring 1, Xen provide
virtualization for some MSRs enabling access to them from ring 1, but this is
not available for performance counter MSRs. For OProfile we have a Xen
component (xenoprof) that acess the performance counters. Oprofile kernel
module for Xen is modified to use hypercalls in order to get the performance
counters programmed instead of accessing MSRs directly.
Regards
Renato
________________________________
From: oprofile-list-bounces@xxxxxxxxxxxxxxxxxxxxx
[mailto:oprofile-list-bounces@xxxxxxxxxxxxxxxxxxxxx] On Behalf Of john bryant
Sent: Wednesday, March 05, 2008 8:14 AM
To: xen-users@xxxxxxxxxxxxxxxxxxx; xen-devel@xxxxxxxxxxxxxxxxxxx;
oprofile-list@xxxxxxxxxxxxxxxxxxxxx
Subject: general protection fault: 0000 [#1]
hi,
I have written a small kernel module to profile an event in xen. When i invoke
"rdmsr", I get general protection error. As far as i understand, any kernel
module is in CPL0, then rdmsr should work in kernel module. Any help ? Below
is log from syslog
-John
general protection fault: 0000 [#1]
SMP
Modules linked in: hello_printk autofs4 hidp l2cap bluetooth sunrpc ipv6
binfmt_misc dm_mirror dm_multipath dm_mod video thermal processor fan container
button battery ac lp nvram tsdev evdev i2c_i801 i2c_core piix tg3 r8169
parport_pc parport serio_raw serial_core usbhid rtc ahci libata shpchp
pci_hotplug ext3 jbd ehci_hcd ohci_hcd uhci_hcd usbcore
CPU: 0
EIP: 0061:[<ee07e023>] Not tainted VLI
EFLAGS: 00010296 (2.6.16.33-xen #337)
EIP is at hello_init+0x23/0x8d [hello_printk]
eax: 00000000 ebx: 00000119 ecx: 00000119 edx: ff1bbfb4
esi: d9de86b0 edi: d9de8400 ebp: d9de86d8 esp: d9eafe1c
ds: 007b es: 007b ss: 0069
Process insmod (pid: 11521, threadinfo=d9eae000 task=c0713030)
Stack: <0>ee1df034 ca680746 0000b06e c0135f05 c013d301 ee1df400 d9de86b0
d9de8400
c0137381 ee1df448 c03916c1 ee1df40c 00000000 00000008 00000003 00000000
ee1df40c ee1df448 ee1df400 00000000 00000000 00000000 00000000 00000000
Call Trace:
[<c0135f05>] __link_module+0x0/0x1f
[<c013d301>] stop_machine_run+0x2e/0x34
[<c0137381>] sys_init_module+0x13e/0x1afb
[<c011e45a>] printk+0x0/0x1f
[<c0162dc1>] do_sync_read+0xc3/0xff
[<c0130e9e>] autoremove_wake_function+0x0/0x37
[<c01540e7>] do_brk+0x21b/0x220
[<c01c4ca4>] _atomic_dec_and_lock+0x40/0x5c
[<c0179452>] dput+0xc3/0x12a
[<c0163fe5>] __fput+0x137/0x18c
[<c017d1e0>] mntput_no_expire+0x13/0x6c
[<c0105289>] syscall_call+0x7/0xb
Code: Bad EIP value.
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel
|
|
|
|
|