1 2The x86 kernel supports tracing most MSR (Model Specific Register) accesses. 3To see the definition of the MSRs on Intel systems please see the SDM 4at http://www.intel.com/sdm (Volume 3) 5 6Available trace points: 7 8/sys/kernel/debug/tracing/events/msr/ 9 10Trace MSR reads 11 12read_msr 13 14msr: MSR number 15val: Value written 16failed: 1 if the access failed, otherwise 0 17 18 19Trace MSR writes 20 21write_msr 22 23msr: MSR number 24val: Value written 25failed: 1 if the access failed, otherwise 0 26 27 28Trace RDPMC in kernel 29 30rdpmc 31 32The trace data can be post processed with the postprocess/decode_msr.py script 33 34cat /sys/kernel/debug/tracing/trace | decode_msr.py /usr/src/linux/include/asm/msr-index.h 35 36to add symbolic MSR names. 37 38