Hi Jan / David,
On the other thread you asked about some messages in xl-dmesg, over time
there are more that come from a kernel booting. (mind you that there can
be some changes in Kconfigs between the kernels i have used.)
3.16 was clean this is what xl-dmesg gained on log message that seem to
be triggered by something in the dom0 Kernel booting on my AMD system.
from 3.16 to 3.19 we gained a lot of these, if i remember correctly
related to
perf being enabled in the kernel:
+ traps.c:2655:d0v0 Domain attempted WRMSR 00000000c0000081 from
0xe023e00800000000 to 0x0023001000000000.
+ traps.c:2655:d0v0 Domain attempted WRMSR 00000000c0000082 from
0xffff82d0bffff000 to 0xffffffff81bc2670.
+ traps.c:2655:d0v0 Domain attempted WRMSR 00000000c0000083 from
0xffff82d0bffff020 to 0xffffffff81bc4630.
+ traps.c:2655:d0v0 Domain attempted WRMSR 0000000000000174 from
0x0000000000000000 to 0x0000000000000010.
+ traps.c:2655:d0v0 Domain attempted WRMSR 0000000000000176 from
0x0000000000000000 to 0xffffffff81bc4660.
+ traps.c:2655:d0v0 Domain attempted WRMSR 00000000c0000083 from
0xffff82d0bffff020 to 0xffffffff81bc48b0.
+ traps.c:2655:d0v0 Domain attempted WRMSR 00000000c0000084 from
0x0000000000074700 to 0x0000000000047700.
traps.c:2655:d0v0 Domain attempted WRMSR 00000000c0010004 from
0x0000000000000000 to 0x000000000000ffff.
+ traps.c:2655:d0v1 Domain attempted WRMSR 00000000c0000081 from
0xe023e00800000000 to 0x0023001000000000.
+ traps.c:2655:d0v1 Domain attempted WRMSR 00000000c0000082 from
0xffff82d0bfffe080 to 0xffffffff81bc2670.
+ traps.c:2655:d0v1 Domain attempted WRMSR 00000000c0000083 from
0xffff82d0bfffe0a0 to 0xffffffff81bc4630.
+ traps.c:2655:d0v1 Domain attempted WRMSR 0000000000000174 from
0x0000000000000000 to 0x0000000000000010.
+ traps.c:2655:d0v1 Domain attempted WRMSR 0000000000000176 from
0x0000000000000000 to 0xffffffff81bc4660.
+ traps.c:2655:d0v1 Domain attempted WRMSR 00000000c0000083 from
0xffff82d0bfffe0a0 to 0xffffffff81bc48b0.
+ traps.c:2655:d0v1 Domain attempted WRMSR 00000000c0000084 from
0x0000000000074700 to 0x0000000000047700.
+ traps.c:2655:d0v2 Domain attempted WRMSR 00000000c0000081 from
0xe023e00800000000 to 0x0023001000000000.
+ traps.c:2655:d0v2 Domain attempted WRMSR 00000000c0000082 from
0xffff82d0bfffd100 to 0xffffffff81bc2670.
from 3.19 to 4.0 we gained:
+ d0 attempted to change d0v0's CR4 flags 00000660 -> 00000760
+ d0 attempted to change d0v1's CR4 flags 00000660 -> 00000760
+ d0 attempted to change d0v2's CR4 flags 00000660 -> 00000760
+ d0 attempted to change d0v3's CR4 flags 00000660 -> 00000760
+ d0 attempted to change d0v4's CR4 flags 00000660 -> 00000760
+ d0 attempted to change d0v5's CR4 flags 00000660 -> 00000760
and from 4.0 to 4.1 we gained the ones you were interested in:
+ traps.c:3227: GPF (0000): ffff82d080194a4d -> ffff82d080239d85
+ traps.c:3227: GPF (0000): ffff82d080194a4d -> ffff82d080239d85
+ traps.c:3227: GPF (0000): ffff82d080194a4d -> ffff82d080239d85
+ traps.c:3227: GPF (0000): ffff82d080194a4d -> ffff82d080239d85
+ traps.c:3227: GPF (0000): ffff82d080194a4d -> ffff82d080239d85
+ traps.c:3227: GPF (0000): ffff82d080194a4d -> ffff82d080239d85
--
Sander
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel