| # See docs/devel/tracing.rst for syntax documentation. |
| # |
| # This file is processed by the tracetool script during the build. |
| # |
| # To add a new trace event: |
| # |
| # 1. Choose a name for the trace event. Declare its arguments and format |
| # string. |
| # |
| # 2. Call the trace event from code using trace_##name, e.g. multiwrite_cb() -> |
| # trace_multiwrite_cb(). The source file must #include "trace.h". |
| # |
| # Format of a trace event: |
| # |
| # [disable] <name>(<type1> <arg1>[, <type2> <arg2>] ...) "<format-string>" |
| # |
| # Example: g_malloc(size_t size) "size %zu" |
| # |
| # The "disable" keyword will build without the trace event. |
| # |
| # The <name> must be a valid as a C function name. |
| # |
| # Types should be standard C types. Use void * for pointers because the trace |
| # system may not have the necessary headers included. |
| # |
| # The <format-string> should be a sprintf()-compatible format string. |
| |
| # cpu.c |
| breakpoint_insert(int cpu_index, uint64_t pc, int flags) "cpu=%d pc=0x%" PRIx64 " flags=0x%x" |
| breakpoint_remove(int cpu_index, uint64_t pc, int flags) "cpu=%d pc=0x%" PRIx64 " flags=0x%x" |
| breakpoint_singlestep(int cpu_index, int enabled) "cpu=%d enable=%d" |
| |
| # dma-helpers.c |
| dma_blk_io(void *dbs, void *bs, int64_t offset, bool to_dev) "dbs=%p bs=%p offset=%" PRId64 " to_dev=%d" |
| dma_aio_cancel(void *dbs) "dbs=%p" |
| dma_complete(void *dbs, int ret, void *cb) "dbs=%p ret=%d cb=%p" |
| dma_blk_cb(void *dbs, int ret) "dbs=%p ret=%d" |
| dma_map_wait(void *dbs) "dbs=%p" |
| |
| # exec.c |
| find_ram_offset(uint64_t size, uint64_t offset) "size: 0x%" PRIx64 " @ 0x%" PRIx64 |
| find_ram_offset_loop(uint64_t size, uint64_t candidate, uint64_t offset, uint64_t next, uint64_t mingap) "trying size: 0x%" PRIx64 " @ 0x%" PRIx64 ", offset: 0x%" PRIx64" next: 0x%" PRIx64 " mingap: 0x%" PRIx64 |
| ram_block_discard_range(const char *rbname, void *hva, size_t length, bool need_madvise, bool need_fallocate, int ret) "%s@%p + 0x%zx: madvise: %d fallocate: %d ret: %d" |
| |
| # accel/tcg/cputlb.c |
| memory_notdirty_write_access(uint64_t vaddr, uint64_t ram_addr, unsigned size) "0x%" PRIx64 " ram_addr 0x%" PRIx64 " size %u" |
| memory_notdirty_set_dirty(uint64_t vaddr) "0x%" PRIx64 |
| |
| # job.c |
| job_state_transition(void *job, int ret, const char *legal, const char *s0, const char *s1) "job %p (ret: %d) attempting %s transition (%s-->%s)" |
| job_apply_verb(void *job, const char *state, const char *verb, const char *legal) "job %p in state %s; applying verb %s (%s)" |
| job_completed(void *job, int ret) "job %p ret %d" |
| |
| # job-qmp.c |
| qmp_job_cancel(void *job) "job %p" |
| qmp_job_pause(void *job) "job %p" |
| qmp_job_resume(void *job) "job %p" |
| qmp_job_complete(void *job) "job %p" |
| qmp_job_finalize(void *job) "job %p" |
| qmp_job_dismiss(void *job) "job %p" |
| |
| |
| ### Guest events, keep at bottom |
| |
| |
| ## vCPU |
| |
| # trace/control-target.c |
| |
| # Hot-plug a new virtual (guest) CPU |
| # |
| # Mode: user, softmmu |
| # Targets: all |
| vcpu guest_cpu_enter(void) |
| |
| # trace/control.c |
| |
| # Hot-unplug a virtual (guest) CPU |
| # |
| # Mode: user, softmmu |
| # Targets: all |
| vcpu guest_cpu_exit(void) |
| |
| # hw/core/cpu.c |
| |
| # Reset the state of a virtual (guest) CPU |
| # |
| # Mode: user, softmmu |
| # Targets: all |
| vcpu guest_cpu_reset(void) |
| |
| # include/user/syscall-trace.h |
| |
| # @num: System call number. |
| # @arg*: System call argument value. |
| # |
| # Start executing a guest system call in syscall emulation mode. |
| # |
| # Mode: user |
| # Targets: TCG(all) |
| vcpu guest_user_syscall(uint64_t num, uint64_t arg1, uint64_t arg2, uint64_t arg3, uint64_t arg4, uint64_t arg5, uint64_t arg6, uint64_t arg7, uint64_t arg8) "num=0x%016"PRIx64" arg1=0x%016"PRIx64" arg2=0x%016"PRIx64" arg3=0x%016"PRIx64" arg4=0x%016"PRIx64" arg5=0x%016"PRIx64" arg6=0x%016"PRIx64" arg7=0x%016"PRIx64" arg8=0x%016"PRIx64 |
| |
| # @num: System call number. |
| # @ret: System call result value. |
| # |
| # Finish executing a guest system call in syscall emulation mode. |
| # |
| # Mode: user |
| # Targets: TCG(all) |
| vcpu guest_user_syscall_ret(uint64_t num, uint64_t ret) "num=0x%016"PRIx64" ret=0x%016"PRIx64 |