trace-events 7.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166
  1. # Trace events for debugging and performance instrumentation
  2. #
  3. # This file is processed by the tracetool script during the build.
  4. #
  5. # To add a new trace event:
  6. #
  7. # 1. Choose a name for the trace event. Declare its arguments and format
  8. # string.
  9. #
  10. # 2. Call the trace event from code using trace_##name, e.g. multiwrite_cb() ->
  11. # trace_multiwrite_cb(). The source file must #include "trace.h".
  12. #
  13. # Format of a trace event:
  14. #
  15. # [disable] <name>(<type1> <arg1>[, <type2> <arg2>] ...) "<format-string>"
  16. #
  17. # Example: g_malloc(size_t size) "size %zu"
  18. #
  19. # The "disable" keyword will build without the trace event.
  20. #
  21. # The <name> must be a valid as a C function name.
  22. #
  23. # Types should be standard C types. Use void * for pointers because the trace
  24. # system may not have the necessary headers included.
  25. #
  26. # The <format-string> should be a sprintf()-compatible format string.
  27. # ioport.c
  28. cpu_in(unsigned int addr, char size, unsigned int val) "addr 0x%x(%c) value %u"
  29. cpu_out(unsigned int addr, char size, unsigned int val) "addr 0x%x(%c) value %u"
  30. # balloon.c
  31. # Since requests are raised via monitor, not many tracepoints are needed.
  32. balloon_event(void *opaque, unsigned long addr) "opaque %p addr %lu"
  33. # vl.c
  34. vm_state_notify(int running, int reason) "running %d reason %d"
  35. load_file(const char *name, const char *path) "name %s location %s"
  36. runstate_set(int new_state) "new state %d"
  37. system_wakeup_request(int reason) "reason=%d"
  38. qemu_system_shutdown_request(int reason) "reason=%d"
  39. qemu_system_powerdown_request(void) ""
  40. # monitor.c
  41. monitor_protocol_event_handler(uint32_t event, void *qdict) "event=%d data=%p"
  42. monitor_protocol_event_emit(uint32_t event, void *data) "event=%d data=%p"
  43. monitor_protocol_event_queue(uint32_t event, void *qdict, uint64_t rate) "event=%d data=%p rate=%" PRId64
  44. handle_hmp_command(void *mon, const char *cmdline) "mon %p cmdline: %s"
  45. handle_qmp_command(void *mon, const char *req) "mon %p req: %s"
  46. monitor_suspend(void *ptr, int cnt) "mon %p: %d"
  47. monitor_qmp_cmd_in_band(const char *id) "%s"
  48. monitor_qmp_cmd_out_of_band(const char *id) "%s"
  49. # dma-helpers.c
  50. dma_blk_io(void *dbs, void *bs, int64_t offset, bool to_dev) "dbs=%p bs=%p offset=%" PRId64 " to_dev=%d"
  51. dma_aio_cancel(void *dbs) "dbs=%p"
  52. dma_complete(void *dbs, int ret, void *cb) "dbs=%p ret=%d cb=%p"
  53. dma_blk_cb(void *dbs, int ret) "dbs=%p ret=%d"
  54. dma_map_wait(void *dbs) "dbs=%p"
  55. # exec.c
  56. find_ram_offset(uint64_t size, uint64_t offset) "size: 0x%" PRIx64 " @ 0x%" PRIx64
  57. find_ram_offset_loop(uint64_t size, uint64_t candidate, uint64_t offset, uint64_t next, uint64_t mingap) "trying size: 0x%" PRIx64 " @ 0x%" PRIx64 ", offset: 0x%" PRIx64" next: 0x%" PRIx64 " mingap: 0x%" PRIx64
  58. ram_block_discard_range(const char *rbname, void *hva, size_t length, bool need_madvise, bool need_fallocate, int ret) "%s@%p + 0x%zx: madvise: %d fallocate: %d ret: %d"
  59. # memory.c
  60. memory_region_ops_read(int cpu_index, void *mr, uint64_t addr, uint64_t value, unsigned size) "cpu %d mr %p addr 0x%"PRIx64" value 0x%"PRIx64" size %u"
  61. memory_region_ops_write(int cpu_index, void *mr, uint64_t addr, uint64_t value, unsigned size) "cpu %d mr %p addr 0x%"PRIx64" value 0x%"PRIx64" size %u"
  62. memory_region_subpage_read(int cpu_index, void *mr, uint64_t offset, uint64_t value, unsigned size) "cpu %d mr %p offset 0x%"PRIx64" value 0x%"PRIx64" size %u"
  63. memory_region_subpage_write(int cpu_index, void *mr, uint64_t offset, uint64_t value, unsigned size) "cpu %d mr %p offset 0x%"PRIx64" value 0x%"PRIx64" size %u"
  64. memory_region_tb_read(int cpu_index, uint64_t addr, uint64_t value, unsigned size) "cpu %d addr 0x%"PRIx64" value 0x%"PRIx64" size %u"
  65. memory_region_tb_write(int cpu_index, uint64_t addr, uint64_t value, unsigned size) "cpu %d addr 0x%"PRIx64" value 0x%"PRIx64" size %u"
  66. memory_region_ram_device_read(int cpu_index, void *mr, uint64_t addr, uint64_t value, unsigned size) "cpu %d mr %p addr 0x%"PRIx64" value 0x%"PRIx64" size %u"
  67. memory_region_ram_device_write(int cpu_index, void *mr, uint64_t addr, uint64_t value, unsigned size) "cpu %d mr %p addr 0x%"PRIx64" value 0x%"PRIx64" size %u"
  68. flatview_new(void *view, void *root) "%p (root %p)"
  69. flatview_destroy(void *view, void *root) "%p (root %p)"
  70. flatview_destroy_rcu(void *view, void *root) "%p (root %p)"
  71. # gdbstub.c
  72. gdbstub_op_start(const char *device) "Starting gdbstub using device %s"
  73. gdbstub_op_exiting(uint8_t code) "notifying exit with code=0x%02x"
  74. gdbstub_op_continue(void) "Continuing all CPUs"
  75. gdbstub_op_continue_cpu(int cpu_index) "Continuing CPU %d"
  76. gdbstub_op_stepping(int cpu_index) "Stepping CPU %d"
  77. gdbstub_op_extra_info(const char *info) "Thread extra info: %s"
  78. gdbstub_hit_watchpoint(const char *type, int cpu_gdb_index, uint64_t vaddr) "Watchpoint hit, type=\"%s\" cpu=%d, vaddr=0x%" PRIx64 ""
  79. gdbstub_hit_internal_error(void) "RUN_STATE_INTERNAL_ERROR"
  80. gdbstub_hit_break(void) "RUN_STATE_DEBUG"
  81. gdbstub_hit_paused(void) "RUN_STATE_PAUSED"
  82. gdbstub_hit_shutdown(void) "RUN_STATE_SHUTDOWN"
  83. gdbstub_hit_io_error(void) "RUN_STATE_IO_ERROR"
  84. gdbstub_hit_watchdog(void) "RUN_STATE_WATCHDOG"
  85. gdbstub_hit_unknown(int state) "Unknown run state=0x%x"
  86. gdbstub_io_reply(const char *message) "Sent: %s"
  87. gdbstub_io_binaryreply(size_t ofs, const char *line) "0x%04zx: %s"
  88. gdbstub_io_command(const char *command) "Received: %s"
  89. gdbstub_io_got_ack(void) "Got ACK"
  90. gdbstub_io_got_unexpected(uint8_t ch) "Got 0x%02x when expecting ACK/NACK"
  91. gdbstub_err_got_nack(void) "Got NACK, retransmitting"
  92. gdbstub_err_garbage(uint8_t ch) "received garbage between packets: 0x%02x"
  93. gdbstub_err_overrun(void) "command buffer overrun, dropping command"
  94. gdbstub_err_invalid_repeat(uint8_t ch) "got invalid RLE count: 0x%02x"
  95. gdbstub_err_invalid_rle(void) "got invalid RLE sequence"
  96. gdbstub_err_checksum_invalid(uint8_t ch) "got invalid command checksum digit: 0x%02x"
  97. gdbstub_err_checksum_incorrect(uint8_t expected, uint8_t got) "got command packet with incorrect checksum, expected=0x%02x, received=0x%02x"
  98. ### Guest events, keep at bottom
  99. ## vCPU
  100. # Hot-plug a new virtual (guest) CPU
  101. #
  102. # Mode: user, softmmu
  103. # Targets: all
  104. vcpu guest_cpu_enter(void)
  105. # Hot-unplug a virtual (guest) CPU
  106. #
  107. # Mode: user, softmmu
  108. # Targets: all
  109. vcpu guest_cpu_exit(void)
  110. # Reset the state of a virtual (guest) CPU
  111. #
  112. # Mode: user, softmmu
  113. # Targets: all
  114. vcpu guest_cpu_reset(void)
  115. # @vaddr: Access' virtual address.
  116. # @info : Access' information (see below).
  117. #
  118. # Start virtual memory access (before any potential access violation).
  119. #
  120. # Does not include memory accesses performed by devices.
  121. #
  122. # Access information can be parsed as:
  123. #
  124. # struct mem_info {
  125. # uint8_t size_shift : 2; /* interpreted as "1 << size_shift" bytes */
  126. # bool sign_extend: 1; /* sign-extended */
  127. # uint8_t endianness : 1; /* 0: little, 1: big */
  128. # bool store : 1; /* wheter it's a store operation */
  129. # };
  130. #
  131. # Mode: user, softmmu
  132. # Targets: TCG(all)
  133. vcpu tcg guest_mem_before(TCGv vaddr, uint8_t info) "info=%d", "vaddr=0x%016"PRIx64" info=%d"
  134. # @num: System call number.
  135. # @arg*: System call argument value.
  136. #
  137. # Start executing a guest system call in syscall emulation mode.
  138. #
  139. # Mode: user
  140. # Targets: TCG(all)
  141. vcpu guest_user_syscall(uint64_t num, uint64_t arg1, uint64_t arg2, uint64_t arg3, uint64_t arg4, uint64_t arg5, uint64_t arg6, uint64_t arg7, uint64_t arg8) "num=0x%016"PRIx64" arg1=0x%016"PRIx64" arg2=0x%016"PRIx64" arg3=0x%016"PRIx64" arg4=0x%016"PRIx64" arg5=0x%016"PRIx64" arg6=0x%016"PRIx64" arg7=0x%016"PRIx64" arg8=0x%016"PRIx64
  142. # @num: System call number.
  143. # @ret: System call result value.
  144. #
  145. # Finish executing a guest system call in syscall emulation mode.
  146. #
  147. # Mode: user
  148. # Targets: TCG(all)
  149. vcpu guest_user_syscall_ret(uint64_t num, uint64_t ret) "num=0x%016"PRIx64" ret=0x%016"PRIx64