trace-events 3.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106
  1. # See docs/devel/tracing.rst for syntax documentation.
  2. #
  3. # This file is processed by the tracetool script during the build.
  4. #
  5. # To add a new trace event:
  6. #
  7. # 1. Choose a name for the trace event. Declare its arguments and format
  8. # string.
  9. #
  10. # 2. Call the trace event from code using trace_##name, e.g. multiwrite_cb() ->
  11. # trace_multiwrite_cb(). The source file must #include "trace.h".
  12. #
  13. # Format of a trace event:
  14. #
  15. # [disable] <name>(<type1> <arg1>[, <type2> <arg2>] ...) "<format-string>"
  16. #
  17. # Example: g_malloc(size_t size) "size %zu"
  18. #
  19. # The "disable" keyword will build without the trace event.
  20. #
  21. # The <name> must be a valid as a C function name.
  22. #
  23. # Types should be standard C types. Use void * for pointers because the trace
  24. # system may not have the necessary headers included.
  25. #
  26. # The <format-string> should be a sprintf()-compatible format string.
  27. # cpu.c
  28. breakpoint_insert(int cpu_index, uint64_t pc, int flags) "cpu=%d pc=0x%" PRIx64 " flags=0x%x"
  29. breakpoint_remove(int cpu_index, uint64_t pc, int flags) "cpu=%d pc=0x%" PRIx64 " flags=0x%x"
  30. breakpoint_singlestep(int cpu_index, int enabled) "cpu=%d enable=%d"
  31. # dma-helpers.c
  32. dma_blk_io(void *dbs, void *bs, int64_t offset, bool to_dev) "dbs=%p bs=%p offset=%" PRId64 " to_dev=%d"
  33. dma_aio_cancel(void *dbs) "dbs=%p"
  34. dma_complete(void *dbs, int ret, void *cb) "dbs=%p ret=%d cb=%p"
  35. dma_blk_cb(void *dbs, int ret) "dbs=%p ret=%d"
  36. dma_map_wait(void *dbs) "dbs=%p"
  37. # exec.c
  38. find_ram_offset(uint64_t size, uint64_t offset) "size: 0x%" PRIx64 " @ 0x%" PRIx64
  39. find_ram_offset_loop(uint64_t size, uint64_t candidate, uint64_t offset, uint64_t next, uint64_t mingap) "trying size: 0x%" PRIx64 " @ 0x%" PRIx64 ", offset: 0x%" PRIx64" next: 0x%" PRIx64 " mingap: 0x%" PRIx64
  40. ram_block_discard_range(const char *rbname, void *hva, size_t length, bool need_madvise, bool need_fallocate, int ret) "%s@%p + 0x%zx: madvise: %d fallocate: %d ret: %d"
  41. # job.c
  42. job_state_transition(void *job, int ret, const char *legal, const char *s0, const char *s1) "job %p (ret: %d) attempting %s transition (%s-->%s)"
  43. job_apply_verb(void *job, const char *state, const char *verb, const char *legal) "job %p in state %s; applying verb %s (%s)"
  44. job_completed(void *job, int ret) "job %p ret %d"
  45. # job-qmp.c
  46. qmp_job_cancel(void *job) "job %p"
  47. qmp_job_pause(void *job) "job %p"
  48. qmp_job_resume(void *job) "job %p"
  49. qmp_job_complete(void *job) "job %p"
  50. qmp_job_finalize(void *job) "job %p"
  51. qmp_job_dismiss(void *job) "job %p"
  52. ### Guest events, keep at bottom
  53. ## vCPU
  54. # trace/control-target.c
  55. # Hot-plug a new virtual (guest) CPU
  56. #
  57. # Mode: user, softmmu
  58. # Targets: all
  59. vcpu guest_cpu_enter(void)
  60. # trace/control.c
  61. # Hot-unplug a virtual (guest) CPU
  62. #
  63. # Mode: user, softmmu
  64. # Targets: all
  65. vcpu guest_cpu_exit(void)
  66. # hw/core/cpu.c
  67. # Reset the state of a virtual (guest) CPU
  68. #
  69. # Mode: user, softmmu
  70. # Targets: all
  71. vcpu guest_cpu_reset(void)
  72. # include/user/syscall-trace.h
  73. # @num: System call number.
  74. # @arg*: System call argument value.
  75. #
  76. # Start executing a guest system call in syscall emulation mode.
  77. #
  78. # Mode: user
  79. # Targets: TCG(all)
  80. vcpu guest_user_syscall(uint64_t num, uint64_t arg1, uint64_t arg2, uint64_t arg3, uint64_t arg4, uint64_t arg5, uint64_t arg6, uint64_t arg7, uint64_t arg8) "num=0x%016"PRIx64" arg1=0x%016"PRIx64" arg2=0x%016"PRIx64" arg3=0x%016"PRIx64" arg4=0x%016"PRIx64" arg5=0x%016"PRIx64" arg6=0x%016"PRIx64" arg7=0x%016"PRIx64" arg8=0x%016"PRIx64
  81. # @num: System call number.
  82. # @ret: System call result value.
  83. #
  84. # Finish executing a guest system call in syscall emulation mode.
  85. #
  86. # Mode: user
  87. # Targets: TCG(all)
  88. vcpu guest_user_syscall_ret(uint64_t num, uint64_t ret) "num=0x%016"PRIx64" ret=0x%016"PRIx64