1d0fb9657SStefano Garzarella# See docs/devel/tracing.rst for syntax documentation. 294a420b1SStefan Hajnoczi# 394a420b1SStefan Hajnoczi# This file is processed by the tracetool script during the build. 494a420b1SStefan Hajnoczi# 594a420b1SStefan Hajnoczi# To add a new trace event: 694a420b1SStefan Hajnoczi# 794a420b1SStefan Hajnoczi# 1. Choose a name for the trace event. Declare its arguments and format 894a420b1SStefan Hajnoczi# string. 994a420b1SStefan Hajnoczi# 1094a420b1SStefan Hajnoczi# 2. Call the trace event from code using trace_##name, e.g. multiwrite_cb() -> 1194a420b1SStefan Hajnoczi# trace_multiwrite_cb(). The source file must #include "trace.h". 1294a420b1SStefan Hajnoczi# 1394a420b1SStefan Hajnoczi# Format of a trace event: 1494a420b1SStefan Hajnoczi# 151e2cf2bcSStefan Hajnoczi# [disable] <name>(<type1> <arg1>[, <type2> <arg2>] ...) "<format-string>" 1694a420b1SStefan Hajnoczi# 17a74cd8ccSFrediano Ziglio# Example: g_malloc(size_t size) "size %zu" 1894a420b1SStefan Hajnoczi# 191e2cf2bcSStefan Hajnoczi# The "disable" keyword will build without the trace event. 201e2cf2bcSStefan Hajnoczi# 2194a420b1SStefan Hajnoczi# The <name> must be a valid as a C function name. 2294a420b1SStefan Hajnoczi# 2394a420b1SStefan Hajnoczi# Types should be standard C types. Use void * for pointers because the trace 2494a420b1SStefan Hajnoczi# system may not have the necessary headers included. 2594a420b1SStefan Hajnoczi# 2694a420b1SStefan Hajnoczi# The <format-string> should be a sprintf()-compatible format string. 27cd245a19SStefan Hajnoczi 28*ad1a706fSRichard Henderson# cpu.c 29*ad1a706fSRichard Hendersonbreakpoint_insert(int cpu_index, uint64_t pc, int flags) "cpu=%d pc=0x%" PRIx64 " flags=0x%x" 30*ad1a706fSRichard Hendersonbreakpoint_remove(int cpu_index, uint64_t pc, int flags) "cpu=%d pc=0x%" PRIx64 " flags=0x%x" 31*ad1a706fSRichard Hendersonbreakpoint_singlestep(int cpu_index, int enabled) "cpu=%d enable=%d" 32*ad1a706fSRichard Henderson 33c57c4658SKevin Wolf# dma-helpers.c 34cbe0ed62SPaolo Bonzinidma_blk_io(void *dbs, void *bs, int64_t offset, bool to_dev) "dbs=%p bs=%p offset=%" PRId64 " to_dev=%d" 35c57c4658SKevin Wolfdma_aio_cancel(void *dbs) "dbs=%p" 36c57c4658SKevin Wolfdma_complete(void *dbs, int ret, void *cb) "dbs=%p ret=%d cb=%p" 374be74634SMarkus Armbrusterdma_blk_cb(void *dbs, int ret) "dbs=%p ret=%d" 38c57c4658SKevin Wolfdma_map_wait(void *dbs) "dbs=%p" 39cdbc19ddSAlon Levy 40db144f70SDr. David Alan Gilbert# exec.c 41154cc9eaSDr. David Alan Gilbertfind_ram_offset(uint64_t size, uint64_t offset) "size: 0x%" PRIx64 " @ 0x%" PRIx64 42154cc9eaSDr. David Alan Gilbertfind_ram_offset_loop(uint64_t size, uint64_t candidate, uint64_t offset, uint64_t next, uint64_t mingap) "trying size: 0x%" PRIx64 " @ 0x%" PRIx64 ", offset: 0x%" PRIx64" next: 0x%" PRIx64 " mingap: 0x%" PRIx64 43db144f70SDr. David Alan Gilbertram_block_discard_range(const char *rbname, void *hva, size_t length, bool need_madvise, bool need_fallocate, int ret) "%s@%p + 0x%zx: madvise: %d fallocate: %d ret: %d" 44b15e402fSMarkus Armbruster 45b15e402fSMarkus Armbruster# accel/tcg/cputlb.c 466e050d41SRichard Hendersonmemory_notdirty_write_access(uint64_t vaddr, uint64_t ram_addr, unsigned size) "0x%" PRIx64 " ram_addr 0x%" PRIx64 " size %u" 476e050d41SRichard Hendersonmemory_notdirty_set_dirty(uint64_t vaddr) "0x%" PRIx64 48154cc9eaSDr. David Alan Gilbert 495c9522b3SDoug Gale# gdbstub.c 507f1d87abSStefan Hajnoczigdbstub_op_start(const char *device) "Starting gdbstub using device %s" 515c9522b3SDoug Galegdbstub_op_exiting(uint8_t code) "notifying exit with code=0x%02x" 525c9522b3SDoug Galegdbstub_op_continue(void) "Continuing all CPUs" 535c9522b3SDoug Galegdbstub_op_continue_cpu(int cpu_index) "Continuing CPU %d" 545c9522b3SDoug Galegdbstub_op_stepping(int cpu_index) "Stepping CPU %d" 557f1d87abSStefan Hajnoczigdbstub_op_extra_info(const char *info) "Thread extra info: %s" 567f1d87abSStefan Hajnoczigdbstub_hit_watchpoint(const char *type, int cpu_gdb_index, uint64_t vaddr) "Watchpoint hit, type=\"%s\" cpu=%d, vaddr=0x%" PRIx64 "" 575c9522b3SDoug Galegdbstub_hit_internal_error(void) "RUN_STATE_INTERNAL_ERROR" 585c9522b3SDoug Galegdbstub_hit_break(void) "RUN_STATE_DEBUG" 595c9522b3SDoug Galegdbstub_hit_paused(void) "RUN_STATE_PAUSED" 605c9522b3SDoug Galegdbstub_hit_shutdown(void) "RUN_STATE_SHUTDOWN" 615c9522b3SDoug Galegdbstub_hit_io_error(void) "RUN_STATE_IO_ERROR" 625c9522b3SDoug Galegdbstub_hit_watchdog(void) "RUN_STATE_WATCHDOG" 635c9522b3SDoug Galegdbstub_hit_unknown(int state) "Unknown run state=0x%x" 647f1d87abSStefan Hajnoczigdbstub_io_reply(const char *message) "Sent: %s" 657f1d87abSStefan Hajnoczigdbstub_io_binaryreply(size_t ofs, const char *line) "0x%04zx: %s" 667f1d87abSStefan Hajnoczigdbstub_io_command(const char *command) "Received: %s" 675c9522b3SDoug Galegdbstub_io_got_ack(void) "Got ACK" 685c9522b3SDoug Galegdbstub_io_got_unexpected(uint8_t ch) "Got 0x%02x when expecting ACK/NACK" 695c9522b3SDoug Galegdbstub_err_got_nack(void) "Got NACK, retransmitting" 705c9522b3SDoug Galegdbstub_err_garbage(uint8_t ch) "received garbage between packets: 0x%02x" 715c9522b3SDoug Galegdbstub_err_overrun(void) "command buffer overrun, dropping command" 725c9522b3SDoug Galegdbstub_err_invalid_repeat(uint8_t ch) "got invalid RLE count: 0x%02x" 735c9522b3SDoug Galegdbstub_err_invalid_rle(void) "got invalid RLE sequence" 745c9522b3SDoug Galegdbstub_err_checksum_invalid(uint8_t ch) "got invalid command checksum digit: 0x%02x" 755c9522b3SDoug Galegdbstub_err_checksum_incorrect(uint8_t expected, uint8_t got) "got command packet with incorrect checksum, expected=0x%02x, received=0x%02x" 765c9522b3SDoug Gale 77a50c2ab8SKevin Wolf# job.c 78a50c2ab8SKevin Wolfjob_state_transition(void *job, int ret, const char *legal, const char *s0, const char *s1) "job %p (ret: %d) attempting %s transition (%s-->%s)" 79a50c2ab8SKevin Wolfjob_apply_verb(void *job, const char *state, const char *verb, const char *legal) "job %p in state %s; applying verb %s (%s)" 80404ff28dSJohn Snowjob_completed(void *job, int ret) "job %p ret %d" 81a50c2ab8SKevin Wolf 821a90bc81SKevin Wolf# job-qmp.c 831a90bc81SKevin Wolfqmp_job_cancel(void *job) "job %p" 841a90bc81SKevin Wolfqmp_job_pause(void *job) "job %p" 851a90bc81SKevin Wolfqmp_job_resume(void *job) "job %p" 861a90bc81SKevin Wolfqmp_job_complete(void *job) "job %p" 871a90bc81SKevin Wolfqmp_job_finalize(void *job) "job %p" 881a90bc81SKevin Wolfqmp_job_dismiss(void *job) "job %p" 891a90bc81SKevin Wolf 901a90bc81SKevin Wolf 91dcdaadb6SLluís Vilanova### Guest events, keep at bottom 92dcdaadb6SLluís Vilanova 93b9d72215SLluís Vilanova 94b9d72215SLluís Vilanova## vCPU 95b9d72215SLluís Vilanova 96dec97760SMarkus Armbruster# trace/control-target.c 97dec97760SMarkus Armbruster 98b9d72215SLluís Vilanova# Hot-plug a new virtual (guest) CPU 99b9d72215SLluís Vilanova# 100f5e2b3beSLluís Vilanova# Mode: user, softmmu 101b9d72215SLluís Vilanova# Targets: all 102b9d72215SLluís Vilanovavcpu guest_cpu_enter(void) 103b9d72215SLluís Vilanova 104dec97760SMarkus Armbruster# trace/control.c 105dec97760SMarkus Armbruster 106a47e8715SLluís Vilanova# Hot-unplug a virtual (guest) CPU 107a47e8715SLluís Vilanova# 108a47e8715SLluís Vilanova# Mode: user, softmmu 109a47e8715SLluís Vilanova# Targets: all 110a47e8715SLluís Vilanovavcpu guest_cpu_exit(void) 111a47e8715SLluís Vilanova 1122e5b09fdSMarkus Armbruster# hw/core/cpu.c 113dec97760SMarkus Armbruster 1142cc2d082SLluís Vilanova# Reset the state of a virtual (guest) CPU 1152cc2d082SLluís Vilanova# 116f5e2b3beSLluís Vilanova# Mode: user, softmmu 1172cc2d082SLluís Vilanova# Targets: all 1182cc2d082SLluís Vilanovavcpu guest_cpu_reset(void) 1192cc2d082SLluís Vilanova 120dec97760SMarkus Armbruster# tcg/tcg-op.c 121dec97760SMarkus Armbruster 122dcdaadb6SLluís Vilanova# @vaddr: Access' virtual address. 123dcdaadb6SLluís Vilanova# @info : Access' information (see below). 124dcdaadb6SLluís Vilanova# 125dcdaadb6SLluís Vilanova# Start virtual memory access (before any potential access violation). 126dcdaadb6SLluís Vilanova# 127dcdaadb6SLluís Vilanova# Does not include memory accesses performed by devices. 128dcdaadb6SLluís Vilanova# 129dcdaadb6SLluís Vilanova# Access information can be parsed as: 130dcdaadb6SLluís Vilanova# 131dcdaadb6SLluís Vilanova# struct mem_info { 132291987c3SEmilio G. Cota# uint8_t size_shift : 4; /* interpreted as "1 << size_shift" bytes */ 133dcdaadb6SLluís Vilanova# bool sign_extend: 1; /* sign-extended */ 134dcdaadb6SLluís Vilanova# uint8_t endianness : 1; /* 0: little, 1: big */ 135504f73f7SAlex Bennée# bool store : 1; /* whether it is a store operation */ 136504f73f7SAlex Bennée# pad : 1; 137504f73f7SAlex Bennée# uint8_t mmuidx : 4; /* mmuidx (softmmu only) */ 138dcdaadb6SLluís Vilanova# }; 139dcdaadb6SLluís Vilanova# 14043e21e49SLluís Vilanova# Mode: user, softmmu 141dcdaadb6SLluís Vilanova# Targets: TCG(all) 142504f73f7SAlex Bennéevcpu tcg guest_mem_before(TCGv vaddr, uint16_t info) "info=%d", "vaddr=0x%016"PRIx64" info=%d" 1439c15e700SLluís Vilanova 144b15e402fSMarkus Armbruster# include/user/syscall-trace.h 145dec97760SMarkus Armbruster 1469c15e700SLluís Vilanova# @num: System call number. 1479c15e700SLluís Vilanova# @arg*: System call argument value. 1489c15e700SLluís Vilanova# 1499c15e700SLluís Vilanova# Start executing a guest system call in syscall emulation mode. 1509c15e700SLluís Vilanova# 15143e21e49SLluís Vilanova# Mode: user 1529c15e700SLluís Vilanova# Targets: TCG(all) 1535caa262fSLluís Vilanovavcpu guest_user_syscall(uint64_t num, uint64_t arg1, uint64_t arg2, uint64_t arg3, uint64_t arg4, uint64_t arg5, uint64_t arg6, uint64_t arg7, uint64_t arg8) "num=0x%016"PRIx64" arg1=0x%016"PRIx64" arg2=0x%016"PRIx64" arg3=0x%016"PRIx64" arg4=0x%016"PRIx64" arg5=0x%016"PRIx64" arg6=0x%016"PRIx64" arg7=0x%016"PRIx64" arg8=0x%016"PRIx64 1549c15e700SLluís Vilanova 1559c15e700SLluís Vilanova# @num: System call number. 1569c15e700SLluís Vilanova# @ret: System call result value. 1579c15e700SLluís Vilanova# 1589c15e700SLluís Vilanova# Finish executing a guest system call in syscall emulation mode. 1599c15e700SLluís Vilanova# 16043e21e49SLluís Vilanova# Mode: user 1619c15e700SLluís Vilanova# Targets: TCG(all) 1625caa262fSLluís Vilanovavcpu guest_user_syscall_ret(uint64_t num, uint64_t ret) "num=0x%016"PRIx64" ret=0x%016"PRIx64 163